SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 6



          Phase Watermarking Algorithm using Hybrid Multi-Polarity
                          Hadamard Transform
     Sk. Khamuruddeen1, S.V.Devika2, Neerugatti Vishwanath3, P.Prem Kishan4,
               J.Chandra Shekar5, G.Shravan Kumar6, G.Swetha7
                          1
                            (Assistant Professor, Department of ECE, HITAM, Hyderabad, India)
                          2
                           (Associate Professor, Department of ECE, HITAM, Hyderabad, India)
                  3
                   (Assistant professor, Department of ECE, ST. Peters Engineering College, Hyderabad)
                              4
                               (Assistant professor, Department of ECE, MLRIT, Hyderabad)
                  5
                   (Assistant professor, Department of ECE, ST. Peters Engineering College, Hyderabad)
                              6
                               (Assistant professor, Department of ECE, MLRIT, Hyderabad)
                              7
                                ( Associate Professor, Department of ECE, ACTS, Hyderabad)




Abstract
         In this paper, a robust phase watermarking                (a) It should be perceptually invisible and should not
algorithm for still images is presented where the                  result in artifacts that are different from those that may be
watermark information is conveyed in the phase                     seen in the original image.
spectrum in the transform domain. Phase watermarking
algorithm that uses multi-polarity Walsh-Hadamard and              (b) It should be robust to common signal processing
Complex Hadamard transform is developed. The                       operations such as sharpening, resizing, lossy
robustness of presented algorithm is investigated by its           compression, etc since operations that damage the
uniqueness, JPEG encoding, image resizing, dithering               watermarked images also damage the embedded data.
noise distortions, sharpening, cropping and successive             Pirates may also attempt to remove the embedded
watermarking.                                                      watermark through other modifications to the
                                                                   watermarked images.
Keyword’s- Unified complex Hadamard transform                               A novel hybrid watermarking technique for grey
·Multi-polarity complex Hadamard transform ·Multi-                 scale images based on the modified multi-resolution
polarity     Walsh-Hadamard        transform ·Phase                multi-polarity Walsh-Hadamard and Complex Hadamard
watermarking · Spectral techniques                                 transforms has been proposed and implemented in the C
                                                                   language. A series of tests to gauge the robustness of the
I. Introduction:                                                   watermark is performed and the experimental results are
          With the explosive growth of the Internet, the           also presented. The new watermarking technique based
use of digital images is becoming more widespread as               on multi-polarity Walsh- Hadamard and Complex
digital images are easily transmitted over networked               Hadamard transforms can also be used in digital and
systems. However, this has also heightened the problem             color image processing.
of copyright protection. The owners of digital images are
reluctant to allow the distribution of their works in a            II. Complex Hadamard Transform:
networked environment as exact copies can be obtained                       An orthogonal transform known as the unified
easily. Although encryption can be applied to limit access         Complex Hadamard Transform (CHT) has recently been
to only valid key-holders, there is no way to trace the            considered as the tool in spectral approach to logic design
reproduction or retransmission of the decrypted images.            and in various applications in digital signal processing
A digital watermark is intended to complement                      and communications .The detailed properties and
cryptographic processes. It is an imperceptible                    performance of this transform in the above areas is
identification code that is permanently embedded in the            available in . To better suit applications in logic design
image and remains within the image after the decryption            similarly to multi-polarity Walsh-Hadamard transform
process. The owner and intended recipients of the image            the CHT transform has been generalized to multi-polarity
can be identified through the decoding of the embedded             transform in . This latter version of the CHT transform is
copyrights information in the image. The characteristics           used in this article to convey the watermark information.
of an effective image watermark are as follows.                    Some necessary information about basic properties of
                                                                   multi polarity CHT is given below.


Issn 2250-3005(online)                             October| 2012                                         Page 130
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 6



                                                                  the image. The ll quadrant in Fig. 2 forms another image
                                                                  with half the resolution. The same transformation is
                                                                  applied to this reduced resolution image twice to form the
                                                                  pyramid structure.

                                                                  (c) The lowest frequency band (LFB) is segmented into n
                                                                  8×8 blocks.
III. Novel Hybrid Technique for Watermarking:
         The design and implementation of a novel                 (d) The two-dimensional multi-polarity CHT is
hybrid transform domain based watermarking technique              performed on the segmented 8 × 8 blocks by applying the
for grey scale images is described in this section. Figure        one dimensional multi-polarity CHT on the rows
1 illustrates the stages involved in the insertion of             followed by the columns. The CHT coefficients of a real
watermark. It should be noticed that the secret key could         image are complex-valued which leads to a magnitude
be added easily in our watermarking scheme. The                   and phase representation for the transformed image.
insertion of the watermark consists of the following
steps:

(a) The raw pixels are extracted from the BMP image and
stored in a two-dimensional array. The dimensions of the
image are adjusted to the next higher multiple of 8 to
handle images of different sizes. For example, the
original dimensions of an image are 500 × 300 pixels.
The dimensions of the image are adjusted to 504 × 304
pixels, where the additional pixels are filled with 0.

(b) The modified multi-resolution integer-valued multi
polarity WHT is applied to decompose the image into a
pyramid structure with various bands such as the low
frequency band, low-high frequency band, high
frequency band etc. The modified multi-resolution
integer-valued multi-polarity WHT is implemented in
two steps and applied three times. The decomposition is
performed as follows:




                                                                  (e) After altering selected CHT coefficients, an inverse
                                                                  two-dimensional multi-polarity CHT is applied by
                                                                  performing the one-dimensional multi-polarity CHT on
                                                                  the columns followed by the rows.


Where I [y,x], T1[y,x] and T2[y,x] refer to pixels in
The original, temporary and transformed images,
respectively. The symbol “:” on the left hand side of
The comma refers to the rows of the image. When the
Symbol “:” appears after the comma, it refers to the
Columns. Width and height denote the dimensions of the
ll quadrant and _· represents the downward truncation. y
and x denote the rows and columns of the images,
respectively. The two-dimensional transformation is
performed by applying the transformation on the rows of
Issn 2250-3005(online)                            October| 2012                                       Page 131
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 6



                                                                 (a) The raw image pixels are extracted from the original
                                                                 and test images in BMP format. The dimensions of the
                                                                 images are adjusted to the next higher multiple of 8 to
                                                                 handle images of different sizes.
                                                                 (b) The following steps are performed for the original
                                                                 image:
                                                                 (1) The original image is decomposed into the pyramid
                                                                 structure using the modified multi-resolution multi
                                                                 polarity WHT.
                                                                 (2) A forward multi-polarity CHT is performed on the
                                                                 segmented 8×8 blocks of the LFB.
                                                                 (3) The watermark is inserted.
                                                                 (4) An inverse multi-polarity CHT is performed and all
                                                                 the imaginary parts are set to zero.
                                                                 (5) An inverse modified multi-resolution multi-polarity
                                                                 WHT is computed and the results of the inverse
                                                                 transformation are limited in the range from 0 to 255.
                                                                 (6) A modified multi-resolution multi-polarity WHT is
                                                                 performed again followed by the forward multi polarity
                                                                 CHT of the segmented 8 × 8 blocks of the
                                                                 LFB.
                                                                 (c) A modified multi-resolution multi-polarity WHT is
                                                                 performed on the test image followed by the forward
                                                                 multi polarity CHT of the segmented 8 ×8 blocks of the
                                                                 LFB.
                                                                 (d) A comparison of selected CHT transform coefficients
                                                                 of both images is performed.
(f) The inverse modified multi-resolution multi-polarity         The flow chart for the verification of watermark is given
WHT is applied three times. The construction of the              in Fig. 4. D1,D2 and D3 are three predefined thresholds
watermarked image from the altered transformed image             obtained empirically that are equal to 1.25◦ , 0.5n and
is performed using the following inverse transformation:         17.5, respectively. The number of elements in the
                                                                 watermark sequence is n. If the absolute phase difference
                                                                 (qi ) of the respective transform coefficients from the
                                                                 original watermarked
                                                                 (wi ) and test (yi ) images exceeds D1, the particular
                                                                 selected transform coefficient fails the watermark test.
                                                                 The test image is considered to be a watermarked copy of
                                                                 the image if either one of the following conditions is
                                                                 satisfied:
                                                                 (1) The number of selected transform coefficients r
                                                                 clearing the watermark test is equal to n.
                                                                 (2) r is greater than D2 and the test parameter u is greater
where I1[y,x], T1[y,x] and T3[y,x] refer to pixels in            than D3.
the reconstructed, temporary and altered transformed
images, respectively.
(g) BMP file format is applied to create the watermarked
copy of the original image.

IV. Extraction of Water mark:
         Figure 3 summarizes the stages involved in the
extraction of watermark. It should be noticed that the
watermark detector does not need the original image
when a hash of the original image is used as a watermark.
The steps to extract the embedded watermark are
performed as follows:                                                Fig.4.Original and watermarked versions of Lena

Issn 2250-3005(online)                           October| 2012                                        Page 132
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 6



The above-mentioned test parameters are defined as               respect to the original image is 41.34 dB. The
follows:                                                         watermarked image is subjected to a series of tests to
                                                                 gauge the robustness of the embedded watermark such
                                                                 as:
                                                                 (a) Uniqueness of Watermark: Fig shows the response of
                                                                 the watermark detector to 1000 randomly generated
                                                                 watermarks of which only one matches the watermark
                                                                 embedded in Fig. . The positive response due to the
                                                                 correct watermark is very much stronger than the
                                                                 response due to incorrect watermark.
                                                                 (b) JPEG Compression: In this test, the watermarked
                                                                 image is compressed using the standard JPEG encoding .
                                                                 Figure shows a JPEG encoded version of Lena at 10%
                                                                 quality factor and 0% smoothing. The embedded
                                                                 watermark is still detected even though the JPEG
                                                                 encoded image is clearly distorted. Table 1 lists the
                                                                 results for the JPEG compression tests from 10% to
                                                                 100% quality factor.




   Fig. 5 Watermark detector response (uniqueness of
                     watermark)




Fig. 6 JPEG encoded version of Lena at 10% quality and
0% smoothing.

V. Experimental results:
         The proposed watermarking technique has been
implemented in the C language. In order to evaluate the
proposed technique, the original grey scale image (Lena
from [2]) of 256 × 256 pixels shown in Fig. is
watermarked using the proposed scheme. The
watermarked version is shown in Fig.. The robustness of          Fig. 7 Image of Lena after five successive watermarking
the watermark depends directly on the embedding                                        operations
strength, which in turn influences the visual degradation
of the image. The PSNR of the watermarked image with
Issn 2250-3005(online)                           October| 2012                                      Page 133
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 6



                                                                    4.    Falkowski, B.J.: Properties and ways of
                                                                          calculation of multi polarity generalized Walsh
                                                                          transforms. IEEE Trans. Circuits Syst. II: Analog
                                                                          Digit. Signal Process. 41(6), 380–391 (1994)
                                                                    5.    Falkowski, B.J.: Family of generalized multi-
                                                                          polarity complex Hadamard transforms. IEE
                                                                          Proc. Vis. Image Signal Process. 145(6), 371–378
                                                                          (1998)
                                                                    6.    Falkowski, B.J., Rahardja, S.: Complex
                                                                          Hadamard transforms: properties, relations and
                                                                          architecture. IEICE Trans. Fundam. Electron.
                                                                          Commun. Comput. Sci. E87-A(8), 2077–2083
                                                                          (2004)
                                                                    7.    Jahne, B.: Digital Image Processing, 5th edn.
                                                                          Springer, Berlin (2002)
                                                                    8.    Ó Ruanaidh, J.J.K., Dowling, W.J., Boland, F.M.:
                                                                          Watermarking digital images for copyright
     Fig. 8 Watermark detector response (successive                       protection. IEE Proc. Vis. Image Signal Process.
                    watermarking)                                         143(4), 250–256 (1996)
                                                                    9.    Ó Ruanaidh, J.J.K., Dowling, W.J., Boland, F.M.:
(c) Successive watermarking: The original image is                        Phase watermarking of digital images. In: Proc.
watermarked, the watermarked image is then                                IEEE Int. Conf. on Image Processing, pp. 239–
watermarked and so on. This can be considered as                          242 (1996)
another form of attack in which it is clear that significant        10.   Plataniotis, K.N., Venetsanopoulos, A.N.: Color
image degradation eventually occurs as the process is                     Image Processing and Applications. Springer,
repeated. After five successive watermarking operations,                  Berlin (2000)
the five watermarks are still detected in the resulting             11.   Proakis, J.G.: Digital Communications, 4th edn.
image (PSNR = 31.18 dB) shown in Fig.7. In the                            McGraw-Hill, New York (2001)
response of the watermark detector given in Fig.8, the              12.   Rahardja, S., Falkowski, B.J.: Comparative study
five spikes clearly indicate the presence of the                          of discrete orthogonal transforms in adaptive
watermarks      and    demonstrate      that     successive               signal processing. IEICE Trans. Fundam.
watermarking does not remove the embedded                                 Electron. Commun. Comput. Sci. E82-A(8),
watermarks.                                                               1386–1390 (1999)
                                                                    13.   Rahardja, S., Falkowski, B.J.: Family of unified
VI. Conclusion:                                                           complex
         A new hybrid technique for watermarking grey                     Hadamard transforms. IEEE Trans. Circuits Syst.
scale images based on the multi-resolution modified                       II: Analog Digit. Signal Process. 46(8), 1094–
multi-polarity WHT and CHT is proposed and developed.                     1100 (1999)
The quality of the watermarked image is very good. The              14.   Rahardja, S., Falkowski, B.J.: Complex
proposed technique also exhibits robustness to JPEG                       composite spectra of unified complex Hadamard
compression up to 10% quality factor, successive                          transform for logic functions. IEEE Trans.
watermarking, sharpening, dithering distortion (25%),                     Circuits Syst. II: Analog Digit. Signal Process.
cropping and scaling up to 31.64% of the original image.                  47(11), 1291–1297 (2000)
                                                                    15.   Rahardja, S., Ser, W., Lin, Z.: UCHT-based
References:                                                               complex sequences for asynchronous CDMA
1.    Agaian, S.S.: Hadamard Matrices and Their                           system. IEEE Trans. Commun. 51(4), 618–626
      Applications. Lecture Notes in Mathematics, vol.                    (2003)
      1168. Springer, Berlin (1980)                                 16.   Robin, M., Poulin, M.: Digital Television
2.      CityU-IPL           Image        Database       at                Fundamentals: Design and Installation of Video
      http://www.image.cityu.hk/ imagedb/                                 and Audio Systems. McGraw-Hill, New York
3.    Cox, I.J., Killian, J., Leighton, F.T., Shamoon, T.:                (1998)
      Secure spread spectrum watermarking for                       17.   Rojaini, K.B.: Programming in C with Numerical
      multimedia. IEEE Trans. Image Process. 6(12),                       Methods for Engineers. Prentice Hall, Englewood
      1673–1687 (1997)                                                    Cliffs (1996) 1


Issn 2250-3005(online)                              October| 2012                                     Page 134
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 6



18.    Swanson, M.D., Kobayashi, M., Tewfik, A.H.:
       Multimedia dataembedding and watermarking
       techniques. Proc. IEEE 86(6),1064–1087 (1998)
19.    Tian, J.: Wavelet-based reversible watermarking
       for authentication.In: Proc. SPIE Security and
       Watermarking of Multimedia Contents IV, San
       Jose, USA, pp. 679–690 (2002)
20.    Wallace, G.K.: The JPEG still picture                    P.Prem Kishan working as an Assistant Professor in
       compression standard. Commun.ACM 34(4), 30–              MLRIT, His area of interest is VLSI & Signal
       44 (1991)
                                                                processing.
21.    Xie, S., Rahardja, S.: Performance evaluation for
       quaternary DSSSMA communications with
       complex signature sequences over Rayleigh-
       fading channels. IEEE Trans. Wirel. Commun.
       4(1), 266–277 (2005)
22.    Yaroslavsky, L.P.: Digital Picture Processing.
       Springer, Berlin (1985)

                     AUTHORS:
                                                                J.Chandra Shekar working as Assistant Professor in
                                                                ST. Peters college of Engineering, Hyderabad and his
                                                                area of interest Fiber Optic Instrumentation and
                                                                Communication, Wireless communication




Mr.SK. Khamuruddeen working as an Assistant
Professor in Hyderabad Institute of Technology &
Management, His area of interest is VLSI & System
Design. you can reach him.
                                                                G.Shravan Kumar working as an Assistant Professor in
                                                                MLRIT, His area of interest is VLSI & System Design.




Mrs. S. V. Devika Working as an Associate Professor in
Hyderabad Institute of Technology & Management, her
area of interest is communications, VLSI & Antenna
theory.                                                         Mrs. G.Swetha as an Associate Professor in ACTS, her
                                                                area of interest is communications, VLSI & Antenna
                                                                theory.




Neerugatti Viswanath working as Assistant Professor in
ST. Peters college of Engineering, Hyderabad and his
area of interest is signal processing and communication
engineering.


Issn 2250-3005(online)                          October| 2012                                      Page 135

Weitere ähnliche Inhalte

Was ist angesagt?

Fractal Compression of an AVI Video File using DWT and Particle Swarm Optimiz...
Fractal Compression of an AVI Video File using DWT and Particle Swarm Optimiz...Fractal Compression of an AVI Video File using DWT and Particle Swarm Optimiz...
Fractal Compression of an AVI Video File using DWT and Particle Swarm Optimiz...IJCSIS Research Publications
 
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...ijcsit
 
Dynamic Texture Coding using Modified Haar Wavelet with CUDA
Dynamic Texture Coding using Modified Haar Wavelet with CUDADynamic Texture Coding using Modified Haar Wavelet with CUDA
Dynamic Texture Coding using Modified Haar Wavelet with CUDAIJERA Editor
 
Springer base paper
Springer base paperSpringer base paper
Springer base paperchndu
 
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domainpaperpublications3
 
FPGA Based Design of High Performance Decimator using DALUT Algorithm
FPGA Based Design of High Performance Decimator using DALUT AlgorithmFPGA Based Design of High Performance Decimator using DALUT Algorithm
FPGA Based Design of High Performance Decimator using DALUT AlgorithmIDES Editor
 
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...CSCJournals
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
 
Simple and Fast Implementation of Segmented Matrix Algorithm for Haar DWT on ...
Simple and Fast Implementation of Segmented Matrix Algorithm for Haar DWT on ...Simple and Fast Implementation of Segmented Matrix Algorithm for Haar DWT on ...
Simple and Fast Implementation of Segmented Matrix Algorithm for Haar DWT on ...IDES Editor
 
Fractal Image Compression Using Quadtree Decomposition
Fractal Image Compression Using Quadtree DecompositionFractal Image Compression Using Quadtree Decomposition
Fractal Image Compression Using Quadtree DecompositionHarshit Varshney
 
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...CSCJournals
 
Design and implementation of DADCT
Design and implementation of DADCTDesign and implementation of DADCT
Design and implementation of DADCTSatish Kumar
 
Discrete cosine transform
Discrete cosine transform   Discrete cosine transform
Discrete cosine transform Rashmi Karkra
 
High Speed and Area Efficient 2D DWT Processor Based Image Compression
High Speed and Area Efficient 2D DWT Processor Based Image CompressionHigh Speed and Area Efficient 2D DWT Processor Based Image Compression
High Speed and Area Efficient 2D DWT Processor Based Image Compressionsipij
 

Was ist angesagt? (20)

Fractal Compression of an AVI Video File using DWT and Particle Swarm Optimiz...
Fractal Compression of an AVI Video File using DWT and Particle Swarm Optimiz...Fractal Compression of an AVI Video File using DWT and Particle Swarm Optimiz...
Fractal Compression of an AVI Video File using DWT and Particle Swarm Optimiz...
 
Ppt
PptPpt
Ppt
 
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
 
G04654247
G04654247G04654247
G04654247
 
Dynamic Texture Coding using Modified Haar Wavelet with CUDA
Dynamic Texture Coding using Modified Haar Wavelet with CUDADynamic Texture Coding using Modified Haar Wavelet with CUDA
Dynamic Texture Coding using Modified Haar Wavelet with CUDA
 
Springer base paper
Springer base paperSpringer base paper
Springer base paper
 
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
 
E017263040
E017263040E017263040
E017263040
 
H0545156
H0545156H0545156
H0545156
 
FPGA Based Design of High Performance Decimator using DALUT Algorithm
FPGA Based Design of High Performance Decimator using DALUT AlgorithmFPGA Based Design of High Performance Decimator using DALUT Algorithm
FPGA Based Design of High Performance Decimator using DALUT Algorithm
 
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domains
 
Simple and Fast Implementation of Segmented Matrix Algorithm for Haar DWT on ...
Simple and Fast Implementation of Segmented Matrix Algorithm for Haar DWT on ...Simple and Fast Implementation of Segmented Matrix Algorithm for Haar DWT on ...
Simple and Fast Implementation of Segmented Matrix Algorithm for Haar DWT on ...
 
K42016368
K42016368K42016368
K42016368
 
Gh2411361141
Gh2411361141Gh2411361141
Gh2411361141
 
Fractal Image Compression Using Quadtree Decomposition
Fractal Image Compression Using Quadtree DecompositionFractal Image Compression Using Quadtree Decomposition
Fractal Image Compression Using Quadtree Decomposition
 
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
 
Design and implementation of DADCT
Design and implementation of DADCTDesign and implementation of DADCT
Design and implementation of DADCT
 
Discrete cosine transform
Discrete cosine transform   Discrete cosine transform
Discrete cosine transform
 
High Speed and Area Efficient 2D DWT Processor Based Image Compression
High Speed and Area Efficient 2D DWT Processor Based Image CompressionHigh Speed and Area Efficient 2D DWT Processor Based Image Compression
High Speed and Area Efficient 2D DWT Processor Based Image Compression
 

Andere mochten auch

中级人生宝典4
中级人生宝典4中级人生宝典4
中级人生宝典4Baishen Cao
 
好笑(王英明)
好笑(王英明)好笑(王英明)
好笑(王英明)cci65 cci
 
Team2-Week8
Team2-Week8Team2-Week8
Team2-Week8NTCBmkt
 
中国pinterest们的怪圈
中国pinterest们的怪圈 中国pinterest们的怪圈
中国pinterest们的怪圈 puting
 
130810 55m business communication
130810 55m  business communication130810 55m  business communication
130810 55m business communicationKenji Fukuta
 
文明与野蛮的较量 一处中国共产主义社区的发展纪实
文明与野蛮的较量  一处中国共产主义社区的发展纪实文明与野蛮的较量  一处中国共产主义社区的发展纪实
文明与野蛮的较量 一处中国共产主义社区的发展纪实Baishen Cao
 
Development of a Cassava Starch Extraction Machine
Development of a Cassava Starch Extraction MachineDevelopment of a Cassava Starch Extraction Machine
Development of a Cassava Starch Extraction Machineijceronline
 
The Myth of Softening behavior of the Cohesive Zone Model Exact derivation of...
The Myth of Softening behavior of the Cohesive Zone Model Exact derivation of...The Myth of Softening behavior of the Cohesive Zone Model Exact derivation of...
The Myth of Softening behavior of the Cohesive Zone Model Exact derivation of...ijceronline
 

Andere mochten auch (8)

中级人生宝典4
中级人生宝典4中级人生宝典4
中级人生宝典4
 
好笑(王英明)
好笑(王英明)好笑(王英明)
好笑(王英明)
 
Team2-Week8
Team2-Week8Team2-Week8
Team2-Week8
 
中国pinterest们的怪圈
中国pinterest们的怪圈 中国pinterest们的怪圈
中国pinterest们的怪圈
 
130810 55m business communication
130810 55m  business communication130810 55m  business communication
130810 55m business communication
 
文明与野蛮的较量 一处中国共产主义社区的发展纪实
文明与野蛮的较量  一处中国共产主义社区的发展纪实文明与野蛮的较量  一处中国共产主义社区的发展纪实
文明与野蛮的较量 一处中国共产主义社区的发展纪实
 
Development of a Cassava Starch Extraction Machine
Development of a Cassava Starch Extraction MachineDevelopment of a Cassava Starch Extraction Machine
Development of a Cassava Starch Extraction Machine
 
The Myth of Softening behavior of the Cohesive Zone Model Exact derivation of...
The Myth of Softening behavior of the Cohesive Zone Model Exact derivation of...The Myth of Softening behavior of the Cohesive Zone Model Exact derivation of...
The Myth of Softening behavior of the Cohesive Zone Model Exact derivation of...
 

Ähnlich wie nternational Journal of Computational Engineering Research(IJCER)

[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...
[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...
[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...Seiya Ito
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
Image compression using Hybrid wavelet Transform and their Performance Compa...
Image compression using Hybrid wavelet Transform and their  Performance Compa...Image compression using Hybrid wavelet Transform and their  Performance Compa...
Image compression using Hybrid wavelet Transform and their Performance Compa...IJMER
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption cscpconf
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...ijistjournal
 
Poster Segmentation Chain
Poster Segmentation ChainPoster Segmentation Chain
Poster Segmentation ChainRMwebsite
 
0 nidhi sethi_finalpaper--1-5
0 nidhi sethi_finalpaper--1-50 nidhi sethi_finalpaper--1-5
0 nidhi sethi_finalpaper--1-5Alexander Decker
 
Intelligent Parallel Processing and Compound Image Compression
Intelligent Parallel Processing and Compound Image CompressionIntelligent Parallel Processing and Compound Image Compression
Intelligent Parallel Processing and Compound Image CompressionDR.P.S.JAGADEESH KUMAR
 
Novel Approach for Image Restoration and Transmission
Novel Approach for Image Restoration and TransmissionNovel Approach for Image Restoration and Transmission
Novel Approach for Image Restoration and TransmissionCSCJournals
 
Image Denoising Techniques Preserving Edges
Image Denoising Techniques Preserving EdgesImage Denoising Techniques Preserving Edges
Image Denoising Techniques Preserving EdgesIDES Editor
 
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder TheoremRobust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder TheoremjournalBEEI
 
Gray Image Watermarking using slant transform - digital image processing
Gray Image Watermarking using slant transform - digital image processingGray Image Watermarking using slant transform - digital image processing
Gray Image Watermarking using slant transform - digital image processingNITHIN KALLE PALLY
 
Aw2419401943
Aw2419401943Aw2419401943
Aw2419401943IJMER
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
 
ANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKINGANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKINGijma
 

Ähnlich wie nternational Journal of Computational Engineering Research(IJCER) (20)

Ijetr011837
Ijetr011837Ijetr011837
Ijetr011837
 
[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...
[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...
[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Image compression using Hybrid wavelet Transform and their Performance Compa...
Image compression using Hybrid wavelet Transform and their  Performance Compa...Image compression using Hybrid wavelet Transform and their  Performance Compa...
Image compression using Hybrid wavelet Transform and their Performance Compa...
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption
 
Ijetcas14 504
Ijetcas14 504Ijetcas14 504
Ijetcas14 504
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
 
Poster Segmentation Chain
Poster Segmentation ChainPoster Segmentation Chain
Poster Segmentation Chain
 
0 nidhi sethi_finalpaper--1-5
0 nidhi sethi_finalpaper--1-50 nidhi sethi_finalpaper--1-5
0 nidhi sethi_finalpaper--1-5
 
Intelligent Parallel Processing and Compound Image Compression
Intelligent Parallel Processing and Compound Image CompressionIntelligent Parallel Processing and Compound Image Compression
Intelligent Parallel Processing and Compound Image Compression
 
Novel Approach for Image Restoration and Transmission
Novel Approach for Image Restoration and TransmissionNovel Approach for Image Restoration and Transmission
Novel Approach for Image Restoration and Transmission
 
Image Denoising Techniques Preserving Edges
Image Denoising Techniques Preserving EdgesImage Denoising Techniques Preserving Edges
Image Denoising Techniques Preserving Edges
 
Lq2419491954
Lq2419491954Lq2419491954
Lq2419491954
 
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder TheoremRobust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
 
Gray Image Watermarking using slant transform - digital image processing
Gray Image Watermarking using slant transform - digital image processingGray Image Watermarking using slant transform - digital image processing
Gray Image Watermarking using slant transform - digital image processing
 
Aw2419401943
Aw2419401943Aw2419401943
Aw2419401943
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
ANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKINGANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKING
 

Kürzlich hochgeladen

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Kürzlich hochgeladen (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

nternational Journal of Computational Engineering Research(IJCER)

  • 1. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 6 Phase Watermarking Algorithm using Hybrid Multi-Polarity Hadamard Transform Sk. Khamuruddeen1, S.V.Devika2, Neerugatti Vishwanath3, P.Prem Kishan4, J.Chandra Shekar5, G.Shravan Kumar6, G.Swetha7 1 (Assistant Professor, Department of ECE, HITAM, Hyderabad, India) 2 (Associate Professor, Department of ECE, HITAM, Hyderabad, India) 3 (Assistant professor, Department of ECE, ST. Peters Engineering College, Hyderabad) 4 (Assistant professor, Department of ECE, MLRIT, Hyderabad) 5 (Assistant professor, Department of ECE, ST. Peters Engineering College, Hyderabad) 6 (Assistant professor, Department of ECE, MLRIT, Hyderabad) 7 ( Associate Professor, Department of ECE, ACTS, Hyderabad) Abstract In this paper, a robust phase watermarking (a) It should be perceptually invisible and should not algorithm for still images is presented where the result in artifacts that are different from those that may be watermark information is conveyed in the phase seen in the original image. spectrum in the transform domain. Phase watermarking algorithm that uses multi-polarity Walsh-Hadamard and (b) It should be robust to common signal processing Complex Hadamard transform is developed. The operations such as sharpening, resizing, lossy robustness of presented algorithm is investigated by its compression, etc since operations that damage the uniqueness, JPEG encoding, image resizing, dithering watermarked images also damage the embedded data. noise distortions, sharpening, cropping and successive Pirates may also attempt to remove the embedded watermarking. watermark through other modifications to the watermarked images. Keyword’s- Unified complex Hadamard transform A novel hybrid watermarking technique for grey ·Multi-polarity complex Hadamard transform ·Multi- scale images based on the modified multi-resolution polarity Walsh-Hadamard transform ·Phase multi-polarity Walsh-Hadamard and Complex Hadamard watermarking · Spectral techniques transforms has been proposed and implemented in the C language. A series of tests to gauge the robustness of the I. Introduction: watermark is performed and the experimental results are With the explosive growth of the Internet, the also presented. The new watermarking technique based use of digital images is becoming more widespread as on multi-polarity Walsh- Hadamard and Complex digital images are easily transmitted over networked Hadamard transforms can also be used in digital and systems. However, this has also heightened the problem color image processing. of copyright protection. The owners of digital images are reluctant to allow the distribution of their works in a II. Complex Hadamard Transform: networked environment as exact copies can be obtained An orthogonal transform known as the unified easily. Although encryption can be applied to limit access Complex Hadamard Transform (CHT) has recently been to only valid key-holders, there is no way to trace the considered as the tool in spectral approach to logic design reproduction or retransmission of the decrypted images. and in various applications in digital signal processing A digital watermark is intended to complement and communications .The detailed properties and cryptographic processes. It is an imperceptible performance of this transform in the above areas is identification code that is permanently embedded in the available in . To better suit applications in logic design image and remains within the image after the decryption similarly to multi-polarity Walsh-Hadamard transform process. The owner and intended recipients of the image the CHT transform has been generalized to multi-polarity can be identified through the decoding of the embedded transform in . This latter version of the CHT transform is copyrights information in the image. The characteristics used in this article to convey the watermark information. of an effective image watermark are as follows. Some necessary information about basic properties of multi polarity CHT is given below. Issn 2250-3005(online) October| 2012 Page 130
  • 2. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 6 the image. The ll quadrant in Fig. 2 forms another image with half the resolution. The same transformation is applied to this reduced resolution image twice to form the pyramid structure. (c) The lowest frequency band (LFB) is segmented into n 8×8 blocks. III. Novel Hybrid Technique for Watermarking: The design and implementation of a novel (d) The two-dimensional multi-polarity CHT is hybrid transform domain based watermarking technique performed on the segmented 8 × 8 blocks by applying the for grey scale images is described in this section. Figure one dimensional multi-polarity CHT on the rows 1 illustrates the stages involved in the insertion of followed by the columns. The CHT coefficients of a real watermark. It should be noticed that the secret key could image are complex-valued which leads to a magnitude be added easily in our watermarking scheme. The and phase representation for the transformed image. insertion of the watermark consists of the following steps: (a) The raw pixels are extracted from the BMP image and stored in a two-dimensional array. The dimensions of the image are adjusted to the next higher multiple of 8 to handle images of different sizes. For example, the original dimensions of an image are 500 × 300 pixels. The dimensions of the image are adjusted to 504 × 304 pixels, where the additional pixels are filled with 0. (b) The modified multi-resolution integer-valued multi polarity WHT is applied to decompose the image into a pyramid structure with various bands such as the low frequency band, low-high frequency band, high frequency band etc. The modified multi-resolution integer-valued multi-polarity WHT is implemented in two steps and applied three times. The decomposition is performed as follows: (e) After altering selected CHT coefficients, an inverse two-dimensional multi-polarity CHT is applied by performing the one-dimensional multi-polarity CHT on the columns followed by the rows. Where I [y,x], T1[y,x] and T2[y,x] refer to pixels in The original, temporary and transformed images, respectively. The symbol “:” on the left hand side of The comma refers to the rows of the image. When the Symbol “:” appears after the comma, it refers to the Columns. Width and height denote the dimensions of the ll quadrant and _· represents the downward truncation. y and x denote the rows and columns of the images, respectively. The two-dimensional transformation is performed by applying the transformation on the rows of Issn 2250-3005(online) October| 2012 Page 131
  • 3. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 6 (a) The raw image pixels are extracted from the original and test images in BMP format. The dimensions of the images are adjusted to the next higher multiple of 8 to handle images of different sizes. (b) The following steps are performed for the original image: (1) The original image is decomposed into the pyramid structure using the modified multi-resolution multi polarity WHT. (2) A forward multi-polarity CHT is performed on the segmented 8×8 blocks of the LFB. (3) The watermark is inserted. (4) An inverse multi-polarity CHT is performed and all the imaginary parts are set to zero. (5) An inverse modified multi-resolution multi-polarity WHT is computed and the results of the inverse transformation are limited in the range from 0 to 255. (6) A modified multi-resolution multi-polarity WHT is performed again followed by the forward multi polarity CHT of the segmented 8 × 8 blocks of the LFB. (c) A modified multi-resolution multi-polarity WHT is performed on the test image followed by the forward multi polarity CHT of the segmented 8 ×8 blocks of the LFB. (d) A comparison of selected CHT transform coefficients of both images is performed. (f) The inverse modified multi-resolution multi-polarity The flow chart for the verification of watermark is given WHT is applied three times. The construction of the in Fig. 4. D1,D2 and D3 are three predefined thresholds watermarked image from the altered transformed image obtained empirically that are equal to 1.25◦ , 0.5n and is performed using the following inverse transformation: 17.5, respectively. The number of elements in the watermark sequence is n. If the absolute phase difference (qi ) of the respective transform coefficients from the original watermarked (wi ) and test (yi ) images exceeds D1, the particular selected transform coefficient fails the watermark test. The test image is considered to be a watermarked copy of the image if either one of the following conditions is satisfied: (1) The number of selected transform coefficients r clearing the watermark test is equal to n. (2) r is greater than D2 and the test parameter u is greater where I1[y,x], T1[y,x] and T3[y,x] refer to pixels in than D3. the reconstructed, temporary and altered transformed images, respectively. (g) BMP file format is applied to create the watermarked copy of the original image. IV. Extraction of Water mark: Figure 3 summarizes the stages involved in the extraction of watermark. It should be noticed that the watermark detector does not need the original image when a hash of the original image is used as a watermark. The steps to extract the embedded watermark are performed as follows: Fig.4.Original and watermarked versions of Lena Issn 2250-3005(online) October| 2012 Page 132
  • 4. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 6 The above-mentioned test parameters are defined as respect to the original image is 41.34 dB. The follows: watermarked image is subjected to a series of tests to gauge the robustness of the embedded watermark such as: (a) Uniqueness of Watermark: Fig shows the response of the watermark detector to 1000 randomly generated watermarks of which only one matches the watermark embedded in Fig. . The positive response due to the correct watermark is very much stronger than the response due to incorrect watermark. (b) JPEG Compression: In this test, the watermarked image is compressed using the standard JPEG encoding . Figure shows a JPEG encoded version of Lena at 10% quality factor and 0% smoothing. The embedded watermark is still detected even though the JPEG encoded image is clearly distorted. Table 1 lists the results for the JPEG compression tests from 10% to 100% quality factor. Fig. 5 Watermark detector response (uniqueness of watermark) Fig. 6 JPEG encoded version of Lena at 10% quality and 0% smoothing. V. Experimental results: The proposed watermarking technique has been implemented in the C language. In order to evaluate the proposed technique, the original grey scale image (Lena from [2]) of 256 × 256 pixels shown in Fig. is watermarked using the proposed scheme. The watermarked version is shown in Fig.. The robustness of Fig. 7 Image of Lena after five successive watermarking the watermark depends directly on the embedding operations strength, which in turn influences the visual degradation of the image. The PSNR of the watermarked image with Issn 2250-3005(online) October| 2012 Page 133
  • 5. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 6 4. Falkowski, B.J.: Properties and ways of calculation of multi polarity generalized Walsh transforms. IEEE Trans. Circuits Syst. II: Analog Digit. Signal Process. 41(6), 380–391 (1994) 5. Falkowski, B.J.: Family of generalized multi- polarity complex Hadamard transforms. IEE Proc. Vis. Image Signal Process. 145(6), 371–378 (1998) 6. Falkowski, B.J., Rahardja, S.: Complex Hadamard transforms: properties, relations and architecture. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E87-A(8), 2077–2083 (2004) 7. Jahne, B.: Digital Image Processing, 5th edn. Springer, Berlin (2002) 8. Ó Ruanaidh, J.J.K., Dowling, W.J., Boland, F.M.: Watermarking digital images for copyright Fig. 8 Watermark detector response (successive protection. IEE Proc. Vis. Image Signal Process. watermarking) 143(4), 250–256 (1996) 9. Ó Ruanaidh, J.J.K., Dowling, W.J., Boland, F.M.: (c) Successive watermarking: The original image is Phase watermarking of digital images. In: Proc. watermarked, the watermarked image is then IEEE Int. Conf. on Image Processing, pp. 239– watermarked and so on. This can be considered as 242 (1996) another form of attack in which it is clear that significant 10. Plataniotis, K.N., Venetsanopoulos, A.N.: Color image degradation eventually occurs as the process is Image Processing and Applications. Springer, repeated. After five successive watermarking operations, Berlin (2000) the five watermarks are still detected in the resulting 11. Proakis, J.G.: Digital Communications, 4th edn. image (PSNR = 31.18 dB) shown in Fig.7. In the McGraw-Hill, New York (2001) response of the watermark detector given in Fig.8, the 12. Rahardja, S., Falkowski, B.J.: Comparative study five spikes clearly indicate the presence of the of discrete orthogonal transforms in adaptive watermarks and demonstrate that successive signal processing. IEICE Trans. Fundam. watermarking does not remove the embedded Electron. Commun. Comput. Sci. E82-A(8), watermarks. 1386–1390 (1999) 13. Rahardja, S., Falkowski, B.J.: Family of unified VI. Conclusion: complex A new hybrid technique for watermarking grey Hadamard transforms. IEEE Trans. Circuits Syst. scale images based on the multi-resolution modified II: Analog Digit. Signal Process. 46(8), 1094– multi-polarity WHT and CHT is proposed and developed. 1100 (1999) The quality of the watermarked image is very good. The 14. Rahardja, S., Falkowski, B.J.: Complex proposed technique also exhibits robustness to JPEG composite spectra of unified complex Hadamard compression up to 10% quality factor, successive transform for logic functions. IEEE Trans. watermarking, sharpening, dithering distortion (25%), Circuits Syst. II: Analog Digit. Signal Process. cropping and scaling up to 31.64% of the original image. 47(11), 1291–1297 (2000) 15. Rahardja, S., Ser, W., Lin, Z.: UCHT-based References: complex sequences for asynchronous CDMA 1. Agaian, S.S.: Hadamard Matrices and Their system. IEEE Trans. Commun. 51(4), 618–626 Applications. Lecture Notes in Mathematics, vol. (2003) 1168. Springer, Berlin (1980) 16. Robin, M., Poulin, M.: Digital Television 2. CityU-IPL Image Database at Fundamentals: Design and Installation of Video http://www.image.cityu.hk/ imagedb/ and Audio Systems. McGraw-Hill, New York 3. Cox, I.J., Killian, J., Leighton, F.T., Shamoon, T.: (1998) Secure spread spectrum watermarking for 17. Rojaini, K.B.: Programming in C with Numerical multimedia. IEEE Trans. Image Process. 6(12), Methods for Engineers. Prentice Hall, Englewood 1673–1687 (1997) Cliffs (1996) 1 Issn 2250-3005(online) October| 2012 Page 134
  • 6. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 6 18. Swanson, M.D., Kobayashi, M., Tewfik, A.H.: Multimedia dataembedding and watermarking techniques. Proc. IEEE 86(6),1064–1087 (1998) 19. Tian, J.: Wavelet-based reversible watermarking for authentication.In: Proc. SPIE Security and Watermarking of Multimedia Contents IV, San Jose, USA, pp. 679–690 (2002) 20. Wallace, G.K.: The JPEG still picture P.Prem Kishan working as an Assistant Professor in compression standard. Commun.ACM 34(4), 30– MLRIT, His area of interest is VLSI & Signal 44 (1991) processing. 21. Xie, S., Rahardja, S.: Performance evaluation for quaternary DSSSMA communications with complex signature sequences over Rayleigh- fading channels. IEEE Trans. Wirel. Commun. 4(1), 266–277 (2005) 22. Yaroslavsky, L.P.: Digital Picture Processing. Springer, Berlin (1985) AUTHORS: J.Chandra Shekar working as Assistant Professor in ST. Peters college of Engineering, Hyderabad and his area of interest Fiber Optic Instrumentation and Communication, Wireless communication Mr.SK. Khamuruddeen working as an Assistant Professor in Hyderabad Institute of Technology & Management, His area of interest is VLSI & System Design. you can reach him. G.Shravan Kumar working as an Assistant Professor in MLRIT, His area of interest is VLSI & System Design. Mrs. S. V. Devika Working as an Associate Professor in Hyderabad Institute of Technology & Management, her area of interest is communications, VLSI & Antenna theory. Mrs. G.Swetha as an Associate Professor in ACTS, her area of interest is communications, VLSI & Antenna theory. Neerugatti Viswanath working as Assistant Professor in ST. Peters college of Engineering, Hyderabad and his area of interest is signal processing and communication engineering. Issn 2250-3005(online) October| 2012 Page 135