ISSN: 0976-4860
+44 1478 350008
Research Article - (2016) Volume 7, Issue 3
Digital watermarking is one of very popular mechanisms which is widely used for the copyright protection and data authentication of digital multimedia. This paper presents a robust copyright protection scheme based on discrete wavelet transform (DWT) and visual hided scheme (VHS). Unlike the traditional schemes, in our proposed scheme, the original image is modified by embedding the watermark into the original image. We use the visual hided scheme to construct watermarked image. In embedding 3 level DWT is applied on cover image and then embedding of watermark is performed using VHS technique after resizing the watermark image. In order to express the robustness and perceptibility of the presented watermark scheme experimental results shows the performance of proposed scheme based on parameters peak signal to noise ratio and resistance against various signal processing operations and attacks.
<Keywords: Watermarking; Discrete wavelet transform (DWT); Inverse DWT; Visual hided scheme (VHS); Peak signal to noise ratio (PSNR); Mean square error (MSE)
Due to the rapid growth of internet and ease to reach of multimedia data arise a concern warning about unauthorized use, copying and redistribution of digital data. Hence to combat these issues information security, authentication of data and protection of intellectual property is highly demanded. Digital watermarking provides suitable mechanisms for copyright protection of digital multimedia.
Digital watermarking is a technique of inserting information (the watermark) into the original data, which can be detected by authorized user. Based on information in extraction process, watermarking schemes are divided into three categories: Blind, non-blind and semiblind watermarking. Depending on the work domain in which the watermark is embedded, the watermarking schemes are categorized into spatial-domain and transform domain watermarking schemes. In spatial domain watermarking schemes, the watermark is embedded by changing the pixel values of the image [1-3]. Transform domain watermarking schemes apply suitable transform, such as the discrete cosine transform (DCT) [4-6], discrete wavelet transform (DWT) [7-9], fractional Fourier transform (FrFT) [10-12] and singular value decomposition (SVD) [13-15] to an image. Watermark is then embedded by modifying the transform coefficients. Transform domain techniques has higher robustness and security against various attacks over spatial domain techniques.
In this paper, a watermarking scheme based on discrete wavelet transform (DWT) and visual hided scheme is proposed. DWT divides the image into high frequency quadrants and low frequency quadrant, L denotes lower frequency pass filtered while H denotes high pass filtered values, hence LL sub-band secures most of the image’s energy In this paper, a watermarking scheme based on discrete wavelet transform (DWT) and visual hided scheme is proposed. DWT divides the image into high frequency quadrants and low frequency quadrant, L denotes lower frequency pass filtered while H denotes high pass filtered values, hence LL sub-band secures most of the image’s energy while LH, HL, HH have least, moreover LH have horizontal edges, HL have vertical edges, HH have diagonal edges of the image The original image is transformed into wavelet domain. In order to satisfy both the invisibility and robustness at the same time, we embed the watermark into the lower-frequency subbands LH2, HL2, and HH2. The position of the lower-frequency subbands LH2, HL2, and HH2 is shown in Figure 1.
In order to ensure the higher robustness of the proposed watermarking scheme watermark embedded using visual hided scheme at a subband. This scheme splits an image into n different shares. The image can be retrieved with k or more than k shares but any k -1 shares give absolutely no information about the image. The implementations of the VHS scheme are based on (k, n) concept. The (n, n) VHS scheme is most secure and not very convenient in key management.
The rest of the paper has been organized in three sections. The embedding algorithm and extracting algorithm are introduced in Section 2. The numerical simulation results and discussion are presented in Section 3. Section 4 concludes this paper.
Proposed Scheme
In this section, we explain the proposed copyright protection scheme in detail. The scheme consists of two phases: In first phase DWT is performed and then in later phase embedding is done with VHS scheme. In proposed scheme, we have chosen a Wavelet decomposition using L = 3 resolution levels. The watermark is embedded in the wavelet coefficients of the LH, HL and HH sub-bands of the second Wavelet decomposition level. The third decomposition level is chosen to tradeoff between the invisibility of the watermark and the resilience to attacks. A watermark embedded in the wavelet coefficients of the LH1, HL1 and HH1 sub-bands is very sensitive to attacks. On the other hand, if we embed the watermark in the LH3, HL3 and HH3 subbands, the perceptual quality of the image will be significantly altered. For these reasons, the best choice for watermark embedding is the third Haar wavelet decomposition level is selected. The proposed watermarking scheme is shown below in Figure 2.
The embedded watermark is generated from the lowest-frequency wavelet subband of the original image by the applying VHS scheme. In this paper (4,4) VHS scheme is used. A watermark secret image with size M×N can be divided into four shares with size 4M × 4N in which, every pixel of the image is represented by a block of 8×8 pixels. In this process, every secret pixel is turned into two blocks, and each block belongs to the corresponding share image. At last, four share images are obtained. In the extraction process, four corresponding blocks of a pixel are stacked together to retrieve the secret pixel. Four share blocks of a white secret pixel are similar while share blocks of a black secret pixel are complementary.
Embedding algorithm
• The original image I is partitioned into groups of 8×8 blocks.
• Every block of the image is converted from the RGB into the YCbCr color space and just the luminance values Y of the block is used for process.
• The luminance component block transformed into the DWT domain using Haar Wavelet decomposition with L = 3 resolution standard and generate a matrix X.
• Calculate the binary map V of the matrix X as,
• Where Xav is the average value of all pixels in X. Here 1 is considered as white pixel and 0 as a black pixel.
• Vij is a image of size 4m × 4n pixels. Divide the watermark W image into non-overlapping 8×8 blocks and the content of each block is determined according to the same decision rule with subsize 2×2.
• If pixel is white pixel then, and if black pixel then,
• Embed the VHS based watermark to the Original image in LL subband using a watermarking coefficient alpha Then watermarked image is
• ′ = +
• The value of α = 0.1is chosen.
• Take the inverse of DWT and combine YCbCr component.
• Convert YCbCr component in RGB format and merge all 8× 8 blocks to retrieve watermarked image.
Extraction algorithm
• The watermarked image W’ is partitioned into groups of 8×8 blocks.
• Every block of the image is converted from the RGB into the YCbCr color space and just the luminance values Y of the block is used for process.
• The luminance component block transformed into the DWT domain using Haar Wavelet decomposition with L = 3 resolution standard and generate a matrix X.
• Remove the watermark from watermarked image at α=0.1
• ′ = ′ +
• Apply IDWT on the separate components and recombine them to receive original image and extracted watermark image.
Experimental Results and Discussion
Various experiments are carried out in this section, to assess the performance of the proposed algorithm. Six set of images, ‘‘boy, tissue, Saturn, greens and satellite” of size 512×512 are student image is used as watermark image of size 64×64. The performance of proposed model is measured on perceptibility and robustness using PSNR and MSE. The robustness of proposed model is tested for attacks such as salt & pepper attack, Gaussian attack, speckle and rotation attack and then their performance is analyzed by calculating MSE and PSNR values for each attack.
The mean square error is given by
Where, R and S are the number of rows and columns in the input images respectively and I (p,q) is the original image, I’(p, q) is the Watermarked image.
The results shown below indicates original, watermark, watermarked image and extracted watermark in Figure 3 (a), (b), (c) and (d)respectively. The results show that the watermarked image deteriorates but extracted watermark is highly correlated.
When the various attacks were applied on watermarked image and then based on the quality of extracted watermark with original watermark using correlation parameter is determined. The results for various attacks are comprises Gaussian, speckle, salt and pepper and rotation attacks are shown below in Figure 4 (a), (b), (c), (d), (e) and (f) respectively.
PSNR of various images (in dB) | ||||||
---|---|---|---|---|---|---|
Schemes | Boy | Tissue | Saturn | Greens | Satellite | |
Proposed without attack | 51.80 | 50.13 | 49.59 | 49.65 | 47.71 | |
nbsp; | Salt & Pepper density 0.1 | 42.7 | 41.52 | 40.74 | 41.43 | 40.90 |
nbsp; | Salt & Pepper (density 0.3) | 36.03 | 36.87 | 36.05 | 36.74 | 36.21 |
Proposed scheme under attack | Salt & Pepper (0.5) | 33.83 | 34.65 | 33.86 | 34.54 | 34.00 |
nbsp; | Salt & Pepper (density 0.7) | 32.37 | 33.21 | 32.39 | 33.08 | 32.55 |
nbsp; | Salt & Pepper (density 0.9) | 31.29 | 32.12 | 31.31 | 32.00 | 31.47 |
nbsp; | Gaussian noise Mean (M) = 0 & σ = 0.01 | 46.1 | 47.63 | 47.91 | 47.24 | 47.71 |
nbsp; | Gaussian (0 & 0.05) | 40.22 | 41.61 | 41.83 | 41.37 | 41.78 |
nbsp; | Gaussian noise M = 0 &σ = 0.1 | 37.86 | 39.15 | 39.25 | 38.96 | 39.23 |
nbsp; | Gaussian (0.1 & 0.01) | 42.41 | 45.22 | 43.19 | 43.27 | 43.44 |
nbsp; | Gaussian noise M = 0 & σ = 0.5 | 30.58 | 36.10 | 30.09 | 30.89 | 30.06 |
nbsp; | Speckle noise σ = 0.4 | 39.58 | 35.85 | 42.62 | 41.34 | 41.07 |
nbsp; | Speckle noise σ = 0.6 | 38.38 | 34.81 | 41.59 | 40.16 | 40.00 |
nbsp; | Speckle noise σ = 0.8 | 37.18 | 33.92 | 40.65 | 38.97 | 39.03 |
nbsp; | Rotation (15°) | 43.47 | 32.82 | 42.62 | 37.26 | 35.97 |
nbsp; | Rotation (45°) | 41.44 | 31.59 | 41.22 | 37.07 | 35.24 |
nbsp; | Rotation (90°) | 37.39 | 37.6 | 39.85 | 37.23 | 34.45 |
nbsp; | Rotation (150°) | 36.60 | 31.80 | 40.29 | 36.80 | 35.24 |
nbsp; | Rotation (180°) | 38.04 | 37.44 | 39.75 | 36.79 | 34.12 |
Table1: Performance of proposed scheme for watermarked images at α = 0.1.
All results are analyzed for images boy, tissue, Saturn, green and satellite are summarized in Table 1 shown below. The performances of these images are determined for watermarked images using performance parameter PSNR. Simultaneously the attacks like Gaussian noise, speckle noise, salt pepper noise and rotation attacks are also tested on watermarked images and found that the watermarked images resist well against these attacks. Watermarked image for without any attack produces 51.8 dB PSNR for boy image same image also shows better results under noisy environment over other test images.
In Table 2 the proposed scheme is compared with existing schemes and shown the superiority and robustness of scheme under noisy environment. The Table 2 clearly shows the proposed scheme is better than 2.1 dB, 2.22 dB under Gaussian and salt pepper noise scheme given by Bansal et al. [16] respectively whereas proposed scheme shows slightly inferior performance by almost 4 dB below but in considerable range. Proposed scheme also shows resistance against rotation attack which is not cited in [16].
nbsp; | Attacks | nbsp; | nbsp; | |
Proposed Schemes | Gaussian Noise | Salt and Pepper Noise | Speckle Noise | Rotation |
---|---|---|---|---|
Bansal et al. [16] | 44 dB | 40.48 dB | 43.85 dB | ----- |
Proposed | 46.10 dB | 42.70 dB | 39.58 dB | 43.47 dB |
Table 2: Comparison of proposed scheme over existing scheme.
This article suggested a robust copyright protection scheme based on discrete wavelet transform (DWT) and visual hided scheme (VHS). Our proposed scheme, shows higher perceptible performance of watermarked image without attack environment produces 51.8 dB PSNR maximum to minimum 47.7dB for test images. Under attack environment the performance degrade not significantly but in under tolerable range of 30 dB to 42 dB. The proposed scheme also offers superior PSNR of 2.1 dB, 2.22 dB under Gaussian and salt pepper noise over scheme given by Bansal et al. [16]. Further for future directions fractional transforms can be more suitably use to increase system robustness in the same direction.