IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 114- 121

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Evaluation of LSB Watermarking Scheme for Grayscale Images Deepshikha Chopra1, Rajesh Purohit2 and Gaur Sanjay3 1

M.Tech, CSE Department, Jodhpur Institute of Engg. & Technology, RTU Jodhpur, Rajasthan, India [email protected] 2

HOD, CSE Department, MBM Engg. College , JNVU Jodhpur, Rajasthan, India [email protected] 3

HOD, ECE Department, JIET College, RTU Jodhpur, Rajasthan, India [email protected] Abstract

With the recent advent in technology the availability, access, transmission and manipulation of digital data (such as images, audio, video, software etc.) have become very easy. Digital Watermarking is a technology developed to ensure and facilitate the data authentication, security and copyright protection. This paper incorporates the LSB watermarking of grayscale images. The algorithm is simple and effects of various attacks are studied in terms of quality and efforts.

Keywords: LSB, Watermarking, MSE, PSNR, Robustness, HVS.

1. Introduction In recent years, due to the advancement in technologies, most of the individuals use the internet as the most common medium to transmit data. But with this advancement, security threats are increasing while sending data over the internet. The private/confidential data can be hacked in many ways. Therefore it becomes very much essential to take data security into key considerations. Data security basically means protection of data from unauthorized users or hackers and providing high security to prevent data alteration. This area of data security has gained more attention over the recent years due to the massive increase in data transfer rate over the internet [1, 2, 3]. Information security consists of the measures adopted to prevent the unauthorized use or change of data or capabilities [4, 5]. Information security is the protection of information, system and hardware that use, store, and transmits this information. The data is transmitted from source to destination but the hackers might hack the network in order to access or modify the original data. These types of attacks are formally known as Security Attacks. In order to circumvent the problem of the security attacks in data transfers over the internet, many techniques have been developed like: Cryptography, Steganography and Digital Image Watermarking. Digital Image Watermarking is provides copyright issues of digital data distributed [6]. It acts as a very good medium for copyright issues as it embeds a symbol or a logo in the form of a Watermark, which cannot be altered manually. One critical factor, which is to be kept in mind while using Watermarking, is to avert any alterations to the originality of the image after embedding the data. When the image with the secret data is transmitted over the internet, unauthorized parties may want to hack the data hidden over the image or change it. If the originality of the image has been altered, then it will be easier to hack the information by unauthorized persons. In order to improve the security, the Digital Watermarks are predominantly inserted as transformed digital signal into the source data using key based embedding algorithm and pseudo noise pattern. The best known Watermarking method that works in the spatial domain is the Least Significant Bit (LSB), which replaces the least significant bits of pixels selected to hide the information. This method has several implementation versions that improve the algorithm in certain aspects.

Deepshikha Chopra,

IJRIT

114

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 114- 121

2. Review of Least Significant Bit (LSB) The most common implementation of spatial domain watermarking is the Least Significant Bit (LSB) Method. The LSB method involves replacing the N least significant bits of each pixel of base image with watermark image bits. Since human visual system (HVS) can’t detect the small differences between adjacent pixels leaving the results virtually unnoticeable nature in base image. In a digital image, information can be inserted directly into every bit of image information or the more busy areas of an image can be calculated so as to hide such messages in less perceptible parts of an image [7],[8]. Tirkel et. al were one of the first used techniques for image watermarking. Two techniques were presented to hide data in the spatial domain of images by them. These methods were based on the pixel value’s Least Significant Bit (LSB) modifications. The algorithm proposed by Kurah and McHughes [9] to embed in the LSB and it was known as image downgrading [9]. An example of the less predictable or less perceptible is Least Significant Bit insertion. This section explains how this works for an 8-bit grayscale image and the possible effects of altering such an image. The principle of embedding is fairly simple and effective. If we use a grayscale bitmap image, which is 8- bit, we would need to read in the file and then add data to the least significant bits of each pixel, in every 8-bit pixel. In a grayscale image each pixel is represented by 1 byte consist of 8 bits. It can represent 256 gray colors between the black which is 0 to the white which is 255. The principle of encoding uses the Least Significant Bit of each of these bytes, the bit on the far right side. If data is encoded to only the last two significant bits (which are the first and second LSB) of each color component it is most likely not going to be detectable; the human retina becomes the limiting factor in viewing pictures [10]. The algorithm proposed by Jhonson and Katzengbeisseret [11] consists of choosing subset of base image and substitution is performed by exchanging LSB of base image and watermark image. To extract the watermark back one must have the sequence of element indices used in embedding process. In digital image information can be inserted directly into every bit of image or more busy areas of an image can be calculated so as to hide such messages in less perceptible parts [12, 13].

3. Process of LSB Watermarking Based on algorithms proposed by Jhonson and Katzengbeisseret [11] LSB watermark embedding and extraction is performed. The encoder inserts the watermark image into base image. The decoder extracts the watermark from the watermarked image and validates the presence of watermarked input or unmarked input. If the watermark is visible decoder is not needed for detection. Watermark

Original Image

Embed Watermark

Noise Watermarked Image

Extract Watermark

Watermark

Fig. 1 Framework of Watermarking

Deepshikha Chopra,

IJRIT

115

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 114- 121

4. Experimental Results and Discussion In our experimental results, four grayscale BMP images of 512 * 512 and 256 * 256 are used as shown in figure are used as base images. Watermark images used are of same size type and small size (than base image) type. As it is known that every pixel in gray scale image contains 8 bits. The watermark bits titles out the LSB to full sized base image. The watermarked image shows a little but not visually noticeable degradation. Individually all bits are replaced and its impact on quality is studied. Several Functions are used to qualify the watermarking algorithm, examining tests on resulted watermarked image are studied.

(A)

(B)

(C)

(D)

Fig. 2 The Base Images: (A) Face (512*512)(B) Building (512*512)(C) Forest (256*256)(D) Flower(256*256)

(A)

(B)

(C)

Fig. 3 (A) Watermark used (B) Watermarked Image with least bits shifted = 6 (C) Recovered Watermark

4.1 Imperceptibility Imperceptibility of watermark is tested by comparing the watermarked image with original image or base image. MSE and PSNR tests are used in this regard. Figure 3(A) shows the watermark used (256*256) to embed and Figure 3 (B) shows the watermarked image. The watermark remains invisible till bit shift 4, from bit shift 5 to 8 the watermark becomes visible in image. The watermark recovered is not of very good quality. MSE (Mean Square Error) and PSNR (Peak to Signal Ratio) are two major error metrics used to compare image compression quality. This ratio is used as a quality measurement between original image and watermarked image.

MSE ( x, y ) =

1 N

N

∑(x − y ) i

i

2

(1)

i =1

MSE represents cumulative squared error between original image and watermarked image, whereas PSNR represents measure of peak error. The lower the value of MSE, lower will be the error. PSNR is computed as:

Deepshikha Chopra,

IJRIT

116

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 114- 121

PSNR = 10 log 10

L2 MSE

(2) where L is dynamic range of allowable pixel intensities or maximum fluctuations or the values in image, its value is 255 for 8 bits unsigned number. Table 1 Size of Base image watermark image and obtained watermarked image

Size Watermark Image

of

Watermark embedded bytes

Size of watermarked image

Image

Size of Base Image

Face

768 KB

192 KB

196608

768 KB

Building

768 KB

192 KB

196608

768 KB

Forest

192 KB

192 KB

196608

192 KB

192 KB

192 KB

196608

192 KB

Flower

in

From Table 2 shown below we notice that there is no difference between the original and watermarked image in first and second LSB by using our naked eyes. No distortion occurs for these watermarked images. We found distortion when we embed watermark in third and fourth LSB. Distortions increased with increasing number of LSB replacement. We got the result after we calculated MSE (Mean Square Error) and PSNR (Peak Signal to Noise Ratio). Typically values for PSNR are between 30 dB and 40 dB [12]. If the PSNR of the watermarked image is more than 30, it is hard to be aware of the differences with cover image from human eyes system [14]. The invisibility of the watermark is good. Comparison is made for different images. Table 2 Comparison of MSE and PSNR of the watermarked images in LSB bit wise replacement

Bits Substituted

Face

Building

Flower

Forest

MSE

PSNR

MSE

PSNR

MSE

PSNR

MSE

PSNR

L=1

0.17

55.13

0.17

55.94

0.16

56.05

0.17

55.97

2

0.66

49.95

0.67

49.94

0.65

50.03

0.67

49.93

3

2.65

43.94

2.64

43.94

2.58

44.04

2.63

43.96

4

10.51

37.95

10.65

37.89

10.28

38.04

10.40

38.00

5

42.20

31.91

41.92

31.94

39.71

32.18

41.38

32.00

6

169.52

25.87

168.70

25.89

411.93

31.96

162.76

26.05

7

658.93

19.98

666.41

19.93

648.13

20.05

646.38

20.06

Deepshikha Chopra,

IJRIT

117

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 114- 121

2699.54

8

13.85

2756.85

13.76

2490.92

14.20

2500.67

14.18

4.2 Robustness Attacks like adding salt and pepper noise, Gaussian noise addition and cropping are tested on watermarked images. The purpose of these attacks is to prove the robustness of algorithm. 4.2.1 Noise Attacks The watermarked images are tested by adding ‘salt and pepper’ noise of 0.02 probability and ‘gaussian noise’ as shown in fig. 4(A) and fig. 4(B). Some data was lost. Even if watermark size was less than multiple copies of watermark were embedded and recovered. The robustness is verified by taking difference between base image and attacked image. Thus MSE and PSNR values are calculated as shown in table 2 and table 3 below.

(A)

(B)

Fig. 4 Noise Attacks (A) Salt & Pepper Noise Attack (B) Gaussian Noise Attack Table 3 Comparison of MSE and PSNR values by adding Salt and Pepper noise on watermarked image

Bits Substituted

Face

Building

Flower

Forest

MSE

PSNR

MSE

PSNR

MSE

PSNR

MSE

PSNR

L=1

140.76

26.72

152.56

26.40

164.92

25.87

125.69

27.27

2

137.81

26.72

154.52

26.26

170.69

25.81

124.96

27.06

3

135.86

26.66

155.04

26.16

164.87

25.87

121.72

26.81

4

139.74

26.52

154.27

26.08

164.73

25.67

127.32

26.65

5

141.95

25.59

153.83

25.48

171.65

24.81

127.86

26.14

6

140.17

23.31

149.17

23.25

169.66

22.95

124.39

23.56

7

138.70

19.23

153.95

19.10

161.80

19.11

126.39

19.38

8

140.61

13.72

153.36

13.62

170.52

13.99

127.28

14.25

Deepshikha Chopra,

IJRIT

118

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 114- 121

Table 4 Comparison of MSE and PSNR values after Gaussian noise addition on watermarked image

Bits Substituted

Face

Building

Flower

Forest

MSE

PSNR

MSE

PSNR

MSE

PSNR

MSE

PSNR

L=1

202.12

25.10

185.27

25.48

169.64

25.88

208.39

24.96

2

202.23

25.09

186.25

25.47

169.80

25.84

208.61

24.97

3

201.98

25.05

185.72

25.42

170.49

25.49

208.76

24.90

4

202.83

24.93

186.40

25.30

167.53

25.66

211.34

24.78

5

202.81

21.36

185.80

24.71

166.13

25.96

208.94

24.28

6

201.43

22.77

186.05

22.76

169.09

23.04

210.40

22.55

7

202.67

18.99

185.87

18.92

168.74

19.05

209.01

19.10

8

201.55

13.63

185.91

13.54

169.32

13.90

208.51

14.11

4.2.2 Cropping Cropping is simply cutting off the parts of the image. It is better to bring back the cropped parts from the original image for better recovery of the watermark as depicted in fig. 5. We tested by cropping watermarked image from 512*512 pixels to 128*128 pixels. We lost some of information after we cropped the watermarked images but we still have the images

(A)

(B)

(C)

(D)

Fig. 5 Cropped Images (A) Face (B) Building (C) Forest (D) Flower 4.2.3 Rotation The watermarked image is rotated by slight angles. Although, there are small loses in quality of image. The pixels and size of image changes. Table 5 below shows different angle rotation attack on watermarked images and its impact on size and pixels.

Deepshikha Chopra,

IJRIT

119

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 114- 121

(A)

(B)

(C)

(D)

Fig. 6 Rotations at different angles of watermarked images Table5 Changes due to Rotation of Images at Different Angles

Images

Rotation Angles (in degrees)

Pixel Size

Pixel Size Obtained

Size of rotated image

Face

20

512*512

657*657

1.23 MB

China

45

512*512

725*725

1.50 MB

Forest

90

128*128

256*256

192 KB

Flower

60

128*128

353*353

365 KB

4.3 Effort Effort is measured as (n-1) times towards quality. Suppose the watermarks inserted in base image are n, then one is the watermark to be inserted and (n-1) is the efforts introduced to increase robustness of images.

4.4 Capacity The capacity of watermark is determined by increasing or decreasing the size of watermark. Any method is not capable of holding more than a certain length of watermark or it will endanger its imperceptibility. In this paper we have tested same sized watermark in different sized base images, it qualifies for same size as base image and small size than base image.

5. Conclusion With the growing Internet era, it has become very easy to access, manipulate and transfer digital images Watermarking is used by those who wish to prevent others from copying their images and provide authentication and copyright protection to their images. With large research ongoing, it is difficult to affirm which method ensures integrity to images and generally to multimedia. This paper evaluates the robustness, imperceptibility, efforts required, capacity of LSB technique with different bit substitution from LSB to MSB in image. Effects of ‘salt and pepper’ noise and ‘gaussian’ noise’, cropping and rotation on watermarked images are evaluated and then quality measures are made by traditional error measuring techniques MSE and PSNR. The tool used for execution is ‘MATLAB R2008a’.

References [1] Deepshikha Chopra, and Preeti Gupta, “LSB Based Digital Image Watermarking for Gray Scale Images”, IOSRJCE, Vol 3, Issue 6, pp. 9-30, Sept- Oct 2012. [2] Bender, W., Gruhl, D., Morimoto, and and Lu, “Techniques for data hiding” IBM Systems

Deepshikha Chopra,

IJRIT

120

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 114- 121

Journal, vol. 35, pp. 3&4, 1996. [3] Saraju Prasad Mohanty “Watermarking of Digital Images”, Thesis Submitted at Indian Institute of Science, Bangalore, India, 1999. [4] Katzenbeisser, S. and Petitcolas, “Information hiding techniques for steganography and digital watermarking”. Artech House Books, 1999. [5] Van Dijk, and Willems, ”Embedding information in grayscale images”, in conference 22nd Symposium on Information and Communication Theory in the Benelux, Netherlands, pp. 147-154, May 15-16, 2001. [6] F. Hartung, and M. Kutter, “Multimedia Watermarking Techniques”, The IEEE, vol. 87, No. 7, pp. 10851103, July 1999. [7] Robert,L., and Shanmugapriya, “A Study on Digital Watermarking Techniques”, in proc of International Journal of Recent Trends in Engineering, vol 1, no-2, pp-223-225, 2009. [8]Brigitte Jellinek, “Invisible Watermarking of Digital Images for Copyright protection”, dissertation submitted at University Salzburg, Jan 2000. [9]Kurah, and Mchughes, “A Cautionary Note on Image Downgrading”, in proc. Of IEEE computer security applications conference,Vol 2,IEEE Computer Society Press, Los Alamitos, CA, pp. 153-159, 1992. [10] Zheng, Liu, Zhao and Saddik, “A Survey of RST Invariant Image Watermarking Algorithms”, in proc. Of ACM, 2007. [11] Jhonson, and Katezenbeisser, “A Survey of Steganographic Techniques” in Information Techniques for Steganography and Digital Watermarking, pp. 43-75, Dec. 1999. [12] Lee, G.J. Yoon, and Yoo K.Y., “A New LSB Based Digital Watermarking scheme with Random Mapping Functions”, in proc. Of IEEE signal processing, 2008. [13] Titty, “Steganography: Reversible Data Hiding Methods for Digital Media”, Bachelor Project. [14] A. Bamatraf, R. Ibrahim, and N. Salleh, “A New Digital Watermarking Algorithm Using Combination of LSB and Inverse Bit”, pub. in Journal of Computing, vol. 3 issue 4, pp. 1-8, April 2011.

Deepshikha Chopra,

IJRIT

121

Evaluation of LSB Watermarking Scheme for Grayscale Images

The watermarked images are tested by adding 'salt and pepper' noise of 0.02 probability and 'gaussian noise' as shown in fig. 4(A) and fig. 4(B). Some data was lost. Even if watermark size was less than multiple copies of watermark were embedded and recovered. The robustness is verified by taking difference between.

5MB Sizes 1 Downloads 286 Views

Recommend Documents

Evaluation of LSB Watermarking Scheme for Grayscale Images
Jodhpur, Rajasthan, India ... transmitted over the internet, unauthorized parties may want to hack the data hidden over the image or change it. If the originality of ...

an anonymous watermarking scheme for content ... - CiteSeerX
to anonymously purchase digital content, whilst enabling the content provider to blacklist the buyers that are distributing .... content that a buyer purchases, a passive ad- .... 2004) is a special type of signature scheme that can be used to ...

an anonymous watermarking scheme for content ... - CiteSeerX
Trusted Computing (TC) is a technology that has been developed to enhance the ..... 3G/GPRS. Broadcast. WLAN. Network. Technologies. Devices. Service and Content. Providers. User ? ... ual authentication for wireless devices. Cryptobytes,.

Watermarking of Chest CT Scan Medical Images for ...
Oct 27, 2009 - To facilitate sharing and remote handling of medical images in a secure ... 92-938-271858; fax: 92-938- 271865; e-mail: [email protected]).

Joint Compression/Watermarking Scheme Using ...
Abstract—In this paper, a watermarking scheme, called ma- jority-parity-guided error-diffused block truncation coding. (MPG-EDBTC), is proposed to achieve high image quality and embedding capacity. EDBTC exploits the error diffusion to effec- tivel

an anonymous watermarking scheme for content ...
Chevening/Royal Holloway Scholarship, and the Eu- ... minimises reliance on a TTP for privacy protection as ... privacy enhancing mechanisms to protect their.

Evaluation of Primary NET Scheme - Key Messages
Oct 25, 2007 - Hong Kong Institute of Education. - Study Period. - 2004-2006. - Study sample of Stakeholders ... encourage students in using English in class. ' There is frequent and positive interaction between the .... School of Continuing Professi

Evaluation of Primary NET Scheme - Key Messages
Study sample of Stakeholders. - 5914 Key Stage 1 students . 140 schools. • 105 Principals. 665 Local English Teachers (LETS). · 100 Native-speaking English.

Evaluation of Watermarking Low Bit-rate MPEG-4 Bit ... - CiteSeerX
other digital networks are means for freely and widely distributing high fidelity duplicates of digital media, which is a boon for authorized content distribution but ...

Performance evaluation of a reservation random access scheme for ...
We compute the steady state distribution of the Markov chain. This result is used to ... This work is supported by a University of California MICRO and Pacific-Bell ...

Evaluation of Watermarking Low Bit-rate MPEG-4 Bit ... - CiteSeerX
using a spatial-domain or transform-domain watermarking technique, and then ..... Average subjective test scores of each watermarked bit-stream and bit-rate.

A Novel Blind Watermarking Scheme Based on Fuzzy ...
In this paper, a novel image watermarking scheme in DCT domain based on ... health professionals and manipulated and managed more easily [13],[15] .... log),(. (8). And 'entropy' is an indication of the complexity within an image. A complex ..... dif

Robust Watermarking Scheme Applied to Radiological ...
†The author is with the National Institute of Astro- physics, Optics and Electronics, Luis Enrique Erro No. 1. Sta. Maria Tonantzintla, Puebla, Mexico C.P. 72840 a) E-mail: [email protected] b) E-mail: [email protected] c) E-mail: jamartinez@inao

Evaluation scheme for all M.E courses under G.T.U
announced at the beginning of the course. 4. Only theory subjects will have 70 marks of university theory exam , 30 marks of Mid semester theory exam and 20 ...

Evaluation scheme of (Industry Defined Project / User Defined Projects ...
examiner) (out of 100 marks). Industry based external guide may be invited for evaluation of 100 mark project exam in contextual cases. (Involvement by industry ...

Evaluation of Primary NET Scheme - Key Messages - EDB
(Key Stage 1) [ PLP -R(KS 1)] schools. ei 5 o -5 -. " - (. 11H -8. # -. Group A. UN ... Hong Kong Special Administrative Region. Conducted by: Patrick Griffin and ...

Uttarakhand Public Service Commission Recruitment 2017 for LSB ...
Uttarakhand Public Service Commission Recruitment 2017 for LSB @GovNokri.in.pdf. Uttarakhand Public Service Commission Recruitment 2017 for LSB ...

B.Tech 1st Year Evaluation Scheme, Syllabus 2016-17 on CBCS.pdf ...
There was a problem loading more pages. Retrying... B.Tech 1st Year Evaluation Scheme, Syllabus 2016-17 on CBCS.pdf. B.Tech 1st Year Evaluation Scheme, ...

Comparative Study of Reversible Image Watermarking: Fragile ...
Status and Key Issues", International Journal of Network Security, Vol.2, No.3, PP.161–171, May 2006. [9] Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, ...

Comparative Study of Reversible Image Watermarking: Fragile ...
1 PG Student, Department of Electronics and Communication, Gujarat ... this paper is to define the purpose of reversible watermarking, reflecting recent progress ...

Persistent Watermarking of Relational Databases
A watermark W embedded in the state d1 is called persistent w.r.t. Q if. ∀ i ∈ [2 ... n] ... watermark embedded in d. .... b.aj = (MSBs of r.aj ) ⊗ (ith signature bit).

Implementation of Audio Steganography over Two Level LSB Using ...
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg:56-63. Anil Soni, IJRIT. 56 ..... Systems Journal, Volume 39 , Issue 3-4, July 2000, pp. 547 – 568. [5] W Bender, D Gruhl, N Morimoto, A Lu, Tech

pdf convert to grayscale
Page 1 of 1. pdf convert to grayscale. pdf convert to grayscale. Open. Extract. Open with. Sign In. Main menu. Displaying pdf convert to grayscale.