SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
A DIGITAL COLOR IMAGE
WATERMARKING SYSTEM USING BLIND
SOURCE SEPARATION
Dr.Sangeeta D. Jadhav
Prof. and HOD(IT), Army Institute of Technology,Pune,INDIA
djsangeeta@rediffmail.com

ABSTRACT
An attempt is made to implement a digital color image-adaptive watermarking scheme in
spatial domain and hybrid domain i.e host image in wavelet domain and watermark in spatial
domain. Blind Source Separation (BSS) is used to extract the watermark The novelty of the
presented scheme lies in determining the mixing matrix for BSS model using BFGS (Broyden–
Fletcher–Goldfarb–Shanno) optimization technique. This method is based on the smooth and
textured portions of the image. Texture analysis is carried based on energy content of the
image (using GLCM) which makes the method image adaptive to embed color watermark.
The performance evaluation is carried for hybrid domain of various color spaces like YIQ, HSI
and YCbCr and the feasibility of optimization algorithm for finding mixing matrix is also
checked for these color spaces. Three ICA (Independent Component Analysis)/BSS algorithms
are used in extraction procedure ,through which the watermark can be retrieved efficiently . An
effort is taken to find out the best suited color space to embed the watermark which satisfies the
condition of imperceptibility and robustness against various attacks.

INDEX TERMS — ICA,GLCM,BSS,BFGS

1. INTRODUCTION
One of the more interesting applications is in field of image data security/authentication where
digital watermarking is proposed. Watermarking is a promising technique to help protect data
security and intellectual property rights.[1-3]
There are numerous techniques for embedding a digital image watermark like additive spread
spectrum ,multiplicative spread spectrum DC-QIM etc.
The separation of mixed images is a very exciting area of research, especially when no a priori
information is available about the mixed images. In such a case, blind signal separation (BSS)
technique is needed to recover independent sources given only sensor observations, which are
assumed to be unknown linear mixtures of unknown independent images. [4,5]. The watermarked
image is viewed as linear mixture of sources i.e. original image and watermarks. Independent
Component Analysis (ICA) is probably the most powerful and widely used method for
performing BSS [6-9].

Natarajan Meghanathan et al. (Eds) : ITCSE, ICDIP, ICAIT - 2013
pp. 109–116, 2013. © CS & IT-CSCP 2013

DOI : 10.5121/csit.2013.3911
110

Computer Science & Information Technology (CS & IT)

2. SYSTEM DESCRIPTION
The basic principle of digital image watermarking technique is based on BSS model to embed the
watermark in the host image. Watermark embedding is carried out in spatial domain and hybrid
domain. These embedding techniques are explained in following sections w. r. t. blue channel of
RGB space covertext image.

2.1. Embedding in Hybrid Domain
Step-1 Take the host and watermark color images, respectively of size (MxM) and (NxN) with
M>>N. Select their blue channels.
Step-2 Select textured region block based on energy of the sub-image . Take one level DWT
and use LL1 for further processing in single level of DWT . Similarly LL2 and LL3 a in case of
two level DWT and three level DWT. Spatial domain watermark is used for embedding.
Step-3 Obtain the mixing matrix using Quasi-Newton (BFGS) algorithm [14] in order to keep
spatial domain watermark hidden in textured sub-image to form the watermarked mixtures. The
inverse wavelet transform of watermarked mixtures is taken.
Step-4
One of the compound sub-images (watermarked sub-image) is encrusted into the
corresponding blocks of the earlier chosen region of high energy in the original image. The other
secret watermarked mixture in blue channels must be kept for a prospective use in the watermark
extraction process.
Above steps are explained with Figure 1 trough Figure 5 during embedding process.

(a)

(b)

Figure 1: Original Image (a) Watermark (b).

Figure 2: Smooth and Textured Portions of Original Image
Computer Science & Information Technology (CS & IT)

111

Figure 3: DWT of Textured Sub-image in Level1

Figure 4: Watermarked Mixture Sub-images after IDWT

(a)

(b)

Figure 5: Original Host Image (a) Watermarked Image (b)

2.2. Extraction Procedure
Step-1 Extract the marked block from the tampered watermarked image by using the first part
of the key which is the position key.
Step- 2 Obtain the blue channels of the extracted blocks.
Step -3 The key watermarked mixture and extracted watermarked mixture are used as the inputs
for BSS/ICA algorithms .
Step-4 BSS/ICA algorithms namely Eigen Value Decomposition ,SOBI and JADE are used to
recover both host sub-image and watermark.
112

Computer Science & Information Technology (CS & IT)

3. METHODOLOGY AND ANALYSIS
3.1. BSS Model
Suppose that there exist N mutually independent source signals S1, S2, ……….. SN and M
observed mixtures X1, X2, ……….. Xm of the source signals (usually M ≥ N). Assuming that
these mixtures are linear, instantaneous and noiseless, the model of BSS can be represented as
X = A.s

(1)

were S = [S1, S2, ……….. SN ]T and X = [X1, X2, ……….. Xm ]T represents source signals
vector and observed vector respectively, and A is M X N scalar mixing matrix of full rank which
is composed of the mixing coefficients.
We use (1) as the mixture model, and a random 2 X 2
Matrix A=

 a1
a
 2

b1 
b2 


Where ‘ A’ should be a full rank matrix, and the elements of it, which corresponds to the
embedding watermark, should be smaller than other elements relating to the host signal to achieve
the robustness and inperceptibility.

X= A. s

=

 a1 s1 + b1 w 
a s + b w
 2 2 2 

=

 sw1 
 sw 
 2

Where sw1 and sw2 are two observed signals with length L. sw1 is as the watermarked signal,
and sw2 is kept as the secret key k2.

3.2. Algorithm for Generating Mixing Matrix
Likelihood function (Likelihood Vs Iterations) is used for the estimation of Mixing Matrix
generation which is shown below in Figure 6.

Figure 6: Likelihood surface
Computer Science & Information Technology (CS & IT)

113

i) Number of iterations are selected in terms of sample points. In proposed method 1000 sample
points are considered.
ii) At each time sample the energy difference (gradient) is calculated between latent mixture
model and original image. Two energy gradient vectors are formed corresponding to two mixtures
.
iii) Mixing Matrix is

1 t (i, j ) 
1 −t (i, j ) 



Where i and j are the sample points on likelihood surface at which the gradient is minimum.
iv) Thus the time varying mixing matrix is used to form watermarked mixtures adaptively.

3.3. Performance Parameters
A series of attacks are tested to verify the robustness of three algorithms include Gaussian low
pass fiter,median filter, adding salt and pepper noise ,adding Gaussian noise ,JPEG compression
etc. The performance analysis parameter viz. Mean Square Error (MSE), PSNR (Peak signal to
Noise Ratio) and NC (Normalized Cross-Correlation) are used to estimate the quality of extracted
watermark.
The equations used are given in Part-I are repeated below1
2
MSE =
∑ [W − W ']
MN m ,n

(2)

PSNR = 10 log10  255 

(3)

NC =

(4)

2

 MSE 


W *W '
∑∑
m=1 n =1

∑∑W × ∑∑W
2

m =1 n =1

'2

m =1 n =1

Where W is original watermark image and W’ is recovered watermark image.
Above parameters are also used to find the retrieval performance with attack compared to the
performance without attack for watermark image. In that case W is treated as recovered
watermark without attack.

4. RESULTS
The Digital Watermarking Method tested for various color spaces viz RGB,YIQ ,YCbCr and HSI
in hybrid domain (DWT for Host and Spatial for Watermark) is compared for mentioned color
spaces.
Figure 7 and Figure 8 shows the sample RGB results for correlation coefficient and PSNR
respectively.
114

Computer Science & Information Technology (CS & IT)

Figure 7: RGB color space correlation coefficient
comparison

Figure 8: RGB color space correlation coefficient
comparison

It is observed that during the recovery of watermark in hybrid domain using three algorithms
for BSS/ICA ,viz. EVD,SOBI JADE , the watermark is recovered in 4 color channels all the
time .These color channels are Blue in RGB,Y inYIQ,Y in YCbCr and S from HIS. Figure 9 and
10 shows the comparison for above mentioned color spaces in hybrid domain for correlation
coefficient (NC) and PSNR for recovered watermark respectively.
Figure 11 describes NC Comparison for Extracted Watermark in
hybrid domain.

Y Channel for spatial and

Figure 9: Hybrid Model PSNR Comparison for 4 color Spaces
Computer Science & Information Technology (CS & IT)

115

Figure 10 : Hybrid Model NC Comparison for 4 color Spaces

Figure 11:NC Comparison for Extracted Watermark in

Y Channel

5. CONCLUSIONS
An image adaptive watermarking system is presented which satisfies imperceptibility and
robustness conditions of watermarking. The novelty of the presented scheme lies in determining
the mixing matrix for BSS model using BFGS optimization technique. This method is based on
the smooth and textured portions of the image. Texture analysis is carried based on energy
content of the image (using GLCM) which makes the method image adaptive to embed color
watermark. The performance evaluation is carried for spatial domain and hybrid domain of
various color spaces like YIQ, HSI and YCbCr. The feasibility of optimization algorithm for
finding mixing matrix is also checked for these color spaces. Y-Channel of YIQ space has
produced motivating results in hybrid domain.

REFERENCES
[1]
[2]

[3]
[4]
[5]
[6]

[7]

A.Cichoki, Shun-ichi Amari,“Adaptive Blind Signal and Image Processing –Learning Algorithms and
Applications”, ISBN: 978-0-471-60791-5,Yr 2002,
pp. 1-175.
Sun Jonahing, Li Jun sheng and Li Zhiyong, “An Improved Algorithm of Digital Watermarking
Based on Wavelet Transform”, IEEE proceedings of 2009 world congress science and information
Engg. , Yr. 2009, pp.280-284.
Moilim Amir, Abdellah Adib and Driss Aboutajdine, “Color Images Watermarking by Means of
Independent Component Analysis”, in IEEE transaction , Yr 2007, pp. 347-350.
Chip-Hong Chang et al., “Fuzzy –Art Based Adaptive digital Watermarking Scheme”, IEEE
transactions on circuits and Systems for Video Technology, Vol-15, No-1, Jan-2005, pp. 65-81.
David Knezevic, “Blind Source Separation for Signal Processing Applications” Thesis Yr.
2004.Google:-citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.118.3898&rep=rep1&type=pdf
Toshiyuki Tanaka,Yasuyuki Tagami, “ Automatic MIDI Data Making from Music Wave Data
Performed by 2Instruments Using Blind Signal Separation” , Proceedings in SICE-02, Yr-2002, pp.
451-456.
A. Mansour,N.Benchekroun and C Gervaise,“ Blind Separation of Underwater Acoustic Signals”, in
ICA’06,Yr2006,pp.181-188.
116
[8]
[9]

Computer Science & Information Technology (CS & IT)
Bisiaux A., Lemur D., Bertel L., “Source Separation With Collocated Antennas:Application to Digital
Communications in HF”, IEE Conference Publication No-480,Vol. 1,Yr 2001, pp. 311-314.
Minfen Shen,Xinjung Zhang,Lisha Sun,P.J. Beadle,FHY Chan, “A Method For digital Image
Watermarking Using ICA” 4th International symposium on ICA and BSS (ICA 2003), Yr 2003, pp.
209-214.

AUTHOR
Dr. Sangeeta Jadhav has received B.E.(Electronics) in 1992 from University of Pune ,
ME ( Electronics and Telecommunication) in 1999 from Govt.College of Engg. ,
Pune and PhD in Electronics in Yr 2012 from BAMU,Aurangabad. She is currently
Professor at Army Institute of Technology Engg college affiliated to University of
Pune,India. She is fellow member of IETE and life member of Indian Society for
Technical Education (ISTE). She has 12 publications to her credit published at various
international ,national conferences and journals. Her research interests are Image
processing, Blind source separation and Independent Component Analysis.

Más contenido relacionado

La actualidad más candente

SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN ijcseit
 
Image parts and segmentation
Image parts and segmentation Image parts and segmentation
Image parts and segmentation Rappy Saha
 
Estimation, Detection & Comparison of Soil Nutrients using Matlab
Estimation, Detection & Comparison of Soil Nutrients using MatlabEstimation, Detection & Comparison of Soil Nutrients using Matlab
Estimation, Detection & Comparison of Soil Nutrients using MatlabIRJET Journal
 
Fractal Image Compression of Satellite Color Imageries Using Variable Size of...
Fractal Image Compression of Satellite Color Imageries Using Variable Size of...Fractal Image Compression of Satellite Color Imageries Using Variable Size of...
Fractal Image Compression of Satellite Color Imageries Using Variable Size of...CSCJournals
 
spkumar-503report-approved
spkumar-503report-approvedspkumar-503report-approved
spkumar-503report-approvedPrasanna Kumar
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniquesIRJET Journal
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attackseSAT Publishing House
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPcsandit
 
IRJET- Crowd Density Estimation using Novel Feature Descriptor
IRJET- Crowd Density Estimation using Novel Feature DescriptorIRJET- Crowd Density Estimation using Novel Feature Descriptor
IRJET- Crowd Density Estimation using Novel Feature DescriptorIRJET Journal
 
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESEFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESijcnac
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption cscpconf
 
Non standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletsNon standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletseSAT Publishing House
 
Comparison of image segmentation
Comparison of image segmentationComparison of image segmentation
Comparison of image segmentationHaitham Ahmed
 

La actualidad más candente (15)

SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
 
I3602061067
I3602061067I3602061067
I3602061067
 
Image parts and segmentation
Image parts and segmentation Image parts and segmentation
Image parts and segmentation
 
Estimation, Detection & Comparison of Soil Nutrients using Matlab
Estimation, Detection & Comparison of Soil Nutrients using MatlabEstimation, Detection & Comparison of Soil Nutrients using Matlab
Estimation, Detection & Comparison of Soil Nutrients using Matlab
 
Fractal Image Compression of Satellite Color Imageries Using Variable Size of...
Fractal Image Compression of Satellite Color Imageries Using Variable Size of...Fractal Image Compression of Satellite Color Imageries Using Variable Size of...
Fractal Image Compression of Satellite Color Imageries Using Variable Size of...
 
spkumar-503report-approved
spkumar-503report-approvedspkumar-503report-approved
spkumar-503report-approved
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniques
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacks
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
 
IRJET- Crowd Density Estimation using Novel Feature Descriptor
IRJET- Crowd Density Estimation using Novel Feature DescriptorIRJET- Crowd Density Estimation using Novel Feature Descriptor
IRJET- Crowd Density Estimation using Novel Feature Descriptor
 
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESEFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption
 
Non standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletsNon standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded wavelets
 
Comparison of image segmentation
Comparison of image segmentationComparison of image segmentation
Comparison of image segmentation
 
regions
regionsregions
regions
 

Destacado

Destacado (17)

Iranian lawyers office
Iranian lawyers officeIranian lawyers office
Iranian lawyers office
 
Gripe
GripeGripe
Gripe
 
178 820 gabarito_preliminar_g4
178 820 gabarito_preliminar_g4178 820 gabarito_preliminar_g4
178 820 gabarito_preliminar_g4
 
Clackamas county so uses FOCUS 3D Scanner
Clackamas county so uses FOCUS 3D ScannerClackamas county so uses FOCUS 3D Scanner
Clackamas county so uses FOCUS 3D Scanner
 
Portfolio_Ellen2014
Portfolio_Ellen2014Portfolio_Ellen2014
Portfolio_Ellen2014
 
Exemples d'affiches présentées lors des séances de communications affichées d...
Exemples d'affiches présentées lors des séances de communications affichées d...Exemples d'affiches présentées lors des séances de communications affichées d...
Exemples d'affiches présentées lors des séances de communications affichées d...
 
Brief CV in Arabic & English-OK-U
Brief CV in Arabic & English-OK-UBrief CV in Arabic & English-OK-U
Brief CV in Arabic & English-OK-U
 
scientific presentation
scientific presentationscientific presentation
scientific presentation
 
Pragmadom
PragmadomPragmadom
Pragmadom
 
Hippies
HippiesHippies
Hippies
 
Cf bclic
Cf bclicCf bclic
Cf bclic
 
GO HIGH ON COMMERCE WITH IPHONE APPS
GO HIGH ON COMMERCE WITH IPHONE APPSGO HIGH ON COMMERCE WITH IPHONE APPS
GO HIGH ON COMMERCE WITH IPHONE APPS
 
Purchasing associate performance appraisal
Purchasing associate performance appraisalPurchasing associate performance appraisal
Purchasing associate performance appraisal
 
Front Desk Checkin Checkout
Front Desk Checkin CheckoutFront Desk Checkin Checkout
Front Desk Checkin Checkout
 
eCheck-in Course – General
eCheck-in Course – GeneraleCheck-in Course – General
eCheck-in Course – General
 
Front Entrance Arrivals Departures
Front Entrance Arrivals DeparturesFront Entrance Arrivals Departures
Front Entrance Arrivals Departures
 
CRM (Customer Really Matters)
CRM (Customer Really Matters)CRM (Customer Really Matters)
CRM (Customer Really Matters)
 

Similar a A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION

A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATIONA DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATIONcscpconf
 
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...csandit
 
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKINGAPPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKINGsipij
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color ImagesRobust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color ImagesCSCJournals
 
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALsipij
 
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUESA STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUEScscpconf
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attackseSAT Journals
 
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...VLSICS Design
 
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...VLSICS Design
 
Enhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackEnhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackijfcstjournal
 
Automatic Image Annotation Using Color K-Means Clustering
Automatic Image Annotation Using Color K-Means ClusteringAutomatic Image Annotation Using Color K-Means Clustering
Automatic Image Annotation Using Color K-Means ClusteringJim Webb
 
IRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGA
IRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGAIRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGA
IRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGAIRJET Journal
 
RC2-filterDesign_s
RC2-filterDesign_sRC2-filterDesign_s
RC2-filterDesign_shenry kang
 
Semi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svdSemi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svdsipij
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
 

Similar a A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION (20)

A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATIONA DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
 
H3602056060
H3602056060H3602056060
H3602056060
 
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
 
Gx3612421246
Gx3612421246Gx3612421246
Gx3612421246
 
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKINGAPPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color ImagesRobust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
 
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
 
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUESA STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacks
 
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
 
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
 
crowd counting.pptx
crowd counting.pptxcrowd counting.pptx
crowd counting.pptx
 
Enhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackEnhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attack
 
Automatic Image Annotation Using Color K-Means Clustering
Automatic Image Annotation Using Color K-Means ClusteringAutomatic Image Annotation Using Color K-Means Clustering
Automatic Image Annotation Using Color K-Means Clustering
 
IRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGA
IRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGAIRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGA
IRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGA
 
RC2-filterDesign_s
RC2-filterDesign_sRC2-filterDesign_s
RC2-filterDesign_s
 
Semi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svdSemi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svd
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 

Último

AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 

Último (20)

AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 

A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION

  • 1. A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION Dr.Sangeeta D. Jadhav Prof. and HOD(IT), Army Institute of Technology,Pune,INDIA djsangeeta@rediffmail.com ABSTRACT An attempt is made to implement a digital color image-adaptive watermarking scheme in spatial domain and hybrid domain i.e host image in wavelet domain and watermark in spatial domain. Blind Source Separation (BSS) is used to extract the watermark The novelty of the presented scheme lies in determining the mixing matrix for BSS model using BFGS (Broyden– Fletcher–Goldfarb–Shanno) optimization technique. This method is based on the smooth and textured portions of the image. Texture analysis is carried based on energy content of the image (using GLCM) which makes the method image adaptive to embed color watermark. The performance evaluation is carried for hybrid domain of various color spaces like YIQ, HSI and YCbCr and the feasibility of optimization algorithm for finding mixing matrix is also checked for these color spaces. Three ICA (Independent Component Analysis)/BSS algorithms are used in extraction procedure ,through which the watermark can be retrieved efficiently . An effort is taken to find out the best suited color space to embed the watermark which satisfies the condition of imperceptibility and robustness against various attacks. INDEX TERMS — ICA,GLCM,BSS,BFGS 1. INTRODUCTION One of the more interesting applications is in field of image data security/authentication where digital watermarking is proposed. Watermarking is a promising technique to help protect data security and intellectual property rights.[1-3] There are numerous techniques for embedding a digital image watermark like additive spread spectrum ,multiplicative spread spectrum DC-QIM etc. The separation of mixed images is a very exciting area of research, especially when no a priori information is available about the mixed images. In such a case, blind signal separation (BSS) technique is needed to recover independent sources given only sensor observations, which are assumed to be unknown linear mixtures of unknown independent images. [4,5]. The watermarked image is viewed as linear mixture of sources i.e. original image and watermarks. Independent Component Analysis (ICA) is probably the most powerful and widely used method for performing BSS [6-9]. Natarajan Meghanathan et al. (Eds) : ITCSE, ICDIP, ICAIT - 2013 pp. 109–116, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3911
  • 2. 110 Computer Science & Information Technology (CS & IT) 2. SYSTEM DESCRIPTION The basic principle of digital image watermarking technique is based on BSS model to embed the watermark in the host image. Watermark embedding is carried out in spatial domain and hybrid domain. These embedding techniques are explained in following sections w. r. t. blue channel of RGB space covertext image. 2.1. Embedding in Hybrid Domain Step-1 Take the host and watermark color images, respectively of size (MxM) and (NxN) with M>>N. Select their blue channels. Step-2 Select textured region block based on energy of the sub-image . Take one level DWT and use LL1 for further processing in single level of DWT . Similarly LL2 and LL3 a in case of two level DWT and three level DWT. Spatial domain watermark is used for embedding. Step-3 Obtain the mixing matrix using Quasi-Newton (BFGS) algorithm [14] in order to keep spatial domain watermark hidden in textured sub-image to form the watermarked mixtures. The inverse wavelet transform of watermarked mixtures is taken. Step-4 One of the compound sub-images (watermarked sub-image) is encrusted into the corresponding blocks of the earlier chosen region of high energy in the original image. The other secret watermarked mixture in blue channels must be kept for a prospective use in the watermark extraction process. Above steps are explained with Figure 1 trough Figure 5 during embedding process. (a) (b) Figure 1: Original Image (a) Watermark (b). Figure 2: Smooth and Textured Portions of Original Image
  • 3. Computer Science & Information Technology (CS & IT) 111 Figure 3: DWT of Textured Sub-image in Level1 Figure 4: Watermarked Mixture Sub-images after IDWT (a) (b) Figure 5: Original Host Image (a) Watermarked Image (b) 2.2. Extraction Procedure Step-1 Extract the marked block from the tampered watermarked image by using the first part of the key which is the position key. Step- 2 Obtain the blue channels of the extracted blocks. Step -3 The key watermarked mixture and extracted watermarked mixture are used as the inputs for BSS/ICA algorithms . Step-4 BSS/ICA algorithms namely Eigen Value Decomposition ,SOBI and JADE are used to recover both host sub-image and watermark.
  • 4. 112 Computer Science & Information Technology (CS & IT) 3. METHODOLOGY AND ANALYSIS 3.1. BSS Model Suppose that there exist N mutually independent source signals S1, S2, ……….. SN and M observed mixtures X1, X2, ……….. Xm of the source signals (usually M ≥ N). Assuming that these mixtures are linear, instantaneous and noiseless, the model of BSS can be represented as X = A.s (1) were S = [S1, S2, ……….. SN ]T and X = [X1, X2, ……….. Xm ]T represents source signals vector and observed vector respectively, and A is M X N scalar mixing matrix of full rank which is composed of the mixing coefficients. We use (1) as the mixture model, and a random 2 X 2 Matrix A=  a1 a  2 b1  b2   Where ‘ A’ should be a full rank matrix, and the elements of it, which corresponds to the embedding watermark, should be smaller than other elements relating to the host signal to achieve the robustness and inperceptibility. X= A. s =  a1 s1 + b1 w  a s + b w  2 2 2  =  sw1   sw   2 Where sw1 and sw2 are two observed signals with length L. sw1 is as the watermarked signal, and sw2 is kept as the secret key k2. 3.2. Algorithm for Generating Mixing Matrix Likelihood function (Likelihood Vs Iterations) is used for the estimation of Mixing Matrix generation which is shown below in Figure 6. Figure 6: Likelihood surface
  • 5. Computer Science & Information Technology (CS & IT) 113 i) Number of iterations are selected in terms of sample points. In proposed method 1000 sample points are considered. ii) At each time sample the energy difference (gradient) is calculated between latent mixture model and original image. Two energy gradient vectors are formed corresponding to two mixtures . iii) Mixing Matrix is 1 t (i, j )  1 −t (i, j )    Where i and j are the sample points on likelihood surface at which the gradient is minimum. iv) Thus the time varying mixing matrix is used to form watermarked mixtures adaptively. 3.3. Performance Parameters A series of attacks are tested to verify the robustness of three algorithms include Gaussian low pass fiter,median filter, adding salt and pepper noise ,adding Gaussian noise ,JPEG compression etc. The performance analysis parameter viz. Mean Square Error (MSE), PSNR (Peak signal to Noise Ratio) and NC (Normalized Cross-Correlation) are used to estimate the quality of extracted watermark. The equations used are given in Part-I are repeated below1 2 MSE = ∑ [W − W '] MN m ,n (2) PSNR = 10 log10  255  (3) NC = (4) 2  MSE    W *W ' ∑∑ m=1 n =1 ∑∑W × ∑∑W 2 m =1 n =1 '2 m =1 n =1 Where W is original watermark image and W’ is recovered watermark image. Above parameters are also used to find the retrieval performance with attack compared to the performance without attack for watermark image. In that case W is treated as recovered watermark without attack. 4. RESULTS The Digital Watermarking Method tested for various color spaces viz RGB,YIQ ,YCbCr and HSI in hybrid domain (DWT for Host and Spatial for Watermark) is compared for mentioned color spaces. Figure 7 and Figure 8 shows the sample RGB results for correlation coefficient and PSNR respectively.
  • 6. 114 Computer Science & Information Technology (CS & IT) Figure 7: RGB color space correlation coefficient comparison Figure 8: RGB color space correlation coefficient comparison It is observed that during the recovery of watermark in hybrid domain using three algorithms for BSS/ICA ,viz. EVD,SOBI JADE , the watermark is recovered in 4 color channels all the time .These color channels are Blue in RGB,Y inYIQ,Y in YCbCr and S from HIS. Figure 9 and 10 shows the comparison for above mentioned color spaces in hybrid domain for correlation coefficient (NC) and PSNR for recovered watermark respectively. Figure 11 describes NC Comparison for Extracted Watermark in hybrid domain. Y Channel for spatial and Figure 9: Hybrid Model PSNR Comparison for 4 color Spaces
  • 7. Computer Science & Information Technology (CS & IT) 115 Figure 10 : Hybrid Model NC Comparison for 4 color Spaces Figure 11:NC Comparison for Extracted Watermark in Y Channel 5. CONCLUSIONS An image adaptive watermarking system is presented which satisfies imperceptibility and robustness conditions of watermarking. The novelty of the presented scheme lies in determining the mixing matrix for BSS model using BFGS optimization technique. This method is based on the smooth and textured portions of the image. Texture analysis is carried based on energy content of the image (using GLCM) which makes the method image adaptive to embed color watermark. The performance evaluation is carried for spatial domain and hybrid domain of various color spaces like YIQ, HSI and YCbCr. The feasibility of optimization algorithm for finding mixing matrix is also checked for these color spaces. Y-Channel of YIQ space has produced motivating results in hybrid domain. REFERENCES [1] [2] [3] [4] [5] [6] [7] A.Cichoki, Shun-ichi Amari,“Adaptive Blind Signal and Image Processing –Learning Algorithms and Applications”, ISBN: 978-0-471-60791-5,Yr 2002, pp. 1-175. Sun Jonahing, Li Jun sheng and Li Zhiyong, “An Improved Algorithm of Digital Watermarking Based on Wavelet Transform”, IEEE proceedings of 2009 world congress science and information Engg. , Yr. 2009, pp.280-284. Moilim Amir, Abdellah Adib and Driss Aboutajdine, “Color Images Watermarking by Means of Independent Component Analysis”, in IEEE transaction , Yr 2007, pp. 347-350. Chip-Hong Chang et al., “Fuzzy –Art Based Adaptive digital Watermarking Scheme”, IEEE transactions on circuits and Systems for Video Technology, Vol-15, No-1, Jan-2005, pp. 65-81. David Knezevic, “Blind Source Separation for Signal Processing Applications” Thesis Yr. 2004.Google:-citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.118.3898&rep=rep1&type=pdf Toshiyuki Tanaka,Yasuyuki Tagami, “ Automatic MIDI Data Making from Music Wave Data Performed by 2Instruments Using Blind Signal Separation” , Proceedings in SICE-02, Yr-2002, pp. 451-456. A. Mansour,N.Benchekroun and C Gervaise,“ Blind Separation of Underwater Acoustic Signals”, in ICA’06,Yr2006,pp.181-188.
  • 8. 116 [8] [9] Computer Science & Information Technology (CS & IT) Bisiaux A., Lemur D., Bertel L., “Source Separation With Collocated Antennas:Application to Digital Communications in HF”, IEE Conference Publication No-480,Vol. 1,Yr 2001, pp. 311-314. Minfen Shen,Xinjung Zhang,Lisha Sun,P.J. Beadle,FHY Chan, “A Method For digital Image Watermarking Using ICA” 4th International symposium on ICA and BSS (ICA 2003), Yr 2003, pp. 209-214. AUTHOR Dr. Sangeeta Jadhav has received B.E.(Electronics) in 1992 from University of Pune , ME ( Electronics and Telecommunication) in 1999 from Govt.College of Engg. , Pune and PhD in Electronics in Yr 2012 from BAMU,Aurangabad. She is currently Professor at Army Institute of Technology Engg college affiliated to University of Pune,India. She is fellow member of IETE and life member of Indian Society for Technical Education (ISTE). She has 12 publications to her credit published at various international ,national conferences and journals. Her research interests are Image processing, Blind source separation and Independent Component Analysis.