SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org 260
NORMALIZATION CROSS CORRELATION VALUE OF
ROTATIONAL ATTACK ON DIGITAL IMAGE WATERMARKING BY
USING SVD-DCT
Vikas Chaubey1
, Komal Goyal2
, Amita Garg3
1
Asst. Professor, Computer Science Department, MVN University, Haryana, India
2
Asst. Professor, Mathematics Department, MVN University, Haryana, India
3
Research Scholar, Mathematics Department, Sharda University, Uttar Pradesh, India
Abstract
The WWW (World Wide Web) is a superb sales and distribution medium for digital image assets, but official document
compliance and important data can be a call to prove or justify it. Present days, digital image, audio and video used all over
world with or without agreement. In digital image watermarking answer let you add extra layer of protection (added logo) to
your digital image. By using Singular Value Decomposition - Discrete Cosine Transfer we are finding Normalization Cross
Correlation coefficient value of attacking (rotational attack) on digital image watermarking. The Normalization Cross
Correlation coefficient value depended on step size of digital image. If you change the value of step size than our results are
different.
Keywords: SVD, DCT, Orthogonal Matrix, NCC, Watermarking.
--------------------------------------------------------------------***------------------------------------------------------------------
1. INTRODUCTION
Maximum collection of data is transfer in digital format now
than ever and the growth in this field will not plane in the
likely further day. Digital collection of data is susceptible
[1][2] to having same creator at the same quality as the
original signal. Other word input signal is same as output
signal. Watermarking is possible to work on digital image,
audio and video it is a pattern of bits inserted into identifies
the file’s copyright collection of data. Digital image
watermarking is derived from the weakly visible marks
stamped on structural notepaper. Dissimilarly printed digital
watermarks, which are planned to be somewhat
visible(usually the actual light compass stamp watermarking
this report), digital image watermarking are designed to be
full proof invisible or in the case of audio clips, video clips
and inaudible clips.Digital Images that are misused can that
are leaked or misused can upset sale and distribution
marketing efforts, brand image. Other person one click on
your digital effect can be separate from your invisible
information so guarding brand and logical property.
2. DISCRETE COSINE TRANSFORM
Discrete Cosine Transform (DCT) is a new method for
converting digital signal into elementary frequency
components. It is maximums used in digital image
compression/decomposition. It is easy method to calculate
the Discrete Cosine Transform and to compress/de-
compressdigital image[2][3]. It is widely used for image
compression because of its high energy packing capabilities.
Discrete Cosine Transform has many useful properties and
involves only real components.
Discrete Cosine Transform of a 1D sequence of length N
can be given as
1
0
(2 1)
( ) ( ) ( )cos
2
N
x
x u
C u W u f x
N


 
   
 

For u= 0,1,2….,N-1.
1 2
( ) for 0; for 0W u u u
NN
  
   
  
When
1
0
1
0, (0) ( )
N
x
u C f x
N


   . This is called DC
component. For other value of u, the components obtained
are called AC coefficients. The inverse DCT is given below
1
0
(2 1)
( ) ( ) ( ) cos
2
N
u
x u
f x W u C u
N


 
    
 

The two dimensions DCT is an extension of 1-D DCT. It is
given as
     
1 1
0 0
(2 1) (2 1)
C u,v W u W v ( , ).
2 2
N N
x y
x u y v
f x y cos cos
N N
  
 
    
    
   

For u,v=0,1,2…..,N-1. W(u) and W(v) can be calculated as in
the case of one dimension. The inverse transformation is
given as
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org 261
1 1
0 0
(2 1) (2 1)
( , ) ( ) ( ) ( , )
2 2
N N
x y
x u y v
f x y W u W v C u v cos cos
N N
  
 
    
    
   

For x,y=0,1,2……N-1. The DCT is helpful in removing the
redundant data from an image. The energy compaction
efficiency of the DCT is higher than that of FFT in general.
The DCT is separable similar to FFT[9][10]. Since the
transforms for rows and columns are identical, the DCT can
be called as a symmetric transformation and can be
expressed as
g A F A  
where the symmetric transformation of matrix A is specified
as
1
,
0
(2 1)
( )
2
N
i j
j
j i
a W j cos
N


 
  
 

Here F is given image. The inverse DCT(IDCT) is given as
1 1
F A T A 
  
=
T T
A T A 
The DCT can also be extended to higher dimensions.
3. SINGULAR VALUE DECOMPOSITION
The singular value decomposition of 𝑀 × 𝑁 matrix A is its
representation as A = U D V T
, where U is an orthogonal
𝑀 × 𝑀 matrix, V - orthogonal 𝑁 × 𝑁 matrix. The diagonal
elements of matrix D are non-negative numbers in
descending order, all off-diagonal elements are zeros.
The matrix D consists mainly of zeros, so we only need the
first min(M,N) columns of matrixU to obtain matrix
A[4][5].Similarly, only the first min(M,N) rows of matrix V
T
affect the product. These columns and rows are called left
and right singular vectors.
The expression A = U W V T
, is known as SVD(Singular
value decomposition).
To decompose ‘A’ we require two orthogonal matrix “U’
and ‘V’ and one diagonal matrix ‘D’ which is formed by
square roots of eigen values of ‘𝐴 𝑇
𝐴′
.
We need two equations to solve it :
𝑎 𝐴 𝑇
𝐴 = 𝑉𝐷 𝑇
𝐷𝑉 𝑇
𝑏 𝐶𝑉 = 𝑈𝐷.
We can understand it in better way using an example:
Let ‘A’ is any matrix,𝐴 =
5 5
−1 7
Step I: Compute 𝐴 𝑇
𝐴 and find itseigen values.
𝐴 𝑇
𝐴 =
5 −1
5 7
5 5
−1 7
=
26 18
18 74
Eigen values of 𝐴 𝑇
𝐴 ,
Det 𝐴 𝑇
𝐴 − 𝜆𝐼 = 𝐷𝑒𝑡
26 − 𝜆 18
18 74 − 𝜆
=𝜆2
− 100𝜆 + 1600
= 𝜆 − 20 𝜆 − 80
Therefore, eigen values are 𝜆 = 20,80
Step II: To find eigen vectors of corresponding eigen values
to get V which is equal to 𝑉1, 𝑉2 .
Eigen vector of (𝐴 𝑇
𝐴 − 20𝐼)𝑋 =
6 18
18 54
𝑥
𝑦
𝑉1 =
−3
10
1
10
Similarly, 𝐴 𝑇
𝐴 − 80𝐼 =
−54 18
18 −6
𝑥
𝑦
𝑉2 =
1
10
3
10
Therefore,𝑉 =
−3
10
1
10
1
10
3
10
...............………………... (i)
Step III: To find 𝐷 = 𝑒𝑖𝑔𝑒𝑛𝑣𝑎𝑙𝑢𝑒𝑠 .
Therefore 𝐷 =
20 0
0 80
=
2 5 0
0 4 5
………………………………………. (ii)
Step IV: From (b) , we have ,
𝐴𝑉 =
5 5
−1 7
−3
10
1
10
1
10
3
10
= 𝑈 2 5 0
0 4 5
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org 262
From this we get,
𝑈 =
−1
2
1
2
1
2
1
2
……………………………... (iii)
Thus, we get ‘U’ ‘D’ and ‘D’ to decompose any matrix ‘A’.
If a matrix ‘A’ has a matrix of eigenvectors ‘P’ that is not
invertible (for example, the matrix
1 1
0 1
, has the
noninvertible system of eigenvectors
1 0
0 0
, then ‘A’ does
not have an eigen decomposition.
The singular value decomposition has many useful
properties [8]. For example, it can be used to: solve
underdetermined and over determined systems of linear
equations, matrix inversion and pseudo inversion, matrix
condition number calculation, vector system
orthogonalization and orthogonal complement calculation.
4. RESULTS AND DISCUSSION
4.1 NCC between Original Watermark and
Extracted Watermark
(i) To calculate the normalized cross correlation coefficient
between the original and extracted watermark we use the
concept
of mathematical formula.
(ii) First we take the multiplication between the original and
extracted value for each element in the matrix.
(iii) Then we normalize these values by dividing the value of
(w*w) . Where w is the original watermark.
Mathematically
r = r + (w*W_h)
c = c + (R*R)
NCC = r/c
Where r = 0; initially
c = 0; initially
w = original watermark
W_h = extracted watermark from CH frequency sub band in
resolution level
( l =1).
As the same watermark is extracted from level 1 in CH
frequency sub band so the value obtained is NCC = 1.
4.2 NCC Coefficient Calculation in case of Rotating
Attack
(i) Rotating attack is performed on watermarked image by
rotating the watermarked image to 2 degree in anticlockwise
direction.
(ii) The similarity between the watermarked image and
attacked watermarked image is found by calculating the
correlation over entire dimension of the attacked image.
(iii) The same procedure is applied as above.
Taking x3 = x3 + (w * W_h_r)
y3 = y3 + (w * w)
P3 = (x3/y3)
Where x3 = 0; initially
y3 = 0; initially
P3 = correlation coefficient
w = original watermark
W_h_r = watermark extracted from rotated image
The value of correlation coefficient found in this case of
rotated back is p1 = 0.6779 for step size of 15. the
correlation value is less which shows that the watermarking
scheme is not more robust for rotating attack also.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org 263
The value of correlation coefficient found in this case of
rotated back is p1 = 0.7044 for step size of 15. the
correlation value is less which shows that the watermarking
scheme is something robust for rotating attack from before.
5. CONCLUSIONS AND FUTURE WORK
The correlation coefficient in the two different bit
configuration 32*32 and 64*64. Both time you consider
different value but these value are near by the 1.and also if
you change the step size of image than also possible that you
get different results on various step size of image. Digital
Image processing operations can be applied both in the
spatial domain as well as the frequency domain. The reason
for performing these operations in the frequency domain is
the speed and simplicity of operation in this domain.Digital
Image Transforms are used to convert information from the
spatial domain to the frequency domain and vice versa.
Discrete Cosine Transform and Singular Value
Decomposition both are together performing best result on
digital image by the help of Normalization Cross Correlation
Coefficient (NCCC). Limitation of this is we are not going
to closer of 1 because if we are not getting closer value of 1
than you are not robust for rotating from before.
REFERENCES
[1]. Andreja Samˇcovi´cJ´an Tur´an,,Attacks On
Digitalwavelet Imagewatermarks,Journal of
ElectricalEngineering, Vol. 59,
No. 3, 2008, 131–138.
[2]. Carla D. Martin and Mason A. Porter,The Extraordinary
SVD, The Mathematical Association Of America, December
2012, pp.838-851.
[3]. Cox, I. J. Kilian, J., Leighton, T., and Shamoon, T.,
Secure spread spectrumwatermarking for images, audio,
and video. Proceedings of the 1996 IEEEInternational
Conference on Image Processing, 1996, 3, pp. 243–256.
[4]. Chih-Ch in La i, and Cheng-Chih Tsai,Digital Image
Watermarking Using Discrete Wavelet Transform and
Singular Value Decomposition,IEEE Transactions on
Instrumentation and Measurement., Vol.59, no. 11, Nov.
2010, pp. 3060-3063.
[5]. Chih-Chin Lai, Member, IEEE, and Cheng-Chih Tsai,
Digital Image Watermarking Using Discrete Wavelet
Transform andSingular Value Decomposition, IEEE
TTRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT,
VOL. 59, NO. 11, NOVEMBER 2010.
[6]. G. Bhatnagar and B. Ra man, A new robust reference
watermarking scheme based on DWT-SVD, Comput.
Standards Interfaces, Vol. 31, no. 5, Sep. 2009, pp. 1002–
1013,.
[7]. Guru Prasad M. HEGDE and Cang YE, Singular Value
Decomposition Filter: An Effective Method to Enhance the
Swiss Ranger SR-3000’s Range Images ,International
Journal Of Intelligent Control And Systems ,Vol. 13, No. 4,
December 2008, 242-250
[8]. Harsh K Verma, Abhishek Narain Singh, Raman
Kumar, Robustness of the Digital Image Watermarking
Techniques againstBrightness and Rotation Attack,(IJCSIS)
International Journal of Computer Science and Information
Security. Vol. 5, No. 1,2009.
[9]. H. C. Andrews and C. L. Patterson, Singular value
decompositions and digital image processing, IEEE
Transactions onAcoustics,Speech, and Signal Processing,
Vol.ASSP-24, pp. 26–53, 1976.
[10]. Jonathan K. Su, Frank Hartung, Bernd Girod,Digital
Watermarking ofText, Image, and Video Documents.
[11]. Van Schyndel, R. G., Tirkel, A. Z., and Osborne, C. F.,
A digital watermark.Proceedings of the 1994 IEEE
International Conference on Image Processing, 1994, pp.
86–89.
BIOGRAPHIES
He received M. Tech and B. Tech.
Currently, he is working as an Assistant
Professor in Computer Science
Department at MVN University, Palwal.
His areas of interest include Operating
System, Computer Network and Object
Oriented Programming, Digital Image
Processing.
Komal Goyal received the M.Sc.
degree in Mathematics in 2010. She is
pursuing Ph.D. from Jaypee
University, Noida. She is working as
an Assistant Professor in a reputed
University. She is mainly indulged in
research of Fixed point theory and
fractals. She has published two research papers in
international Journals.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org 264
Amita Garg received M.Sc. and
M.Ed. degree from Dayalbagh
Educational Institute. She is
pursuing Ph.D. from Sharda
University under the supervision of
Dr. A. H. Siddiqi (Ex- Pro- vice
chancellor of AMU). Her research
area is inverse problems related to
Partial differential equations. She has published two
research papers in international Journals.

More Related Content

What's hot

Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningMujahid Sultan
 
Math behind the kernels
Math behind the kernelsMath behind the kernels
Math behind the kernelsRevanth Kumar
 
Representing Uncertainty in Situation Maps for Disaster Management
Representing Uncertainty in Situation Maps for Disaster ManagementRepresenting Uncertainty in Situation Maps for Disaster Management
Representing Uncertainty in Situation Maps for Disaster Managementhje
 
Comparison of Distance Transform Based Features
Comparison of Distance Transform Based FeaturesComparison of Distance Transform Based Features
Comparison of Distance Transform Based FeaturesIJERA Editor
 
0580_s13_qp_42
0580_s13_qp_420580_s13_qp_42
0580_s13_qp_42King Ali
 
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPSIMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPSIJNSA Journal
 
Ha5 Full Article
Ha5 Full Article Ha5 Full Article
Ha5 Full Article nixon2011
 
Visual pattern recognition
Visual pattern recognitionVisual pattern recognition
Visual pattern recognitionRushin Shah
 
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion RatioDeveloping 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion RatioCSCJournals
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extractionRushin Shah
 
ICVG: PRACTICAL CONSTRUCTIVE VOLUME GEOMETRY FOR INDIRECT VISUALIZATION
ICVG: PRACTICAL CONSTRUCTIVE VOLUME GEOMETRY FOR INDIRECT VISUALIZATIONICVG: PRACTICAL CONSTRUCTIVE VOLUME GEOMETRY FOR INDIRECT VISUALIZATION
ICVG: PRACTICAL CONSTRUCTIVE VOLUME GEOMETRY FOR INDIRECT VISUALIZATIONijcga
 
ICVG : Practical Constructive Volume Geometry for Indirect Visualization
ICVG : Practical Constructive Volume Geometry for Indirect Visualization  ICVG : Practical Constructive Volume Geometry for Indirect Visualization
ICVG : Practical Constructive Volume Geometry for Indirect Visualization ijcga
 
Some Classes of Cubic Harmonious Graphs
Some Classes of Cubic Harmonious GraphsSome Classes of Cubic Harmonious Graphs
Some Classes of Cubic Harmonious Graphsrahulmonikasharma
 
Color vs texture feature extraction and matching in visual content retrieval ...
Color vs texture feature extraction and matching in visual content retrieval ...Color vs texture feature extraction and matching in visual content retrieval ...
Color vs texture feature extraction and matching in visual content retrieval ...IAEME Publication
 
Color Image Watermarking Application for ERTU Cloud
Color Image Watermarking Application for ERTU CloudColor Image Watermarking Application for ERTU Cloud
Color Image Watermarking Application for ERTU CloudCSCJournals
 

What's hot (20)

Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
Math behind the kernels
Math behind the kernelsMath behind the kernels
Math behind the kernels
 
Representing Uncertainty in Situation Maps for Disaster Management
Representing Uncertainty in Situation Maps for Disaster ManagementRepresenting Uncertainty in Situation Maps for Disaster Management
Representing Uncertainty in Situation Maps for Disaster Management
 
Comparison of Distance Transform Based Features
Comparison of Distance Transform Based FeaturesComparison of Distance Transform Based Features
Comparison of Distance Transform Based Features
 
0580_s13_qp_42
0580_s13_qp_420580_s13_qp_42
0580_s13_qp_42
 
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPSIMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
 
Ha5 Full Article
Ha5 Full Article Ha5 Full Article
Ha5 Full Article
 
Visual pattern recognition
Visual pattern recognitionVisual pattern recognition
Visual pattern recognition
 
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion RatioDeveloping 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
 
Representation image
Representation imageRepresentation image
Representation image
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extraction
 
Computer graphics
Computer graphicsComputer graphics
Computer graphics
 
Otsu
OtsuOtsu
Otsu
 
ICVG: PRACTICAL CONSTRUCTIVE VOLUME GEOMETRY FOR INDIRECT VISUALIZATION
ICVG: PRACTICAL CONSTRUCTIVE VOLUME GEOMETRY FOR INDIRECT VISUALIZATIONICVG: PRACTICAL CONSTRUCTIVE VOLUME GEOMETRY FOR INDIRECT VISUALIZATION
ICVG: PRACTICAL CONSTRUCTIVE VOLUME GEOMETRY FOR INDIRECT VISUALIZATION
 
ICVG : Practical Constructive Volume Geometry for Indirect Visualization
ICVG : Practical Constructive Volume Geometry for Indirect Visualization  ICVG : Practical Constructive Volume Geometry for Indirect Visualization
ICVG : Practical Constructive Volume Geometry for Indirect Visualization
 
Dt
DtDt
Dt
 
07object3d
07object3d07object3d
07object3d
 
Some Classes of Cubic Harmonious Graphs
Some Classes of Cubic Harmonious GraphsSome Classes of Cubic Harmonious Graphs
Some Classes of Cubic Harmonious Graphs
 
Color vs texture feature extraction and matching in visual content retrieval ...
Color vs texture feature extraction and matching in visual content retrieval ...Color vs texture feature extraction and matching in visual content retrieval ...
Color vs texture feature extraction and matching in visual content retrieval ...
 
Color Image Watermarking Application for ERTU Cloud
Color Image Watermarking Application for ERTU CloudColor Image Watermarking Application for ERTU Cloud
Color Image Watermarking Application for ERTU Cloud
 

Similar to SVD-DCT Digital Image Watermarking Attack

Medical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transformMedical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transformeSAT Publishing House
 
Medical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transformMedical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transformeSAT Journals
 
Simulation of convolutional encoder
Simulation of convolutional encoderSimulation of convolutional encoder
Simulation of convolutional encodereSAT Journals
 
CT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingCT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingAM Publications,India
 
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...IRJET Journal
 
Hybrid Transforms Based Watermarking, Encryption and Compression of Bio-Medic...
Hybrid Transforms Based Watermarking, Encryption and Compression of Bio-Medic...Hybrid Transforms Based Watermarking, Encryption and Compression of Bio-Medic...
Hybrid Transforms Based Watermarking, Encryption and Compression of Bio-Medic...IRJET Journal
 
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVD
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVDHybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVD
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVDCSCJournals
 
An expanded haar wavelet transform and morphological deal based approach for ...
An expanded haar wavelet transform and morphological deal based approach for ...An expanded haar wavelet transform and morphological deal based approach for ...
An expanded haar wavelet transform and morphological deal based approach for ...eSAT Publishing House
 
A robust blind and secure watermarking scheme using positive semi definite ma...
A robust blind and secure watermarking scheme using positive semi definite ma...A robust blind and secure watermarking scheme using positive semi definite ma...
A robust blind and secure watermarking scheme using positive semi definite ma...ijcsit
 
Preliminary study of multi view imaging for accurate 3 d reconstruction using...
Preliminary study of multi view imaging for accurate 3 d reconstruction using...Preliminary study of multi view imaging for accurate 3 d reconstruction using...
Preliminary study of multi view imaging for accurate 3 d reconstruction using...eSAT Journals
 
A Novel DWT-CT approach in Digital Watermarking using PSO
A Novel DWT-CT approach in Digital Watermarking using PSOA Novel DWT-CT approach in Digital Watermarking using PSO
A Novel DWT-CT approach in Digital Watermarking using PSOrahulmonikasharma
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
 
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICESA BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICEScsandit
 
Random Chaotic Number Generation based Clustered Image Encryption
Random Chaotic Number Generation based Clustered Image EncryptionRandom Chaotic Number Generation based Clustered Image Encryption
Random Chaotic Number Generation based Clustered Image EncryptionAM Publications
 
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVDIRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVD
IRJET- Image Compression Technique for Quantized Encrypted Images using SVDIRJET Journal
 
Adaptive beamforming using lms algorithm
Adaptive beamforming using lms algorithmAdaptive beamforming using lms algorithm
Adaptive beamforming using lms algorithmeSAT Publishing House
 
Fuzzy Logic based watermarking using non – blind HVS technique
Fuzzy Logic based watermarking using non – blind HVS techniqueFuzzy Logic based watermarking using non – blind HVS technique
Fuzzy Logic based watermarking using non – blind HVS techniqueIRJET Journal
 
Psnr value of digital image watermarking by using
Psnr value of digital image watermarking by usingPsnr value of digital image watermarking by using
Psnr value of digital image watermarking by usingeSAT Publishing House
 

Similar to SVD-DCT Digital Image Watermarking Attack (20)

Medical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transformMedical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transform
 
Medical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transformMedical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transform
 
Simulation of convolutional encoder
Simulation of convolutional encoderSimulation of convolutional encoder
Simulation of convolutional encoder
 
Simulation of convolutional encoder
Simulation of convolutional encoderSimulation of convolutional encoder
Simulation of convolutional encoder
 
CT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingCT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image Watermarking
 
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
 
Hybrid Transforms Based Watermarking, Encryption and Compression of Bio-Medic...
Hybrid Transforms Based Watermarking, Encryption and Compression of Bio-Medic...Hybrid Transforms Based Watermarking, Encryption and Compression of Bio-Medic...
Hybrid Transforms Based Watermarking, Encryption and Compression of Bio-Medic...
 
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVD
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVDHybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVD
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVD
 
An expanded haar wavelet transform and morphological deal based approach for ...
An expanded haar wavelet transform and morphological deal based approach for ...An expanded haar wavelet transform and morphological deal based approach for ...
An expanded haar wavelet transform and morphological deal based approach for ...
 
A robust blind and secure watermarking scheme using positive semi definite ma...
A robust blind and secure watermarking scheme using positive semi definite ma...A robust blind and secure watermarking scheme using positive semi definite ma...
A robust blind and secure watermarking scheme using positive semi definite ma...
 
Preliminary study of multi view imaging for accurate 3 d reconstruction using...
Preliminary study of multi view imaging for accurate 3 d reconstruction using...Preliminary study of multi view imaging for accurate 3 d reconstruction using...
Preliminary study of multi view imaging for accurate 3 d reconstruction using...
 
A Novel DWT-CT approach in Digital Watermarking using PSO
A Novel DWT-CT approach in Digital Watermarking using PSOA Novel DWT-CT approach in Digital Watermarking using PSO
A Novel DWT-CT approach in Digital Watermarking using PSO
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
Ef34795798
Ef34795798Ef34795798
Ef34795798
 
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICESA BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
 
Random Chaotic Number Generation based Clustered Image Encryption
Random Chaotic Number Generation based Clustered Image EncryptionRandom Chaotic Number Generation based Clustered Image Encryption
Random Chaotic Number Generation based Clustered Image Encryption
 
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVDIRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVD
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
 
Adaptive beamforming using lms algorithm
Adaptive beamforming using lms algorithmAdaptive beamforming using lms algorithm
Adaptive beamforming using lms algorithm
 
Fuzzy Logic based watermarking using non – blind HVS technique
Fuzzy Logic based watermarking using non – blind HVS techniqueFuzzy Logic based watermarking using non – blind HVS technique
Fuzzy Logic based watermarking using non – blind HVS technique
 
Psnr value of digital image watermarking by using
Psnr value of digital image watermarking by usingPsnr value of digital image watermarking by using
Psnr value of digital image watermarking by using
 

More from Komal Goyal

Stability Result of Iterative procedure in normed space
Stability Result of Iterative procedure in normed spaceStability Result of Iterative procedure in normed space
Stability Result of Iterative procedure in normed spaceKomal Goyal
 
Simple Comparison of Convergence of GeneralIterations and Effect of Variation...
Simple Comparison of Convergence of GeneralIterations and Effect of Variation...Simple Comparison of Convergence of GeneralIterations and Effect of Variation...
Simple Comparison of Convergence of GeneralIterations and Effect of Variation...Komal Goyal
 
Some Fixed Point Theorems in b G -cone Metric Space
Some Fixed Point Theorems in b G -cone Metric Space Some Fixed Point Theorems in b G -cone Metric Space
Some Fixed Point Theorems in b G -cone Metric Space Komal Goyal
 
Stability of Iteration for Some General Operators in b-Metric
Stability of Iteration for Some General Operators in b-MetricStability of Iteration for Some General Operators in b-Metric
Stability of Iteration for Some General Operators in b-MetricKomal Goyal
 
Fixed point theorem in chatterjea mapping
Fixed point theorem in chatterjea mappingFixed point theorem in chatterjea mapping
Fixed point theorem in chatterjea mappingKomal Goyal
 
2. Prasad_Komal JNU2015 (1)
2. Prasad_Komal JNU2015 (1)2. Prasad_Komal JNU2015 (1)
2. Prasad_Komal JNU2015 (1)Komal Goyal
 
Introduction of Inverse Problem and Its Applications
Introduction of Inverse Problem and Its ApplicationsIntroduction of Inverse Problem and Its Applications
Introduction of Inverse Problem and Its ApplicationsKomal Goyal
 
Regularization Methods to Solve
Regularization Methods to SolveRegularization Methods to Solve
Regularization Methods to SolveKomal Goyal
 

More from Komal Goyal (8)

Stability Result of Iterative procedure in normed space
Stability Result of Iterative procedure in normed spaceStability Result of Iterative procedure in normed space
Stability Result of Iterative procedure in normed space
 
Simple Comparison of Convergence of GeneralIterations and Effect of Variation...
Simple Comparison of Convergence of GeneralIterations and Effect of Variation...Simple Comparison of Convergence of GeneralIterations and Effect of Variation...
Simple Comparison of Convergence of GeneralIterations and Effect of Variation...
 
Some Fixed Point Theorems in b G -cone Metric Space
Some Fixed Point Theorems in b G -cone Metric Space Some Fixed Point Theorems in b G -cone Metric Space
Some Fixed Point Theorems in b G -cone Metric Space
 
Stability of Iteration for Some General Operators in b-Metric
Stability of Iteration for Some General Operators in b-MetricStability of Iteration for Some General Operators in b-Metric
Stability of Iteration for Some General Operators in b-Metric
 
Fixed point theorem in chatterjea mapping
Fixed point theorem in chatterjea mappingFixed point theorem in chatterjea mapping
Fixed point theorem in chatterjea mapping
 
2. Prasad_Komal JNU2015 (1)
2. Prasad_Komal JNU2015 (1)2. Prasad_Komal JNU2015 (1)
2. Prasad_Komal JNU2015 (1)
 
Introduction of Inverse Problem and Its Applications
Introduction of Inverse Problem and Its ApplicationsIntroduction of Inverse Problem and Its Applications
Introduction of Inverse Problem and Its Applications
 
Regularization Methods to Solve
Regularization Methods to SolveRegularization Methods to Solve
Regularization Methods to Solve
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

SVD-DCT Digital Image Watermarking Attack

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org 260 NORMALIZATION CROSS CORRELATION VALUE OF ROTATIONAL ATTACK ON DIGITAL IMAGE WATERMARKING BY USING SVD-DCT Vikas Chaubey1 , Komal Goyal2 , Amita Garg3 1 Asst. Professor, Computer Science Department, MVN University, Haryana, India 2 Asst. Professor, Mathematics Department, MVN University, Haryana, India 3 Research Scholar, Mathematics Department, Sharda University, Uttar Pradesh, India Abstract The WWW (World Wide Web) is a superb sales and distribution medium for digital image assets, but official document compliance and important data can be a call to prove or justify it. Present days, digital image, audio and video used all over world with or without agreement. In digital image watermarking answer let you add extra layer of protection (added logo) to your digital image. By using Singular Value Decomposition - Discrete Cosine Transfer we are finding Normalization Cross Correlation coefficient value of attacking (rotational attack) on digital image watermarking. The Normalization Cross Correlation coefficient value depended on step size of digital image. If you change the value of step size than our results are different. Keywords: SVD, DCT, Orthogonal Matrix, NCC, Watermarking. --------------------------------------------------------------------***------------------------------------------------------------------ 1. INTRODUCTION Maximum collection of data is transfer in digital format now than ever and the growth in this field will not plane in the likely further day. Digital collection of data is susceptible [1][2] to having same creator at the same quality as the original signal. Other word input signal is same as output signal. Watermarking is possible to work on digital image, audio and video it is a pattern of bits inserted into identifies the file’s copyright collection of data. Digital image watermarking is derived from the weakly visible marks stamped on structural notepaper. Dissimilarly printed digital watermarks, which are planned to be somewhat visible(usually the actual light compass stamp watermarking this report), digital image watermarking are designed to be full proof invisible or in the case of audio clips, video clips and inaudible clips.Digital Images that are misused can that are leaked or misused can upset sale and distribution marketing efforts, brand image. Other person one click on your digital effect can be separate from your invisible information so guarding brand and logical property. 2. DISCRETE COSINE TRANSFORM Discrete Cosine Transform (DCT) is a new method for converting digital signal into elementary frequency components. It is maximums used in digital image compression/decomposition. It is easy method to calculate the Discrete Cosine Transform and to compress/de- compressdigital image[2][3]. It is widely used for image compression because of its high energy packing capabilities. Discrete Cosine Transform has many useful properties and involves only real components. Discrete Cosine Transform of a 1D sequence of length N can be given as 1 0 (2 1) ( ) ( ) ( )cos 2 N x x u C u W u f x N            For u= 0,1,2….,N-1. 1 2 ( ) for 0; for 0W u u u NN           When 1 0 1 0, (0) ( ) N x u C f x N      . This is called DC component. For other value of u, the components obtained are called AC coefficients. The inverse DCT is given below 1 0 (2 1) ( ) ( ) ( ) cos 2 N u x u f x W u C u N             The two dimensions DCT is an extension of 1-D DCT. It is given as       1 1 0 0 (2 1) (2 1) C u,v W u W v ( , ). 2 2 N N x y x u y v f x y cos cos N N                     For u,v=0,1,2…..,N-1. W(u) and W(v) can be calculated as in the case of one dimension. The inverse transformation is given as
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org 261 1 1 0 0 (2 1) (2 1) ( , ) ( ) ( ) ( , ) 2 2 N N x y x u y v f x y W u W v C u v cos cos N N                     For x,y=0,1,2……N-1. The DCT is helpful in removing the redundant data from an image. The energy compaction efficiency of the DCT is higher than that of FFT in general. The DCT is separable similar to FFT[9][10]. Since the transforms for rows and columns are identical, the DCT can be called as a symmetric transformation and can be expressed as g A F A   where the symmetric transformation of matrix A is specified as 1 , 0 (2 1) ( ) 2 N i j j j i a W j cos N           Here F is given image. The inverse DCT(IDCT) is given as 1 1 F A T A     = T T A T A  The DCT can also be extended to higher dimensions. 3. SINGULAR VALUE DECOMPOSITION The singular value decomposition of 𝑀 × 𝑁 matrix A is its representation as A = U D V T , where U is an orthogonal 𝑀 × 𝑀 matrix, V - orthogonal 𝑁 × 𝑁 matrix. The diagonal elements of matrix D are non-negative numbers in descending order, all off-diagonal elements are zeros. The matrix D consists mainly of zeros, so we only need the first min(M,N) columns of matrixU to obtain matrix A[4][5].Similarly, only the first min(M,N) rows of matrix V T affect the product. These columns and rows are called left and right singular vectors. The expression A = U W V T , is known as SVD(Singular value decomposition). To decompose ‘A’ we require two orthogonal matrix “U’ and ‘V’ and one diagonal matrix ‘D’ which is formed by square roots of eigen values of ‘𝐴 𝑇 𝐴′ . We need two equations to solve it : 𝑎 𝐴 𝑇 𝐴 = 𝑉𝐷 𝑇 𝐷𝑉 𝑇 𝑏 𝐶𝑉 = 𝑈𝐷. We can understand it in better way using an example: Let ‘A’ is any matrix,𝐴 = 5 5 −1 7 Step I: Compute 𝐴 𝑇 𝐴 and find itseigen values. 𝐴 𝑇 𝐴 = 5 −1 5 7 5 5 −1 7 = 26 18 18 74 Eigen values of 𝐴 𝑇 𝐴 , Det 𝐴 𝑇 𝐴 − 𝜆𝐼 = 𝐷𝑒𝑡 26 − 𝜆 18 18 74 − 𝜆 =𝜆2 − 100𝜆 + 1600 = 𝜆 − 20 𝜆 − 80 Therefore, eigen values are 𝜆 = 20,80 Step II: To find eigen vectors of corresponding eigen values to get V which is equal to 𝑉1, 𝑉2 . Eigen vector of (𝐴 𝑇 𝐴 − 20𝐼)𝑋 = 6 18 18 54 𝑥 𝑦 𝑉1 = −3 10 1 10 Similarly, 𝐴 𝑇 𝐴 − 80𝐼 = −54 18 18 −6 𝑥 𝑦 𝑉2 = 1 10 3 10 Therefore,𝑉 = −3 10 1 10 1 10 3 10 ...............………………... (i) Step III: To find 𝐷 = 𝑒𝑖𝑔𝑒𝑛𝑣𝑎𝑙𝑢𝑒𝑠 . Therefore 𝐷 = 20 0 0 80 = 2 5 0 0 4 5 ………………………………………. (ii) Step IV: From (b) , we have , 𝐴𝑉 = 5 5 −1 7 −3 10 1 10 1 10 3 10 = 𝑈 2 5 0 0 4 5
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org 262 From this we get, 𝑈 = −1 2 1 2 1 2 1 2 ……………………………... (iii) Thus, we get ‘U’ ‘D’ and ‘D’ to decompose any matrix ‘A’. If a matrix ‘A’ has a matrix of eigenvectors ‘P’ that is not invertible (for example, the matrix 1 1 0 1 , has the noninvertible system of eigenvectors 1 0 0 0 , then ‘A’ does not have an eigen decomposition. The singular value decomposition has many useful properties [8]. For example, it can be used to: solve underdetermined and over determined systems of linear equations, matrix inversion and pseudo inversion, matrix condition number calculation, vector system orthogonalization and orthogonal complement calculation. 4. RESULTS AND DISCUSSION 4.1 NCC between Original Watermark and Extracted Watermark (i) To calculate the normalized cross correlation coefficient between the original and extracted watermark we use the concept of mathematical formula. (ii) First we take the multiplication between the original and extracted value for each element in the matrix. (iii) Then we normalize these values by dividing the value of (w*w) . Where w is the original watermark. Mathematically r = r + (w*W_h) c = c + (R*R) NCC = r/c Where r = 0; initially c = 0; initially w = original watermark W_h = extracted watermark from CH frequency sub band in resolution level ( l =1). As the same watermark is extracted from level 1 in CH frequency sub band so the value obtained is NCC = 1. 4.2 NCC Coefficient Calculation in case of Rotating Attack (i) Rotating attack is performed on watermarked image by rotating the watermarked image to 2 degree in anticlockwise direction. (ii) The similarity between the watermarked image and attacked watermarked image is found by calculating the correlation over entire dimension of the attacked image. (iii) The same procedure is applied as above. Taking x3 = x3 + (w * W_h_r) y3 = y3 + (w * w) P3 = (x3/y3) Where x3 = 0; initially y3 = 0; initially P3 = correlation coefficient w = original watermark W_h_r = watermark extracted from rotated image The value of correlation coefficient found in this case of rotated back is p1 = 0.6779 for step size of 15. the correlation value is less which shows that the watermarking scheme is not more robust for rotating attack also.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org 263 The value of correlation coefficient found in this case of rotated back is p1 = 0.7044 for step size of 15. the correlation value is less which shows that the watermarking scheme is something robust for rotating attack from before. 5. CONCLUSIONS AND FUTURE WORK The correlation coefficient in the two different bit configuration 32*32 and 64*64. Both time you consider different value but these value are near by the 1.and also if you change the step size of image than also possible that you get different results on various step size of image. Digital Image processing operations can be applied both in the spatial domain as well as the frequency domain. The reason for performing these operations in the frequency domain is the speed and simplicity of operation in this domain.Digital Image Transforms are used to convert information from the spatial domain to the frequency domain and vice versa. Discrete Cosine Transform and Singular Value Decomposition both are together performing best result on digital image by the help of Normalization Cross Correlation Coefficient (NCCC). Limitation of this is we are not going to closer of 1 because if we are not getting closer value of 1 than you are not robust for rotating from before. REFERENCES [1]. Andreja Samˇcovi´cJ´an Tur´an,,Attacks On Digitalwavelet Imagewatermarks,Journal of ElectricalEngineering, Vol. 59, No. 3, 2008, 131–138. [2]. Carla D. Martin and Mason A. Porter,The Extraordinary SVD, The Mathematical Association Of America, December 2012, pp.838-851. [3]. Cox, I. J. Kilian, J., Leighton, T., and Shamoon, T., Secure spread spectrumwatermarking for images, audio, and video. Proceedings of the 1996 IEEEInternational Conference on Image Processing, 1996, 3, pp. 243–256. [4]. Chih-Ch in La i, and Cheng-Chih Tsai,Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition,IEEE Transactions on Instrumentation and Measurement., Vol.59, no. 11, Nov. 2010, pp. 3060-3063. [5]. Chih-Chin Lai, Member, IEEE, and Cheng-Chih Tsai, Digital Image Watermarking Using Discrete Wavelet Transform andSingular Value Decomposition, IEEE TTRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, VOL. 59, NO. 11, NOVEMBER 2010. [6]. G. Bhatnagar and B. Ra man, A new robust reference watermarking scheme based on DWT-SVD, Comput. Standards Interfaces, Vol. 31, no. 5, Sep. 2009, pp. 1002– 1013,. [7]. Guru Prasad M. HEGDE and Cang YE, Singular Value Decomposition Filter: An Effective Method to Enhance the Swiss Ranger SR-3000’s Range Images ,International Journal Of Intelligent Control And Systems ,Vol. 13, No. 4, December 2008, 242-250 [8]. Harsh K Verma, Abhishek Narain Singh, Raman Kumar, Robustness of the Digital Image Watermarking Techniques againstBrightness and Rotation Attack,(IJCSIS) International Journal of Computer Science and Information Security. Vol. 5, No. 1,2009. [9]. H. C. Andrews and C. L. Patterson, Singular value decompositions and digital image processing, IEEE Transactions onAcoustics,Speech, and Signal Processing, Vol.ASSP-24, pp. 26–53, 1976. [10]. Jonathan K. Su, Frank Hartung, Bernd Girod,Digital Watermarking ofText, Image, and Video Documents. [11]. Van Schyndel, R. G., Tirkel, A. Z., and Osborne, C. F., A digital watermark.Proceedings of the 1994 IEEE International Conference on Image Processing, 1994, pp. 86–89. BIOGRAPHIES He received M. Tech and B. Tech. Currently, he is working as an Assistant Professor in Computer Science Department at MVN University, Palwal. His areas of interest include Operating System, Computer Network and Object Oriented Programming, Digital Image Processing. Komal Goyal received the M.Sc. degree in Mathematics in 2010. She is pursuing Ph.D. from Jaypee University, Noida. She is working as an Assistant Professor in a reputed University. She is mainly indulged in research of Fixed point theory and fractals. She has published two research papers in international Journals.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 08 | Aug-2014, Available @ http://www.ijret.org 264 Amita Garg received M.Sc. and M.Ed. degree from Dayalbagh Educational Institute. She is pursuing Ph.D. from Sharda University under the supervision of Dr. A. H. Siddiqi (Ex- Pro- vice chancellor of AMU). Her research area is inverse problems related to Partial differential equations. She has published two research papers in international Journals.