Watermarking refers to hiding a message within an image or
signal; it can be a video also. An image is used as a cover to
hide the message which is intended for transfer. Now-a-days,
digital watermarking is used in various applications.
Watermarking is mainly used for security purposes. Level of
threats faced by watermarking depends on the application
area. The properties of a good watermark should include
robustness and imperceptibility.
3. DIGITAL WATERMARKING
• Digital information (watermark) embedded within any
multimedia object that can be later detected and
extracted for object assertion purposes
3
Host image watermarked
image
6. REVERSIBLE COLOR IMAGE
WATERMARKING USING TRIGONOMETRIC
FUNCTIONS
Embeds secret bits into the gray planes of the
color image
Using interpolation method and trigonometric
functions
6
7. WATERMARKING PROCESS
7
Cover l image
Extended cover image
Modified image
Watermarked image
Embedded
values
Bit stream
recovered
Recovered
watermark
interpolation
Watermark Trignometrical
function
8. REVERSIBLE COLOR IMAGE WATERMARKING
USING TRIGONOMETRIC FUNCTIONS
Embedding process
Step 1: Original image is read and divided into multiple 2x2 blocks
Step 2: Each 2x2 blocks converted into 3x3 blocks using interpolation
Step 3: The values of newly inserted elements are changed using the
trigonometric functions
Step 4: Logarithmic values of these new elements are taken and stored
in a variable
Step 5: Bit stream chosen according to log values
Step 6: Decimal values of those bit streams are embedded in the new
elements of 3×3 blocks
8
9. REVERSIBLE COLOR IMAGE WATERMARKING USING
TRIGONOMETRIC FUNCTIONS
Extraction process
Step 1: Watermarked image is divided into 3×3 blocks
Step 2: Embedded values are extracted from the watermarked image
Step 3: Embedded bit stream is recovered using trigonometric functions
9
10. REVERSIBLE COLOR IMAGE WATERMARKING USING
TRIGONOMETRIC FUNCTIONS
I - original image (cover image)
C - interpolated image
Each 2×2 block in I is converted into 3×3 block using the following
formulas:
C(1,1) = I(1,1)
C(1,3) = I(1,2)
C(3,1) = I(2,1)
C(3,3) = I(2,2)
10
11. INTERPOLATION
11
2
)3,3()1,3(
)2,3(
2
)3,3()3,1(
)3,2(
2
)2,3()2,1(
)2,2(
2
)1,3()1,1(
)1,2(
2
)3,1()1,1(
)2,1(
22
22
22
22
22
CC
C
CC
C
CC
C
CC
C
CC
C
17. REFERENCES
N. Dey. P. Das ,”Session based Blind watermarking
technique with in NROI of ratinal Funds image for
Authentication Using DWT, spread spectrum
A.K Pal, P.Das,N.dey “Odd-Even Embedding
Scheme based Modified Reversible Watermarking
Technique using Blueprint”
17