A Novel DWT-CT Approach in Digital Watermarking Using PSO: Sachin Gupta Priyanka Mitra
A Novel DWT-CT Approach in Digital Watermarking Using PSO: Sachin Gupta Priyanka Mitra
A Novel DWT-CT Approach in Digital Watermarking Using PSO: Sachin Gupta Priyanka Mitra
Abstract---The importance of watermarking is dramatically enhanced due to the promising technologies like Internet of Things (IoT), Data
analysis, and automation of identification in many sectors. Due to these reasons, systems are inter-connected through networking and internet
and huge amounts of information is generated, distributed and transmitted over the World Wide Web. Thus authentication of the information is a
challenging task. The algorithm developed for the watermarking needs to be robust against various attack such as salt & peppers, filtering,
compression and cropping etc. This paper focuses on the robustness of the algorithm by using a hybrid approach of two transforms such as
Contourlet, Discrete Wavelet Transform (DWT). Also, the Particle Swarm Optimization (PSO) is used to optimize the embedding strength
factor. The proposed digital watermarking algorithm has been tested against common types of image attacks. Experiment results for the
proposed algorithm gives better performance by using similarity metrics such as NCC (Normalized Cross Correlation value) and PSNR (Peak
Signal to Noise Ratio).
Keywords—watermarking, particle swarm optimization, discrete wavelet transfrom, contourlet transformation, PSNR, NCC.
__________________________________________________*****_________________________________________________
V. EXPERIMENTAL RESULTS
In order to easily compare with other watermarking
techniques in the literature, a standard 256 x 256 grey scale
Lena image is used as the host image. The watermark image is
made from a binary loge image of size 128 x 128 pixels. In
contourlet decomposition, both LP decomposition and DFB
decomposition with „pkva‟ filters is used. The first two
pyramidal levels are chosen and the number of directional sub
bands for each level is set to 2, 4 and 8. In wavelet
decomposition, „haar‟ filters are used because of their high
efficiency. Testing the robustness is done by applying a
number of different attacks which are JPEG, median filtering,
average filtering, salt & pepper noise, cropping, image
sharpening, and histogram equalization.
II. Watermark Extraction Unit
Watermark extraction process deals with the retrieval of
the watermark in the presence of the original image. The Types of Lena Image
objective of the watermark extraction algorithm is to obtain attacks Watermarked Image Extracted Logo
the reliable an estimate of the original watermark from the
watermarked image. The extraction process is opposite of the
watermark embedding process. Fig. 4 shows the block Cropping
diagram of the watermark extraction algorithm.
JPEG
Sharpening
Rotation
139
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 12 137 – 141
_______________________________________________________________________________________________
Average
Filtering
Median
Filtering
Gaussian
Figure 7 Comparison of NCC values without attacks
Table II PSNR Parameter values with attacks
Types of Attacks Existing Proposed
Salt & Method[16] Method
Pepper Salt and Pepper Noise 24.868 34.3960
Gaussian Noise 19.491 40.0398
Median Filtering 28.853 33.2168
Averaging Filtering 28.229 30.9815
Figure 5. Several attacks on “Lena” image and their
Sharpening 25.434 34.5457
corresponding extracted watermarks
JPEG Compression (50%) 26.579 35.1935
VI. COMPARISON RESULT JPEG Compression (70%) 33.051 39.3148
Here the results of the proposed method are compared with
Sonam et al. [16] method for Lena image. As it is shown in
the table, when the image has been corrupted by JPEG
compression, the proposed method provides more robust
watermark extraction when the quality factor is low. The
proposed method shows that the image remains imperceptible
(because PSNR> 30 dB) while the watermark survives from
attacks. The comparison is given in the table below:
140
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 12 137 – 141
_______________________________________________________________________________________________
[11] C.I. Podilchuk, W.J. Zeng, "Image-adaptive watermarking using
visual models", IEEE Trans. on Selected Areas in
Communications, vol. 16, pp. 525–539, 1998.
[12] J. Kennedy, R.C. Eberhart, “Particle Swarm Optimization”, in
Proceedings of the IEEE International Conference of Neural
Networks (Perth, Australia), IEEE Service Center, Piscataway,
NJ, 1995, pp. 1942-1948.
[13] Hai Tao, JasniMohamad Zain, “A wavelet-based particle swarm
optimization algorithm for digital image watermarking”,
Integrated Computer-Aided Engineering 19 (2012) 81–91.
[14] J. George, S. Varma and M. Chatterjee, "Color image
watermarking using DWT-SVD and Arnold transform," Annual
IEEE India Conference (INDICON), 2014, pp. 1-6
[15] Tao Liu,” A kind of DWT Domain Image Digital Watermarking
Algorithm Research” China Advanced Materials Research Vols.
Figure 9 Comparison of NCC values after attacks 1044-1045 2014 pp 991-994.
[16] Sonam Tyagi, Harsh Vikram Singh, Raghav
Agarwal,”Image watermarking using genetic algorithm in DCT
VII. CONCLUSION domain” IEEE International Conference on Inventive Systems
In this paper, PSO based DWT-CT domain watermarking and Control (ICISC) Year: 2017 Pages: 1 - 6
algorithm has been proposed. Numerous tests were done on
watermarked image. The quality of watermarked image is
good in terms of perceptibility and the proposed method is
shown to be robust to all attacks which are performed.
Compared to results reported at [16], proposed method gives
improved NCC and show superiority over existing methods.
Further work on the proposed approach is in progress to
optimize parameters by using hybrid optimization
technique.Further work can be extended to implement the
algorithm on other formats of document rather than text.
REFRENCES
[1] F. Hartung, and M. Kutter, “Multimedia Watermarking
Techniques”, Proceedings of the IEEE, Special Issue on
Identification and Protection of Multimedia Information 87, pp
1079-1107, July 1999.
[2] V. M. Potdar, S. Han, and E. Chang, “A Survey of Digital Image
Watermarking Techniques”, 3rd International Conference on
Industrial Informatics, 2005
[3] F. Hartung, J.K. Su, and B. Girod, “Spread Spectrum
Watermarking: Malicious Attacks and Counter-Attacks,” Proc.
of SPIE Vol. 3657: Security and Watermarking of Multimedia
Contents, San Jose, CA, USA, Jan. 1999
[4] Macq B.M., Quisquater J.J., “Cryptology for digital TV
broadcasting”, Proceedings of IEEE, ISSN: 0018-9219, vol. 83,
pp. 944-957, June 1995.
[5] Ruanaidh J. J. K. O., Dowling W. J., Borland F. M., (1996),
"Phase watermarking of digital images," in Proc. IEEE Int.
Conf: Image Processing, pp. 239-242, Sept. 16-19.
[6] Zhao, J., and Koch, E. (1995, August) “Embedding robust labels
into images for copyright protection” Proceeding of the
International Congress on Intellectual Property Rights for
Specialized Information, Knowledge and New Technologies,
Vienna, pp. 1–10
[7] M. Barni, F. Bartolini, A. Piva, "Improved wavelet-based
watermarking through pixel-wise masking", Image Process.
IEEE Trans. Image Process. 10 (5), 2001, pp. 783–791.
[8] M. N. Do and M. Vetterli, “The contourlet transform: An efficient
directional multiresolution image representation,” IEEE Trans.
on Image Processing, vol. 14, No. 12, pp. 2091–2106, December
2005.
[9] P. J. Burt and E. H. Adelson. The laplacian pyramid as a compact
image codes. IEEE Trans. on Communications, 31:532– 540,
Apr. 1983
[10] R. H. Bamberger and M. J. T. Smith, “A filter bank for the
directional decomposition of images: Theory and design,” IEEE
Trans. on Signal Processing 40, pp. 882–893, April 1992.
141
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________