ISSN ONLINE(2278-8875) PRINT (2320-3765)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

WATERMARKING ALGORITHM USING EDGE DETECTION TECHNIQUE AND DCT, DST, FFT

Ms T.SREELEKHA1, Dr M. DHAMODHAR REDDY2, Dr T. RAMASHRI3
  1. M.Tech Student, Sri Venkateswara University College of Engineering, Tirupati; Andhra Pradesh; India
  2. Professor of EEE, Sri Venkateswara University College of Engineering, Tirupati; Andhra Pradesh; India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering

Abstract

This paper proposes robust hybrid watermarking scheme for grey scale images using block processing method. The proposed watermarking technique developed using combination of various transforms such as Discrete Cosine Transform (DCT), Singular Value Decomposition (SVD), Discrete Sine Transform (DST),Fast Fourier Transform(FFT) and edge detection technique. Pixel values of the blocks are modified based on the threshold value determined from edge detection. Later on from the modified block, the singular values using SVD are chosen. Using singular values watermark is embedded. Reverse process is used to extract watermark image from the watermarked image Evaluation metrics used to analyze the experimental results are Correlation (CORR) &Peak Signal to Noise Ratio (PSNR).Proposed work will be suitable to applications such as copyright protection and Copy control.

Keywords

Watermarking Algorithm, DCT, SVD, DST, FFT, watermark, copy right protection, CORR and PSNR.

INTRODUCTION

Digital watermarking is a branch of information hiding which is used to multimedia, copyright protection However, today; there is no evidence that watermarking techniques can achieve the ultimate goal to extract the right information from the received data. There are many solutions that have been proposed like Cryptography, Steganography and Watermarking [1, 2]. The embedded watermark should not degrade the quality of the image and should be perceptually invisible to maintain its protective secrecy [3]. The watermark is embedded in magnitudes of the Fourier transform. A peak signal-to-noise ratio is used to evaluate quality degradation. applications [4]. In the frequency domain schemes, the watermark is embedded with the transformed coefficients of original image. It is more robust than spatial domain, less control of perceptual quality and mainly suits for copyright application [5,6]. The robustness and perceptual quality of the watermarking schemes mainly depends on how much percentage of the watermark is embedded into host image i.e., scaling factor [3].
The main impediments of DFT&DST, SVD based watermarking schemes are as follows: 1.They are generated strong signals to rotation, scaling, translating.2.False positive Problem: when a specific watermark is detected from substance in which a different watermark was embedded, causing an hazy situation, [7, 8]. 3. Diagonal Line Problem: If we modify the singular values of the cover image directly with the watermark image then there will be a diagonal line in the reconstructed watermark from the attacked watermarked images [9]. The discrete cosine transform (DCT) represents an image as a sum of sinusoids of varying magnitudes and frequencies. The DCT has special property of energy compaction. In this paper embedding the watermark into the host image using DCT domain of DST and FFT coefficients. Hence we can achieve better performance when compared to using DCT alone [11]. Proposed work will be suitable to applications such as copyright protection and Copy control [12].

PROPOSED SYSTEM

The proposed algorithm is modified method of T.Ramashri et al method [3] method. The proposed Watermarking scheme is implemented in two phases first watermarking and then extraction. By adding DST and FFT the proposed method is more robust over [3] method. In the proposed method initially the DCT is applied to the original or host image to which watermark is going to be embedded.
To the host image edge detection technique is applied and divided into blocks, and then DST is applied to the blocks from which sub bands of the FFT edge image are obtained. Pixel values of the blocks are modified based on the threshold value determined from edge detection. Later on from the modified block, the singular values are selected using SVD. Then the watermarking step is performed by embedding the watermark to get the watermarked image.Figure.1 shows the block diagram of watermark embedding procedure. From the block diagram watermark size is taken 64x64 size. The watermark logo is divided into same block size of that host image block size. Blocks are selected based on the threshold value using DST, FFT of edge detection technique. Combine the HF co-efficient of DCT of host image on selected blocks. Singular values are selected on that blocks.
image
The robustness of the algorithm is tested using various attacks.. Then the watermark is extracted using revere procedure. Figure.2 shows the block diagram of watermark extraction procedure from watermarked image.
image
From the block diagram 2 apply DCT, DST and FFT to the watermarked image. Apply edge detection to select the singular values, and extraction algorithm is used extract the water mark image from the watermarked image. Finally PSNR values are determined between original image and watermarked image. CORR values are determined between the watermark and extracted watermark. And also watermark extracted from the various attacks, PSNR and CORR values are determined those images.

ALGORITHAMS FOR PROPOSED METHOD

A. Watermark Embedding:

image
image

B. Watermark Extraction:

image

EXPERIMENTAL RESULTS

In this proposed watermarking algorithm host image Lena of the size 512x512 is used as shown in figure3. For testing purpose gray scaled (BMP format) image is used. The watermark logo is „EE‟ of size 64X64 shown in fig.4.
image
DCT is applied to entire host image. Using DST, FFT of canny edge detection the blocks are found which have more number of high frequency components. SVD is applied to the modified blocks. Singular values of the selected blocks modified using binary watermark logo and gain factor „alpha‟. Fig.5 and 6shows the water marked image and extracted water mark logo respectively. The proposed watermarking algorithm is simulated using MATLAB 7.01.
image
Proposed watermarking algorithm is tested for various host and watermarked images. here results are given Lena image only.
To evaluate the performance of the proposed method, evaluation metrics used are PSNR (peak signal to noise ratio) and CORR (correlation coefficient). PSNR is widely used to measure visual quality between the original image and watermarked image. PSNR is defined by the equation 7. Similarly the original watermark and extracted watermark from the attacked image is evaluated by using correlation coefficient given by the equation 9.
For robustness inspection of the scheme the watermarked image was tested against several types of attacks namely Histogram equalization, salt and pepper noise, Gaussian noise, Rotate-45, Best contrast, gauss ion blurring , image resizing, cropping compression. The quality of the watermarked image can be I estimated using peak-signal-to-noise ratio (PSNR) and is calculated
image
Where MSE represents the mean square error and is given by
image
Where „a‟ and „b‟ are original and watermarked images. The similarities between the original image, W and extracted watermarks, eW can be determined by using the normalized correlation coefficient (NC) and it is defined as follows:
image
The following figures (fig.8) represent the attacks of the watermarked images and its extracted watermark logo‟s of that watermarked images for proposed scheme. The different values of PSNR & CORR values of various attacks of the watermarked images are listed in Table 1.
Table .1: Performance results for different combinations of transform in terms of PSNR and CORR values
image
image
Table 1 is observed that the proposed watermarking algorithm is more robust then the existing method. The evaluated PSNR value limited up to 20-30dB along with diagonal line problems or false positive problems. By embedding the principle components of the watermark into the DCT of host image and Sub bands of FFT of edge detection technique& SVD blocks of the image provides better imperceptibility as well as reliability in the quality and recovery of image. By implementing, can avoid the false positive problem and hence provides the copyright protection. From the extracted watermark Have been proved there improved correlation values for Rotating, translating, Scaling and less false detection problems .And also achieved the suitable scaling factor for any watermark which is image dependent. Hence the robustness and transparency of the scheme for any watermarking can be processed.
The performance of the proposed method is tested by applying DCT and DST, FFT sub band technique. And image processing attacks like Histogram equalization, Gaussian noise, Rotate-45, Best contrast, Salt & Pepper noise, Adjustment, cropping, Gaussian blurring, Median filter and resize etc. and has got the values of CORR are all above 0.7 which are acceptable. Thus proposed method is robust as well as reliable watermarking technique. The scheme has been tested with success on various test images on a MATLAB simulation platform.

CONCLUSION

The proposed watermarking algorithm is a non-blind robust watermarking algorithm. The proposed watermarking algorithm using DCT, DST sub bands of FFT, SVD and Edge detection is more robust in comparison with many watermarking algorithms developed using DCT and SVD methods. The watermark is inserted in few of selected blocks of original image, so that perceptual quality of the watermarked image is good. Watermark is inserted into the blocks number of times so retrieval of watermark is good. From the experimental results it is observed that the proposed watermarking algorithm is robust against too many signal processing and geometrical attacks compared to existing DCT and SVD, EDGE method. The visual quality of extracted watermark image is good. Proposed algorithm can be further improved using different transforms like Walsh transform, Hartley transform Kekre transform various edge detection techniques and further can be extended to color images and video processing.

References

  1. Hernandez, J.R., M., Amado, and F.P., Gonzalez, 2000. “DCT-domain watermarking techniques for still for still Images: Detector performance analysis and a new structure”, IEEE Trans. on Image Processing, Vol. 9, pp. 55-68.
  2. I.J. Cox, et al, "Digital watermarking and Steganography" (Second Edition), Morgan Kaufmann, 2008.
  3. T,Ramashri and A.Rajani, “Digital watermarking using dct,svd and edge detection technique” IJERA trans,vol-1, pp 1828-1834.
  4. Ante Poljicak,Lidija Mandic,Darko Agic Discrete Fourier transform–based watermarking method with an optimal implementation radius, journal of electronic imaging.
  5. Emir Ganic and Ahmet M. Eskicioglu, “Robust DCT,FFT-SVD Domain Image Watermarking: Embedding Data in All Frequencies,” in Proc. Workshop Multimedia Security, Magdeburg, Germany, pp. 166-174, 2004.
  6. G. Bhavnagar and B. Raman, “A new robust reference watermarking scheme based on DCT,DST AND FFT- SVD,‟‟ Computer Standards Interfaces, vol. 31, no. 5, pp. 1002-1013, Sep. 2009.
  7. Pat yip, “sine and cosine transfoms” 2000 by CRC Press LLC.
  8. Xiao-Ping Zhang, Senior Member, IEEE, and Kan Li, Comments on “An SVD-Based Watermarking Scheme for Protecting Rightful Ownership”, IEEE Trans on Multimedia, Vol. 7, no. 2, pp. 593-594, Apr. 2005
  9. Roman Rykaczewski. “Comments on “An SVD-Based Watermarking Scheme for Protecting Rightful Ownership,” IEEE Transactions on Multimedia, Vol. 9, No. 2, pp. 421-423, Feb. 2007.
  10. Baisa L. Gunjal, R. R. Manthalkar, “An Overview of Transform Domain Robust Digital Image Watermarking Algorithms”, CIS Journal, Vol. 2 No.1, pp. 37-42, 2010-2011.
  11. Amol R. Madane, K T. Talele and M. M. Shah “Watermark Logo in Digital Image using DCT,DST AND FFT” Proceedings of SPIT-IEEE Colloquium and International Conference, Mumbai, India, IEEE, Vol.1,121, 2007.
  12. R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Transactions on Multimedia, Vol. 4, no. 1, pp. 121128, Mar. 2002.
  13. Stephen J. Chapman -“MATLAB Programming for Engineers”, page no. 1-74, 3rd Edition 2005.
  14. Rafael C. Gonzalez, Richard E. Woods, Steven L. Eddins – “Digital Image Processing Using MATLAB”, page no. 1-78, 256-295 & 296-547, 1st Edition 2006, www.mathsworks.com
  15. Rudra Pratap - “Getting started with MATLAB7”, page no. 1-15, 17-44 & 49-79, 2nd Edition 2006.
  16. Anil K. Jain – “Fundamentals of Digital Image Processing”, page no. 1-9, 15, 41, 135, 141, 145, 476, 2nd Indian reprint 2004, www.pearonsed.co.in