Professional Documents
Culture Documents
watermarking technology
Published in : Optik
Published on :2013
Main Agenda
A self-embedding watermarking scheme
Watermark Generation Module
Block Mapping Module
Watermark Embedding Module
Watermark Extraction Module (Authentication)
Tamper localization
Results
Conclusion
Watermark Generation
Replace the two LSBs of the original image X with
0,that is X = X and (11111100)2 .
Divide the image X into N non-overlapping blocks
of size 2*2.
The 8-bit feature of image blockXi consists of the 6-
bit recovery data and 2-bit parity check bits .The 8-bit
feature for block Xi is denoted as: Fi = {fi1, fi2, fi3, fi4,
fi5, fi6, fi7, fi8} and will be used as watermark of
each block. Fi7= xor(fi1,fi2, fi3, fi4, fi5, fi6) and
fi8=inv(fi7)
This watermark will be embedded into another block
Block Mapping
This module decides that the watermark of a
particular block will be embedded in which block.
In this work, a chaotic sequence is used to generate
non-linear block mapping because the chaotic
system is sensitive to initial conditions and small
change of chaos parameters.
Watermark Embedding
In this module, the block to be embedded is modified by inserting
the 8 bit watermark according to the following equation.
x i j = 4xi j /4 + 2wij + wi(j+4) j = 1, 2, 3, 4
149 147
is the block where watermark is to be embedded.
148 150
Assume that the watermark for this specific block is
W(i,j) = [11001010]