ArticlePDF Available

Dual-Layer Digital Image Watermarking for Intellectual Property Right Protection

Authors:
ACEEE Int. J. on Signal & Image Processing, Vol. 4, No. 2, May 2013
© 2013 ACEEE
DOI: 01.IJSIP.4.2.
Short Paper
1
Dual-layer Digital Image Watermarking for Intellectual
Property Right Protection
1Mr. H. E. Suryavanshi, 2Prof. Amit Mishra and 3Prof. Amit Sinhal
Department of Information Technology, Technocrats Institute of Technology, Bhopal, India
1hitendra.suryavanshi@gmail.com, 2amitmishra.mtech@gmail.com and 3amit_sinhal@rediffmail.com
Abstract: Digital watermarking is a technique which is widely
used in various application areas such as copyright protection,
copy control, broadcast monitoring etc. In this paper a novel
digital image watermarking technique is presented. To protect
the intellectual property rights, two different watermarks are
inserted in host image. The first watermark is used to monitor
the any changes made in host image while second one is used
as proof of ownership. The performance of proposed system is
good and it withstands against various attacks such as Gaussian
noise, salt and pepper, tampering etc.
Keywords: Digital Watermarking, Discrete Wavelet Transform,
Fragile Watermark, LSB, Robustness.
I. INTRODUCTION
Internet allows the public to exchange the information
without any barriers. This information can be in the form of
text, image, audio and video. The unrestricted access to
information gives birth to some problems such as copyright
violation, piracies etc. watermarking is a techniques developed
to resolve these issues. Watermarking gains a lot of
importance since last decade. It can be defined as a practice
of undetectably modifying a work to embed a message about
that work. Where work can be image, audio, video clip. [1]
In general, digital image watermarking system consist of
two modules: embedder and extractor, as shown in Fig. 1.
The embedder takes two inputs one is message which acts
as watermark, and the other is host image in which we want
to embed the message. The output of embedder is the
watermarked image which can be stored for later use.
Extraction module takes watermarked image and extracts the
message. Most of the extraction modules only check whether
image carries any watermark or not.
A. Properties of Watermarking System
Watermarking system has number of properties and the
importance of each property depends upon the type of
applications and role that watermark plays. [2]
1) Robustness: The ability of the watermark to survive normal
processing of content.
2) Security: The ability of the watermark to resist hostile
attacks.
3) Fidelity:The perceptual quality of watermarked content.
4) Data payload: The amount of information that can be
carried in awatermark.
B. Classification of Watermarking
Watermarking can be classified into the number of types,
as given below [3][4][5].
Fig. 1 General concept of watermarking
1) Visible Watermarking: The idea of visible watermark is very
simple. The logos used in today’s world everywhere is an
example of visible watermark. They are especially used for
conveying the immediate claim of ownership.
2) Invisible Watermarking: In this type of watermarking, rather
than displaying logo, the information is concealed into the
content itself.
3) Fragile Watermarking: Fragile watermarks have limited
robustness. They are used to check whether any modification
had taken place into the watermarked data.
Public Watermarking: These types of watermark are not secure
4) because they can read or viewed by anyone using specific
algorithms.
II. DISCRETE WAVELET TRANSFORM
Discrete wavelet transform is mathematical tool for
hierarchically decomposing an image. Images are usually
non-stationary two-dimensional signals and wavelet transform
is effective in such case. When discrete wavelet transformation
(DWT) applied on image, it decompose image into four
frequency sub-bands (LL, HL, LH, HH) where LL refers to low
pass band and other three sub-bands corresponds to
horizontal (HL), vertical (LH) and diagonal (HH) high pass
bands [6].
Fig.2 Two-level DWT decomposition
Fig. 2 shows two-level DWT decomposition of image. In
38
© 2013 ACEEE
DOI: 01.IJSIP.4.2.
ACEEE Int. J. on Signal & Image Processing, Vol. 4, No. 2, May 2013
Short Paper
1
general, the watermark can be inserted into low frequency
sub-bands (LL) because it increases the robustness of wa-
termark but at the same time it may degrade the image signifi-
cantly. High frequency bands (HH) contains edges and tex-
tures and changes that are caused due to watermark data
inserted in such band cannot be noticed by human eye [7].
III. PROPOSED WORK
In this section we present our proposed work. As
illustrated in Fig. 3, the watermarking system consists of two
embedders. The role of first embedder is to insert a watermark
into an image by using wavelet transform. This watermark
acts as robust watermark which cannot be removed from host
image. Second embeder inserts watermark which acts as fragile
watermark. This watermark is used to detect any alterations
in an image. Single change in an image can be easily identified
by using the second watermark. Spatial domain technique
such as LSB replacement is used to insert the second
watermark.
A. Watermark Insertion Method
1. Select the Original Image Ic [Mc, Nc] and Watermark Image
W1 [Mw, Nw]
2. Divide Ic and W1 into four sections [I1, I2, I3, I4] and [W1,
W2, W3, W4] by applying following equations
Part 1=Image (1 :( x/2), 1 :( y/2))
Part 2=Image (1 :( x/2), ((y/2) +1) :y)
Part 3=Image ((x/2) +1: x, 1 :( y/2))
Part 4=Image (((x/2) +1): x, ((y/2) +1): y)
Where [x, y] = Size of the Image
3. Select the pair (Ii, Wi) where i=1, 2, 3, 4 and repeat step no
4 to 13 for each pair
4. Apply DWT on Ii to get [CA, CH, CV, CD] coefficients
Fig.3 Proposed Waterma rking Scheme
5. Convert Wi into binary watermark (contains 0s and 1s)
6. Resize Wi as Wi [1, Mw×Nw]
7. Set PN sequence generator using Secrete Key-1
8. Repeat step 9 to 12 till (Mw×Nw)
9. Generate PN sequence
10. Calculate β factor as β=PN×K where, k is robustness
factor
11. Select the Coefficients [CH, CV]
12. IF Watermark (Wi) = 1
C=C+β
ELSE C=C
13. Apply inverse DWT to get Iwi
14. Collect all four section to get watermarked image (Iw)
15. Select the watermark image W2 [Mw, Nw]
16. Resize W2 to [Mc, Nc]
17. Set PN sequence generator using Key-2
18. Repeat the step 19 to 20 till [Mc × Nc]
19. Randomly generate a number R
20. IF R = Even Number
Set Iw (1st bit) to Watermark bit
ELSESet Iw (2nd bit) to Watermark bit
21. Final watermarked image (Iw) is obtained
22. Stop
B. Watermark Extraction Method
1. Select the Watermarked Image Iw [Mw, Nw]
2. Divide Iw into four sections [Iw1, Iw2, Iw3, Iw4] using same
equations specified above
3. Create four dummy matrix [M1, M2, M3, M4] containing all
zeros having size [Mw/2, Nw/2]
4. for each (Iwi, Mi) pair repeat step 5 to 9
where i=1, 2, 3, 4
39
ACEEE Int. J. on Signal & Image Processing, Vol. 4, No. 2, May 2013
© 2013 ACEEE
DOI: 01.IJSIP.4.2.
Short Paper
1
5. Apply DWT on Iwi to get [WA, WH, WV, WD]
coefficients
6. Set PN sequence generator using Key-1
7. Repeat step 8 till (Mw/2×Nw/2)
8. Select [WH, WV] coefficients and calculate correlation
9. IF Correlation >= Mean
Set Mi=1
ELSE Set Mi=0
10. Collect all Mi to get first watermark W1
11. Create a matrix W2 [Mw, Nw]
12. Set PN sequence generator using Key-2
13. Repeat the step 14 to 16
14. Randomly generate a number R
15. IF R = Even Number
Set W2 to Iw (1st bit)
ELSESet W2 to Iw (2nd bit)
16. Second watermark image (W2) is obtained
17. Stop
IV. RESULT ANALYSIS
This section presents the experimental results of the
proposed digital image watermarking scheme. For the entire
test in this paper MATLAB is used. The performance the
proposed method is tested on 8-bit grayscale image of
baboon, Lena and peppers of size 512×512. Fig 4. Shows the
cover image and two watermarks that can be inserted into
cover image.
(a) (b) (c)
(d) (e)
Fig.4 (a) Babbon (b) Lena (c) Peppers (d) First watermark (e)
Second watermark
The performance of the proposed watermarking technique
is evaluated in terms of the invisibility and robustness. The
PSNR (Peak-Signal-to-Noise Ratio) and MSE (Mean Square
Error) are used to measure the quality of the watermarked
image and attacked image. The PSNR is defined as follows
[6] [7]:
Where,
Where, I and I’ are cover image and watermarked image.
The normalized cross-correlation (NC) is used to check the
quality of original and extracted watermark. [8]
Where, W and W’ are original and extracted watermarks.
(a) (b) (c)
Fig.5 (a) Original Image (b) After inserting first watermark (c)
After inserting second watermark
Fig. 5 shows the original image of the baboon, the image
after the insertion of first watermark and second watermark.
The first watermark is inserted using blind watermarking
technique. It is a robust watermark. The second watermark is
a fragile watermark and embedded using LSB substitution
technique. Its purpose is to detect tampering.
(a) (b) (c)
Fig.6 (a) Watermarked image (b) Extracted first watermark (c)
Extra cted second watermark
The robustness of the proposed watermarking scheme is
tested against the various types of attacks such as, image
tampering, Salt and pepper, Gaussian and Poisson. It is shown
in the fig. 6 to 10.
(a) (b) (c)
Fig. 7 (a) Attacked ima ge (Tampering) (b) Extra cted first
watermark (c) Extracted second watermark
40
© 2013 ACEEE
DOI: 01.IJSIP.4.2.
ACEEE Int. J. on Signal & Image Processing, Vol. 4, No. 2, May 2013
Short Paper
1
(a) (b) (c)
Fig. 8 (a) Attacked image (Salt & Pepper) (b) Extracted first
watermark (c) Extracted second watermark
(a) (b)
Fig. 9 (a) Attacked image (Gaussian Noise) (b) Extracted first
watermark
(a) (b)
Fig. 10 (a) Attacked image (Poisson) (b) Extra cted first watermark
The performance of the system is shown in table 1 to 3 for
different images such as Baboon, Lena and Peppers. For
different values of K, robustness factor, different results are
obtained as given in tables below.
TABLE I. PERFORMANCE OF WATERMARKING SYSTEM
TABLE II. PERFORMANCE OF WATERMARKING SYSTEM
TABLE III. PERFORMANCE OF WATERMARKING SYSTEM
CONCLUSIONS
In this paper a novel digital image watermarking technique
is presented. This method is based on wavelet. The watermark
is inserted using wavelet coefficient blocks. Watermark
extraction process is independent on the original image.
Watermarks can be extracted in any order. This scheme is
tested against various attacks such as tampering, Gaussian
noise. In the future, we will try to enhance our algorithm to
obtain watermarked images with less distortion and to recover
the watermark with good accuracy.
ACKNOWLEDGMENT
The authors wish to thank Prof. Amit Mishra and Prof.
Amit Sinhal for their valuable guidance.
REFERENCES
[1] Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica
Fridrich , Ton Kalker, Digital watermarking and
steganography”, Second Edition, Morgan Kaufmann
Publishers, 2007.
[2] Husrev T. Sencar, Mahalingam Ramkumar, Ali N.
Akansu,”Data hiding fundamentals and applications”, Elsevier
Academic Press, 2004.
[3] Keshav S Rawat, Digital Watermarking Scheme for
Authorization against Copying or Piracy of Color Images,
Indian Journal of Computer Science and Engineering, Vol. 1,
No. 4, 2010, pp. 295-300
[4] Mohamed Abdulla Suhail, Digital watermarking for protection
of intellectual property, (University of Bradford, UK, 2005)
[5] Stefan Katzenbeisser, Fabien A. P. Petitcolas, Information
hiding techniques for steganography and digital watermarking,
Artech House Inc., 2000
[6] Peining Tao and Ahmet M. Eskicioglue, A robust multiple
watermarking scheme in the Discrete Wavelet Transformation
Domain, Proc. SPIE 5601, Internet Multimedia Management
Systems, Philadelphia, PA, 2004
[7] Ali Al-Haj, Combined DWT-D CT digital image
watermarking”, in Journal of Computer Science 3(9): 740-
746, 2007, ISSN 1549-3636, © 2007 Science Publications
[8] Hanaa A. Abdallah et. Al. “Blind wavelet-based image
watermarking”, in International Journal of Signal Processing,
Image Processing and Pattern Recognition, Vol. 4, No. 1, March
2011.
K Image-1: Babbon.bmp
PSNR MSE NC
0.1 38.6712 7.9527 0.5429
0.2 32.8323 31.5237 0.5968
0.3 29.4246 70.7842 0.6508
0.4 27.0669 125.7632 0.6952
0.5 25.1983 196.4499 0.7333
0.6 23.6141 282.9246 0.7651
0.7 22.2814 384.5371 0.7841
0.8 21.1269 501.6401 0.8190
0.9 20.1092 634.1065 0.8413
1.0 19.1963 782.4404 0.8603
K Image-2: Lena.bmp
PSNR MSE NC
0.1 38.8532 7.9446 0.5841
0.2 33.0062 31.5301 0.6952
0.3 29.6291 70.8231 0.7651
0.4 27.1323 125.8479 0.8254
0.5 25.1939 196.6462 0.8730
0.6 23.6085 283.2924 0.8889
0.7 22.2732 385.2623 0.9270
0.8 21.1145 503.0735 0.9524
0.9 20.0935 636.4056 0.9651
1.0 19.1777 785.8025 0.9810
K Image-3: Peppers.bmp
PSNR MSE NC
0.1 38.1598 7.9413 0.5175
0.2 32.3653 31.4904 0.6159
0.3 29.0096 70.5561 0.6952
0.4 26.7119 124.8649 0.7460
0.5 24.9696 194.2827 0.8032
0.6 23.5794 278.5260 0.8413
0.7 22.3656 377.1564 0.8857
0.8
21.2234
490.6154
0.9111
0.9 20.2171 618.5500 0.9429
1.0 19.3119 761.8840 0.9460
41
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
In this paper, a wavelet-based scheme for digital image watermarking is presented. This proposed scheme is blind, which means that it requires neither the original image nor any side information in watermark recovery. It is based on inserting the watermark bits into the coarsest scale wavelet coefficients. Three-level wavelet decomposition and a watermark equal in size to the detail sub-bands in the coarsest scale are used. Only, perceptually significant wavelet coefficients are used to embed the watermark bits. The proposed scheme differs from the traditional wavelet-based schemes in the use of quantization and non-additive watermark embedding. It produces watermarked images with less degradation than the traditional wavelet-based schemes.
Article
Full-text available
This paper presents digital watermarking methods for authorization against copying or piracy of color images. Watermarking is a very important field for copyrights of various electronic documents and media. With images widely available on the Internet, it may sometimes be desirable to use watermarks. Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image, which is overlaid on the host image, and provides a means of protecting the image. This paper presents the survey on digital watermark features, its classifications and applications. Various watermarking techniques have been studied in detail in mainly three domains: spatial, frequency and statistical domain. In spatial domain, Least-Significant Bit (LSB), SSM-Modulation-Based Technique has been developed. For DCT domain, block based approach and for wavelet domain, multi-level wavelet transformation technique and CDMA based approaches has been developed.The Discrete Wavelet Transform (DWT) is currently used in a wide variety of signal processing applications. This paper also presents the various error matrices for analyses the robustness of watermarking method.
Article
Full-text available
The proliferation of digitized media due to the rapid growth of networked multimedia systems, has created an urgent need for copyright enforcement technologies that can protect copyrightownership of multimedia objects. Digital image watermarking is one such technology that has been developed to protect digital images from illegal manipulations. In particular, digital image watermarking algorithms which are based on the discrete wavelet transform have been widely recognized to be more prevalent than others. This is due to the wavelets' excellent spatial localization, frequency spread, and multi-resolution characteristics, which are similar to the theoretical models of the human visual system. In this paper, we describe an imperceptible and a robust combined DWT-DCT digital image watermarking algorithm. The algorithm watermarks a given digital imageusing a combination of the Discrete Wavelet Transform (DWT) and the Discrete Cosine Transform (DCT). Performance evaluation results show that combining the two transforms improved the performance of the watermarking algorithms that are based solely on the DWT transform.
Chapter
This paper draws upon Normal Accident Theory and the Theory of High Reliability Organizations to examine the potential impacts of Information Technology being used as a target in terrorist and other malicious attacks. The paper also argues that Information Technology can also be used as a shield to prevent further attacks and mitigate their impact if they should occur. A Target and Shield model is developed, which extends Normal Accident Theory to encompass secondary effects, change and feedback loops to prevent future accidents. The Target and Shield model is applied to the Y2K problem and the emerging threats and initiatives in the Post 9/11 environment.
Book
Until recently, information hiding techniques received very much less attention from the research community and from industry than cryptography. This situation is, however, changing rapidly and the first academic conference on this topic was organized in 1996. The main driving force is concern over protecting copyright; as audio, video and other works become available in digital form, the ease with which perfect copies can be made may lead to large-scale unauthorized copying, and this is of great concern to the music, film, book and software publishing industries. At the same time, moves by various governments to restrict the availability of encryption services have motivated people to study methods by which private messages can be embedded in seemingly innocuous cover messages. This book surveys recent research results in the fields of watermarking and steganography, two disciplines generally referred to as information hiding.
Article
Because of the transition from analog to digital technologies, content owners are seeking technologies for the protection of copyrighted multimedia content. Encryption and watermarking are two major tools that can be used to prevent unauthorized consumption and duplication. In this paper, we generalize an idea in a recent paper that embeds a binary pattern in the form of a binary image in the LL and HH bands at the second level of Discrete Wavelet Transform (DWT) decomposition. Our generalization includes all four bands (LL, HL, LH, and HH), and a comparison of embedding a watermark at first and second level decompositions. We tested the proposed algorithm against fifteen attacks. Embedding the watermark in lower frequencies is robust to a group of attacks, and embedding the watermark in higher frequencies is robust to another set of attacks. Only for rewatermarking and collusion attacks, the watermarks extracted from all four bands are identical. Our experiments indicate that first level decomposition appear advantageous for two reasons: The area for watermark embedding is maximized, and the extracted watermarks are more textured with better visual quality.
Data hiding fundamentals and applications
  • T Husrev
  • Mahalingam Sencar
  • Ali N Ramkumar
  • Akansu
Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu,"Data hiding fundamentals and applications", Elsevier Academic Press, 2004.
Data hiding fundamentals and applications
  • Akansu
Akansu,"Data hiding fundamentals and applications", Elsevier Academic Press, 2004.