Sharon 2017
Sharon 2017
Abstract— Digital image watermarking is one of the dominant knows it. This technique gives security to images. Some
means to catch out the unauthorized use of copyrighted images. It mathematical computations are compulsory to extract the
inserts secret information (watermark) into the host image that invisible watermark image. Invisible digital image watermarks
helps in finding the rightful ownership of image. Watermarking is are more secure than visible image watermarks [7, 8]. According
one of the solutions to prevent unlicensed use of digital media. This to some applications, the image watermarking techniques are
solution can help the protection of ownership rights by embedding categorized into three types: semi fragile, fragile and robust
the copyright information in the intended media. There are various approaches. The semi fragile watermarking is used to breakdown
algorithms to embedding a watermark image into digital image under every modification that a user-quantified threshold to be
(host or original). The proposed work is skilled with insertion of surpass, but fragile image watermarking is designed to know any
watermark images into host or original image in the edge positions. illegal changes on digital images. Robust Image watermarking is
Ultimately, produce high invisibility while embedding into reference primarily used for copyright protection of images under rightful
image and extraction of watermark might be without any ownership [1, 2, 4].Security involves encryption method[21]. In
distortions. This type of insertion makes easy and free from the false
our work, we mainly focus on the robust image watermarking .
In technology, spatial and transform domain watermarking are
positive errors. For finding the quality of the extracted watermark
two main categories of Digital Image Watermarking. Spatial
image and efficiency of algorithm, we used a well-known quality
domain watermarking is altering pixels of image directly in the
measure functions for images, such as PSNR (peak signal to noise given watermark. The advantages of this are easy
ration) and Jaccard function. The results of proposed work give implementation and low complexity.Cross-domain
high invisibility of the inserted watermark image, with very less transformation requires an extra computation for this method.
distortions of the extracted watermark image. Transform domain methods are widespread because of their
Keywords— Watermarking, Edge detection, Big Data, Stenography ability to abusing human visual perception and signal
characteristics in digital image watermarking. Commonly used
transforms comprise discrete cosine-transform (DCT), singular
I. INTRODUCTION value decomposition (SVD), discrete Fourier transforms (DFT),
and discrete wavelet transforms (DWT).
Now-a-days sharing of images is very easy due to technology.
one image worth thousands of words. Every day 250 billions of
images are upload and 350 million of images are downloaded
from facebook. In all these uploading and downloading users II. LITERATURE SURVEY
need security for their images. There are some advanced X.-y. Wang et al. (2016) proposed a scheme depends on local
technologies that make the privacy and security of our personal PHT (polar harmonic transform) to robust image watermarking
or confidential images. To change the ownership of images, for digital images. Advantages of this approach are: (1) the
many advanced techniques are existed in Image processing. So, probability density gradient was used for extracting uniform
providing of protection and security of images became feature points for an image by the enhanced speed up robust
compulsory. Digital Image Watermarking is one of the effective feature detector, (2) the local feature points for affine invariant
tool, that protects the confidentiality of Images. This method is are built adaptively as said by the difference of native probability
used to insert images in original image, so that there will not be density, and (3) to insert a watermark image into another digital
any visible changes in the original image. Digital watermarking image, used an effective and new two dimensional (2D)
is characterized as visible and invisible [4, 5, 9]. This type of transform and PHT (Polar Harmonic Transform). Experiments
visible image watermarking can be visible to normal eye without are conceded for testing out on a digital image with set of
any techniques but this digital image watermarking can be ruined hundred images are gathered from Internet, and the initial results
quickly. Scheme to provide security for images for rightful showed that, in the method he proposed for watermarking is
ownership but in invisible digital image watermarking technique, robust and imperceptible to regular image processing techniques
watermark is not visible to normal eye, only the rightful person such as JPEG compression, noise adding and filtering. In this,
3565
International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017)
3566
International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017)
In Edge detection, gradient is a parameter to the degree of While calculating an approximation in the gradient, it's far
alternate in a function, and an photograph to be considered to be precarious that the x and y partial derivatives be computed at
an array of samples of positive non-stop characteristic of exactly the equal role in area. However, the use of the above
photograph intensity. With the aid of the usage of a discrete approximations, ex is sincerely the approximation to the
approximation to the gradient we analogy, appropriate gradient at the interpolated point [i, j +1/2] and Ey at [i +1/2, j]
modifications within the grey values in an image may be for this reason, 2 x 2 first differences, as opposed to 2 x 1 and 1
detected. The two-dimensional equivalent of the primary spin-off x 2 mask, are time and again used for the x and y partial
gradient vector is derivatives.
C. Process of Extracting Watermarking
୶ Process of extraction of watermarking logo image from reference
ሾሺǡ ሻሿ ൌ ቆ ቇ ൌ ൮ ൲ (1) image, we require original host image. The algorithm for the
୷
process of extracting watermarking image is as follows
There are two houses associated with the gradient: • Algorithm2: Extract Watermark Image from Reference
(1) The vector E[j(x, y)] factors in the manner of the maximum Image
rate of boom of the feature j(x, y), and
1. while(i<=(length(mat1))){ //mat1
(2) The value of the gradient, given via
is the embedded image
(2) 2. k=1
ሾሺǡ ሻሿ ൌ ට୶ଶ ୷ଶ
3. y1<-c(0,0,0,0,0,0,0,0)
4. while(k<=4&&i<=length(mat1)){
Equation (2) is the most rate of increase of (x, y) in step with unit
distance inside the direction. It is process, to approximate the 5. if(mat7[i]!=0){
gradient via entire values: 6. if(k==1){
ሾሺǡ ሻሿ ൎ ȁ୶ ȁ ห୷ ห (3) 7. z1=i
8. x1=pbin(as.integer(mat1[z1]))
Or 9. y1[2]<-x1[8]
(4)
ሾሺǡ ሻሿ ൎ ሺȁ୶ ȁǡ ห୷ หሻ 10. y1[1]<-x1[7]
11. }else if(k==2){
By analyzing the vector, we define the direction of the gradient: 12. z2=i
୷ (5) 13. x2=pbin(as.integer(mat1[z2]))
Ƚሺǡ ሻ ൌ ିଵ ൬ ൰
୶ 14. y1[4]<-x2[8]
15. y1[3]<-x2[7]
B. Numerical Approximation 16. }else if(k==3){
For images, the derivatives in equation (1) are approximated via 17. z3=i
variations. The best gradient approximation is
18. x3=pbin(as.integer(mat1[z3]))
ܧ௫ ؆ ݂ሾ݅Ǥ ݆ ͳሿ െ ݂ሾ݅ǡ ݆ሿ (6) 19. y1[6]<-x3[8]
(7) 20. y1[5]<-x3[7]
ܧ௬ ؆ ݂ሾ݅ǡ ݆ሿ െ ݂ሾ݅ ͳǡ ݆ሿ
21. }
Here j to the x direction and i to the negative y course. These 22. else if(k==4){
will be carried out with simple convolution masks as exposed 23. z4=i
beneath
24. x4=pbin(as.integer(mat1[z4]))
ܧ௫ ൌ ሺെͳͳሻ (8)
25. y1[8]<-x4[8]
(9) 26. y1[7]<-x4[7]
ͳ
ܧ௬ ൌ ൬ ൰ 27. }
െͳ
3567
International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017)
Fig. 2. The process of Extraction of Logo Image from the Embedded Image The detailed comparisons of the three Images with Jaccard and
PSNR values are as follows:
V. RESULTS AND DISCUSSIONS
In proposed work, performance of watermarking is tested with
TABLE I. JACCARD AND PSNR VALUES OF EXISTING SYSTEM
robustness and invisibility. For comparison of the equality of
watermark embedded image with original image and extracted Image Jaccard PSNR
watermark logo image with original logo image here we are 1 21.68367 74.94915
using PSNR, Jaccard and Normalized cross correlation functions 2 7.699275 43.9036
[19]. PSNR function is used for objective image quality metrics. 3 17.66417 72.85485
Here PSNR function is used to test the robustness and invisibility
of a watermark image, which is measured as the ratio of the
number of properly matched local regions of watermarked image B. Results of proposed work
and number of original reasons of watermarked image. Suppose In this proposed work, three Fb profile pictures have taken
the size of Original image (S) and watermarked or logo image namely pic1, pic2, pic3 [11] and used in this proposed work. The
(W) is m X n and both can reach Smax is a maximum pixel size of the original images are variable pic1 and pic2 are of
value, The PSNR value can be determined as: dimensions 600 X 600, pic3 is with the dimensions of 800 X
݉ ൈ ݊ ൈ ሺܵ௫ ሻଶ 600. A gray scaled logo image of size 87 X 85 is used as a
ܴܲܵܰ ൌ ͳͲ ଵ ቆ ቇ watermark . The original and watermark images are shown in
σ
ୀଵ σୀଵሺܵሺ݅ǡ ݆ሻ െ ܹሺ݅ǡ ݆ሻሻଶ
Fig 4. Fig 5 shows embedded process of the watermark logo
(12) image into three pictures.
3568
International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017)
Fig. 5. Embedded Process of a Watermark Logo Image into three Facebook Profile Pictures
3569
International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017)
References
[1] Wang Xiang-yang, Liu Yu-nan, Li Shuo, Yang Hong-ying, Niu Pan-pan,
Zhang Yan, Anew robust digital watermarking using local polar harmonic
transform, Computers andElectrical Engineering,
http://dx.doi.org/10.1016/j.compeleceng.2015.04.001(2015)
[2] Yahya AL-Nabhani, Hamid A. Jalab, Ainuddin Wahid, Ra_dahMd
Noor,Journal of King Saud University - Computer and Information
Sciences,http://dx.doi.org/10.1016/j.jksuci.2015.02.002 (2015)
[3] Irshad Ahmad Ansaria, Millie Panta, Chang WookAhn, ABC optimized
secured image watermarking scheme to find out the rightful ownership,
Journal of Optik, Elsevier, (2016)
[4] Xiang-yangWang, Yu-nan Liu, Meng-meng Han, Hong-ying Yang, Local
quaternion PHTbased robust color image watermarking algorithm, Journal
of Vis. Commun. Image R,
[5] Renato J. CintraTodor V. Cooklev, Robust image watermarking using
non-regularwavelets, Springer-Verlag London Limited (2008)
[6] YaqingNiu Matthew Kyan Sridhar Krishnan Qin Zhang, A combined just
noticeabledistortion modelguided image watermarking, Springer-Verlag
London Limited (2010)
[7] WangChun-peng,WangXing-yuan, XiaZhi-qiu, Geometrically invariant
image watermarking based on fast Radial Harmonic Fourier Moments,
Journal of Signal Processing:Image Communication (2016)
[8] Jun Lang, Zheng-guangZhang, Blind digital water marking method in the
fractionalFourier transform domain, Journal of Optics and Lasers in
Engineering, Elsevier (2013)
[9] Qingtang Su. Beijing Chen, Robust color image watermarking technique
in the spatialdomain, Journal of Soft Computing, Springer links (2017)
[10] Coltuc D, Chassery JM Very fast watermarking by reversible contrast
mapping. IEEESignal Process Lett 14(4):255258 (2007)
[11] D Praveen Kumar. C. Nagaraju, Theoretical Analysis and Security
Preserving Extraction of Public Images from Facebook, IEEE Digital
Xplore (2017)
[12] Ramesh Jain, RangacharKasturi, Brian G. Schunck Published by
McGraw-Hill, Inc.,
[13] GS Rao, C NagaRaju, LSS Reddy, EV Prasad; A Novel Fingerprints
IdentificationSystem Based on the Edge Detection; International Journal
of Computer Science andNetwork Security 8, 394-397
[14] C NagaRaju, S NagaMani, G rakesh Prasad, S Sunitha, Morphological
edge detectionalgorithm based on multi-structure elements of di_erent
directions, International Journalof Information and Communication
Technology Research 1 (1)
[15] C. NagarajuSharada Mani, G. SyamPrasad, O.Rama Devi, A Novel Edge
DetectionTechnique for Color Images, International Journal of Advanced
Engineering & Applications
[16] C. NagarajuD.VishnuVardhanBandaruBhavana,Edge Preserving Based on
WeightedGuided Image Filtering, International Journal of Science and
Research (IJSR) ISSN :2319-
7064;http://dx.doi.org/10.21275/v5i6.NOV164734
[17] R. Chandramouli, M. Kharrazi, and N. Memon. Image steganography and
3570