SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 3, Ver. I (May-Jun. 2016), PP 58-64
www.iosrjournals.org
DOI: 10.9790/0661-1803015864 www.iosrjournals.org 58 | Page
An Improved Non-Blind Digital Image Watermarking on Hadamard
Transform for Image Authentication
Sanjida Sharmin1
, Rahima Afrose2,
Lutfur Nahar3
, Nargis Akter4
1
Chittagong University of Engineering and Technology, Bangladesh
2
International Islamic University Chittagong, Bangladesh
3
Chittagong University, Bangladesh
4
International Islamic University Chittagong, Bangladesh
Abstract : With the advent of internet digital media has been improving with massive advancement in recent years. The distribution of
unauthorized copies of media content has also been increasing day by day. Because of easy access to digital content, online purchasing and
distribution becomes easier. Thus there is an urgent need to provide protection for digital content. One solution gaining popularity in
protecting digital content is digital watermarking. In proposed scheme, a breadth-first search technique is used to find the efficient
embedding point to embed the watermark. The proposed algorithm results show that the experiment offers better image quality and
robustness under various attacks and alteration, such a, cropping, JPEG compression sharpening and filtering among others. The results
have manifested the higher robustness and imperceptibility of this scheme when compared with other available watermarking techniques.
Keywords - Digital watermarking, Hadamard Transform, Breadth-first search technique
I. INTRODUCTION
Digital watermarking is the technique of hiding a message related to a digital signal (i.e. an image, song and video) within the signal
itself, which may be used to verify its authenticity or the identity of its owners. . The concept of watermarking closely related to
steganography, in that those both hide a message inside a digital signal .Watermarking can be classified in different ways. In terms of the
need of original image in watermark extraction process, watermarking techniques are classified as either blind or non-blind. The original
image is needed when detecting the watermark in a non-blind technique whereas a blind watermarking technique does no need the original
image for extraction or detection. Our proposed method follows the non-blind watermarking technique. According to application,
watermarks are sub-divided into semi-fragile, fragile, and robust. Fragile watermarks are very sensitive. They can be destroyed easily with
slight alteration in the watermarked signal. Semi-fragile watermarking are also broken if the modifications to the watermarked signal exceed
a user pre-defined threshold. If the value of threshold is set to zero then it operates as a fragile watermark. On the other hand, a robust
watermark withstands against various malicious attacks, such as scaling, rotation, filtering and compression. Our method manifests the
robustness of watermarking.
Previous researchers like Ho et al. proposed a frequency domain watermarking system for digital image using the Fast Hadamard
Transform [1]. Saryazdi and Nezamabadi-pour developed a new blind gray-level watermarking scheme in which the host image is first
divided into 4×4 non-overlapping blocks [2]. For each block, two first AC coefficients of its Hadamard transform are then estimated using
DC coefficients of its neighbor blocks. Deb et al. proposed a combined DWT and DCT-based watermarking technique with low frequency
watermarking with weighted correction [3]. Al-Haj described an imperceptible and robust combined DWT-DCT digital image watermarking
algorithm for copyright protection [4]. Husain presented a survey of various digital watermarking techniques for multimedia data such as
text, audio, image and video for copyright protection [5].Rui-mei et al. proposed a blind watermarking algorithm based on DCT for digital
image in which a two-bit image is embedded in an eight-bit gray image [6]. Kountchev et al. proposed a new method where a still digital
image is transformed using the complex Hadamard transform [7]. Lee et al. proposed a survey of watermarking systems that are applied to
multimedia [8]. Sathik and Sujatha described a watermark construction process where a scrambled version of the watermark is obtained with
the help of the Arnold transform [9].
In this paper, we propose a robust digital image watermarking method based on Hadamard Transform. The mean reason to use this
method is its simplicity, also it offers significant advantages (less processing time and better hardware implementation) compared to most
orthogonal transform techniques, such as DWT and DCT.
The rest of the paper is organized as follows. In Section II, we have introduced the Hadamard transform. Section III describes the
selection of positive Hadamard Coefficient and labeling Section IV describes our proposed method of watermarking system including the
watermark embedding process and the watermark extraction process. Section V represents our experimental results and analysis finally,
Section VI concludes this paper.
II. HADAMARD TRANSFORM
The Hadamard transformation is also known as the Walsh–Hadamard transformation, Hadamard–Rademacher–Walsh
transformation, Walsh transformation, or Walsh–Fourier transformation. It is an example of a generalized class of Fourier transforms .The
2D-Hadamard transform has been used extensively in image processing and image compression [1]
Let [U] represents the original image and [V] the transformed image, the 2D-Hadamard transform is given by:
M
HUH
V mm ][
][  (1)
Where mH represents an N×N Hadamard matrix, N=2n, n=1,2,3…… with element values either +1 or –1.
The advantages of Hadamard transform are that the elements of the transform matrix mH are simple: they are binary, real numbers and
the rows or columns of mH are orthogonal. The inverse 2D-Hadamard transform (IHT) is given as:
M
HVH
HVHU mm
mm
][
][][ *1
 
(2)
An Improved Non-Blind Digital Image Watermarking on Hadamard Transform for Image Authentication
DOI: 10.9790/0661-1803015864 www.iosrjournals.org 59 | Page
In our algorithm, the transform process is carried out based on the 8×8 sub-blocks of the whole image. the third order Hadamard
transform matrix mH is used.


































11111111
11111111
11111111
11111111
11111111
11111111
11111111
11111111
H
(3)
III. SELECTION OF POSITIVE HADAMARD COEFFICIENT AND LABELING
Breadth First search is an extremely very useful searching technique. It differs from the depth-first search in that it uses a queue to
perform the search, so the order in which the nodes are visited is quite different. It has the extremely useful property that if all of the edges
in a graph are unweighted or the same weight then the first time a node is visited is the shortest path to that node from the source node. It is a
way to find all the vertices reachable from the given source vertex. Like depth first search, Breadth First search traverse a connected
component of a given graph and defines a spanning tree.
In our implementation use an order for BFS searching. The order is given following. Here, C is centre point or main point. 1, 2, 3, 4,
5, 6, 7, 8 is order of the BFS algorithm searching. Fig 1. Shows the order of searching the node.
Figure 1. Order of searching
Now we apply BFS algorithm on the Hadamard co-efficient and finding positive connecting component. Then generate spanning tree
from the Hadamard co-efficient. After applying breadth first search algorithm we get spanning tree of the co-efficient and also label of the
spanning tree. Here, we using labeling technique we can count the number of trees. It will also help to find watermark embed point.
Figure 2. Labeling the Hadamard co-efficient. Figure 3. Mark the prime number for not embedding
By using BFS algorithm we get a matrix which represents the position of the Hadamard co-efficient, which is called visit matrix. The visit
matrix is mainly use for watermark extraction process. Fig 2. Shows the labeling of the positive Hadamard Co-efficient. After that we will
select the non prime block for embedding. Here block having Prime numbers are those Like as 2, 3, 5, 7, 11, 13 ……so on and non-prime
numbers are 4, 6, 8, 9, 10, 12, 14, 15…………… so on. Fig 3. Shows the prime number in each block. Prime number block are avoided here because
after transformation if most of the value of prime block became totally zero then it is impossible for us to embed. It is not possible to select all point for
watermarking. Because select all point of Hadamard Co-efficient may occur huge distortions of the watermarked image. That why we select the non prime
block. In our embedded process we select only on 1st
column. Because the rate of distortion of the watermarked image is very high in row wise because of
matrix manipulation. Now in 1st
column we will embed in two points 111.5 and 110.8 shown in figure fig 4.
Figure 4. Detection of Watermark Point
An Improved Non-Blind Digital Image Watermarking on Hadamard Transform for Image Authentication
DOI: 10.9790/0661-1803015864 www.iosrjournals.org 60 | Page
IV. PROPOSED METHOD
In this section we will discuss about our proposed method of watermarking. This method consists of two processes; the watermark
embedding process and the watermark extraction process.
4.1 Watermark embed process
For the embedding process we have the following steps. Fig 5.re presents the flow diagrams of the proposed embedding method.
Step 1: The host image is taken as input and divided into 8×8 non-overlapping blocks.
Step 2: Now Hadamard Transformation is applied on each block. Then we get Hadamard transform co-efficient for the block. Now we work on the Hadamard
Transform co-efficient. Each block has a DC value which is avoid for any embedding. In an 8*8 block here has 64 co-efficient so one co-efficient is avoided and
remaining 63 co-efficient is use for embed. The remaining 63 co-efficient are called AC value of the block.
Step 3: We apply BFS algorithm on the Hadamard co-efficient and finding positive connecting component. Then generate spanning tree from the Hadamard
co-efficient.
Step 4: Next we use prime numbering system for selection of the block which is disused before. on prime block are selected for embedding.
Step 5: After selecting the Non-prime block we check the labeling component. Then select which labeling that positions on the 1st column and that .points is
selected to embed watermarking. In this way we mark the watermark point. In our embedded process we select only on 1st column. Because the rate of the
distortion of the watermarked image is very small.
Figure 5. Flow Diagram of Watermark Embed Process
Step 6: Now take input the watermark image. Our watermark image size is 64× 64. Watermark image divide into 8×8 blocks and apply
Hadamard Transformation on each block. From the coefficients of the watermark image after applying Hadamard transform, points within
the range-: 0 < x < 1 or -1 < x < 0 are selected and then stored in a visited matrix. The rest of the components are stored in a key matrix,
which is used in the decoding process.
Step 7: We use Cox’s equation for embed watermark Hadamard co-efficient into host Hadamard co-efficient.
 ),(*1*),(),( jiwyxfyxf  (4)
where, ),( yxf  = Watermarked Hadamard co-efficient, ),( yxf = host Hadamard co-efficient, = scaling factor and ),( jiw =
Watermark Hadamard co-efficient.
Step 8: After completing the embed process we again apply inverse Hadamard Transformation to produce watermarked image
4.2 Watermark Extraction process:
To extract the watermark image from watermarked image, the following steps are required. Fig 6. Presents the flow diagrams of the
proposed extraction method.
Step 1: The watermarked image and host image divided in same manner of host image into 8×8 sub-blocks
Step 2: Hadamard transform is applied on each block of the both image.
Step 3: The visited matrix is used for watermark extraction. Here we use the inverse embed equation (4) for extract watermark image.
An Improved Non-Blind Digital Image Watermarking on Hadamard Transform for Image Authentication
DOI: 10.9790/0661-1803015864 www.iosrjournals.org 61 | Page










1
),(
),(
),(
yxf
yxf
yxw (5)
Where, ),( yxw = watermark extract co-efficient, ),( yxf  = Watermarked Hadamard co-efficient, ),( yxf = Host Hadamard
co-efficient
Step 4: Again we apply inverse Hadamard Transformation on extract Hadamard co-efficient. Then we get the extracted watermark image
Figure 6. Flow Diagram of Watermark Extraction Process
V. EXPERIMENTAL RESULT AND ANALYSIS
To evaluate the quality of the watermarked image in comparison with host image we have used the peak signal to noise ratio (PSNR)
.The Formula of PSNR is given below:
MSE
PSNR
255255
log10 10

 (6)
Where   



1
1
2
),(),(
1 M
N
jiKjiINM
MSE
MSE (mean square error) will be computed first. The M and N are the height and width of the image, respectively.  jiI , And
 jiK , are the values located at coordinates (i, j) of the host image and the watermarked image.
. The normalized correlation coefficient (NCC) is computed after extracting the watermark image. The original watermark and the
extracted watermark is used to judge the existence of the watermark and to measure the correctness of an extracted watermark. It is defined
as:
 



m
i
n
j
jiwjiw
nm
NCC
1 1
),(),(
1
(7)
Where, m and n are the height and width of the watermark, respectively.  jiw , And  jiw , are the watermark bits located at
coordinates (i, j) of the original watermark and extracted watermark.
We have taken two images figure 7. Lenna.. Figure 8. Pepper to test the experiment of watermarking.
An Improved Non-Blind Digital Image Watermarking on Hadamard Transform for Image Authentication
DOI: 10.9790/0661-1803015864 www.iosrjournals.org 62 | Page
(a) (b) (c)
Figure 7.Experiment of (Lenna) (a)Original image (b)Watermark image (c) Watermarked image
(a) (b) (c)
Figure 8.Experiment of (Pepper) (a) Original image (b) Watermark image (c) Watermarked image
Table 1.PSNR and NCC for no Alteration of Image
Name of Image PSNR NCC
Lenna 38.78 1
Pepper 40.59 1
(a) (b) (c)
(d) (e) (f)
Figure 9.Different attack applied on watermarked image (a) Original image (b) JPEG compression (c) Salt &Pepper (d) Cropping (e)
Gaussian noise (f) Changing aspect ratio
An Improved Non-Blind Digital Image Watermarking on Hadamard Transform for Image Authentication
DOI: 10.9790/0661-1803015864 www.iosrjournals.org 63 | Page
Table 2. PSNR and NCC are after applying JPEG compression on both images
Attack PSNR(Lenna) NCC PSNR(Pepper) NCC
JPEG compression (QF=10) 32.7029 0.9742 30.0946 0.8956
JPEG compression (QF=30) 34.3765 0 .9809 34.6744 0.9034
JPEG compression (QF=50) 36.4525 0.9850 37.846 0.9345
JPEG compression (QF=70) 37.4557. 0.9926 38.545 0.9678
JPEG compression (QF=90) 38.125 0.9958 38.678 0.9889
Table 3. PSNR and NCC are after applying Different Noise attack
Attack PSNR(Lenna) NCC PSNR(Pepper) NCC
Gaussian Noise
(Average=0,density=.002)
26.8266 0.9873 27.0004 0.9851
Speckle Noise
(density=.01)
26.5200 0.9887 26.7301 0.9920
Salt & pepper noise
(Strength=.01)
24.7564 0.9856 24.6497 0.9838
Table 4. PSNR and NCC are after applying Cropping attack
Attack PSNR(Lenna) NCC PSNR(Pepper) NCC
Cropping[ 3232  ]
30.1313 0.9982 28.4461 0.9994
Cropping[ 6464  ]
25.4391 0.9894 20.9221 0.9877
Cropping[ 128128 ]
16.3047 0 .9595 14.6024 0.9611
Table 5. PSNR and NCC are after applying Different filtering attack
Attack PSNR(Lenna) NCC PSNR(Pepper) NCC
Linear filtering 32.456 0.9456 31.234 0.9876
Median filtering 33 34.4961 0.9873 24.9691 0.9883
Weiner filtering 36.2677 0.9711 31.4831 0.9854
Table 6. PSNR and NCC are after applying rotation attack
Attack PSNR(Lenna) NCC PSNR(Pepper) NCC
Rotation 50
30.1313 0.9983 28.4461 0.9984
Rotation 100
25.4691 0.9892 20.9262 0.9875
Table 7.Comparision of NCC with Anthony’s method [1] with Proposed Method
Different Attack Anthony’s method[1] Proposed method
Sharpening 33 0.9573 0.9933
1 row 1 column removed 0.9866 0.9883
Frequency mode Laplacian removal 0.9580 0.9754
Scaling.75 0.9354 0.9554
JPEG compression of factor 30 0.8688 0.9042
Changing aspect ratio 0.8199 0.8558
Figure 10. Bar chart of Comparison of NCC with Ho et al. Method with Proposed Method
VI. Conclusion
An In this paper, we proposed an improved digital image watermarking scheme based on the Hadamard transform which provides a
complete method that embeds and extracts the watermark information very effectively. Our watermark embedding process persist the visual
quality of the image. The performance of the watermarking scheme is evaluated with common image processing attacks and alteration.
An Improved Non-Blind Digital Image Watermarking on Hadamard Transform for Image Authentication
DOI: 10.9790/0661-1803015864 www.iosrjournals.org 64 | Page
Moreover this authentication process provides qualities such as robustness, imperceptibility and security. The experimental results show that
our proposed method is efficient and manifest more robustness against those disruptive alterations.
REFERENCES
[1] Anthony T.S. Ho, J. Shen, Andrew K.K. Chow, J. Woon, Robust Digital Image-in-Image Watermarking Algorithm Using the Fast Hadamard Transform, Proc. of IEEE
International Symposium on Circuit and system (ISCAS ’03), vol. 3, pp. 826-829, 2003.
[2] S. Saryazdi, H. Nezamabadi-pour, A Blind Digital Watermark in Hadamard Domain, Proc. of World Academy of Science, Engineering and Technology, vol. 3, 2005.
[3] K. Deb, M.S. Al-Seraj, M.M. Hoque, M.I.H. Sarker, Combined DWT DCT Based Digital Image Watermarking Technique for Copyright Protection, Proc. of IEEE International
Conference on Electrical & Computer Engineering (ICECE), 2012.
[4] A. Al-Haj, Combined DWT-DCT Digital Image Watermarking,Journal of Computer Science, vol. 3, no. 9, pp. 740-746, 2007.
[5] F. Husain ,A Survey of Digital Watermarking Techniques for Multimedia Data,MIT International Journal of Electronics and Communication Engineering, vol. 2, no. 1, pp. 37-43,
2012.
[6] R. Zhao, L. Hua, H. Pang, B. Hu, A Watermarking Algorithm by Modifying AC Coefficies in DCT Domain, Proc. of IEEE International Symposium on Information Science and
Engineering (ISISE), 2008. Article (CrossRef Link)
[7] R. Kountchev, S. Rubin, M. Milanova, V. Todorov, Resistant Image Watermarking in the Phases of the Complex Hadamard Transform Coefficients,in Proc. of IEEE International
Conferecne on Information Reuse and Integration (IRI), pp. 159-164, 2010.
[8] S.J. Lee, S.H. Jung, A Survey of Watermarking Techniques Applied to Multimedia, Proc. of IEEE International Symposium on Industrial Electronics, vol. 1, pp. 272-277, 2001.
[9] M. Sathik, S.S. Sujatha, An Improved Invisible Watermarking Technique for Image Authentication, International Journal of Advanced Science and Technology (IJAST), vol. 24,
2010.
[10] Liu Ping Feng, Liang Bin Zheng, Peng Cao, A DWT-DCT Based Blind Watermarking Algorithm for Copyright Protection, 3rd IEEE International Conference on Computer
Science and Information Technology (ICCSIT), 2010.
[11] Qingtang Su, Yugang Niu, Hailin Zou, Xianxi Liu, A blind dual color images watermarking based on singular value decomposition , Applied Mathematics and Computation, vol.
219, pp.8455–8466, 2013.
[12] Chih-Chin Lai and Cheng-Chih Tsai, Digital Image Watermarking Using Descrete Wavelet Transform and Singular Value Decomposition, IEEE transactions on instrumentation
and measurement, vol. 59, no. 11, November 2010
[13] Athanasios Nikolaidis and Ioannis Pitas, Asymptotically Optimal Detection for Additive Watermarking in the DCT and DWT Domains, IEEE Transaction on Image Processing,
vol. 12, no. 5, May 2003.
[14] Xiaotian Wu, Wei Sun, Robust copyright protection scheme for digital images using overlapping DCT and SVD, Applied Soft Computing , vol. 13, pp. 1170-1182, 2013

Contenu connexe

Tendances

Dataset Pre-Processing and Artificial Augmentation, Network Architecture and ...
Dataset Pre-Processing and Artificial Augmentation, Network Architecture and ...Dataset Pre-Processing and Artificial Augmentation, Network Architecture and ...
Dataset Pre-Processing and Artificial Augmentation, Network Architecture and ...
INFOGAIN PUBLICATION
 
Multimedia Databases: Performance Measure Benchmarking Model (PMBM) Framework
Multimedia Databases: Performance Measure Benchmarking Model (PMBM) FrameworkMultimedia Databases: Performance Measure Benchmarking Model (PMBM) Framework
Multimedia Databases: Performance Measure Benchmarking Model (PMBM) Framework
theijes
 

Tendances (20)

H1803014347
H1803014347H1803014347
H1803014347
 
C1803011419
C1803011419C1803011419
C1803011419
 
Document Recovery From Degraded Images
Document Recovery From Degraded ImagesDocument Recovery From Degraded Images
Document Recovery From Degraded Images
 
Dataset Pre-Processing and Artificial Augmentation, Network Architecture and ...
Dataset Pre-Processing and Artificial Augmentation, Network Architecture and ...Dataset Pre-Processing and Artificial Augmentation, Network Architecture and ...
Dataset Pre-Processing and Artificial Augmentation, Network Architecture and ...
 
Image Retrieval Based on its Contents Using Features Extraction
Image Retrieval Based on its Contents Using Features ExtractionImage Retrieval Based on its Contents Using Features Extraction
Image Retrieval Based on its Contents Using Features Extraction
 
Enhanced Image Compression Using Wavelets
Enhanced Image Compression Using WaveletsEnhanced Image Compression Using Wavelets
Enhanced Image Compression Using Wavelets
 
A UTOMATIC L OGO E XTRACTION F ROM D OCUMENT I MAGES
A UTOMATIC  L OGO  E XTRACTION  F ROM  D OCUMENT  I MAGESA UTOMATIC  L OGO  E XTRACTION  F ROM  D OCUMENT  I MAGES
A UTOMATIC L OGO E XTRACTION F ROM D OCUMENT I MAGES
 
26 3 jul17 22may 6664 8052-1-ed edit septian
26 3 jul17 22may 6664 8052-1-ed edit septian26 3 jul17 22may 6664 8052-1-ed edit septian
26 3 jul17 22may 6664 8052-1-ed edit septian
 
IMAGE QUALITY ASSESSMENT- A SURVEY OF RECENT APPROACHES
IMAGE QUALITY ASSESSMENT- A SURVEY OF RECENT APPROACHES IMAGE QUALITY ASSESSMENT- A SURVEY OF RECENT APPROACHES
IMAGE QUALITY ASSESSMENT- A SURVEY OF RECENT APPROACHES
 
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Imageproc...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Imageproc...IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Imageproc...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Imageproc...
 
B280916
B280916B280916
B280916
 
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy LogicImproved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
 
2 ijaems dec-2015-5-comprehensive review of huffman encoding technique for im...
2 ijaems dec-2015-5-comprehensive review of huffman encoding technique for im...2 ijaems dec-2015-5-comprehensive review of huffman encoding technique for im...
2 ijaems dec-2015-5-comprehensive review of huffman encoding technique for im...
 
Multimedia Databases: Performance Measure Benchmarking Model (PMBM) Framework
Multimedia Databases: Performance Measure Benchmarking Model (PMBM) FrameworkMultimedia Databases: Performance Measure Benchmarking Model (PMBM) Framework
Multimedia Databases: Performance Measure Benchmarking Model (PMBM) Framework
 
Facial image retrieval on semantic features using adaptive mean genetic algor...
Facial image retrieval on semantic features using adaptive mean genetic algor...Facial image retrieval on semantic features using adaptive mean genetic algor...
Facial image retrieval on semantic features using adaptive mean genetic algor...
 
IRJET - Underwater Image Enhancement using PCNN and NSCT Fusion
IRJET -  	  Underwater Image Enhancement using PCNN and NSCT FusionIRJET -  	  Underwater Image Enhancement using PCNN and NSCT Fusion
IRJET - Underwater Image Enhancement using PCNN and NSCT Fusion
 
IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...
IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...
IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...
 
Feature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual AnalysisFeature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual Analysis
 
A COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCAT...
A COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCAT...A COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCAT...
A COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCAT...
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 

En vedette

En vedette (20)

R01061127135
R01061127135R01061127135
R01061127135
 
Car Dynamics Using Quarter Model and Passive Suspension, Part III: A Novel Po...
Car Dynamics Using Quarter Model and Passive Suspension, Part III: A Novel Po...Car Dynamics Using Quarter Model and Passive Suspension, Part III: A Novel Po...
Car Dynamics Using Quarter Model and Passive Suspension, Part III: A Novel Po...
 
A012310103
A012310103A012310103
A012310103
 
Large Span Lattice Frame Industrial Roof Structure
Large Span Lattice Frame Industrial Roof StructureLarge Span Lattice Frame Industrial Roof Structure
Large Span Lattice Frame Industrial Roof Structure
 
B012330714
B012330714B012330714
B012330714
 
A Novel Field Effect Diode (Fed) Structure For Improvement Of Ion/Ioff Ratio ...
A Novel Field Effect Diode (Fed) Structure For Improvement Of Ion/Ioff Ratio ...A Novel Field Effect Diode (Fed) Structure For Improvement Of Ion/Ioff Ratio ...
A Novel Field Effect Diode (Fed) Structure For Improvement Of Ion/Ioff Ratio ...
 
Speed Control of FSTP Inverter Fed Induction Motor Drive with a Neural Networ...
Speed Control of FSTP Inverter Fed Induction Motor Drive with a Neural Networ...Speed Control of FSTP Inverter Fed Induction Motor Drive with a Neural Networ...
Speed Control of FSTP Inverter Fed Induction Motor Drive with a Neural Networ...
 
E012423034
E012423034E012423034
E012423034
 
I1803026164
I1803026164I1803026164
I1803026164
 
Core Components of the Metabolic Syndrome in Nonalcohlic Fatty Liver Disease
Core Components of the Metabolic Syndrome in Nonalcohlic Fatty Liver DiseaseCore Components of the Metabolic Syndrome in Nonalcohlic Fatty Liver Disease
Core Components of the Metabolic Syndrome in Nonalcohlic Fatty Liver Disease
 
Implementation of an Improved Microcontroller Based Moving Message Display Sy...
Implementation of an Improved Microcontroller Based Moving Message Display Sy...Implementation of an Improved Microcontroller Based Moving Message Display Sy...
Implementation of an Improved Microcontroller Based Moving Message Display Sy...
 
J017648994
J017648994J017648994
J017648994
 
E1103043235
E1103043235E1103043235
E1103043235
 
J017555559
J017555559J017555559
J017555559
 
H1802045666
H1802045666H1802045666
H1802045666
 
K010327983
K010327983K010327983
K010327983
 
A011210108
A011210108A011210108
A011210108
 
Development of pH Dependent Solid Phase Spectrophotometric (SPS) Determinatio...
Development of pH Dependent Solid Phase Spectrophotometric (SPS) Determinatio...Development of pH Dependent Solid Phase Spectrophotometric (SPS) Determinatio...
Development of pH Dependent Solid Phase Spectrophotometric (SPS) Determinatio...
 
Virtual Network Computing Based Droid desktop
Virtual Network Computing Based Droid desktopVirtual Network Computing Based Droid desktop
Virtual Network Computing Based Droid desktop
 
Q01813104114
Q01813104114Q01813104114
Q01813104114
 

Similaire à K1803015864

4214ijait01
4214ijait014214ijait01
4214ijait01
ijait
 

Similaire à K1803015864 (20)

An adaptive watermarking process in hadamard transform
An adaptive watermarking process in hadamard transformAn adaptive watermarking process in hadamard transform
An adaptive watermarking process in hadamard transform
 
4214ijait01
4214ijait014214ijait01
4214ijait01
 
1674 1677
1674 16771674 1677
1674 1677
 
1674 1677
1674 16771674 1677
1674 1677
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
 
Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image Watermarking
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
Digital Image Watermarking using Discrete Wavelet Transform
Digital Image Watermarking using Discrete Wavelet TransformDigital Image Watermarking using Discrete Wavelet Transform
Digital Image Watermarking using Discrete Wavelet Transform
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
1918 1923
1918 19231918 1923
1918 1923
 
1918 1923
1918 19231918 1923
1918 1923
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
 
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 

Plus de IOSR Journals

Plus de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

K1803015864

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 3, Ver. I (May-Jun. 2016), PP 58-64 www.iosrjournals.org DOI: 10.9790/0661-1803015864 www.iosrjournals.org 58 | Page An Improved Non-Blind Digital Image Watermarking on Hadamard Transform for Image Authentication Sanjida Sharmin1 , Rahima Afrose2, Lutfur Nahar3 , Nargis Akter4 1 Chittagong University of Engineering and Technology, Bangladesh 2 International Islamic University Chittagong, Bangladesh 3 Chittagong University, Bangladesh 4 International Islamic University Chittagong, Bangladesh Abstract : With the advent of internet digital media has been improving with massive advancement in recent years. The distribution of unauthorized copies of media content has also been increasing day by day. Because of easy access to digital content, online purchasing and distribution becomes easier. Thus there is an urgent need to provide protection for digital content. One solution gaining popularity in protecting digital content is digital watermarking. In proposed scheme, a breadth-first search technique is used to find the efficient embedding point to embed the watermark. The proposed algorithm results show that the experiment offers better image quality and robustness under various attacks and alteration, such a, cropping, JPEG compression sharpening and filtering among others. The results have manifested the higher robustness and imperceptibility of this scheme when compared with other available watermarking techniques. Keywords - Digital watermarking, Hadamard Transform, Breadth-first search technique I. INTRODUCTION Digital watermarking is the technique of hiding a message related to a digital signal (i.e. an image, song and video) within the signal itself, which may be used to verify its authenticity or the identity of its owners. . The concept of watermarking closely related to steganography, in that those both hide a message inside a digital signal .Watermarking can be classified in different ways. In terms of the need of original image in watermark extraction process, watermarking techniques are classified as either blind or non-blind. The original image is needed when detecting the watermark in a non-blind technique whereas a blind watermarking technique does no need the original image for extraction or detection. Our proposed method follows the non-blind watermarking technique. According to application, watermarks are sub-divided into semi-fragile, fragile, and robust. Fragile watermarks are very sensitive. They can be destroyed easily with slight alteration in the watermarked signal. Semi-fragile watermarking are also broken if the modifications to the watermarked signal exceed a user pre-defined threshold. If the value of threshold is set to zero then it operates as a fragile watermark. On the other hand, a robust watermark withstands against various malicious attacks, such as scaling, rotation, filtering and compression. Our method manifests the robustness of watermarking. Previous researchers like Ho et al. proposed a frequency domain watermarking system for digital image using the Fast Hadamard Transform [1]. Saryazdi and Nezamabadi-pour developed a new blind gray-level watermarking scheme in which the host image is first divided into 4×4 non-overlapping blocks [2]. For each block, two first AC coefficients of its Hadamard transform are then estimated using DC coefficients of its neighbor blocks. Deb et al. proposed a combined DWT and DCT-based watermarking technique with low frequency watermarking with weighted correction [3]. Al-Haj described an imperceptible and robust combined DWT-DCT digital image watermarking algorithm for copyright protection [4]. Husain presented a survey of various digital watermarking techniques for multimedia data such as text, audio, image and video for copyright protection [5].Rui-mei et al. proposed a blind watermarking algorithm based on DCT for digital image in which a two-bit image is embedded in an eight-bit gray image [6]. Kountchev et al. proposed a new method where a still digital image is transformed using the complex Hadamard transform [7]. Lee et al. proposed a survey of watermarking systems that are applied to multimedia [8]. Sathik and Sujatha described a watermark construction process where a scrambled version of the watermark is obtained with the help of the Arnold transform [9]. In this paper, we propose a robust digital image watermarking method based on Hadamard Transform. The mean reason to use this method is its simplicity, also it offers significant advantages (less processing time and better hardware implementation) compared to most orthogonal transform techniques, such as DWT and DCT. The rest of the paper is organized as follows. In Section II, we have introduced the Hadamard transform. Section III describes the selection of positive Hadamard Coefficient and labeling Section IV describes our proposed method of watermarking system including the watermark embedding process and the watermark extraction process. Section V represents our experimental results and analysis finally, Section VI concludes this paper. II. HADAMARD TRANSFORM The Hadamard transformation is also known as the Walsh–Hadamard transformation, Hadamard–Rademacher–Walsh transformation, Walsh transformation, or Walsh–Fourier transformation. It is an example of a generalized class of Fourier transforms .The 2D-Hadamard transform has been used extensively in image processing and image compression [1] Let [U] represents the original image and [V] the transformed image, the 2D-Hadamard transform is given by: M HUH V mm ][ ][  (1) Where mH represents an N×N Hadamard matrix, N=2n, n=1,2,3…… with element values either +1 or –1. The advantages of Hadamard transform are that the elements of the transform matrix mH are simple: they are binary, real numbers and the rows or columns of mH are orthogonal. The inverse 2D-Hadamard transform (IHT) is given as: M HVH HVHU mm mm ][ ][][ *1   (2)
  • 2. An Improved Non-Blind Digital Image Watermarking on Hadamard Transform for Image Authentication DOI: 10.9790/0661-1803015864 www.iosrjournals.org 59 | Page In our algorithm, the transform process is carried out based on the 8×8 sub-blocks of the whole image. the third order Hadamard transform matrix mH is used.                                   11111111 11111111 11111111 11111111 11111111 11111111 11111111 11111111 H (3) III. SELECTION OF POSITIVE HADAMARD COEFFICIENT AND LABELING Breadth First search is an extremely very useful searching technique. It differs from the depth-first search in that it uses a queue to perform the search, so the order in which the nodes are visited is quite different. It has the extremely useful property that if all of the edges in a graph are unweighted or the same weight then the first time a node is visited is the shortest path to that node from the source node. It is a way to find all the vertices reachable from the given source vertex. Like depth first search, Breadth First search traverse a connected component of a given graph and defines a spanning tree. In our implementation use an order for BFS searching. The order is given following. Here, C is centre point or main point. 1, 2, 3, 4, 5, 6, 7, 8 is order of the BFS algorithm searching. Fig 1. Shows the order of searching the node. Figure 1. Order of searching Now we apply BFS algorithm on the Hadamard co-efficient and finding positive connecting component. Then generate spanning tree from the Hadamard co-efficient. After applying breadth first search algorithm we get spanning tree of the co-efficient and also label of the spanning tree. Here, we using labeling technique we can count the number of trees. It will also help to find watermark embed point. Figure 2. Labeling the Hadamard co-efficient. Figure 3. Mark the prime number for not embedding By using BFS algorithm we get a matrix which represents the position of the Hadamard co-efficient, which is called visit matrix. The visit matrix is mainly use for watermark extraction process. Fig 2. Shows the labeling of the positive Hadamard Co-efficient. After that we will select the non prime block for embedding. Here block having Prime numbers are those Like as 2, 3, 5, 7, 11, 13 ……so on and non-prime numbers are 4, 6, 8, 9, 10, 12, 14, 15…………… so on. Fig 3. Shows the prime number in each block. Prime number block are avoided here because after transformation if most of the value of prime block became totally zero then it is impossible for us to embed. It is not possible to select all point for watermarking. Because select all point of Hadamard Co-efficient may occur huge distortions of the watermarked image. That why we select the non prime block. In our embedded process we select only on 1st column. Because the rate of distortion of the watermarked image is very high in row wise because of matrix manipulation. Now in 1st column we will embed in two points 111.5 and 110.8 shown in figure fig 4. Figure 4. Detection of Watermark Point
  • 3. An Improved Non-Blind Digital Image Watermarking on Hadamard Transform for Image Authentication DOI: 10.9790/0661-1803015864 www.iosrjournals.org 60 | Page IV. PROPOSED METHOD In this section we will discuss about our proposed method of watermarking. This method consists of two processes; the watermark embedding process and the watermark extraction process. 4.1 Watermark embed process For the embedding process we have the following steps. Fig 5.re presents the flow diagrams of the proposed embedding method. Step 1: The host image is taken as input and divided into 8×8 non-overlapping blocks. Step 2: Now Hadamard Transformation is applied on each block. Then we get Hadamard transform co-efficient for the block. Now we work on the Hadamard Transform co-efficient. Each block has a DC value which is avoid for any embedding. In an 8*8 block here has 64 co-efficient so one co-efficient is avoided and remaining 63 co-efficient is use for embed. The remaining 63 co-efficient are called AC value of the block. Step 3: We apply BFS algorithm on the Hadamard co-efficient and finding positive connecting component. Then generate spanning tree from the Hadamard co-efficient. Step 4: Next we use prime numbering system for selection of the block which is disused before. on prime block are selected for embedding. Step 5: After selecting the Non-prime block we check the labeling component. Then select which labeling that positions on the 1st column and that .points is selected to embed watermarking. In this way we mark the watermark point. In our embedded process we select only on 1st column. Because the rate of the distortion of the watermarked image is very small. Figure 5. Flow Diagram of Watermark Embed Process Step 6: Now take input the watermark image. Our watermark image size is 64× 64. Watermark image divide into 8×8 blocks and apply Hadamard Transformation on each block. From the coefficients of the watermark image after applying Hadamard transform, points within the range-: 0 < x < 1 or -1 < x < 0 are selected and then stored in a visited matrix. The rest of the components are stored in a key matrix, which is used in the decoding process. Step 7: We use Cox’s equation for embed watermark Hadamard co-efficient into host Hadamard co-efficient.  ),(*1*),(),( jiwyxfyxf  (4) where, ),( yxf  = Watermarked Hadamard co-efficient, ),( yxf = host Hadamard co-efficient, = scaling factor and ),( jiw = Watermark Hadamard co-efficient. Step 8: After completing the embed process we again apply inverse Hadamard Transformation to produce watermarked image 4.2 Watermark Extraction process: To extract the watermark image from watermarked image, the following steps are required. Fig 6. Presents the flow diagrams of the proposed extraction method. Step 1: The watermarked image and host image divided in same manner of host image into 8×8 sub-blocks Step 2: Hadamard transform is applied on each block of the both image. Step 3: The visited matrix is used for watermark extraction. Here we use the inverse embed equation (4) for extract watermark image.
  • 4. An Improved Non-Blind Digital Image Watermarking on Hadamard Transform for Image Authentication DOI: 10.9790/0661-1803015864 www.iosrjournals.org 61 | Page           1 ),( ),( ),( yxf yxf yxw (5) Where, ),( yxw = watermark extract co-efficient, ),( yxf  = Watermarked Hadamard co-efficient, ),( yxf = Host Hadamard co-efficient Step 4: Again we apply inverse Hadamard Transformation on extract Hadamard co-efficient. Then we get the extracted watermark image Figure 6. Flow Diagram of Watermark Extraction Process V. EXPERIMENTAL RESULT AND ANALYSIS To evaluate the quality of the watermarked image in comparison with host image we have used the peak signal to noise ratio (PSNR) .The Formula of PSNR is given below: MSE PSNR 255255 log10 10   (6) Where       1 1 2 ),(),( 1 M N jiKjiINM MSE MSE (mean square error) will be computed first. The M and N are the height and width of the image, respectively.  jiI , And  jiK , are the values located at coordinates (i, j) of the host image and the watermarked image. . The normalized correlation coefficient (NCC) is computed after extracting the watermark image. The original watermark and the extracted watermark is used to judge the existence of the watermark and to measure the correctness of an extracted watermark. It is defined as:      m i n j jiwjiw nm NCC 1 1 ),(),( 1 (7) Where, m and n are the height and width of the watermark, respectively.  jiw , And  jiw , are the watermark bits located at coordinates (i, j) of the original watermark and extracted watermark. We have taken two images figure 7. Lenna.. Figure 8. Pepper to test the experiment of watermarking.
  • 5. An Improved Non-Blind Digital Image Watermarking on Hadamard Transform for Image Authentication DOI: 10.9790/0661-1803015864 www.iosrjournals.org 62 | Page (a) (b) (c) Figure 7.Experiment of (Lenna) (a)Original image (b)Watermark image (c) Watermarked image (a) (b) (c) Figure 8.Experiment of (Pepper) (a) Original image (b) Watermark image (c) Watermarked image Table 1.PSNR and NCC for no Alteration of Image Name of Image PSNR NCC Lenna 38.78 1 Pepper 40.59 1 (a) (b) (c) (d) (e) (f) Figure 9.Different attack applied on watermarked image (a) Original image (b) JPEG compression (c) Salt &Pepper (d) Cropping (e) Gaussian noise (f) Changing aspect ratio
  • 6. An Improved Non-Blind Digital Image Watermarking on Hadamard Transform for Image Authentication DOI: 10.9790/0661-1803015864 www.iosrjournals.org 63 | Page Table 2. PSNR and NCC are after applying JPEG compression on both images Attack PSNR(Lenna) NCC PSNR(Pepper) NCC JPEG compression (QF=10) 32.7029 0.9742 30.0946 0.8956 JPEG compression (QF=30) 34.3765 0 .9809 34.6744 0.9034 JPEG compression (QF=50) 36.4525 0.9850 37.846 0.9345 JPEG compression (QF=70) 37.4557. 0.9926 38.545 0.9678 JPEG compression (QF=90) 38.125 0.9958 38.678 0.9889 Table 3. PSNR and NCC are after applying Different Noise attack Attack PSNR(Lenna) NCC PSNR(Pepper) NCC Gaussian Noise (Average=0,density=.002) 26.8266 0.9873 27.0004 0.9851 Speckle Noise (density=.01) 26.5200 0.9887 26.7301 0.9920 Salt & pepper noise (Strength=.01) 24.7564 0.9856 24.6497 0.9838 Table 4. PSNR and NCC are after applying Cropping attack Attack PSNR(Lenna) NCC PSNR(Pepper) NCC Cropping[ 3232  ] 30.1313 0.9982 28.4461 0.9994 Cropping[ 6464  ] 25.4391 0.9894 20.9221 0.9877 Cropping[ 128128 ] 16.3047 0 .9595 14.6024 0.9611 Table 5. PSNR and NCC are after applying Different filtering attack Attack PSNR(Lenna) NCC PSNR(Pepper) NCC Linear filtering 32.456 0.9456 31.234 0.9876 Median filtering 33 34.4961 0.9873 24.9691 0.9883 Weiner filtering 36.2677 0.9711 31.4831 0.9854 Table 6. PSNR and NCC are after applying rotation attack Attack PSNR(Lenna) NCC PSNR(Pepper) NCC Rotation 50 30.1313 0.9983 28.4461 0.9984 Rotation 100 25.4691 0.9892 20.9262 0.9875 Table 7.Comparision of NCC with Anthony’s method [1] with Proposed Method Different Attack Anthony’s method[1] Proposed method Sharpening 33 0.9573 0.9933 1 row 1 column removed 0.9866 0.9883 Frequency mode Laplacian removal 0.9580 0.9754 Scaling.75 0.9354 0.9554 JPEG compression of factor 30 0.8688 0.9042 Changing aspect ratio 0.8199 0.8558 Figure 10. Bar chart of Comparison of NCC with Ho et al. Method with Proposed Method VI. Conclusion An In this paper, we proposed an improved digital image watermarking scheme based on the Hadamard transform which provides a complete method that embeds and extracts the watermark information very effectively. Our watermark embedding process persist the visual quality of the image. The performance of the watermarking scheme is evaluated with common image processing attacks and alteration.
  • 7. An Improved Non-Blind Digital Image Watermarking on Hadamard Transform for Image Authentication DOI: 10.9790/0661-1803015864 www.iosrjournals.org 64 | Page Moreover this authentication process provides qualities such as robustness, imperceptibility and security. The experimental results show that our proposed method is efficient and manifest more robustness against those disruptive alterations. REFERENCES [1] Anthony T.S. Ho, J. Shen, Andrew K.K. Chow, J. Woon, Robust Digital Image-in-Image Watermarking Algorithm Using the Fast Hadamard Transform, Proc. of IEEE International Symposium on Circuit and system (ISCAS ’03), vol. 3, pp. 826-829, 2003. [2] S. Saryazdi, H. Nezamabadi-pour, A Blind Digital Watermark in Hadamard Domain, Proc. of World Academy of Science, Engineering and Technology, vol. 3, 2005. [3] K. Deb, M.S. Al-Seraj, M.M. Hoque, M.I.H. Sarker, Combined DWT DCT Based Digital Image Watermarking Technique for Copyright Protection, Proc. of IEEE International Conference on Electrical & Computer Engineering (ICECE), 2012. [4] A. Al-Haj, Combined DWT-DCT Digital Image Watermarking,Journal of Computer Science, vol. 3, no. 9, pp. 740-746, 2007. [5] F. Husain ,A Survey of Digital Watermarking Techniques for Multimedia Data,MIT International Journal of Electronics and Communication Engineering, vol. 2, no. 1, pp. 37-43, 2012. [6] R. Zhao, L. Hua, H. Pang, B. Hu, A Watermarking Algorithm by Modifying AC Coefficies in DCT Domain, Proc. of IEEE International Symposium on Information Science and Engineering (ISISE), 2008. Article (CrossRef Link) [7] R. Kountchev, S. Rubin, M. Milanova, V. Todorov, Resistant Image Watermarking in the Phases of the Complex Hadamard Transform Coefficients,in Proc. of IEEE International Conferecne on Information Reuse and Integration (IRI), pp. 159-164, 2010. [8] S.J. Lee, S.H. Jung, A Survey of Watermarking Techniques Applied to Multimedia, Proc. of IEEE International Symposium on Industrial Electronics, vol. 1, pp. 272-277, 2001. [9] M. Sathik, S.S. Sujatha, An Improved Invisible Watermarking Technique for Image Authentication, International Journal of Advanced Science and Technology (IJAST), vol. 24, 2010. [10] Liu Ping Feng, Liang Bin Zheng, Peng Cao, A DWT-DCT Based Blind Watermarking Algorithm for Copyright Protection, 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), 2010. [11] Qingtang Su, Yugang Niu, Hailin Zou, Xianxi Liu, A blind dual color images watermarking based on singular value decomposition , Applied Mathematics and Computation, vol. 219, pp.8455–8466, 2013. [12] Chih-Chin Lai and Cheng-Chih Tsai, Digital Image Watermarking Using Descrete Wavelet Transform and Singular Value Decomposition, IEEE transactions on instrumentation and measurement, vol. 59, no. 11, November 2010 [13] Athanasios Nikolaidis and Ioannis Pitas, Asymptotically Optimal Detection for Additive Watermarking in the DCT and DWT Domains, IEEE Transaction on Image Processing, vol. 12, no. 5, May 2003. [14] Xiaotian Wu, Wei Sun, Robust copyright protection scheme for digital images using overlapping DCT and SVD, Applied Soft Computing , vol. 13, pp. 1170-1182, 2013