Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  An Efficient CRT based Digital Image Watermarking using Double Density Wavelet Transform  
  Authors : Prerna Singh
  Cite as:

 

Digital Watermarking is an unpretentious and effective approach to afford copyright fortification. Watermark transparency is obligatory primarily for copyright protection. The challenge is to introduce a digital watermark that is both transparent and highly robust to common signal processing and possible attacks. The two basic requirements for an effective watermarking scheme, robustness and transparency, conflict with each other.This paper proposesa watermarking technique for digital gray scale images that is based on utilizing congruence’s in number theory and its generalizations in abstract algebra which have been developed in the context of image compression. Watermarking scheme is based on a Chinese Remainder Theorem along with Double Density Discrete Wavelet Transform framework individually which allows for the possibility of directly watermarking the Image bitstream, Watermark region selection is based on transformation level. In proposed scheme, initially, the cover image and watermark are transformed into spatial domain using Double Density Wavelet Transform and then singular values of these transformed images are combined using CRT coefficients. Our scheme is shown to provide very good results both in terms of image transparency and robustness. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. Experimental results are provided in terms of Peak signal to noise ratio (PSNR), Mean Squared Error (MSE), Correlation and Weighted Peak signal to noise ratio (WPSNR) to demonstrate the effectiveness of the proposed algorithm.

 

Published In : IJCSN Journal Volume 5, Issue 5

Date of Publication : October 2016

Pages : 805-812

Figures :11

Tables :05

 

Prerna Singh : received B. Tech in Electronics and Communication from Maharishi Dayanand University, Haryana, India, in 2012 and M. Tech in Signal Processing from Ambedkar Institute of Advanced Communication Technologies & Research, Govt. of NCT of Delhi, India, in 2015. She worked as an Assistant professor with theElectronics & Communication Engineering Department in Ambedkar Institute of Advanced Communication Technologies & Research, Govt. of NCT of Delhi, India. Her research interests includes Image processing, Biomedical Image processing, Digital Signal processing, Steganography, Image Recognition, Image enhancement, Wavelets. Watermarking.

 

 

 

 

 

 

 

CRT, Digital Watermarking, Multiscale Embedding, Wavelet Subspaces, SVD, DWT, and Double Density Discrete Wavelet Transform

The proposed CRT based DD-DWT technique provides better imperceptibility and higher robustness against attacks, as compared to traditional DWT and based scheme. As a result, the watermarking technique is robust to attacks in both frequency and time domains. In this proposed method the values of the PSNRs of the watermarked images are always greater than 40 dB and it can effectively resist common image processing attacks, especially by JPEG compression and different kind of noises (Gaussian noise, speckle noise, salt & pepper noise, Poisson noise etc.). In proposed work, there’s also an option for selecting a wavelet from different type of wavelets, experiments proved that Symmlet and Mexican hat wavelets proved better as compare to traditional wavelets like Haar and Daubechies. A very good balance between robustness and imperceptibility has been achieved using this scheme as observers can evaluate the quality of the watermarked image as well as the recovered watermark to be good. Experimentation using various sizes of watermarks and different images enables a better understanding of the scheme. Future work will be focused on colour images and also be applied to the multi resolution image structures with some modification about the choice of middle frequency coefficients.

 

[1] Hartung and M. Kutter, "Multimedia Watermarking Techniques,"Proc. of the IEEE, vol. 87, no. 7, pp. 1079-1107, July 1999. [2] Chih-Chin Lai and Cheng-Chih Tsai. (November 2010) ‘Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition’, IEEE Transactions On Instrumentation And Measurement Vol.59, No.11, pp. 3060-3063. [3] Chun-Shien Lu and Hong-Yuan Mark Liao. (October 2001) ‘Multipurpose Watermarking for Image Authentication and Protection’ IEEE Transactions on Image Processing Vol. 10, No.10, pp.1579- 1592. [4] V. Potdar, et al "A Survey of Digital Image Watermarking Techniques", Proc. of the EEE International Conference on Industrial Informatics, Australia Perth, pp. 709-716, 2005. [5] Liu Quan, AI Qingsong “A combination of DCT based and SVD based watermarking, ICSP proceedings of IEEE International conference on signal processing, pp. 873-876, 2004. [6] Feng Liu, et al. “A Watermarking Algorithm for Digital Image Based on DCT and SVD”; Conference on Image and Signal Processing, 2008. [7] Emad E. Abdallah, et al. “A robust block-based image watermarking scheme using fast Hadamard Transform and Singular Value Decomposition” Proceedings of The 18th International Conference on Pattern Recognition, pp:673 - 676, 2006. [8] Tang Xianghong, Yang Lianjie, YueHengli, Yin Zhongke, “A Watermarking Algorithm Based on the SVD and Hadamard Transform”, Proceedings of International Conference on Communications, Circuits and Systems, Volume 2, pp. 874-877, 27-30 May 2005. [9] Ali Al-Haj, “A Hybrid Digital Image Watermarking Algorithm”, 4th International Conference on Innovations in Information Technology. pp: 690 - 694 Nov. 2007. [10] Liu Liang and Sun Qi “A new SVD-DWT composite watermarking”, ICSP proceedings of IEEE International conference on signal processing, 2006. [11] Jung-Chun Liu, Chu-Hsing Lin, and Li-ChingKuo” A Robust full band image watermarking scheme” Proceedings on IEEE, 2006. [12] Qiang Li, et al, “Adaptive DWT-SVD Domain Image Watermarking Using Human Visual Model”, Proceedings of 9th international conference on advanced communication Technology, Volume 3, pp: 1947 - 1951, Feb.2007. [13] Y-P. Lai and C-C. Chang, “Parallel computational algorithms for generalized Chinese Remainder Theorem”, Computers and Electrical Engineering, vol. 29, pp. 801-811, 2003. [14] M-S. Hwang, W-G. Tzeng and W-P. Yang, “An access control scheme based on Chinese Remainder Theorem and time stamp concept”, Computers and Security, vol. 15, No. I, pp. 73-81, 1996. [15] H. Chen, “CRT-based high-speed parallel architecture for long BCH encoding”, IEEE Trans. Circuits and Systems-II, vol. 56, no. 8, pp. 684-86, Aug. 2009. [16] C-C. Chang, Y-P. Hsieh and C-H. Lin, “Sharing secrets in stego images with authentication”, Pattern Recognition, vol. 41, pp. 3130-3137, 2008. [17] J. S. Shyong and Y-R. Chen, “Threshold secret image sharing by Chinese Remainder Theorem”, Proc. IEEE Asia Pacific Services Computing Conference, Yilin, Taiwan, Dec. 2008, pp.1332-1337. [18] J. C. Patra, A. Karthik and C. Bornand, “A Novel CRT-based watermarking technique for authentication of multimedia contents”, Digital Signal Processing, vol. 20, no. 2, pp. 442-453, July 2009. [19] J. C. Patra, J. E.Phua and D. Rajan, “DCT Domain watermarking scheme using Chinese Remainder Theorem for image authentication”, Proc. IEEE Intl. Conf. Multimedia and Expo (ICME 2010), Singapore, July 2010, pp. 111-116. [20] J. C. Patra, J. E. Phua and C. Bornand, “A novel DCT domain CRT based watermarking scheme for image authentication surviving JPEG compression”, Digital Signal Processing, 20(6), 1597-1611, 2010.