Professional Documents
Culture Documents
A
k
I
A
k1
, k =1,2,3,4, where k denotes
B1,B2,B3 and B4
4. Apply Discrete Cosine Transformation to the whole
visual watermark W.
5. Apply Singular Value Decomposition to the Discrete
Cosine Transformation-transformed visual watermark W:
w =u
w
w
I
w
1
.
6. Modify the singular values in each quadrant B
k
, k =
1,2,3,4, with the singular values of the Discrete Cosine
Transformation-transformed visual watermark:
z
k
=z
k
+o
k
z
w
i =1n where z
k
i =
1n are the singular values of
A
k
, andz
w
i =1n
are the singular values of
v
.
7. Obtain the 4 sets of modified DCT coefficients:
A
k
=u
A
k
X
A
k
I
A
k1
, k =1,2,3,4.
8. Map the modified Discrete Cosine Transformation
coefficients back to their original positions.
9. Apply the inverse Discrete Cosine Transformation to
produce the watermarked cover image.
2.2 Watermark Extraction:
1. Apply the Discrete Cosine Transformations to the
whole watermarked (and possibly attacked) cover image
A
.
2. Using the zig-zag sequence, map the Discrete Cosine
Transformations coefficients into 4 quadrants: B1, B2, B3,
and B4.
3. Apply Singular Value decomposition to each
quadrant: A
k
=u
A
k
X
A
k
I
A
k1
, k =1,2,3,4. where k denotes
the attacked quadrants.
4. Extract the singular values from each
quadrant Bk,k =1,2,3,4: z
w
k
=
x
i
k
-x
i
k
u
k
,i =1,..n
5. Construct the Discrete Cosine Transformation
coefficients of the four visual watermarks using the
singular vectors:
w
k
=u
w
k
w
k
I
w
k
,k =1,2,3,4.
6. Apply the inverse Discrete Cosine Transformation to
each set to construct the four visual watermarks
The Discrete Cosine Transformation factors with the
highest magnitudes [1] are found in quadrant B1, and those
with the lowest magnitudes are found in quadrant B4.
Correspondingly, the singular values with the highest
values are in quadrant B1, and the singular values with the
lowest values are in quadrant B4.
The largest singular values in quadrants B2, B3, and B4
have the same order of magnitude. So, instead of assigning
a different scaling factor for each quadrant, we used only
two values: One value for B1, and a smaller value for the
other three quadrants.
III. GEOMETRICAL ACTION
Let us now discuss the geometrical operation used in
image processing. There are various ways to classify image
operations. The reason for categorizing the operation is to
gain an insight into the nature of the operations, the
expected results and the kind of computational liability.
3.1 Translation:
Translation is the movement of an image to a new
position. Let us assume that the point at the coordinate
position X=(x, y) of the matrix F is motivated to the new
position X whose coordinate location is(x, y).
Mathematically, this can be stated as a translation of point
X to new position X. The translation is represented as
x= x + x
y= y + y.
3.2 Scaling:
Depending on the requirement, the object can be scaled.
Scaling means expanding and shrinking. In the similar
coordinate system, the scaling of the point(x, y) to the new
point(x, y) of the image F is designated as
x=x * Sx
y=y * Sy.
3.3 Zooming:
This image can be Zoomed using a process called pixel
replication of interpolation [6]. Replication is called a zero-
order hold process, where each pixel along the scan line is
repetitive once. Then the scan line repeated. The aim is to
increase the number of pixels, thereby increasing the
dimension of the image.
3.4 Rotation:
This has been the true battle horse of digital
watermarking, especially because of its success with still
images. Correlation based detection and extraction fail
when rotations are performed on the watermarked image
because the embedded watermark and the locally generated
form do not share the same spatial pattern anymore.
Obviously, it would be possible to do exhaustive search
on different rotation angles factors until a correlation peak
International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 9 Sep 2013
ISSN: 2231-2803 http://www.ijcttjournal.org Page 2989
is found, but this is prohibitively complex. The two
parameters become simple when the original image is
present, but we have augmented against this possibility in
previous sections[5]. Some authors have recently proposed
the use of rotation transforms (such as the Fourier-Mellin
[4]) but this dramatically decreases the capacity for
message hiding.
IV. RESULT AND DISCUSSION OF ROTATIONAL
ATTACK:
Correlation based detection and extraction fail when
rotation or scaling are performed on the watermarked
image because the embedded watermark and the locally
generated version do not share the same spatial pattern
anymore.
The above figure shows the rotated watermarked image
by 2 degree in counter clockwise direction .The rotating
attack is done at step size of 15.
Normalized cross correlation coefficient calculation in
case of rotating attack on watermarked image:
Rotating attack is performed on watermarked image by
rotating the watermarked image to 2 degree in
anticlockwise direction. The similarity between the
watermarked image and attacked watermarked image is
found by calculating the correlation over entire dimension
of the attacked image. The same procedure is applied as
above.
Taking x =x +(w * W_h_r)
y =y +(w * w)
P =(x/y)
Where x =0; initially
y =0; initially
P =correlation coefficient
w =original watermark
W_h_r = watermark extracted from
rotated image
The value of correlation coefficient found in this case is
extraction is done P1 =0.6781and P2=0.6799 for step size
of 15 and PSNR value=13.5805. The correlation value is
less which shows that the watermarking scheme is not
more robust for rotating attack also.
PSNR- Peak Signal Noise Ratio.
Fig 5 : Rotational back(2 degree rotation)
The above figure shows the rotated back watermarked
image. The rotating attack is done at step size of 15.The
value of correlation coefficient found in this case of
rotational back after extraction is done P1 =0.6378and
P2=0.7044 for step size of 15 and PSNR value=11.9180.
V. CONCLUSION
In my paper I have applied rotation attacks domain
Digital Watermarking. As wavelet has hierarchical nature
so its multi resolution analysis helps to surround the
watermark in n no. of levels. Watermark Encryption before
embedding gives added security to the algorithmand hence
chaotic scrambling has proved to be a deserved answer to
it. Embedding Watermark in Integer Wavelet Domain
assures more reversibility of data than any other domain.
As it maps integers to integers so adding binary watermark
to Integer Wavelet Transformation decomposed image
comes in good compatibility. We have seen that increasing
the step size increases the depth of watermark embedding
and so its energy to withstand regular signal processing
attacks.
VI. FUTURE WORK
I have implemented a watermarking scheme to embed
the watermark. If due to any region possible a dither and
wiener attack on your digital image water marking. Find
the peak signal noise ratio value after the attack of
extraction done. Also recover fromwatermarking attack by
the using of Singular Value Decomposition and Discrete
Cosine Transformation algorithm. In my work the
procedure I used in embedding watermark in second level
found to be very less robust to most of the common signal
processing attacks , as against when used in single gave
appreciable results. The causes could be so many from
chosen wavelet to block size selection. A good research in
this regard may chief to a very nice and effective
methodology to the area of Digital Watermarking.
Fig-4 : Rotational attack(-2 degree rotation)
International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 9 Sep 2013
ISSN: 2231-2803 http://www.ijcttjournal.org Page 2990
REFERENCES
[1] Chih-Chin Lai, Member, IEEE, and Cheng-Chih Tsai Digital Image
Watermarking Using Discrete Wavelet Transform and Singular Value
Decomposition IEEE Transactions on Instrumentation and Measurement,
VOL. 59, NO. 11, NOVEMBER 2010.
[2] K. Bhagyashri and J oshi M.Y.,Robust Image Watermarking based on
Singular Value Decomposition and Discrete Wavelet Transform,
Nanded 2010 IEEE.
[3]- F. Petitcolas, R. Anderson, and M. Kuhn,Attacks on copyright
marking systems, in Information Hiding (D. Aucsmith, ed.), vol. 1525 of
Lecture Notes in Computer Science, (Berlin), pp. 218238, Springer-
Verlag, 1998.
[4]- A. Herrigel, J. ORuanaidh, H. Petersen, S. Pererira, and T. Pun,
Secure copyright protection techniques for digital images, in
Information Hiding (D. Aucsmith, ed.), vol. 1525 of Lecture Notes in
Computer Science, (Berlin), pp. 169190, Springer- Verlag, 1998.
[5]- Digital Watermarking.pdf Michael Stumpfl Dept. of Electronics and
Computer Science University of Southampton e-mail:
ms601@soton.ac.uk.
[6]- J . R. Hernandez, F. Perez-Gonzalez, and J. M. Rodrguez, Coding
and synchronization: A boost and a bottleneck for the development of
image watermarking, in Proc. of the COST #254 workshop on Intelligent
Communications, (LAquila, Italia), pp. 7782, SSGRR, J une 1998.
[7] K. Bhagyashri and J oshi M.Y.,Robust Image Watermarking based on
Singular Value Decomposition and Discrete Wavelet Transform,
Nanded 2010 IEEE.
[8]- Robust DCT-SVD Domain Image Watermarking for Copyright
Protection: embedding data in all frequencies Alexander Sverdlov, Scott
Dexter, Ahmet M. Eskicioglu.