Ijrte Wavelet PDF
Ijrte Wavelet PDF
Wavelet
I. INTRODUCTION
A digital watermark can be described as a visible or
preferably invisible identification code that is
permanently embedded in the data. It means that it
remains present within the data after any decryption
process. A general definition can be given as: "Hiding of
a secret message or information within an ordinary
message and the extraction of it at its destination".
Complementary to encryption, it allows some protection
of the data after decryption. The goal is to embed some
information in the image without affecting its visual
content. In the copyright protection context,
watermarking is used to add a key in the multimedia data
that authenticates the legal copyright holder and that
cannot be manipulated or removed without impairing the
data in a way that removes any commercial value.
Figure1 shows a general watermarking scheme in order to
give an idea of the different operations involved in the
process.
The first distinction that one needs to do in the study
of watermarking for digital images is the notion of visible
watermarks versus invisible ones. The first ones are used
to mark, obviously in a clearly detectable way, a digital
image in order to give a general idea of what it looks like
Original
i) Watermarker
ii) Encryption
+
watermark
vi) Comparison
Watermark
Extraction
v) Decoder
iv) Decryption
113
2009 ACADEMY PUBLISHER
Watermarked
POSTER PAPER
International Journal of Recent Trends in Engineering Vol. 1, No. 2, May 2009
visual system (HVS) can be taken into account more
easily when it is time to decide the intensity and position
of the watermarks to be applied to a given image.
II. APPLICATION AREAS
Digital watermarking is considered as an
imperceptible, robust and secure communication of data
related to the host signal, which includes embedding into
and extraction from the host signal. For copy protection
applications, the watermark must be recoverable even
when the watermarked signal undergoes a considerable
level of distortion, while for tamper assessment
applications, the watermark must effectively characterize
the modification that took place. Some applications of
invisible watermarks are listed here: Fingerprinting,
Indexing, Copyright Protection & Owner Identification,
Broadcast Monitoring, Copy Protection, Data
Authentication, Data Hiding (Covert Communications),
Medical Safeties. From the applications mentioned
above, one can divide watermarks into two distinct types:
Robust, for the first five applications and Fragile for the
last three.
Key
Decision,
(Comparison,
Correlation)
Extracted
Signature
Distorted,
Attacked
Image
Extraction
Original
Image
Forward
Transform
(DWT)
Adaptive
Model
(HVS)
Signature
Prepare Data
(Encryption,
Redundancy)
Transform
Coefficients
Embed data
Additive
Quantization
Key
Inverse
Transform
(DWT)
Watermarked
Image
114
2009 ACADEMY PUBLISHER
Embedding
Distortion,
Noise,
Attacks
Signature
Watermarked
Image
POSTER PAPER
International Journal of Recent Trends in Engineering Vol. 1, No. 2, May 2009
only compression adds distortion to the host data, but
also transmission errors and common image processing
tasks, such as contrast enhancements, re-sampling and
gamma correction, contribute errors to the watermarked
image. All manipulation of the watermarked image data
has to be seen as an attack on the embedded information.
Modifications that occur during normal image processing
are called as coincidental attack. The attacks that attempt
to weaken, remove or alter the watermark itself are
termed hostile or intentional attacks.
Public
Detection
Device
Original
Image
Host
Lossy
Image
Compression
JPEG
Transmission
Noise, Image
Processing
Hostile
Attacks,
(Collision etc.)
Known
Image
Enhancement, Algorithm
Cropping,
Rotation
JPEG2000
Progressive
Transmission
Distorted
Image
Similar
Watermarked
Image
Key
C. Extraction Stage
Eventually, after the watermarked image has
undergone severe distortion, one would like to extract the
embedded signature from the host data this can be done
by the party that embedded the watermark, the customer
that received the image, a designated party- such as a web
crawler that scan the internet for illegal copies of the
protected work or a legal prosecution official- or by a
third party. In the first case, the secret key used to embed
the watermark as well as the original image might be
available. We call detection systems that have access to
the secret (private) key and original image non-oblivious,
non-blind or private watermarking systems.
The other extreme is the case where neither the
private key nor the original image is available during the
extraction process. These watermarking systems are
called public key watermarking systems.
Original
Image
(Host)
Forward
Transform
(DWT
Transform
Coefficients
Extract
Data
Adaptive
Model
(HVS)
Distorted
(Attacked)
Image
Forward
Transform
(DWT
Extracted
Signature
Data
Transform
Coefficients
(Distorted)
Key
Recover
Data
D. Decision Stage
V. WATERMARKING ALGORITHM
A. Image Fusion Algorithm
Watermarking
algorithms
which
embed
meaningful data in the form of a logo image instead of a
pseudo-random number sequence are called image-fusion
watermarking algorithms. The logo image is generally
smaller than the host image. Before being added to the
host signal, the logo image is encrypted (de-correlated)
and suitably transformed.
There are two important advantages of embedding
a logo image as watermark data. First, the extracted
image can be correlated with the originally embedded
image by a human observer, building on the superior
pattern-matching capabilities of the human brain. Second
the existence of a visual logo in the questionable image
might be much better proof of ownership than a high
statistical correlation value.
Watermark: The Watermark is a gray scale
image, with as least 25% of the host image size.
Decomposition: The algorithm proposes using 2-level
decomposition on both, the host and the logo image, with
the Haar wavelet filter. The wavelet domain
representation of the host image is denoted by f(m,n), the
DWT coefficients of the logo image by w(m,n).
Coefficient selection: Each approximation coefficient of
the host image whose value is greater than threshold
value (i.e. 250) is modified to embed the logo image.
Embedding: The host and logo image coefficients of
each subband are linearly scaled. Since the logo image is
smaller than the host image, the coefficients have to be
expanded. After adding the expanded logo image to a
scaled version of the host image, image representation is
115
2009 ACADEMY PUBLISHER
POSTER PAPER
International Journal of Recent Trends in Engineering Vol. 1, No. 2, May 2009
scaled back using the original minimal and maximal
coefficients values per subband. Finally the fused
(combined) image is produced via the IDWT.
Extraction: The extracted watermark sequence is
compared to the originally embedded watermark using
the normalized correlation of the sequences as a
similarity measure . The similarity measure varies in
the interval [-1, 1], a value above 0 and close to 1
indicates the extracted sequence matching the embedded
sequence and therefore we can conclude that the image
has been watermarked. Discussion: The proposed
method allows hiding surprisingly high amounts of image
data in a host image. The current implementation is
limited to logo images that are a quarter of the size of the
host image. However this constraint can easily be
removed by exploiting the multiresolution property of the
wavelet transform and performing more decomposition
steps.
VI. RESULTS
A. Original Image and B. Watermark resp.
C. Transformed Watermark
Watermarked Image resp.
Image.
And
D.
Watermarked image
50
50
100
100
150
REFERENCES
[1]
Ingemar J. Cox,Joe Kilian, Tom Leighton, Talal
G. Shamoon on Secure Spread Spectrum Watermarking
from Multimedia, IEEE, ICIP 97, volume 6, Pages 16731687, Santa Barbara, California, USA, October 1997.
[2]
Maryline Charrier, Diego Santa Cruz, and
Mathias Larsson, JPEG2000, the Next Millennium
Compression Standard for Still Images. In Proceedings of
the IEEE, ICMCS 99volume 1, pages 131,132, Florence
Italy, June 1999
[3]
Mahalingam Ramkumar, Ali N. Akansu, and A.
Aydn Alatan. A robust data hiding scheme for images
using DFT. In Proceedings of the 6th IEEE International
Conference on Image Processing, ICIP 99,pages 211215, Kobe, Japan, October 1999 .
[4]
Improved
Wavelet-Based
Watermarking
Through
Pixel-Wise Masking Mauro Barni, Member,
IEEE,
Franco Bartolini, Member, IEEE, and
Alessandro Piva, IEEE TRANSACTIONS ON IMAGE
PROCESSING, VOL. 10, NO. 5, MAY 2001
Watermark
original image
[5]
Digital Image Watermarking in the wavelet
transform domain, Diplomarbeit, Peter Meerwald,
Salzburg,am , 11 Janner 2001.
[6]
A. G. Bors, "Watermarking Mesh-Based
Representations of 3-D Objects Using Local
Moments," IEEE Trans. on Image Processing, vol 15, no.
3, pp. 687- 701, Mar. 2006. IEEE
150
200
200
250
250
300
300
350
350
400
400
450
450
500
500
50
100
150
200
250
300
350
400
450
500
50
100
150
200
250
300
350
400
450
500
116
2009 ACADEMY PUBLISHER