SlideShare a Scribd company logo
1 of 24
Abstract
To solve the sensitive problem of signal processing and geometric
distortion of digital image watermarking, an image watermarking
algorithm against geometric attacks was proposed in the paper.
After decomposing the whole image with 3 level of discrete wavelet
transform and transforming the watermark image by Arnold
shuffling, embed the watermark data to the media frequency
coefficients of wavelet domain according to the conceal quality of
Human Visual System (HVS); and extract two invariant centroids as
factors to correcting geometric transformation by using the
theories of invariant centroid, the watermarked image could be
corrected. The experimental results show that the algorithm is
robust to general signal processing and geometric attack such as
rotation, scaling and translation.
Secure Part              In Secure Part         In Secure Part
                                                                                      Result
                       Embedding              Attacking              Detecting
Signals
                       Function E            Function A          Retrieval Function
   S




   General digital watermark life-cycle phases with embedding-, attacking-, and
   detection and retrieval functions
• The transformation for a square digital image is
(1) Use Haar wavelet, the images A be done 3 level discrete wavelet
transform, to produce LL3, HL3, LH3, HH3 and so on ten sub-band.
(2) Use ascending order for the intermediate region HL3, LH3 of
image, get the sequence C, and note the location corresponding to
order
 (3) Arnold scrambling the watermark information, then obtain
scrambling watermark information W.
(4) Using the multiplicative rule, large absolute value coefficient
with C embed , then get the watermark information W.
c′ i = ci(1 + alpha*wi)
where the size of determines the intensity of the image frequency
modified by the watermark signal.
(5) According to corresponding sequence in step (2), the modified
media frequency sequence c′
i is assigned to corresponding location of original intermediate
frequency regions HL3, LH3.

(6) Use the modified wavelet coefficients in step (5) by discrete
inverse wavelet transform to get image embedded with the
watermark information.

(7) Extract the two invariant centroid points tm, tn of the images
embedded watermark information, and obtain the coordinates and
corresponding radius r1, r2 of the two points as geometric
distortion correction key for watermark detection.
(1) Use the methods described before as well as the key of geometric distortion of the
watermark image rotation, scaling, translation correction.

(2) Use DWT for watermarking image A∗ with geometric distortion correction to get LL3, HL3,
LH3, HH3 and so on ten sub-bands.

(3) According to the corresponding position sequence and the embedded watermark
sequence size, a embedding position of intermediate frequency regions HL3, LH3 in
watermark
image is determined, and embedded watermark sequence c′ i is obtained.

(4) Use the Eq. (4), to get scrambling watermark information W′.
W′
i = (c′ /ci − 1)/alpha

(5) Use the saved Arnold scrambling key to do periodic transformation for W′, then get the
extracted watermark image W∗.
• Extraction of the Invariant Centroid
• Parameter Correction of Geometric Distortion
• Image Rotation Correction Algorithm
• Image Scaling Correction Algorithm
• Image Translation Correction Algorithm
Wavelet
    Host Image                            LL3,LH3,HL3
                            transform



Another strategy use only high value       Use LL3 but
coefficients to hide your coefficients    low energy or
                                         LH3 and/or HL3
                                            for higher
                                              energy
Another strategy use additive way or
multiplicative way
Wavelet              Wavelet           Wavelet
   Host Image                                          transform
                transform            transform


                                Watermark
                                 Image                LL3,LH3,HL3
                                                      Use LL3 but
                                  Arnold               low energy
                                scrambling




Watermarked          Wavelet
                                                 +*
   Image          inverse 3 levels
Wavelet              Wavelet           Wavelet
   Host Image                                          transform
                transform            transform


                                Watermark
                                 Image
                                                      LL3,LH3,HL3
                                                        Use HL3
                                  Arnold
                                scrambling




Watermarked          Wavelet
                                                 +*
   Image          inverse 3 levels
ans = Correlation between watermark and
recovered watermark
  0.1215
Wavelet               Wavelet           Wavelet
   Host Image                                              transform
                   transform             transform


                                    Watermark
                                     Image
                                                          LL3,LH3,HL3
                                                            Use HL3
                Secret Key        RC4 Encryption




Watermarked              Wavelet
                                                     +*
   Image              inverse 3 levels
Wavelet              Wavelet           Wavelet
   Host Image                                          transform
                transform            transform


                                Watermark
                                 Image
                                                      LL3,LH3,HL3
                                                        Use HL3
                               Permutation




Watermarked          Wavelet
                                                 +*
   Image          inverse 3 levels
Wavelet                  Wavelet           Wavelet
   Host Image                                                     transform
                       transform                transform


                                           Watermark
                                            Image
                                                                 LL3,LH3,HL3
                                                                   Use HL3
                Secret key                      XOR




Watermarked                     Wavelet
                                                            +*
   Image                     inverse 3 levels
Wavelet            Wavelet              Wavelet        Wavelet
Host Image
                  transform          transform            transform      transform


                                               Watermark
                                                Image                 LL4,LH4,HL4
                                                                       Use HL4 or
                                                                        LH4 or LL
                    Secret key                      XOR




    Watermarked                     Wavelet
                                                                 +*
       Image                     inverse 3 levels
Wavelet              Wavelet           Wavelet
   Host Image                                          transform
                transform            transform



                                 Pseudo
                                 random               LL3,LH3,HL3
                               generator or             Use HL3
                                   LFSR




Watermarked          Wavelet
                                                 +*
   Image          inverse 3 levels
Wavelet               Wavelet           Wavelet
   Host Image                                            transform
                 transform             transform



   Host
 Watermark      Watermarked                             LL3,LH3,HL3
                 Watermark                                Use HL3
                                    Arnold
Watermark #2                      Scrambling




Watermarked            Wavelet
                                                   +*
   Image            inverse 3 levels

More Related Content

What's hot

THE TELEVISION SYSTEM IN INDIA
THE TELEVISION SYSTEM IN INDIATHE TELEVISION SYSTEM IN INDIA
THE TELEVISION SYSTEM IN INDIAIshank Ranjan
 
Performance Requirement and Lessons Learnt of LTE Terminal_Transmitter Part
Performance Requirement and Lessons Learnt of LTE Terminal_Transmitter PartPerformance Requirement and Lessons Learnt of LTE Terminal_Transmitter Part
Performance Requirement and Lessons Learnt of LTE Terminal_Transmitter Partcriterion123
 
10 manières de récupérer des lnb
10 manières de récupérer des lnb10 manières de récupérer des lnb
10 manières de récupérer des lnbstartimes&&mzouri
 
Short notes about "Multi-user Radio Communications" part 3
Short notes about "Multi-user Radio Communications" part 3Short notes about "Multi-user Radio Communications" part 3
Short notes about "Multi-user Radio Communications" part 3mohamedmohyshaheen
 
Sensitivity or selectivity - How does eLNA impact the receriver performance
Sensitivity or selectivity  - How does eLNA impact the receriver performanceSensitivity or selectivity  - How does eLNA impact the receriver performance
Sensitivity or selectivity - How does eLNA impact the receriver performancecriterion123
 
Ppt on continuous phase modulation
Ppt on continuous phase modulationPpt on continuous phase modulation
Ppt on continuous phase modulationHai Venkat
 

What's hot (9)

Colout TV Fundamentals
Colout TV FundamentalsColout TV Fundamentals
Colout TV Fundamentals
 
THE TELEVISION SYSTEM IN INDIA
THE TELEVISION SYSTEM IN INDIATHE TELEVISION SYSTEM IN INDIA
THE TELEVISION SYSTEM IN INDIA
 
Performance Requirement and Lessons Learnt of LTE Terminal_Transmitter Part
Performance Requirement and Lessons Learnt of LTE Terminal_Transmitter PartPerformance Requirement and Lessons Learnt of LTE Terminal_Transmitter Part
Performance Requirement and Lessons Learnt of LTE Terminal_Transmitter Part
 
10 manières de récupérer des lnb
10 manières de récupérer des lnb10 manières de récupérer des lnb
10 manières de récupérer des lnb
 
Short notes about "Multi-user Radio Communications" part 3
Short notes about "Multi-user Radio Communications" part 3Short notes about "Multi-user Radio Communications" part 3
Short notes about "Multi-user Radio Communications" part 3
 
Sensitivity or selectivity - How does eLNA impact the receriver performance
Sensitivity or selectivity  - How does eLNA impact the receriver performanceSensitivity or selectivity  - How does eLNA impact the receriver performance
Sensitivity or selectivity - How does eLNA impact the receriver performance
 
Ppt on continuous phase modulation
Ppt on continuous phase modulationPpt on continuous phase modulation
Ppt on continuous phase modulation
 
Dsb lc,sc
Dsb lc,scDsb lc,sc
Dsb lc,sc
 
Filter dengan-op-amp
Filter dengan-op-ampFilter dengan-op-amp
Filter dengan-op-amp
 

More from Amr Nasr

Comparison of image fusion methods
Comparison of image fusion methodsComparison of image fusion methods
Comparison of image fusion methodsAmr Nasr
 
6 big google buys of 2012
6 big google buys of 20126 big google buys of 2012
6 big google buys of 2012Amr Nasr
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarkingAmr Nasr
 
Scaling compression2
Scaling compression2Scaling compression2
Scaling compression2Amr Nasr
 
Compression one example
Compression one exampleCompression one example
Compression one exampleAmr Nasr
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarkingAmr Nasr
 
Whitebalance
WhitebalanceWhitebalance
WhitebalanceAmr Nasr
 
Wavelet watermark level3
Wavelet watermark level3Wavelet watermark level3
Wavelet watermark level3Amr Nasr
 
Wavelet watermark level2
Wavelet watermark level2Wavelet watermark level2
Wavelet watermark level2Amr Nasr
 
Two dimensional true wavelet compression
Two dimensional true wavelet compressionTwo dimensional true wavelet compression
Two dimensional true wavelet compressionAmr Nasr
 
Image dct shifting
Image dct shiftingImage dct shifting
Image dct shiftingAmr Nasr
 
Tcp snoop protocols
Tcp snoop protocols  Tcp snoop protocols
Tcp snoop protocols Amr Nasr
 
Digital forensics lessons
Digital forensics lessons   Digital forensics lessons
Digital forensics lessons Amr Nasr
 

More from Amr Nasr (16)

Comparison of image fusion methods
Comparison of image fusion methodsComparison of image fusion methods
Comparison of image fusion methods
 
6 big google buys of 2012
6 big google buys of 20126 big google buys of 2012
6 big google buys of 2012
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
Scaling compression2
Scaling compression2Scaling compression2
Scaling compression2
 
Compression one example
Compression one exampleCompression one example
Compression one example
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
Whitebalance
WhitebalanceWhitebalance
Whitebalance
 
Wavelet
WaveletWavelet
Wavelet
 
Wavelet watermark level3
Wavelet watermark level3Wavelet watermark level3
Wavelet watermark level3
 
Wavelet watermark level2
Wavelet watermark level2Wavelet watermark level2
Wavelet watermark level2
 
Two dimensional true wavelet compression
Two dimensional true wavelet compressionTwo dimensional true wavelet compression
Two dimensional true wavelet compression
 
Image fft
Image fftImage fft
Image fft
 
Image dct shifting
Image dct shiftingImage dct shifting
Image dct shifting
 
Tcp snoop protocols
Tcp snoop protocols  Tcp snoop protocols
Tcp snoop protocols
 
Digital forensics lessons
Digital forensics lessons   Digital forensics lessons
Digital forensics lessons
 
Crypt
CryptCrypt
Crypt
 

Watermark

  • 1.
  • 2. Abstract To solve the sensitive problem of signal processing and geometric distortion of digital image watermarking, an image watermarking algorithm against geometric attacks was proposed in the paper. After decomposing the whole image with 3 level of discrete wavelet transform and transforming the watermark image by Arnold shuffling, embed the watermark data to the media frequency coefficients of wavelet domain according to the conceal quality of Human Visual System (HVS); and extract two invariant centroids as factors to correcting geometric transformation by using the theories of invariant centroid, the watermarked image could be corrected. The experimental results show that the algorithm is robust to general signal processing and geometric attack such as rotation, scaling and translation.
  • 3. Secure Part In Secure Part In Secure Part Result Embedding Attacking Detecting Signals Function E Function A Retrieval Function S General digital watermark life-cycle phases with embedding-, attacking-, and detection and retrieval functions
  • 4. • The transformation for a square digital image is
  • 5.
  • 6. (1) Use Haar wavelet, the images A be done 3 level discrete wavelet transform, to produce LL3, HL3, LH3, HH3 and so on ten sub-band. (2) Use ascending order for the intermediate region HL3, LH3 of image, get the sequence C, and note the location corresponding to order (3) Arnold scrambling the watermark information, then obtain scrambling watermark information W. (4) Using the multiplicative rule, large absolute value coefficient with C embed , then get the watermark information W. c′ i = ci(1 + alpha*wi) where the size of determines the intensity of the image frequency modified by the watermark signal.
  • 7. (5) According to corresponding sequence in step (2), the modified media frequency sequence c′ i is assigned to corresponding location of original intermediate frequency regions HL3, LH3. (6) Use the modified wavelet coefficients in step (5) by discrete inverse wavelet transform to get image embedded with the watermark information. (7) Extract the two invariant centroid points tm, tn of the images embedded watermark information, and obtain the coordinates and corresponding radius r1, r2 of the two points as geometric distortion correction key for watermark detection.
  • 8. (1) Use the methods described before as well as the key of geometric distortion of the watermark image rotation, scaling, translation correction. (2) Use DWT for watermarking image A∗ with geometric distortion correction to get LL3, HL3, LH3, HH3 and so on ten sub-bands. (3) According to the corresponding position sequence and the embedded watermark sequence size, a embedding position of intermediate frequency regions HL3, LH3 in watermark image is determined, and embedded watermark sequence c′ i is obtained. (4) Use the Eq. (4), to get scrambling watermark information W′. W′ i = (c′ /ci − 1)/alpha (5) Use the saved Arnold scrambling key to do periodic transformation for W′, then get the extracted watermark image W∗.
  • 9. • Extraction of the Invariant Centroid • Parameter Correction of Geometric Distortion • Image Rotation Correction Algorithm • Image Scaling Correction Algorithm • Image Translation Correction Algorithm
  • 10. Wavelet Host Image LL3,LH3,HL3 transform Another strategy use only high value Use LL3 but coefficients to hide your coefficients low energy or LH3 and/or HL3 for higher energy Another strategy use additive way or multiplicative way
  • 11. Wavelet Wavelet Wavelet Host Image transform transform transform Watermark Image LL3,LH3,HL3 Use LL3 but Arnold low energy scrambling Watermarked Wavelet +* Image inverse 3 levels
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Wavelet Wavelet Wavelet Host Image transform transform transform Watermark Image LL3,LH3,HL3 Use HL3 Arnold scrambling Watermarked Wavelet +* Image inverse 3 levels
  • 17.
  • 18. ans = Correlation between watermark and recovered watermark 0.1215
  • 19. Wavelet Wavelet Wavelet Host Image transform transform transform Watermark Image LL3,LH3,HL3 Use HL3 Secret Key RC4 Encryption Watermarked Wavelet +* Image inverse 3 levels
  • 20. Wavelet Wavelet Wavelet Host Image transform transform transform Watermark Image LL3,LH3,HL3 Use HL3 Permutation Watermarked Wavelet +* Image inverse 3 levels
  • 21. Wavelet Wavelet Wavelet Host Image transform transform transform Watermark Image LL3,LH3,HL3 Use HL3 Secret key XOR Watermarked Wavelet +* Image inverse 3 levels
  • 22. Wavelet Wavelet Wavelet Wavelet Host Image transform transform transform transform Watermark Image LL4,LH4,HL4 Use HL4 or LH4 or LL Secret key XOR Watermarked Wavelet +* Image inverse 3 levels
  • 23. Wavelet Wavelet Wavelet Host Image transform transform transform Pseudo random LL3,LH3,HL3 generator or Use HL3 LFSR Watermarked Wavelet +* Image inverse 3 levels
  • 24. Wavelet Wavelet Wavelet Host Image transform transform transform Host Watermark Watermarked LL3,LH3,HL3 Watermark Use HL3 Arnold Watermark #2 Scrambling Watermarked Wavelet +* Image inverse 3 levels