SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
Kranti Burman, Rahul Gedam / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Agu 2013, pp. 321-326
321 | P a g e
Histogram Based Color Image Authentication By Digital Image
Watermark Technique
Kranti Burman1
, Rahul Gedam2
1
Research scholar CEC Bilaspur ,CSVTU Bhilai, Chattishgarh
2
Assistant professor EC deptt. CEC Bilaspur, CSVTU Bhilai,Chattishgarh
Abstract
In the robust digital color image
watermarking for RGB color image
authentication, fragility or sensitivity of the
embedded watermark to malicious attacks is an
important problem. In this work the current
researches propose Least significant bit
substitution (LSB) based watermarking scheme for
authenticating RGB color image.. Embedding
distortion is minimized by adopting least
significant bit (LSB) substitution s c h e m e . The
p r o p o s e d scheme embeds watermark in three
bit planes by changing original pixels with
watermark pixels. The propose method give
histogram of Red, Green, Blue histogram of original
or watermark image separately .And also give the 3D
representation of Red, Green, Blue component of
original and watermark images. The paper presents
the insertion algorithm and extraction algorithm to
calculate the PSNR of original and watermarked
image.
Keywords: Image authentication, watermark
life cycle, histogram, LSB.
I. Introduction
Digital multimedia has been frequently
used for various applications due to easy
transmission, coping, editing and storage.
Subsequent, illegal distribution o f a n d / o r
alteration o f m u l t i m e d i a product are becoming
more and more pervasive and digital watermarking
techniques have been proposed to solve such
types of problems. Watermarking techniques can
be divided into two broad types: robust
watermarking and fragile/semi- fragile
watermarking, which are used for different
application purposes, from copyright protection to
multimedia authentication .Fragile or semi-fragile
watermark is commonly used for image
authentication to verify whether the received image
was modified during transmission or not. One may
hide the watermark imperceptibly in the image
before transmission and detect it after receiving
to make sure that the received image is original
or slightly modified.
Digital image can be manipulated in many
ways. Even in some cases, it is difficult for expert
uses to discern whether an image is genuine. To
address this issue, fragile watermarking has been
developed for authentication and integrity
verification of digital image.
Ibrahim Nasir,Yin g Wen g,Jianmin Jiang
2010 ,proposed a new robust watermarking the
least significant bit (LSB).I [10 ],the least significant
scheme for color image based on a block
probability in spatial domain. A binary watermark
image is permuted using sequence numbers
generated by a secret key and Gray code, and then
embedded four times in different positions by a
secret key. Each bit of the binary encoded
watermark is embedded by modifying the
intensities of a non-overlapping block of 8*8 of
the blue component of the host image. The ex
traction of the watermark is by comparing the in
intensities of a block of 8*8 of the watermarked
and the original images and calculating the
probability of detecting '0' or '1 '.Tested by
benchmark.[2]
Debjyoti Basu , Arindam Sinharay ,
Suryasarathi Barat, 2010 proposed Bit Plane Index
Based Fragile Watermarking Scheme for
Authenticating Color Image. Bit Plane Index
Modulation (BPIM) based fragile watermarking
scheme for authenticating RGB color image. To deal
with counterfeiting attacks block wise division
dependency is established. A content based color
watermark is created. Embedding distortion is
minimized by adopting least significant bit (LSB)
alteration scheme. The proposed scheme embeds
watermark in three bit planes by changing original
pixels with watermark pixels. The proposed method
comprise of encoding and decoding methods that can
provide public detection capabilities in the absences of
original host image and watermark image.[3]
Chuan Qin , Chin-Chen Chang ,, Pei-Yu Chen
,2011 proposed a novel fragile watermarking scheme
with content restoration capability. Authentication-
bits are produced using the image hashing method
with a folding operation. The low frequency
component of the non subsample contour let
Kranti Burman, Rahul Gedam / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Agu 2013, pp. 321-326
322 | P a g e
transform (NSCT) used coefficients are used to
encode the restoration-bits for each block by the
adaptive bit allocation mechanism. Two
algorithms are utilized to adjust the block
classification and the binary representations in
order to guarantee that the numbers of the
self-embedding authentication-bits and
restoration-bits are exactly suitable for 1-LSB
embedding capacity[4] RGB host image.
This scheme is capable of detecting any
modification done in any of the three bit plane
individually, as explained in the following
paragraphs. The rest of the paper is organized as
follows. Section 2 give brief of rgb model and
3&4 explain insertion algorithm and extraction
algorithms, section 5 give brief of color histogram and
section 6show the experiment data analysis, section
7 derives the conclusion and finally section 8
indicates the references
II. Tristimulus theory of color
perception
Primary Colors: Red(R), Green(G) and
Blue(B) are referred as the primary colors and when
mixed with various intensity proportions, can produce
all visible colors The primary colors can be mixed to
generate secondary colors such as magenta (red+blue),
cyan( green + blue) and yellow (red+green). Primary
Colors-RGB
This is an additive model, i.e. the colors present in the
light add to form new colors, and is appropriate for the
mixing of colored light for example. The image on the
left of figure shows the additive mixing of red, green
and blue primaries to form the three secondary colors
yellow (red + green), cyan (blue + green) and magenta
(red + blue), and white ((red + green + blue).
Figure 2.1 primary colors model.
The RGB Model
In the RGB model, an image consists of
three independent image planes, one in each of the
primary colors: red, green and blue. (The standard
wavelengths for the three primaries are as shown in
figure. Specifying a particular color is by specifying
the amount of each of the primary components
present. Figure shows the geometry of the RGB
color model for specifying colors using a Cartesian
coordinate system bit.
Figure 2.2: The RGB color cube. The grey scale
spectrum lies on the line joining the black and white
vertices.
III. Insertion Algorithm: Least
Significant Bit Substitution
Watermark Embedding
Symbolic Notations:
is main image
 is watermarked image
 is the message image (rounded unsigned integer)
W is created watermark
is the size operator
 is the modulus operator
is bit set operator; (A,BIT,V) sets the bit at
position BIT to the value V.V must be either 0 or 1.
Start
1. Read in the Main image (x,y)cover object where
watermark to be inserted
2. Read in the message image (x,y)
(x,y) =(x,y)/256
3. Determine size of cover object
Mc= (,1) //Height
Nc= (,2) //Width
4. Determine size of message object
Mm=(,1) //Height
Nm=,2) //Width
5. Title the message object out to cover object
size to generate watermark W
Kranti Burman, Rahul Gedam / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Agu 2013, pp. 321-326
323 | P a g e
 

Mc
i
Nc
j
NmjMmijiW
1 1
)1)(,1)((),( 
6. Set the Least Significant bit of cover object
(i, j) to the value of W(i, j)
 

Mc
i
Nc
j
NmjMmijiW
1 1
)1)(,1)((),( 
7. write the watermarked image out to a file
End
IV. Extraction Algorithm:
is main image
 iswatermarked image
 is the message image (rounded unsigned integer)
W is created/Recovered watermark
is the size operator
 is the modulus operator
is a bit get operator;  (A,BIT) returns the
value of the bit at position BIT in A. A must
be an unsigned integer and BIT must be a
number between 1 and the number of bits in
the unsigned integer class of A.
Start
1. Read in watermarked image (x,y)
2. Determine size of watermarked image
Mw=  (,1) //Height
Nw= ,2) //Width
3. Use LSB of watermarked image to recover
watermark
 

Mw
i
Nw
j
jijiW
1 1
)1),,((),( 
4. scale the recovered watermark
W(x,y) =256*W(x,y)
5. Read in original watermark
6. scale and display recovered watermark.
End
V. Color Histogram
 A color histogram is a 3D entity where each
pixel of an image (rather than each sample) is
placed into a bin.
 The color space is divided into volumetric
bins each of which represents a range of
colors.
 Each axis of the color space may be divided
independently of the others. This allows the
axes to have different resolutions.
 Color histograms are flexible constructs that
can be built from images in various color spaces
whether RGB, rg chromaticity or any other color space
of any dimension. A histogram of an image is
produced first by discretization of the colors in the
image into a number of bins, and counting the number
of image pixels in each bin. For example, a Red–
Bluechromaticity.In image processing and
photography, a color histogram is a representation of
the distribution of colors in an image. For digital
images, a color histogram represents the number of
pixels that have colors in each of a fixed list of color
ranges, that span the image's color space, the set of all
possible colors.
The color histogram can be built for any kind
of color space, although the term is more often used
for three-dimensional spaces like RGB or HSV. For
monochromatic images, the term intensity histogram
may be used instead. For multi-spectral images, where
each pixel is represented by an arbitrary number of
measurements (for example, beyond the three
measurements in RGB), the color histogram is N-
dimensional, with N being the number of
measurements taken. Each measurement has its own
wavelength range of the light spectrum, some of which
may be outside the visible spectrum.[8]
VI. EXRERIMENT
Experiments are done on five different
images for psnr value on red component, green
component, and blue component. A png image
original of 800 x 600 is taken first and represent the
histogram of original image or watermark image to
extract R,G,B component separately. Also give
th3Dhistogram representation of & psnr ratio and
also the detected image clarity can be seen from the
Figures.
Figure (a) & (b) cover image : original scene
(800x600,png)&watermark image( 113x102,jpeg)
Kranti Burman, Rahul Gedam / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Agu 2013, pp. 321-326
324 | P a g e
Figure (c) & (d) Recovered Watermark (800x600,png)
& extracted watermark (113x102,jpeg)
(e)
(f)
Figure (e) & (f) Red component of original &
watermarked image
(g)
(h)
Figure (g) & (h) Green component of original
& watermarked image.
(i)
(j)
Figure (i) & (j) Blue component of original &
watermarked image.
6. 1Experimental Data Analysis
The current researchers use peak
s i g n a l to noise ratio of parameter to analyze
the effectiveness of the proposed set of
algorithm.
6.1.1 Peak Signal to Noise Ratio (PSNR)
Peak Signal-to-Noise Ratio, often
abbreviated PSNR, is term for the ratio between the
maximum possible power of a and the power of
corrupting noise that affects the fidelity of its
representation. Because many signals have a very wide
dynamic range, PSNR is usually expressed in terms of
the logarithmic decibal scale.
PSNR is most commonly used to measure the
quality of reconstruction of lossy compression codecs
(e.g., for image compression). The signal in this case
is the original data, and the noise is the error
introduced by compression. When comparing
compression codecs, PSNR is an approximation to
human perception of reconstruction quality. Although
a higher PSNR generally indicates that the
reconstruction is of higher quality, in some cases the
reverse may be true. One has to be extremely careful
with the range of validity of this metric; it is only
conclusively valid when it is used to compare results
from the same codec (or codec type) and same content
PSNR is most easily defined via the (MSE).
Given a noise-free m×n monochrome image I and its
noisy approximation K, MSE is defined as:
Kranti Burman, Rahul Gedam / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Agu 2013, pp. 321-326
325 | P a g e
From MSE, the PSNR can be calculated using
the following formula
Where MAXI is the maximum possible
pixel value of the image. If each pixel is
represented by 8 bit stream then, MAXI = 255.
6..2 Experimental Results
The table 1 below shows some
of the experimented images with number of
pixel,image dimension ,file format .
The table 2 below depicts the name of some of the
experimental images, with their size and their PSNR
values of RGB components. The typical values of
PSNR in between 30db to 40db.
VII. Conclusion
In this approach, LSB is used for
watermarking and clarity is enhanced by modifying
the algorithm slightly not making it complex. This
work also enhances the visibility and robustness of the
watermark.
In this work, we have proposed a new
scheme for authenticating 24-bit RGB images. By
embedding R, G, B component of watermarking
image in the R, G, B c o m p o n e n t of o r i g i n a l
image, t h e s c h e m e i s capable of representing
the 3d histogram of image. Histogram basically used
for color enhancement, multi resolution histogram,
resolution selection. The histogram of R, G, and B
model is used in color monitor (CRT & LCD), video
cameras.
References
[1] m.v.s.s.babu a robust watermarking
algorithm for image authentication2012
international conference on information and
network technology (icint 2012)ipcsit vol. 37
(2012) © (2012) iacsit press, Singapore
[2] W.L. Tai, C.M. Yeh, C.C. Chang, Reversible
data hiding based on histogram modification
of pixel differences, IEEE Transactions on
Circuits and Systems for Video Technology
19 (6) (2009) 906–910.
[3] Rakesh Ahuja S.S. Bedi Himanshu Agarwal
A Survey of Digital Watermarking Scheme
MIT International Journal of Computer
Science & Information Technology.
[4] Debjyoti Basu , Arindam Sinharay and
Suryasarathi Barat Bit Plane Index Based
Fragile Watermarking Scheme for
Authenticating Color Image, 2010 First
International Conference on Integrated
Intelligent Computing
[5] Muhalim mohamed Aminsubariah Ibrahim
mazleena sallehmohd rozi katmin information
hiding using steganography university
technology Malaysia 2003
[6] S. Radharani ,Dr. M.L.Valarmathi, A Study
on Watermarking Schemes for Image
Authentication International Journal of
Computer Applications (0975 –
8887)Volume 2 – No.4, June 2010
[7] Adrian Perrig , Andrew Willmott 1998
describe Digital Image Watermarking in the
Real World", Vol. 2, No. 1, Jan. 2012, pp.
(52-59)52
[8] M. U. Celik, C. Sharma, E. Saber, and A.
M. Tekalp, “hierarchical watermarking for
secure image authentication with
localization,” IEEE Transaction
on Image Processing, vol.
11, no. 6, pp. 585-595, 2002.
[9] S. Katzenbeisser and F. A. E. Peticolus,
Information hiding technique for
Steganography and Digital
Watermarking. Norwood MA: Artech
House, 2000
[10] I.J. Cox, M. L. Miller, and J.A. Bloom,
DigitalWatermarking. San Diego, CA:
Academic, 2002
Kranti Burman, Rahul Gedam / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Agu 2013, pp. 321-326
326 | P a g e
[11] M.D. Swanson, M. Kobayashi, and A. H.
Tewfik,“Multimedia data embeddingand
watermarking technologies,” Proc. IEEE
vol. 86, no. 6, pp. 1064-1087, June 1998.
[12] F.A.P. Peticolus, R.J. Anderson, and
M.G.Kuhn, “information hiding - a
survey,” Proc. IEEE vol. 87, no. 7, pp.
1062-1078 July 1999
[13] J. Fredrick, “security of fragile
authentication watermarks with
localization,” in Proceedings of SPIE –
The International Society for Optical
Engineering, Ca, USA, 2002, vol. 4675,
pp. 691-700.
[14] S. Suthaharan, “Fragile image
watermarking using a gradient image
for improved localization and sec rity,”
Pattern Recognition Letters, vol. 25,
no. 16, 1893-1903, 2004.
[15] WANG Zhiming, TAO Jianhua, “A Fast
Implementation ofAdaptive Histogram
Equalization”, IEEE 2006, ICSP 2006
[16] Y. Wang, Q. Chen, B. Zhang, Soong-Der
Chen, and Abd.Rahman Ramli, “Minimum
mean brig htness error bihistogram
equalization in contrast enhancement”, IEEE
Transactions Consumer Electron. vol. 49, no.
4, pp. 1310-1319, Nov. 2003.
[17] Md. Foisal Hossain, Mohammad Reza
Alsharif, “Image Enhancement Based on
Logarithmic Transform Coefficient and
Adaptive Histogram Equalization”, 2007
International Conference on Convergence
Information Technology, IEEE2007.

Más contenido relacionado

La actualidad más candente

3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks
Alexander Decker
 
Iaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing inIaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing in
Iaetsd Iaetsd
 
3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrieval3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrieval
Alexander Decker
 

La actualidad más candente (15)

Automated Colorization of Grayscale Images Using Texture Descriptors
Automated Colorization of Grayscale Images Using Texture DescriptorsAutomated Colorization of Grayscale Images Using Texture Descriptors
Automated Colorization of Grayscale Images Using Texture Descriptors
 
A Robust Method for Image Watermarking Using Block Differencing LSB Substitution
A Robust Method for Image Watermarking Using Block Differencing LSB SubstitutionA Robust Method for Image Watermarking Using Block Differencing LSB Substitution
A Robust Method for Image Watermarking Using Block Differencing LSB Substitution
 
Implementation of content based image retrieval using the cfsd algorithm
Implementation of content based image retrieval using the cfsd algorithmImplementation of content based image retrieval using the cfsd algorithm
Implementation of content based image retrieval using the cfsd algorithm
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks
 
11.framework of smart mobile rfid networks
11.framework of smart mobile rfid networks11.framework of smart mobile rfid networks
11.framework of smart mobile rfid networks
 
3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrieval3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrieval
 
11.graph cut based local binary patterns for content based image retrieval
11.graph cut based local binary patterns for content based image retrieval11.graph cut based local binary patterns for content based image retrieval
11.graph cut based local binary patterns for content based image retrieval
 
Iaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing inIaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing in
 
Scanner colour calibration
Scanner colour calibrationScanner colour calibration
Scanner colour calibration
 
improving differently illuminant images with fuzzy membership based saturatio...
improving differently illuminant images with fuzzy membership based saturatio...improving differently illuminant images with fuzzy membership based saturatio...
improving differently illuminant images with fuzzy membership based saturatio...
 
3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrieval3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrieval
 
Information search using text and image query
Information search using text and image queryInformation search using text and image query
Information search using text and image query
 
Object detection for service robot using range and color features of an image
Object detection for service robot using range and color features of an imageObject detection for service robot using range and color features of an image
Object detection for service robot using range and color features of an image
 
Hg2513121314
Hg2513121314Hg2513121314
Hg2513121314
 
Prediction of Interpolants in Subsampled Radargram Slices
Prediction of Interpolants in Subsampled Radargram SlicesPrediction of Interpolants in Subsampled Radargram Slices
Prediction of Interpolants in Subsampled Radargram Slices
 

Destacado

Aquecimento Global Katrina 3 B
Aquecimento Global   Katrina 3 BAquecimento Global   Katrina 3 B
Aquecimento Global Katrina 3 B
EASalmazo
 
Auto Retrato_Carmen_Paranaíba
Auto Retrato_Carmen_ParanaíbaAuto Retrato_Carmen_Paranaíba
Auto Retrato_Carmen_Paranaíba
Paderes
 
Lenon el rey
Lenon el reyLenon el rey
Lenon el rey
alixita18
 
PUBLICACIÓN1_SLIDESHARE
PUBLICACIÓN1_SLIDESHAREPUBLICACIÓN1_SLIDESHARE
PUBLICACIÓN1_SLIDESHARE
Rodrigo Gamarra
 
Estructuracristalina propieddades y aplic del silicio, germanio y galio darwin1
Estructuracristalina propieddades y aplic del silicio, germanio y galio darwin1Estructuracristalina propieddades y aplic del silicio, germanio y galio darwin1
Estructuracristalina propieddades y aplic del silicio, germanio y galio darwin1
Darwin Oclocho Minchan
 

Destacado (20)

Aw34290297
Aw34290297Aw34290297
Aw34290297
 
Bj34385389
Bj34385389Bj34385389
Bj34385389
 
Be34347356
Be34347356Be34347356
Be34347356
 
Bk34390394
Bk34390394Bk34390394
Bk34390394
 
Em33832837
Em33832837Em33832837
Em33832837
 
Como Obter Ideias de Conteudo
Como Obter Ideias de ConteudoComo Obter Ideias de Conteudo
Como Obter Ideias de Conteudo
 
Conduzirembriagado
ConduzirembriagadoConduzirembriagado
Conduzirembriagado
 
Aquecimento Global Katrina 3 B
Aquecimento Global   Katrina 3 BAquecimento Global   Katrina 3 B
Aquecimento Global Katrina 3 B
 
Auto Retrato_Carmen_Paranaíba
Auto Retrato_Carmen_ParanaíbaAuto Retrato_Carmen_Paranaíba
Auto Retrato_Carmen_Paranaíba
 
Fisica 2
Fisica 2Fisica 2
Fisica 2
 
Subir este
Subir esteSubir este
Subir este
 
Colegio nacional nicolás esguerra
Colegio nacional nicolás esguerraColegio nacional nicolás esguerra
Colegio nacional nicolás esguerra
 
Lenon el rey
Lenon el reyLenon el rey
Lenon el rey
 
PUBLICACIÓN1_SLIDESHARE
PUBLICACIÓN1_SLIDESHAREPUBLICACIÓN1_SLIDESHARE
PUBLICACIÓN1_SLIDESHARE
 
Lucentis
LucentisLucentis
Lucentis
 
Qué es el html
Qué es el htmlQué es el html
Qué es el html
 
Estructuracristalina propieddades y aplic del silicio, germanio y galio darwin1
Estructuracristalina propieddades y aplic del silicio, germanio y galio darwin1Estructuracristalina propieddades y aplic del silicio, germanio y galio darwin1
Estructuracristalina propieddades y aplic del silicio, germanio y galio darwin1
 
Gestion ambiental
Gestion ambientalGestion ambiental
Gestion ambiental
 
pwp1-Historia
pwp1-Historiapwp1-Historia
pwp1-Historia
 
Seminario 3
Seminario 3Seminario 3
Seminario 3
 

Similar a Ba34321326

Color image steganography in YCbCr space
Color image steganography in YCbCr spaceColor image steganography in YCbCr space
Color image steganography in YCbCr space
IJECEIAES
 
Image Maximization Using Multi Spectral Image Fusion Technique
Image Maximization Using Multi Spectral Image Fusion TechniqueImage Maximization Using Multi Spectral Image Fusion Technique
Image Maximization Using Multi Spectral Image Fusion Technique
dbpublications
 
An effective RGB color selection for complex 3D object structure in scene gra...
An effective RGB color selection for complex 3D object structure in scene gra...An effective RGB color selection for complex 3D object structure in scene gra...
An effective RGB color selection for complex 3D object structure in scene gra...
IJECEIAES
 
Project report_DTRL_subrat
Project report_DTRL_subratProject report_DTRL_subrat
Project report_DTRL_subrat
Subrat Prasad
 

Similar a Ba34321326 (20)

Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Color image steganography in YCbCr space
Color image steganography in YCbCr spaceColor image steganography in YCbCr space
Color image steganography in YCbCr space
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Information search using text and image query
Information search using text and image queryInformation search using text and image query
Information search using text and image query
 
I07015261
I07015261I07015261
I07015261
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
 
histogram equalization of grayscale and color image
histogram equalization of grayscale and color imagehistogram equalization of grayscale and color image
histogram equalization of grayscale and color image
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
 
Visual Cryptography using Image Thresholding
Visual Cryptography using Image ThresholdingVisual Cryptography using Image Thresholding
Visual Cryptography using Image Thresholding
 
Image segmentation based on color
Image segmentation based on colorImage segmentation based on color
Image segmentation based on color
 
Image segmentation based on color
Image segmentation based on colorImage segmentation based on color
Image segmentation based on color
 
Image Maximization Using Multi Spectral Image Fusion Technique
Image Maximization Using Multi Spectral Image Fusion TechniqueImage Maximization Using Multi Spectral Image Fusion Technique
Image Maximization Using Multi Spectral Image Fusion Technique
 
An effective RGB color selection for complex 3D object structure in scene gra...
An effective RGB color selection for complex 3D object structure in scene gra...An effective RGB color selection for complex 3D object structure in scene gra...
An effective RGB color selection for complex 3D object structure in scene gra...
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
06 cie552 image_manipulation
06 cie552 image_manipulation06 cie552 image_manipulation
06 cie552 image_manipulation
 
Project report_DTRL_subrat
Project report_DTRL_subratProject report_DTRL_subrat
Project report_DTRL_subrat
 
Ijetcas14 372
Ijetcas14 372Ijetcas14 372
Ijetcas14 372
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Ba34321326

  • 1. Kranti Burman, Rahul Gedam / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Agu 2013, pp. 321-326 321 | P a g e Histogram Based Color Image Authentication By Digital Image Watermark Technique Kranti Burman1 , Rahul Gedam2 1 Research scholar CEC Bilaspur ,CSVTU Bhilai, Chattishgarh 2 Assistant professor EC deptt. CEC Bilaspur, CSVTU Bhilai,Chattishgarh Abstract In the robust digital color image watermarking for RGB color image authentication, fragility or sensitivity of the embedded watermark to malicious attacks is an important problem. In this work the current researches propose Least significant bit substitution (LSB) based watermarking scheme for authenticating RGB color image.. Embedding distortion is minimized by adopting least significant bit (LSB) substitution s c h e m e . The p r o p o s e d scheme embeds watermark in three bit planes by changing original pixels with watermark pixels. The propose method give histogram of Red, Green, Blue histogram of original or watermark image separately .And also give the 3D representation of Red, Green, Blue component of original and watermark images. The paper presents the insertion algorithm and extraction algorithm to calculate the PSNR of original and watermarked image. Keywords: Image authentication, watermark life cycle, histogram, LSB. I. Introduction Digital multimedia has been frequently used for various applications due to easy transmission, coping, editing and storage. Subsequent, illegal distribution o f a n d / o r alteration o f m u l t i m e d i a product are becoming more and more pervasive and digital watermarking techniques have been proposed to solve such types of problems. Watermarking techniques can be divided into two broad types: robust watermarking and fragile/semi- fragile watermarking, which are used for different application purposes, from copyright protection to multimedia authentication .Fragile or semi-fragile watermark is commonly used for image authentication to verify whether the received image was modified during transmission or not. One may hide the watermark imperceptibly in the image before transmission and detect it after receiving to make sure that the received image is original or slightly modified. Digital image can be manipulated in many ways. Even in some cases, it is difficult for expert uses to discern whether an image is genuine. To address this issue, fragile watermarking has been developed for authentication and integrity verification of digital image. Ibrahim Nasir,Yin g Wen g,Jianmin Jiang 2010 ,proposed a new robust watermarking the least significant bit (LSB).I [10 ],the least significant scheme for color image based on a block probability in spatial domain. A binary watermark image is permuted using sequence numbers generated by a secret key and Gray code, and then embedded four times in different positions by a secret key. Each bit of the binary encoded watermark is embedded by modifying the intensities of a non-overlapping block of 8*8 of the blue component of the host image. The ex traction of the watermark is by comparing the in intensities of a block of 8*8 of the watermarked and the original images and calculating the probability of detecting '0' or '1 '.Tested by benchmark.[2] Debjyoti Basu , Arindam Sinharay , Suryasarathi Barat, 2010 proposed Bit Plane Index Based Fragile Watermarking Scheme for Authenticating Color Image. Bit Plane Index Modulation (BPIM) based fragile watermarking scheme for authenticating RGB color image. To deal with counterfeiting attacks block wise division dependency is established. A content based color watermark is created. Embedding distortion is minimized by adopting least significant bit (LSB) alteration scheme. The proposed scheme embeds watermark in three bit planes by changing original pixels with watermark pixels. The proposed method comprise of encoding and decoding methods that can provide public detection capabilities in the absences of original host image and watermark image.[3] Chuan Qin , Chin-Chen Chang ,, Pei-Yu Chen ,2011 proposed a novel fragile watermarking scheme with content restoration capability. Authentication- bits are produced using the image hashing method with a folding operation. The low frequency component of the non subsample contour let
  • 2. Kranti Burman, Rahul Gedam / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Agu 2013, pp. 321-326 322 | P a g e transform (NSCT) used coefficients are used to encode the restoration-bits for each block by the adaptive bit allocation mechanism. Two algorithms are utilized to adjust the block classification and the binary representations in order to guarantee that the numbers of the self-embedding authentication-bits and restoration-bits are exactly suitable for 1-LSB embedding capacity[4] RGB host image. This scheme is capable of detecting any modification done in any of the three bit plane individually, as explained in the following paragraphs. The rest of the paper is organized as follows. Section 2 give brief of rgb model and 3&4 explain insertion algorithm and extraction algorithms, section 5 give brief of color histogram and section 6show the experiment data analysis, section 7 derives the conclusion and finally section 8 indicates the references II. Tristimulus theory of color perception Primary Colors: Red(R), Green(G) and Blue(B) are referred as the primary colors and when mixed with various intensity proportions, can produce all visible colors The primary colors can be mixed to generate secondary colors such as magenta (red+blue), cyan( green + blue) and yellow (red+green). Primary Colors-RGB This is an additive model, i.e. the colors present in the light add to form new colors, and is appropriate for the mixing of colored light for example. The image on the left of figure shows the additive mixing of red, green and blue primaries to form the three secondary colors yellow (red + green), cyan (blue + green) and magenta (red + blue), and white ((red + green + blue). Figure 2.1 primary colors model. The RGB Model In the RGB model, an image consists of three independent image planes, one in each of the primary colors: red, green and blue. (The standard wavelengths for the three primaries are as shown in figure. Specifying a particular color is by specifying the amount of each of the primary components present. Figure shows the geometry of the RGB color model for specifying colors using a Cartesian coordinate system bit. Figure 2.2: The RGB color cube. The grey scale spectrum lies on the line joining the black and white vertices. III. Insertion Algorithm: Least Significant Bit Substitution Watermark Embedding Symbolic Notations: is main image  is watermarked image  is the message image (rounded unsigned integer) W is created watermark is the size operator  is the modulus operator is bit set operator; (A,BIT,V) sets the bit at position BIT to the value V.V must be either 0 or 1. Start 1. Read in the Main image (x,y)cover object where watermark to be inserted 2. Read in the message image (x,y) (x,y) =(x,y)/256 3. Determine size of cover object Mc= (,1) //Height Nc= (,2) //Width 4. Determine size of message object Mm=(,1) //Height Nm=,2) //Width 5. Title the message object out to cover object size to generate watermark W
  • 3. Kranti Burman, Rahul Gedam / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Agu 2013, pp. 321-326 323 | P a g e    Mc i Nc j NmjMmijiW 1 1 )1)(,1)((),(  6. Set the Least Significant bit of cover object (i, j) to the value of W(i, j)    Mc i Nc j NmjMmijiW 1 1 )1)(,1)((),(  7. write the watermarked image out to a file End IV. Extraction Algorithm: is main image  iswatermarked image  is the message image (rounded unsigned integer) W is created/Recovered watermark is the size operator  is the modulus operator is a bit get operator;  (A,BIT) returns the value of the bit at position BIT in A. A must be an unsigned integer and BIT must be a number between 1 and the number of bits in the unsigned integer class of A. Start 1. Read in watermarked image (x,y) 2. Determine size of watermarked image Mw=  (,1) //Height Nw= ,2) //Width 3. Use LSB of watermarked image to recover watermark    Mw i Nw j jijiW 1 1 )1),,((),(  4. scale the recovered watermark W(x,y) =256*W(x,y) 5. Read in original watermark 6. scale and display recovered watermark. End V. Color Histogram  A color histogram is a 3D entity where each pixel of an image (rather than each sample) is placed into a bin.  The color space is divided into volumetric bins each of which represents a range of colors.  Each axis of the color space may be divided independently of the others. This allows the axes to have different resolutions.  Color histograms are flexible constructs that can be built from images in various color spaces whether RGB, rg chromaticity or any other color space of any dimension. A histogram of an image is produced first by discretization of the colors in the image into a number of bins, and counting the number of image pixels in each bin. For example, a Red– Bluechromaticity.In image processing and photography, a color histogram is a representation of the distribution of colors in an image. For digital images, a color histogram represents the number of pixels that have colors in each of a fixed list of color ranges, that span the image's color space, the set of all possible colors. The color histogram can be built for any kind of color space, although the term is more often used for three-dimensional spaces like RGB or HSV. For monochromatic images, the term intensity histogram may be used instead. For multi-spectral images, where each pixel is represented by an arbitrary number of measurements (for example, beyond the three measurements in RGB), the color histogram is N- dimensional, with N being the number of measurements taken. Each measurement has its own wavelength range of the light spectrum, some of which may be outside the visible spectrum.[8] VI. EXRERIMENT Experiments are done on five different images for psnr value on red component, green component, and blue component. A png image original of 800 x 600 is taken first and represent the histogram of original image or watermark image to extract R,G,B component separately. Also give th3Dhistogram representation of & psnr ratio and also the detected image clarity can be seen from the Figures. Figure (a) & (b) cover image : original scene (800x600,png)&watermark image( 113x102,jpeg)
  • 4. Kranti Burman, Rahul Gedam / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Agu 2013, pp. 321-326 324 | P a g e Figure (c) & (d) Recovered Watermark (800x600,png) & extracted watermark (113x102,jpeg) (e) (f) Figure (e) & (f) Red component of original & watermarked image (g) (h) Figure (g) & (h) Green component of original & watermarked image. (i) (j) Figure (i) & (j) Blue component of original & watermarked image. 6. 1Experimental Data Analysis The current researchers use peak s i g n a l to noise ratio of parameter to analyze the effectiveness of the proposed set of algorithm. 6.1.1 Peak Signal to Noise Ratio (PSNR) Peak Signal-to-Noise Ratio, often abbreviated PSNR, is term for the ratio between the maximum possible power of a and the power of corrupting noise that affects the fidelity of its representation. Because many signals have a very wide dynamic range, PSNR is usually expressed in terms of the logarithmic decibal scale. PSNR is most commonly used to measure the quality of reconstruction of lossy compression codecs (e.g., for image compression). The signal in this case is the original data, and the noise is the error introduced by compression. When comparing compression codecs, PSNR is an approximation to human perception of reconstruction quality. Although a higher PSNR generally indicates that the reconstruction is of higher quality, in some cases the reverse may be true. One has to be extremely careful with the range of validity of this metric; it is only conclusively valid when it is used to compare results from the same codec (or codec type) and same content PSNR is most easily defined via the (MSE). Given a noise-free m×n monochrome image I and its noisy approximation K, MSE is defined as:
  • 5. Kranti Burman, Rahul Gedam / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Agu 2013, pp. 321-326 325 | P a g e From MSE, the PSNR can be calculated using the following formula Where MAXI is the maximum possible pixel value of the image. If each pixel is represented by 8 bit stream then, MAXI = 255. 6..2 Experimental Results The table 1 below shows some of the experimented images with number of pixel,image dimension ,file format . The table 2 below depicts the name of some of the experimental images, with their size and their PSNR values of RGB components. The typical values of PSNR in between 30db to 40db. VII. Conclusion In this approach, LSB is used for watermarking and clarity is enhanced by modifying the algorithm slightly not making it complex. This work also enhances the visibility and robustness of the watermark. In this work, we have proposed a new scheme for authenticating 24-bit RGB images. By embedding R, G, B component of watermarking image in the R, G, B c o m p o n e n t of o r i g i n a l image, t h e s c h e m e i s capable of representing the 3d histogram of image. Histogram basically used for color enhancement, multi resolution histogram, resolution selection. The histogram of R, G, and B model is used in color monitor (CRT & LCD), video cameras. References [1] m.v.s.s.babu a robust watermarking algorithm for image authentication2012 international conference on information and network technology (icint 2012)ipcsit vol. 37 (2012) © (2012) iacsit press, Singapore [2] W.L. Tai, C.M. Yeh, C.C. Chang, Reversible data hiding based on histogram modification of pixel differences, IEEE Transactions on Circuits and Systems for Video Technology 19 (6) (2009) 906–910. [3] Rakesh Ahuja S.S. Bedi Himanshu Agarwal A Survey of Digital Watermarking Scheme MIT International Journal of Computer Science & Information Technology. [4] Debjyoti Basu , Arindam Sinharay and Suryasarathi Barat Bit Plane Index Based Fragile Watermarking Scheme for Authenticating Color Image, 2010 First International Conference on Integrated Intelligent Computing [5] Muhalim mohamed Aminsubariah Ibrahim mazleena sallehmohd rozi katmin information hiding using steganography university technology Malaysia 2003 [6] S. Radharani ,Dr. M.L.Valarmathi, A Study on Watermarking Schemes for Image Authentication International Journal of Computer Applications (0975 – 8887)Volume 2 – No.4, June 2010 [7] Adrian Perrig , Andrew Willmott 1998 describe Digital Image Watermarking in the Real World", Vol. 2, No. 1, Jan. 2012, pp. (52-59)52 [8] M. U. Celik, C. Sharma, E. Saber, and A. M. Tekalp, “hierarchical watermarking for secure image authentication with localization,” IEEE Transaction on Image Processing, vol. 11, no. 6, pp. 585-595, 2002. [9] S. Katzenbeisser and F. A. E. Peticolus, Information hiding technique for Steganography and Digital Watermarking. Norwood MA: Artech House, 2000 [10] I.J. Cox, M. L. Miller, and J.A. Bloom, DigitalWatermarking. San Diego, CA: Academic, 2002
  • 6. Kranti Burman, Rahul Gedam / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Agu 2013, pp. 321-326 326 | P a g e [11] M.D. Swanson, M. Kobayashi, and A. H. Tewfik,“Multimedia data embeddingand watermarking technologies,” Proc. IEEE vol. 86, no. 6, pp. 1064-1087, June 1998. [12] F.A.P. Peticolus, R.J. Anderson, and M.G.Kuhn, “information hiding - a survey,” Proc. IEEE vol. 87, no. 7, pp. 1062-1078 July 1999 [13] J. Fredrick, “security of fragile authentication watermarks with localization,” in Proceedings of SPIE – The International Society for Optical Engineering, Ca, USA, 2002, vol. 4675, pp. 691-700. [14] S. Suthaharan, “Fragile image watermarking using a gradient image for improved localization and sec rity,” Pattern Recognition Letters, vol. 25, no. 16, 1893-1903, 2004. [15] WANG Zhiming, TAO Jianhua, “A Fast Implementation ofAdaptive Histogram Equalization”, IEEE 2006, ICSP 2006 [16] Y. Wang, Q. Chen, B. Zhang, Soong-Der Chen, and Abd.Rahman Ramli, “Minimum mean brig htness error bihistogram equalization in contrast enhancement”, IEEE Transactions Consumer Electron. vol. 49, no. 4, pp. 1310-1319, Nov. 2003. [17] Md. Foisal Hossain, Mohammad Reza Alsharif, “Image Enhancement Based on Logarithmic Transform Coefficient and Adaptive Histogram Equalization”, 2007 International Conference on Convergence Information Technology, IEEE2007.