SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
Region Based Undetectable Multiple Image
Watermarking
SHALU SINGH
Department of Computer Science and Engineering
Central University of Rajasthan
IEEE International Conference on Computational Techniques in Information and
Communication Technologies, Delhi, INDIA
11-13 March 2016
Contents
Introduction
Need of Watermarking
Problem Statement
Proposed Work
Conclusion
References
Introduction
Watermark:
Watermark is a designed impression(a pattern, logo or an
image) on the piece of paper or in digital media to
authenticate a document and discourage counterfeiting[7].
Digital Watermarking:
It is a process whereby, arbitrary information; a patterned bits
are encoded into digital media, in such a way as to be
imperceptible to observers[6][7][9].
Digital Image Watermarking:
It is perform on an image.it is process to embedded invisible
signature inside an Image, to show authenticity and proof of
ownership[7].
Continue
Multiple Watermarking:
Different type of techniques uses different watermarks in
digital media object to accomplish different goals.[2][4]
Watermark to convey Ownership Information,to Convey
Caption, to verify that Object Content.
Multiple Watermarking can be classified into four type
according to their insertion method into Host Image.[10][11]
Single Composite Watermarking
Segmented Watermarking
Successive Watermarking
Interactive Embedding
Need of Watermarking[2][7][9]
Proof of ownership
Ownership protection
Redistribution of digital contents
Illegal Copying of digital contents
Tamper Detection
Application of Image Watermarking[7][9]
Copyright Protection and Authentication
Fingerprinting and Digital Signatures
Copy Control and Device Control
Broadcast Monitoring
Data authentication
Further Application
In the field of Medical
Meta data of Information
Covert Channel Communication
Characteristics of Watermarking[6][9]
Robustness: Robustness is the resistance of watermark against
attacks and distortion
Imperceptibility: Imperceptibility of watermarked image shows
that inserted watermark in it, is not detectable or visible
through naked eyes.
Capacity: Capacity is a length of watermark upto certain limit
into the host image.
Security: Algorthim of embedding and extracting watermark
must be non guessable or decodable. Figure
Problem Statement
Detectability of watermark in a domains are major concern.
Proposed Method
We are proposing a multiple watermarking technique to insert
more than one watermark into the host image with the
features benefit of spatial and frequency domain. Who’s
overcomes each other’s drawback.
Proposed Work: Continue
The proposed method contains
Watermark Embedding Process
Watermark Extracting Process
Proposed Work: Continue
Figure : Embedding and Extractinng Process Technique
Propsed Work: Cotinue
Figure : Parts of Watermark Embedding and Extraction
Propsed Work: Cotinue
Watermark Embedding Algorithm: Insertion of watermarks are
divided into three parts called Part-A, Part-B and Part-C.
Step 1:A host image of size M x M divided into two regions
called Region-A and Region-B. Division of regions must be in
such a way that the size of Region-B is 2(n+1) x 2(n+1).Where,
2<=n<=M. Figure
Step 2: Watermark Insertion in Region-A: Watermark-Ws is
inserting in region-A using a LSB technique, at 6th bit plane.
Step 3: Watermark Insertion in Region-B:
Step 3.1: Part A: Apply one level of DWT on the
Region-B. Figure
Step 3.2: Part B:
i. Select LL sub-band whose size is 2n
x 2n
. Apply DFT on it.
Here we got a modified coefficients of LL whose size is same
as LL sub-band.Coefficients of LL sub-bands divided into four
parts of each size is 2n
2 − 1 x 2n
2 − 1 Figure
Proposed Work: Continue
ii. Watermark Insertion for P-1:
a. Select a high and a low DFT coefficients of P-1.
b. Select a block size ‘b’ and a pseudo random number
(PRN-1) of length ‘l’, where b*l = size of P-1.
c. Creation of Watermark W-1: Each frequency band is
replaced by one component of PRN-1 in every block. A
replacement location is selected randomly.
d. Select two scaling factor, ll and hh for low frequencies and
high frequencies respectively. Where ll >= hh.
e. Add W-1 in P-1 by additive scaling method.
iii. Copy P-1 into P-4 because of DFT symmetrical feature.
iv. Watermark Insertion for P-2:
a. Select same frequencies bands for P-2, as selected in P-1.
b. Select a block size ‘b’ and a different pseudo random
number (PRN-2) of length ‘l’, where b*l = size of P-1.
c. Watermark Insertion for P-2.
d. Creation of Watermark W-2: Watermark W-2 is created
same as step 3.2.ii.c with PRN-2.
e. Use same scaling factor to insert W-2 in P-2 as in step
3.2.ii.e.
Proposed Work: Continue
v.Copy P-2 into P-4 because of DFT symmetrical feature.
Step 3.2: Part C:
i. Combine all Watermarked parts P-1, P-2, P-3, P-4 and 2n
2
th
row and col. And apply reverse DFT on Combined image.
ii.Apply reverse DWT on watermarked LL and its respective
sub-bands. This gives us a watermarked Region-B.
Step 4: Combine Watermarked Region-A and Watermarked
Region-B to get a Watermarked Image.
Proposed Work: Continue
Watermark Embedding Algorithm:
To extract a Watermarks a reverse process of embedding is
applied.
Step 1:Divide Watermarked Image into Regions A and B.
Step 2:Extract Watermark Ws from Region-A, by selecting
LSB’s values from 6th bit plane.
Step 3:Apply part-A and part-B on Region-B, and extract
Watermark W1 and W2 from it.
For the detection of watermark from the watermarked image
reference –[5]– is followed.
Conclusion
We propose a multiple watermarking technique with taking
benefits of spatial and frequency domain.
Our motto is to make our watermarks secure and undetectable
with the help of inserting watermarks into different regions.
This method can be widely used in the field of medical to
insert patients sensitive diseases information. And in covert
channel for communication purpose where the insertion of
watermark is undetectable.
References
[1].Radu Ovidiu Preda,“Self-recovery of unauthentic images using
a new digital watermarking approach in the wavelet domain” IEEE
10th International Conference on Communications (COMM), 2014.
[2].Ouazzane Hana, mahersia hela, Hamrouni kamel,“A robust
multiple watermarking scheme based on the DWT”, IEEE 10th
International Multi-Conference on Systems, Signals & Devices
(SSD), 2013.
[3].Yang Qianli,CaiYanhong,“A Digital Image Watermarking
Algorithm Based on Discrete Wavelet Transformand Discrete
Cosine Transform”, in the Proceedings of IEEE International
Symposium on Information Technology in Medicine and Education,
2012.
[4].Sudhir Keshari, Shri Gopal Modani,“Dual watermarking based
on Multiple parameter fractional Fourier transform and LSB
technique”, in the Proceedings of IEEE International Conference
References
[5].Ganic, Emir, Scott D. Dexter, and Ahmet M.Eskicioglu,
“Embedding Multiple Watermarks in the DFT domain using
low-and high Frequency Bands”, in the Proceeding of International
Society for Optics and Photonics, Electronic Imaging, 200
Technologies for the Asia-Pacific Region, 2003.
[6].Mohammed,Ghassan N.,Azman Yasin and Akram M.Zeki,
“Digital Image Watermarking,Analysis of Current Methods”, in the
Proceedings of IEEE International Conference on Advanced
Computer Science Applications and Technologies, 2012.
[7].Frank Y.Shih,“Digital Watermarking and Steganography:
Fundamentals and Techniques”,CRC Press 2012.
[8].B.Sridhar and C. Arun,“On secure multiple image watermarking
techniques using DWT”,in the Proceedings of IEEE 3rd
International Conference on Computing Communication &
Networking Technologies, 2012
References
[9].Vidyasagar M.Potdar,Song Han,Elizabeth Chang,“A Survey of
Digital Image Watermarking Techniques”,in the Proceedings of
IEEE 3rd International Conference on Industrial
Informatics(INDIN), 2005
[10].Sheppard,Nicholas Paul,Reihaneh Safavi-Naini and Philip
Ogunbona,“On multiple watermarking”,in the Proceedings of
ACM, workshop on Multimedia and security:new challenges,2001
[11].Mintzer,Fred and Gordon W.Braudaway,“If one watermark is
good,are more better?”,in the Proceedings of IEEE International
Conference on Acoustics,Speech and Signal Processing, 1999
[12].P. Tao and A.M. Eskicioglu, “ A Method for Image Recovery
in the DFT Domain.”
.....................................ThankYou...............................
Back to page
Back to page
Back to page
Back to page

Weitere ähnliche Inhalte

Was ist angesagt?

Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—a
Agnianbu Wrong
 
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSDIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
debasis sahoo
 

Was ist angesagt? (17)

DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
 
E04122330
E04122330E04122330
E04122330
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
 
Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—a
 
Dz31840846
Dz31840846Dz31840846
Dz31840846
 
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSDIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
 
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDWatermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
 
dwm
dwmdwm
dwm
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics
 
3 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-343 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-34
 
7 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-857 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-85
 

Ähnlich wie Region Based Undectable Multiple Image Watermarking

Visible watermarking using spread spectrum
Visible watermarking using spread spectrumVisible watermarking using spread spectrum
Visible watermarking using spread spectrum
IAEME Publication
 
Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &
Iaetsd Iaetsd
 
Robust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS BasedRobust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS Based
CSCJournals
 
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNICREVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
priyanka singh
 

Ähnlich wie Region Based Undectable Multiple Image Watermarking (20)

1820 1824
1820 18241820 1824
1820 1824
 
1820 1824
1820 18241820 1824
1820 1824
 
Semi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svdSemi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svd
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
 
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELET
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELETEntropy based Digital Watermarking using 2-D Biorthogonal WAVELET
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELET
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Visible watermarking using spread spectrum
Visible watermarking using spread spectrumVisible watermarking using spread spectrum
Visible watermarking using spread spectrum
 
60 312-318
60 312-31860 312-318
60 312-318
 
A0360105
A0360105A0360105
A0360105
 
Robust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueRobust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet Technique
 
Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
 
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
 
Robust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS BasedRobust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS Based
 
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNICREVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
 
Z03301550160
Z03301550160Z03301550160
Z03301550160
 
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
 

Kürzlich hochgeladen

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 

Kürzlich hochgeladen (20)

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 

Region Based Undectable Multiple Image Watermarking

  • 1. Region Based Undetectable Multiple Image Watermarking SHALU SINGH Department of Computer Science and Engineering Central University of Rajasthan IEEE International Conference on Computational Techniques in Information and Communication Technologies, Delhi, INDIA 11-13 March 2016
  • 2. Contents Introduction Need of Watermarking Problem Statement Proposed Work Conclusion References
  • 3. Introduction Watermark: Watermark is a designed impression(a pattern, logo or an image) on the piece of paper or in digital media to authenticate a document and discourage counterfeiting[7]. Digital Watermarking: It is a process whereby, arbitrary information; a patterned bits are encoded into digital media, in such a way as to be imperceptible to observers[6][7][9]. Digital Image Watermarking: It is perform on an image.it is process to embedded invisible signature inside an Image, to show authenticity and proof of ownership[7].
  • 4. Continue Multiple Watermarking: Different type of techniques uses different watermarks in digital media object to accomplish different goals.[2][4] Watermark to convey Ownership Information,to Convey Caption, to verify that Object Content. Multiple Watermarking can be classified into four type according to their insertion method into Host Image.[10][11] Single Composite Watermarking Segmented Watermarking Successive Watermarking Interactive Embedding
  • 5. Need of Watermarking[2][7][9] Proof of ownership Ownership protection Redistribution of digital contents Illegal Copying of digital contents Tamper Detection
  • 6. Application of Image Watermarking[7][9] Copyright Protection and Authentication Fingerprinting and Digital Signatures Copy Control and Device Control Broadcast Monitoring Data authentication Further Application In the field of Medical Meta data of Information Covert Channel Communication
  • 7. Characteristics of Watermarking[6][9] Robustness: Robustness is the resistance of watermark against attacks and distortion Imperceptibility: Imperceptibility of watermarked image shows that inserted watermark in it, is not detectable or visible through naked eyes. Capacity: Capacity is a length of watermark upto certain limit into the host image. Security: Algorthim of embedding and extracting watermark must be non guessable or decodable. Figure
  • 8. Problem Statement Detectability of watermark in a domains are major concern.
  • 9. Proposed Method We are proposing a multiple watermarking technique to insert more than one watermark into the host image with the features benefit of spatial and frequency domain. Who’s overcomes each other’s drawback.
  • 10. Proposed Work: Continue The proposed method contains Watermark Embedding Process Watermark Extracting Process
  • 11. Proposed Work: Continue Figure : Embedding and Extractinng Process Technique
  • 12. Propsed Work: Cotinue Figure : Parts of Watermark Embedding and Extraction
  • 13. Propsed Work: Cotinue Watermark Embedding Algorithm: Insertion of watermarks are divided into three parts called Part-A, Part-B and Part-C. Step 1:A host image of size M x M divided into two regions called Region-A and Region-B. Division of regions must be in such a way that the size of Region-B is 2(n+1) x 2(n+1).Where, 2<=n<=M. Figure Step 2: Watermark Insertion in Region-A: Watermark-Ws is inserting in region-A using a LSB technique, at 6th bit plane. Step 3: Watermark Insertion in Region-B: Step 3.1: Part A: Apply one level of DWT on the Region-B. Figure Step 3.2: Part B: i. Select LL sub-band whose size is 2n x 2n . Apply DFT on it. Here we got a modified coefficients of LL whose size is same as LL sub-band.Coefficients of LL sub-bands divided into four parts of each size is 2n 2 − 1 x 2n 2 − 1 Figure
  • 14. Proposed Work: Continue ii. Watermark Insertion for P-1: a. Select a high and a low DFT coefficients of P-1. b. Select a block size ‘b’ and a pseudo random number (PRN-1) of length ‘l’, where b*l = size of P-1. c. Creation of Watermark W-1: Each frequency band is replaced by one component of PRN-1 in every block. A replacement location is selected randomly. d. Select two scaling factor, ll and hh for low frequencies and high frequencies respectively. Where ll >= hh. e. Add W-1 in P-1 by additive scaling method. iii. Copy P-1 into P-4 because of DFT symmetrical feature. iv. Watermark Insertion for P-2: a. Select same frequencies bands for P-2, as selected in P-1. b. Select a block size ‘b’ and a different pseudo random number (PRN-2) of length ‘l’, where b*l = size of P-1. c. Watermark Insertion for P-2. d. Creation of Watermark W-2: Watermark W-2 is created same as step 3.2.ii.c with PRN-2. e. Use same scaling factor to insert W-2 in P-2 as in step 3.2.ii.e.
  • 15. Proposed Work: Continue v.Copy P-2 into P-4 because of DFT symmetrical feature. Step 3.2: Part C: i. Combine all Watermarked parts P-1, P-2, P-3, P-4 and 2n 2 th row and col. And apply reverse DFT on Combined image. ii.Apply reverse DWT on watermarked LL and its respective sub-bands. This gives us a watermarked Region-B. Step 4: Combine Watermarked Region-A and Watermarked Region-B to get a Watermarked Image.
  • 16. Proposed Work: Continue Watermark Embedding Algorithm: To extract a Watermarks a reverse process of embedding is applied. Step 1:Divide Watermarked Image into Regions A and B. Step 2:Extract Watermark Ws from Region-A, by selecting LSB’s values from 6th bit plane. Step 3:Apply part-A and part-B on Region-B, and extract Watermark W1 and W2 from it. For the detection of watermark from the watermarked image reference –[5]– is followed.
  • 17. Conclusion We propose a multiple watermarking technique with taking benefits of spatial and frequency domain. Our motto is to make our watermarks secure and undetectable with the help of inserting watermarks into different regions. This method can be widely used in the field of medical to insert patients sensitive diseases information. And in covert channel for communication purpose where the insertion of watermark is undetectable.
  • 18. References [1].Radu Ovidiu Preda,“Self-recovery of unauthentic images using a new digital watermarking approach in the wavelet domain” IEEE 10th International Conference on Communications (COMM), 2014. [2].Ouazzane Hana, mahersia hela, Hamrouni kamel,“A robust multiple watermarking scheme based on the DWT”, IEEE 10th International Multi-Conference on Systems, Signals & Devices (SSD), 2013. [3].Yang Qianli,CaiYanhong,“A Digital Image Watermarking Algorithm Based on Discrete Wavelet Transformand Discrete Cosine Transform”, in the Proceedings of IEEE International Symposium on Information Technology in Medicine and Education, 2012. [4].Sudhir Keshari, Shri Gopal Modani,“Dual watermarking based on Multiple parameter fractional Fourier transform and LSB technique”, in the Proceedings of IEEE International Conference
  • 19. References [5].Ganic, Emir, Scott D. Dexter, and Ahmet M.Eskicioglu, “Embedding Multiple Watermarks in the DFT domain using low-and high Frequency Bands”, in the Proceeding of International Society for Optics and Photonics, Electronic Imaging, 200 Technologies for the Asia-Pacific Region, 2003. [6].Mohammed,Ghassan N.,Azman Yasin and Akram M.Zeki, “Digital Image Watermarking,Analysis of Current Methods”, in the Proceedings of IEEE International Conference on Advanced Computer Science Applications and Technologies, 2012. [7].Frank Y.Shih,“Digital Watermarking and Steganography: Fundamentals and Techniques”,CRC Press 2012. [8].B.Sridhar and C. Arun,“On secure multiple image watermarking techniques using DWT”,in the Proceedings of IEEE 3rd International Conference on Computing Communication & Networking Technologies, 2012
  • 20. References [9].Vidyasagar M.Potdar,Song Han,Elizabeth Chang,“A Survey of Digital Image Watermarking Techniques”,in the Proceedings of IEEE 3rd International Conference on Industrial Informatics(INDIN), 2005 [10].Sheppard,Nicholas Paul,Reihaneh Safavi-Naini and Philip Ogunbona,“On multiple watermarking”,in the Proceedings of ACM, workshop on Multimedia and security:new challenges,2001 [11].Mintzer,Fred and Gordon W.Braudaway,“If one watermark is good,are more better?”,in the Proceedings of IEEE International Conference on Acoustics,Speech and Signal Processing, 1999 [12].P. Tao and A.M. Eskicioglu, “ A Method for Image Recovery in the DFT Domain.”