Sunteți pe pagina 1din 8

Jour of Adv Research in Dynamical & Control Systems, Vol.

11, 01-Special Issue, 2019

A Compound Transform Domain based


Watermarking Scheme for Colour Images
G. Nagaraju, Assistant Professor, Department of ECE, SRKR Engineering College, Bhimavaram, India.
M. Venkata Pullarao*, M.Tech Student, Department of ECE, SRKR Engineering College, Bhimavaram, India.
E-mail: venkatpullaraomatta@gmail.com
Dr.P.V. Ramaraju, Head of the Department, Department of ECE, SRKR Engineering College, Bhimavaram, India.
Abstract--- In the modern world, image encryption is of vital significance where watermarking is the main tool for
securing the image's integrity. This paper tenders a compound transforms domain based blind as well as a secure
watermarking scheme for colour images. For enacting the aforementioned intentions, three watermarks are ingrained
in the three colour components of the colour image from adopting a DC component matrix technique in discrete
cosine transform(DCT). Discrete wavelet transform(DWT) is adopted prior to the ingraining in order to get LL sub-
band from each component of the colour image. A simple encryption technique has been engaged in order to
escalate the security of the watermark.
Keywords---Colour Image, DCT, DWT, LL Sub Band, Digital Watermarking.

I. Introduction
The ease of communication adopting internet has disciplined the world into a global village. This ease of
communication is highly insecure to yield data rectitude and data privacy. In the present-day technology, the
copyright and authentication have more issues and easily used illegally due to the fact that images, text, audio and
video such as digital content is easily copied. The modification and circulation are done illegally with ease.[1][2]
To protect the Intellectual Property Rights and authenticate the data, various techniques are required to protect
the digital content and take care of the issues experienced by the industry.[3][4].
Information hiding is the terminology that has evolved to foil the free and unrestrained access to digital contents.
Under the umbrella of information hiding, encryption, decryption, steganography, and watermarking technologies
have appeared to explain theoverhead problems. Encryption and steganography can be used to prevent unauthorized
access to the digital content, but in these techniques the data is protected as long as it is transmitted from a source to
a destination. Once it is received at the destination, it no longer remains secure and protected. [5][6][7].
Digital watermarking has emerged as alternative powerful defence against misuse of digital contents while
prevailing electronically over the Internet.[8].

Fig. 1: Practical Model for Watermarking System


The digital watermark describes the process of incorporating some additional information into a digital medium,
without compromising the value of the medium. This additional information is called watermark and this watermark
is masked using a watermark algorithm so that it can be unnoticeable by a human observer, but easily detected by a
specialized detection algorithm. Any watermarking technique must necessarily meet certain essential properties of
the watermark and must be application-specific.[9][10].

ISSN 1943-023X 1687


Received: 21 Jan 2019/Accepted: 28 Feb 2019
Jour of Adv Research in Dynamical & Control Systems, Vol. 11, 01-Special Issue, 2019

Nowadays, a lot of work is going on to make the final watermark systems to achieve copyright protection and to
protect communication. Properties such as robustness, imperceptivity, safety, computational complexity and
capacity determine the effectiveness of the tattoo system.[11][12]
Depending on the techniques used, the watermark is subdivided into spatial domain and transformation (or
frequency) domain techniques[13].
Various copyright and data integrity techniques have been recommended in the literature, which are also used for
the spatial and transformational appliance. The most commonly used techniques in the transform domain are
discrete cosine transform (DCT), discrete wavelet transform (DWT), singular value decomposition (SVD), and
integer wavelet transform (IWT).
To upgrade the results of the watermarking algorithm, the advantages of the spatial and transform domain can
also be combined. Without using the DCT transform, the concept of DCT domain to reckon the DC coefficients of
8x8 blocks excerpted from the luminance component of host image sincerely in spatial domain has been used in [8].
For grey-scale images, a blind watermarking scheme in DWT and DCT domains based on differential
embedding has been suggested in [9]. This scheme is only persuasive for grey-scale image and not currently
trending colour images and there has been no plan for the security of the watermark.
In order to enhance the security of the watermarking system, there are several other techniques proposed that use
encryption techniques. A blind watermarking scheme in DWT and DCT domains based on the inter-block
differencing method is proposed in [10].
In this paper, we proposed a blind and secured watermarking scheme based on DCT and DWT techniques for
copyright protection. The algorithm has been tested for colour images in which watermark is embedded using its
RGB space. The security of the watermark in the proposed technique has been increased with the help of Three
different watermarks is employed in the three colour components of the colour image.
The remainder of this paper is organized as follows. The various applications of watermarking are described in
section2. In section 3, we present the details of the proposed algorithm working. Experiment results are presented in
section 4, before conclusion is drawn in section 5.

II. Applications of Watermarking


There are various applications of digital image watermarking, as listed below.
A. Copyright Protection
To protect intellectual property, the data holder may include in its data a trademark that represents copyright
information identifying the copyright holder of the work. Thus, the rightful owner can display the watermark in case
of dispute. Here, watermark algorithms need not be invertible to provide copyright protection services.
B. Fingerprinting
To locate the source of illegal copies, the owner may use a fingerprinting technique. In this case, the owner can
embed different watermarks in the copies of the data that are delivered to different customers. Fingerprints can be
compared to embedding a serial number that relates to the customer's identity in the data. It allows the IPR owner to
identify customers who have violated the license agreement by sharing the information with third parties.
C. Copy Control
The information stored in a watermark may control digital recording devices directly for copy control purposes.
A recording device may lock the recording of a signal when it detects the watermark.
D. Image Authentication and Data Integrity
In the image authentication and tamper detection application, the goal is to detect the change in the data.
Surveillance photos used in the military must be authentic. The verification watermarks must therefore be fragile
watermarks, so that every change of the original image destroys or demonstrably changes the watermark. This
indicates that a kind of manipulation has taken place.
E. Medical Safety
Today, a visible watermarking technique is used in medical applications. This is very important nowadays when
telemedicine is used more widely.

ISSN 1943-023X 1688


Received: 21 Jan 2019/Accepted: 28 Feb 2019
Jour of Adv Research in Dynamical & Control Systems, Vol. 11, 01-Special Issue, 2019

Embedding the date and name of patients in medical images, such as X-ray reports and MRI scans, is
preventedthe mixing of reports from different patients[17].In addition, there are other applications for the digital
watermark, z. Broadcast Monitoring, Indexing and Image Labelling, Data Hiding, Forensic and Piracy Deterrence
and Audience Metering.

III. Proposed Algorithm


Watermark generation phase, watermark embedding phase and watermark extracting phase are three cardinal
phases of a watermarking algorithm. The proposed scheme uses three binary watermark images of size 64 × 64 and
a colour image of size of 512 × 512 as cover image. The detailed algorithm is portrayed in the following sub-section.
A. Watermark Generation
The encrypted watermark images are generated by the XOR operation between the key and binary vector of
watermarks. The key specified in the above sentence is generated by the XOR operation of created PN sequence and
chaotic sequence.
B. Data Embedding
The working of the suggested algorithm is shown in Fig. 2. The main steps of the scheme are described in
following steps:

Fig.2: Block Diagram of Data Embedding

ISSN 1943-023X 1689


Received: 21 Jan 2019/Accepted: 28 Feb 2019
Jour of Adv Research in Dynamical & Control Systems, Vol. 11, 01-Special Issue, 2019

Step 1:The first step is that red(R), green(G) and blue(B) components are extracted from the original colour
image
Step 2: A 1 level 2D-DWT on each of the three colour components to get four frequency sub-bands of the
respective components, i.e., LL, LH, HL and HH.
Step 3:Take the LL component of each DWT transformed component and divide it into 4x4 sub-blocks and
apply the DCT.
Step 4: The 64x64 DC component matrix is obtained by converting the DC component vector that is generated
by extracting the DC component of each 4x4 sub block.
Step 5: The difference operation between the 64x64 DC component matrix and encrypted watermark image
which is in the matrix form forms the Embedding the encrypted image onto the DC component matrix.
Step 6: Inserting the DC values back into the 4x4 sub blocks and taking the IDCT of each 4x4 sub block.
Step 7:Re-joining the embedded 4x4 blocks to form new LL component and taking the IDWT using the new LL
component.
Step 8:Combine the all watermarked images of the three components to get the final watermarked image.
C. Data Extraction
The fig.3shows the steps involved in the watermark extraction process. After extracting the encrypted watermark
bits from the watermarked image inverse encryption techniques are applied to get the data bits of the watermark.
This is heeded by some post-processing steps to procure the original watermark.

Fig.3: Block Diagram of Data Extraction

IV. Experimental Results


The Proposed method implemented in the MATLAB 2015a and system with core i5 configuration has been used.
Various images of size 512 x 512 and watermark of size 64 x 64 were taken for testing algorithm.

ISSN 1943-023X 1690


Received: 21 Jan 2019/Accepted: 28 Feb 2019
Jour of Adv Research in Dynamical & Control Systems, Vol. 11, 01-Special Issue, 2019

Cover image shown in fig.4. is decomposed into three colour components as shown fig.5 Perform the Encryption
process between the Encrypted watermark images as shown in fig. 7 and 4x4 sub-block DCT coefficients of the LL
sub-bands of the three colour components as shown in fig. 5 by using an Encrypting technique. The fig. 9Shows
final combined watermarked image by combining the three watermarked images of the three colour components as
shown in fig.8.
For watermark images recovering process the combined watermarked image is decomposed into again three
colour components. The decryption process using original secret key, the retrieved watermark images are same as
the original watermark images as shown in fig.11. If we using a wrong secret key then the retrieved images are
totally different the original watermark images as shown in fig.12.
Encryption Process

Fig.4: Colour Image.

(a) (b) (c)


Fig.5: (a) - (c) Red, Green, Blue components of Colour Image

(d) (e) (f)


Fig.6: (d) - (f) Watermark Images

(g) (h) (i)


Fig. 7: (g) – (i) Encrypted Images of Watermark Images (d) – (f)

ISSN 1943-023X 1691


Received: 21 Jan 2019/Accepted: 28 Feb 2019
Jour of Adv Research in Dynamical & Control Systems, Vol. 11, 01-Special Issue, 2019

(j) (k) (l)


Fig.8. (j) – (l) watermarked images of colour components (a) – (c)

(m)
Fig .9: (m) Combined Watermarked Image
Decryption Process

(n) (o) (p)


Fig.10: (n) – (p) Extracted Encrypted Watermark Images

(q) (r) (s)


Fig.11: (q) – (s) Decrypted Form of the EXTRACTED Watermark Images (n) – (p) Using Original Key

ISSN 1943-023X 1692


Received: 21 Jan 2019/Accepted: 28 Feb 2019
Jour of Adv Research in Dynamical & Control Systems, Vol. 11, 01-Special Issue, 2019

(t) (u) (v)


Fig.12: (t) – (v) Decrypted form of the Extracted watermark images (n) – (p) using wrong key

V. Conclusion
The main intention of this paper is to show how the secret images are engaged and how it can be sent through the
internet by fooling grabbers. Many problems are facing when sending important data over the network. A safe and
secure procedure is required to send them easily. For this purpose, simple image watermarking is used. This paper
proposed a blind watermarking technique for colour images in the compound transform domain. By separating the
host colour image into three colour components the three different watermarks are ingrained in each of the three
colour components. The security of the watermarks has been engaged in order to increase the security of the
watermark.

References
[1] Rafael C. Gonzalez, Richard E. Woods, “Digital Image Processing,” Upper saddle River, New Jersey,
Prentice Hall, Inc, 2002.
[2] I.J.Cox, ”A Secure Robust Watermarking for Multimedia,” Proc. of First International Workshop on
Information Hiding, Lecture Notes in Comp. Sc., vol.1174, pp: 185-206, 1996.
[3] H. Nyeem, W. Boles, and C. Boyd, “Digital image watermarking: its formal model, fundamental properties
and possible attacks,” EURASIP Journal on Advances in Signal Processing. 1-22 (2014).
[4] S. A. Parah, J.A. Sheikh, and G.M. Bhat, “Data hiding in intermediate significant bit planes, a high capacity
blind steganographic technique,” Emerging Trends in Science, Engineering and Technology (INCOSET)
2012: 192-197.
[5] Ramaraju PV, Nagaraju G, Chaitanya RK. Image Encryption and Decryption using Advanced Encryption
Algorithm. Discovery, 2015, 29(107), 22-28
[6] T. Anvesh Gandhi, G. Naga Raju , Dr. P.V.Rama Raju “RGB Image Steganography using Zigzag Pixel
Indicator and Scan Techniques” IJRECE VOL. 3 ISSUE 3 JULY-SEPT. 2015
[7] Dr. P V Ramaraju, G.Nagaraju, M.Veeramanikanta, V.SreeLekha, Mubashirunnisa,, Y.Manojkumar
“Hiding And Encrypting Binary Images Using A Different Approach” International Journal of Recent
Trends in Engineering &Research ISSN:2455-1457
[8] S. A Parah, A. Shazia, and A. Ayash, "Robustness analysis of a digital image watermarking technique for
various frequency bands in dct domain." In Nanoelectronics and Information Systems (iNIS), 2015 IEEE
International Symposium on, pp. 57-62. IEEE, 2015.
[9] I. J. Cox and M. L. Miller, “Electronic watermarking, the first years,” Fourth, IEEE Workshop on
Multimedia Signal Processing, 2001, pp: 225-230.
[10] A. H. Ali, and MalekaHanhan, “Digital Image Watermarking, ”Faculty of Electrical Engineering
Department, AN-Najah National University, 2011-2012.
[11] SA Parah, JA Sheikh, and GM Bhat, “Data hiding in scrambled images: A new double layer security data
hiding technique” Computers and Electrical Engineering, Elsevier, Volume 40, Issue 1, January 2014,
Pages 70-82
[12] Usha Paul, and Manish Verma, “Factors affected to Image in Digital Watermarking,” International Journal
of Computer Application, Issue 2, vol. 5, october 2009.
[13] Ali Al-Haj, “Combined DWT-DCT Digital Image Watermarking,” Journal of Computer Science, vol. 3,
pp: 740-746, 2007.
[14] Q. Su, Y. Niu, Q. Wang, and G. Sheng, "A blind color image watermarking based on DC component in the
spatial domain." Optik-International Journal for Light and Electron Optics 124, no. 23 (2013): pp. 6255-
6260.

ISSN 1943-023X 1693


Received: 21 Jan 2019/Accepted: 28 Feb 2019
Jour of Adv Research in Dynamical & Control Systems, Vol. 11, 01-Special Issue, 2019

[15] A. Benoraira, B. Khier, and N. Boucenna, "Blind image watermarking technique based on differential
embedding in DWT and DCT domains." EURASIP Journal on Advances in Signal Processing 2015, no. 1
(2015): 55.
[16] Hurrah, N. N., Loan, N. A., Parah, S. A., & Sheikh, J. A. (2017). A transform domain based robust color
image watermarking scheme for single and dual attacks. 2017 Fourth International Conference on Image
Information Processing (ICIIP). doi:10.1109/iciip.2017.8313677.
[17] G. Naga Raju,P.Pardhasaradhi,V.S.Ghali “A New Watermarking scheme for medical images with patient’s
details “ international journal of engineering & technology, vol: 7(3.31) 2018, PP: 25-29.

ISSN 1943-023X 1694


Received: 21 Jan 2019/Accepted: 28 Feb 2019

S-ar putea să vă placă și