Documente Academic
Documente Profesional
Documente Cultură
I. Introduction
The ease of communication adopting internet has disciplined the world into a global village. This ease of
communication is highly insecure to yield data rectitude and data privacy. In the present-day technology, the
copyright and authentication have more issues and easily used illegally due to the fact that images, text, audio and
video such as digital content is easily copied. The modification and circulation are done illegally with ease.[1][2]
To protect the Intellectual Property Rights and authenticate the data, various techniques are required to protect
the digital content and take care of the issues experienced by the industry.[3][4].
Information hiding is the terminology that has evolved to foil the free and unrestrained access to digital contents.
Under the umbrella of information hiding, encryption, decryption, steganography, and watermarking technologies
have appeared to explain theoverhead problems. Encryption and steganography can be used to prevent unauthorized
access to the digital content, but in these techniques the data is protected as long as it is transmitted from a source to
a destination. Once it is received at the destination, it no longer remains secure and protected. [5][6][7].
Digital watermarking has emerged as alternative powerful defence against misuse of digital contents while
prevailing electronically over the Internet.[8].
Nowadays, a lot of work is going on to make the final watermark systems to achieve copyright protection and to
protect communication. Properties such as robustness, imperceptivity, safety, computational complexity and
capacity determine the effectiveness of the tattoo system.[11][12]
Depending on the techniques used, the watermark is subdivided into spatial domain and transformation (or
frequency) domain techniques[13].
Various copyright and data integrity techniques have been recommended in the literature, which are also used for
the spatial and transformational appliance. The most commonly used techniques in the transform domain are
discrete cosine transform (DCT), discrete wavelet transform (DWT), singular value decomposition (SVD), and
integer wavelet transform (IWT).
To upgrade the results of the watermarking algorithm, the advantages of the spatial and transform domain can
also be combined. Without using the DCT transform, the concept of DCT domain to reckon the DC coefficients of
8x8 blocks excerpted from the luminance component of host image sincerely in spatial domain has been used in [8].
For grey-scale images, a blind watermarking scheme in DWT and DCT domains based on differential
embedding has been suggested in [9]. This scheme is only persuasive for grey-scale image and not currently
trending colour images and there has been no plan for the security of the watermark.
In order to enhance the security of the watermarking system, there are several other techniques proposed that use
encryption techniques. A blind watermarking scheme in DWT and DCT domains based on the inter-block
differencing method is proposed in [10].
In this paper, we proposed a blind and secured watermarking scheme based on DCT and DWT techniques for
copyright protection. The algorithm has been tested for colour images in which watermark is embedded using its
RGB space. The security of the watermark in the proposed technique has been increased with the help of Three
different watermarks is employed in the three colour components of the colour image.
The remainder of this paper is organized as follows. The various applications of watermarking are described in
section2. In section 3, we present the details of the proposed algorithm working. Experiment results are presented in
section 4, before conclusion is drawn in section 5.
Embedding the date and name of patients in medical images, such as X-ray reports and MRI scans, is
preventedthe mixing of reports from different patients[17].In addition, there are other applications for the digital
watermark, z. Broadcast Monitoring, Indexing and Image Labelling, Data Hiding, Forensic and Piracy Deterrence
and Audience Metering.
Step 1:The first step is that red(R), green(G) and blue(B) components are extracted from the original colour
image
Step 2: A 1 level 2D-DWT on each of the three colour components to get four frequency sub-bands of the
respective components, i.e., LL, LH, HL and HH.
Step 3:Take the LL component of each DWT transformed component and divide it into 4x4 sub-blocks and
apply the DCT.
Step 4: The 64x64 DC component matrix is obtained by converting the DC component vector that is generated
by extracting the DC component of each 4x4 sub block.
Step 5: The difference operation between the 64x64 DC component matrix and encrypted watermark image
which is in the matrix form forms the Embedding the encrypted image onto the DC component matrix.
Step 6: Inserting the DC values back into the 4x4 sub blocks and taking the IDCT of each 4x4 sub block.
Step 7:Re-joining the embedded 4x4 blocks to form new LL component and taking the IDWT using the new LL
component.
Step 8:Combine the all watermarked images of the three components to get the final watermarked image.
C. Data Extraction
The fig.3shows the steps involved in the watermark extraction process. After extracting the encrypted watermark
bits from the watermarked image inverse encryption techniques are applied to get the data bits of the watermark.
This is heeded by some post-processing steps to procure the original watermark.
Cover image shown in fig.4. is decomposed into three colour components as shown fig.5 Perform the Encryption
process between the Encrypted watermark images as shown in fig. 7 and 4x4 sub-block DCT coefficients of the LL
sub-bands of the three colour components as shown in fig. 5 by using an Encrypting technique. The fig. 9Shows
final combined watermarked image by combining the three watermarked images of the three colour components as
shown in fig.8.
For watermark images recovering process the combined watermarked image is decomposed into again three
colour components. The decryption process using original secret key, the retrieved watermark images are same as
the original watermark images as shown in fig.11. If we using a wrong secret key then the retrieved images are
totally different the original watermark images as shown in fig.12.
Encryption Process
(m)
Fig .9: (m) Combined Watermarked Image
Decryption Process
V. Conclusion
The main intention of this paper is to show how the secret images are engaged and how it can be sent through the
internet by fooling grabbers. Many problems are facing when sending important data over the network. A safe and
secure procedure is required to send them easily. For this purpose, simple image watermarking is used. This paper
proposed a blind watermarking technique for colour images in the compound transform domain. By separating the
host colour image into three colour components the three different watermarks are ingrained in each of the three
colour components. The security of the watermarks has been engaged in order to increase the security of the
watermark.
References
[1] Rafael C. Gonzalez, Richard E. Woods, “Digital Image Processing,” Upper saddle River, New Jersey,
Prentice Hall, Inc, 2002.
[2] I.J.Cox, ”A Secure Robust Watermarking for Multimedia,” Proc. of First International Workshop on
Information Hiding, Lecture Notes in Comp. Sc., vol.1174, pp: 185-206, 1996.
[3] H. Nyeem, W. Boles, and C. Boyd, “Digital image watermarking: its formal model, fundamental properties
and possible attacks,” EURASIP Journal on Advances in Signal Processing. 1-22 (2014).
[4] S. A. Parah, J.A. Sheikh, and G.M. Bhat, “Data hiding in intermediate significant bit planes, a high capacity
blind steganographic technique,” Emerging Trends in Science, Engineering and Technology (INCOSET)
2012: 192-197.
[5] Ramaraju PV, Nagaraju G, Chaitanya RK. Image Encryption and Decryption using Advanced Encryption
Algorithm. Discovery, 2015, 29(107), 22-28
[6] T. Anvesh Gandhi, G. Naga Raju , Dr. P.V.Rama Raju “RGB Image Steganography using Zigzag Pixel
Indicator and Scan Techniques” IJRECE VOL. 3 ISSUE 3 JULY-SEPT. 2015
[7] Dr. P V Ramaraju, G.Nagaraju, M.Veeramanikanta, V.SreeLekha, Mubashirunnisa,, Y.Manojkumar
“Hiding And Encrypting Binary Images Using A Different Approach” International Journal of Recent
Trends in Engineering &Research ISSN:2455-1457
[8] S. A Parah, A. Shazia, and A. Ayash, "Robustness analysis of a digital image watermarking technique for
various frequency bands in dct domain." In Nanoelectronics and Information Systems (iNIS), 2015 IEEE
International Symposium on, pp. 57-62. IEEE, 2015.
[9] I. J. Cox and M. L. Miller, “Electronic watermarking, the first years,” Fourth, IEEE Workshop on
Multimedia Signal Processing, 2001, pp: 225-230.
[10] A. H. Ali, and MalekaHanhan, “Digital Image Watermarking, ”Faculty of Electrical Engineering
Department, AN-Najah National University, 2011-2012.
[11] SA Parah, JA Sheikh, and GM Bhat, “Data hiding in scrambled images: A new double layer security data
hiding technique” Computers and Electrical Engineering, Elsevier, Volume 40, Issue 1, January 2014,
Pages 70-82
[12] Usha Paul, and Manish Verma, “Factors affected to Image in Digital Watermarking,” International Journal
of Computer Application, Issue 2, vol. 5, october 2009.
[13] Ali Al-Haj, “Combined DWT-DCT Digital Image Watermarking,” Journal of Computer Science, vol. 3,
pp: 740-746, 2007.
[14] Q. Su, Y. Niu, Q. Wang, and G. Sheng, "A blind color image watermarking based on DC component in the
spatial domain." Optik-International Journal for Light and Electron Optics 124, no. 23 (2013): pp. 6255-
6260.
[15] A. Benoraira, B. Khier, and N. Boucenna, "Blind image watermarking technique based on differential
embedding in DWT and DCT domains." EURASIP Journal on Advances in Signal Processing 2015, no. 1
(2015): 55.
[16] Hurrah, N. N., Loan, N. A., Parah, S. A., & Sheikh, J. A. (2017). A transform domain based robust color
image watermarking scheme for single and dual attacks. 2017 Fourth International Conference on Image
Information Processing (ICIIP). doi:10.1109/iciip.2017.8313677.
[17] G. Naga Raju,P.Pardhasaradhi,V.S.Ghali “A New Watermarking scheme for medical images with patient’s
details “ international journal of engineering & technology, vol: 7(3.31) 2018, PP: 25-29.