A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wavelet Transformation

Preview:

Citation preview

A Robust Deinterlacing Multiple ImageWatermarking Technique in DWT

SHALU SINGHDepartment of Computer Science and Engineering

Central University of Rajasthan

IEEE International Conference on Computational Techniques in Information andCommunication Technologies, Delhi, INDIA

11-13 March 2016

Contents

Introduction

Need of Watermarking

Problem Statement

Proposed Work

Simulation Setup

Experiment Result

Conclusion

References

Introduction

Watermark:

Watermark is a designed impression(a pattern, logo or animage) on the piece of paper or in digital media toauthenticate a document and discourage counterfeiting[4].

Digital Watermarking:

It is a process whereby, arbitrary information; a patterned bitsare encoded into digital media, in such a way as to beimperceptible to observers[3][4][6].

Digital Image Watermarking:

It is perform on an image.it is process to embedded invisiblesignature inside an Image, to show authenticity and proof ofownership[9].

Continue

Multiple Watermarking:Different type of techniques uses different watermarks indigital media object to accomplish different goals.[1][4]

Watermark to convey Ownership Information,to ConveyCaption, to verify that Object Content.

Multiple Watermarking can be classified into four typeaccording to their insertion method into Host Image.[8][9]

Single Composite WatermarkingSegmented WatermarkingSuccessive WatermarkingInteractive Embedding

Need of Watermarking[1][3][4][6]

Proof of ownership

Ownership protection

Redistribution of digital contents

Illegal Copying of digital contents

Tamper Detection

Characteristics of Watermarking[4][6]

Robustness: Robustness is the resistance of watermark againstattacks and distortion

Imperceptibility: Imperceptibility of watermarked image showsthat inserted watermark in it, is not detectable or visiblethrough naked eyes.

Capacity: Capacity is a length of watermark upto certain limitinto the host image.

Security: Algorthim of embedding and extracting watermarkmust be non guessable or decodable. Figure

Problem Statement

In multiple watermarking, when the capacity of watermark isincreases, robustness and imperceptibility decreases, samething happens with robustness and imperceptibility. So, weare develpoing a novel watermarking scheme to trade-offbetween the requirement of watermarking in terms ofcapacity, imperceptibility and robustness.

Proposed Method

Analysing the performance of Multiple Watermark withDe-Interlacing Technique into different level of DiscreteWavelet Transformation.

Proposed Work: Continue

The proposed method contains

Watermark Embedding Process

Deinterlacing & Interlacing Process

Watermark Extracting Process

Watermark Embedding Process

Figure : Embedding Technique

Deinterlacing and Watermark Insertion & ExtractionMethod

Deintelacing is a division process to split an image.Wedeinterlace LL1 band into two image according its even andodd rows.

Figure : Deinterlacing and Watermark insertion and extraction Method

Watermark Extracting Process

Figure : Watermark Extraction Method

Simulation Setup

Implemented the proposed scheme in MATLAB R2013a.

Experiments are done on Lena, Goldhill and Boat of losslessextension TIFF, BMP and PNG, but we are showing resultsfor Lena image.

Host Images: 512x512 of grey scale

Watermarks: Two visible binary watermark of size 128x256and 64x128

Performance Evaluation

To Evaluate the signal strength and visual quality ofWatermarked Image, we are using Peak Signal to NoiseRatio(PSNR).

MSE = (1/N ∗ N) ∗∑i

∑j

(X (i , j) − X ′(i , j))2 (1)

PSNR = 10log10(XMAX )2

MSE(2)

To evaluate the performance of Extracted Watermark,we areevaluating Similarity Ratio(SR),between Original Watermarkand Extracted Watermark.

SR =S

S + D(3)

Experimental Result of Proposed Method

Table : PSNR comparison of Watermarked Image of Lena with threeExtension

Continue

Table : SR comparison of Extracted Watermark-1 Image of Lena withthree Extension

Continue

Table : SR comparison of Extracted Watermark-2 Image of Lena withthree Extension

Watermarked and Extracted Watermark Image afterdifferent Attacks

Continue

Continue

Continue

Conclusion

An Experiment of our proposed method also done on twoother image; Goldhill and Boat with three different extension.

In the our experiment we found that security of watermark isincreases as level in DWT increases.

On the basis of results, we found our proposed technique,‘ARobust Deinterlacing Technique’, on different level of DWT ismore robust and imperceptible against different numbers ofattacks.

References

[1].Ouazzane Hana, Mahersia Hela and Hamrouni Kamel,“A robustmultiple watermarking scheme based on the DWT”, in theProceeding of IEEE 10th International Multi-Conference onSystems, Signals Devices, 2013.

[2].Ali Sharifara, Mohd shafry Mohd rahim and MortezaBashardoost,“A Novel Approach to Enhance Robustness in DigitalImage Watermarking Using Multiple Bit-Planes of IntermediateSignificant Bits”,in the Proceeding of IEEE InternationalConference on Informatics and Creative Multimedia, 2013.

[3].Mohammed,Ghassan N.,Azman Yasin and Akram M.Zeki,“Digital Image Watermarking,Analysis of Current Methods”,in theProceeding of IEEE International Conference on AdvancedComputer Science Applications and Technologies,2012.

[4].Frank Y.Shih,“Digital Watermarking and Steganography:Fundamentals and Techniques”,CRC Press 2012.

References

[5].B.Sridhar and C. Arun,“On secure multiple image watermarkingtechniques using DWT”, in the Proceeding of IEEE 3rdInternational Conference on Computing Communication &Networking Technologies, 2012

[6].Vidyasagar M.Potdar,Song Han,Elizabeth Chang,“A Survey ofDigital Image Watermarking Techniques”, in the Proceeding ofIEEE 3rd International Conference on Industrial Informatics, 2005

[7]Tao, Peining, and Ahmet M. Eskicioglu,“A robust multiplewatermarking scheme in the discrete wavelet transform domain”,Optics East. International Society for Optics and Photonics, 2004.

[8].Raval, M. S., and P. P. Rege,“Discrete wavelet transform basedmultiple watermarking scheme”,in the Proceeding of IEEE 3rdInternational Conference on Convergent Technologies for theAsia-Pacific Region, 2003.

[9]Sheppard,Nicholas Paul,Reihaneh Safavi-Naini and PhilipOgunbona,“On multiple watermarking”, in the Proceeding ofACM, workshop on Multimedia and security:new challenges,2001

.....................................ThankYou...............................

Back to page

Recommended