You are on page 1of 9

Digital Watermarking using DCT Technique

A DESSERTATION PROGRESS REPORT


SUBMITTED IN THE PARTIAL FULFILLMENT OF REQUIREMENTS
FOR THE
AWARD OF THE DEGREE OF
MASTER OF TECHNOLOGY
IN
ELECTRONICS AND COMMUNICATION ENGINEERING
BY

Roll No: 12001503013


Under The Supervision Of
Mr.
(Assistant Professor, ECE Department, IGIT, Delhi)
DEPARTMENT OF ELECTRONICS AND COMMUNICATION
ENGINEERING

INDRA GANDHI INSTITUTE OF TECHNOLOGY


KASHMARI GATE, NEW DELHI (INDIA)-110001
.

CONTENTS:

INTRODUCTION
LITERATURE REVIEW
OBJECTIVES OF RESEARCH WORK TO BE CARRIED OUT
METHODOLOGY
SOURCE OF PROCURING EXITING DATA
REFERENCES

1.

INTRODUCTION

1.1

Brief Introduction Of Research Work :

Within last decades, multimedia communication and distribution is increasing in public


and insecure

networks. Digital watermarking protects the information from being

compromised or redistribution. It preserves the integrity and authenticity of the digital


information. Different watermarking schemes are being used for different purposes.
Fragile watermarking scheme focuses on image tampering while robust watermarking
scheme focuses on robustness against malicious attacks. Spatial domain watermarking
scheme includes every bit of watermark information hidden into each byte of original
information. Discrete Cosine Transform (DCT) transforms the space domain or time
domain of input into its frequency components. The DCT decomposes an image into
several frequency bands. Information can be added into low frequency, mid frequency
or high frequency. The mid frequency is used to embed because it is robust against
several attacks and doesn't distort the most important parts of an image. In digital signal
processing, DCT is the commonly used linear transformation. DCT based watermarking
is robust against low pass filtering, blur effects and brightness. 2D DCT algorithm in
digital watermarking includes segmentation of image into non overlapping 8x8 blocks
and forward DCT is applied to each blocks. Further, a coefficient selection criterion is
defined and watermark image is embedded to the selected coefficients. The embedded
cover image can be reconstructed using inverse transformation of DCT. The secret
information is hidden in mid frequency of the DCT coefficient blocks.2D DCT for
embedding in watermarking scheme.

1.2

Importance Of Work To Be Carried Out :

The authenticity of content or matter is crucial factors for solving the problem of
copying, modifying, and distributing the intellectual properties in an illegal way. The
approach aims at copyright protection and traitor identification of digital images.
Watermarking can resolve the stealing problem of intellectual properties. Altered midfrequency coefficients are analyzed by applying forward DCT .Digital watermarking
has developed immensely for multimedia uses in the current decade. The requirement
for protected digital content grows vital with the enhancement in exchange of digital
images on internet. Watermarking is a technique to safeguard digital media by
retaining the owners possession.

1.3

Scope of Work

Watermarking techniques are broadly classified according to the domain of embedding


information i.e. spatial domain and transform domain. The transform domain
techniques are more robust than spatial domain but have less computation speed
comparatively. So, the researchers put their efforts in developing more robust
techniques using transform domain. It includes discrete cosine transform (DCT). The
technique works on the Y component of the color image. Computation of second DCT
during embedding allows for determination of the precise block for embedding data.
Main Scope of Digital watermarking is to secure the data.

2. Literature Review:1. Anu Bajaj Robust and Reversible Digital Image Watermarking Technique
Based On RDWT-DCT-SVD IEEE International Conference on Advances in
Engineering & Technology Research (ICAETR - 2014), pp 115-119, Aug2014
In this paper, author represents hybrid image watermarking technique is proposed in
this paper which takes the advantages of different transforms like RDWT, DCT, SVD
and trigonometric functions. So, all the functions are combined at one place to create
a non-blind, robust and reversible watermarking scheme.
2. Chittaranjan Pradhan et.al, Blind Watermarking Techniques using DCT and
Arnold 2D Cat Map for Color Images International Conference on
Communication and Signal Processing, pp 26-30,April 2014
In this paper, author carried out a blind digital watermarking technique has been
proposed using Discrete Cosine Transform (DCT) to embed information in mid
frequency. The Arnold 2D cat map is used to shuffle the original pixel positions of
watermark color image. The resulting watermark images are embedded into separate
components of cover images using DCT. The intensity values of watermark images
are hidden in mid frequency of DCT blocks of cover images.
3. Aparna , Sonal AyyappanComparison of Digital Watermarking Techniques,
International Conference on Computation of Power Energy, Information and
communication, pp 87-92 ,July 2014.
In this paper, author proposes watermarking techniques based on DCT and SVD,
DWT and SVD and a combination of DCT and DWT is implemented. The
DCT+DWT method is also experimented by dividing the cover image and watermark
into four equal parts and then performing the embedding technique.
4. Afroja Akter et.al Digital Image Watermarking Based on DWT-DCT: Evaluate
for a New Embedding Algorithm 3rd International Conference on Informatics,
Electronics & Vision 2014,pp 155-160,Feb2014

In this paper, author represent hybrid watermarking is performed by two level, three
level, and four level DWT followed by respective DCT on the host image. A new
embedding algorithm (NEA) of digital watermarking is proposed in this paper. The
simulation results are compared with Coxs additive embedding algorithm and the
NEA for additive white Gaussian noise (AWGN) attack and without attack. Both
algorithms use the hybrid watermarking.

2.1

Short-falls in the Work Already Done :-

In the previous work several limitations were encountered, amongst which are the
following:
1. There is no transformation of the correlated variables into uncorrelated variables so as
to expose the various relationships among the original data items.
2. Previous Watermarking does not identify and orders the dimensions on which the
data points shows the most variation.

2.2

Problem Description:-

Embedding watermarks involves two key tasks. These are confirming copyright
protection and maintaining the original view of the carrier image. To protect the
copyright of an image, a watermarking mechanism must be robust enough to resist
malicious attacks; an authorized user must be allowed to retrieve a recognizable logo,
even if the watermarked image has been attacked. Furthermore, the watermarked
images quality must be good so that it is difficult for an intruder to distinguish
between the host image and the embedded one. In addition, the embedded information
should not seriously distort the protected image, which may degrade the images
value. Thus, when evaluating a watermarking mechanisms performance, concentrate
on three issues: robustness, the watermarked images quality, and the restored images
quality.

3. Objectives of Research Work to be Carried Out:Main objectives of research work are:


1. To generate embedding function which embeds the watermark in to the
multimedia content
2. To setup communication channel which then distributes the data to the
concerned bodies. It is the place where the images are vulnerable to attacks.
The attacks may be unintentional i.e. common image processing operations or
intentional like copy attack.
3.

Use of extraction function which contains the extraction or detection


algorithm to detect or extract the watermark as per requirements.

4. Methodology:-

The proposed algorithm uses Arnold 2D chaotic map to enhance the security of
embedding color image data. The watermark color images are decomposed into its
respective RGB components. The whole algorithm is applied to these different
components of color images. The color cover image is decomposed to its red, green
and blue components respectively and divided into 8x8 blocks to embed the
individual components of watermark image into mid frequency coefficients of DCT.
The embedding and extraction algorithms are described below:
A. Embedding
The steps for embedding the watermark image into coefficients of cover image are
as follows:
1. Input the cover image and watermark image.
2. Both the images are decomposed to its RGB components respectively.
3. The components of watermark image are encrypted using Arnold 2D cat map
using different secret keys.
4. The individual component of cover image is divided into 8x8 DCT blocks.
5. The encrypted watermark information is embedded into mid frequency of the
respective DCT coefficient blocks using the following formulae:
I = I = *W
Where, I = cover image, W = watermark, I'= watermarked image
= scaling Factor
6. Inverse transform domain is applied to generate individual embedded cover
images.
7. The Individual Embedded cover images are concatenated to form final colored
embedded cover image.
B. Extraction
The steps for extraction of watermark image are as follows:
1. The [mal embedded cover image is decomposed into its respective RGB
components.
2. Each individual component is divided into 8x8 DCT blocks.
3. Extract the DCT coefficients from mid frequency of DCT blocks of different
components to generate individual encrypted watermark image.
I'
W=
Where, W = watermark, I' = watermarked image, = scaling factor.
4. The resulting encrypted watermark images are decrypted by 2D Arnold
transformation using secret keys used in encryption process
5. The individual decrypted watermark is combined to form the resultant colored
Watermark image
ALGORITHM STEPS ON WATERMARKING

Apply DCT to entire host image I of size 512x512.


Select HF coefficients of DCT
Detection is applied to entire host image.
And then divided into 16x16 blocks (bw1).

DST is applied to the blocks from which sub bands of the FFT edge image
are obtained. (bw2).
Pixel values of the blocks are modified based on the threshold value
determined Later on from the modified block, the singular values are
selected using SVD.
Extraction:
Inputs: Original cover image, Watermarked cover image or Attacked Watermarked
cover image.
1) Apply twodimensional DCT, to obtain the first level decomposition of the
watermarked cover image
2) Extract the watermark from approximation & diagonal DCT
3) Calculate the visual quality of extracted watermark by the Similarity Ratio (SR)
between compared images. SR= S/(S+D), where S denotes the number of
matching pixel values in compared images, and D denotes the number of different
pixel values in compared images.
4) Apply the set of possible attacks to watermarked image to get the attacked
image. Calculate for each attack the PSNR of Original and attacked
image.
5) Apply twodimensional DCT, to obtain the first level decomposition of the
Attacked image
6) Extract the watermark from approximation & diagonal DCT coefficient of
attacked image as per the equation
7) Calculate the visual quality of extracted watermark from attacked image by the
Similarity Ratio (SR) between compared images.

5. Source of Procuring the Existing Data:The Software to be used, would include, the MATLAB R2011a and later versions
possessing functions for watermarking processing. MATLAB is a modern
programming language environment: it has sophisticated data structures, contains
built-in editing and debugging tools, and supports object-oriented programming.
These factors make MATLAB an excellent tool for teaching and research. MATLAB
has many advantages compared to conventional computer languages (e.g., C,
FORTRAN) for solving technical problems. MATLAB is an interactive system whose
basic data element is an array that does not require dimensioning. The software
package has been commercially available since 1984 and is now considered as a
standard tool at most universities and industries worldwide. It has powerful built-in
routines that enable a very wide variety of computations. It also has easy to use
graphics commands that make the visualization of results immediately available.
Specific applications are collected in packages referred to as toolbox. There are
toolboxes for signal processing, symbolic computation, control theory, simulation,
optimization, and several other fields of applied science and engineering.

6. REFERENCES :
[1] Anu Bajaj Robust and Reversible Digital Image Watermarking Technique Based On
RDWT-DCT-SVD IEEE International Conference on Advances in Engineering &
Technology Research (ICAETR - 2014), pp 115-119, Aug2014
[2] Chittaranjan Pradhan et.al, Blind Watermarking Techniques using DCT and Arnold
2D Cat Map for Color Images International Conference on Communication and Signal
Processing, pp 26-30,April 2014
[3] Aparna , Sonal AyyappanComparison of Digital Watermarking Techniques,
International Conference on Computation of Power Energy, Information and
communication, pp 87-92 ,July 2014.
[4] Afroja Akter et.al Digital Image Watermarking Based on DWT-DCT: Evaluate for a
New Embedding Algorithm 3rd International Conference on Informatics, Electronics
Vision 2014,pp 155-160,Feb2014
[5] T. R. Muhammad Aamir Qureshi, A Comprehensive Analysis of Digital
Watermarking, Information Technology Journal, 2006.
[6] V. M. Potdar, S. Han, and E. Chang, A survey of digital image watermarking
techniques, in Industrial Informatics, 2005. INDIN05. 2005 3rd IEEE International
Conference on, 2005, pp. 709716.
[7] I. J. Cox, M. L. Miller, J. A. Bloom, and C. Honsinger, Digital watermarking, vol. 53.
Springer, 2002.
[8] J. R. Hernandez, M. Amado, and F. Perez-Gonzalez, DCT-domain watermarking
techniques for still images: Detector performance analysis and a new structure, Image
Processing, IEEE Transactions on, vol. 9, no. 1, pp. 5568, 2000.
[10] K. S. SUNIL and D. VARMA, Digital Image Watermarking Using DCT with High
Security of Watermark using Image Fusion Technology of Wavelet Toolbox of
MATLAB, International journal of Electronics, 2013.
[11] S. Lagzian, M. Soryani, and M. Fathy, Robust watermarking scheme based on
RDWT-SVD: Embedding Data in All subbands, Artificial Intelligence and Signal
Processing (AISP), 2011 International Symposium on, 2011, pp. 4852.
[12] R. Liu and T. Tan, An SVD-based watermarking scheme for protecting rightful
ownership, Multimedia, IEEE Transactions on, vol. 4, no. 1, pp. 121128, 2002.
[13] A. Mansouri, A. M. Aznaveh, and F. T. Azar, SVD-based digital image
watermarking using complex wavelet transform, Sadhana, vol. 34, no. 3, pp. 393406,
2009.
[14] A. Durge and A. Jaiswal, Increase Security of Images from Attacks Using Digital
Watermarking With SVD Technique, International Journal of Advanced Research in

Computer Engineering & Technology (IJARCET), vol. 1, no. 7, p. pp64, 2012.

You might also like