call for papers, research paper publishing, where to publish research paper, journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJEI, call for papers 2012,journal of science and technolog
This document summarizes a research paper that proposes a content-based hybrid DWT-DCT watermarking technique for image authentication in color images. The technique embeds statistical features extracted from the host image as the watermark. Four different statistical features are used to generate the watermark - the Frobenius norm, mean, standard deviation, and combined mean and standard deviation of the host image blocks. The watermark is then embedded into the host image by applying both DWT and DCT transforms. During extraction, the same process is applied to extract the watermark for authentication. Experimental results show the technique is robust against various attacks like compression, noise, and filters.
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
The multilayer secured DWT-DCT and YIQ color space based image watermarking technique with
robustness and better correlation is presented here. The security levels are increased by using multiple pn
sequences, Arnold scrambling, DWT domain, DCT domain and color space conversions. Peak signal to
noise ratio and Normalized correlations are used as measurement metrics. The 512x512 sized color images
with different histograms are used for testing and watermark of size 64x64 is embedded in HL region of
DWT and 4x4 DCT is used. ‘Haar’ wavelet is used for decomposition and direct flexing factor is used. We
got PSNR value is 63.9988 for flexing factor k=1 for Lena image and the maximum NC 0.9781 for flexing
factor k=4 in Q color space. The comparative performance in Y, I and Q color space is presented. The
technique is robust for different attacks like scaling, compression, rotation etc.
Semi blind rgb color image watermarking using dct and two level svd
This paper presents semi blind RGB color image wate
rmarking using DCT and two-level SVD. First, RGB
image is divided into red, green, and blue channels
. The blue component is divided into blocks accordi
ng
to the watermark size. Second, DCT is applied to ea
ch block to form a new block in the transform domai
n.
DC component is retrieved and assembled from each b
lock to form a new matrix of 128x128 pixels. SVD is
applied to the resultant matrix to obtain matrices,
U, S and V. The watermark is embedded into the S
matrix. The watermark can be extracted without orig
inal host image, however, matrices U1, S and V1 are
required. Experimental results indicate that the pr
oposed algorithm can satisfy imperceptibility and i
t is
more robust against common types of attacks such as
filtering, adding noise, geometric and compression
attacks.
Fractal Compression of an AVI Video File using DWT and Particle Swarm Optimiz...
In the current scenario compression of video files is in high demand. Color video compression has become a significant technology to lessen the memory space and to decrease transmission time. Video compression using fractal technique is based on self similarity concept by comparing the range block and domain block. However, its computational complexity is very high. In this paper we presented hybrid video compression technique to compress Audio/Video Interleaved file and overcome the problem of Computational complexity. We implemented Discrete Wavelet Transform and hybrid fractal HV partition technique using Particle Swarm Optimization (called mapping of PSO) for compression of videos. The analysis demonstrate that hybrid technique gives a very good speed up to compress video and achieve Peak Signal to Noise Ratio.
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...ijcsit
1. The document discusses a proposed watermarking method using hybrid wavelet transforms and singular value decomposition (SVD).
2. Hybrid wavelet transforms are generated from combinations of discrete cosine transform (DCT), Walsh, Haar, and discrete Kekre transform (DKT). DCT is tested as both the global and local component of the hybrid transform.
3. SVD is applied to the watermark before embedding in the mid-frequency coefficients of the hybrid wavelet transformed host image.
4. The method is tested against various attacks including compression, cropping, noise addition, and resizing. Using DCT as the global component is found to be more robust, particularly against compression attacks.
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVDCSCJournals
Role of watermarking is dramatically enhanced due to the emerging technologies like IoT, Data analysis, and automation in many sectors of identity. Due to these many devices are connected through internet and networking and large amounts of data is generated and transmitted. Here security of the data is very much needed. The algorithm used for the watermarking is to be robust against various processes (attacks) such as filtering, compression and cropping etc. To increase the robustness, in the paper a hybrid algorithm is proposed by combining three transforms such as Contourlet, Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD). Performance of Algorithm is evaluated by using similarity metrics such as NCC, MSE and PSNR.
Robust Digital Image-Adaptive Watermarking Using BSS BasedCSCJournals
In a digital watermarking scheme, it is not convenient to carry the original image all the time in order to detect the owner's signature from the watermarked image. Moreover, for those applications that require different watermark for different copies, it is preferred to utilize some kind of watermark-independent algorithm for extraction process i.e. dewatermarking. Watermark embedding is performed in the blue channel, as it is less sensitive to human visual system .This paper proposes a new color image watermarking method ,which adopts Blind Source Separation (BSS) technique for watermark extraction. Single level Discrete Wavelet Transform(DWT) is used for embedding . The novelty of our scheme lies in determining the mixing matrix for BSS model during embedding. The determination of mixing matrix using Quasi-Newton’s (BFGS) technique is based on texture analysis which uses energy as metric. This makes our method image adaptive to embed the watermark into original image so as not to bring about a perceptible change in the marked image. BSS based on Joint diagonalization of the time delayed covariance matrices algorithm is used for the extraction of watermark. The proposed method, undergoing different experiments, has shown its robustness against many attacks including rotation ,low pass filtering, salt n pepper noise addition and compression. The robustness evaluation is also carried out with respect to the spatial domain embedding.
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN ijcseit
The multilayer secured DWT-DCT and YIQ color space based image watermarking technique with
robustness and better correlation is presented here. The security levels are increased by using multiple pn
sequences, Arnold scrambling, DWT domain, DCT domain and color space conversions. Peak signal to
noise ratio and Normalized correlations are used as measurement metrics. The 512x512 sized color images
with different histograms are used for testing and watermark of size 64x64 is embedded in HL region of
DWT and 4x4 DCT is used. ‘Haar’ wavelet is used for decomposition and direct flexing factor is used. We
got PSNR value is 63.9988 for flexing factor k=1 for Lena image and the maximum NC 0.9781 for flexing
factor k=4 in Q color space. The comparative performance in Y, I and Q color space is presented. The
technique is robust for different attacks like scaling, compression, rotation etc.
Semi blind rgb color image watermarking using dct and two level svdsipij
This paper presents semi blind RGB color image wate
rmarking using DCT and two-level SVD. First, RGB
image is divided into red, green, and blue channels
. The blue component is divided into blocks accordi
ng
to the watermark size. Second, DCT is applied to ea
ch block to form a new block in the transform domai
n.
DC component is retrieved and assembled from each b
lock to form a new matrix of 128x128 pixels. SVD is
applied to the resultant matrix to obtain matrices,
U, S and V. The watermark is embedded into the S
matrix. The watermark can be extracted without orig
inal host image, however, matrices U1, S and V1 are
required. Experimental results indicate that the pr
oposed algorithm can satisfy imperceptibility and i
t is
more robust against common types of attacks such as
filtering, adding noise, geometric and compression
attacks.
In the current scenario compression of video files is in high demand. Color video compression has become a significant technology to lessen the memory space and to decrease transmission time. Video compression using fractal technique is based on self similarity concept by comparing the range block and domain block. However, its computational complexity is very high. In this paper we presented hybrid video compression technique to compress Audio/Video Interleaved file and overcome the problem of Computational complexity. We implemented Discrete Wavelet Transform and hybrid fractal HV partition technique using Particle Swarm Optimization (called mapping of PSO) for compression of videos. The analysis demonstrate that hybrid technique gives a very good speed up to compress video and achieve Peak Signal to Noise Ratio.
The proposed system implements an image watermarking technique that incorporates human visual system (HVS) models into watermark embedding. The watermarking is performed in the wavelet domain. The algorithm first calculates the coarseness of different subbands (HH, HL, LH) to select the subband with the highest coarseness for watermark embedding. It then embeds the watermark bits into the selected subband by modifying the least significant bits of coefficients based on their values. Experimental results on test images show the technique is robust, with average watermark extraction rates of 80-95% and high PSNR values, even after filtering.
DCT and Simulink Based Realtime Robust Image WatermarkingCSCJournals
Ownership of digital content has become a serious matter, due to the exponential raise in the global repository of digital multimedia content, like images are to be considered in this paper. The validated proof as an imperceptible and robust watermark is needed to be embedded in the digital images. This paper proposes a simulation of DCT with Fuzzy Logic based HVS model for Realtime Robust Image Watermarking technique using Simulink.
High Speed and Area Efficient 2D DWT Processor Based Image Compressionsipij
The document describes a proposed high speed and area efficient 2D discrete wavelet transform (DWT) processor design for image compression applications implemented on FPGAs. The design uses a pipelined partially serial architecture to enhance speed while optimally utilizing FPGA resources. Simulation results show the design operating at 231MHz on a Spartan 3 FPGA, a 15% improvement over alternative designs. Resource utilization and speed are improved compared to previous implementations through the optimized DWT processor architecture and FPGA platform choice.
Noise Removal in Microarray Images Using Variational Mode Decomposition Techn...TELKOMNIKA JOURNAL
Microarray technology allows the simultaneous monitoring of thousands of genes in parallel.
Based on the gene expression measurements, microarray technology have proven powerful in gene
expression profiling for discovering new types of diseases and for predicting the type of a disease.
Enhancement, Gridding, Segmentation and Intensity extraction are important steps in microarray image
analysis. This paper presents a noise removal method in microarray images based on Variational Mode
Decomposition (VMD). VMD is a signal processing method which decomposes any input signal into
discrete number of sub-signals (called Variational Mode Functions) with each mode chosen to be its band
width in spectral domain. First the noisy image is processed using 2-D VMD to produce 2-D VMFs. Then
Discrete Wavelet Transform (DWT) thresholding technique is applied to each VMF for denoising. The
denoised microarray image is reconstructed by the summation of VMFs. This method is named as 2-D
VMD and DWT thresholding method. The proposed method is compared with DWT thresholding and
BEMD and DWT thresholding methods. The qualitative and quantitative analysis shows that 2-D VMD and
DWT thresholding method produces better noise removal than other two methods.
Review of Diverse Techniques Used for Effective Fractal Image CompressionIRJET Journal
This document reviews different techniques for fractal image compression to enhance compression ratio while maintaining image quality. It discusses algorithms like quadtree partitioning with Huffman coding (QPHC), discrete cosine transform based fractal image compression (DCT-FIC), discrete wavelet transform based fractal image compression (DWTFIC), and Grover's quantum search algorithm based fractal image compression (QAFIC). The document also analyzes works applying these techniques and concludes that combining QAFIC with the tiny block size processing algorithm may further improve compression ratio with minimal quality loss.
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarkingijsrd.com
Due to the extensive use of digital media applications, multimedia security and copyright protection has gained tremendous importance. Digital watermarking is a technology used for the copyright protection of digital applications. Image watermarking is used to hide the special information into the image and to later detect and extract that special information. Watermarking can be implemented both in spatial and frequency domain. In this paper frequency domain techniques were experimented. The methods compared in this paper are image watermarking using singular value decomposition (SVD) based and image watermarking using discrete wavelet transform (DWT) and Pseudo random sequence. Our experiments show that former technique have low peak signal to noise ratio (PSNR) value and also requires cover data at the detection where as in the later case we don’t require cover data and PSNR value is good.
The growing trend of online image sharing and downloads today mandate the need for better encoding and
decoding scheme. This paper looks into this issue of image coding. Multiple Description Coding is an
encoding and decoding scheme that is specially designed in providing more error resilience for data
transmission. The main issue of Multiple Description Coding is the lossy transmission channels. This work
attempts to address the issue of re-constructing high quality image with the use of just one descriptor
rather than the conventional descriptor. This work compare the use of Type I quantizer and Type II
quantizer. We propose and compare 4 coders by examining the quality of re-constructed images. The 4
coders are namely JPEG HH (Horizontal Pixel Interleaving with Huffman Coding) model, JPEG HA
(Horizontal Pixel Interleaving with Arithmetic Encoding) model, JPEG VH (Vertical Pixel Interleaving
with Huffman Encoding) model, and JPEG VA (Vertical Pixel Interleaving with Arithmetic Encoding)
model. The findings suggest that the use of horizontal and vertical pixel interleavings do not affect the
results much. Whereas the choice of quantizer greatly affect its performance.
Review On Fractal Image Compression TechniquesIRJET Journal
This document reviews different techniques for fractal image compression. It discusses how fractal image compression works by dividing an image into range and domain blocks. It then summarizes several papers that propose techniques for fractal image compression using discrete cosine transform (DCT) or discrete wavelet transform (DWT). These techniques aim to improve compression ratio and reduce encoding time. Finally, the document proposes a new method that combines wavelets with fractal image compression to further increase compression ratio while maintaining low image quality losses during decompression.
This document presents a DWT-based video watermarking algorithm that embeds a watermark into randomly selected video frames in the mid-frequency DWT coefficients. The algorithm first divides the video into frames and extracts the blue channel of randomly selected frames. It then applies DWT to the blue channel, extracts the mid-frequency components, and embeds the watermark by modifying these coefficients. After inverse DWT and recombining the color channels, the watermarked frames are assembled into the watermarked video. The algorithm was tested on standard videos and performance was measured using PSNR and MSE between the original and watermarked videos.
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
here it introduces an efficient multi-resolution watermarking methodology for copyright protection of digital images. By adapting the watermark signal to the wavelet coefficients, the proposed method is highly image adaptive and the watermark signal can be strengthen in the most significant parts of the image. As this property also increases the watermark visibility, usage of the human visual system is incorporated to prevent perceptual visibility of embedded watermark signal. Experimental results show that the proposed system preserves the image quality and is vulnerable against most common image processing distortions. Furthermore, the hierarchical nature of wavelet transform allows for detection of watermark at various resolutions, resulting in reduction of the computational load needed for watermark detection based on the noise level. The performance of the proposed system is shown to be superior to that of other available schemes reported in the literature.
This document discusses an enhanced technique for secure and reliable watermarking using Modified Haar Wavelet Transform (MFHWT). The proposed technique embeds a watermark into an original image using discrete wavelet transform (DWT) and wavelet packet transform (WPT) according to the size of the watermark. MFHWT is a memory efficient, fast, and simple transform. The watermarking process involves embedding and extraction processes. Various watermarking techniques in different transform domains are discussed, including DWT and WPT. The proposed algorithm uses MFHWT for decomposition and reconstruction. Image quality is measured using metrics like MSE and PSNR, with higher PSNR indicating better quality. The technique achieves robustness
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document analyzes the bit error rate (BER) performance of the mobile WiMAX physical layer under different communication channels and modulation techniques. It simulates BER and signal-to-noise ratio (SNR) using the Stanford University Interim (SUI) channel models, which model six different channel conditions for varying terrain types. The performance is evaluated for different data rates and modulation schemes like BPSK and OFDMA under the SUI channel models.
The document discusses tensile properties of long jute fiber reinforced polypropylene composites. It begins with an abstract that states the objective is to test tensile properties of composites made from chemically treated long jute fibers reinforced in polypropylene at different weight ratios. The results showed tensile strength and modulus increased for treated fiber composites compared to plain polypropylene, with up to a 28.4% increase for 15% NaOH treated fibers at 10% weight ratio. The introduction provides background on composites and defines them. It also describes the phases in a composite including polypropylene matrix and jute fiber reinforcement. Experimental details on materials and fiber extraction are then presented.
The document proposes a fast handoff scheme for IEEE 802.11 wireless networks using virtual access points. It aims to reduce handoff latency, which is primarily caused by the probe delay during scanning for new access points. The scheme uses selective scanning to identify neighboring access points with strong signals. It performs pre-registration of the mobile host with neighboring access points to transfer security contexts in advance. A virtual access point handles communication between the mobile host and registered access points to enable fast switching during handoff. Buffering at the virtual access point allows seamless data transfer when the connection changes between access points.
This document summarizes research into optimizing process parameters for Eli-Twist yarn production. Eli-Twist yarn is produced using Suessen Elite compact spinning technology and has advantages over traditional two-ply yarns. The distance between roving strands and negative pressure applied in the suction zone can substantially impact yarn quality. Ten trials were conducted varying these two parameters. The effects on yarn fineness, strength, elongation, imperfections and hairiness were evaluated. A process capability index (Cpk) was used to assess yarn quality. The goal was to optimize the parameters to improve Eli-Twist yarn quality.
An enhanced ip traceback mechanism for tracking the attack source using packe...IAEME Publication
The document discusses an enhanced IP traceback mechanism (EITM) to more efficiently trace the source of distributed denial of service (DDoS) attacks. EITM aims to reduce the number of packets required for traceback by improving existing linear and remainder packet marking schemes. It analyzes challenges in tracing attackers due to the stateless nature of the internet and proposes that an effective traceback scheme minimizes required packets. The main goal is a mechanism that needs a number of packets almost equal to the number of hops to reconstruct the attack path more efficiently.
A precise termination condition of the probabilistic packet marking algorithm...Mumbai Academisc
This document summarizes a research project that proposes a precise termination condition for the probabilistic packet marking (PPM) algorithm. The PPM algorithm allows routers to encode path information onto packets during a denial of service (DoS) attack, enabling the victim to reconstruct the attack graph. However, the existing PPM algorithm lacks a well-defined termination condition, and cannot handle multiple attackers. The proposed project aims to define a termination condition to ensure the reconstructed graph accurately represents the actual attack paths. It also extends the algorithm to support tracing packets from multiple attackers.
This document summarizes a research paper that proposes improvements to the probabilistic packet marking (PPM) algorithm for detecting the path of distributed denial-of-service attacks. The PPM algorithm allows routers to mark attack packets with identification information based on a predetermined probability. However, its termination condition is not well-defined, which can result in an incorrectly constructed attack path. The paper proposes a modified PPM algorithm called rectified PPM (RPPM) that defines a precise termination condition to guarantee the constructed attack path is correct with a specified level of confidence. An experimental framework is designed to test the RPPM algorithm under different packet marking probabilities and network structures.
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network simulator.
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
Similar to call for papers, research paper publishing, where to publish research paper, journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJEI, call for papers 2012,journal of science and technolog
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
This document summarizes a research paper that proposes a semi-blind image watermarking technique using discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD). The technique embeds a watermark in the middle frequency band of the DWT domain of a host image. It modifies the singular values of the DCT coefficients of the middle frequency band using singular values of the DCT transformed watermark. The watermark can then be extracted from the watermarked image using inverse processes. The technique was tested on various attacks and showed robustness, with correlation values between the extracted and original watermarks ranging from 0.5308 to 0.9665 and PSNR values indicating impercept
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
This document discusses a method for embedding a binary watermark image into a digital video using a hybrid of three transforms: discrete cosine transform (DCT), discrete wavelet transform (DWT), and singular value decomposition (SVD). The method first applies DCT to frames of the video, then applies three-level DWT to the transformed frames. SVD is then applied to both the transformed video frames and the watermark image. The watermark is embedded by modifying coefficients of the video based on the SVD results. PSNR, MSE, and correlation are used to evaluate the quality and robustness of the watermarked video.
A highly robust and secure image watermarking based on classification and vis...AliFatahbeygi
In this paper a new robust image watermarking algorithm based on blocks classification and visual cryp tography (VC) is presented. First the original image is decomposed into non-overlapping blocks. Then, we use canny edge detection and the support vector machine (SVM) classification method to categorize these blocks into smooth and non-smooth classes. The VC technique is used to generate two image shares: A
master share that is constructed according to the block classification results and an owner share generated by using the master share together with a binary watermark. To verify the ownership of the image the watermark can be retrieved by stacking the master share and the owner share. By skipping blocks which are not robust against attacks, the robustness of our proposed watermarking method is significantly improved. Our method is completely imperceptible because the watermark pattern is concealed without modifying the original host image.
This document discusses and compares two digital image watermarking techniques: discrete cosine transform (DCT) domain watermarking and discrete wavelet transform (DWT) domain watermarking. It first provides background on digital watermarking and explains watermark embedding and extraction processes in both the spatial and frequency domains. It then proposes a specific DCT watermarking technique that embeds a watermark by modifying mid-band DCT coefficients of divided image blocks. A DWT watermarking technique is also proposed that embeds a watermark in the LH sub-band of the DWT. Finally, the document indicates that experimental results will be used to compare the robustness of the two techniques against various attacks.
Digital watermarking has been proposed as a solution to the problem of copyright protection of
multimedia documents in networked environments. There are two important issues that watermarking
algorithms need to address. First, watermarking schemes are required to provide trustworthy evidence for
protecting rightful ownership. Second, good watermarking schemes should satisfy the requirement of
robustness and resist distortions due to common image manipulations (such as filtering, compression,
etc.). In this paper, a watermarking algorithm is proposed based on the Discrete Wavelet Transform
(DWT), Fractional Fourier Transform (FrFT) and Singular value decomposition (SVD). Analysis and
experimental results show that the proposed watermarking method performs well in both security and
robustness.
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...csandit
Geometric attacks can desynchronize the location of the watermark and hence cause incorrect
watermark detection. This paper presents a robust colour image watermarking scheme based on
visually significant feature points and image normalization technique. The feature points are
used as synchronization marks between watermark embedding and detection. The watermark is
embedded into the non overlapped normalized circular regions in the luminance component or
the blue component of a color image. The embedding of the watermark is carried out by
modifying the DCT coefficients values in selected blocks. The original unmarked image is not
required for watermark extraction Experimental results show that the proposed scheme
successfully makes the watermark perceptually invisible as well as robust to common signal
processing and geometric attacks.
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...researchinventy
This document presents a hybrid DWT-SVD method for digital video watermarking using random frame selection. The proposed method embeds a watermark into randomly selected video frames by applying discrete wavelet transform and singular value decomposition. The blue channel of selected frames is used for watermark embedding in the mid-frequency DWT coefficients. Experimental results show the method provides good imperceptibility and robustness against various attacks like compression, cropping, noise addition, contrast changes and tampering. The normalization coefficient between original and extracted watermarks is used to evaluate the performance under different attacks.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
computerized substance. Data took care of on web and mixed media system framework is in advanced structure. Computerized watermarking is only the innovation in which there is inserting of different data in advanced substance, which we need to shield from illicit replicating. Computerized picture watermarking is concealing data in any structure (content, picture, sound and video) in unique picture without corrupting its perceptual quality. On the off chance that of Discrete Wavelet Transform (DWT), deterioration of the first picture is completed to insert the watermark. Moreover, if there should arise an occurrence of cross breed system (DWT-SVD) firstly picture is decayed by and after that watermark is installed in solitary qualities acquired by application of Singular Value Decomposition (SVD). DWT and SVD are utilized in combination to enhance the nature of watermarking. We have the procedures which are looked at on the premise of Peak Signal to Noise Ratio (PSNR) esteem at various benefits of scaling component; high estimation of PSNR is coveted because it displays great intangibility of the strategy.
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
Abstract
These days, in every field there is gigantic utilization of computerized substance. Data took care of on web and mixed media system framework is in advanced structure. Computerized watermarking is only the innovation in which there is inserting of different data in advanced substance, which we need to shield from illicit replicating. Computerized picture watermarking is concealing data in any structure (content, picture, sound and video) in unique picture without corrupting its perceptual quality. On the off chance that of Discrete Wavelet Transform (DWT), deterioration of the first picture is completed to insert the watermark. Moreover, if there should arise an occurrence of cross breed system (DWT-SVD) firstly picture is decayed by and after that watermark is installed in solitary qualities acquired by application of Singular Value Decomposition (SVD). DWT and SVD are utilized in combination to enhance the nature of watermarking. We have the procedures which are looked at on the premise of Peak Signal to Noise Ratio (PSNR) esteem at various benefits of scaling component; high estimation of PSNR is coveted because it displays great intangibility of the strategy.
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
In this paper we propose a hybrid image watermarking algorithm which satisfies both imperceptibility and robustness requirements. Our proposed work provide an optimum solution by using singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark. Further to increase and control the strength of the watermark, we use a scale factor. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the new method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. Experimental results are provided in terms of peak signal to noise ratio (PSNR), normalized cross correlation (NCC) and gain factor to demonstrate the effectiveness of the proposed algorithm. Image operations such as JPEG compression from malicious image attacks and, thus, can be used for semi-fragile watermarking.
Iaetsd literature review on generic lossless visible watermarking &Iaetsd Iaetsd
This document discusses literature on lossless visible watermarking and lossless image recovery. It begins by introducing digital watermarking and classifying methods as visible or invisible. Reversible watermarking allows removal of embedded watermarks and restoration of the original content. The document then reviews existing watermarking techniques in the spatial, frequency and wavelet domains. It proposes a novel method for generic visible watermarking using deterministic one-to-one compound mappings that are reversible, allowing lossless recovery of original images from watermarked images. This approach can embed various visible watermarks of arbitrary sizes into images in a lossless manner.
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
Digital watermarking is an essential technique to add hidden copyright notices or secret messages to digital audio, image, or image forms. In this paper we introduce a new approach for digital image watermarking for real time applications. We have successfully implemented the digital watermarking technique on digital images based on 2-level Discrete Wavelet Transform and compared the performance of the proposed method with Level-1 and Level-2 and Level-3 Discrete Wavelet Transform using the parameter peak signal to noise ratio. To make the watermark robust and to preserve visual significant information a 2-Level Discrete wavelet transform used as transformation domain for both secret image and original image. The watermark is embedded in the original image using Alpha blending technique and implemented using Matlab Simulink.
Robust Image Watermarking Scheme Based on Wavelet TechniqueCSCJournals
In this paper, an image watermarking scheme based on multi bands wavelet transformation method is proposed. At first, the proposed scheme is tested on the spatial domain (for both a non and semi blind techniques) in order to compare its results with a frequency domain. In the frequency domain, an adaptive scheme is designed and implemented based on the bands selection criteria to embed the watermark. These criteria depend on the number of wavelet passes. In this work three methods are developed to embed the watermark (one band (LL|HH|HL|LH), two bands (LL&HH | LL&HL | LL&LH | HL&LH | HL&HH | LH&HH) and three bands (LL&HL&LH | LL&HH&HL | LL&HH&LH | LH&HH&HL) selection. The analysis results indicate that the performance of the proposed watermarking scheme for the non-blind scheme is much better than semi-blind scheme in terms of similarity of extracted watermark, while the security of semi-blind is relatively high. The results show that in frequency domain when the watermark is added to the two bands (HL and LH) for No. of pass =3 led to good correlation between original and extracted watermark around (similarity = 99%), and leads to reconstructed images of good objective quality (PSNR=24 dB) after JPEG compression attack (QF=25). The disadvantage of the scheme is the involvement of a large number of wavelet bands in the embedding process.
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
This document summarizes a research paper that proposes a multiple watermark embedding scheme based on human visual characteristics. The scheme embeds two watermarks in the luminance and chrominance blue components of an image. It uses Arnold scrambling to increase security, and embeds watermarks in the singular value decomposition domain by modifying coefficients based on a threshold. The proposed scheme is evaluated based on imperceptibility using SSIM and robustness using normalized cross-correlation and bit error rate. Experimental results show the scheme provides improved invisibility and resistance to various attacks.
A digital watermarking scheme based on integer wavelet transform and histogram techniques is
proposed in this paper. Lifting scheme based integer wavelet transform is used to provide ease of
transformation of compressed data and to increase the data embedding capacity. Also histogram technique
which is one of the reversible data hiding is used to embed the secret data into original image and retrieve the
original data back after extraction. The AES encryption is used to encrypt the embedded image to provide
authentication. This algorithm is developed using verilog code and implemented on FPGA Artix 7 board in
order to increase throughput, reduce area and power consumption.
A robust combination of dwt and chaotic function for image watermarkingijctet
This document summarizes a research paper on a robust image watermarking technique that combines discrete wavelet transform (DWT) and a chaotic function. The proposed method embeds a watermark into selected blocks of the low-frequency DWT subband of an image. It calculates the Euclidean distance between blocks of the watermark and image to select the most similar block for embedding. Experimental results on standard test images show the proposed method achieves better performance than previous methods in terms of PSNR and structural similarity under compression attacks. The extraction accuracy remains high even with noise attacks, though it degrades more under filtering attacks.
Image Authentication Using Digital Watermarkingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes and analyzes different digital watermarking techniques under various attacks. It compares the Least Significant Bit (LSB), Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT) watermarking algorithms in terms of invisibility, distortion, and robustness. The LSB, DCT, and DWT watermark embedding and extraction procedures are described. Simulation results showed that the algorithms had good robustness against common image processing operations and were invisible with low distortion.
Comparison of Invisible Digital Watermarking Techniques for its RobustnessIRJET Journal
This document compares two digital image watermarking techniques, discrete cosine transform (DCT) and discrete wavelet transform (DWT), to analyze their robustness. The techniques are implemented in MATLAB to embed a watermark into an original image. Various attacks are performed on the watermarked images and the correlation between the original and extracted watermarks is calculated. The results show that the DWT technique maintains a higher correlation than DCT after attacks like JPEG compression, indicating it is more robust to distortions.
Similar to call for papers, research paper publishing, where to publish research paper, journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJEI, call for papers 2012,journal of science and technolog (20)
This document discusses the impact of data mining on business intelligence. It begins by defining business intelligence as using new technologies to quickly respond to changes in the business environment. Data mining is an important part of the business intelligence lifecycle, which includes determining requirements, collecting and analyzing data, generating reports, and measuring performance. Data mining allows businesses to access real-time, accurate data from multiple sources to improve decision making. Using business intelligence and data mining techniques can help businesses become more efficient and make better decisions to increase profits and customer satisfaction. The expected results of applying business intelligence include improved decision making through accurate, timely information to support organizational goals and strategic plans.
This document presents a novel technique for solving the transcendental equations of selective harmonics elimination pulse width modulation (SHEPWM) inverters based on the secant method. The proposed algorithm uses the secant method to simplify the numerical solution of the nonlinear equations and solve them faster compared to other methods. Simulation results validate that the proposed method accurately estimates the switching angles to eliminate specific harmonics from the output voltage waveform and achieves near sinusoidal output current for various modulation indices and numbers of harmonics eliminated.
This document summarizes a research paper that designed and implemented a dual tone multi-frequency (DTMF) based GSM-controlled car security system. The system uses a DTMF decoder and GSM module to allow a car to be remotely controlled and secured from a mobile phone. It works by sending DTMF tones from the phone through calls to the GSM module in the car. The decoder interprets the tones and a microcontroller executes commands to disable the ignition or control other devices. The system was created to improve car security and accessibility through remote monitoring and control with DTMF and GSM technology.
This document presents an algorithm for imperceptibly embedding a DNA-encoded watermark into a color image for authentication purposes. It applies a multi-resolution discrete wavelet transform to decompose the image. The watermark, encoded into DNA nucleotides, is then embedded into the third-level wavelet coefficients through a quantization process. Specifically, the watermark nucleotides are complemented and used to quantize coefficients in the middle frequency band, modifying the coefficients. The watermarked image is reconstructed through inverse wavelet transform. Extraction reverses these steps to recover the watermark without the original image. The algorithm aims to balance imperceptibility and robustness through this wavelet-based, blind watermarking scheme.
1) The document analyzes the dynamic saturation point of a deep-water channel in Shanghai port based on actual traffic data and a ship domain model.
2) A dynamic channel transit capacity model is established that considers factors like channel width, ship density, speed, and reductions due to traffic conditions.
3) Based on AIS data from the channel, the average traffic flow is calculated to be 15.7 ships per hour, resulting in a dynamic saturation of 32.5%, or 43.3% accounting for uneven day/night traffic volumes.
The document summarizes research on the use of earth air tunnels and wind towers as passive solar techniques. Key findings include:
- Earth air tunnels circulate air through underground pipes to take advantage of the stable temperature 4 meters below ground for cooling in summer and heating in winter. Testing showed the technique can reduce ambient temperatures by up to 14 degrees Celsius.
- Wind towers circulate air through tall shafts to cool air entering buildings at night and provide downward airflow of cooled air during the day.
- Experimental testing of an earth air tunnel system over multiple months found maximum temperature reductions of 33% in spring and minimum reductions of 15% in summer.
The document compares the mechanical and physical properties of low density polyethylene (LDPE) thin films and sheets reinforced with graphene nanoparticles. LDPE/graphene thin films were produced via solution casting, while sheets were made by compression molding. Testing showed that the thin films had enhanced tensile strength, lower melt flow index, and higher thermal stability compared to sheets. The tensile strength of thin films increased by up to 160% with 1% graphene, while sheets increased by 70%. Melt flow index decreased more for thin films, indicating higher viscosity. Thin films also showed greater improvement in glass transition temperature. These results demonstrate that processing technique affects the properties of LDPE/graphene nanocomposites.
The document describes improvements made to a friction testing machine. A stepper motor and PLC control system were added to automatically vary the load on friction pairs, replacing the manual method. Tests using the improved machine found that the friction coefficient decreases as the load increases, and that abrasive and adhesive wear increased with higher loads. The improved machine allows more accurate and convenient testing of friction pairs under varying load conditions.
This document summarizes a research article that investigates the steady, two-dimensional Falkner-Skan boundary layer flow over a stationary wedge with momentum and thermal slip boundary conditions. The flow considers a temperature-dependent thermal conductivity in the presence of a porous medium and viscous dissipation. Governing partial differential equations are non-dimensionalized and transformed into ordinary differential equations using similarity transformations. The equations are highly nonlinear and cannot be solved analytically, so a numerical solver is used. Numerical results are presented for the skin friction coefficient, local Nusselt number, velocity and temperature profiles for varying parameters like the Falkner-Skan parameter and Eckert number.
An improvised white board compass was designed and developed to enhance the teaching of geometrical construction concepts in basic technology courses. The compass allows teachers to visually demonstrate geometric concepts and constructions on a white board in an engaging, hands-on manner. It supports constructivist learning principles by enabling students to observe and emulate the teacher. The design process utilized design and development research methodology to test educational theories and validate the practical application of the compass. The improvised compass was found to effectively engage students and improve their performance in learning geometric constructions.
The document describes the design of an energy meter that calculates energy using a one second logic for improved accuracy. The meter samples voltage and current values using an ADC synchronized to the line frequency via PLL. It calculates active and reactive power by averaging the sampled values over each second. The accumulated active power for each second is multiplied by one second to calculate energy, which is accumulated and converted to kWh. Test results showed the meter achieved an error of 0.3%, within the acceptable limit for class 1 meters. Considering energy over longer durations like one second helps reduce percentage error in the calculation.
This document presents a two-stage method for solving fuzzy transportation problems where the costs, supplies, and demands are represented by symmetric trapezoidal fuzzy numbers. In the first stage, the problem is solved to satisfy minimum demand requirements. Remaining supplies are then distributed in the second stage to further minimize costs. A numerical example demonstrates using robust ranking techniques to convert the fuzzy problem into a crisp one, which is then solved using a zero suffix method. The total optimal costs from both stages provide the solution to the original fuzzy transportation problem.
1) The document proposes using an Adaptive Neuro-Fuzzy Inference System (ANFIS) controller for a Distributed Power Flow Controller (DPFC) to improve voltage regulation and power quality in a transmission system.
2) A DPFC is placed at a load bus in an IEEE 4 bus system and its performance is compared using a PI controller and ANFIS controller.
3) Simulation results show the ANFIS controller provides faster convergence and better voltage profile maintenance during voltage sags and swells compared to the PI controller.
The document describes an improved particle swarm optimization algorithm to solve vehicle routing problems. It introduces concepts of leptons and hadrons to particles in the algorithm. Leptons interact weakly based on individual and neighborhood best positions, while hadrons (local best particles) undergo strong interactions by colliding with the global best particle. When stagnation occurs, particle decay is used to increase diversity. Simulations show the improved algorithm avoids premature convergence and finds better solutions compared to the basic particle swarm optimization.
This document presents a method for analyzing photoplethysmographic (PPG) signals using correlative analysis. The method involves calculating the autocorrelation function of the PPG signal, extracting the envelope of the autocorrelation function using a low pass filter, and approximating the envelope by determining attenuation coefficients. Ten PPG signals were collected from volunteers and analyzed using this method. The attenuation coefficients were found to have similar values around 0.46, providing a potentially useful parameter for medical diagnosis.
This document describes the simulation and design of a process to recover monoethylene glycol (MEG) from effluent waste streams of a petrochemical company in Iran. Aspen Plus simulation software was used to model the process, which involves separating water, salts, and various glycols (MEG, DEG, TEG, TTEG) using a series of distillation columns. Sensitivity analyses were performed to optimize column parameters such as pressure, reflux ratio, and boilup ratio. The results showed that MEG, DEG, TEG, and TTEG could be recovered at rates of 5.01, 2.039, 0.062, and 0.089 kg/hr, respectively.
This document presents a numerical analysis of fluid flow and heat transfer characteristics of ventilated disc brake rotors using computational fluid dynamics (CFD). Two types of rotor configurations are considered: circular pillared (CP) and diamond pillared radial vane (DP). A 20° sector of each rotor is modeled and meshed. Governing equations for mass, momentum, and energy are solved using ANSYS CFX. Boundary conditions include 900K and 1500K isothermal rotor walls for different speeds. Results show the DP rotor has 70% higher mass flow and 24% higher heat dissipation than the CP rotor. Velocity and pressure distributions are more uniform for the DP rotor at higher speeds, ensuring more uniform cooling. The
This document describes the design and testing of an automated cocoa drying house prototype in Trinidad and Tobago. The prototype included automated features like a retractable roof, automatic heaters, and remote control. It aims to address issues with the traditional manual sun drying process, which is time-consuming and relies on human monitoring of changing weather conditions. Initial testing with farmers showed interest in the automated system as a potential solution.
This document presents the design of a telemedical system for remote monitoring of cardiac insufficiency. The system includes an electrocardiography (ECG) device that collects and digitizes ECG signals. The ECG signals undergo digital signal processing including autocorrelation analysis. Graphical interfaces allow patients and doctors to view ECG data and attenuation coefficients derived from autocorrelation analysis. Data is transmitted between parties using TCP/IP protocol. The system aims to facilitate remote monitoring of cardiac patients to reduce hospitalizations through early detection of health changes.
The document summarizes a polygon oscillating piston engine invention. The engine uses multiple pistons arranged around the sides of a polygon within cylinders. As the pistons oscillate, they compress and combust air-fuel mixtures to produce power. This design achieves a very high power-to-weight ratio of up to 2 hp per pound. Engineering analysis and design of a prototype 6-sided engine is presented, showing it can produce 168 hp from a 353 cubic feet per minute air flow at 12,960 rpm. The invention overcomes issues with prior oscillating piston designs by keeping the pistons moving in straight lines within cylinders using conventional piston rings.
More from International Journal of Engineering Inventions www.ijeijournal.com (20)
call for papers, research paper publishing, where to publish research paper, journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJEI, call for papers 2012,journal of science and technolog
1. International Journal of Engineering Inventions
ISSN: 2278-7461, www.ijeijournal.com
Volume 1, Issue 4 (September 2012) PP: 32-38
Content Based Hybrid Dwt-Dct Watermarking For Image
Authentication in Color Images
S. Radharani1, Dr. M.L. Valarmathi2
1
Assistant Professor, Department of Computer Applications, Sree Narayana Guru College, Coimbatore,
2
Associate Professor, Department of Computer Science and Engineering, Government College of Technology,
Coimbatore
Abstract––The present work relates to a novel content based image authentication frame work. Here we take statistical
based four methods for creating watermark. All these methods embed that statistical feature into the host image. In first
method, Frobenius Norm of the host image is taken as watermark using ICA technique. The other methods used to create
watermarks are namely, mean, standard deviation and combined mean and standard deviation of the host image. This
hybrid method combines DCT and DWT to hide the watermark, so that imperceptibility will be maintained. The same
statistical features are extracted as feature set which is embedded in the host image during embedding phase. In the
watermark retrieval process, content modification is identified by correlation method with predefined threshold. The
experimental results demonstrate that newly proposed DWT-DCT hybrid watermark embedding algorithm with HSV is
robust for Compression, noise and other attacks.
Keywords––Discrete Cosine Transform, Discrete Wavelet Transform, Independent Component Analysis, Frobenius
Norm, Human Visual System.
I. INTRODUCTION
Watermarking is the process of inserting predefined data into multimedia content in a way that the degradation of
quality is minimized and remains at an imperceptible level. Some transformations such as DCT and DWT are used for
watermarking in the frequency domain. A through comparison of the DCT and DWT is found in [1]. For content
authentication, the embedded watermark can be extracted and used for verification purposes. The techniques used are
classified into three main categories: robust, fragile and semi-fragile method. Robust techniques are primarily used in
applications such as copyright protection and ownership, verification of digital media, because they can withstand nearly all
attacks. Fragile methods are mainly applied to content authentication and integrity verification, because they are fragile to
almost all modifications. By contrast, semi-fragile methods are robust against incidental modifications such as JPEG
compression, but fragile to other modifications. The difference between the original watermark and the extracted watermark
is compared by predefined threshold during authenticity verification. The applications of the watermark are Content
Identification and management, Content protection for audio and video content, Forensics, Document and image security,
Authentication of content and objects (includes government IDs), Broadcast monitoring, etc. The present work is applicable
for Image authentication for color images. In this paper first the researchers utilize Frobenius norm as watermark, which is
created using ICA technique and then the researchers also uses the other statistical measures such as mean, standard
deviation and total value of both mean and standard deviation as watermark generation. To find the tampered location,
random noise as tamper is applied on the watermarked image and it is located through coding. The advantage of this method
is that it can tolerate the attacks such as, JPEG compression, Gamma Correction, Noise, Low pass filter, Sharpening,
Histogram equalization and contrast stretching. The quality metrics used in this method are PSNR, Image Fidelity and
Pearson Correlation Coefficient.
II. RELATED WORKS
In the area of robust watermarking techniques [2] proposes, quantization index modulation algorithm in the
frequency domain to achieve copyright protection. In [3] a binary watermarked image is embedded in selected sub-bands of
a 3-level DWT transformed of a host image. Further, DCT transformation of each selected DWT sub-band is computed and
the PN-sequences of the watermark bits are embedded in the coefficients of the corresponding DCT middle frequencies. In
extraction phase, the watermarked image, which may be attacked, is first preprocessed by sharpening Laplacian of Gaussian
filters. Then the same method applied as the embedding process is used to extract the DCT middle frequencies of each sub-
band. At last, correlation between mid-band coefficients and PN-sequences is calculated to determine watermarked bits. In
the area of fragile watermarking techniques proposes [4] Secure fragile watermarking algorithm. In that scheme a signature
is extracted from each block of the image and is inserted in that block. Extraction of the signature and appropriated
parameters for computation of the signature were studied. In the paper [5] a novel fragile watermarking technique was
proposed to increase accuracy of tamper localization by maintaining the dependence among blocks. In the method the
watermark which is embedded in each block was composed of three digital signatures. This provides both security against
vector quantization counterfeiting attack and increases accuracy of tamper localization. The earlier work on semi-fragile
watermarking research [6], mostly focused on detecting whether an image was tampered with or not. However those
techniques were not able to identify the tampered location. In this Journal Paper [7], the authors used random bias and
32
2. Content Based Hybrid DWT-DCT watermarking for Image Authentication in Color Images
nonuniform quantization, to improve the performance of the methods proposed by Lin and Chang. In 2000 [8] used the
histogram of ‘value’ or ‘intensity’ component of HSV color space to find out most appropriate area to insert the
watermark.
III. CONTENT BASED HYBRID DWT-DCT WATERMARKING
In the proposed method the researchers introduces the Human Visual system concepts in which the given RGB
image is converted into HSV image and the embedding process is performed. Before embedding the image is resized into
256X256. During the extraction process, again the HSV image is converted into RGB image. It increases robustness. The
proposed method is classified based on the watermark used to embed in the host image in combined DWT-DCT
watermarking technique. The first method uses the watermark as frobenius norm of the host image. In the second method
mean of the host is used as watermark. In the third method standard deviation is employed as watermark. In the last method
combined value of mean and standard deviation of the host is used as watermark. For all these methods the comparative
study is done based on time factor for both embedding and extraction of the watermark.
3.1. Watermark Generation
i. First the image is divided into blocks of size 16.
ii. For each block apply FastICA.
iii. Depends on choice (frobenius norm, mean, standard deviation, mean & standard deviation) , generate watermark.
a. Compute frobenius norm of the block if the choice is 1.
w =norm (A,’ fro')
b. Compute mean of the block if the choice is 2.
w =mean (mean (A))
c. Compute standard deviation of the block if the choice is 3.
w =std (std (A))
d. Compute mean & standard deviation of the block if the choice is 4.
w =std (mean (A))
3.2. Watermark Embedding
The embedding process follows the algorithm given below:
1. For each block apply DWT for 3 levels.
2. D=DCT(mid frequency of DWT 3rd level)
3. D=(sign(D))* * w(k)
Where is embedding strength, which is obtained by
= standard deviatio of original watermark image / standard deviation of extracted watermark
n
In this work, after completing the experiments, average value of for frobenius norm is 0.247, for mean is 0.068, for
standard deviation is 0.092 and for combined mean and standard deviation is 0.2021 .
4. Perform inverse DCT and inverse DWT.
5. Repeat the steps 2 – 4 for all the blocks.
The result is the watermarked image I*.
3.3 Watermark extraction
1. Perform steps 1 – 5 of the watermark generation procedure on the received image I’ and get the computed
watermark.
2. Perform DWT of each block and then perform DCT of the same block.
3. Extract the embedded watermark from the chosen DCT coefficient.
4. w’ = abs (D) /
5. This set forms the extracted watermark.
3.4 Authentication
1. Perform block wise percentage difference between the values w and w’
Block difference = |wi’ – wi| / max (wi) * 100
Threshold for the percentage difference has been experimentally determined as 15%.
This block wise difference is used to verify any modifications in the block to check the authenticity. The threshold value is
fixed by experimentation and if the difference is less than threshold value accepts it as authentic otherwise the image is
unauthentic.
IV. EXPERIMENTAL RESULTS
The proposed scheme has been tested using Matlab. The scheme has been evaluated on the different set of images
of size 256 X 256, 1920 X 1440, 1024 X 768 and 729 X 546. The block size chosen is 16 X 16 so that it resulted in better
PSNR value. The alpha value is calculated based on the standard deviation of original image and watermarked image. For
Frobenius norm as watermark method its value is 0.247, for mean as watermark method the value is 0.068, for standard
deviation as watermark method the value is 0.92 and for the value combined mean and standard deviation its value is 0.2021.
Threshold value of the calculation of percentage difference is chosen as 25%. The value below the threshold resulted as false
negative and the value above the threshold indicates the method to be fragile. Middle-frequency coefficients are selected to
embed the watermark. Embedding the watermark in low-frequency components, result in visual degradation of the host
33
3. Content Based Hybrid DWT-DCT watermarking for Image Authentication in Color Images
image. Similarly embedding the watermark data in high-frequency components results loss of data due to compression.
Hence our method ensures robustness. The ICA algorithm adopted in this proposed method has been discussed in [9] [10].
To find out the quality of the watermarked image, the metrics PSNR, Pearson Normalized Cross Correlation Coefficient,
Normalized Cross Correlation and Image Fidelity are used. These are calculated between host image and the watermarked
image. The present work implemented in four different types of watermark generation techniques. Fig. 1 shows the Baboon
image, before watermarking and after watermarking both in RGB and HSV formats in Frobenius Norm as watermark
generation technique. Fig. 2 shows the Baboon image after JPEG Compression, Gamma Correction, noise, filter, histogram
equalization and Contrast stretching attacks.
Original Image Original Image in HSV Watermarked Image in HSV Watermarked Image
Figure 1. Original Image , Original Image in HSV, Watermarked image in HSV, Watermarked Image.
Jpeg 80 attack
Jpeg 100 attack Jpeg 60 attack
Gaussian Noise
Jpeg 40 attack Gamma Correction
Uniform Noise Sharpening attack
Lowpass filter
34
4. Content Based Hybrid DWT-DCT watermarking for Image Authentication in Color Images
Contrast Strecting
Image with Histogram Equalisation Attacks
Figure 2. Watermarked Image after various attacks.
Figure 3 shows the tampered location identification for Baboon Image. Here the random noise is applied as tamper to the
watermarked image. That tampered location was identified correctly.
Tampered Image Tampered Locations
Figure 3. Detection of tampered location.
Figure 4. Embedding time and Extraction time for various test images.
From Fig. 4, Embedding time depends on the size of the image and extraction time almost same for all types of images.
Figure 5. Percentage block difference between watermark extracted and the watermark for various test images.
35
5. Content Based Hybrid DWT-DCT watermarking for Image Authentication in Color Images
Figure 6. Percentage block differences for various test images after incidental image processing operations.
From Fig. 6 for the entire test image’s block wise percentage difference is 25 for JPEG attack. For gamma correction the
block wise percentage difference is approximately 5. For Noise attacks the value is negligible other than natural scenes. For
low pass filter the value is above 20 for all images. For sharpening attack its value is almost equal to all types of images and
it is 20. Histogram equalization attack the value is 25 and for contrast stretching it value depends on the type of image.
Table 1. Quality Metrics after Watermarking. Using Hybrid DCT and DWT Watermarking with Frobenius norm
Images MSE PSNR IF PCC NC
Baboon 2.88E-05 93.539 1 0.99972 1
Forgery1 3.98E-06 102.1355 1 0.99984 1
House 2.13E-05 94.843 1 0.9998 1
Lena 6.23E-05 90.1869 1 0.99963 1
Natural_scene 9.00E-06 98.5898 1 0.99983 1
Pepper 4.00E-05 92.1122 1 0.99764 1
Timthumb 1.70E-05 95.8175 1 0.99966 1
From TABLE 1, the quality metric PSNR is approximately 95%. Mean Square Value is negligible. Image Fidelity,
Pearson Correlation Coefficient and Normalized Correlation the value is approximately 1.
Figure 7. Embedding time and Extraction time for various test images in various watermark generation techniques.
From Fig. 7 Embedding time is same for the methods using Frobenius norm, Standard Deviation and Combined mean and
standard deviation as watermark and their value is 80. The Embedding time for mean as watermark is 107. Similarly the
extraction time is same for all the methods (20) except mean as watermark (33).
36
6. Content Based Hybrid DWT-DCT watermarking for Image Authentication in Color Images
Figure 8. Percentage block difference between watermark extracted and the watermark for various test images in various
watermark generation techniques.
From Fig. 8 Block wise difference is Less for mean as watermark and high for combined mean and standard deviation.
Figure 9. Percentage block differences for average test image values after incidental image processing operations. From Fig.
9 frobenius norm as watermark has high blockwise percentage difference for all attacks comparing to all other watermark
techniques and mean as watermark has low blockwise percentage difference for all attacks comparing to all other watermark
techniques.
Table 2. Quality Metrics after Watermarking. Using Hybrid DCT and DWT Watermarking with all watermark
generation techniques.
Type MSE PSNR IF PCC NC
DWTDCTfastICAfrob 2.61E-05 95.3177 1 0.999446 1
DWTDCTfastICAmean 2.13E-05 96.64904 0.999931 0.999813 0.9999
DWTDCTfastICAstd 2.1E-05 96.72099 0.999933 0.999814 0.999901
DWTDCTfastICAmean&std 1.51E-05 96.95161 0.999933 0.999851 0.999901
From TABLE 2, the PSNR value is almost same for all the methods and it is approximately 95%. IF, PCC, NC values are
nearly same for all methods and it is 1. The MSE value is negligible for all methods.
37
7. Content Based Hybrid DWT-DCT watermarking for Image Authentication in Color Images
V. CONCLUSION
This paper has discussed about content based watermarking of 4 different types of watermark generation schemes
for image authentication using hybrid DWTDCT watermarking. The proposed system embeds the watermark in the HSV
equivalent of the host image and changes it to RGB equivalent watermarked image. The attacks are applied on the RGB
equivalent watermarked image. The proposed method correctly authenticates the image even under normal image processing
operations and it correctly detects tampering and identifies the tampered regions of the image in all four watermark types.
The quality of the watermarked image is better than the existing techniques. The average PSNR value in the proposed system
is 95 % for all methods discussed in this paper. In terms of computation time mean watermark technique takes slightly
greater time than other methods. Extensive experimentation demonstrates the efficiency of the standard deviation watermark
method among the four methods developed.
REFERENCES
1. Abbasfard, M., Digital Image watermarking robustness: A comparative study, Master’s Thesis, Delft, Netherlands
(2009).
2. Chi-Hung Fan, Hui-Yu Huang and Wen-Hsing Hsu, Department of Electrical Engineering, A robust
watermarking technique Resistant JPEG compression, Journal of Information Science and Engineering, 27, 163 –
180 (2011).
3. Kasmani, S.A, Naghsh –Nilchi , A, A new robust digital image watermarking technique based on Joint DWT-DCT
transformation, Convergence and hybrid information technology, 2008, ICCIT ’08 , Third international
conference on 11-13 Nov. 2008 , Vol. 2 , Pages 539-544.
4. Raja’ S. Alomari and Ahmed Al-Jaber, Computer Science Department, Jordan, A fragile watermarking algorithm
for Content authentication, International Journal of Computing & Information Sciences, Vol. 2, No.1, Apr. 2004.
5. Bilgisayar Muhendisligi Bolumu, Firat Univ, Elazig Tatar, Y, A Novel fragile watermarking technique with high
accuracy tamper localization, Signal Processing and Communications Applications , 2006 IEEE 14 th, Pages 1-4.
6. Yeung, M.M. Mintzer, F, Invisible watermarking for image verification, ICIP (2)97, Pages 680-683.
7. Maeno, K, Qibin Sun, Shih-Fu Chang, Suto , M, New semi-fragile image authentication watermarking techniques
using random bias and nonuniform quantization, IEEE transactions on Multimedia, Volume 8 , Issue 1, Pages 32-
45.
8. Dinu Coltuc and Philippe Bolon , Color Image Watermarking in HIS Space, (0-7803-6297-7/00 2000 IEEE).
9. Dr. Latha Parameswaran, Dr. K. Anbumani, Content-Based watermarking for Image Authentication using
Independent Component Analysis, Informatica 32 (2008) Pages 299 – 306.
10. Aapo Hyverinen, Survey on Independent Component Analysis, Neural Computing Surveys, Vol. 2, pp 04 – 128,
1999.
38