1.1 Digital Image Procesing
1.1 Digital Image Procesing
INTRODUCTION
1.1 DIGITAL IMAGE PROCESING
Digital image processing is a rapdily developing area with various raising application in computer
science and engineering. It is very important field for the research work because its techniques are
used in almost all kinds of tasks like human computer interface, medical, visualization, image
enhancement, Law enforcement, artistic effects, image restoration and digital watermarking for
security purpose.
Digital image processing has many beneficial properties over the analogue image processing.
Digital image processing is accomplishing variant computer operation on digital image for various
purposes like enhancing image quality, filtering images from noise. A digital image is a
representation of two dimensional images as a finite set of digital values called picture elements or
pixels. Therefore, processing a digital image by using a digital computer is called digital image
processing.
The digital communication technology, like internet technology confronts various troubles related to
the privacy and security of the data. Security techniques are required because of illegal access of data
without permission. Therefore, it is necessary to protect data in the internet technology. For providing
the security of digital data various techniques are used like encryption, decryption, cryptography,
steganography and digital watermarking. The digital watermarking is an application of the digital
image processing.
The digital watermarking is a process of information hiding. There are various techniques for hiding
the information in the form of digital contents like image , text, Audio and video. Basically digital
watermarking is a method for embedding some secret information and additional information in the
cover image which can later be extracted or detected for various purposes like authentication, owner
identification, content protection and copyright protection, etc. Sometimes the scaling factor is used
for the security of the digital content and to protect the data from illegal users and provides the
ownership right for digital data.
1
compression. The efficiency of digital watermarking algorithms is totally based on the robustness of
the embedded watermark against various types of attacks. Digital watermarking method is also used
for the tamper proofing and authentication.
Digital watermarking is a very developing field and used in various application which have been
proved to be successful. The aim of every application is to providing security of the digital content.
The digital watermarking application is Broadcast Monitoring, Digital Fingerprinting, Transaction
Tracking, Copyright Protection, Temper Detection, Data Hiding and Content Authentication etc. In
digital watermarking there is an input image(host image) and an watermark image. There are two
processes occur in digital watermarking i.e. embedding process and Extracting Process. When
Watermark image embed on the cover image for providing security to cover image than this process
is known as Embedding Process and then watermarked image is transmit over the communication
channel. In this stage, when the data is transmitted over the network, some noise is added on the
watermarked image or some attacks are performed on the watermarked image. So, our watermarked
data is either modified or destroyed. The Embedded Watermarked is recovered in Extracted Process.
In Digital Watermarking has two domains, spatial domain and transform domain(frequency
domain). In spatial domain method, the watermark bits are embedded directly into the pixels of cover
image. The spatial domain watermarking methods are simpler and are less robust against various
geometric and non geometric attacks.
In transform domain, the watermark is embedded by changing the coefficient magnitude in a
transform domain using Discrete Wavelet Transform(DWT), Discrete Cosine Transform(DCT),
Singular Vector Decomposition(SVD) .
Transform domain methods can yield more information embedding and more robustness against
many common attacks. But the computational cost is higher than spatial-domain watermarking
methods.
Process of Robustness and optimization that are explained in this:
1. First of all an input image and an watermark image is chosen. We apply DWT on the cover image.
DWT divides image into four sub bands i.e. LL (Low Low), HL (High Low),LH (Low High),HH
(High High) and then LL sub band is again split into sub bands i.e. LL2, HL2, LH2, HH2 known as
2-DWT. After that, apply SVD to smallest LL2 sub band that split the image into u, s, v matrix form
and find out scaling factor of the cover image. Like this, Again apply DWT and SVD on the
watermark image.
2 The Selection of fitness function is based on to the optimize Robustness. PSNR value also has
major role in this paper. Higher the PSNR value provides good quality image.
2
1.2 Advantage Of Digital Image Watermarking:
Robustness
Robustness refers to the schemes resistance against various attacks. Examples of such attacks may be
image processing attacks such as filtering, addition of noise, histogram manipulation, contrast
enhancement etc, and geometric attacks such as cropping, rotation, translation etc.
Imperceptibility
All schemes cannot resist all kinds of attacks, hence schemes are usually made application
dependent. Imperceptibility gives the similarity between the original image and the watermarked.
Security
Security is used to describe the resistance of a scheme against malicious attacks. Many schemes may
be highly robust but may not show security. For instance many
SVD based schemes have security issues due to the false positive problem.
Quality decrease
When embed on image decrease its quality.
3
1.5 SOFTWARE INTRODUCTION
MATLAB:
The name MATLAB stands for MATrix LABoratory. MATLAB was written originally to provide
easy access to matrix software developed by the LINPACK (linear system package) and EISPACK
(Eigen system package) projects.
The MATLAB language provides native support for the vector and matrix operations that are
fundamental to solving engineering and scientific problems, enabling fast development and
execution. MATLAB provides features of traditional programming languages, including flow
control, error handling, and object-oriented programming (OOP). You can use fundamental data
types or advanced data structures, or you can define custom data types.
MATLAB add-on products provide built-in algorithms for signal processing and
communications, image and video processing, control systems, and many other domains. By
combining these algorithms with your own, you can build complex programs and applications
1.5.2 History
1.5.4 Weaknesses:
MATLAB is not a general purpose programming language such as C, C++, or FOR-TRAN
MATLAB is designed for scientificc computing, and is not well suitable for other appli-
cations
MATLAB is an interpreted language, slower than a compiled language such as C++.
MATLAB commands are specic for MATLAB usage. Most of them do not have a direct
equivalent with other programming language commands.
1.5.5 Competition:
5
CHAPTER 2
LITERATURE SURVEY
2.1 Related Work
Hiren Joshi , Ashish [1] The proposed work is in similar direction where in RMI (Random Matrix
Image) is used in place of Huffman coding. This algorithm increased the robustness in digital
watermark while also enhancing security of production. The experiment part has used random
matrix as a watermark to prevent an attacker for easy attack on the water mark image. The reason for
this is that each image usually has different matrix form with range from 0 to 10. This work is the
use of RMI transition to authenticated user of the image. Without having RMI, none other than
authenticated user can detect and extract watermark from watermarked image.
The limitation of the current work is that the stated technique of digital water marking is used
on grey scale image and not on the coloured image. The experiment performed on greyscale image
having less than 245 greyscale pixel value.
Anumol Joseph1 , K. Anusudha[2] This paper deals with a new DWT and SVD watermarking
technique in which two watermark images are embedded in the HL and LH bands of the host image
after two level DWT decomposition of the host image using HAAR wavelet by modifying the
singular values of the host image with that of watermark images. The performance was evaluated
using RMSE, PSNR and correlation coefficient. Simulation results show that this method is robust
against various types of attacks.
Podili Brahma Srinu , B.J agadeesh [3] The proposed algorithm is a robust, blind digital image
watermarking method based on Fuzzy- BPNN system in hybrid transform domain i.e. combination of
both DCT and DWT transform techniques. Experimental results shows that the proposed method is
robust to many processing attacks by giving better NCC values and for transparency it yields good
PSNR values. Median filtering and Resizing attacks give less NCC values when compared to other
processing attacks.
Divjot Kaur Thind, Sonika Jinadal[4],In this paper a new watermarking is used which combines
DCT(Discrete Cosine Transform), DWT(Discrete Wavelet Transform), SVD(Singular Value
Decomposition) in which watermarking is performed on high frequency band and then various
attacks have been applied.
6
Madhuri Rajawat , D S Tomar[5],This paper presents techniques, applications, classifications,
attacks and tampering detection in watermarking. This paper improves the security of image by
combining new algorithm for digital watermarking and tampering detection. Authors worked on
RGB components for enhancing security and robustness.
Aparna J R, Sonal Ayyappan[3], It proposes a block based image watermarking algorithm in which
cryptographic algorithm are used to tell about the positions of the cover(original) image in which the
watermark is to be embedded.
Two different keys are generated using Diffie Hellman Key Exchange algorithm and using these keys
the positions of cover(original) image to which the watermark bits are to be embedded.
Preeti Parashar, Rajeev Kumar Singh[4], The authors have given an survey of existing digital
image watermarking techniques. The results of various techniques have been compared on the basis
of outputs.
Lalit Kumar Saini, Vishal Shrivastava[5],This paper includes the following sections like overview
of watermarking, Types of watermarking, Classification and applications of image watermarking and
threats and performance evaluation in image watermarking.
Ms.Mahejabi Khan, Mr. Ajay Kushwaha, Mr. Toran Verma[6], Introduced a secure and robust
watermarking algorithm based on the combination of image interlacing, DWT & DCT techniques
7
CHAPTER 3
OBJECTIVES OF THESIS
From the conclusions of literature survey, the main objectives of our work are:
1. Survey of existing recent image techniques water marking.
2. Propose a optimal scaling matrix generation algorithm using differential evaluation.
3. Implementation proposed algorithm in matlab.
4. Comparatively analysis for proposed algorithm exiting work.
8
CHAPTER 4
METHODOLOGY
9
B. Singular Vector Decomposition(SVD):
SVD is an linear algebra technique and used to solve mathematical problems. SVD approach used in
watermarking because of the fact that singular values obtained after the decomposition of image
matrix are stable. The SVD belongs to orthogonal transform which decompose the matrix into three
matrices of same size. we apply SVD to last LL band of input image that decompose the input image
into I_u, I_s and I_v matrix form. Like this apply svd to the lowest LL band of watermark image that
decompose the image into W_u, W_s and W_v. Through all this our main focus are on scaling matrix
that are used to control the strength of watermarked image.
4.1 .1
Proposed algorithms:
A. Embedding Process:
Read both input image and watermark image.
Use 1-level DWT to decompose the input image into four sub-bands (i.e. LL, LH, HL, HH).
Use 2-level DWT haar to again split LL into four sub-bands (i.e. LL2, LH2, HL2, HH2).
Apply SVD to LL2 sub band that split the image into matrix form that extract the singular
values.
Apply DWT to the watermark image to decompose the watermark image into four sub bands
Apply SVD to LL sub band to extract singular values.
Apply optimal scale matrix, that gives best values and stores in alpha variable.
Apply inverse DWT to get the watermarked image.
Calculate the PSNR value for input host image and watermarked image using formula.
B. Extraction Process:
Apply 2 level haar DWT to decompose the watermarked image into four sub bands.
Apply SVD to LL2 sub band to extract the singular values.
Apply 2 level haar DWT on input image to decompose image into four sub bands(i.e, LL2,
LH2, HL2, HH2)
Apply SVD to LL2 sub band .
Compute the singular matrix of extracted image.
watermark image to decompose the watermark image into sub bands(i.e,
WLL,WLH,WHL,WHH)
Apply SVD to WLL sub band to extract the singular values.
10
Apply inverse DWT to get the extracted watermark image.
Check out the correlation coefficient of watermarked image and extracted watermark image
that will be noiseless.
C. Optimal Scaling :
Optimal Scaling helps for providing the best values. In Optimal Scaling, we used two main
factors:
Differential Evolution(DE):
DE algorithm worked on a population of candidate solutions(called agents). These candidate
solutions are moved around in the search space and creating new candidate solution by
combining the existing ones according to its simple formula and if the new position of an agent is
an improvement than it is accepted otherwise the new position is discarded. Pseudo code of DE
are Formally, let be the cost function which must be minimized or fitness function which must be
maximized. Let designate a candidate solution (agent) in population. The basic DE algorithm can
then be described as follows:
Initialize all agents with random positions in search-space.
Until a termination condition is met (e.g. number of iterations performed, or an adequate
fitness reached), repeat the following:
For each agent in the population do:
Pick three agents , from the population at random, they must be distinct from each
other as well as from agent .
Pick an random index ( being the dimensionality of the problem to be optimized).
Compute the agent's new position as follows:
For each , pick an number that are uniformly distributed
If or then set otherwise set
(In essence, the new position is outcome of binary crossover of agent with
intermediate agent .
If then replace that agent in the population with the improved candidate
solution, that is, replace with in the population.
Pick the agent from the population that has the highest fitness value or lowest the
cost value and return it as the best candidate solution.
11
4.1.3
Quality Measures:
Some of quality measures used in image watermarking are:
1) Normalized Correlation(NC):
It tells about the comparison between original(input) image and extracted image.NC targeted to 1.0.
=1
NC=
=1 2 =1 2
MSE= 1MN ()
Where M, N is pixel values in host image
Wij = Pixel value of Watermarked Image
Hij = Pixel value of Original Image
3) Peak Signal to Noise Ratio(PSNR):PSNR determines the Efficiency of Watermarking with respect
to the noise.
It is given by:
PSNR=10*log(/MSE)
Where p= maximum value in original image
12
SOFTWARE TOOL
MATLAB
The name MATLAB stands for MATrix LABoratory. MATLAB was written originally to provide
easy access to matrix software developed by the LINPACK (linear system package) and EISPACK
(Eigen system package) projects.
The MATLAB language provides native support for the vector and matrix operations that are
fundamental to solving engineering and scientific problems, enabling fast development and
execution. MATLAB provides features of traditional programming languages, including flow
control, error handling, and object-oriented programming (OOP). You can use fundamental data
types or advanced data structures, or you can define custom data types.
MATLAB add-on products provide built-in algorithms for signal processing and
communications, image and video processing, control systems, and many other domains. By
combining these algorithms with your own, you can build complex programs and applications
KEY FEATURES
High-level language for numerical computation, visualization, and application development.
Mathematical functions for linear algebra, statistics, Fourier analysis, filtering, optimization,
numerical integration, and solving ordinary differential equations.
Built-in graphics for visualizing data and tools for creating custom plots.
Development tools for improving code quality and maintainability and maximizing Performance.
Tools for building applications with custom graphical interfaces.
13
REFERENCES
[1] Divjot Kaur Thind, Sonika Jindal, A Semi Blind DWT-SVD Video Watermarking,
International Conference on Information and Communication Technologies(ICICT), pp:1661-
1667, 2015.
[2] Madhuri Rajawat, D S Tomar,A Secure Watermarking and Tampering detection technique
on RGB Image using 2 Level DWT, proc. IEEE 5th International Conference on
Communication Systems and Network Technologies, pp:638-642, 2015.
[3] Aparna J R, Sonal Ayyappan,Image Watermarking using Diffie Hellman Key Exchange
Algorithm, proceeding of the International Conference on Information and Communication
Technologies(ICICT), pp:1684-1691, 2015.
[4] Parashar Preeti., Rajeev Kumar Singh , A Survey: Digital Image Watermarking Techniques
, International Journal of Signal Processing, (ijsip), pp:111-127,2014.
[5] Lalit Kumar, Vikas Shrivastava, A Survey of Digital Watermarking Techniques and its
Applications , International Journal of Computer Science Trends and Technology (IJCST),
pp:70-73,2014.
[6] Ms. Mahejabi Khan, Mr. Ajay Kushwaha, Mr. Toran Verma,A new digital image
watermarking algorithm based on image interlacing,DWT,DCT, IEEE International
Conference on Industrial Instrumentation and Control(ICIC) college of Engineering
Pune,India. May 28-30,2015, pp:885-890.
[7] Urvi H.Panchal, Rohit Srivastava,A Comprehensive Survey on Digital Image Watermarking
Techniques, IEEE 5th International Conference on Communication Systems and Network
Technologies, pp:591-595, 2015.
[8] D. Vaishnavi, T.S.Subashini,Robust and Invisible Image Watermarking in RGB Color
Space using SVD, procedia computer science 46, International Conference Information and
Communication Technology(ICICT), pp:1770-1777, 2015.
[9] GhoutiL, BouridaneA and Ibrahim MK, Digital image watermarking using balanced
multiwavelets, IEEE Transactions on Signal Processing, 54(4), pp. 1519-1536, 2006.
[10] Podili Brahma Srinu, B.Jagadeesh, Copyright Protection of Digital Image using FIS-
BPNN Technique in Hybrid Transform Domain , International Journal of Innovative
Research in Science, Engineering and Technology (An ISO 3297: 2007 Certified
Organization).
14
[11] Hiren Joshi,Ashish Jani , A Novel Digital Watermarking Algorithm using Random
Matrix Image, International Journal of Computer Applications (0975 8887) Volume 61
No.2, January 2013
[12] Anumol Joseph ,, K. Anusudha , Robust watermarking based on DWT SVD,
International Journal of Signal & Image Processing, Issue. 1, Vol. 1, October 2013
[13] Tulika Bhuyan , vinay kumar srivastava and Falgun Thakkar , Shuffled SVD based
Robust and Secure Digital Image Watermarking, International Conference on Electrical,
Electronics, and Optimization Techniques (ICEEOT) - 2016
15