SVD-Based Digital Image Watermarking

DOI : 10.17577/IJERTV2IS60670

Download Full-Text PDF Cite this Publication

Text Only Version

SVD-Based Digital Image Watermarking

SVD-Based Digital Image Watermarking

Krunal P Rane, P M Mahajan

Index Terms. Watermark, Singular value decomposition, Peak Signals to Noise Ratio, Correlation Factor,Robustness, Imperceptibility,Blind Watermarking.

  1. Introduction

    Digital watermarking has been recommended as key to the problem of exclusive rights protection of multimedia documents in networked surroundings. There are two significantconcerns that watermarking algorithms need to concentrate on first, watermarking methods are required to provide truthful indication for protecting equitable rights second, good watermarking method should satisfy the requirement of robustness and resist distortions due to common image manipulations (such as filtering, compression, etc.).[1]

    The advent of the Internet and the wide availability of computers, scanners, and printers make digital data acquisition, exchange, and transmission simple responsibilities. However constructing digital recordsreachable to others through networks also generatesprospects for malicious parties to make salable copies of

    • Imperceptibility: It means superiority of host image should not be damaged by existence of watermark.

    • Capacity: It includes techniques that make it possible to embed majority of watermark information.

    • Blind Watermarking: Extraction of watermark from watermarked image without original image is favored because sometimes its unfeasible to gain original image.

      Performance assessment of watermarking algorithm is done by two performance assessment metrics: Perceptual clearness and Robustness [3] Perceptual clearness means apparent quality of image should not be damaged by occurrence of watermark. The quality of watermarked image is measured by PSNR (Peak signal to Noise Ratio). Bigger is PSNR, better is quality of watermarked image. PSNR for image with size M x N is given by [6]:

      copyrighted content without permission of the

      10

      ( )2

      10 1

      [ , , ]2

      content owner. Digital watermarking techniques

      =1

      =1

      have been proposed in recent years as methods to keep the exclusive rights of multimedia data.

      There are four important factors those are commonly used to decide quality of watermarking scheme; they are robustness, imperceptibility, capacity, and blindness. [4][5]

    • Robustness: Watermark should be difficult to remove or destroy. Robustness is a measure of immunity of watermark against attempts to image modification and manipulation like compression, filtering, rotation, scaling, collision attacks, resizing, cropping, etc.

      Where, f (i, j) is pixel gray values of

      original image. f (i, j) is pixel gray values of

      watermarked image.

      MaxI is the maximum pixel value of image which is equal to 255 for gray scale image where pixels are represented with 8 bits. [3][6]

      Robustness is measure of immunity of watermark against attempts to remove or destroy it by image modification and manipulation like compression, filtering, rotation, scaling, collision attacks, resizing, cropping etc. It is measured in terms of correlation factor. The correlation factor decides the similarity and difference between

      original watermark and extracted watermark. Its value is generally in between 0 to 1. Ideally it should be 1 but the value 0.75 is satisfactory, Robustness is given by [6]:

      rapid decoding. The second method utilizes linear addition of the water mark to the image data and is more problematic to decrypt, proposingessentialsafety. This linearity property

      =

      =1

      also allows some image processing such as

      =1

      averaging to take place on the image without

      =1

      =1

      Where N is number of pixels in watermark, wi is original watermark, wi is extracted watermark. [3][6]

  2. Survey on Digital Image Watermarking

    In SVD-based digital image watermarking scheme Chin-Chen Chang, Piyu Tsai, Chia-Chen Lin [1] measured the image quality by peak signal to-noise ratio (PSNR) among the watermarked images was greater than 42dB. This indicated that the proposed watermarking scheme only caused a slight image distortion; while in SVD based Image Watermarking Scheme Deepa Mathew K [2] obtained the peak signal to-noise ratio (PSNR) 46.11dB, 47.66dB, 47.51dB respectively for different three images.

    In hidden digital watermarks in Images [7], watermarks are embedded by modifying the middle-frequency coefficients within each image block of the original image in considering the effect of quantization. The method can survive for several kinds of image processing and the JPEG lossy compression. Several watermarking schemes have been suggested, these schemes can be classified into two categories: spatial domain watermarking schemes and frequency domain watermarking schemes. (Celik et al., 2002; Chang etal., 2003; Lu et al., 2000; Van Schyndel etal., 1994) In Medical Image Watermarking based on SVD- DWT technique [3], it has been showing that employing digital wavelet transform (DWT) in watermarking of image information shows precedence over other data hiding procedures, especially when DWT is joined with other methods to increase the robustness. Singular value decomposition (SVD) is one of the mainly suitable tools of linear algebra with frequent applications in image compression, watermarking and other areas of signal processing. Maximum SVD- based watermarking methodschanges the singular values of host image by the singular values of watermark. In [8], R.G.vanSchyndel, A.Z.Tirke, C.F.Osborne proposed two methods of implementation are discussed; the first is based on bit plane manipulation of the LSB, which offers easy and

    corrupting the water mark away from retrieval. Each method is possiblycompanionable with JPEG and MPEG processing.

    In the literature, a number of techniques have been developed for watermarking. In [9], three coding methods for hiding electronic marking in document were proposed. In [10][11], the watermarks are applied on the spatial domain. The main drawback of spatial domain watermarking is that an ordinary picture cropping operation may remove the watermark.

    Other than spatial domain watermarking, frequency domain approaches have also been proposed. In [12], a copyright code and its random sequence of locations for embedding are produced and then superimposed on the image based on a JPEG model. In [13], the spread spectrum communication technique is also used in multimedia watermarking.

    In most of the previous works [12][14], the watermark is a symbol or a random number which comprises of a sequence of bits and can only be detected by employing the detection theory. That is during the verification phase the original image is subtracted from the image in question and the similarity between the difference and the specific watermark is obtained.

    Therefore an experimental threshold is chosen and compared to determine whether the image is watermarked. In this paper we propose a technique for embedding digital watermarks with visually recognizable patterns into the images. Since in daily life one claim a document a creative work and so on, by adopting ones sign, imprinting a privatestamp or an organizations logo such kinds of visually recognizable patterns are more intuitive for representing ones identity than a arrangement of random numbers.Additional specifically, during the confirmationstage of our work an extracted visual pattern in conjnction with the similarity measurement will be provided for verification.

  3. Proposed Watermarking method

    The proposed work SVD is one of the effective tools to analyze the matrices. While using the SVD transformation a matrix is decomposed

    into three matrices U, D, V. U and V are the unitary matrices and D is a diagonal matrix. There are two steps in the proposed watermarking scheme. The first step is watermark embedding procedure and the next step is watermark extracting procedure. [1][2]

    we have taken the image named peppers.jpeg of 512×512 pixel size as a host image and another symbol.jpeg of 75×75 pixel size as a watermarked image. The 512×512 pixel image is portioned into 8×8 pixel image. After that apply Singular Value Decomposition algorithm on it from that take out the largest coefficient D (1, 1) from each D component and quantize it by using a predefined quantization coefficient Q. Let Z = D (1, 1) mod Q. After that if Z < 3Q/4, D (1, 1) modify to D (1, 1) = D (1, 1) + Q/4 – Z. Otherwise D (1, 1) = D (1, 1) +

    5Q/4 – Z. for an embedded watermark bit valued of 0.While For an embedded watermark bit valued of 1, if Z < Q/4, D (1, 1) modify to D (1, 1) = D (1, 1) – Q/4 + Z. Otherwise D (1, 1) = D (1, 1) + 3Q/4 Z.

    After that perform the inverse of the SVD transformation to reconstruct the watermarked image. This completes the first half part our proposed work. [1]

    If there is only fewer modification in the U component means the image quality is superior, but the resistance is weaker. But if the more modification in the U component implies the less quality image and it gives more robust output. [2]

    Figure1: The watermark embedding algorithm

    After that the watermark extraction is done, for that first partitioned the watermarked image into blocks in to 8×8 pixel size. Then apply Singular Value Decomposition algorithm on it same as above mentioned from that take out the largest coefficient D (1, 1) from each D component and quantize it by using the predefined quantization coefficient Q. Let Z = D (1, 1) mod Q. If Z < Q/2, the extracted watermark has a bit value of 0. Otherwise the extracted watermark has a bit value of 1. [1]

    Figure 2: The watermark extracting Algorithm

  4. Experimental Results

    A gray scale image of size 512×512 pixel is selected as an input image as shown in fig 3. While 75×75 pixel image is usedas a watermark as shown in fig 4. First the images are split into 8×8 pixels. Then SVD transformation is applied to each block of splits image. After that number of nonzero coefficients of D components is calculated. Also the greater complexity block also calculated using PRNG. The magnitude difference is calculated in U component and it is modified according to the watermark added. The watermarked image is as shown in fig.5. The peak signals to noise ratio (PSNR) between the input and output image is calculated. The calculated PSNR is high that means the proposed watermarking method is added only a minor distortion in watermarked images. The extraction of watermark is also getting better extracted watermark which is identical to watermark added as shown in fig.6.

    After that performed different image processing such as noise, cropping, blurring, rotation, etc. on the watermarked image as shown in fig .7. Each processing operations on image are obtained reduced PSNR and Correlation factor than original watermarked image. The experimental results are shown in table 1.

    Figure 3: Gray Scale Image

    Figure 4: Watermark Image

    Figure 5: Watermarked Image

    Figure 6: Extracted Watermark

    Cropped Image Rotation (450)

    BlurringImage Motion Blurring Image

    Sharpening Image Histogram Equalization

    Gaussian Noise Poisson Noise

    Speckle Noise Salt & Pepper Noise Figure 7: Different Image Processing.

    Table 1.The corresponding results of PSNR & correlation factor for different image processing

  5. Conclusion

In this paper we proposed a watermarking algorithm based on SVD. The experimental results

show that it is better performance on imperceptibility and robustness. It is more effective against different image processing operations like noise, cropping, rotation, blurring and sharpening, etc. The PSNR and correlation factor calculated by this method is effectively good. It is averagely greater than 22dB, while it is slightly affected by different image processing like noise, cropping, blurring, rotation, etc. The extracted watermark from watermarked image is also more identical to the watermark embedded in the gray scale images.

References

[1] Chin-Chen Chang, Piyu Tsai, Chia-Chen Lin. SVD-based digital

image watermarking scheme Pattern Recognition

Letters 26

(2005) 1577.

*2+ Deepa Mathew K,SVD based Image Watermarking Scheme

IJCA Special Issue on EvolutionaryComputation for Optimization Techniques ECOT, 2010

[3] Azam sabaghi nedooshan, KhashayarYaghmaie, Reza Sabbaghi-

Nadooshan, Medical Image Watermarking based on SVD-DWT

technique, International Congress on Informatics, Environment,

Energy andApplications-IEEA 2012.

*4+ C.T. Hsu, J.L. Wu, Hidden Digital Watermarks In Images,

IEEE Trans.Image Process. 1999 8 (1) pp 58 68.

*5+ R.Z. Liu and T.N.Tan. An SVD-Based Watermarking Scheme

for Protecting Rightful Ownership, IEEE Trans. On

Multimedia,

Sr No.

Image Processing

PSNR(dB)

Correlation Factor

1

Watermarking (Default)

22.5876

0.97572

2

Cropping

19.5078

0.951546

3

Rotation (450)

20.7802

0.963566

4

Blurring

18.5803

0.940961

5

Motion Blurring

15.7403

0.892426

6

Sharpening

20.1773

0.958513

7

Histogram Equalization

20.7802

0.963566

8

Gaussian Noise

20.2585

0.959243

9

Poisson Noise

21.3734

0.968114

10

Speckle Noise

21.1665

0.966703

11

Salt & Pepper Noise

20.1773

0.958412

Sr No.

Image Processing

PSNR(dB)

Correlation Factor

1

Watermarking (Default)

22.5876

0.97572

2

Cropping

19.5078

0.951546

3

Rotation (450)

20.7802

0.963566

4

Blurring

18.5803

0.940961

5

Motion Blurring

15.7403

0.892426

6

Sharpening

20.1773

0.958513

7

Histogram Equalization

20.7802

0.963566

8

Gaussian Noise

20.2585

0.959243

9

Poisson Noise

21.3734

0.968114

10

Speckle Noise

21.1665

0.966703

11

Salt & Pepper Noise

20.1773

0.958412

202 Vol. 4, No.1, pp. 121128.

[6] Ben Wang, Jinkou Ding, Qiaoyan Wen, Xin Liao, Cuixiang Liu,

An Image Watermarking Algorithm Based On DWT

DCT and

SVD, 2009.Proceedings of IC-NIDC

*7+ C.T. Hsu, J.L. Wu,. Hidden Digital Watermarks In

Images,

IEEE Trans.Image Process. 1999 8 (1) pp 5868.

[8] Van Schyndel, R.G., Tirkel, A.Z., Mee, N., Osborne,

C.F.A

Digital Watermark.Proceedings of the IEEE

International

Conference on Image Processing, Austin, USA. 2, 8690.

*9+ J. T. Brassil, S. Low, N. F. Maxemchuk, and L. OGorman, Electronic marking and identification techniques to

discourage

document copying,IEEE J.Select. Areas Commum., vol.13, pp.

14951504, Oct. 1995.

*10+ I. Pitas and T. H. Kaskalis, Applying signatures on

digital

images,in Proc. IEEE Nonlinear Signal and Image Processing,

June 1995, pp.460463.

*11+ W. Bender, D. Gruhl, and N. Morimoto, Techniques for

data

hiding,Proc. SPIE, vol.2420,p. 40,Feb. 1995.

*12+ E. Koch and J. Zhao, Toward robust and hidden image copyright labeling, in Proc. IEEE Nonlinear Signal and Image Processing, June 1995, pp. 452455.

[13] I. J. Cox, J. Kilian, T. Leighton, and T. Shammoon,

Secure

spread spectrum watermarking for multimedia, Tech.Rep.

95-

10, NEC Res. Inst., Princeton, NJ, 1995.

*14+ M. D. Swanson, B. Zhu, and A. H.Tewfik, Transparent

robust

image watermarking, in Proc. ICIP96, pp.

Leave a Reply