SlideShare a Scribd company logo
GRAY IMAGE
WATERMARKING
USING SLANT
TRANSFORM
NITHIN KALLEPALLY
DIGITAL IMAGE PROCESSING
• With the swift sprouting of internet and information technology, the information
exchange process is being carried out in the form of digital text, image, audio
and video. Information in digital format can be modified without loss in quality and
content and can be efficiently distributed with a great ease. The ease with which
digital content can be exchanged over the Internet has created copyright
infringement issues and has caused major concerns to digital content owner who
produces those digital content.
• This leads to a serious requirement of a robust technique that can address the
security of those information such that the authenticity, availability, confidentiality
,identity and integrity of the information is maintained. Digital image watermarking
is one of the techniques for solving copyright and ownership issues. In this a
pattern of bits are inserted into a digital image, audio, video or text file that
identifies the file's copyright information
• SLANT TRANSFORM
• This section details the proposed semi-blind watermarking scheme for copyright protection of digital images.
The following subsections present the steps involved in the watermark embedding and extraction processes
along with a brief description about the Slant transform, DWT and SVD
Slant transform is derived from saw tooth waveforms.Aslant transform matrix has a constant basis vector
corresponding to zero sequency and slant basis vector basis vectors monotonically decreases with sequency
inconstant step from maximum to minimum. The matrix has sequency property and high energy compaction
property[12]. The lowest order of slant matrix is 2 and 2 X 2 matrix is identical to Hadamard matrix
Let é/] be the original image of size N x N , its 2O-Slant transform is given by [5]
(1)
where S is the N x N unitary Slant matrix. The inverse transformation to recover [U
Tom the transform components V is given by
The Slant transform is a member of the orthogonal transforms. It has a constant function for
the first row, and has a second row which is a linear (slant) function of the column index.
The Slant transform matrix of order two is given by
1
1. Watermarking in Slant Transform domain
2. A generic block diagram of the blind watermarking system Figure 1. The original image is not necessary at
the watermark recovery stage. This refers to ‘Tlind” watermarking process. A visually recognizable pattern
is embedded by modifying the Slant transform coefficients of relevant sub-blocks of the host image. The
detailed Image-embedded watermark insertion and extraction algorithm are discussed in this section.
3. Copyright information in the form of a trademark or logo can be created as a pattern for watermarking. In our
experiment, a grayscale image of size 64 x 64 is used as the watermark. The watermark insertion process is
shown in Figure 2. We adapt a image-embedded watermark insertion algorithm as in [I], while using the
Slant transform domain instead of the Hadamard transform
The watermark image, W x,y) , is first transformed into a
set of Slant transform coefficients by equation (1). A Slant transform matrix of order 64 is applied
to this image, Let the original image be fax y) . Similar to the algorithm used in [1,2], it is
decomposed into a set of non-overlapped 8 x 8 sub-blocks. An m-sequence random number
generator is used to select a certain number of sub-blocks for watermark embedding, whose
initial seed is also kept in the secret key file. In every selected sub-block, sixteen middle and high
frequency coefficients are used for later modulation. The way of the coefficients selection affects
the performance of the watermarking scheme significantly
• The high frequency components are relatively vulnerable to compression operations, while the low frequency
components must be retained for visual quality of the watermarked image. Therefore, most existing
watermarking schemes choose to embed the watermark into the middle frequency band. In our scheme,
embedding locations as shown in Figure 3 are adopted, which are observed, through our experiments, to
provide a best tradeoff between robustness and data integrity.
Let the watermark Slant transform coefficients denoted by m,. The AC co efficients of Slant transformed original
image sub-blocks, before and after inserting watermark are
denoted by r, and x' , respectively, and i z (0, n) , where n
is the number of the watermarked coefficients to be inserted into every sub-block, which is set to 16 in our
experiment.
The embedding formula is given as follows
•In watermark detection, the positions of the sub-blocks with watermark embedded are computed
using the seed of the m-sequence and initial state number that is stored in the key file. All the
selected sub-blocks are Slant transformed. Let
•these coefficients denoted by z'’ atid the retrieved
•watermark Slant transform coefficients by m, , i e (0, n],
•where n is the number of the watert marked coefficients to be inserted in every sub-block. The
watermark extraction formula is given by
•
The exacted AC coefficients and the DC component stored in the key file are rearranged
into a 64 x 64 Slant transform coefficients matrix. The extracted watermark image, IP’ (z, y)
, is then obtained by an inverse Slant
transform using equation (2).
• Simulation Results
• We use two 512 x 512 gray-scale satellite images with distinct texture to test our algorithm. The
original and watermarked images are shown in FiG. Results show that there are no perceptually
visible degradations on the watermarked images with a PSNR of 37.43 dB for Singapore and 40.65
dB for Dolomites.
CONCLUSION
Performance of slant transform based watermarking technique is evaluated. LWT is used to
decompose the original image. SVD is applied on the selected LWT sub-bands. The slant
transformed watermark image is embedded in LWT and SVD transformed original image.
Subsequently, the watermark image is extracted from watermarked image. The proposed method is
found to be robust against common geometric attacks, cropping attacks and rotation attacks. The
efficiency of proposed method is established with the help of experimental result
THANK YOU …

More Related Content

What's hot

Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
IOSR Journals
 
Jv2517361741
Jv2517361741Jv2517361741
Jv2517361741
IJERA Editor
 
Multimedia lossy compression algorithms
Multimedia lossy compression algorithmsMultimedia lossy compression algorithms
Multimedia lossy compression algorithms
Mazin Alwaaly
 
Design and Implementation of a Programmable Truncated Multiplier
Design and Implementation of a Programmable Truncated MultiplierDesign and Implementation of a Programmable Truncated Multiplier
Design and Implementation of a Programmable Truncated Multiplier
ijsrd.com
 
REVERSIBLE WAVELET AND SPECTRAL TRANSFORMS FOR LOSSLESS COMPRESSION OF COLOR ...
REVERSIBLE WAVELET AND SPECTRAL TRANSFORMS FOR LOSSLESS COMPRESSION OF COLOR ...REVERSIBLE WAVELET AND SPECTRAL TRANSFORMS FOR LOSSLESS COMPRESSION OF COLOR ...
REVERSIBLE WAVELET AND SPECTRAL TRANSFORMS FOR LOSSLESS COMPRESSION OF COLOR ...
cscpconf
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
VLSICS Design
 
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
ijcseit
 
Kernighan lin
Kernighan linKernighan lin
Kernighan lin
Tanvi Prabhu Dessai
 
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
IJECEIAES
 
Image coding through ztransform with low energy and bandwidth (izeb)
Image coding through ztransform with low energy and bandwidth (izeb)Image coding through ztransform with low energy and bandwidth (izeb)
Image coding through ztransform with low energy and bandwidth (izeb)
csandit
 
IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB)
IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB) IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB)
IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB)
cscpconf
 
2020 12-04-shake shake
2020 12-04-shake shake2020 12-04-shake shake
2020 12-04-shake shake
JAEMINJEONG5
 
Multimedia communication jpeg
Multimedia communication jpegMultimedia communication jpeg
Multimedia communication jpeg
Dr. Kapil Gupta
 
DCT image compression
DCT image compressionDCT image compression
DCT image compression
youssef ramzy
 
Dct,gibbs phen,oversampled adc,polyphase decomposition
Dct,gibbs phen,oversampled adc,polyphase decompositionDct,gibbs phen,oversampled adc,polyphase decomposition
Dct,gibbs phen,oversampled adc,polyphase decompositionMuhammad Younas
 

What's hot (18)

Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
 
Jv2517361741
Jv2517361741Jv2517361741
Jv2517361741
 
Multimedia lossy compression algorithms
Multimedia lossy compression algorithmsMultimedia lossy compression algorithms
Multimedia lossy compression algorithms
 
Lossy
LossyLossy
Lossy
 
Design and Implementation of a Programmable Truncated Multiplier
Design and Implementation of a Programmable Truncated MultiplierDesign and Implementation of a Programmable Truncated Multiplier
Design and Implementation of a Programmable Truncated Multiplier
 
REVERSIBLE WAVELET AND SPECTRAL TRANSFORMS FOR LOSSLESS COMPRESSION OF COLOR ...
REVERSIBLE WAVELET AND SPECTRAL TRANSFORMS FOR LOSSLESS COMPRESSION OF COLOR ...REVERSIBLE WAVELET AND SPECTRAL TRANSFORMS FOR LOSSLESS COMPRESSION OF COLOR ...
REVERSIBLE WAVELET AND SPECTRAL TRANSFORMS FOR LOSSLESS COMPRESSION OF COLOR ...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
 
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Kernighan lin
Kernighan linKernighan lin
Kernighan lin
 
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
 
Image coding through ztransform with low energy and bandwidth (izeb)
Image coding through ztransform with low energy and bandwidth (izeb)Image coding through ztransform with low energy and bandwidth (izeb)
Image coding through ztransform with low energy and bandwidth (izeb)
 
IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB)
IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB) IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB)
IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB)
 
2020 12-04-shake shake
2020 12-04-shake shake2020 12-04-shake shake
2020 12-04-shake shake
 
Multimedia communication jpeg
Multimedia communication jpegMultimedia communication jpeg
Multimedia communication jpeg
 
DCT image compression
DCT image compressionDCT image compression
DCT image compression
 
Dct,gibbs phen,oversampled adc,polyphase decomposition
Dct,gibbs phen,oversampled adc,polyphase decompositionDct,gibbs phen,oversampled adc,polyphase decomposition
Dct,gibbs phen,oversampled adc,polyphase decomposition
 

Similar to Gray Image Watermarking using slant transform - digital image processing

Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
ijcsit
 
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
CSCJournals
 
Robust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueRobust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet Technique
CSCJournals
 
Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...
IJECEIAES
 
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
sipij
 
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
sipij
 
Digital Image Watermarking using Discrete Wavelet Transform
Digital Image Watermarking using Discrete Wavelet TransformDigital Image Watermarking using Discrete Wavelet Transform
Digital Image Watermarking using Discrete Wavelet Transform
IRJET Journal
 
Ppt
PptPpt
Ppt
GMRIT
 
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmIRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking Algorithm
Lalith Kumar
 
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmIRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking Algorithm
IRJET Journal
 
A Blind Watermarking Algorithm
A Blind Watermarking AlgorithmA Blind Watermarking Algorithm
A Blind Watermarking Algorithm
IRJET Journal
 
Image Processing Research paper
Image Processing Research paperImage Processing Research paper
Image Processing Research paper
Ronak Vyas
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
IOSR Journals
 
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATIONA DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
cscpconf
 
A Wavelet - Based Object Watermarking System for MPEG4 Video
A Wavelet - Based Object Watermarking System for MPEG4 VideoA Wavelet - Based Object Watermarking System for MPEG4 Video
A Wavelet - Based Object Watermarking System for MPEG4 Video
CSCJournals
 
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT DomainA Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
IRJET Journal
 
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
ijsrd.com
 
Audio Watermarking using Empirical Mode Decomposition
Audio Watermarking using Empirical Mode DecompositionAudio Watermarking using Empirical Mode Decomposition
Audio Watermarking using Empirical Mode Decomposition
IRJET Journal
 
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET Journal
 

Similar to Gray Image Watermarking using slant transform - digital image processing (20)

Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
 
Gh2411361141
Gh2411361141Gh2411361141
Gh2411361141
 
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
 
Robust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueRobust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet Technique
 
Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...
 
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
 
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
 
Digital Image Watermarking using Discrete Wavelet Transform
Digital Image Watermarking using Discrete Wavelet TransformDigital Image Watermarking using Discrete Wavelet Transform
Digital Image Watermarking using Discrete Wavelet Transform
 
Ppt
PptPpt
Ppt
 
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmIRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking Algorithm
 
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmIRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking Algorithm
 
A Blind Watermarking Algorithm
A Blind Watermarking AlgorithmA Blind Watermarking Algorithm
A Blind Watermarking Algorithm
 
Image Processing Research paper
Image Processing Research paperImage Processing Research paper
Image Processing Research paper
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATIONA DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
 
A Wavelet - Based Object Watermarking System for MPEG4 Video
A Wavelet - Based Object Watermarking System for MPEG4 VideoA Wavelet - Based Object Watermarking System for MPEG4 Video
A Wavelet - Based Object Watermarking System for MPEG4 Video
 
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT DomainA Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
 
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
 
Audio Watermarking using Empirical Mode Decomposition
Audio Watermarking using Empirical Mode DecompositionAudio Watermarking using Empirical Mode Decomposition
Audio Watermarking using Empirical Mode Decomposition
 
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
 

More from NITHIN KALLE PALLY

Formats for coherent optical communications -OPTICAL COMMUNICATIONS
Formats for coherent optical communications -OPTICAL COMMUNICATIONSFormats for coherent optical communications -OPTICAL COMMUNICATIONS
Formats for coherent optical communications -OPTICAL COMMUNICATIONS
NITHIN KALLE PALLY
 
Based Interferometric Sensors- OPTICAL COMMUNICATION
Based Interferometric Sensors- OPTICAL COMMUNICATIONBased Interferometric Sensors- OPTICAL COMMUNICATION
Based Interferometric Sensors- OPTICAL COMMUNICATION
NITHIN KALLE PALLY
 
SHORT CHANNEL EFFECTS IN MOSFETS- VLSI DESIGN
SHORT CHANNEL EFFECTS IN MOSFETS- VLSI DESIGNSHORT CHANNEL EFFECTS IN MOSFETS- VLSI DESIGN
SHORT CHANNEL EFFECTS IN MOSFETS- VLSI DESIGN
NITHIN KALLE PALLY
 
ANALYTIC SIGNAL GENERATION- DIGITAL SIGNAL PROCESSORS AND ARCHITECTURE ...
ANALYTIC SIGNAL GENERATION- DIGITAL SIGNAL PROCESSORS AND ARCHITECTURE       ...ANALYTIC SIGNAL GENERATION- DIGITAL SIGNAL PROCESSORS AND ARCHITECTURE       ...
ANALYTIC SIGNAL GENERATION- DIGITAL SIGNAL PROCESSORS AND ARCHITECTURE ...
NITHIN KALLE PALLY
 
VLAN -VIRTUAL LAN -COMPUTER NETWORKS
VLAN -VIRTUAL LAN -COMPUTER NETWORKSVLAN -VIRTUAL LAN -COMPUTER NETWORKS
VLAN -VIRTUAL LAN -COMPUTER NETWORKS
NITHIN KALLE PALLY
 
CMOS Fabrication using P-well -VLSI
CMOS Fabrication  using P-well -VLSICMOS Fabrication  using P-well -VLSI
CMOS Fabrication using P-well -VLSI
NITHIN KALLE PALLY
 
web2.0 - computer networks
web2.0 - computer networksweb2.0 - computer networks
web2.0 - computer networks
NITHIN KALLE PALLY
 
RELATION BETWEEN DATA WORD SIZE AND INSTRUCTION WORD SIZE- Dspa word size
RELATION BETWEEN DATA WORD SIZE AND INSTRUCTION WORD SIZE- Dspa word sizeRELATION BETWEEN DATA WORD SIZE AND INSTRUCTION WORD SIZE- Dspa word size
RELATION BETWEEN DATA WORD SIZE AND INSTRUCTION WORD SIZE- Dspa word size
NITHIN KALLE PALLY
 
DISTINGUISH BETWEEN WALSH TRANSFORM AND HAAR TRANSFORMDip transforms
DISTINGUISH BETWEEN WALSH TRANSFORM AND HAAR TRANSFORMDip transformsDISTINGUISH BETWEEN WALSH TRANSFORM AND HAAR TRANSFORMDip transforms
DISTINGUISH BETWEEN WALSH TRANSFORM AND HAAR TRANSFORMDip transforms
NITHIN KALLE PALLY
 
Need of research and types of research
Need of research and types of researchNeed of research and types of research
Need of research and types of research
NITHIN KALLE PALLY
 
8051 architecture and pin configuration
8051 architecture and pin configuration8051 architecture and pin configuration
8051 architecture and pin configuration
NITHIN KALLE PALLY
 
TRANSITIONAL BUTTERWORTH-CHEBYSHEV FILTERS
TRANSITIONALBUTTERWORTH-CHEBYSHEV FILTERSTRANSITIONALBUTTERWORTH-CHEBYSHEV FILTERS
TRANSITIONAL BUTTERWORTH-CHEBYSHEV FILTERS
NITHIN KALLE PALLY
 
CAUSES AND EFFECTS OF LANDSLIDES
CAUSES AND EFFECTS OF LANDSLIDESCAUSES AND EFFECTS OF LANDSLIDES
CAUSES AND EFFECTS OF LANDSLIDES
NITHIN KALLE PALLY
 
FUTURE PUBLIC LAND MOBILE TELECOMMUNICATION SYSTEMS(FPLMTS) AND INFORMA...
      FUTURE PUBLIC LAND MOBILE TELECOMMUNICATION SYSTEMS(FPLMTS) AND INFORMA...      FUTURE PUBLIC LAND MOBILE TELECOMMUNICATION SYSTEMS(FPLMTS) AND INFORMA...
FUTURE PUBLIC LAND MOBILE TELECOMMUNICATION SYSTEMS(FPLMTS) AND INFORMA...
NITHIN KALLE PALLY
 
SAMPLING AND STORAGE OSCILLOSCOPE
SAMPLING AND STORAGE OSCILLOSCOPESAMPLING AND STORAGE OSCILLOSCOPE
SAMPLING AND STORAGE OSCILLOSCOPE
NITHIN KALLE PALLY
 

More from NITHIN KALLE PALLY (15)

Formats for coherent optical communications -OPTICAL COMMUNICATIONS
Formats for coherent optical communications -OPTICAL COMMUNICATIONSFormats for coherent optical communications -OPTICAL COMMUNICATIONS
Formats for coherent optical communications -OPTICAL COMMUNICATIONS
 
Based Interferometric Sensors- OPTICAL COMMUNICATION
Based Interferometric Sensors- OPTICAL COMMUNICATIONBased Interferometric Sensors- OPTICAL COMMUNICATION
Based Interferometric Sensors- OPTICAL COMMUNICATION
 
SHORT CHANNEL EFFECTS IN MOSFETS- VLSI DESIGN
SHORT CHANNEL EFFECTS IN MOSFETS- VLSI DESIGNSHORT CHANNEL EFFECTS IN MOSFETS- VLSI DESIGN
SHORT CHANNEL EFFECTS IN MOSFETS- VLSI DESIGN
 
ANALYTIC SIGNAL GENERATION- DIGITAL SIGNAL PROCESSORS AND ARCHITECTURE ...
ANALYTIC SIGNAL GENERATION- DIGITAL SIGNAL PROCESSORS AND ARCHITECTURE       ...ANALYTIC SIGNAL GENERATION- DIGITAL SIGNAL PROCESSORS AND ARCHITECTURE       ...
ANALYTIC SIGNAL GENERATION- DIGITAL SIGNAL PROCESSORS AND ARCHITECTURE ...
 
VLAN -VIRTUAL LAN -COMPUTER NETWORKS
VLAN -VIRTUAL LAN -COMPUTER NETWORKSVLAN -VIRTUAL LAN -COMPUTER NETWORKS
VLAN -VIRTUAL LAN -COMPUTER NETWORKS
 
CMOS Fabrication using P-well -VLSI
CMOS Fabrication  using P-well -VLSICMOS Fabrication  using P-well -VLSI
CMOS Fabrication using P-well -VLSI
 
web2.0 - computer networks
web2.0 - computer networksweb2.0 - computer networks
web2.0 - computer networks
 
RELATION BETWEEN DATA WORD SIZE AND INSTRUCTION WORD SIZE- Dspa word size
RELATION BETWEEN DATA WORD SIZE AND INSTRUCTION WORD SIZE- Dspa word sizeRELATION BETWEEN DATA WORD SIZE AND INSTRUCTION WORD SIZE- Dspa word size
RELATION BETWEEN DATA WORD SIZE AND INSTRUCTION WORD SIZE- Dspa word size
 
DISTINGUISH BETWEEN WALSH TRANSFORM AND HAAR TRANSFORMDip transforms
DISTINGUISH BETWEEN WALSH TRANSFORM AND HAAR TRANSFORMDip transformsDISTINGUISH BETWEEN WALSH TRANSFORM AND HAAR TRANSFORMDip transforms
DISTINGUISH BETWEEN WALSH TRANSFORM AND HAAR TRANSFORMDip transforms
 
Need of research and types of research
Need of research and types of researchNeed of research and types of research
Need of research and types of research
 
8051 architecture and pin configuration
8051 architecture and pin configuration8051 architecture and pin configuration
8051 architecture and pin configuration
 
TRANSITIONAL BUTTERWORTH-CHEBYSHEV FILTERS
TRANSITIONALBUTTERWORTH-CHEBYSHEV FILTERSTRANSITIONALBUTTERWORTH-CHEBYSHEV FILTERS
TRANSITIONAL BUTTERWORTH-CHEBYSHEV FILTERS
 
CAUSES AND EFFECTS OF LANDSLIDES
CAUSES AND EFFECTS OF LANDSLIDESCAUSES AND EFFECTS OF LANDSLIDES
CAUSES AND EFFECTS OF LANDSLIDES
 
FUTURE PUBLIC LAND MOBILE TELECOMMUNICATION SYSTEMS(FPLMTS) AND INFORMA...
      FUTURE PUBLIC LAND MOBILE TELECOMMUNICATION SYSTEMS(FPLMTS) AND INFORMA...      FUTURE PUBLIC LAND MOBILE TELECOMMUNICATION SYSTEMS(FPLMTS) AND INFORMA...
FUTURE PUBLIC LAND MOBILE TELECOMMUNICATION SYSTEMS(FPLMTS) AND INFORMA...
 
SAMPLING AND STORAGE OSCILLOSCOPE
SAMPLING AND STORAGE OSCILLOSCOPESAMPLING AND STORAGE OSCILLOSCOPE
SAMPLING AND STORAGE OSCILLOSCOPE
 

Recently uploaded

AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 

Recently uploaded (20)

AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 

Gray Image Watermarking using slant transform - digital image processing

  • 1. GRAY IMAGE WATERMARKING USING SLANT TRANSFORM NITHIN KALLEPALLY DIGITAL IMAGE PROCESSING
  • 2. • With the swift sprouting of internet and information technology, the information exchange process is being carried out in the form of digital text, image, audio and video. Information in digital format can be modified without loss in quality and content and can be efficiently distributed with a great ease. The ease with which digital content can be exchanged over the Internet has created copyright infringement issues and has caused major concerns to digital content owner who produces those digital content. • This leads to a serious requirement of a robust technique that can address the security of those information such that the authenticity, availability, confidentiality ,identity and integrity of the information is maintained. Digital image watermarking is one of the techniques for solving copyright and ownership issues. In this a pattern of bits are inserted into a digital image, audio, video or text file that identifies the file's copyright information
  • 3. • SLANT TRANSFORM • This section details the proposed semi-blind watermarking scheme for copyright protection of digital images. The following subsections present the steps involved in the watermark embedding and extraction processes along with a brief description about the Slant transform, DWT and SVD Slant transform is derived from saw tooth waveforms.Aslant transform matrix has a constant basis vector corresponding to zero sequency and slant basis vector basis vectors monotonically decreases with sequency inconstant step from maximum to minimum. The matrix has sequency property and high energy compaction property[12]. The lowest order of slant matrix is 2 and 2 X 2 matrix is identical to Hadamard matrix Let é/] be the original image of size N x N , its 2O-Slant transform is given by [5] (1)
  • 4. where S is the N x N unitary Slant matrix. The inverse transformation to recover [U Tom the transform components V is given by The Slant transform is a member of the orthogonal transforms. It has a constant function for the first row, and has a second row which is a linear (slant) function of the column index. The Slant transform matrix of order two is given by 1
  • 5.
  • 6. 1. Watermarking in Slant Transform domain 2. A generic block diagram of the blind watermarking system Figure 1. The original image is not necessary at the watermark recovery stage. This refers to ‘Tlind” watermarking process. A visually recognizable pattern is embedded by modifying the Slant transform coefficients of relevant sub-blocks of the host image. The detailed Image-embedded watermark insertion and extraction algorithm are discussed in this section. 3. Copyright information in the form of a trademark or logo can be created as a pattern for watermarking. In our experiment, a grayscale image of size 64 x 64 is used as the watermark. The watermark insertion process is shown in Figure 2. We adapt a image-embedded watermark insertion algorithm as in [I], while using the Slant transform domain instead of the Hadamard transform
  • 7. The watermark image, W x,y) , is first transformed into a set of Slant transform coefficients by equation (1). A Slant transform matrix of order 64 is applied to this image, Let the original image be fax y) . Similar to the algorithm used in [1,2], it is decomposed into a set of non-overlapped 8 x 8 sub-blocks. An m-sequence random number generator is used to select a certain number of sub-blocks for watermark embedding, whose initial seed is also kept in the secret key file. In every selected sub-block, sixteen middle and high frequency coefficients are used for later modulation. The way of the coefficients selection affects the performance of the watermarking scheme significantly
  • 8. • The high frequency components are relatively vulnerable to compression operations, while the low frequency components must be retained for visual quality of the watermarked image. Therefore, most existing watermarking schemes choose to embed the watermark into the middle frequency band. In our scheme, embedding locations as shown in Figure 3 are adopted, which are observed, through our experiments, to provide a best tradeoff between robustness and data integrity. Let the watermark Slant transform coefficients denoted by m,. The AC co efficients of Slant transformed original image sub-blocks, before and after inserting watermark are denoted by r, and x' , respectively, and i z (0, n) , where n is the number of the watermarked coefficients to be inserted into every sub-block, which is set to 16 in our experiment. The embedding formula is given as follows
  • 9. •In watermark detection, the positions of the sub-blocks with watermark embedded are computed using the seed of the m-sequence and initial state number that is stored in the key file. All the selected sub-blocks are Slant transformed. Let •these coefficients denoted by z'’ atid the retrieved •watermark Slant transform coefficients by m, , i e (0, n], •where n is the number of the watert marked coefficients to be inserted in every sub-block. The watermark extraction formula is given by • The exacted AC coefficients and the DC component stored in the key file are rearranged into a 64 x 64 Slant transform coefficients matrix. The extracted watermark image, IP’ (z, y) , is then obtained by an inverse Slant transform using equation (2).
  • 10. • Simulation Results • We use two 512 x 512 gray-scale satellite images with distinct texture to test our algorithm. The original and watermarked images are shown in FiG. Results show that there are no perceptually visible degradations on the watermarked images with a PSNR of 37.43 dB for Singapore and 40.65 dB for Dolomites.
  • 11. CONCLUSION Performance of slant transform based watermarking technique is evaluated. LWT is used to decompose the original image. SVD is applied on the selected LWT sub-bands. The slant transformed watermark image is embedded in LWT and SVD transformed original image. Subsequently, the watermark image is extracted from watermarked image. The proposed method is found to be robust against common geometric attacks, cropping attacks and rotation attacks. The efficiency of proposed method is established with the help of experimental result