SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Short Paper
ACEEE Int. J. on Signal & Image Processing, Vol. 4, No. 2, May 2013

Dual-layer Digital Image Watermarking for Intellectual
Property Right Protection
1

1

Mr. H. E. Suryavanshi, 2Prof. Amit Mishra and 3Prof. Amit Sinhal

Department of Information Technology, Technocrats Institute of Technology, Bhopal, India
hitendra.suryavanshi@gmail.com, 2amitmishra.mtech@gmail.com and 3amit_sinhal@rediffmail.com

Abstract: Digital watermarking is a technique which is widely
used in various application areas such as copyright protection,
copy control, broadcast monitoring etc. In this paper a novel
digital image watermarking technique is presented. To protect
the intellectual property rights, two different watermarks are
inserted in host image. The first watermark is used to monitor
the any changes made in host image while second one is used
as proof of ownership. The performance of proposed system is
good and it withstands against various attacks such as Gaussian
noise, salt and pepper, tampering etc.
Keywords: Digital Watermarking, Discrete Wavelet Transform,
Fragile Watermark, LSB, Robustness.

Fig. 1 General concept of watermarking

1) Visible Watermarking: The idea of visible watermark is very
simple. The logos used in today’s world everywhere is an
example of visible watermark. They are especially used for
conveying the immediate claim of ownership.
2) Invisible Watermarking: In this type of watermarking, rather
than displaying logo, the information is concealed into the
content itself.
3) Fragile Watermarking: Fragile watermarks have limited
robustness. They are used to check whether any modification
had taken place into the watermarked data.
Public Watermarking: These types of watermark are not secure
4) because they can read or viewed by anyone using specific
algorithms.

I. INTRODUCTION
Internet allows the public to exchange the information
without any barriers. This information can be in the form of
text, image, audio and video. The unrestricted access to
information gives birth to some problems such as copyright
violation, piracies etc. watermarking is a techniques developed
to resolve these issues. Watermarking gains a lot of
importance since last decade. It can be defined as a practice
of undetectably modifying a work to embed a message about
that work. Where work can be image, audio, video clip. [1]
In general, digital image watermarking system consist of
two modules: embedder and extractor, as shown in Fig. 1.
The embedder takes two inputs one is message which acts
as watermark, and the other is host image in which we want
to embed the message. The output of embedder is the
watermarked image which can be stored for later use.
Extraction module takes watermarked image and extracts the
message. Most of the extraction modules only check whether
image carries any watermark or not.

II. DISCRETE WAVELET T RANSFORM
Discrete wavelet transform is mathematical tool for
hierarchically decomposing an image. Images are usually
non-stationary two-dimensional signals and wavelet transform
is effective in such case. When discrete wavelet transformation
(DWT) applied on image, it decompose image into four
frequency sub-bands (LL, HL, LH, HH) where LL refers to low
pass band and other three sub-bands corresponds to
horizontal (HL), vertical (LH) and diagonal (HH) high pass
bands [6].

A. Properties of Watermarking System
Watermarking system has number of properties and the
importance of each property depends upon the type of
applications and role that watermark plays. [2]
1) Robustness: The ability of the watermark to survive normal
processing of content.
2) Security: The ability of the watermark to resist hostile
attacks.
3) Fidelity:The perceptual quality of watermarked content.
4) Data payload: The amount of information that can be
carried in awatermark.
B. Classification of Watermarking
Watermarking can be classified into the number of types,
as given below [3][4][5].
© 2013 ACEEE
DOI: 01.IJSIP.4.2.1

Fig.2 Two-level DWT decomposition

Fig. 2 shows two-level DWT decomposition of image. In
38
Short Paper
ACEEE Int. J. on Signal & Image Processing, Vol. 4, No. 2, May 2013

Fig.3 Proposed Watermarking Scheme

general, the watermark can be inserted into low frequency
sub-bands (LL) because it increases the robustness of watermark but at the same time it may degrade the image significantly. High frequency bands (HH) contains edges and textures and changes that are caused due to watermark data
inserted in such band cannot be noticed by human eye [7].
III. PROPOSED WORK
In this section we present our proposed work. As
illustrated in Fig. 3, the watermarking system consists of two
embedders. The role of first embedder is to insert a watermark
into an image by using wavelet transform. This watermark
acts as robust watermark which cannot be removed from host
image. Second embeder inserts watermark which acts as fragile
watermark. This watermark is used to detect any alterations
in an image. Single change in an image can be easily identified
by using the second watermark. Spatial domain technique
such as LSB replacement is used to insert the second
watermark.
A. Watermark Insertion Method
1. Select the Original Image Ic [Mc, Nc] and Watermark Image
W1 [Mw, Nw]
2. Divide Ic and W1 into four sections [I1, I2, I3, I4] and [W1,
W2, W3, W4] by applying following equations
Part 1=Image (1 :( x/2), 1 :( y/2))
Part 2=Image (1 :( x/2), ((y/2) +1) :y)
Part 3=Image ((x/2) +1: x, 1 :( y/2))
Part 4=Image (((x/2) +1): x, ((y/2) +1): y)
Where [x, y] = Size of the Image
3. Select the pair (Ii, Wi) where i=1, 2, 3, 4 and repeat step no
4 to 13 for each pair
4. Apply DWT on Ii to get [CA, CH, CV, CD] coefficients
39
© 2013 ACEEE
DOI: 01.IJSIP.4.2.1

5. Convert Wi into binary watermark (contains 0s and 1s)
6. Resize Wi as Wi [1, Mw×Nw]
7. Set PN sequence generator using Secrete Key-1
8. Repeat step 9 to 12 till (Mw×Nw)
9. Generate PN sequence
10. Calculate β factor as β=PN×K where, k is robustness
factor
11. Select the Coefficients [CH, CV]
12. IF Watermark (Wi) = 1
C=C+β
ELSE
C=C
13. Apply inverse DWT to get Iwi
14. Collect all four section to get watermarked image (Iw)
15. Select the watermark image W2 [Mw, Nw]
16. Resize W2 to [Mc, Nc]
17. Set PN sequence generator using Key-2
18. Repeat the step 19 to 20 till [Mc × Nc]
19. Randomly generate a number R
20. IF R = Even Number
Set Iw (1st bit) to Watermark bit
ELSE
Set Iw (2nd bit) to Watermark bit
21. Final watermarked image (Iw) is obtained
22. Stop
B. Watermark Extraction Method
1. Select the Watermarked Image Iw [Mw, Nw]
2. Divide Iw into four sections [Iw1, Iw2, Iw3, Iw4] using same
equations specified above
3. Create four dummy matrix [M1, M2, M3, M4] containing all
zeros having size [Mw/2, Nw/2]
4. for each (Iwi, Mi) pair repeat step 5 to 9
where i=1, 2, 3, 4
Short Paper
ACEEE Int. J. on Signal & Image Processing, Vol. 4, No. 2, May 2013
5. Apply DWT on Iwi to get [WA, WH, WV, WD]
coefficients
6. Set PN sequence generator using Key-1
7. Repeat step 8 till (Mw/2×Nw/2)
8. Select [WH, WV] coefficients and calculate correlation
9. IF Correlation >= Mean
Set Mi=1
ELSE
Set Mi=0
10. Collect all Mi to get first watermark W1
11. Create a matrix W2 [Mw, Nw]
12. Set PN sequence generator using Key-2
13. Repeat the step 14 to 16
14. Randomly generate a number R
15. IF R = Even Number
Set W2 to Iw (1st bit)
ELSE
Set W2 to Iw (2nd bit)
16. Second watermark image (W2) is obtained
17. Stop

Where, W and W’ are original and extracted watermarks.

IV. RESULT ANALYSIS
This section presents the experimental results of the
proposed digital image watermarking scheme. For the entire
test in this paper MATLAB is used. The performance the
proposed method is tested on 8-bit grayscale image of
baboon, Lena and peppers of size 512×512. Fig 4. Shows the
cover image and two watermarks that can be inserted into
cover image.

(a)

(b)

(d)

(a)

(b)

(c)

Fig.5 (a) Original Image (b) After inserting first watermark (c)
After inserting second watermark

Fig. 5 shows the original image of the baboon, the image
after the insertion of first watermark and second watermark.
The first watermark is inserted using blind watermarking
technique. It is a robust watermark. The second watermark is
a fragile watermark and embedded using LSB substitution
technique. Its purpose is to detect tampering.

(c)

(a)

(e)

(b)

(c)

Fig.6 (a) Watermarked image (b) Extracted first watermark (c)
Extracted second watermark

Fig.4 (a) Babbon (b) Lena (c) Peppers (d) First watermark (e)
Second watermark

The robustness of the proposed watermarking scheme is
tested against the various types of attacks such as, image
tampering, Salt and pepper, Gaussian and Poisson. It is shown
in the fig. 6 to 10.

The performance of the proposed watermarking technique
is evaluated in terms of the invisibility and robustness. The
PSNR (Peak-Signal-to-Noise Ratio) and MSE (Mean Square
Error) are used to measure the quality of the watermarked
image and attacked image. The PSNR is defined as follows
[6] [7]:

Where,
(a)

Where, I and I’ are cover image and watermarked image.
The normalized cross-correlation (NC) is used to check the
quality of original and extracted watermark. [8]
© 2013 ACEEE
DOI: 01.IJSIP.4.2.1

(b)

(c)

Fig. 7 (a) Attacked image (Tampering) (b) Extracted first
watermark (c) Extracted second watermark

40
Short Paper
ACEEE Int. J. on Signal & Image Processing, Vol. 4, No. 2, May 2013
TABLE III. PERFORMANCE
K

(a)

(b)

0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1.0

(c)

Fig. 8 (a) Attacked image (Salt & Pepper) (b) Extracted first
watermark (c) Extracted second watermark

PSNR
38.1598
32.3653
29.0096
26.7119
24.9696
23.5794
22.3656
21.2234
20.2171
19.3119

OF WATERMARKING SYSTEM

Image-3: Peppers.bmp
MSE
7.9413
31.4904
70.5561
124.8649
194.2827
278.5260
377.1564
490.6154
618.5500
761.8840

NC
0.5175
0.6159
0.6952
0.7460
0.8032
0.8413
0.8857
0.9111
0.9429
0.9460

CONCLUSIONS

(a)

In this paper a novel digital image watermarking technique
is presented. This method is based on wavelet. The watermark
is inserted using wavelet coefficient blocks. Watermark
extraction process is independent on the original image.
Watermarks can be extracted in any order. This scheme is
tested against various attacks such as tampering, Gaussian
noise. In the future, we will try to enhance our algorithm to
obtain watermarked images with less distortion and to recover
the watermark with good accuracy.

(b)

Fig. 9 (a) Attacked image (Gaussian Noise) (b) Extracted first
watermark

ACKNOWLEDGMENT
The authors wish to thank Prof. Amit Mishra and Prof.
Amit Sinhal for their valuable guidance.

(a)
(b)
Fig. 10 (a) Attacked image (Poisson) (b) Extracted first watermark

The performance of the system is shown in table 1 to 3 for
different images such as Baboon, Lena and Peppers. For
different values of K, robustness factor, different results are
obtained as given in tables below.
TABLE I. PERFORMANCE
K
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1.0

PSNR
38.6712
32.8323
29.4246
27.0669
25.1983
23.6141
22.2814
21.1269
20.1092
19.1963

0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1.0

PSNR
38.8532
33.0062
29.6291
27.1323
25.1939
23.6085
22.2732
21.1145
20.0935
19.1777

© 2013 ACEEE
DOI: 01.IJSIP.4.2.1

[1] Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica
Fridrich, Ton Kalker, “Digital watermarking and
steganography”, Second Edition, Morgan Kaufmann
Publishers, 2007.
[2] Husrev T. Sencar, Mahalingam Ramkumar, Ali N.
Akansu,”Data hiding fundamentals and applications”, Elsevier
Academic Press, 2004.
[3] Keshav S Rawat, Digital Watermarking Scheme for
Authorization against Copying or Piracy of Color Images,
Indian Journal of Computer Science and Engineering, Vol. 1,
No. 4, 2010, pp. 295-300
[4] Mohamed Abdulla Suhail, Digital watermarking for protection
of intellectual property, (University of Bradford, UK, 2005)
[5] Stefan Katzenbeisser, Fabien A. P. Petitcolas, Information
hiding techniques for steganography and digital watermarking,
Artech House Inc., 2000
[6] Peining Tao and Ahmet M. Eskicioglue, A robust multiple
watermarking scheme in the Discrete Wavelet Transformation
Domain, Proc. SPIE 5601, Internet Multimedia Management
Systems, Philadelphia, PA, 2004
[7] Ali Al-Haj,” Combined DWT-DCT digital image
watermarking”, in Journal of Computer Science 3(9): 740746, 2007, ISSN 1549-3636, © 2007 Science Publications
[8] Hanaa A. Abdallah et. Al. “Blind wavelet-based image
watermarking”, in International Journal of Signal Processing,
Image Processing and Pattern Recognition, Vol. 4, No. 1, March
2011.

OF WATERMARKING SYSTEM

Image-1: Babbon.bmp
MSE
7.9527
31.5237
70.7842
125.7632
196.4499
282.9246
384.5371
501.6401
634.1065
782.4404

TABLE II. PERFORMANCE OF
K

REFERENCES

NC
0.5429
0.5968
0.6508
0.6952
0.7333
0.7651
0.7841
0.8190
0.8413
0.8603

WATERMARKING SYSTEM

Image-2: Lena.bmp
MSE
7.9446
31.5301
70.8231
125.8479
196.6462
283.2924
385.2623
503.0735
636.4056
785.8025

NC
0.5841
0.6952
0.7651
0.8254
0.8730
0.8889
0.9270
0.9524
0.9651
0.9810

41

Weitere ähnliche Inhalte

Was ist angesagt?

Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419
IJRAT
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Non-Blind Deblurring Using Partial Differential Equation Method
Non-Blind Deblurring Using Partial Differential Equation MethodNon-Blind Deblurring Using Partial Differential Equation Method
Non-Blind Deblurring Using Partial Differential Equation Method
Editor IJCATR
 
Paper id 212014133
Paper id 212014133Paper id 212014133
Paper id 212014133
IJRAT
 

Was ist angesagt? (18)

E1083237
E1083237E1083237
E1083237
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419
 
K42016368
K42016368K42016368
K42016368
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domains
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
56 58
56 5856 58
56 58
 
Comparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator ApproachComparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator Approach
 
E1102012537
E1102012537E1102012537
E1102012537
 
PhD_ppt_2012
PhD_ppt_2012PhD_ppt_2012
PhD_ppt_2012
 
Imperceptible and secure image watermarking using DCT and random spread techn...
Imperceptible and secure image watermarking using DCT and random spread techn...Imperceptible and secure image watermarking using DCT and random spread techn...
Imperceptible and secure image watermarking using DCT and random spread techn...
 
Non-Blind Deblurring Using Partial Differential Equation Method
Non-Blind Deblurring Using Partial Differential Equation MethodNon-Blind Deblurring Using Partial Differential Equation Method
Non-Blind Deblurring Using Partial Differential Equation Method
 
Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...
 
An Application of Second Generation Wavelets for Image Denoising using Dual T...
An Application of Second Generation Wavelets for Image Denoising using Dual T...An Application of Second Generation Wavelets for Image Denoising using Dual T...
An Application of Second Generation Wavelets for Image Denoising using Dual T...
 
Paper id 212014133
Paper id 212014133Paper id 212014133
Paper id 212014133
 
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
 
Paper id 28201446
Paper id 28201446Paper id 28201446
Paper id 28201446
 

Andere mochten auch

Andere mochten auch (9)

Software Development for the Analysis and Design of Ship Berthing Structures
Software Development for the Analysis and Design of Ship Berthing StructuresSoftware Development for the Analysis and Design of Ship Berthing Structures
Software Development for the Analysis and Design of Ship Berthing Structures
 
Obstacle Management in VANET using Game Theory and Fuzzy Logic Control
Obstacle Management in VANET using Game Theory and Fuzzy Logic ControlObstacle Management in VANET using Game Theory and Fuzzy Logic Control
Obstacle Management in VANET using Game Theory and Fuzzy Logic Control
 
Genetic Algorithm Optimization of Operating Parameters for Multiobjective Mul...
Genetic Algorithm Optimization of Operating Parameters for Multiobjective Mul...Genetic Algorithm Optimization of Operating Parameters for Multiobjective Mul...
Genetic Algorithm Optimization of Operating Parameters for Multiobjective Mul...
 
Modeling Curvature Damage Surface for Damage Detection in Cantilever Beam
Modeling Curvature Damage Surface for Damage Detection in Cantilever BeamModeling Curvature Damage Surface for Damage Detection in Cantilever Beam
Modeling Curvature Damage Surface for Damage Detection in Cantilever Beam
 
The Effect of Climatic Conditions of Various Regions of Iran on Pavement Fati...
The Effect of Climatic Conditions of Various Regions of Iran on Pavement Fati...The Effect of Climatic Conditions of Various Regions of Iran on Pavement Fati...
The Effect of Climatic Conditions of Various Regions of Iran on Pavement Fati...
 
Resilient Characteristics of Stone Matrix Asphalt Mixes
Resilient Characteristics of Stone Matrix Asphalt MixesResilient Characteristics of Stone Matrix Asphalt Mixes
Resilient Characteristics of Stone Matrix Asphalt Mixes
 
Development of Graphite Particles filled Epoxy Resin Composite Material and i...
Development of Graphite Particles filled Epoxy Resin Composite Material and i...Development of Graphite Particles filled Epoxy Resin Composite Material and i...
Development of Graphite Particles filled Epoxy Resin Composite Material and i...
 
Optimized Neural Network for Classification of Multispectral Images
Optimized Neural Network for Classification of Multispectral ImagesOptimized Neural Network for Classification of Multispectral Images
Optimized Neural Network for Classification of Multispectral Images
 
Numerical and Analytical Solutions for Ovaling Deformation in Circular Tunnel...
Numerical and Analytical Solutions for Ovaling Deformation in Circular Tunnel...Numerical and Analytical Solutions for Ovaling Deformation in Circular Tunnel...
Numerical and Analytical Solutions for Ovaling Deformation in Circular Tunnel...
 

Ähnlich wie Dual-layer Digital Image Watermarking for Intellectual Property Right Protection

MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
ijcisjournal
 
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
ijcisjournal
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
ijcisjournal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 

Ähnlich wie Dual-layer Digital Image Watermarking for Intellectual Property Right Protection (20)

Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
 
Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
 
50120140506015
5012014050601550120140506015
50120140506015
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
 
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
F010413438
F010413438F010413438
F010413438
 
H017524854
H017524854H017524854
H017524854
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
 
Reversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A ReviewReversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A Review
 
E017312532
E017312532E017312532
E017312532
 
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTSecured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWT
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
 
Robust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueRobust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet Technique
 

Mehr von IDES Editor

Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 

Mehr von IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Kürzlich hochgeladen

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

Dual-layer Digital Image Watermarking for Intellectual Property Right Protection

  • 1. Short Paper ACEEE Int. J. on Signal & Image Processing, Vol. 4, No. 2, May 2013 Dual-layer Digital Image Watermarking for Intellectual Property Right Protection 1 1 Mr. H. E. Suryavanshi, 2Prof. Amit Mishra and 3Prof. Amit Sinhal Department of Information Technology, Technocrats Institute of Technology, Bhopal, India hitendra.suryavanshi@gmail.com, 2amitmishra.mtech@gmail.com and 3amit_sinhal@rediffmail.com Abstract: Digital watermarking is a technique which is widely used in various application areas such as copyright protection, copy control, broadcast monitoring etc. In this paper a novel digital image watermarking technique is presented. To protect the intellectual property rights, two different watermarks are inserted in host image. The first watermark is used to monitor the any changes made in host image while second one is used as proof of ownership. The performance of proposed system is good and it withstands against various attacks such as Gaussian noise, salt and pepper, tampering etc. Keywords: Digital Watermarking, Discrete Wavelet Transform, Fragile Watermark, LSB, Robustness. Fig. 1 General concept of watermarking 1) Visible Watermarking: The idea of visible watermark is very simple. The logos used in today’s world everywhere is an example of visible watermark. They are especially used for conveying the immediate claim of ownership. 2) Invisible Watermarking: In this type of watermarking, rather than displaying logo, the information is concealed into the content itself. 3) Fragile Watermarking: Fragile watermarks have limited robustness. They are used to check whether any modification had taken place into the watermarked data. Public Watermarking: These types of watermark are not secure 4) because they can read or viewed by anyone using specific algorithms. I. INTRODUCTION Internet allows the public to exchange the information without any barriers. This information can be in the form of text, image, audio and video. The unrestricted access to information gives birth to some problems such as copyright violation, piracies etc. watermarking is a techniques developed to resolve these issues. Watermarking gains a lot of importance since last decade. It can be defined as a practice of undetectably modifying a work to embed a message about that work. Where work can be image, audio, video clip. [1] In general, digital image watermarking system consist of two modules: embedder and extractor, as shown in Fig. 1. The embedder takes two inputs one is message which acts as watermark, and the other is host image in which we want to embed the message. The output of embedder is the watermarked image which can be stored for later use. Extraction module takes watermarked image and extracts the message. Most of the extraction modules only check whether image carries any watermark or not. II. DISCRETE WAVELET T RANSFORM Discrete wavelet transform is mathematical tool for hierarchically decomposing an image. Images are usually non-stationary two-dimensional signals and wavelet transform is effective in such case. When discrete wavelet transformation (DWT) applied on image, it decompose image into four frequency sub-bands (LL, HL, LH, HH) where LL refers to low pass band and other three sub-bands corresponds to horizontal (HL), vertical (LH) and diagonal (HH) high pass bands [6]. A. Properties of Watermarking System Watermarking system has number of properties and the importance of each property depends upon the type of applications and role that watermark plays. [2] 1) Robustness: The ability of the watermark to survive normal processing of content. 2) Security: The ability of the watermark to resist hostile attacks. 3) Fidelity:The perceptual quality of watermarked content. 4) Data payload: The amount of information that can be carried in awatermark. B. Classification of Watermarking Watermarking can be classified into the number of types, as given below [3][4][5]. © 2013 ACEEE DOI: 01.IJSIP.4.2.1 Fig.2 Two-level DWT decomposition Fig. 2 shows two-level DWT decomposition of image. In 38
  • 2. Short Paper ACEEE Int. J. on Signal & Image Processing, Vol. 4, No. 2, May 2013 Fig.3 Proposed Watermarking Scheme general, the watermark can be inserted into low frequency sub-bands (LL) because it increases the robustness of watermark but at the same time it may degrade the image significantly. High frequency bands (HH) contains edges and textures and changes that are caused due to watermark data inserted in such band cannot be noticed by human eye [7]. III. PROPOSED WORK In this section we present our proposed work. As illustrated in Fig. 3, the watermarking system consists of two embedders. The role of first embedder is to insert a watermark into an image by using wavelet transform. This watermark acts as robust watermark which cannot be removed from host image. Second embeder inserts watermark which acts as fragile watermark. This watermark is used to detect any alterations in an image. Single change in an image can be easily identified by using the second watermark. Spatial domain technique such as LSB replacement is used to insert the second watermark. A. Watermark Insertion Method 1. Select the Original Image Ic [Mc, Nc] and Watermark Image W1 [Mw, Nw] 2. Divide Ic and W1 into four sections [I1, I2, I3, I4] and [W1, W2, W3, W4] by applying following equations Part 1=Image (1 :( x/2), 1 :( y/2)) Part 2=Image (1 :( x/2), ((y/2) +1) :y) Part 3=Image ((x/2) +1: x, 1 :( y/2)) Part 4=Image (((x/2) +1): x, ((y/2) +1): y) Where [x, y] = Size of the Image 3. Select the pair (Ii, Wi) where i=1, 2, 3, 4 and repeat step no 4 to 13 for each pair 4. Apply DWT on Ii to get [CA, CH, CV, CD] coefficients 39 © 2013 ACEEE DOI: 01.IJSIP.4.2.1 5. Convert Wi into binary watermark (contains 0s and 1s) 6. Resize Wi as Wi [1, Mw×Nw] 7. Set PN sequence generator using Secrete Key-1 8. Repeat step 9 to 12 till (Mw×Nw) 9. Generate PN sequence 10. Calculate β factor as β=PN×K where, k is robustness factor 11. Select the Coefficients [CH, CV] 12. IF Watermark (Wi) = 1 C=C+β ELSE C=C 13. Apply inverse DWT to get Iwi 14. Collect all four section to get watermarked image (Iw) 15. Select the watermark image W2 [Mw, Nw] 16. Resize W2 to [Mc, Nc] 17. Set PN sequence generator using Key-2 18. Repeat the step 19 to 20 till [Mc × Nc] 19. Randomly generate a number R 20. IF R = Even Number Set Iw (1st bit) to Watermark bit ELSE Set Iw (2nd bit) to Watermark bit 21. Final watermarked image (Iw) is obtained 22. Stop B. Watermark Extraction Method 1. Select the Watermarked Image Iw [Mw, Nw] 2. Divide Iw into four sections [Iw1, Iw2, Iw3, Iw4] using same equations specified above 3. Create four dummy matrix [M1, M2, M3, M4] containing all zeros having size [Mw/2, Nw/2] 4. for each (Iwi, Mi) pair repeat step 5 to 9 where i=1, 2, 3, 4
  • 3. Short Paper ACEEE Int. J. on Signal & Image Processing, Vol. 4, No. 2, May 2013 5. Apply DWT on Iwi to get [WA, WH, WV, WD] coefficients 6. Set PN sequence generator using Key-1 7. Repeat step 8 till (Mw/2×Nw/2) 8. Select [WH, WV] coefficients and calculate correlation 9. IF Correlation >= Mean Set Mi=1 ELSE Set Mi=0 10. Collect all Mi to get first watermark W1 11. Create a matrix W2 [Mw, Nw] 12. Set PN sequence generator using Key-2 13. Repeat the step 14 to 16 14. Randomly generate a number R 15. IF R = Even Number Set W2 to Iw (1st bit) ELSE Set W2 to Iw (2nd bit) 16. Second watermark image (W2) is obtained 17. Stop Where, W and W’ are original and extracted watermarks. IV. RESULT ANALYSIS This section presents the experimental results of the proposed digital image watermarking scheme. For the entire test in this paper MATLAB is used. The performance the proposed method is tested on 8-bit grayscale image of baboon, Lena and peppers of size 512×512. Fig 4. Shows the cover image and two watermarks that can be inserted into cover image. (a) (b) (d) (a) (b) (c) Fig.5 (a) Original Image (b) After inserting first watermark (c) After inserting second watermark Fig. 5 shows the original image of the baboon, the image after the insertion of first watermark and second watermark. The first watermark is inserted using blind watermarking technique. It is a robust watermark. The second watermark is a fragile watermark and embedded using LSB substitution technique. Its purpose is to detect tampering. (c) (a) (e) (b) (c) Fig.6 (a) Watermarked image (b) Extracted first watermark (c) Extracted second watermark Fig.4 (a) Babbon (b) Lena (c) Peppers (d) First watermark (e) Second watermark The robustness of the proposed watermarking scheme is tested against the various types of attacks such as, image tampering, Salt and pepper, Gaussian and Poisson. It is shown in the fig. 6 to 10. The performance of the proposed watermarking technique is evaluated in terms of the invisibility and robustness. The PSNR (Peak-Signal-to-Noise Ratio) and MSE (Mean Square Error) are used to measure the quality of the watermarked image and attacked image. The PSNR is defined as follows [6] [7]: Where, (a) Where, I and I’ are cover image and watermarked image. The normalized cross-correlation (NC) is used to check the quality of original and extracted watermark. [8] © 2013 ACEEE DOI: 01.IJSIP.4.2.1 (b) (c) Fig. 7 (a) Attacked image (Tampering) (b) Extracted first watermark (c) Extracted second watermark 40
  • 4. Short Paper ACEEE Int. J. on Signal & Image Processing, Vol. 4, No. 2, May 2013 TABLE III. PERFORMANCE K (a) (b) 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 (c) Fig. 8 (a) Attacked image (Salt & Pepper) (b) Extracted first watermark (c) Extracted second watermark PSNR 38.1598 32.3653 29.0096 26.7119 24.9696 23.5794 22.3656 21.2234 20.2171 19.3119 OF WATERMARKING SYSTEM Image-3: Peppers.bmp MSE 7.9413 31.4904 70.5561 124.8649 194.2827 278.5260 377.1564 490.6154 618.5500 761.8840 NC 0.5175 0.6159 0.6952 0.7460 0.8032 0.8413 0.8857 0.9111 0.9429 0.9460 CONCLUSIONS (a) In this paper a novel digital image watermarking technique is presented. This method is based on wavelet. The watermark is inserted using wavelet coefficient blocks. Watermark extraction process is independent on the original image. Watermarks can be extracted in any order. This scheme is tested against various attacks such as tampering, Gaussian noise. In the future, we will try to enhance our algorithm to obtain watermarked images with less distortion and to recover the watermark with good accuracy. (b) Fig. 9 (a) Attacked image (Gaussian Noise) (b) Extracted first watermark ACKNOWLEDGMENT The authors wish to thank Prof. Amit Mishra and Prof. Amit Sinhal for their valuable guidance. (a) (b) Fig. 10 (a) Attacked image (Poisson) (b) Extracted first watermark The performance of the system is shown in table 1 to 3 for different images such as Baboon, Lena and Peppers. For different values of K, robustness factor, different results are obtained as given in tables below. TABLE I. PERFORMANCE K 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 PSNR 38.6712 32.8323 29.4246 27.0669 25.1983 23.6141 22.2814 21.1269 20.1092 19.1963 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 PSNR 38.8532 33.0062 29.6291 27.1323 25.1939 23.6085 22.2732 21.1145 20.0935 19.1777 © 2013 ACEEE DOI: 01.IJSIP.4.2.1 [1] Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, Ton Kalker, “Digital watermarking and steganography”, Second Edition, Morgan Kaufmann Publishers, 2007. [2] Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu,”Data hiding fundamentals and applications”, Elsevier Academic Press, 2004. [3] Keshav S Rawat, Digital Watermarking Scheme for Authorization against Copying or Piracy of Color Images, Indian Journal of Computer Science and Engineering, Vol. 1, No. 4, 2010, pp. 295-300 [4] Mohamed Abdulla Suhail, Digital watermarking for protection of intellectual property, (University of Bradford, UK, 2005) [5] Stefan Katzenbeisser, Fabien A. P. Petitcolas, Information hiding techniques for steganography and digital watermarking, Artech House Inc., 2000 [6] Peining Tao and Ahmet M. Eskicioglue, A robust multiple watermarking scheme in the Discrete Wavelet Transformation Domain, Proc. SPIE 5601, Internet Multimedia Management Systems, Philadelphia, PA, 2004 [7] Ali Al-Haj,” Combined DWT-DCT digital image watermarking”, in Journal of Computer Science 3(9): 740746, 2007, ISSN 1549-3636, © 2007 Science Publications [8] Hanaa A. Abdallah et. Al. “Blind wavelet-based image watermarking”, in International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol. 4, No. 1, March 2011. OF WATERMARKING SYSTEM Image-1: Babbon.bmp MSE 7.9527 31.5237 70.7842 125.7632 196.4499 282.9246 384.5371 501.6401 634.1065 782.4404 TABLE II. PERFORMANCE OF K REFERENCES NC 0.5429 0.5968 0.6508 0.6952 0.7333 0.7651 0.7841 0.8190 0.8413 0.8603 WATERMARKING SYSTEM Image-2: Lena.bmp MSE 7.9446 31.5301 70.8231 125.8479 196.6462 283.2924 385.2623 503.0735 636.4056 785.8025 NC 0.5841 0.6952 0.7651 0.8254 0.8730 0.8889 0.9270 0.9524 0.9651 0.9810 41