Digital Watermarking is an unpretentious and
effective approach to afford copyright fortification.
Watermark transparency is obligatory primarily for
copyright protection. The challenge is to introduce a digital
watermark that is both transparent and highly robust to
common signal processing and possible attacks. The two
basic requirements for an effective watermarking scheme,
robustness and transparency, conflict with each other.This
paper proposesa watermarking technique for digital gray
scale images that is based on utilizing congruence’s in
number theory and its generalizations in abstract algebra
which have been developed in the context of image
compression. Watermarking scheme is based on a Chinese
Remainder Theorem along with Double Density Discrete
Wavelet Transform framework individually which allows for
the possibility of directly watermarking the Image bitstream,
Watermark region selection is based on
transformation level. In proposed scheme, initially, the cover
image and watermark are transformed into spatial domain
using Double Density Wavelet Transform and then singular
values of these transformed images are combined using CRT
coefficients. Our scheme is shown to provide very good
results both in terms of image transparency and robustness.
An optimal watermark embedding method is developed to
achieve minimum watermarking distortion. Experimental
results are provided in terms of Peak signal to noise ratio
(PSNR), Mean Squared Error (MSE), Correlation and
Weighted Peak signal to noise ratio (WPSNR) to demonstrate
the effectiveness of the proposed algorithm.
Published In:IJCSN Journal Volume 5, Issue 5
Date of Publication : October 2016
Pages : 805-812
Figures :11
Tables :05
Prerna Singh : received B. Tech in Electronics and Communication
from Maharishi Dayanand University, Haryana, India, in 2012 and
M. Tech in Signal Processing from Ambedkar Institute of
Advanced Communication Technologies & Research, Govt. of
NCT of Delhi, India, in 2015. She worked as an Assistant
professor with theElectronics & Communication Engineering
Department in Ambedkar Institute of Advanced Communication
Technologies & Research, Govt. of NCT of Delhi, India. Her
research interests includes Image processing, Biomedical Image
processing, Digital Signal processing, Steganography, Image
Recognition, Image enhancement, Wavelets. Watermarking.
CRT, Digital Watermarking, Multiscale
Embedding, Wavelet Subspaces, SVD, DWT, and Double Density
Discrete Wavelet Transform
The proposed CRT based DD-DWT technique provides
better imperceptibility and higher robustness against
attacks, as compared to traditional DWT and based
scheme. As a result, the watermarking technique is robust
to attacks in both frequency and time domains.
In this proposed method the values of the PSNRs of the
watermarked images are always greater than 40 dB and it
can effectively resist common image processing attacks,
especially by JPEG compression and different kind of
noises (Gaussian noise, speckle noise, salt & pepper noise,
Poisson noise etc.). In proposed work, there’s also an
option for selecting a wavelet from different type of wavelets, experiments proved that Symmlet and Mexican
hat wavelets proved better as compare to traditional
wavelets like Haar and Daubechies. A very good balance
between robustness and imperceptibility has been achieved
using this scheme as observers can evaluate the quality of
the watermarked image as well as the recovered
watermark to be good. Experimentation using various
sizes of watermarks and different images enables a better
understanding of the scheme.
Future work will be focused on colour images and also be
applied to the multi resolution image structures with some
modification about the choice of middle frequency
coefficients.
[1] Hartung and M. Kutter, "Multimedia Watermarking
Techniques,"Proc. of the IEEE, vol. 87, no. 7, pp.
1079-1107, July 1999.
[2] Chih-Chin Lai and Cheng-Chih Tsai. (November 2010)
‘Digital Image Watermarking Using Discrete Wavelet
Transform and Singular Value Decomposition’, IEEE
Transactions On Instrumentation And Measurement
Vol.59, No.11, pp. 3060-3063.
[3] Chun-Shien Lu and Hong-Yuan Mark Liao. (October
2001) ‘Multipurpose Watermarking for Image
Authentication and Protection’ IEEE Transactions on
Image Processing Vol. 10, No.10, pp.1579- 1592.
[4] V. Potdar, et al "A Survey of Digital Image
Watermarking Techniques", Proc. of the EEE
International Conference on Industrial Informatics,
Australia Perth, pp. 709-716, 2005.
[5] Liu Quan, AI Qingsong “A combination of DCT based
and SVD based watermarking, ICSP proceedings of
IEEE International conference on signal processing,
pp. 873-876, 2004.
[6] Feng Liu, et al. “A Watermarking Algorithm for
Digital Image Based on DCT and SVD”; Conference
on Image and Signal Processing, 2008.
[7] Emad E. Abdallah, et al. “A robust block-based image
watermarking scheme using fast Hadamard Transform
and Singular Value Decomposition” Proceedings of
The 18th International Conference on Pattern
Recognition, pp:673 - 676, 2006.
[8] Tang Xianghong, Yang Lianjie, YueHengli, Yin
Zhongke, “A Watermarking Algorithm Based on the
SVD and Hadamard Transform”, Proceedings of
International Conference on Communications, Circuits
and Systems, Volume 2, pp. 874-877, 27-30 May 2005.
[9] Ali Al-Haj, “A Hybrid Digital Image Watermarking
Algorithm”, 4th International Conference on
Innovations in Information Technology. pp: 690 - 694
Nov. 2007.
[10] Liu Liang and Sun Qi “A new SVD-DWT composite
watermarking”, ICSP proceedings of IEEE
International conference on signal processing, 2006.
[11] Jung-Chun Liu, Chu-Hsing Lin, and Li-ChingKuo” A
Robust full band image watermarking scheme”
Proceedings on IEEE, 2006.
[12] Qiang Li, et al, “Adaptive DWT-SVD Domain Image
Watermarking Using Human Visual Model”,
Proceedings of 9th international conference on
advanced communication Technology, Volume 3, pp:
1947 - 1951, Feb.2007.
[13] Y-P. Lai and C-C. Chang, “Parallel computational
algorithms for generalized Chinese Remainder
Theorem”, Computers and Electrical Engineering, vol.
29, pp. 801-811, 2003.
[14] M-S. Hwang, W-G. Tzeng and W-P. Yang, “An access
control scheme based on Chinese Remainder Theorem
and time stamp concept”, Computers and Security, vol.
15, No. I, pp. 73-81, 1996.
[15] H. Chen, “CRT-based high-speed parallel architecture
for long BCH encoding”, IEEE Trans. Circuits and
Systems-II, vol. 56, no. 8, pp. 684-86, Aug. 2009.
[16] C-C. Chang, Y-P. Hsieh and C-H. Lin, “Sharing secrets
in stego images with authentication”, Pattern
Recognition, vol. 41, pp. 3130-3137, 2008.
[17] J. S. Shyong and Y-R. Chen, “Threshold secret image
sharing by Chinese Remainder Theorem”, Proc. IEEE
Asia Pacific Services Computing Conference, Yilin,
Taiwan, Dec. 2008, pp.1332-1337.
[18] J. C. Patra, A. Karthik and C. Bornand, “A Novel
CRT-based watermarking technique for authentication
of multimedia contents”, Digital Signal Processing,
vol. 20, no. 2, pp. 442-453, July 2009.
[19] J. C. Patra, J. E.Phua and D. Rajan, “DCT Domain
watermarking scheme using Chinese Remainder
Theorem for image authentication”, Proc. IEEE Intl.
Conf. Multimedia and Expo (ICME 2010), Singapore,
July 2010, pp. 111-116.
[20] J. C. Patra, J. E. Phua and C. Bornand, “A novel DCT
domain CRT based watermarking scheme for image
authentication surviving JPEG compression”, Digital
Signal Processing, 20(6), 1597-1611, 2010.