Professional Documents
Culture Documents
Mr. M.M.Sharma2
Asst. Prof., Department of Electronics and Communication Engineering Institute of Engineering and Technology, Alwar (India)
Assoc. Prof., Department of Electronics and Communication Engineering Malaviya National Institute of Technology, Jaipur (India)
The basic idea behind embedding watermark is to modify the transform coefficients in accordance with the bits of the watermark image. It is desirable that the watermark is secure, imperceptible, robust and tamper resistant. However, several intentional and unintentional operations with the watermarked image may provide possibility for disabling the watermark. Commonly, these operations (especially the intentional ones) are referred as attacks [4,5,9] against watermarks. These manipulations include compression, geometric operations, signal processing operations and forgery.
Digital Image Watermarking,, watermark, Singular Value Decomposition, Singular values, attacks, Bit Correct Rate. Index terms Abstract This paper, aims at embedding an invisible
watermark into a digital image using the Singular Value Decomposition (SVD). The technique uses the U matrix of the SVD and modifies two of its value according to the watermark bit. The proposed technique is a modification of a recent scheme[1] proposed by B. Chandra Mohan and S. Srinivas Kumar in terms of Bit Correct Rate and robustness. Superior results are obtained when the watermarked image is attacked by histogram equalization, cropping, setting and resetting LSB plane, linear and non-linear filtering, noise and compression.
I. INTRODUCTION
Over the past few years, the tremendous growth in the computer network, World Wide Web and computer performance has facilitated the distribution of multimedia images with an increased concern for security, copyright and authentication. Digital watermarks have been used to tackle these issues. Watermarking aims at including imperceptible information into the digital image. It would be then possible to recover the embedded information at any time, even when the image undergoes any intentional or unintentional nondestructive attack. This information can be a text, an image or a digital signal or pattern and is referred to as a watermark [3,8,10]. Image watermarking techniques are generally classified [2] as spatial domain or transform domain techniques. The former [3] changes the intensity of original image or gray levels of its pixels and the latter embeds the watermark into the transformed image. The latter [3] techniques offer higher security and robustness. A variety of image transforms are exploited for watermark embedding. Some of the commonly used transforms are Discrete Cosine Transform, Singular Value Decomposition [6-8] and Discrete Wavelet Transform.
These diagonal entries i' s are called singular values of A and their number is equal to the rank of A. These singular values satisfy the relation 1 2 3......rank ( A) > 0. Each singular value specifies [6,7] the luminance of an image layer while the corresponding pair of singular vectors specifies the geometry of the image. For majority
of the attacks, the change in the largest singular value is very small. The columns of U are called the left singular vectors of A, and the columns of V are called the right singular vectors of A. This decomposition is known as the Singular Value Decomposition (SVD) of A, and can be written as SVD(A) = [U D V ]. SVD (A) = 1U1V1T + 2U2V2T + ...... + U V A = UDVT. Calculating the SVD consists of finding the eigenvalues and eigenvectors of AAT and ATA. The eigenvectors of ATA make up the columns of V , the eigenvectors of AAT make up the columns of U. Also, the singular values in S are square roots of eigenvalues from AAT or ATA. The singular values are the diagonal entries of the S matrix and are arranged in descending order. The singular values are always real numbers. If the matrix A is a real matrix, then U and V are also real.
Where, l is the watermark length, Wn corresponds to the nth bit of the embedded watermark and W'n corresponds to the nth bit of the recovered watermark. Imperceptibility of an embedded watermark can be expressed either as fidelity or quality measure. Fidelity represents a measure of similarity between the original and watermarked cover. The widely used peak signal-to-noise ratio (PSNR) measurement [4,10] which measures the maximum signal to noise ratio found on an image is used as an objective measure for the distortions introduced by the watermarking system. The PSNR is given by [9]:
1. Read the watermarked image. 2. Define block size. 3. Divide the watermarked image into blocks. 4. For each block i, a. Find its SVD. b. Obtain the U matrix. c. if (U(1,1) > U(2,1)) Set wm(i) = 1. else Set wm(i) = 0.
where MSE is mean square error between the original image Iorg and the watermarked one Iw.
increase in the value of constant, results in better performance of the technique at detection end.
noise are taken viz. Gaussian noise and salt and pepper noise. Both the types of noises are added at the density of 0.01. Test for robustness against filtering is carried out for rotationally symmetric low pass Gaussian filter, which is a linear filter, as well as for non-linear median filter. The median filter is taken for size 3 X 3. Attack JPEG Compression Histogram Equalization Setting LSB plane =1 Cropping (1:128,1:128)=0 Salt and pepper Noise Gaussian Noise Low pass Gaussian filtering Median filtering Algorithm Proposed in [6] 69.1406 82.7881 83.0322 77.9785 78.3691 55.4932 83.3008 51.9531 Proposed algorithm 72.4609 88.6475 89.5996 83.2031 83.9600 60.2051 86.8896 52.4414
This is measured with the performance metric of BCR. A higher BCR implies that the retrieved watermark is closer to the original one. The variations of PSNR and BCR with the constant value a are shown in figure 4. The two curves intersect at a = 0.01 which is then chosen as the constant for experimentation.
References
[1] Mohan B. Chandra, Kumar S. Srinivas, A Robust Image Watermarking Scheme Using Singular Value Decomposition. Journal of Multimedia, Volume 3, No. 1, (May 2008). [2] Dickman Shawn D., An overview of Steganography. James Madison University Infosec Techreport, (July 2007). [3] Genov P. Eugene, Digital Watermarking of Bitmap Images. International Conference on Computer Systems and Technologies- CompSysTech 07, (2007). [4] Kutter M., Petitcolas F.A.P., Fair Evaluation Methods for Image Watermarking Systems. [5] Miller Matt L., Cox Ingemar J., Linnartz Jean-Paul M. G., Kalker Ton, A Review of Watermarking Principles and Practices. Chapter 18, Digital Signal Processing in Multimedia Systems, Ed. K. K. Parhi and T. Nishitani, Marcell Dekker Inc., 461-485, (1999). [6] Judge James C., Steganography:Past, Present, Future, SANS Institute InfoSec Reading Room, (2001). [7] Mohan B. Chandra, Kumar S. Srinivas, Chhatterji B. N., A Robust Digital Image Watermarking Scheme Using Singular Value Decomposition (SVD), Dither
The watermark is retrieved with a BCR of 89.5996 by the proposed algorithm, at constant = 0.01. The result is compared with the algorithm described in [1] which gives the retrieved watermark with 83.0322% correctness only. The images watermarked with both the algorithms are subjected to different intentional and unintentional attacks to experimentally determine the BCR. Table I summarizes the results obtained for the two algorithms. The techniques are analyzed for JPEG compression by retaining only 8 of the DCT coefficients for each block of size 8 X 8. The next test, for cropping, is done by setting the first 128 X 128 elements of the image to black. To test the techniques for robustness against noise two types of
Quantization and Edge Detection. ICGST-GVIP Journal, Volume 8, issue 1, (June 2008). [8] Pei Soo-Cheng, Liu Hsin-Hua, Improved SVD based Watermarking for Digital Images, Sixth Indian Conference on Computer Vision, Graphics and Image Processing, IEEE Computer Society, (2008). [9] Petitcolas Fabien A., Anderson Ross J., Kuhn Markus G., Information Hiding- A Survey, Proceedings of IEEE, Special issue on protection of multimedia content, 1062-1078, (July 1999). [10] Wolfgangand Raymond B., Delp Edward J., Overview of Image Security Techniques with Applications in Multimedia Systems. Prudune University.