SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Short Paper
ACEEE Int. J. on Signal & Image Processing, Vol. 4, No. 2, May 2013

Dual-layer Digital Image Watermarking for Intellectual
Property Right Protection
1

1

Mr. H. E. Suryavanshi, 2Prof. Amit Mishra and 3Prof. Amit Sinhal

Department of Information Technology, Technocrats Institute of Technology, Bhopal, India
hitendra.suryavanshi@gmail.com, 2amitmishra.mtech@gmail.com and 3amit_sinhal@rediffmail.com

Abstract: Digital watermarking is a technique which is widely
used in various application areas such as copyright protection,
copy control, broadcast monitoring etc. In this paper a novel
digital image watermarking technique is presented. To protect
the intellectual property rights, two different watermarks are
inserted in host image. The first watermark is used to monitor
the any changes made in host image while second one is used
as proof of ownership. The performance of proposed system is
good and it withstands against various attacks such as Gaussian
noise, salt and pepper, tampering etc.
Keywords: Digital Watermarking, Discrete Wavelet Transform,
Fragile Watermark, LSB, Robustness.

Fig. 1 General concept of watermarking

1) Visible Watermarking: The idea of visible watermark is very
simple. The logos used in today’s world everywhere is an
example of visible watermark. They are especially used for
conveying the immediate claim of ownership.
2) Invisible Watermarking: In this type of watermarking, rather
than displaying logo, the information is concealed into the
content itself.
3) Fragile Watermarking: Fragile watermarks have limited
robustness. They are used to check whether any modification
had taken place into the watermarked data.
Public Watermarking: These types of watermark are not secure
4) because they can read or viewed by anyone using specific
algorithms.

I. INTRODUCTION
Internet allows the public to exchange the information
without any barriers. This information can be in the form of
text, image, audio and video. The unrestricted access to
information gives birth to some problems such as copyright
violation, piracies etc. watermarking is a techniques developed
to resolve these issues. Watermarking gains a lot of
importance since last decade. It can be defined as a practice
of undetectably modifying a work to embed a message about
that work. Where work can be image, audio, video clip. [1]
In general, digital image watermarking system consist of
two modules: embedder and extractor, as shown in Fig. 1.
The embedder takes two inputs one is message which acts
as watermark, and the other is host image in which we want
to embed the message. The output of embedder is the
watermarked image which can be stored for later use.
Extraction module takes watermarked image and extracts the
message. Most of the extraction modules only check whether
image carries any watermark or not.

II. DISCRETE WAVELET T RANSFORM
Discrete wavelet transform is mathematical tool for
hierarchically decomposing an image. Images are usually
non-stationary two-dimensional signals and wavelet transform
is effective in such case. When discrete wavelet transformation
(DWT) applied on image, it decompose image into four
frequency sub-bands (LL, HL, LH, HH) where LL refers to low
pass band and other three sub-bands corresponds to
horizontal (HL), vertical (LH) and diagonal (HH) high pass
bands [6].

A. Properties of Watermarking System
Watermarking system has number of properties and the
importance of each property depends upon the type of
applications and role that watermark plays. [2]
1) Robustness: The ability of the watermark to survive normal
processing of content.
2) Security: The ability of the watermark to resist hostile
attacks.
3) Fidelity:The perceptual quality of watermarked content.
4) Data payload: The amount of information that can be
carried in awatermark.
B. Classification of Watermarking
Watermarking can be classified into the number of types,
as given below [3][4][5].
© 2013 ACEEE
DOI: 01.IJSIP.4.2.1

Fig.2 Two-level DWT decomposition

Fig. 2 shows two-level DWT decomposition of image. In
38
Short Paper
ACEEE Int. J. on Signal & Image Processing, Vol. 4, No. 2, May 2013

Fig.3 Proposed Watermarking Scheme

general, the watermark can be inserted into low frequency
sub-bands (LL) because it increases the robustness of watermark but at the same time it may degrade the image significantly. High frequency bands (HH) contains edges and textures and changes that are caused due to watermark data
inserted in such band cannot be noticed by human eye [7].
III. PROPOSED WORK
In this section we present our proposed work. As
illustrated in Fig. 3, the watermarking system consists of two
embedders. The role of first embedder is to insert a watermark
into an image by using wavelet transform. This watermark
acts as robust watermark which cannot be removed from host
image. Second embeder inserts watermark which acts as fragile
watermark. This watermark is used to detect any alterations
in an image. Single change in an image can be easily identified
by using the second watermark. Spatial domain technique
such as LSB replacement is used to insert the second
watermark.
A. Watermark Insertion Method
1. Select the Original Image Ic [Mc, Nc] and Watermark Image
W1 [Mw, Nw]
2. Divide Ic and W1 into four sections [I1, I2, I3, I4] and [W1,
W2, W3, W4] by applying following equations
Part 1=Image (1 :( x/2), 1 :( y/2))
Part 2=Image (1 :( x/2), ((y/2) +1) :y)
Part 3=Image ((x/2) +1: x, 1 :( y/2))
Part 4=Image (((x/2) +1): x, ((y/2) +1): y)
Where [x, y] = Size of the Image
3. Select the pair (Ii, Wi) where i=1, 2, 3, 4 and repeat step no
4 to 13 for each pair
4. Apply DWT on Ii to get [CA, CH, CV, CD] coefficients
39
© 2013 ACEEE
DOI: 01.IJSIP.4.2.1

5. Convert Wi into binary watermark (contains 0s and 1s)
6. Resize Wi as Wi [1, Mw×Nw]
7. Set PN sequence generator using Secrete Key-1
8. Repeat step 9 to 12 till (Mw×Nw)
9. Generate PN sequence
10. Calculate β factor as β=PN×K where, k is robustness
factor
11. Select the Coefficients [CH, CV]
12. IF Watermark (Wi) = 1
C=C+β
ELSE
C=C
13. Apply inverse DWT to get Iwi
14. Collect all four section to get watermarked image (Iw)
15. Select the watermark image W2 [Mw, Nw]
16. Resize W2 to [Mc, Nc]
17. Set PN sequence generator using Key-2
18. Repeat the step 19 to 20 till [Mc × Nc]
19. Randomly generate a number R
20. IF R = Even Number
Set Iw (1st bit) to Watermark bit
ELSE
Set Iw (2nd bit) to Watermark bit
21. Final watermarked image (Iw) is obtained
22. Stop
B. Watermark Extraction Method
1. Select the Watermarked Image Iw [Mw, Nw]
2. Divide Iw into four sections [Iw1, Iw2, Iw3, Iw4] using same
equations specified above
3. Create four dummy matrix [M1, M2, M3, M4] containing all
zeros having size [Mw/2, Nw/2]
4. for each (Iwi, Mi) pair repeat step 5 to 9
where i=1, 2, 3, 4
Short Paper
ACEEE Int. J. on Signal & Image Processing, Vol. 4, No. 2, May 2013
5. Apply DWT on Iwi to get [WA, WH, WV, WD]
coefficients
6. Set PN sequence generator using Key-1
7. Repeat step 8 till (Mw/2×Nw/2)
8. Select [WH, WV] coefficients and calculate correlation
9. IF Correlation >= Mean
Set Mi=1
ELSE
Set Mi=0
10. Collect all Mi to get first watermark W1
11. Create a matrix W2 [Mw, Nw]
12. Set PN sequence generator using Key-2
13. Repeat the step 14 to 16
14. Randomly generate a number R
15. IF R = Even Number
Set W2 to Iw (1st bit)
ELSE
Set W2 to Iw (2nd bit)
16. Second watermark image (W2) is obtained
17. Stop

Where, W and W’ are original and extracted watermarks.

IV. RESULT ANALYSIS
This section presents the experimental results of the
proposed digital image watermarking scheme. For the entire
test in this paper MATLAB is used. The performance the
proposed method is tested on 8-bit grayscale image of
baboon, Lena and peppers of size 512×512. Fig 4. Shows the
cover image and two watermarks that can be inserted into
cover image.

(a)

(b)

(d)

(a)

(b)

(c)

Fig.5 (a) Original Image (b) After inserting first watermark (c)
After inserting second watermark

Fig. 5 shows the original image of the baboon, the image
after the insertion of first watermark and second watermark.
The first watermark is inserted using blind watermarking
technique. It is a robust watermark. The second watermark is
a fragile watermark and embedded using LSB substitution
technique. Its purpose is to detect tampering.

(c)

(a)

(e)

(b)

(c)

Fig.6 (a) Watermarked image (b) Extracted first watermark (c)
Extracted second watermark

Fig.4 (a) Babbon (b) Lena (c) Peppers (d) First watermark (e)
Second watermark

The robustness of the proposed watermarking scheme is
tested against the various types of attacks such as, image
tampering, Salt and pepper, Gaussian and Poisson. It is shown
in the fig. 6 to 10.

The performance of the proposed watermarking technique
is evaluated in terms of the invisibility and robustness. The
PSNR (Peak-Signal-to-Noise Ratio) and MSE (Mean Square
Error) are used to measure the quality of the watermarked
image and attacked image. The PSNR is defined as follows
[6] [7]:

Where,
(a)

Where, I and I’ are cover image and watermarked image.
The normalized cross-correlation (NC) is used to check the
quality of original and extracted watermark. [8]
© 2013 ACEEE
DOI: 01.IJSIP.4.2.1

(b)

(c)

Fig. 7 (a) Attacked image (Tampering) (b) Extracted first
watermark (c) Extracted second watermark

40
Short Paper
ACEEE Int. J. on Signal & Image Processing, Vol. 4, No. 2, May 2013
TABLE III. PERFORMANCE
K

(a)

(b)

0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1.0

(c)

Fig. 8 (a) Attacked image (Salt & Pepper) (b) Extracted first
watermark (c) Extracted second watermark

PSNR
38.1598
32.3653
29.0096
26.7119
24.9696
23.5794
22.3656
21.2234
20.2171
19.3119

OF WATERMARKING SYSTEM

Image-3: Peppers.bmp
MSE
7.9413
31.4904
70.5561
124.8649
194.2827
278.5260
377.1564
490.6154
618.5500
761.8840

NC
0.5175
0.6159
0.6952
0.7460
0.8032
0.8413
0.8857
0.9111
0.9429
0.9460

CONCLUSIONS

(a)

In this paper a novel digital image watermarking technique
is presented. This method is based on wavelet. The watermark
is inserted using wavelet coefficient blocks. Watermark
extraction process is independent on the original image.
Watermarks can be extracted in any order. This scheme is
tested against various attacks such as tampering, Gaussian
noise. In the future, we will try to enhance our algorithm to
obtain watermarked images with less distortion and to recover
the watermark with good accuracy.

(b)

Fig. 9 (a) Attacked image (Gaussian Noise) (b) Extracted first
watermark

ACKNOWLEDGMENT
The authors wish to thank Prof. Amit Mishra and Prof.
Amit Sinhal for their valuable guidance.

(a)
(b)
Fig. 10 (a) Attacked image (Poisson) (b) Extracted first watermark

The performance of the system is shown in table 1 to 3 for
different images such as Baboon, Lena and Peppers. For
different values of K, robustness factor, different results are
obtained as given in tables below.
TABLE I. PERFORMANCE
K
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1.0

PSNR
38.6712
32.8323
29.4246
27.0669
25.1983
23.6141
22.2814
21.1269
20.1092
19.1963

0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1.0

PSNR
38.8532
33.0062
29.6291
27.1323
25.1939
23.6085
22.2732
21.1145
20.0935
19.1777

© 2013 ACEEE
DOI: 01.IJSIP.4.2.1

[1] Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica
Fridrich, Ton Kalker, “Digital watermarking and
steganography”, Second Edition, Morgan Kaufmann
Publishers, 2007.
[2] Husrev T. Sencar, Mahalingam Ramkumar, Ali N.
Akansu,”Data hiding fundamentals and applications”, Elsevier
Academic Press, 2004.
[3] Keshav S Rawat, Digital Watermarking Scheme for
Authorization against Copying or Piracy of Color Images,
Indian Journal of Computer Science and Engineering, Vol. 1,
No. 4, 2010, pp. 295-300
[4] Mohamed Abdulla Suhail, Digital watermarking for protection
of intellectual property, (University of Bradford, UK, 2005)
[5] Stefan Katzenbeisser, Fabien A. P. Petitcolas, Information
hiding techniques for steganography and digital watermarking,
Artech House Inc., 2000
[6] Peining Tao and Ahmet M. Eskicioglue, A robust multiple
watermarking scheme in the Discrete Wavelet Transformation
Domain, Proc. SPIE 5601, Internet Multimedia Management
Systems, Philadelphia, PA, 2004
[7] Ali Al-Haj,” Combined DWT-DCT digital image
watermarking”, in Journal of Computer Science 3(9): 740746, 2007, ISSN 1549-3636, © 2007 Science Publications
[8] Hanaa A. Abdallah et. Al. “Blind wavelet-based image
watermarking”, in International Journal of Signal Processing,
Image Processing and Pattern Recognition, Vol. 4, No. 1, March
2011.

OF WATERMARKING SYSTEM

Image-1: Babbon.bmp
MSE
7.9527
31.5237
70.7842
125.7632
196.4499
282.9246
384.5371
501.6401
634.1065
782.4404

TABLE II. PERFORMANCE OF
K

REFERENCES

NC
0.5429
0.5968
0.6508
0.6952
0.7333
0.7651
0.7841
0.8190
0.8413
0.8603

WATERMARKING SYSTEM

Image-2: Lena.bmp
MSE
7.9446
31.5301
70.8231
125.8479
196.6462
283.2924
385.2623
503.0735
636.4056
785.8025

NC
0.5841
0.6952
0.7651
0.8254
0.8730
0.8889
0.9270
0.9524
0.9651
0.9810

41

Más contenido relacionado

La actualidad más candente

Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419IJRAT
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Comparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator ApproachComparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator Approachijsrd.com
 
Imperceptible and secure image watermarking using DCT and random spread techn...
Imperceptible and secure image watermarking using DCT and random spread techn...Imperceptible and secure image watermarking using DCT and random spread techn...
Imperceptible and secure image watermarking using DCT and random spread techn...TELKOMNIKA JOURNAL
 
Non-Blind Deblurring Using Partial Differential Equation Method
Non-Blind Deblurring Using Partial Differential Equation MethodNon-Blind Deblurring Using Partial Differential Equation Method
Non-Blind Deblurring Using Partial Differential Equation MethodEditor IJCATR
 
Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...csandit
 
An Application of Second Generation Wavelets for Image Denoising using Dual T...
An Application of Second Generation Wavelets for Image Denoising using Dual T...An Application of Second Generation Wavelets for Image Denoising using Dual T...
An Application of Second Generation Wavelets for Image Denoising using Dual T...IDES Editor
 
Paper id 212014133
Paper id 212014133Paper id 212014133
Paper id 212014133IJRAT
 
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domainpaperpublications3
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain ijcisjournal
 
Paper id 28201446
Paper id 28201446Paper id 28201446
Paper id 28201446IJRAT
 

La actualidad más candente (18)

E1083237
E1083237E1083237
E1083237
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419
 
K42016368
K42016368K42016368
K42016368
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domains
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
56 58
56 5856 58
56 58
 
Comparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator ApproachComparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator Approach
 
E1102012537
E1102012537E1102012537
E1102012537
 
PhD_ppt_2012
PhD_ppt_2012PhD_ppt_2012
PhD_ppt_2012
 
Imperceptible and secure image watermarking using DCT and random spread techn...
Imperceptible and secure image watermarking using DCT and random spread techn...Imperceptible and secure image watermarking using DCT and random spread techn...
Imperceptible and secure image watermarking using DCT and random spread techn...
 
Non-Blind Deblurring Using Partial Differential Equation Method
Non-Blind Deblurring Using Partial Differential Equation MethodNon-Blind Deblurring Using Partial Differential Equation Method
Non-Blind Deblurring Using Partial Differential Equation Method
 
Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...Improving image resolution through the cra algorithm involved recycling proce...
Improving image resolution through the cra algorithm involved recycling proce...
 
An Application of Second Generation Wavelets for Image Denoising using Dual T...
An Application of Second Generation Wavelets for Image Denoising using Dual T...An Application of Second Generation Wavelets for Image Denoising using Dual T...
An Application of Second Generation Wavelets for Image Denoising using Dual T...
 
Paper id 212014133
Paper id 212014133Paper id 212014133
Paper id 212014133
 
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
 
Paper id 28201446
Paper id 28201446Paper id 28201446
Paper id 28201446
 

Destacado

Software Development for the Analysis and Design of Ship Berthing Structures
Software Development for the Analysis and Design of Ship Berthing StructuresSoftware Development for the Analysis and Design of Ship Berthing Structures
Software Development for the Analysis and Design of Ship Berthing StructuresIDES Editor
 
Obstacle Management in VANET using Game Theory and Fuzzy Logic Control
Obstacle Management in VANET using Game Theory and Fuzzy Logic ControlObstacle Management in VANET using Game Theory and Fuzzy Logic Control
Obstacle Management in VANET using Game Theory and Fuzzy Logic ControlIDES Editor
 
Genetic Algorithm Optimization of Operating Parameters for Multiobjective Mul...
Genetic Algorithm Optimization of Operating Parameters for Multiobjective Mul...Genetic Algorithm Optimization of Operating Parameters for Multiobjective Mul...
Genetic Algorithm Optimization of Operating Parameters for Multiobjective Mul...IDES Editor
 
Modeling Curvature Damage Surface for Damage Detection in Cantilever Beam
Modeling Curvature Damage Surface for Damage Detection in Cantilever BeamModeling Curvature Damage Surface for Damage Detection in Cantilever Beam
Modeling Curvature Damage Surface for Damage Detection in Cantilever BeamIDES Editor
 
The Effect of Climatic Conditions of Various Regions of Iran on Pavement Fati...
The Effect of Climatic Conditions of Various Regions of Iran on Pavement Fati...The Effect of Climatic Conditions of Various Regions of Iran on Pavement Fati...
The Effect of Climatic Conditions of Various Regions of Iran on Pavement Fati...IDES Editor
 
Resilient Characteristics of Stone Matrix Asphalt Mixes
Resilient Characteristics of Stone Matrix Asphalt MixesResilient Characteristics of Stone Matrix Asphalt Mixes
Resilient Characteristics of Stone Matrix Asphalt MixesIDES Editor
 
Development of Graphite Particles filled Epoxy Resin Composite Material and i...
Development of Graphite Particles filled Epoxy Resin Composite Material and i...Development of Graphite Particles filled Epoxy Resin Composite Material and i...
Development of Graphite Particles filled Epoxy Resin Composite Material and i...IDES Editor
 
Optimized Neural Network for Classification of Multispectral Images
Optimized Neural Network for Classification of Multispectral ImagesOptimized Neural Network for Classification of Multispectral Images
Optimized Neural Network for Classification of Multispectral ImagesIDES Editor
 
Numerical and Analytical Solutions for Ovaling Deformation in Circular Tunnel...
Numerical and Analytical Solutions for Ovaling Deformation in Circular Tunnel...Numerical and Analytical Solutions for Ovaling Deformation in Circular Tunnel...
Numerical and Analytical Solutions for Ovaling Deformation in Circular Tunnel...IDES Editor
 

Destacado (9)

Software Development for the Analysis and Design of Ship Berthing Structures
Software Development for the Analysis and Design of Ship Berthing StructuresSoftware Development for the Analysis and Design of Ship Berthing Structures
Software Development for the Analysis and Design of Ship Berthing Structures
 
Obstacle Management in VANET using Game Theory and Fuzzy Logic Control
Obstacle Management in VANET using Game Theory and Fuzzy Logic ControlObstacle Management in VANET using Game Theory and Fuzzy Logic Control
Obstacle Management in VANET using Game Theory and Fuzzy Logic Control
 
Genetic Algorithm Optimization of Operating Parameters for Multiobjective Mul...
Genetic Algorithm Optimization of Operating Parameters for Multiobjective Mul...Genetic Algorithm Optimization of Operating Parameters for Multiobjective Mul...
Genetic Algorithm Optimization of Operating Parameters for Multiobjective Mul...
 
Modeling Curvature Damage Surface for Damage Detection in Cantilever Beam
Modeling Curvature Damage Surface for Damage Detection in Cantilever BeamModeling Curvature Damage Surface for Damage Detection in Cantilever Beam
Modeling Curvature Damage Surface for Damage Detection in Cantilever Beam
 
The Effect of Climatic Conditions of Various Regions of Iran on Pavement Fati...
The Effect of Climatic Conditions of Various Regions of Iran on Pavement Fati...The Effect of Climatic Conditions of Various Regions of Iran on Pavement Fati...
The Effect of Climatic Conditions of Various Regions of Iran on Pavement Fati...
 
Resilient Characteristics of Stone Matrix Asphalt Mixes
Resilient Characteristics of Stone Matrix Asphalt MixesResilient Characteristics of Stone Matrix Asphalt Mixes
Resilient Characteristics of Stone Matrix Asphalt Mixes
 
Development of Graphite Particles filled Epoxy Resin Composite Material and i...
Development of Graphite Particles filled Epoxy Resin Composite Material and i...Development of Graphite Particles filled Epoxy Resin Composite Material and i...
Development of Graphite Particles filled Epoxy Resin Composite Material and i...
 
Optimized Neural Network for Classification of Multispectral Images
Optimized Neural Network for Classification of Multispectral ImagesOptimized Neural Network for Classification of Multispectral Images
Optimized Neural Network for Classification of Multispectral Images
 
Numerical and Analytical Solutions for Ovaling Deformation in Circular Tunnel...
Numerical and Analytical Solutions for Ovaling Deformation in Circular Tunnel...Numerical and Analytical Solutions for Ovaling Deformation in Circular Tunnel...
Numerical and Analytical Solutions for Ovaling Deformation in Circular Tunnel...
 

Similar a Dual-layer Digital Image Watermarking for Intellectual Property Right Protection

Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domainpaperpublications3
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...ijcisjournal
 
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...ijcisjournal
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...ijcisjournal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageIOSR Journals
 
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...IJERA Editor
 
Reversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A ReviewReversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A Reviewiosrjce
 
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...CSCJournals
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTSecured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTEditor IJMTER
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkeSAT Journals
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkeSAT Publishing House
 
Robust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueRobust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueCSCJournals
 

Similar a Dual-layer Digital Image Watermarking for Intellectual Property Right Protection (20)

Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
 
Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
 
50120140506015
5012014050601550120140506015
50120140506015
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
 
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
F010413438
F010413438F010413438
F010413438
 
H017524854
H017524854H017524854
H017524854
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
 
Reversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A ReviewReversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A Review
 
E017312532
E017312532E017312532
E017312532
 
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding ...
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTSecured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWT
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
 
Robust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueRobust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet Technique
 

Más de IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Más de IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Último

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 

Último (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Dual-layer Digital Image Watermarking for Intellectual Property Right Protection

  • 1. Short Paper ACEEE Int. J. on Signal & Image Processing, Vol. 4, No. 2, May 2013 Dual-layer Digital Image Watermarking for Intellectual Property Right Protection 1 1 Mr. H. E. Suryavanshi, 2Prof. Amit Mishra and 3Prof. Amit Sinhal Department of Information Technology, Technocrats Institute of Technology, Bhopal, India hitendra.suryavanshi@gmail.com, 2amitmishra.mtech@gmail.com and 3amit_sinhal@rediffmail.com Abstract: Digital watermarking is a technique which is widely used in various application areas such as copyright protection, copy control, broadcast monitoring etc. In this paper a novel digital image watermarking technique is presented. To protect the intellectual property rights, two different watermarks are inserted in host image. The first watermark is used to monitor the any changes made in host image while second one is used as proof of ownership. The performance of proposed system is good and it withstands against various attacks such as Gaussian noise, salt and pepper, tampering etc. Keywords: Digital Watermarking, Discrete Wavelet Transform, Fragile Watermark, LSB, Robustness. Fig. 1 General concept of watermarking 1) Visible Watermarking: The idea of visible watermark is very simple. The logos used in today’s world everywhere is an example of visible watermark. They are especially used for conveying the immediate claim of ownership. 2) Invisible Watermarking: In this type of watermarking, rather than displaying logo, the information is concealed into the content itself. 3) Fragile Watermarking: Fragile watermarks have limited robustness. They are used to check whether any modification had taken place into the watermarked data. Public Watermarking: These types of watermark are not secure 4) because they can read or viewed by anyone using specific algorithms. I. INTRODUCTION Internet allows the public to exchange the information without any barriers. This information can be in the form of text, image, audio and video. The unrestricted access to information gives birth to some problems such as copyright violation, piracies etc. watermarking is a techniques developed to resolve these issues. Watermarking gains a lot of importance since last decade. It can be defined as a practice of undetectably modifying a work to embed a message about that work. Where work can be image, audio, video clip. [1] In general, digital image watermarking system consist of two modules: embedder and extractor, as shown in Fig. 1. The embedder takes two inputs one is message which acts as watermark, and the other is host image in which we want to embed the message. The output of embedder is the watermarked image which can be stored for later use. Extraction module takes watermarked image and extracts the message. Most of the extraction modules only check whether image carries any watermark or not. II. DISCRETE WAVELET T RANSFORM Discrete wavelet transform is mathematical tool for hierarchically decomposing an image. Images are usually non-stationary two-dimensional signals and wavelet transform is effective in such case. When discrete wavelet transformation (DWT) applied on image, it decompose image into four frequency sub-bands (LL, HL, LH, HH) where LL refers to low pass band and other three sub-bands corresponds to horizontal (HL), vertical (LH) and diagonal (HH) high pass bands [6]. A. Properties of Watermarking System Watermarking system has number of properties and the importance of each property depends upon the type of applications and role that watermark plays. [2] 1) Robustness: The ability of the watermark to survive normal processing of content. 2) Security: The ability of the watermark to resist hostile attacks. 3) Fidelity:The perceptual quality of watermarked content. 4) Data payload: The amount of information that can be carried in awatermark. B. Classification of Watermarking Watermarking can be classified into the number of types, as given below [3][4][5]. © 2013 ACEEE DOI: 01.IJSIP.4.2.1 Fig.2 Two-level DWT decomposition Fig. 2 shows two-level DWT decomposition of image. In 38
  • 2. Short Paper ACEEE Int. J. on Signal & Image Processing, Vol. 4, No. 2, May 2013 Fig.3 Proposed Watermarking Scheme general, the watermark can be inserted into low frequency sub-bands (LL) because it increases the robustness of watermark but at the same time it may degrade the image significantly. High frequency bands (HH) contains edges and textures and changes that are caused due to watermark data inserted in such band cannot be noticed by human eye [7]. III. PROPOSED WORK In this section we present our proposed work. As illustrated in Fig. 3, the watermarking system consists of two embedders. The role of first embedder is to insert a watermark into an image by using wavelet transform. This watermark acts as robust watermark which cannot be removed from host image. Second embeder inserts watermark which acts as fragile watermark. This watermark is used to detect any alterations in an image. Single change in an image can be easily identified by using the second watermark. Spatial domain technique such as LSB replacement is used to insert the second watermark. A. Watermark Insertion Method 1. Select the Original Image Ic [Mc, Nc] and Watermark Image W1 [Mw, Nw] 2. Divide Ic and W1 into four sections [I1, I2, I3, I4] and [W1, W2, W3, W4] by applying following equations Part 1=Image (1 :( x/2), 1 :( y/2)) Part 2=Image (1 :( x/2), ((y/2) +1) :y) Part 3=Image ((x/2) +1: x, 1 :( y/2)) Part 4=Image (((x/2) +1): x, ((y/2) +1): y) Where [x, y] = Size of the Image 3. Select the pair (Ii, Wi) where i=1, 2, 3, 4 and repeat step no 4 to 13 for each pair 4. Apply DWT on Ii to get [CA, CH, CV, CD] coefficients 39 © 2013 ACEEE DOI: 01.IJSIP.4.2.1 5. Convert Wi into binary watermark (contains 0s and 1s) 6. Resize Wi as Wi [1, Mw×Nw] 7. Set PN sequence generator using Secrete Key-1 8. Repeat step 9 to 12 till (Mw×Nw) 9. Generate PN sequence 10. Calculate β factor as β=PN×K where, k is robustness factor 11. Select the Coefficients [CH, CV] 12. IF Watermark (Wi) = 1 C=C+β ELSE C=C 13. Apply inverse DWT to get Iwi 14. Collect all four section to get watermarked image (Iw) 15. Select the watermark image W2 [Mw, Nw] 16. Resize W2 to [Mc, Nc] 17. Set PN sequence generator using Key-2 18. Repeat the step 19 to 20 till [Mc × Nc] 19. Randomly generate a number R 20. IF R = Even Number Set Iw (1st bit) to Watermark bit ELSE Set Iw (2nd bit) to Watermark bit 21. Final watermarked image (Iw) is obtained 22. Stop B. Watermark Extraction Method 1. Select the Watermarked Image Iw [Mw, Nw] 2. Divide Iw into four sections [Iw1, Iw2, Iw3, Iw4] using same equations specified above 3. Create four dummy matrix [M1, M2, M3, M4] containing all zeros having size [Mw/2, Nw/2] 4. for each (Iwi, Mi) pair repeat step 5 to 9 where i=1, 2, 3, 4
  • 3. Short Paper ACEEE Int. J. on Signal & Image Processing, Vol. 4, No. 2, May 2013 5. Apply DWT on Iwi to get [WA, WH, WV, WD] coefficients 6. Set PN sequence generator using Key-1 7. Repeat step 8 till (Mw/2×Nw/2) 8. Select [WH, WV] coefficients and calculate correlation 9. IF Correlation >= Mean Set Mi=1 ELSE Set Mi=0 10. Collect all Mi to get first watermark W1 11. Create a matrix W2 [Mw, Nw] 12. Set PN sequence generator using Key-2 13. Repeat the step 14 to 16 14. Randomly generate a number R 15. IF R = Even Number Set W2 to Iw (1st bit) ELSE Set W2 to Iw (2nd bit) 16. Second watermark image (W2) is obtained 17. Stop Where, W and W’ are original and extracted watermarks. IV. RESULT ANALYSIS This section presents the experimental results of the proposed digital image watermarking scheme. For the entire test in this paper MATLAB is used. The performance the proposed method is tested on 8-bit grayscale image of baboon, Lena and peppers of size 512×512. Fig 4. Shows the cover image and two watermarks that can be inserted into cover image. (a) (b) (d) (a) (b) (c) Fig.5 (a) Original Image (b) After inserting first watermark (c) After inserting second watermark Fig. 5 shows the original image of the baboon, the image after the insertion of first watermark and second watermark. The first watermark is inserted using blind watermarking technique. It is a robust watermark. The second watermark is a fragile watermark and embedded using LSB substitution technique. Its purpose is to detect tampering. (c) (a) (e) (b) (c) Fig.6 (a) Watermarked image (b) Extracted first watermark (c) Extracted second watermark Fig.4 (a) Babbon (b) Lena (c) Peppers (d) First watermark (e) Second watermark The robustness of the proposed watermarking scheme is tested against the various types of attacks such as, image tampering, Salt and pepper, Gaussian and Poisson. It is shown in the fig. 6 to 10. The performance of the proposed watermarking technique is evaluated in terms of the invisibility and robustness. The PSNR (Peak-Signal-to-Noise Ratio) and MSE (Mean Square Error) are used to measure the quality of the watermarked image and attacked image. The PSNR is defined as follows [6] [7]: Where, (a) Where, I and I’ are cover image and watermarked image. The normalized cross-correlation (NC) is used to check the quality of original and extracted watermark. [8] © 2013 ACEEE DOI: 01.IJSIP.4.2.1 (b) (c) Fig. 7 (a) Attacked image (Tampering) (b) Extracted first watermark (c) Extracted second watermark 40
  • 4. Short Paper ACEEE Int. J. on Signal & Image Processing, Vol. 4, No. 2, May 2013 TABLE III. PERFORMANCE K (a) (b) 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 (c) Fig. 8 (a) Attacked image (Salt & Pepper) (b) Extracted first watermark (c) Extracted second watermark PSNR 38.1598 32.3653 29.0096 26.7119 24.9696 23.5794 22.3656 21.2234 20.2171 19.3119 OF WATERMARKING SYSTEM Image-3: Peppers.bmp MSE 7.9413 31.4904 70.5561 124.8649 194.2827 278.5260 377.1564 490.6154 618.5500 761.8840 NC 0.5175 0.6159 0.6952 0.7460 0.8032 0.8413 0.8857 0.9111 0.9429 0.9460 CONCLUSIONS (a) In this paper a novel digital image watermarking technique is presented. This method is based on wavelet. The watermark is inserted using wavelet coefficient blocks. Watermark extraction process is independent on the original image. Watermarks can be extracted in any order. This scheme is tested against various attacks such as tampering, Gaussian noise. In the future, we will try to enhance our algorithm to obtain watermarked images with less distortion and to recover the watermark with good accuracy. (b) Fig. 9 (a) Attacked image (Gaussian Noise) (b) Extracted first watermark ACKNOWLEDGMENT The authors wish to thank Prof. Amit Mishra and Prof. Amit Sinhal for their valuable guidance. (a) (b) Fig. 10 (a) Attacked image (Poisson) (b) Extracted first watermark The performance of the system is shown in table 1 to 3 for different images such as Baboon, Lena and Peppers. For different values of K, robustness factor, different results are obtained as given in tables below. TABLE I. PERFORMANCE K 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 PSNR 38.6712 32.8323 29.4246 27.0669 25.1983 23.6141 22.2814 21.1269 20.1092 19.1963 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 PSNR 38.8532 33.0062 29.6291 27.1323 25.1939 23.6085 22.2732 21.1145 20.0935 19.1777 © 2013 ACEEE DOI: 01.IJSIP.4.2.1 [1] Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, Ton Kalker, “Digital watermarking and steganography”, Second Edition, Morgan Kaufmann Publishers, 2007. [2] Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu,”Data hiding fundamentals and applications”, Elsevier Academic Press, 2004. [3] Keshav S Rawat, Digital Watermarking Scheme for Authorization against Copying or Piracy of Color Images, Indian Journal of Computer Science and Engineering, Vol. 1, No. 4, 2010, pp. 295-300 [4] Mohamed Abdulla Suhail, Digital watermarking for protection of intellectual property, (University of Bradford, UK, 2005) [5] Stefan Katzenbeisser, Fabien A. P. Petitcolas, Information hiding techniques for steganography and digital watermarking, Artech House Inc., 2000 [6] Peining Tao and Ahmet M. Eskicioglue, A robust multiple watermarking scheme in the Discrete Wavelet Transformation Domain, Proc. SPIE 5601, Internet Multimedia Management Systems, Philadelphia, PA, 2004 [7] Ali Al-Haj,” Combined DWT-DCT digital image watermarking”, in Journal of Computer Science 3(9): 740746, 2007, ISSN 1549-3636, © 2007 Science Publications [8] Hanaa A. Abdallah et. Al. “Blind wavelet-based image watermarking”, in International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol. 4, No. 1, March 2011. OF WATERMARKING SYSTEM Image-1: Babbon.bmp MSE 7.9527 31.5237 70.7842 125.7632 196.4499 282.9246 384.5371 501.6401 634.1065 782.4404 TABLE II. PERFORMANCE OF K REFERENCES NC 0.5429 0.5968 0.6508 0.6952 0.7333 0.7651 0.7841 0.8190 0.8413 0.8603 WATERMARKING SYSTEM Image-2: Lena.bmp MSE 7.9446 31.5301 70.8231 125.8479 196.6462 283.2924 385.2623 503.0735 636.4056 785.8025 NC 0.5841 0.6952 0.7651 0.8254 0.8730 0.8889 0.9270 0.9524 0.9651 0.9810 41