SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013
DOI:10.5121/ijcis.2013.3303 23
BLIND AND ROBUST IMAGES WATERMARKING
BASED ON WAVELET AND EDGE INSERTION
Henri Bruno Razafindradina1
and Attoumani Mohamed Karim2
1
Higher Institute of Technology, Diego Suarez - Madagascar
2
Department of Studies and Projects at the Comoros ICT Regulation Authority, Comoros
ABSTRACT
This paper gives a new scheme of watermarking technique related to insert the mark by adding edge in HH
sub-band of the host image after wavelet decomposition. Contrary to most of the watermarking algorithms
in wavelet domain, our method is blind and results show that it is robust against the JPEG and GIF
compression, histogram and spectrum spreading, noise adding and small rotation. Its robustness against
compression is better than others watermarking algorithms reported in the literature. The algorithm is
flexible because its capacity or robustness can be improved by modifying some parameters.
KEYWORDS
Watermarking, Wavelet, Edge, Multimedia, Copyright
1. INTRODUCTION
Watermarking is a technique which consists in inserting a robust and imperceptible brand in a
host image, in order to protect it against illegal copying. The watermarking algorithms must be
imperceptible to the naked eye, robust against attacks, blind which means : the original image is
not necessary for the detection and extraction of the brand. The wavelet decomposition is much
used in compression, denoising and image watermarking. It has shown its efficiency in
compression with the birth of the JPEG2000 standard. About the use of wavelet watermarking,
compared to other techniques such as Fast Fourier Transform (FFT - Fast Fourier Transform), the
Discrete Cosine Transform (DCT - Discrete Cosine Transform), Spread Spectrum (CDMA - Code
Division Multiple Access), the number of publications in the field of wavelet transform (DWT -
Discrete Wavelet Transform) does not cease to increase. Watermarking scheme such as the
insertion by adding the wavelet coefficients of the brand in the high and low frequency bands of
the image host [1] [2], based on the Delaunay triangulation [3] algorithm, resist several types of
attacks. Several attempts have even been made to combine DWT with other transformed, can be
cited : the Ganic and Al [4] algorithm that inserts the singular values of the brand in those of the
host image, video watermarking proposed by Fan [5] which spreads the bits of the mark before its
insertion, Jiansheng [6] method that inserts the DCT of the mark in the HH band of the host
image after decomposition and finally other hybrid methods [7] [8] [9] [10] [11] [12] [13] based
on mixed transform techniques. Certainly, these techniques are
efficient, but most of them are not blind.
In this paper, we present a new robust and blind watermarking method that change the
coefficients of the HH band by adding edges. The extraction of the brand consists in detecting the
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013
24
edges in the same band. The basics of the wavelet transform are first described, then we will
detail the proposed method and the results will be discussed.
2. THE WAVELET TRANSFORM
The Wavelet Transform is a multi-resolution description of an image. It decomposes an image
into several sub-bands in three different directions : horizontal, vertical and diagonal.
It consists to decompose an image into low and high frequencies using respectively low-pass and
high-pass filters [15] :
and (1)
where H(ω) and G(ω) must be orthogonal :
(2)
The obtained coefficients are :
(3)
The reconstruction IDWT of the original signal is the reverse process of DWT. It is summarized
by the following formula:
(4)
The result is an approximation image having a halved resolution and three detail images which
give the errors between the original image and the approximation image. This transformation is
repeated as many times as necessary to obtain the desired number of sub-bands. After a few levels
of decomposition, the low frequencies are concentrated on the top left corner of the transform and
look like a compressed version of the original image.
3. PROPOSED WATERMARKING SCHEME
3.1. Our Approach
Despite the complexity of the computation of the wavelet coefficients, the DWT is much closer to
the human visual system [14] that the DCT or DFT. In the watermarking insertion part, the first
stage is to decompose the image into four frequency bands denoted LL, HL, LH and HH.
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013
25
Figure 1. One level decomposition with DWT
The proposed algorithm (second stage) inserts a bit of the brand by adding a block of size N × N
in the HH band (high frequency) : the first block (a) shows a bit “1” and the other block ( b)
represents a bit “0” or vice versa.
(a) (b)
Figure 2. Block representing bits to be inserted
These two blocks (a) and (b) can be modeled as edges : the first is a rising and the second is a
falling edge. Therefore, their gradient (formula 5) along the horizontal axis is a peak for (a) and
a hollow for (b).
(5)
The following figure shows the appearance of gradients obtained by differentiating the two
blocks in Figure 2.
Figure 3. Respective gradients of the rising edges (a) and falling (b)
Adding marks inserts rising or falling edges in the image. The extraction of the mark detects the
presence of these edges in the image.
The following figure shows the proposed method :
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013
26
Figure 4. Insertion method
3.2. Insertion Algorithm
To insert a bit, selecting a block noted blocHH of the same size than the mark in the HH band and
then adding two blocks. The insertion algorithm is summarized as follows :
1. Compute the wavelet transform of the image I (we denote this transform IDWT).
2. Add brand in blocHH block by applying the formula :
If (Bit_Of_The_Mark = 1) then
blocHH = blocHH + λ × rising edge
Else
blocHH = blocHH + λ × falling edge
End If
3.Finally, the inverse transformation is applied to the IDWT image to form the watermarked
image.
Where λ is a factor to adjust the robustness and imperceptibility of the technique. In this
algorithm, the edges are matrix formed by -1 (black) and 1 (white).
3.3. Extraction Algorithm
The following figure illustrates the extraction of the mark :
Figure 5. Extraction scheme of the brand
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013
27
The first step isolates all blocks of N × N HH band. The next is to compute the gradient of each
block. The mark is detected by determining the sign of sum of the gradient coefficients. The
following algorithm summarizes the extraction process :
1. Compute the wavelet transform of the watermarked image.
2. Compute the gradient of each blocHH block (there GHH this gradient)
If (Sum_Of_GHH_Coefficients > 0) then
Bit_Of_The_Mark = 1
Else
If (Sum_Of_GHH_Coefficients < 0)
Bit_Of_The_Mark = 0
End If
End If
4. RESULTS
The method was tested with “lena, mandrill and plane” images that have 512 × 512 pixels. The
mark contains 1024 bits. The size of the block to be inserted is 8 × 8. We made several tests by
changing the value of λ and λ = 20 gave an interesting result with a good compromise
robustness / imperceptibility.
The following figures show respectively the original image (a), the inserted mark (b), the
watermarked image (c) and the difference (d) between the original and the watermarked images :
(a) (b) (c)
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013
28
(d)
Figure 6. Original image (a), brand (b) watermarked image (c) difference (d)
The watermark is imperceptible because the average PSNR measured between the two images
(Original and Watermarked) is 26 dB. Figure (d) also illustrates the invisibility of the mark.
The robustness of the technique was evaluated by attacking the watermarked image with filtering
(median filter), addition of Gaussian noise and salt-pepper (different values of the noise standard
deviation σ are shown in Table 1), JPEG compression (Quality Factor QF%), GIF color reducing
and rotation (low rotation). The following table shows the extracted marks and
means of obtained Bit Error Rate (BER) :
Table 1. Reconstructed marks for each type of attacks
Noise (Salt and pepper 0.05) Noise (Salt and pepper 0.1) Noise (Salt and pepper 0.2)
BER = 0.0283 BER = 0.0740 BER = 0.2021
Noise (Gaussien 0.01) Noise (Gaussien 0.05) Noise (Gaussien 0.1)
BER = 0.0088 BER = 0.1152 BER = 0.2012
Median Filtrer (3x3) Median Filtrer (5x5) Median Filtrer (7x7)
BER = 0.0430 BER = 0.3154 BER = 0.2961
JPEG (QF 10%) JPEG (QF 50%) JPEG (QF 90%)
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013
29
BER = 0 BER = 0 BER = 0
GIF Compression Histogram Equalization Rotation 0.25/-.025
BER = 0 BER = 0 BER = 0.4414
5. CONCLUSION AND DISCUSSION
In this paper, we propose a new watermarking method “robust and blind” based on edge insertion.
The image of Table 1 shows that our technique resists to several types of attacks : GIF and JPEG
compression, noise addition, histogram equalization and rotation. Robustness against rotation is
very limited, indeed to an angle greater than 0.25, the method is not more robust. Compared to
the Kuraz [9] method and those described by Kumsawat [8] and Fang [10], ours, which gives a
BER = 0 for all quality factors, provides better robustness to JPEG compression. As described by
Oliveria et al. [15] “an algorithm that is resistant to all kinds of attacks does not exist”, our
algorithm can't solve all the problems in image watermarking field because it also has its limits
(unrobustness with high rotation). But, the method can be improved by adjusting the technical
parameters such as λ or size blocHH :
 By increasing λ, we can improve the robustness of the method, but the imperceptibility of
the mark is no longer respected.
 Capacity (number of bits that can be inserted in the host image) of our technique can be
improved by reducing the size of blocHH. For example, the capacity could be doubled by
halving the number of rows in the block, but this operation would reduce greatly the
robustness of the method.The Sharkas et al. [16] method is also a good solution by
inserting a portion of the mark in another part which will be added to the image host.
ACKNOWLEDGEMENTS
The authors would like to thank IST-D (Institut Supérieur de Technologie d'Antsiranana) for its
Sponsor and Financial Support.
REFERENCES
[1] D. Taskovski, S. Bogdanova, M. Bogdanov, “Digital Watermarking In Wavelet Domain”, First IEEE
Balkan Conference on Signal Processing, Communication, Circuits, and Systems, 2000.
[2] C.Temi, S. Choomchuay, & A. Larsakul, (2005) “A Robust Image Watermarking Using
Multiresolution Analysis of Wavelet”, Proceedings of ISCIT, pp603-606.
[3] O. Berrezoug & M. Chaumont, (2009) “Robust watermarking against desynchronization attacks”
MAJESTIC, Avignon, France.
[4] E. Ganic & A. M. Eskicioglu, (2004) “Robust DWT-SVD Domain Image Watermarking: Embedding
Data in All Frequencies”, MM & SEC'04, September 20-21, Magdeburg, Germany.
[5] L. Fan & F. Yanmei, (2006) “A DWT-Based Video Watermarking Algorithm Applying DS-CDMA”,
IEEE TENCON, Hong Kong, November, Vol. 1, No. 1, , pp1–4.
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013
30
[6] M. Jiansheng, L. Sukang & T. Xiaomei, (2009) “A Digital Watermarking Algorithm Based On DCT
and DWT”, Proceedings of the International Symposium on Web Information Systems and
Applications (WISA'09), Nanchang, P. R. China, pp104-107
[7] R. Takai & K. Nagasaka, “Digital Watermarks Using Discrete Transformation and Spectrum
Spreading”, Systemics cybernetics AND INFORMATICS, Vol. 1, No. 6, pp 66-71.
[8] P. Kumsawat, K. Attakitmongcol & A. Srikew, (2006) “Robustness Evaluation of Multiwavelet-
Based Image Watermarking Techniques”, Proceedings of the 5th WSEAS International Conference
on Applications of Electrical Engineering, Prague, Czech Republic, March 12-14, pp48-53
[9] Y. Kuraz & A. H. Modar, (2008) “Improve Watermark Security Via Wavelet Transform And Cdma
Techniques”, Al-Rafidain Engineering, Vol. 6, No. 3, pp39-49
[10] Y. Fang, S. Q. Wu & W. J. Huang, (2004) “DWT-Based CDMA Watermarking Resisting to
Cropping”, ACTA AUTOMATICA SINICA, Vol. 30, No. 3, pp442-448.
[11] S. P. Maity & M. K. Kundu, (2004) “A Blind CDMA Image Watermarking Scheme In Wavelet
Domain”, International Conference on Image Processing, Vol. 4, pp2633-2636.
[12] Kamble Sushila & Maheshkar Vikas & Agarwal Suneeta & K Srivastava Vinay, (2012) “DWT-SVD
Based Secured Image Watermarking For Copyright Protection using Visual Cryptography”, CS & IT-
CSCP 2012, ITCS, SIP, JSE-2012, CS & IT 04, pp143-150.
[13] Chien-Pen Chuang & Cheng-Hung Liu & Yi-Tsai Liao & Huan-Wei Chi, (2012) “A Robust Digital
Watermarking with Mixed Transform Technique for Digital Image”, Proceedings of the International
MultiConference of Engineers and Computer Scientists 2012, Vol 1, pp708-711.
[14] V. Potdar, S. Han & E. Chang, (2005) “A Survey of Digital Image Watermarking Techniques”, 3rd
International Conference on Industrial Informatics (INDIN 2005), pp709-716.
[15] S. R. M. Oliveira, M. A. Nascimento & O. R. Zaïane, (2002) “Digital watermarking: status,
limitations and prospects”, Technical Report TR 02-01, Department Of Computing Science,
University of Alberta, Edmonton, Canada, 2002.
[16] M. Sharkas, D. ElShafie, & N. Hamdy, (2005) “A Dual Digital-Image Watermarking Technique”,
World Academy of Science, Engineering and Technology, pp136-139.
Authors
Henri Bruno Razafindradina was born in Fianarantsoa, Madagascar, on 1978. He
received, respectively, his M.S degree and Ph.D in Computer Science and Information
Engineering in 2005 and 2008. He served since 2010 as a lecturer at the Higher
Institute of Technology Diego Suarez, became an assistant reviewer in 2011. His
current research interests include images compression, multimedia, computer vision,
information hiding.
Karim Attoumani Mohamed is the Technical Assistant in Telecoms and Responsible
of Procurement Management at the Project Implementation Unit (ABGE) for
Comoros. He was the Head of the Department of Studies and Projects at the Comoros
ICT Regulation Authority. He is interested in Image Processing, ICT and Internet
governance

Weitere ähnliche Inhalte

Was ist angesagt?

Effect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital ImagesEffect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital ImagesDr. Michael Agbaje
 
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...csandit
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
 
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space IJEEE
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIX
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIXSQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIX
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIXijcsit
 
Discrete Cosine Transform Stegonagraphy
Discrete Cosine Transform StegonagraphyDiscrete Cosine Transform Stegonagraphy
Discrete Cosine Transform StegonagraphyKaushik Chakraborty
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
 
Iaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing inIaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing inIaetsd Iaetsd
 
Image Texture Analysis
Image Texture AnalysisImage Texture Analysis
Image Texture Analysislalitxp
 
Compression using JPEG
Compression using JPEGCompression using JPEG
Compression using JPEGSabih Hasan
 
SVM Based Saliency Map Technique for Reducing Time Complexity in HEVC
SVM Based Saliency Map Technique for Reducing Time Complexity in HEVCSVM Based Saliency Map Technique for Reducing Time Complexity in HEVC
SVM Based Saliency Map Technique for Reducing Time Complexity in HEVCIRJET Journal
 
A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...
A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...
A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...IRJET Journal
 

Was ist angesagt? (18)

Effect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital ImagesEffect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital Images
 
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
 
40120140501004
4012014050100440120140501004
40120140501004
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics
 
Lossy
LossyLossy
Lossy
 
Aw4101277280
Aw4101277280Aw4101277280
Aw4101277280
 
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIX
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIXSQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIX
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIX
 
Discrete Cosine Transform Stegonagraphy
Discrete Cosine Transform StegonagraphyDiscrete Cosine Transform Stegonagraphy
Discrete Cosine Transform Stegonagraphy
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
 
Ba34321326
Ba34321326Ba34321326
Ba34321326
 
A0360105
A0360105A0360105
A0360105
 
Iaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing inIaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing in
 
Image Texture Analysis
Image Texture AnalysisImage Texture Analysis
Image Texture Analysis
 
Compression using JPEG
Compression using JPEGCompression using JPEG
Compression using JPEG
 
SVM Based Saliency Map Technique for Reducing Time Complexity in HEVC
SVM Based Saliency Map Technique for Reducing Time Complexity in HEVCSVM Based Saliency Map Technique for Reducing Time Complexity in HEVC
SVM Based Saliency Map Technique for Reducing Time Complexity in HEVC
 
A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...
A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...
A Novel Blind SR Method to Improve the Spatial Resolution of Real Life Video ...
 

Andere mochten auch

A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
 
Amazon and Twitter Launch: #AmazonCart
Amazon and Twitter Launch: #AmazonCartAmazon and Twitter Launch: #AmazonCart
Amazon and Twitter Launch: #AmazonCartCMD
 
Content Marketing: Moving From Theory To Practice
Content Marketing: Moving From Theory To PracticeContent Marketing: Moving From Theory To Practice
Content Marketing: Moving From Theory To PracticeCMD
 
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In VanetAn Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanetijcisjournal
 
Facebook and Global Pages
Facebook and Global PagesFacebook and Global Pages
Facebook and Global PagesCMD
 
Top Three Trends at SXSW 2016
Top Three Trends at SXSW 2016Top Three Trends at SXSW 2016
Top Three Trends at SXSW 2016CMD
 
How to be an Instagram Ninja
How to be an Instagram NinjaHow to be an Instagram Ninja
How to be an Instagram NinjaCMD
 
ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATION
ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATIONELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATION
ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATIONijcisjournal
 
Top Social Trends in Early 2016
Top Social Trends in Early 2016 Top Social Trends in Early 2016
Top Social Trends in Early 2016 CMD
 

Andere mochten auch (14)

Manajemen kelas
Manajemen kelasManajemen kelas
Manajemen kelas
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
اللباس
اللباساللباس
اللباس
 
Amazon and Twitter Launch: #AmazonCart
Amazon and Twitter Launch: #AmazonCartAmazon and Twitter Launch: #AmazonCart
Amazon and Twitter Launch: #AmazonCart
 
phrasel verbs
phrasel verbsphrasel verbs
phrasel verbs
 
Content Marketing: Moving From Theory To Practice
Content Marketing: Moving From Theory To PracticeContent Marketing: Moving From Theory To Practice
Content Marketing: Moving From Theory To Practice
 
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In VanetAn Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
 
Facebook and Global Pages
Facebook and Global PagesFacebook and Global Pages
Facebook and Global Pages
 
Top Three Trends at SXSW 2016
Top Three Trends at SXSW 2016Top Three Trends at SXSW 2016
Top Three Trends at SXSW 2016
 
How to be an Instagram Ninja
How to be an Instagram NinjaHow to be an Instagram Ninja
How to be an Instagram Ninja
 
ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATION
ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATIONELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATION
ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATION
 
Bimbingan dan konseling
Bimbingan dan konselingBimbingan dan konseling
Bimbingan dan konseling
 
Warna warna dalam bahasa arab
Warna warna dalam bahasa arabWarna warna dalam bahasa arab
Warna warna dalam bahasa arab
 
Top Social Trends in Early 2016
Top Social Trends in Early 2016 Top Social Trends in Early 2016
Top Social Trends in Early 2016
 

Ähnlich wie BLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTION

International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
 
Robust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueRobust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueCSCJournals
 
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
 
Enhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackEnhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackijfcstjournal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
 
Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofDigital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofIAEME Publication
 
An efficient image compression algorithm using dct biorthogonal wavelet trans...
An efficient image compression algorithm using dct biorthogonal wavelet trans...An efficient image compression algorithm using dct biorthogonal wavelet trans...
An efficient image compression algorithm using dct biorthogonal wavelet trans...eSAT Journals
 
Comparative Study between DCT and Wavelet Transform Based Image Compression A...
Comparative Study between DCT and Wavelet Transform Based Image Compression A...Comparative Study between DCT and Wavelet Transform Based Image Compression A...
Comparative Study between DCT and Wavelet Transform Based Image Compression A...IOSR Journals
 
Feature Based watermarking algorithm for Image Authentication using D4 Wavele...
Feature Based watermarking algorithm for Image Authentication using D4 Wavele...Feature Based watermarking algorithm for Image Authentication using D4 Wavele...
Feature Based watermarking algorithm for Image Authentication using D4 Wavele...sipij
 
4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...
4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...
4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...INFOGAIN PUBLICATION
 
4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...
4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...
4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...INFOGAIN PUBLICATION
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
A Wavelet - Based Object Watermarking System for MPEG4 Video
A Wavelet - Based Object Watermarking System for MPEG4 VideoA Wavelet - Based Object Watermarking System for MPEG4 Video
A Wavelet - Based Object Watermarking System for MPEG4 VideoCSCJournals
 
Kassem2009
Kassem2009Kassem2009
Kassem2009lazchi
 

Ähnlich wie BLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTION (20)

International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
Robust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueRobust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet Technique
 
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
 
Enhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackEnhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attack
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofDigital image watermarking using dct with high security of
Digital image watermarking using dct with high security of
 
1820 1824
1820 18241820 1824
1820 1824
 
1820 1824
1820 18241820 1824
1820 1824
 
H017524854
H017524854H017524854
H017524854
 
An efficient image compression algorithm using dct biorthogonal wavelet trans...
An efficient image compression algorithm using dct biorthogonal wavelet trans...An efficient image compression algorithm using dct biorthogonal wavelet trans...
An efficient image compression algorithm using dct biorthogonal wavelet trans...
 
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
 
Comparative Study between DCT and Wavelet Transform Based Image Compression A...
Comparative Study between DCT and Wavelet Transform Based Image Compression A...Comparative Study between DCT and Wavelet Transform Based Image Compression A...
Comparative Study between DCT and Wavelet Transform Based Image Compression A...
 
I017125357
I017125357I017125357
I017125357
 
Feature Based watermarking algorithm for Image Authentication using D4 Wavele...
Feature Based watermarking algorithm for Image Authentication using D4 Wavele...Feature Based watermarking algorithm for Image Authentication using D4 Wavele...
Feature Based watermarking algorithm for Image Authentication using D4 Wavele...
 
4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...
4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...
4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...
 
4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...
4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...
4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
A Wavelet - Based Object Watermarking System for MPEG4 Video
A Wavelet - Based Object Watermarking System for MPEG4 VideoA Wavelet - Based Object Watermarking System for MPEG4 Video
A Wavelet - Based Object Watermarking System for MPEG4 Video
 
Kassem2009
Kassem2009Kassem2009
Kassem2009
 

Kürzlich hochgeladen

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Kürzlich hochgeladen (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

BLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTION

  • 1. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013 DOI:10.5121/ijcis.2013.3303 23 BLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTION Henri Bruno Razafindradina1 and Attoumani Mohamed Karim2 1 Higher Institute of Technology, Diego Suarez - Madagascar 2 Department of Studies and Projects at the Comoros ICT Regulation Authority, Comoros ABSTRACT This paper gives a new scheme of watermarking technique related to insert the mark by adding edge in HH sub-band of the host image after wavelet decomposition. Contrary to most of the watermarking algorithms in wavelet domain, our method is blind and results show that it is robust against the JPEG and GIF compression, histogram and spectrum spreading, noise adding and small rotation. Its robustness against compression is better than others watermarking algorithms reported in the literature. The algorithm is flexible because its capacity or robustness can be improved by modifying some parameters. KEYWORDS Watermarking, Wavelet, Edge, Multimedia, Copyright 1. INTRODUCTION Watermarking is a technique which consists in inserting a robust and imperceptible brand in a host image, in order to protect it against illegal copying. The watermarking algorithms must be imperceptible to the naked eye, robust against attacks, blind which means : the original image is not necessary for the detection and extraction of the brand. The wavelet decomposition is much used in compression, denoising and image watermarking. It has shown its efficiency in compression with the birth of the JPEG2000 standard. About the use of wavelet watermarking, compared to other techniques such as Fast Fourier Transform (FFT - Fast Fourier Transform), the Discrete Cosine Transform (DCT - Discrete Cosine Transform), Spread Spectrum (CDMA - Code Division Multiple Access), the number of publications in the field of wavelet transform (DWT - Discrete Wavelet Transform) does not cease to increase. Watermarking scheme such as the insertion by adding the wavelet coefficients of the brand in the high and low frequency bands of the image host [1] [2], based on the Delaunay triangulation [3] algorithm, resist several types of attacks. Several attempts have even been made to combine DWT with other transformed, can be cited : the Ganic and Al [4] algorithm that inserts the singular values of the brand in those of the host image, video watermarking proposed by Fan [5] which spreads the bits of the mark before its insertion, Jiansheng [6] method that inserts the DCT of the mark in the HH band of the host image after decomposition and finally other hybrid methods [7] [8] [9] [10] [11] [12] [13] based on mixed transform techniques. Certainly, these techniques are efficient, but most of them are not blind. In this paper, we present a new robust and blind watermarking method that change the coefficients of the HH band by adding edges. The extraction of the brand consists in detecting the
  • 2. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013 24 edges in the same band. The basics of the wavelet transform are first described, then we will detail the proposed method and the results will be discussed. 2. THE WAVELET TRANSFORM The Wavelet Transform is a multi-resolution description of an image. It decomposes an image into several sub-bands in three different directions : horizontal, vertical and diagonal. It consists to decompose an image into low and high frequencies using respectively low-pass and high-pass filters [15] : and (1) where H(ω) and G(ω) must be orthogonal : (2) The obtained coefficients are : (3) The reconstruction IDWT of the original signal is the reverse process of DWT. It is summarized by the following formula: (4) The result is an approximation image having a halved resolution and three detail images which give the errors between the original image and the approximation image. This transformation is repeated as many times as necessary to obtain the desired number of sub-bands. After a few levels of decomposition, the low frequencies are concentrated on the top left corner of the transform and look like a compressed version of the original image. 3. PROPOSED WATERMARKING SCHEME 3.1. Our Approach Despite the complexity of the computation of the wavelet coefficients, the DWT is much closer to the human visual system [14] that the DCT or DFT. In the watermarking insertion part, the first stage is to decompose the image into four frequency bands denoted LL, HL, LH and HH.
  • 3. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013 25 Figure 1. One level decomposition with DWT The proposed algorithm (second stage) inserts a bit of the brand by adding a block of size N × N in the HH band (high frequency) : the first block (a) shows a bit “1” and the other block ( b) represents a bit “0” or vice versa. (a) (b) Figure 2. Block representing bits to be inserted These two blocks (a) and (b) can be modeled as edges : the first is a rising and the second is a falling edge. Therefore, their gradient (formula 5) along the horizontal axis is a peak for (a) and a hollow for (b). (5) The following figure shows the appearance of gradients obtained by differentiating the two blocks in Figure 2. Figure 3. Respective gradients of the rising edges (a) and falling (b) Adding marks inserts rising or falling edges in the image. The extraction of the mark detects the presence of these edges in the image. The following figure shows the proposed method :
  • 4. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013 26 Figure 4. Insertion method 3.2. Insertion Algorithm To insert a bit, selecting a block noted blocHH of the same size than the mark in the HH band and then adding two blocks. The insertion algorithm is summarized as follows : 1. Compute the wavelet transform of the image I (we denote this transform IDWT). 2. Add brand in blocHH block by applying the formula : If (Bit_Of_The_Mark = 1) then blocHH = blocHH + λ × rising edge Else blocHH = blocHH + λ × falling edge End If 3.Finally, the inverse transformation is applied to the IDWT image to form the watermarked image. Where λ is a factor to adjust the robustness and imperceptibility of the technique. In this algorithm, the edges are matrix formed by -1 (black) and 1 (white). 3.3. Extraction Algorithm The following figure illustrates the extraction of the mark : Figure 5. Extraction scheme of the brand
  • 5. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013 27 The first step isolates all blocks of N × N HH band. The next is to compute the gradient of each block. The mark is detected by determining the sign of sum of the gradient coefficients. The following algorithm summarizes the extraction process : 1. Compute the wavelet transform of the watermarked image. 2. Compute the gradient of each blocHH block (there GHH this gradient) If (Sum_Of_GHH_Coefficients > 0) then Bit_Of_The_Mark = 1 Else If (Sum_Of_GHH_Coefficients < 0) Bit_Of_The_Mark = 0 End If End If 4. RESULTS The method was tested with “lena, mandrill and plane” images that have 512 × 512 pixels. The mark contains 1024 bits. The size of the block to be inserted is 8 × 8. We made several tests by changing the value of λ and λ = 20 gave an interesting result with a good compromise robustness / imperceptibility. The following figures show respectively the original image (a), the inserted mark (b), the watermarked image (c) and the difference (d) between the original and the watermarked images : (a) (b) (c)
  • 6. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013 28 (d) Figure 6. Original image (a), brand (b) watermarked image (c) difference (d) The watermark is imperceptible because the average PSNR measured between the two images (Original and Watermarked) is 26 dB. Figure (d) also illustrates the invisibility of the mark. The robustness of the technique was evaluated by attacking the watermarked image with filtering (median filter), addition of Gaussian noise and salt-pepper (different values of the noise standard deviation σ are shown in Table 1), JPEG compression (Quality Factor QF%), GIF color reducing and rotation (low rotation). The following table shows the extracted marks and means of obtained Bit Error Rate (BER) : Table 1. Reconstructed marks for each type of attacks Noise (Salt and pepper 0.05) Noise (Salt and pepper 0.1) Noise (Salt and pepper 0.2) BER = 0.0283 BER = 0.0740 BER = 0.2021 Noise (Gaussien 0.01) Noise (Gaussien 0.05) Noise (Gaussien 0.1) BER = 0.0088 BER = 0.1152 BER = 0.2012 Median Filtrer (3x3) Median Filtrer (5x5) Median Filtrer (7x7) BER = 0.0430 BER = 0.3154 BER = 0.2961 JPEG (QF 10%) JPEG (QF 50%) JPEG (QF 90%)
  • 7. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013 29 BER = 0 BER = 0 BER = 0 GIF Compression Histogram Equalization Rotation 0.25/-.025 BER = 0 BER = 0 BER = 0.4414 5. CONCLUSION AND DISCUSSION In this paper, we propose a new watermarking method “robust and blind” based on edge insertion. The image of Table 1 shows that our technique resists to several types of attacks : GIF and JPEG compression, noise addition, histogram equalization and rotation. Robustness against rotation is very limited, indeed to an angle greater than 0.25, the method is not more robust. Compared to the Kuraz [9] method and those described by Kumsawat [8] and Fang [10], ours, which gives a BER = 0 for all quality factors, provides better robustness to JPEG compression. As described by Oliveria et al. [15] “an algorithm that is resistant to all kinds of attacks does not exist”, our algorithm can't solve all the problems in image watermarking field because it also has its limits (unrobustness with high rotation). But, the method can be improved by adjusting the technical parameters such as λ or size blocHH :  By increasing λ, we can improve the robustness of the method, but the imperceptibility of the mark is no longer respected.  Capacity (number of bits that can be inserted in the host image) of our technique can be improved by reducing the size of blocHH. For example, the capacity could be doubled by halving the number of rows in the block, but this operation would reduce greatly the robustness of the method.The Sharkas et al. [16] method is also a good solution by inserting a portion of the mark in another part which will be added to the image host. ACKNOWLEDGEMENTS The authors would like to thank IST-D (Institut Supérieur de Technologie d'Antsiranana) for its Sponsor and Financial Support. REFERENCES [1] D. Taskovski, S. Bogdanova, M. Bogdanov, “Digital Watermarking In Wavelet Domain”, First IEEE Balkan Conference on Signal Processing, Communication, Circuits, and Systems, 2000. [2] C.Temi, S. Choomchuay, & A. Larsakul, (2005) “A Robust Image Watermarking Using Multiresolution Analysis of Wavelet”, Proceedings of ISCIT, pp603-606. [3] O. Berrezoug & M. Chaumont, (2009) “Robust watermarking against desynchronization attacks” MAJESTIC, Avignon, France. [4] E. Ganic & A. M. Eskicioglu, (2004) “Robust DWT-SVD Domain Image Watermarking: Embedding Data in All Frequencies”, MM & SEC'04, September 20-21, Magdeburg, Germany. [5] L. Fan & F. Yanmei, (2006) “A DWT-Based Video Watermarking Algorithm Applying DS-CDMA”, IEEE TENCON, Hong Kong, November, Vol. 1, No. 1, , pp1–4.
  • 8. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No. 3, September 2013 30 [6] M. Jiansheng, L. Sukang & T. Xiaomei, (2009) “A Digital Watermarking Algorithm Based On DCT and DWT”, Proceedings of the International Symposium on Web Information Systems and Applications (WISA'09), Nanchang, P. R. China, pp104-107 [7] R. Takai & K. Nagasaka, “Digital Watermarks Using Discrete Transformation and Spectrum Spreading”, Systemics cybernetics AND INFORMATICS, Vol. 1, No. 6, pp 66-71. [8] P. Kumsawat, K. Attakitmongcol & A. Srikew, (2006) “Robustness Evaluation of Multiwavelet- Based Image Watermarking Techniques”, Proceedings of the 5th WSEAS International Conference on Applications of Electrical Engineering, Prague, Czech Republic, March 12-14, pp48-53 [9] Y. Kuraz & A. H. Modar, (2008) “Improve Watermark Security Via Wavelet Transform And Cdma Techniques”, Al-Rafidain Engineering, Vol. 6, No. 3, pp39-49 [10] Y. Fang, S. Q. Wu & W. J. Huang, (2004) “DWT-Based CDMA Watermarking Resisting to Cropping”, ACTA AUTOMATICA SINICA, Vol. 30, No. 3, pp442-448. [11] S. P. Maity & M. K. Kundu, (2004) “A Blind CDMA Image Watermarking Scheme In Wavelet Domain”, International Conference on Image Processing, Vol. 4, pp2633-2636. [12] Kamble Sushila & Maheshkar Vikas & Agarwal Suneeta & K Srivastava Vinay, (2012) “DWT-SVD Based Secured Image Watermarking For Copyright Protection using Visual Cryptography”, CS & IT- CSCP 2012, ITCS, SIP, JSE-2012, CS & IT 04, pp143-150. [13] Chien-Pen Chuang & Cheng-Hung Liu & Yi-Tsai Liao & Huan-Wei Chi, (2012) “A Robust Digital Watermarking with Mixed Transform Technique for Digital Image”, Proceedings of the International MultiConference of Engineers and Computer Scientists 2012, Vol 1, pp708-711. [14] V. Potdar, S. Han & E. Chang, (2005) “A Survey of Digital Image Watermarking Techniques”, 3rd International Conference on Industrial Informatics (INDIN 2005), pp709-716. [15] S. R. M. Oliveira, M. A. Nascimento & O. R. Zaïane, (2002) “Digital watermarking: status, limitations and prospects”, Technical Report TR 02-01, Department Of Computing Science, University of Alberta, Edmonton, Canada, 2002. [16] M. Sharkas, D. ElShafie, & N. Hamdy, (2005) “A Dual Digital-Image Watermarking Technique”, World Academy of Science, Engineering and Technology, pp136-139. Authors Henri Bruno Razafindradina was born in Fianarantsoa, Madagascar, on 1978. He received, respectively, his M.S degree and Ph.D in Computer Science and Information Engineering in 2005 and 2008. He served since 2010 as a lecturer at the Higher Institute of Technology Diego Suarez, became an assistant reviewer in 2011. His current research interests include images compression, multimedia, computer vision, information hiding. Karim Attoumani Mohamed is the Technical Assistant in Telecoms and Responsible of Procurement Management at the Project Implementation Unit (ABGE) for Comoros. He was the Head of the Department of Studies and Projects at the Comoros ICT Regulation Authority. He is interested in Image Processing, ICT and Internet governance