Professional Documents
Culture Documents
)
MGM` College oI Engineering, Nanded
bhagyashrikapre24gmail.com
$EVWUDFW Due Due Due Due to to to to the the the the advancement advancement advancement advancement in in in in Computer Computer Computer Computer
technology technology technology technology and and and and readily readily readily readily available available available available tools, tools, tools, tools, it it it it is is is is very very very very easy easy easy easy for for for for
the the the the unknown unknown unknown unknown users users users users to to to to produce produce produce produce illegal illegal illegal illegal copies copies copies copies of of of of
multimedia multimedia multimedia multimedia data data data data which which which which are are are are floating floating floating floating across across across across the the the the
Internet.In Internet.In Internet.In Internet.In order order order order to to to to protect protect protect protect those those those those multimedia multimedia multimedia multimedia data data data data on on on on
the the the the Internet Internet Internet Internet many many many many techniques techniques techniques techniques are are are are available available available available including including including including
various various various various encryption encryption encryption encryption techniques, techniques, techniques, techniques, steganography steganography steganography steganography
techniques, techniques, techniques, techniques, watermarking watermarking watermarking watermarking techniques techniques techniques techniques and and and and information information information information
hiding hiding hiding hiding techniques. techniques. techniques. techniques. Digital Digital Digital Digital watermarking watermarking watermarking watermarking is is is is aaaa technique technique technique technique
in in in in which which which which a aaa piece piece piece piece of of of of digital digital digital digital information information information information is is is is embedded embedded embedded embedded into into into into
an an an an image image image image and and and and extracted extracted extracted extracted later later later later for for for for ownership ownership ownership ownership verification. verification. verification. verification.
Secret Secret Secret Secret digital digital digital digital data data data data can can can can be be be be embedded embedded embedded embedded either either either either in in in in spatial spatial spatial spatial
domain domain domain domain or or or or in in in in frequency frequency frequency frequency domain domain domain domain of of of of the the the the cover cover cover cover data. data. data. data. In In In In
this this this this paper, paper, paper, paper, a aaa new new new new singular singular singular singular value value value value decomposition decomposition decomposition decomposition (SVD) (SVD) (SVD) (SVD)
and and and and discrete discrete discrete discrete wavelet wavelet wavelet wavelet transformation transformation transformation transformation (DWT) (DWT) (DWT) (DWT) based based based based
technique technique technique technique is is is is proposed proposed proposed proposed for for for for hiding hiding hiding hiding watermark watermark watermark watermark in in in in full full full full
frequency frequency frequency frequency band band band band of of of of color color color color images images images images (DSFW). (DSFW). (DSFW). (DSFW). The The The The quality quality quality quality of of of of
the the the the watermarked watermarked watermarked watermarked image image image image and and and and extracted extracted extracted extracted watermark watermark watermark watermark is is is is
measured measured measured measured using using using using peak peak peak peak signal signal signal signal to to to to noise noise noise noise ratio ratio ratio ratio (PSNR) (PSNR) (PSNR) (PSNR) and and and and
normalized normalized normalized normalized correlation correlation correlation correlation (NC) (NC) (NC) (NC) respectively. respectively. respectively. respectively. It It It It is is is is observed observed observed observed
that that that that the the the the quality quality quality quality of of of of the the the the watermarked watermarked watermarked watermarked image image image image is is is is
maintained maintained maintained maintained with with with with the the the the value value value value of of of of 36dB. 36dB. 36dB. 36dB. Robustness Robustness Robustness Robustness of of of of
proposed proposed proposed proposed algorithm algorithm algorithm algorithm is is is is tested tested tested tested for for for for various various various various attacks attacks attacks attacks
including including including including salt salt salt salt and and and and pepper pepper pepper pepper noise noise noise noise and and and and Gaussian Gaussian Gaussian Gaussian noise, noise, noise, noise,
cropping cropping cropping cropping and and and and 1PEG 1PEG 1PEG 1PEG compression. compression. compression. compression.
Keywords- Digital Digital Digital Digital watermarking, watermarking, watermarking, watermarking, Discrete Discrete Discrete Discrete Wavelet Wavelet Wavelet Wavelet
transformation transformation transformation transformation technique, technique, technique, technique, SVD-Watermarking, SVD-Watermarking, SVD-Watermarking, SVD-Watermarking,
Transform Transform Transform Transform Domain Domain Domain Domain watermarking. watermarking. watermarking. watermarking.
I. I. I. I. INTRODUCTION INTRODUCTION INTRODUCTION INTRODUCTION
In recent days, usage oI computer networks Ior
communication and Ior inIormation sharing leads to
increase in size oI Internet. As the size oI the Internet
grows, the volume oI multimedia data (images, text,
video / audio) Iloating around also increases day by
day. As many advanced tools are readily available to
duplicate and modiIy those data in the Internet easily,
security is the major concern, which requires some
mechanisms to protect digital multimedia data. Thus
watermarking is a technique which supports with
Ieasible solution. Digital Watermarking is deIined as
the process oI hiding a piece oI digital data in the
cover data which is to be protected and extracted later
Ior ownership veriIication |1|. Some oI the important
applications oI watermarking technique are copyright
protection, ownership veriIication, Iinger printing,
and broadcast monitoring. The Ieatures oI
watermarking include robustness and perceptibility.
Robustness indicates the resistivity oI watermark
against diIIerent types oI attacks such as cropping,
rotating, scaling, low pass Iiltering, resizing, addition
oI
Mrs. Joshi M.Y. (Asst. ProI.)
MGM` College oI Engineering, Nanded
manisha.y.joshigmail.com
noise, JPEG compression, sharpness, histogram
equalization and contrast adjustment. Those attacks
are either intentional or unintentional. Robustness is
the property which is important Ior ownership
veriIication whereas the Iragility is important Ior
image authentication. Robustness oI watermarking
algorithm is obtained to a maximum level when
inIormation is hidden in robust components oI cover
data. The increasing perceptibility will also decrease
the quality oI watermarked image.
General y inIormation could be hidden,
directly by modiIying the intensity value or pixel
value oI an image or its Irequency components |2|.
The Iormer technique is called spatial domain
technique and later is cal ed Irequency domain
technique. To obtain Irequency components oI an
image, it needs to be transIormed using any one oI
the transIormation techniques such as Discrete
Fourier TransIormation (DFT), Discrete short Fourier
transIormation (DSFT), Discrete Cosine
TransIormation (DCT) |3||4|, Walsh Hadamard
transIormation (DHT) |5||6|, and Discrete wavelet
TransIormation (DWT)|7||8||9||10|. In TransIorm
domain casting oI watermark can be done in Iull
Irequency band oI an image or in speciIic Irequency
band such as in low Irequency band or in high
Irequency band or in middle Irequency band.
In the proposed method DSFW, inIormation is
hidden in YUV space oI a color image. The Ieatures
oI SVD technique|11| are combined with DWT to
embed data in Irequency domain oI cover data. The
review oI related work is given in section II. In
section III overview oI singular value decomposition
is given. The proposed algorithm is discussed in
detail in section IV. Results and analysis oI proposed
algorithm is discussed in section V.
II. II. II. II. REVIEW REVIEW REVIEW REVIEW OF OF OF OF RELATED RELATED RELATED RELATED WORKS WORKS WORKS WORKS
Review oI literature survey has been conducted on
discrete wavelet transIormation combined with singular
value decomposition techniques Ior hiding image
into bands oI diIIerent Irequency and a particular
band is converted into blocks oI size 4x4 Ior
embedding data. Each oI those blocks is SVD
transIormed and watermark is hidden into diagonal
matrix oI every block. The similarity between the
All All All All Frequency Frequency Frequency Frequency Band Band Band Band DWT-SVD DWT-SVD DWT-SVD DWT-SVD Robust Robust Robust Robust
Watermarking Watermarking Watermarking Watermarking Technique Technique Technique Technique for for for for Color Color Color Color Images Images Images Images in in in in
YUV YUV YUV YUV Color Color Color Color Space Space Space Space
___________________________________
978-1-4244-8728-8/11/$26.00 2011 IEEE
original watermark and the extracted watermark Irom
the attacked image is measured using the correlation
Iactor NC. The algorithm shows that when DWT is
combined with SVD technique the watermarking
algorithm outperIorms than the conventional DWT
algorithm with respect to robustness against Gaussian
noise, compression and cropping attacks. In |9| the
DWT is combined with SVD technique to hide data
in high Irequency band oI an image. This scheme
perIorms well Ior variety oI image processing
operations. In |10| Image is transIormed by DWT
technique to K level. The middle Irequency band LH
and HL are SVD transIormed and watermark is
hidden.Similarly in low Irequency and high
Irequency band the watermark is embedded using
distributed discrete wavelet transIorm method
(DDWT). Both algorithms are tested against attacks
and proved that they are robust against cropping
attacks. For at acks such as Gaussian Noise, contrast
adjustment, sharpness, histogram equalization, and
rotation, the proposed scheme is robust by exploiting
the advantage oI the SVD watermarking technique.
In |12| both cover image and watermark image are
pre processed to hide watermark in transIorm
domain. The perIormance evaluation shows that the
algorithm is robust against at acks such as cropping,
Gaussian noise, JPEG compression and low pass
Iiltering. In |14|, three level decomposition oI DWT
is applied on an image to get ten bands oI
Irequencies. Al ten bands oI Irequency coeIIicients
are SVD transIormed to embed watermark. A new
watermarking scheme Ior images based on Human
Visual System (HVS) and Singular Value
Decomposition (SVD) in the wavelet domain is
discussed |15|.Experimental results show its better
perIormance Ior compression, cropping and scaling
attack. As per the review many algorithms are
available to hide watermark in intensity images rather
than color images. In DSFW, color image is taken as
cover data in which al the pixel color components are
highly correlated, so the cover data in RGB color domain is
converted into YUV domain where intensity(Y) and
chrominance (UV) components are decorreleted. Secret
data can be hidden either in intensity components or in
color components. The quality oI watermarked data and
extracted.
III. III. III. III. OVERVIEW OVERVIEW OVERVIEW OVERVIEW OF OF OF OF SINGULAR SINGULAR SINGULAR SINGULAR VALUE VALUE VALUE VALUE
DECOMPOSITION DECOMPOSITION DECOMPOSITION DECOMPOSITION
Singular value decomposition is a linear algebra
technique sed to solve many mathematical problems |11|.
The theoretical background oI SVD technique in image
processing applications to be noticed is |15|:
a) The SVs (Singular Values) oI an image has very
good stability, which means that when a smal value is
added to an image, this does not aIIect the quality with
great variation.
b) SVD is able to eIIiciently represent the intrinsic
algebraic properties oI an image, where singular values
correspond to the brightness oI the image and singular
vectors reIlect geometry characteristics oI the image.
c) An image matrix has many small singular values
compared with the Iirst singular value. Even ignoring these
small singular values in the reconstruction oI the image
does not aIIect the quality oI the reconstructed image
Any image can be considered as a square matrix
without loss oI generality. So SVD technique can be
applied to any kind oI images. II it is a gray scale image the
matrix values are considered as intensity values and it
could be modiIied directly or changes could be done aIter
transIorming images into Irequency domain. The SVD
belongs to orthogonal transIorm which decompose the
given matrix into three matrices oI same size |3|. To
decompose the matrix using SVD technique it need not be a
square matrix. Let us denote the image as matrix A.The
SVD decomposition oI matrix A is given using (1)
AAAA USV USV USV USV
TTTT
(1) (1) (1) (1)
U and V are unitary matrices such that UU
T
I,
VV
T
I, where I is an Identity matrix. U|u1,u2,u3,..un|
V|v1,v2,v3,..vn| , U matrix is called leIt singular
values and V matrix is called right singular values. The
decomposition oI matrix A is obtained using (2
such that all the elements in main diagonal
are in decreasing order like 1 23 ... n0,
where S is the diagonal matrix having in its main
diagonal all positive singular values oI A. Number oI
nonzero values equals the rank oI the matrix. These
positive singular values can be used to embed
watermark. The order oI singular matrix is same as A,
and hence the resultant matrix is also square. Hence
images oI equal size can be taken as cover
object.
IV. IV. IV. IV. PROPOSED PROPOSED PROPOSED PROPOSED SYSTEM SYSTEM SYSTEM SYSTEM DSFW DSFW DSFW DSFW
$ $ $ $ (PEHGGLQJ (PEHGGLQJ (PEHGGLQJ (PEHGGLQJ 3URFHGXUH 3URFHGXUH 3URFHGXUH 3URFHGXUH
The block diagram Ior embedding watermark in
transIorm domain using SVD technique is shown in Fig.1.
As color image is used as cover data in the proposed
system DSFW, the RGB value oI each pixel is converted
into RGB color spaces |13| |12| in which only R
components constitute R color space, G components
constitute G color space and B components constitute B