8
Procedia Technology 6 (2012) 897 – 904 2212-0173 © 2012 The Authors. Published by Elsevier Ltd. Selection and/or peer-review under responsibility of the Department of Computer Science & Engineering, National Institute of Technology Rourkela doi:10.1016/j.protcy.2012.10.109 2nd International Conference on Communication, Computing & Security [ICCCS-2012] Non Blind Digital Watermarking Technique Using DWT and Cross Chaos Chittaranjan Pradhan a, *, Shibani Rath b , Ajay Kumar Bisoi c a School of Computer Engineering, KIIT University, Bhubaneswar,India, 751024 b School of Computer Engineering, KIIT University, Bhubaneswar,India, 751024 c School of Computer Engineering, KIIT University, Bhubaneswar,India, 751024 Abstract Watermarking techniques have been developed to protect digital images against illegal reproductions and illegal -blind digital image watermarking algorithm based on Discrete wavelet transform, Cross chaotic map and Arnold transform, has been described. Initially, Discrete wavelet transformation is done and the medium used to encrypt the watermark and the medium frequency coefficients of the watermark image are extracted to be embedded into the original image. It is a kind of non-blind scheme as the extraction needs the original image. Peak signal to noise ratio (PSNR) is used to evaluate the algorithm. The quality of the extracted watermark is evaluated using term Normalized cross- common attacks. Keywords: ic map; 1D Logistic Chaotic map 1. Introduction Security of digital data has grown to be a popular topic now a day. As the growth of computer users is expo technology; currently, people are transmitting their valuable data through public accessible network. In order to * Corresponding author. Tel.: + 91-9861397865; fax: +0-674-272-5630. E-mail address: [email protected] Available online at www.sciencedirect.com © 2012 The Authors. Published by Elsevier Ltd. Selection and/or peer-review under responsibility of the Department of Computer Science & Engineering, National Institute of Technology Rourkela Open access under CC BY-NC-ND license. Open access under CC BY-NC-ND license.

Non Blind Digital Watermarking Technique Using DWT and ... · 898 Chittaranjan Pradhan et al. / Procedia Technology 6 ( 2012 ) 897 – 904 protect valuable data against illegal access,

Embed Size (px)

Citation preview

Procedia Technology 6 ( 2012 ) 897 – 904

2212-0173 © 2012 The Authors. Published by Elsevier Ltd. Selection and/or peer-review under responsibility of the Department of Computer Science & Engineering, National Institute of Technology Rourkeladoi: 10.1016/j.protcy.2012.10.109

2nd International Conference on Communication, Computing & Security [ICCCS-2012]

Non Blind Digital Watermarking Technique Using DWT and Cross Chaos

Chittaranjan Pradhana,*, Shibani Rathb, Ajay Kumar Bisoic aSchool of Computer Engineering, KIIT University, Bhubaneswar,India, 751024 bSchool of Computer Engineering, KIIT University, Bhubaneswar,India, 751024 cSchool of Computer Engineering, KIIT University, Bhubaneswar,India, 751024

Abstract

Watermarking techniques have been developed to protect digital images against illegal reproductions and illegal -blind digital image watermarking algorithm based on Discrete wavelet transform, Cross

chaotic map and Arnold transform, has been described. Initially, Discrete wavelet transformation is done and the medium

used to encrypt the watermark and the medium frequency coefficients of the watermark image are extracted to be embedded into the original image. It is a kind of non-blind scheme as the extraction needs the original image. Peak signal to noise ratio (PSNR) is used to evaluate the algorithm. The quality of the extracted watermark is evaluated using term Normalized cross-common attacks. © 2012 The Authors. Published by Elsevier Ltd. Selection and/or peer-review under responsibility of the Department of Computer Science & Engineering, National Institute of Technology Rourkela Keywords: ic map; 1D Logistic Chaotic map

1. Introduction

Security of digital data has grown to be a popular topic now a day. As the growth of computer users is expotechnology; currently, people are transmitting their valuable data through public accessible network. In order to

* Corresponding author. Tel.: + 91-9861397865; fax: +0-674-272-5630. E-mail address: [email protected]

Available online at www.sciencedirect.com

© 2012 The Authors. Published by Elsevier Ltd. Selection and/or peer-review under responsibility of the Department of Computer Science & Engineering, National Institute of Technology Rourkela Open access under CC BY-NC-ND license.

Open access under CC BY-NC-ND license.

898 Chittaranjan Pradhan et al. / Procedia Technology 6 ( 2012 ) 897 – 904

protect valuable data against illegal access, various multimedia security methods based on encryption, watermarking etc. are used.

Watermarking is necessary as digital data can be easily copied and is difficult to identify its copyrights and its owners. So, watermarking is the best method to prove the identity of its owners. As an important type of watermarking technique, robust watermarking demands that when digital data suffers from various attacks such as JPEG encoding, extracted and Qiang Wang, Qun Ding, Zhong Zhang & Lina Ding, 2008).

and Cross chaos sequence. Then, it is embedded into the original image using an embedding equation. Here, a double encryption

encrypted watermarking information. To get the watermark back, further decryption is needed. As we all know that it is hard to do this without knowing the initial keys.

2. Related Works

As stated by Qiang Wang, Qun Ding, Zhong Zhang and Lina Ding (2008), by Discrete wavelet transformation of original image, the low frequency part is extracted as the embedded domain. Then, 1D Logistic Chaotic sequence (Ma Bin, 2011) is used to encrypt the watermarking image. Wavelet transformation of this encrypted watermark gives the lower frequency coefficients to be embedded into the original image to

. Gursharanjeet Singh Kalra, Rajneesh Talwar and Dr. Harsh Sadawarti (2011) proposed another robust

encrypt the watermark. Again, Wavelet transformation of this encrypted watermark gives the lower frequency

authors was a blind digital watermarking technique.

3. Proposed Algorithm

In this paper, we propose an algorithm for robust watermarking using Cross chaotic map, which is more secured than other chaotic maps (Kuldeep Singh & Komalpreet Kaur, 2011). Also, our algorithm focuses on non blind detection scheme.

3.1. Discrete wavelet transform

The watermark can be embedded in spatial or frequency domain. According to R. Z. Liu and T. N. Tan (2000), frequency domain watermarking is more robust than the spatial domain (C. I. Prodilchuk & E. J. Delp, 2001; Qiang Wang, Qun Ding, Zhong Zhang & Lina Ding, 2008). There are certain techniques which are used to convert the cover image into its frequency domain. Out of which, DWT is the most common technique.

The DWT is computed by successive low time domain signal, which is called as the Mallat algorithm or Mallat-tree decomposition. The image after wavelet decomposition is divided into four bands in horizontal direction, vertical direction, diagonal direction and low frequency part which can be further decomposed. The three level decomposition of Discrete wavelet transformation is shown

899 Chittaranjan Pradhan et al. / Procedia Technology 6 ( 2012 ) 897 – 904

Fig. 1. Third level wavelet transform

According to Discrete wavelets theory and human visual characteristics, the embedding capacity will decrease with the increase of layer numbers (Gursharanjeet Singh Kalra, Rajneesh Talwar & Dr. Harsh Sadawarti, 2011). The high frequency part of discrete wavelets represent the edge, outline and texture information and other detail information. Embedding watermark is difficult to be detected in these parts, but it is easy to be destroyed and has a poor stability after image processing. The low frequency part concentrates on most of the energy of image, whose amplitude of coefficient is larger than the other parts. Most of the common attacks to low frequency coefficients are almost invariant. Still, there are some attacks, which can affect the low frequency coefficients to destroy the host image. Thus, it is better to embed watermark in medium frequency domain.

3.2. Arno

Arnold transformation is posed in the research of Arnold theory (Gabriel Peterson, 1997). An image is hit with a transformation that apparently randomizes the original organization of its pixels. However, if iterated enough times, as though by magic, the original image reappears. The number of iteration taken to get the

nyx

yx

mod2111

(1)

where n is the size of the image. Equation (1) is used to transform each and every pixel coordinates of the image. At a certain step of

iteration, if the image we achieve reaches our anticipated target, we have achieved the scrambled image we need. The decryption of image relies on the transformation period. The period changes in correspondence to the size of different images. Figure2 gives the number of periods for different size of images.

According to the result, no elegant model could be developed for the relationship between the period of an image and value of n. In general, it may be claimed that as the value of n increases, the period tends to increase. However, this is not always true. For example, a 101 x 101 image has a period of twenty ve; whereas, a 124 x

key.

900 Chittaranjan Pradhan et al. / Procedia Technology 6 ( 2012 ) 897 – 904

Fig. 2.

3.3. Cross chaotic map

Chaos is a kind of random-like process which occurred in nonlinear dynamic systems. It is neither periodic chaotic map (Kuldeep Singh &

Komalpreet Kaur, 2011 wing

;coscos1,1,;1

11

21

ii

ii

xkyyxyx

(2)

and k=6.

Two chaotic sequences X= x0, x1...xm and Y= y0, y1 yn, using initial values x0, y0 and control parameters, are generated. X and Y are reconstructed as row and column matrix respectively. Then, they are multiplied with

1),(5.0,15.0),(0,0

jizjiz

xf (3)

The advantage of Cross chaotic map is that, it has larger key space than 1D logistic chaos sequence, which is used in previous discussed papers (Gursharanjeet Singh Kalra, Rajneesh Talwar & Dr. Harsh Sadawarti, 2011; Qiang Wang, Qun Ding, Zhong Zhang & Lina Ding, 2008). This is due to the six unknown parameters. Because of its larger key space, it gives higher security to image. Also, Cross chaotic map resist most of the known attacks such as statistical attack, differential attack and exhaustive attack (Kuldeep Singh & Komalpreet Kaur, 2011).

3.4. Proposed Embedding Algorithm

Let X be the original image of size N X N and w be the watermarking image with size M X M. Normally,

embedding algorithm of watermarking is as follows:

901 Chittaranjan Pradhan et al. / Procedia Technology 6 ( 2012 ) 897 – 904

Fig. 3. Proposed embedding scheme

1. Make three-level wavelet decomposition to the original image and use the medium frequency HL3 as the embedded domain, the wavelet coefficients of HL3 are extracted as CA3;

2. 3. Do one-level wavelet decomposition to watermark w and extract medium frequency coefficient cw1; 4. Embed the watermark into original image using the equation (4);

),(1),(3),(3),(3 jicwjiCAjiCAjiCA (4)

where stands for the watermarking strength, whose value lies in between visibility and robustness. Lower the value of , better for the quality of the watermarked image.

5. s produced.

The proposed embe 3.

3.5. Proposed extracting algorithm

The extracting algorithm of watermarking is the converse process of embedding. As it is a non blind scheme, the original image is needed. The detailed steps are:

1. Make three-level wavelet decomposition to the watermarked image, the wavelet coefficients of HL3

2. Do three-level wavelet decomposition to the original image and extract the wavelet coefficients as

902 Chittaranjan Pradhan et al. / Procedia Technology 6 ( 2012 ) 897 – 904

Fig. 4. Proposed extracting scheme

3.

1),(3),(3),('1 jiCAjiCAjicw (5)

4. Use one level wavelet transformation to reconstruct the watermark; 5.

while embedding) to decrypt the watermark.

4. Experimental Results

The performance of the watermarked image can be evaluated on the basis of peak signal to noise ratio (PSNR) in decibels (dB) from the equation (7). Higher the value of PSNR better is the quality of the watermarked image. PSNR more than 30 dBs is considered to be the acceptable quality image, in which watermark is making no major alteration to the quality of the image (Qiang Wang, Qun Ding, Zhong Zhang & Lina Ding, 2008).

21

0

1

0),(),(1 m

i

n

jjiKjiI

mnMSE (6)

903 Chittaranjan Pradhan et al. / Procedia Technology 6 ( 2012 ) 897 – 904

MSERPSNR 10log10 (7)

where, MSE is the mean square error of the watermarked image and the original image and m, n are the number of rows and number of columns. I and K are the original and watermarked image respectively.

d with Cross

we get the watermarked image as show

Fig. 5. Experimental results after embedding process

Fig. 6. Experimental results after extracting process

904 Chittaranjan Pradhan et al. / Procedia Technology 6 ( 2012 ) 897 – 904

As a test of the watermarked image, Peak signal to noise ratio (PSNR) is chosen as detection indexes. From n see that the image keeps a good quality with a PSNR=33.243dB.

atermark image as shown , which is similar to the original watermarking image.

4.1. Resistance against attacks

Some watermark attacks are also done to make a further test. The quality of the extracted watermark is evaluated using Normalized cross-correlation (NC) formula. The ideal value of the NC is 1 which means the original and the extracted watermarks are exactly the same. The results are shown in table 1. From the results, it can be seen that though, the image quality degrades with different types of attacks; still the watermark can be extracted.

Table 1. Results against attacks

Attacks NC value

JPEG Compression 1.000

Cropping 1.000

Scaling 1.000

Gaussian noise .9943

5. Conclusion

In this proposed algorithm, we use a combined approach of Arnmethod for image encryption. It is secured because it uses dual encryption technique to encrypt the watermark image. As we get the PSNR value greater than 30 it will be difficult to distinguish between the original image and the watermarked image. After extraction of the watermark, the quality of the image remains same as nc value is equal to 1. Thus, we conclude that the proposed algorithm is effective for watermarking scheme, which is resistant to the common attacks.

References

C. I. Prodilchuk, E. J. Delp (2001), Digital watermarking algorithms and applications, Signal Processing Magazine, IEEE, 18(4), 33-46. Gabriel P , Math 45-Linear Algebra, pp.1-7. Gursharanjeet Singh Kalra, Rajneesh Talwar, Dr. Harsh Sadawarti (2011), Robust Blind Digital Image Watermarking Using DWT and

Dual Encryption Technique, Computational Intelligence, Communication Systems and Networks(CICSyN), IEEE, pp.225-230. Kuldeep Singh, Komalpreet Kaur (2011), Image Encryption using Chaotic Maps and DNA Addition Operation and Noise Effects on it,

International Journal of Computer Applications (0975 8887), 23(6), 17-24. Ma Bin (2011), Experimental Research of Image Digital Watermark Based on DWT Technology, International Conference on Uncertainty

Reasoning and Knowledge Engineering (URKE), IEEE, pp.9-12. Qiang Wang, Qun Ding, Zhong Zhang, Lina Ding (2008), Digital Image Encryption Research Based on DWT and Chaos, Fourth

International Conference on Natural Computation (ICNC),IEEE, pp.494-498. R. Z. Liu, T. N. Tan (2000), Survey of Watermarking for digital images. Journal of China Institute of Communications, 21(8), 39-48.