SlideShare a Scribd company logo
1 of 25
DIGITAL IMAGE WATERMARKING
ALGORITHM USING HUMAN VISUAL
SYSTEN ANANLYSIS IN DWT
PRESENTED BYPRESENTED BY
V.SUNDHARARAJV.SUNDHARARAJ M.EM.E
ASSISTANT PROFESSOR/ECEASSISTANT PROFESSOR/ECE
PAAVAI COLLEGE OF ENGINEERINGPAAVAI COLLEGE OF ENGINEERING
2
OUTLINE
• Introduction
• DWT (Discrete Wavelet Transformation)
• HVS ( Human Visual System )
• Proposed Scheme
• Experimental results
• Conclusions
3
Introduction
• The digital watermarking techniques can be
classified into two categories:
– Spatial domain
• Less complex
• Not more robust
– Frequency domain
• Complex
• More robust
INTRODUCTION
Watermark embedding:
A digital watermark is a piece of information embedded
into a digital image using Human visual system
technique .
WATERMARKING DETECTION:
Information can be recovered from the watermarked
image.
EXISTING METHOD
ORIGINAL
IMAGE
SECRET
IMAGE
EMBED
DING
EMBED
DING
WATERMA
RKED
IMAGE
WATERMA
RKED
IMAGE
Embedding in this context means to add the
information directly into the image data in
such a way that it is not easily removed.
Less complex
Not more robust
PROPOSED METHOD
Complex
More robust
7
DWT (Discrete Wavelet
Transformation)1/2
LL1 HL1
LH1 HH1
Original image
LL2 HL2
LH2 HH2
DWT
1-level
DWT
2-levels
A B C D A+B C+D A-B C-D
L H
A C
B D
L H
A+B C+D
C-DA-B
LL HL
LH HH
8
DWT (Discrete Wavelet
Transformation)2/2
DWT
2-levels
LH1LH1 HH1HH1
HL1HL1
LL2LL2 HL2HL2
LH2LH2 HH2HH2
9
HVS ( Human Visual
System )
• The human eye is less sensitive to noise in
– High frequency sub-bands
– Brightness is high or low
– Textured area and more near the edges
Watermark embedding algorithm
)(i,j)x(m,nαw(i,j)I(i,j)I' θ
l
θ
l
θ
l +=
Example:
206
50*1.2*0.1200
1112*0.11212 0
2
0
2
0
2
=
+=
+= ),)x(,(w),(I),(I'
Step 1:
Step 2: IDWT
Watermark detection algorithm
• Watermark images is recovered following the
expression,
(i,j)αw
(i,j)(i,j)-II'
x'(m,n)
θ
l
θ
l
θ
l=
Example:
50
1.2*0.1
200206
==
-
x'(m,n)
Step 2: IDWT
Step 1:
12
Conclusions
• The proposed scheme is based on
HVS(Human Visual system) characteristics.
• The proposed scheme has better
performance in terms of robustness.
CONFERENCE
[1]. V.sundhararaj , ”image watermarking using human visual
system scheme in wavelet domain”, 2011,GOVERNMENT
COLLEGE OF TECHNOLOGY,COIMBATORE.
[2]. V.sundhararaj ,” image watermarking detector using Gauss
hermite expansion in wavelet domain human visual system”,
2011,ANNA UNIVERSITY OF
TECHNOLOGY,COIMBATORE.
[3]. V.sundhararaj ,”watermarking detector using HVS analysis in
wavelet domain human visual system”, 2012,jayalaksmi college
Engg &tech.
[4]. V.sundhararaj ,” image fusion detection in satellite image”,
2013,ncret, Gujrat.
REFERENCE
[1]. Yaohui Dai,Chunxian wang, “ Digital watermarking Algorithm
based on wavelet transform”, Control, Automation Systems
Engineering (case), 2011 International Conference on IEEE.
[2] M. M. Rahman, M. O. Ahmad, and M. N. S. Swamy,
“Statistical detector for wavelet-based image watermarking
using modified GH PDF,” in Proc. IEEE Int. Symp. Circuits and
Systems, Seattle, WA, 2008, pp. 712–715.
[3]. M. Mahbubur Rahman, M. Omair Ahmad, AUGUST 2009 “A
New Statistical Detector for DWT-Based Additive Image
Watermarking Using the Gauss Hermite Expansion”IEEE
TRANSACTIONS ON IMAGE PROCESSING VOL. 18, NO.
8, AUGUST 2009.
15
Watermark embedding
algorithm(1/3)
x0
3
x0
0
x0
2
x0
1
Image
Watermark
LL HL
LH HH
DWT
4-levels
DWT
1-levels
Step 1:
Θ=0
Θ=1Θ=2
Θ=3
θ
lI : The sub-band (θ) at resolution level (l) of image.
16
Watermark embedding
algorithm(2/3)
• Find the Weight factors for wavelet- coefficient.
(Barni et al.,2001)
(i,j)Wθ
l
)(p*GT θ
lI
θ
l S=
LL2 HL2
LH2 HH2
0.21 0.1 0.12 1.13
0.25 0.36 0.37 1.38
1.40 1.2 1.3 1.4
1.6 1.7 2.1 2.3
Example:
1.21650%ST0
2 == )*(
0.1, 0.12, 0.21, 0.25, 0.36, 0.37, 1.13, 1.2, 1.3, 1.38,
1.4,1.41, 1.6, 1.7, 2.1, 2.3
Step 2:
17
Watermark embedding
algorithm(3/3)
)(i,j)x(m,nαw(i,j)I(i,j)I' θ
l
θ
l
θ
l +=
Example:
206
50*1.2*0.1200
1112*0.11212 0
2
0
2
0
2
=
+=
+= ),)x(,(w),(I),(I'
Step 3:
Step 4: IDWT
18
Watermark extracting algorithm
• Both the original and the watermark images are
needed.
(i,j)αw
(i,j)(i,j)-II'
x'(m,n)
θ
l
θ
l
θ
l=
Example:
50
1.2*0.1
200206
==
-
x'(m,n)
Step 2: IDWT
Step 1:
19
Experimental results (1/3)
(a) Lena 512*512
(b) Watermark 64*64
(C) Watermarked Lena
PSNR=44.7 dB
20
Experimental results (2/3)
(a) 64 times compressed
watermarked Lena
(b) Extracted
Watermark
(d) Extracted
Watermark
(c) 1.37% remained
watermarked Lena after
cropping
21
Experimental results (3/3)
(b) Extracted
Watermark
(a) Warped watermarked Lena
22
Weight factor (1/4)
63 34 49 10
31 23 14 -13
15 14 3 -12
-9 -7 -14 8
0
0 1
1
0
1
10
LL3 HL3
LH3 HH3
i
j
10(0,1)I,63(0,0)I 0
3
3
3 ==
Example:
23
Weight factor (2/4)
0.10.1*1(3,3) ==Θ
2
),,(),,(),(
),(
2.0
jiljill
jiwl
Ξ⋅Λ⋅Θ
=
θθ














=
=
=
=
⋅






 =
=Θ
3if,10.0
2if,16.0
1if,32.0
0if,00.1
otherwise,1
1if,2
),(
l
l
l
l
l
θ
θ
The human eye is less sensitive to noise in high frequency sub-bands:
Example:
2
(3,0,0)(3,0,0)(3,3)
(0,0)W
0.2
3
3
Ξ⋅Λ⋅Θ
=
24
Weight factor (3/4)
)
j
,
i
(I
L(l,i,j)Λ(l,i,j)
ll 











+=
+=
−− 33
3
3
22256
1
1
1


<



=
otherwise,
50)if,1 .L(l,i,j
L(l,i,j)
-L(l,i,j)
L'(l,i,j)
The eye is less sensitive to noise in the those areas of the image
where brightness is high or low.
Example:
1.75
0.751
0.251
256
64
1
2
0
2
0
256
1
1
0031003
00
3
3
=
+=
+=
+=












+=
+=
),(I
),,L(),,Λ(
25
Weight factor (4/4)
10
1033
3
3
3
0
2
0
1
0
21
0
22
Var
2216
1
,y
,xll
l
k x y
kklkk
j
x,
i
yI
j
x,
i
yI
)j,i,l(
=
=−−
−
= =θ = =
θ
+














++⋅














++
=Ξ
∑ ∑∑∑
717164
228.6875(56)
228.68758)14-12-37-9-141513-1410(49003
2
2
=
⋅=
⋅++++++=Ξ ),,(
The is less sensitive to noise in highly texture areas but,The is less sensitive to noise in highly texture areas but,
among these, more sensitive near the edges.among these, more sensitive near the edges.
1.3
2
(14.83)1.750.1
2
(717164)1.750.1
(0,0)W
0.2
3
3
=
⋅⋅
=
⋅⋅
=
Example:

More Related Content

What's hot

Comparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator ApproachComparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator Approachijsrd.com
 
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTSecured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTEditor IJMTER
 
IRJET- Removal of Rain Streaks and Shadow from an Image
IRJET- Removal of Rain Streaks and Shadow from an ImageIRJET- Removal of Rain Streaks and Shadow from an Image
IRJET- Removal of Rain Streaks and Shadow from an ImageIRJET Journal
 
Foveated Rendering: An Introduction to Present and Future Research
Foveated Rendering: An Introduction to Present and Future ResearchFoveated Rendering: An Introduction to Present and Future Research
Foveated Rendering: An Introduction to Present and Future ResearchBIPUL MOHANTO [LION]
 
Reconstructing and Watermarking Stereo Vision Systems-PhD Presentation
Reconstructing and Watermarking Stereo Vision Systems-PhD Presentation Reconstructing and Watermarking Stereo Vision Systems-PhD Presentation
Reconstructing and Watermarking Stereo Vision Systems-PhD Presentation Osama Hosam
 
Change Detection of 3D Scene with 3D and 2D Information for Environment Checking
Change Detection of 3D Scene with 3D and 2D Information for Environment CheckingChange Detection of 3D Scene with 3D and 2D Information for Environment Checking
Change Detection of 3D Scene with 3D and 2D Information for Environment Checkingbaowei lin
 
Integration of poses to enhance the shape of the object tracking from a singl...
Integration of poses to enhance the shape of the object tracking from a singl...Integration of poses to enhance the shape of the object tracking from a singl...
Integration of poses to enhance the shape of the object tracking from a singl...eSAT Journals
 
A Novel Approach to Image Denoising and Image in Painting
A Novel Approach to Image Denoising and Image in PaintingA Novel Approach to Image Denoising and Image in Painting
A Novel Approach to Image Denoising and Image in PaintingEswar Publications
 
Predictive Model for Ultrasonic Slitting of Glass Using Feed Forward Back Pro...
Predictive Model for Ultrasonic Slitting of Glass Using Feed Forward Back Pro...Predictive Model for Ultrasonic Slitting of Glass Using Feed Forward Back Pro...
Predictive Model for Ultrasonic Slitting of Glass Using Feed Forward Back Pro...IJSRD
 
IRJET- Retinal Health Diagnosis using Image Processing
IRJET- Retinal Health Diagnosis using Image ProcessingIRJET- Retinal Health Diagnosis using Image Processing
IRJET- Retinal Health Diagnosis using Image ProcessingIRJET Journal
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
 
Iris Segmentation: a survey
Iris Segmentation: a surveyIris Segmentation: a survey
Iris Segmentation: a surveyIJMER
 
Dynamic shear stress evaluation on micro turning tool using photoelasticity
Dynamic shear stress evaluation on micro turning tool using photoelasticityDynamic shear stress evaluation on micro turning tool using photoelasticity
Dynamic shear stress evaluation on micro turning tool using photoelasticitySoumen Mandal
 

What's hot (16)

Comparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator ApproachComparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator Approach
 
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTSecured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWT
 
IRJET- Removal of Rain Streaks and Shadow from an Image
IRJET- Removal of Rain Streaks and Shadow from an ImageIRJET- Removal of Rain Streaks and Shadow from an Image
IRJET- Removal of Rain Streaks and Shadow from an Image
 
Foveated Rendering: An Introduction to Present and Future Research
Foveated Rendering: An Introduction to Present and Future ResearchFoveated Rendering: An Introduction to Present and Future Research
Foveated Rendering: An Introduction to Present and Future Research
 
M.tech dsp list 2014 15
M.tech dsp list 2014 15M.tech dsp list 2014 15
M.tech dsp list 2014 15
 
Reconstructing and Watermarking Stereo Vision Systems-PhD Presentation
Reconstructing and Watermarking Stereo Vision Systems-PhD Presentation Reconstructing and Watermarking Stereo Vision Systems-PhD Presentation
Reconstructing and Watermarking Stereo Vision Systems-PhD Presentation
 
Change Detection of 3D Scene with 3D and 2D Information for Environment Checking
Change Detection of 3D Scene with 3D and 2D Information for Environment CheckingChange Detection of 3D Scene with 3D and 2D Information for Environment Checking
Change Detection of 3D Scene with 3D and 2D Information for Environment Checking
 
Integration of poses to enhance the shape of the object tracking from a singl...
Integration of poses to enhance the shape of the object tracking from a singl...Integration of poses to enhance the shape of the object tracking from a singl...
Integration of poses to enhance the shape of the object tracking from a singl...
 
A Novel Approach to Image Denoising and Image in Painting
A Novel Approach to Image Denoising and Image in PaintingA Novel Approach to Image Denoising and Image in Painting
A Novel Approach to Image Denoising and Image in Painting
 
23-02-03[1]
23-02-03[1]23-02-03[1]
23-02-03[1]
 
M.tech dsp list 2014 15
M.tech dsp list 2014 15M.tech dsp list 2014 15
M.tech dsp list 2014 15
 
Predictive Model for Ultrasonic Slitting of Glass Using Feed Forward Back Pro...
Predictive Model for Ultrasonic Slitting of Glass Using Feed Forward Back Pro...Predictive Model for Ultrasonic Slitting of Glass Using Feed Forward Back Pro...
Predictive Model for Ultrasonic Slitting of Glass Using Feed Forward Back Pro...
 
IRJET- Retinal Health Diagnosis using Image Processing
IRJET- Retinal Health Diagnosis using Image ProcessingIRJET- Retinal Health Diagnosis using Image Processing
IRJET- Retinal Health Diagnosis using Image Processing
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics
 
Iris Segmentation: a survey
Iris Segmentation: a surveyIris Segmentation: a survey
Iris Segmentation: a survey
 
Dynamic shear stress evaluation on micro turning tool using photoelasticity
Dynamic shear stress evaluation on micro turning tool using photoelasticityDynamic shear stress evaluation on micro turning tool using photoelasticity
Dynamic shear stress evaluation on micro turning tool using photoelasticity
 

Viewers also liked

P 9 Killer Halftone Effect
P 9  Killer Halftone EffectP 9  Killer Halftone Effect
P 9 Killer Halftone Effectsumidahilo
 
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...IDES Editor
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
 
CT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingCT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingAM Publications,India
 
Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarkingJasni Zain
 
Unified Contact Riemannian Manifold Admitting SemiSymmetric Metric S-Connection
Unified Contact Riemannian Manifold Admitting SemiSymmetric Metric S-ConnectionUnified Contact Riemannian Manifold Admitting SemiSymmetric Metric S-Connection
Unified Contact Riemannian Manifold Admitting SemiSymmetric Metric S-Connectioniosrjce
 
/.Amd mnt/lotus/host/home/jaishakthi/presentation/rmeet1/rmeet 1
/.Amd mnt/lotus/host/home/jaishakthi/presentation/rmeet1/rmeet 1/.Amd mnt/lotus/host/home/jaishakthi/presentation/rmeet1/rmeet 1
/.Amd mnt/lotus/host/home/jaishakthi/presentation/rmeet1/rmeet 1Dr. Jai Sakthi
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image ProcessingSamir Sabry
 
Digital Image Processing (DIP)
Digital Image Processing (DIP)Digital Image Processing (DIP)
Digital Image Processing (DIP)Srikanth VNV
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image ProcessingShaleen Saini
 
Shrinkage methods
Shrinkage methodsShrinkage methods
Shrinkage methodsLuca Vitale
 
Basic image processing
Basic image processingBasic image processing
Basic image processingJay Thakkar
 
Introduction to Digital Image Processing
Introduction to Digital Image ProcessingIntroduction to Digital Image Processing
Introduction to Digital Image ProcessingJulio Seaman
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
 

Viewers also liked (20)

P 9 Killer Halftone Effect
P 9  Killer Halftone EffectP 9  Killer Halftone Effect
P 9 Killer Halftone Effect
 
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
CT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingCT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image Watermarking
 
Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarking
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Unified Contact Riemannian Manifold Admitting SemiSymmetric Metric S-Connection
Unified Contact Riemannian Manifold Admitting SemiSymmetric Metric S-ConnectionUnified Contact Riemannian Manifold Admitting SemiSymmetric Metric S-Connection
Unified Contact Riemannian Manifold Admitting SemiSymmetric Metric S-Connection
 
Image processing tutorial
Image processing tutorialImage processing tutorial
Image processing tutorial
 
/.Amd mnt/lotus/host/home/jaishakthi/presentation/rmeet1/rmeet 1
/.Amd mnt/lotus/host/home/jaishakthi/presentation/rmeet1/rmeet 1/.Amd mnt/lotus/host/home/jaishakthi/presentation/rmeet1/rmeet 1
/.Amd mnt/lotus/host/home/jaishakthi/presentation/rmeet1/rmeet 1
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
 
Digital Image Processing (DIP)
Digital Image Processing (DIP)Digital Image Processing (DIP)
Digital Image Processing (DIP)
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
 
image theory
image theoryimage theory
image theory
 
Shrinkage methods
Shrinkage methodsShrinkage methods
Shrinkage methods
 
Image compression Algorithms
Image compression AlgorithmsImage compression Algorithms
Image compression Algorithms
 
Basic image processing
Basic image processingBasic image processing
Basic image processing
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Introduction to Digital Image Processing
Introduction to Digital Image ProcessingIntroduction to Digital Image Processing
Introduction to Digital Image Processing
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 

Similar to Watermarking

A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICESA BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICEScsandit
 
Face recognition based on curvelets, invariant moments features and SVM
Face recognition based on curvelets, invariant moments features and SVMFace recognition based on curvelets, invariant moments features and SVM
Face recognition based on curvelets, invariant moments features and SVMTELKOMNIKA JOURNAL
 
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESijiert bestjournal
 
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarkingijsrd.com
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyIOSR Journals
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...ijcisjournal
 
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...ijcisjournal
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...ijcisjournal
 
IRJET- Object Detection in Underwater Images using Faster Region based Convol...
IRJET- Object Detection in Underwater Images using Faster Region based Convol...IRJET- Object Detection in Underwater Images using Faster Region based Convol...
IRJET- Object Detection in Underwater Images using Faster Region based Convol...IRJET Journal
 
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...csandit
 
IRJET- Efficient Face Detection from Video Sequences using KNN and PCA
IRJET-  	  Efficient Face Detection from Video Sequences using KNN and PCAIRJET-  	  Efficient Face Detection from Video Sequences using KNN and PCA
IRJET- Efficient Face Detection from Video Sequences using KNN and PCAIRJET Journal
 
Convolution Neural Network Lecture Slides
Convolution Neural Network Lecture SlidesConvolution Neural Network Lecture Slides
Convolution Neural Network Lecture SlidesAdnanHaider234505
 
IRJET - Dehazing of Single Nighttime Haze Image using Superpixel Method
IRJET -  	  Dehazing of Single Nighttime Haze Image using Superpixel MethodIRJET -  	  Dehazing of Single Nighttime Haze Image using Superpixel Method
IRJET - Dehazing of Single Nighttime Haze Image using Superpixel MethodIRJET Journal
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
A130104
A130104A130104
A130104irjes
 

Similar to Watermarking (20)

A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICESA BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
 
Face recognition based on curvelets, invariant moments features and SVM
Face recognition based on curvelets, invariant moments features and SVMFace recognition based on curvelets, invariant moments features and SVM
Face recognition based on curvelets, invariant moments features and SVM
 
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
 
A0360105
A0360105A0360105
A0360105
 
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder Piracy
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
 
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
 
IRJET- Object Detection in Underwater Images using Faster Region based Convol...
IRJET- Object Detection in Underwater Images using Faster Region based Convol...IRJET- Object Detection in Underwater Images using Faster Region based Convol...
IRJET- Object Detection in Underwater Images using Faster Region based Convol...
 
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
 
IRJET- Efficient Face Detection from Video Sequences using KNN and PCA
IRJET-  	  Efficient Face Detection from Video Sequences using KNN and PCAIRJET-  	  Efficient Face Detection from Video Sequences using KNN and PCA
IRJET- Efficient Face Detection from Video Sequences using KNN and PCA
 
1820 1824
1820 18241820 1824
1820 1824
 
1820 1824
1820 18241820 1824
1820 1824
 
Convolution Neural Network Lecture Slides
Convolution Neural Network Lecture SlidesConvolution Neural Network Lecture Slides
Convolution Neural Network Lecture Slides
 
IRJET - Dehazing of Single Nighttime Haze Image using Superpixel Method
IRJET -  	  Dehazing of Single Nighttime Haze Image using Superpixel MethodIRJET -  	  Dehazing of Single Nighttime Haze Image using Superpixel Method
IRJET - Dehazing of Single Nighttime Haze Image using Superpixel Method
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
I0343065072
I0343065072I0343065072
I0343065072
 
A130104
A130104A130104
A130104
 

Recently uploaded

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Watermarking

  • 1. DIGITAL IMAGE WATERMARKING ALGORITHM USING HUMAN VISUAL SYSTEN ANANLYSIS IN DWT PRESENTED BYPRESENTED BY V.SUNDHARARAJV.SUNDHARARAJ M.EM.E ASSISTANT PROFESSOR/ECEASSISTANT PROFESSOR/ECE PAAVAI COLLEGE OF ENGINEERINGPAAVAI COLLEGE OF ENGINEERING
  • 2. 2 OUTLINE • Introduction • DWT (Discrete Wavelet Transformation) • HVS ( Human Visual System ) • Proposed Scheme • Experimental results • Conclusions
  • 3. 3 Introduction • The digital watermarking techniques can be classified into two categories: – Spatial domain • Less complex • Not more robust – Frequency domain • Complex • More robust
  • 4. INTRODUCTION Watermark embedding: A digital watermark is a piece of information embedded into a digital image using Human visual system technique . WATERMARKING DETECTION: Information can be recovered from the watermarked image.
  • 5. EXISTING METHOD ORIGINAL IMAGE SECRET IMAGE EMBED DING EMBED DING WATERMA RKED IMAGE WATERMA RKED IMAGE Embedding in this context means to add the information directly into the image data in such a way that it is not easily removed. Less complex Not more robust
  • 7. 7 DWT (Discrete Wavelet Transformation)1/2 LL1 HL1 LH1 HH1 Original image LL2 HL2 LH2 HH2 DWT 1-level DWT 2-levels A B C D A+B C+D A-B C-D L H A C B D L H A+B C+D C-DA-B LL HL LH HH
  • 8. 8 DWT (Discrete Wavelet Transformation)2/2 DWT 2-levels LH1LH1 HH1HH1 HL1HL1 LL2LL2 HL2HL2 LH2LH2 HH2HH2
  • 9. 9 HVS ( Human Visual System ) • The human eye is less sensitive to noise in – High frequency sub-bands – Brightness is high or low – Textured area and more near the edges
  • 10. Watermark embedding algorithm )(i,j)x(m,nαw(i,j)I(i,j)I' θ l θ l θ l += Example: 206 50*1.2*0.1200 1112*0.11212 0 2 0 2 0 2 = += += ),)x(,(w),(I),(I' Step 1: Step 2: IDWT
  • 11. Watermark detection algorithm • Watermark images is recovered following the expression, (i,j)αw (i,j)(i,j)-II' x'(m,n) θ l θ l θ l= Example: 50 1.2*0.1 200206 == - x'(m,n) Step 2: IDWT Step 1:
  • 12. 12 Conclusions • The proposed scheme is based on HVS(Human Visual system) characteristics. • The proposed scheme has better performance in terms of robustness.
  • 13. CONFERENCE [1]. V.sundhararaj , ”image watermarking using human visual system scheme in wavelet domain”, 2011,GOVERNMENT COLLEGE OF TECHNOLOGY,COIMBATORE. [2]. V.sundhararaj ,” image watermarking detector using Gauss hermite expansion in wavelet domain human visual system”, 2011,ANNA UNIVERSITY OF TECHNOLOGY,COIMBATORE. [3]. V.sundhararaj ,”watermarking detector using HVS analysis in wavelet domain human visual system”, 2012,jayalaksmi college Engg &tech. [4]. V.sundhararaj ,” image fusion detection in satellite image”, 2013,ncret, Gujrat.
  • 14. REFERENCE [1]. Yaohui Dai,Chunxian wang, “ Digital watermarking Algorithm based on wavelet transform”, Control, Automation Systems Engineering (case), 2011 International Conference on IEEE. [2] M. M. Rahman, M. O. Ahmad, and M. N. S. Swamy, “Statistical detector for wavelet-based image watermarking using modified GH PDF,” in Proc. IEEE Int. Symp. Circuits and Systems, Seattle, WA, 2008, pp. 712–715. [3]. M. Mahbubur Rahman, M. Omair Ahmad, AUGUST 2009 “A New Statistical Detector for DWT-Based Additive Image Watermarking Using the Gauss Hermite Expansion”IEEE TRANSACTIONS ON IMAGE PROCESSING VOL. 18, NO. 8, AUGUST 2009.
  • 15. 15 Watermark embedding algorithm(1/3) x0 3 x0 0 x0 2 x0 1 Image Watermark LL HL LH HH DWT 4-levels DWT 1-levels Step 1: Θ=0 Θ=1Θ=2 Θ=3 θ lI : The sub-band (θ) at resolution level (l) of image.
  • 16. 16 Watermark embedding algorithm(2/3) • Find the Weight factors for wavelet- coefficient. (Barni et al.,2001) (i,j)Wθ l )(p*GT θ lI θ l S= LL2 HL2 LH2 HH2 0.21 0.1 0.12 1.13 0.25 0.36 0.37 1.38 1.40 1.2 1.3 1.4 1.6 1.7 2.1 2.3 Example: 1.21650%ST0 2 == )*( 0.1, 0.12, 0.21, 0.25, 0.36, 0.37, 1.13, 1.2, 1.3, 1.38, 1.4,1.41, 1.6, 1.7, 2.1, 2.3 Step 2:
  • 17. 17 Watermark embedding algorithm(3/3) )(i,j)x(m,nαw(i,j)I(i,j)I' θ l θ l θ l += Example: 206 50*1.2*0.1200 1112*0.11212 0 2 0 2 0 2 = += += ),)x(,(w),(I),(I' Step 3: Step 4: IDWT
  • 18. 18 Watermark extracting algorithm • Both the original and the watermark images are needed. (i,j)αw (i,j)(i,j)-II' x'(m,n) θ l θ l θ l= Example: 50 1.2*0.1 200206 == - x'(m,n) Step 2: IDWT Step 1:
  • 19. 19 Experimental results (1/3) (a) Lena 512*512 (b) Watermark 64*64 (C) Watermarked Lena PSNR=44.7 dB
  • 20. 20 Experimental results (2/3) (a) 64 times compressed watermarked Lena (b) Extracted Watermark (d) Extracted Watermark (c) 1.37% remained watermarked Lena after cropping
  • 21. 21 Experimental results (3/3) (b) Extracted Watermark (a) Warped watermarked Lena
  • 22. 22 Weight factor (1/4) 63 34 49 10 31 23 14 -13 15 14 3 -12 -9 -7 -14 8 0 0 1 1 0 1 10 LL3 HL3 LH3 HH3 i j 10(0,1)I,63(0,0)I 0 3 3 3 == Example:
  • 23. 23 Weight factor (2/4) 0.10.1*1(3,3) ==Θ 2 ),,(),,(),( ),( 2.0 jiljill jiwl Ξ⋅Λ⋅Θ = θθ               = = = = ⋅        = =Θ 3if,10.0 2if,16.0 1if,32.0 0if,00.1 otherwise,1 1if,2 ),( l l l l l θ θ The human eye is less sensitive to noise in high frequency sub-bands: Example: 2 (3,0,0)(3,0,0)(3,3) (0,0)W 0.2 3 3 Ξ⋅Λ⋅Θ =
  • 24. 24 Weight factor (3/4) ) j , i (I L(l,i,j)Λ(l,i,j) ll             += += −− 33 3 3 22256 1 1 1   <    = otherwise, 50)if,1 .L(l,i,j L(l,i,j) -L(l,i,j) L'(l,i,j) The eye is less sensitive to noise in the those areas of the image where brightness is high or low. Example: 1.75 0.751 0.251 256 64 1 2 0 2 0 256 1 1 0031003 00 3 3 = += += +=             += += ),(I ),,L(),,Λ(
  • 25. 25 Weight factor (4/4) 10 1033 3 3 3 0 2 0 1 0 21 0 22 Var 2216 1 ,y ,xll l k x y kklkk j x, i yI j x, i yI )j,i,l( = =−− − = =θ = = θ +               ++⋅               ++ =Ξ ∑ ∑∑∑ 717164 228.6875(56) 228.68758)14-12-37-9-141513-1410(49003 2 2 = ⋅= ⋅++++++=Ξ ),,( The is less sensitive to noise in highly texture areas but,The is less sensitive to noise in highly texture areas but, among these, more sensitive near the edges.among these, more sensitive near the edges. 1.3 2 (14.83)1.750.1 2 (717164)1.750.1 (0,0)W 0.2 3 3 = ⋅⋅ = ⋅⋅ = Example: