IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 06-09

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Color Image Watermarking Based on Fast Discrete Pascal Transform (CIWFDPT) Ahsan Mullick1 1

M.Tech Student, Computer Science & Engineering, Institute of Engineering & Management Kolkata, West Bengal, India [email protected]

Abstract In this paper, a novel color image watermarking based on Fast Discrete Pascal Transform has been proposed. The carrier image is divided into a pair of pixel components in row major order before applying Fast Discrete Pascal Transform (FDPT) in each pair of pixels. After the image has been converted to transform domain, the secret watermark is embedded. To transform into the spatial domain Inverse Fast Discrete Pascal Transform (IFDPT) is applied. This process is repeated based on the size and content of the watermark. Proposed technique works well than existing techniques such as (FWSDHTCIA) [6] technique in terms of Peak Signal to Noise Ratio (dB) and capacities (Bytes).

Keywords: FDPT, PSNR, Capacity, Spatial Domain and Watermark.

1. Introduction Internet serves as an important role for data transmission and sharing in the highly digitalized world. As we are using a public medium, confidential data might be stolen, copied, modified, or destroyed by an attacker. Therefore, security problems become an essential issue. Steganography and watermarking is such an issue which solves this problem by protecting the secret information into another media in an imperceptible way. Steganography means covered writing which is a combination of two Greek words. It means hiding a secret message in an object in such a way that only the sender and receiver know about the existence of a secret message in it. It is much more effective than cryptography as cryptography does not hides the existence of the message. Cryptography only encrypts the message so that the intruder is not able to read it. Steganography [1] needs a carrier to carry the hidden message. Normally the cover or carriers with low number of colours or with unique semantic contents are avoided [2]. Based on cover image, steganography is classified as Text steganography, Image steganography, Audio steganography, Video steganography, and Protocol steganography [3]. Steganography is been widely used since the ancient times in different ways. But in the modern time with the advent of internet it has found a lot of application. An important application of steganography is digital watermarking which is used to scale down piracy. It has been found that global piracy in mp3 using internet costs the industry about £2.8 billion a year [3]. Two types of watermarking are used Fragile and Robust. Both require the information to be embedded which may contain the watermark of the original owner. In fragile watermarking the information is destroyed if the file is modified. The file which is tampered will not have the watermark. It is used to prove that the file is not modified. Robust watermarking is used in the applications in which changing the watermark will destroy the file or make it easily perceivable by human eye that the watermark is changed. A type of watermarking is called fingerprinting which is used to track the source of the copyright violation. When a file is distributed by the original owner it gives a unique identifier to every customer which is hidden in the file. If that file is found in possession of someone else the customer who has distributed the file is easily identified by matching the identifier of the file with that of the customer. However Ahsan Mullick,

IJRIT

6

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 06-09

fingerprinting technique is not feasible in large scale distribution where each customer requires having a different identifier. Watermarking can also be classified as Visible and Imperceptible watermarks. Visible watermarks are easily perceived by human eye whereas imperceptible watermarks are hidden in the file so that it is not detected by human eye. The watermark data can be incorporated in both spatial and frequency domain whereas the frequency domain techniques provides better security and robustness. Few frequency transformation approaches previously used us for embedding watermark message/image are discrete cosine transform (DCT), discrete wavelet transform (DWT), discrete Fourier transform (DFT) etc. In 2012, Mandal and Ghosal [7] was proposed a novel watermarking technique based on Discrete Hartley Transformation. The Hartley transform has been chosen for watermarking purpose as it produces real output for a real input which can be designated as its own inverse. Thus it has computational advantages over the discrete Fourier transform, although analytic expressions are usually more complicated for the Hartley transform. The definition of SDHT is the difference of even and odd parts of the DFT. Proposed technique emphasizes on Fast Discrete Pascal Transform (FDPT) for watermarking purpose which offers better capacity, less quality degradation and enhanced security over existing transformation based watermarking methods as discussed above.

2. Fast Discrete Pascal Transform (FDPT) Discrete Pascal Transform (DPT) was proposed by Aburdene and Goodman [5]. But for a vector of length N, it required N2 multiplications and N(N-1) additions. To address this computational complexity A.N Skodras proposed a Fast Discrete Pascal Transform (FDPT) which requires only ½ N (N-1) additions and no multiplications [6]. It has reduced computational complexity which requires less time and hardware complexity. Suppose data is defined by matrix A and transform coefficient is defined by matrix B. The transform coefficient is given by the formula (1) ‫ܤ‬0 1 B = XA or, ቂ ቃ = ቂ ‫ܤ‬1 1

0 ‫ܣ‬0 ቃ ቂ ቃ or, B0= A0 and B1=A0 - A1 −1 ‫ܣ‬1

(1)

Where, X is the Pascal transform matrix. The Inverse Fast Discrete Pascal Transform (IFDPT) is used to convert the transform component into spatial component using the formula given by (2) A0=B1 and A1=B0 – B1

(2)

3. Proposed Method In this paper, a novel watermarking technique based on Fast Discrete Pascal Transform (FDPT) based watermarking technique has been proposed. The forward Fast Discrete Pascal Transform (FDPT) converts each pixel pair of the host into transform domain for embedding the secret watermark. Two bits of the watermark data stream are embedded into each transformed component in a sliding window manner. Each pair of embedded components is then re-transformed back into spatial domain using the inverse Fast Discrete Pascal Transform (IFDPT). The intended receiver extracts the secret data from the watermarked image using the reverse procedure. The extracted bits constitute either a character or pixel component which in succession generates the secret watermark.

3.1 Embedding Algorithm a) Divide the carrier image into a set of pair of pixel components in row major order. b) Convert each pair of pixel components into transform domain using Fast Discrete Pascal Transform (FDPT) in row major order. c) Embed two bits of secret watermark into each transformed component. d) Apply Inverse Fast Discrete Pascal Transform (IFDPT) to get back to the pixel components in spatial domain. e) Successive embedding operation produces the final watermarked image.

Ahsan Mullick,

IJRIT

7

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 06-09

3.2 Extraction Algorithm a) Consider a pair of pixel components from watermarked image. b) Convert each pair of pixel components using Fast Discrete Pascal Transform (FDPT). c) Two bits of hidden watermark are extracted from each transformed component. Each 8 bits extraction constitutes a pixel component. d) Apply Inverse Fast Discrete Pascal Transform (IFDPT) to get back to the pixel components in spatial domain. e) Repeat steps 1 to 4 until the whole watermark is extracted.

4. Experimental Results and Figures In the proposed scheme a 512 x 512 color image is taken as host image and a 254 x 256 gold coin as watermark. In Fig. 1 only the ‘Lena’ image has been used, to provide the overview of the process. Experimental results, figures and a comparative study with the FWSDHTCIA [7] scheme for the proposed technique has been discussed in this section. The experiment deals with five different color images (a-e), where each pixel is a combination of Red, Green and Blue components. Proposed technique offers good fidelity stego-image and a high capacity.

a.

Lena

b.

Gold-Coin

c.

Watermarked/Stego Lena

Fig 1. Original, Watermark and Watermarked images in proposed technique

It is seen from table 1 that the proposed technique improvises the capacities as well as quality in terms of Peak Signal to Noise Ratio over FWSDHTCIA [7]. In our proposed technique, for “Lena” image, the capacity is 32768 bytes more over FWSDHTCIA [7] whereas the PSNR (dB) improvement is around 3 dB.

Table 1. Comparative study of proposed technique over FWSDHTCIA [7] in terms of Capacity and PSNR

Carrier Images Lena Baboon Pepper Sailboat Airplane

FWSDHTCIA [7] Capacity (Bytes) PSNR (dB) 163840 38.69 163840 40.11 163840 38.77 163840 39.36 163840 38.13

Proposed Method Capacity (Bytes) PSNR (dB) 196608 41.8026 196608 41.7222 196608 39.2572 196608 41.5463 196608 41.8811

The comparison results in terms of mean, standard deviation and median between original and watermarked ‘Lena’ image for Red/Green/Blue channel is depicted in fig. 2. The experimental result in table 2 also ensures that the difference between two images is minimal.

Ahsan Mullick,

IJRIT

8

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 06-09

Table 2. Comparison results of mean, median and standard deviation in a channel wise manner

Mean Median Standard Deviation

Red Channel 180.22 197 49.05

Original Lena Green Blue Channel Channel 99.05 10.41 97 100 52.88 34.06

Watermarked Lena Red Green Blue Channel Channel Channel 180.70 99.63 105.96 197 98 102 49.04 52.92 34.15

5. Conclusion A secured watermarking technique has been proposed in frequency domain which performs better than existing techniques in terms of capacity and PSNR. Also, the fast Pascal transform offers a computational complexity for which it requires only ½ N (N-1) additions and no multiplications.

References [1] Artz D., “Digital steganography: hiding data within data”, Internet Computing, IEEE, vol. 5, Issue: 3, pp. 75-80, May/Jun 2001. [2] T.Aura .”an invisible communication”in proceedings of hut seminar on network security on network security.95.Espoo ,finland ,nov 1995. [3] D.R. Stinson, Cryptography: Theory and Practice, BocaRaton, CRC Press, 1995. [4] BBC News, Piracy blamed for CD sales slump, BBC, http://news.bbc.co.uk/1/hi/entertainment/new_media/1841768.stm, February 2002. [5] M.F. Aburdene and T.J. Goodman: “The Discrete Pascal Transform”, IEEE Signal Processing Letters, Vol. 12, No. 7, pp. 493-495, July 2005. [6] Skodras A.N., “Fast Discrete Pascal Transform”, ELECTRONICS LETTERS, Vol. 42 No. 23, 9th November 2006. [7] Mandal J.K, Ghosal S.K, "A Fragile Watermarking based on Separable Discrete Hartley Transform for Color images Authentication (FWSDHTCIA)", Signal & Image Processing : An International Journal (SIPIJ), DOI : 10.5121/sipij.2012.3603, ISSN : 0976 - 710X (Online) ; 2229 - 3922 (print), Vol.3, No.6, pp. 23-33, December 2012.

Ahsan Mullick,

IJRIT

9

Color Image Watermarking Based on Fast Discrete Pascal Transform ...

It is much more effective than cryptography as cryptography does not hides the existence of the message. Cryptography only encrypts the message so that the intruder is not able to read it. Steganography [1] needs a carrier to carry the hidden message. Normally the cover or carriers with low number of colours or with unique ...

168KB Sizes 0 Downloads 276 Views

Recommend Documents

Robust Image Watermarking Based on Local Zernike ...
Signal Processing Laboratory, School of Electrical Engineering and INMC, ..... to check whether the suspect image is corrupted by resizing or scal- ing attacks.

Image Retrieval: Color and Texture Combining Based on Query-Image*
into account a particular query-image without interaction between system and .... groups are: City, Clouds, Coastal landscapes, Contemporary buildings, Fields,.

A Progressive Image Transmission Method based on Discrete ...
A Progressive Image Transmission Method based on Discrete Wavelet Transform (DWT).pdf. A Progressive Image Transmission Method based on Discrete ...

Image Retrieval Based on Wavelet Transform and Neural Network ...
The best efficiency of 88% was obtained with the third method. Key Words: .... Daubechies wavelets are widely used in signal processing. For an ..... Several procedures to train a neural network have been proposed in the literature. Among ...

a new color image cryptosystem based on a ... - Semantic Scholar
is used to build a new digital chaotic cryptosystem. The characteristics of PWLCM are very suitable for the de- sign of encryption schemes. The implicit digital ...

A Robust Color Image Quantization Algorithm Based on ...
Clustering Ensemble. Yuchou Chang1, Dah-Jye Lee1, Yi Hong2, James Archibald1, and Dong Liang3. 1Department of Electrical and Computer Engineering, ...

A Robust Color Image Quantization Algorithm Based on ...
2Department of Computer Science, City University of Hong Kong, Kowloon, Hong Kong ...... Ph.D. degrees in computer science from the University of.

Image Compression Using the Discrete Cosine Transform
NASA Ames Research Center. Abstract. The discrete ... The discrete cosine transform of a list of n real numbers s(x), x = 0, ..., n-1, is the list of length n given by:.

Image Compression and the Discrete Cosine Transform ...
We are now ready to perform the Discrete Cosine Transform, which is accomplished by matrix multiplication. D : TMT r. 5. In Equation (5) matrix M is first multiplied on the left by the DCT matrix T from the previous section; this transforms the rows.

3D Fourier based discrete Radon transform
Mar 21, 2002 - School of Computer Science, Tel Aviv University, Tel Aviv 69978, Israel ... where x = [x,y,z]T, α = [sinθ cosφ,sinθ sinφ,cosθ]T, and δ is Dirac's ...

Comparative Study of Reversible Image Watermarking: Fragile ...
Status and Key Issues", International Journal of Network Security, Vol.2, No.3, PP.161–171, May 2006. [9] Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, ...

Comparative Study of Reversible Image Watermarking: Fragile ...
1 PG Student, Department of Electronics and Communication, Gujarat ... this paper is to define the purpose of reversible watermarking, reflecting recent progress ...

Fast Fourier Transform Based Numerical Methods for ...
Analyzing contact stress is of a significant importance to the design of mechanical ...... A virtual ground rough surface can be formed through periodically extend-.

A Novel Blind Watermarking Scheme Based on Fuzzy ...
In this paper, a novel image watermarking scheme in DCT domain based on ... health professionals and manipulated and managed more easily [13],[15] .... log),(. (8). And 'entropy' is an indication of the complexity within an image. A complex ..... dif

3D discrete X-ray transform
The continuous X-ray transform of a 3D function f(x,y,z), denoted by Pf , is defined by the set of all line integrals of f . For a line L, defined by a unit vector θ and a ...

High capacity audio watermarking based on wavelet ...
cessing (IIH-MSP'06), Pasadena,CA USA, pp. 41-46,2006. [7] M.A.Akhaee,S.GhaemMaghami,and N.Khademi,“A Novel. Technique forAudio Signals Watermarking in the Wavelet and Walsh Transform Domains”,IEEEInternational Sympo- sium on Intelligent Signal P

2D Image Morphing Using Pixels Based Color Transition.pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 2D Image ...

Block based embedded color image and video coding
We call this scheme as CSPECK (Color-SPECK) and compare ..... For comprehensive simulation results on various color test images at various bit-rates with ...

combining wavelets with color information for content-based image ...
Keywords: Content-Based Image Retrieval, Global Color Histogram, Haar Wavelets, ..... on Pattern Recognition (ICPR), Quebec City, QC, Canada, August 11-.

Image Retrieval: Color and Texture Combining Based ...
tion has one common theme (for example, facial collection, collection of finger prints, medical ... It is possible to borrow some methods from that area and apply.

Outdoor Scene Image Segmentation Based On Background.pdf ...
Outdoor Scene Image Segmentation Based On Background.pdf. Outdoor Scene Image Segmentation Based On Background.pdf. Open. Extract. Open with.

A local fast marching-based diffusion tensor image registration ...
relatively low resolution of DTI and less advanced alignment techniques in the initial works, global brain registration was also applied to quantitatively ...... Illustration of the local neighborhood and the deformed tensors. (a) The tensors in the 

Variable Threshold Based Reversible Watermarking
Similarly, Bilal et al. proposed a fast method based on Dynamic Programming. (DP) [6]. ... able to embed depth maps generated through other advanced approaches [21]. ..... [25] http://www.securityhologram.com/about.php. [26] ENHANCING ...

Warped Discrete Cosine Transform Cepstrum
MFCC filter bank is composed of triangular filters spaced on a logarithmic scale. ..... Region: North Midland) to form the train and test set for our experiments.