Impact factor 1.472 “International Journal for Science and Emerging ISSN No. (Online):2250-3641 Technologies with Latest Trends” 18(1): 22- 26(2014) ISSN No. (Print): 2277-8136 A Survey on Image Watermarking Techniques Surbhi*, Ashish Malhotra** and Rajesh Kochher*** * Research Scholar, DAVIET, Jalandhar **Asst. Prof.-ECE Dept DAVIET, ***Asst. Prof.-IT Dept DAVIET Punjab, India. (Received 28 September 2014 Accepted 13 October 2014) Abstract-Together with an explosive growth in the use of internet and high speed computer networks; the use of digitally formatted data has increased many folds i.e. the data can be easily plagiarized, modified or deleted without proper authentication and authorization. This has led to a need for effective copyright protection tools. Digital Watermarking promises to address these issues. This paper gives a survey of Digital Image Watermarking which helps general readers have an overview of digital image watermarking including the definition, system requirements and process involved. In addition, the future research directions of digital image watermarking are discussed. Keywords-Image Watermarking, Discrete Cosine Transform, Discrete Wavelet Transform. I. INTRODUCTION The unprecedented increase in piracy and digital criminality over the past years has stimulated interest in the field of watermarking to enhance protection against violations of copyrighted digital material such as digital images. This means that the use of digital media for image sequences has put some serious implications for copyright control issues. As usual there is no such thing as a free lunch and the price paid for access to a potentially global audience via the internet is the lack of control over reuse of content. For example, if a particular of a website contains a photograph, anyone looking at the page can use their browser to save the image in digital form at disk. The captured image can be then used again in ways not intended by the copyright owner of the material [3, 26, 28, 34]. In order to address these issues, Digital Watermarking has emerged as a solution. Embedding of digital watermarks into multimedia data helped a lot to prevent illegal copying and modification of data. Digital Watermarking is basically a process of embedding information in a carrier or host image in order to protect the Ownership of image and the signal embedded into the host image to be protected is called a Watermark. A digital watermark is information that is imperceptibly and robustly embedded in the host data such that it cannot be removed. A watermark typically contains information about the origin, status or recipient if host data [3, 8, 29]. The basic requirements in watermarking scheme are very intuitive and applies to all media. The requirements are as follows [29]: A watermark should be secret so that only the authorised users can legally detect, extract and even modify the watermark. A watermark should stay in the host data regardless of whatever happens to the host data including all signal processing operations that may occur and including all attacks that unauthorised parties may attempt. 23. Surbhi*, Ashish Malhotra** and Rajesh Kochher*** A watermark should, though be ing irremovable that is it should be imperceptible. In terms of embedding domain, watermarking algorithms are divided into two groups: Spatial Domain Watermarking Techniques and Frequency Domain Watermarking Techniques as shown in figure 1. In Spatial Domain; the watermark embedding is done on image pixels while in frequency domain; the embedding is done after taking image transforms. Impact factor 1.472 watermarking process. Section III reviews various frequency domain image watermarking techniques. Section IV summarizes and concludes this paper on digital watermarking techniques and finally draws a future scope of this paper. II. GENERAL FRAMEWORK DIGITAL WATERMARKING OF A digital watermarking system usually consists of two frameworks [13] as shown in figure 2: 1) Embedding Framework: In this framework, first the RGB channels of host image will be converted into the intended channels followed by the decomposition of first channel into DWT sub-bands. A target sub-band will then be used for embedding the watermark. 2) Extraction Framework: In this framework, the original image can be recovered back from the watermarked image using various filters and detectors. Figure 1. Classification Watermarking of Digital Spatial Domain techniques developed earlier are not resistant enough to image compression and other image processing operations. Although spatial domain techniques are easier to implement but are limited in robustness while frequency domain techniques embed watermark with more robustness and imperceptibility. With the development of digital watermarking, spatial techniques due to their weakness in robustness are generally abandoned and frequency domain algorithms become the research focus. This paper concentrates on digital watermarking for images in frequency domain. The rest of the paper is organised as follows. Section II gives an insight into the Figure 2. Watermark Embedding/Extraction Model III. IMAGE TECHNIQUES WATERMARKING Commonly used frequency domain image watermarking techniques include the DWT, the DCT and DFT. However, DWT has been used more frequently due to its spatio-localization and multi-resolution characteristics. 24. Surbhi*, Ashish Malhotra** and Rajesh Kochher*** A. DISCRETE WAVELET TRANSFORM DWT decomposes an image into a set of band limited components which can be reassembled to reconstruct the original image without error [9]. Wavelet Transform basically describes a multiresolution decomposition process in terms of expansion of an image onto a set of wavelet basis functions. The transform is based on small waves called wavelets of varying frequency and limited duration. These wavelets are created by translations and dilations of a fixed function called Mother Wavelet [1, 12]. The basic idea of DWT is to separate frequency detail, which is what we call multi-resolution decomposition. One time of decomposition can divide main image to four sub graph as the size of a quarter as shown in figure 3. Figure 3. DWT Decomposition of Image Using 1-Level Pyramid Embedding watermark in lower frequency band LLx may degrade the image as most of the image energy is concentrated there. On the other hand, the high frequency band HHx include the edges and textures of the image and human eye is not generally sensitive to changes in such sub-bands. This allows the watermark to be embedded without being perceived by the human eye. Thus the watermark is to be embedded into the middle frequency sub-bands LHx and HLx where acceptable performance of imperceptibility and robustness could be achieved [10, 12]. B. DISCRETE COSINE TRANSFORM The DCT is a separable linear transform which converts a signal from Impact factor 1.472 spatial representation into frequency representation and helps reducing the amount of data needed to describe the image without sacrificing too much image quality [2]. The popular block based DCT transform segments image nonoverlapping blocks and applies DCT to each block. This results in giving three coefficient sets: low frequency sub-band, mid frequency sub-band and high frequency sub-band. DCT based watermarking is based on two facts. The first fact is that much of the signal energy lies at low frequency sub-band which contains the most important visual parts of the image. The second fact is that high frequency components of image are usually removed through compression and noise attacks. The watermark is therefore embedded by modifying the coefficients of middle frequency sub-band so that the visibility of the image will not be affected. The disadvantage of using DCT for embedding watermark is that they are less robust than DWT against different attacks [9, 12]. C. JOINT DWT-DCT The reason of applying two transforms is based on the fact that joint transform could make up for the disadvantages of each other. The application of joint DWTDCT results in higher imperceptibility and robustness [2, 8]. IV. CONCLUSION FUTURE DIRECTIONS AND In this overview paper, we have reviewed the most important basic concepts in digital watermarking including its foundation, requirements and watermark framework. After that, common frequency domain watermarking techniques are introduced with analysis of pros and cons in terms of imperceptibility and robustness. Impact factor 1.472 25. Surbhi*, Ashish Malhotra** and Rajesh Kochher*** Our future work will rely on the implementation and evaluation of joint DWT-DCT based image watermarking over HVS based and application based colour spaces. [10] [11] REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] M. Khalili and D. Asatryan, (2013) “Colour Spaces effects on improved discrete wavelet transform based digital image watermarking using Arnold Transform Map”, IET Signal Process, Vol. 7, pp177. R. Dubolia and R. Gupta, (2011) “Digital Image Watermarking by using DWT and DCT and Comparison based on PSNR”, IEEE Communication Systems and Network Technologies, pp. 593-596. F. Lusson and K. Curran, (2013) A novel approach to digital watermarking, exploiting colour spaces”, Elsevier Trans. on Signal Processing, pp. 1268-1294. N. Bhargava, M.M. Sharma and M. Mathuria, (2012) “Digital Image Authentication System Based on Digital Watermarking”, IEEE Trans. on Radar, Communication and computing, pp. 185189. A. Sharma and A. Ganguly, (2012) “Image Watermarking in DCT-DWT Domain”, IRNet Trans on Electrical and Electronics Engineering, Vol. 1, No. 2, pp. 1-5. N.V. Dharwadkar; G.K. Kulkarni and B.B. Amberker, (2012) “The Image Watermarking Scheme Using Edge Information in YCbCr Colour Space”, Proc. 3rd International Conf. on Information Security and Artificial Intelligence, vol. 56, pp. 1-7. M. Jiansheng; L. Sukang and T. Xiaomei, (2009) “A Digital Watermarking Algorithm Based on DCT and DWT”, Proc. International Symposium on Web Information Systems and Applications, pp. 104-107. S.P. Singh; P. Rawat and S. Agrawal, (2012) “A Robust Watermarking Approach using DCT-DWT”, IJETAE, Vol. 2, No. 8, pp. 1-6. S.K. Amirgholipour and A.R. NaghshNilchi, (2009) “Robust Digital Image Watermarking Based on Joint DWTDCT”, IJDCTA, Vol. 3, pp. 1-13. [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] Ali Al-Haj (2007) “Combined DWT-DCT Digital Image Watermarking”, Journal of Computer Sciences, Vol. 3, No. 9 pp. 740746. R.V. Totla and K.S. Bhapat, (2013) “Comparative Analysis of Watermarking in Digital Images using DCT and DWT”, International Journal of Scientific and Research Publications, Vol. 3, No. 2, pp.14. N. Chaturvedi and Dr. S.J. Bahsa, (2012) “Comparison of Digital Image Watermarking Methods DWT and DWTDCT on the Basis of PSNR”, IJIRSET, Vol. 1, No. 2, pp. 147-153. K.D. Megha, N.P. Vaidya and K. Patel, (2013) “Digital watermarking: Data Hiding Techniques using DCT-DWT Algorithm”, IJARCCE, Vol. 2, No. 6, pp.2397-2402. R. Anju and Vandana, (2013) “Modified Algorithm for Digital Image Watermarking Using DCT and DWT”, IJICT, Vol. 3, No. 7, pp.691-700. M.J. Joshi, Z.H. Shah and K.N. Brahmbhatt, (2011) “Watermarking in DCT-DWT Domain”, IJCSIT, Vol.2, pp. 717-720. N. Goel and N. Chandra, (2013) “Analysis of Image Watermarking Algorithms”, International Journal of Computer Applications, Vol. 65, No. 10, pp. 14-17. A.A. Saleh and M.A. Abdou, (2013) “Evolutionary Computation Methods in Image Watermarking”, International Journal of Computer Applications, Vol. 63, No. 10, pp. 1-6. M. Yuvaraj, Surakha P. and S. Sumanthi, (2010) “An Efficient Optimization Technique for Digital Watermarking in Image Processing”, IEEE Conf on Intelligent Control and Information Processing, pp. 803-808. Dr. V. Singh (2011) “Digital Watermarking: A Tutorial”, Cyber Journals in Science and Technology, pp. 10-21. M. Ramaiya and R. Mishra, (2012) “Digital Security using Watermarking Techniques via Discrete Wavelet Transform”, National Conference on Security Issues in Network Technologies, pp. 1-8. Lin Liu (2010) ece.sunysb.edu Impact factor 1.472 26. Surbhi*, Ashish Malhotra** and Rajesh Kochher*** [22] [23] [24] [25] [26] [27] [28] [29] N. Goel and N. Chandra, (2013) “Analysis of Image Watermarking Algorithms”, IJCA, vol. 65. M.S. Smitha Rao, A.N. Jyothsna and R.P. Pinaka, (2012) “Digital Watermarking: Applications, Techniques and Attacks”, IJCA, Vol. 44. C.T. Hsu and J.L. Wu, (1999) “Hidden Digital Watermarks in Images”, IEEE Trans. On Image Processing, Vol.8, pp111. R.K. Sharma and S. Decker, (2001) “Practical challenges for Digital Watermarking Applications”, IEEE Trans. On Image Processing. Mahmoud El-Gayyar, (2006) “Digital Rights Seminar on Watermarking Techniques”, Media Informatics, University of Bonn, Germany. C.I. Podilchuk and E.J. Delp, (2001) “Digital Watermarking: Algorithms and Applications”, IEEE Signal Processing Magazine, pp33-46. R. Barnett (1999) “Digital Watermarking: Applications, techniques and challenges”, Electronics and Communication Engineering Journal, pp173-183. F. Hartung and M. Kutter, (1999) “Multimedia Watermarking Techniques”, Proc. of the IEEE, vol.87, pp1079-1107. [30] [31] [32] [33] [34] [36] P.M. Naini, Engineering Education and Research in Image Watermarking using MATLAB. Y.J. Song and T.N.Tan, (2000) “Comparison of Four Different Digital Watermarking Techniques”, Proc. of IEEE on signal processing. J. Abraham (2013) “A Multi-purpose Dual Watermarking Scheme”, IJCA, Vol.77. M. Narang and S. Vashisth, (2013) “Digital Watermarking using Discrete Wavelet Transform”, IJCA, Vol.74. P. Dabas and K. Khanna, (2013) “A Study on Spatial Domain and Transform Domain Watermarking Techniques”, IJCA, Vol.71. C.C. Ramos, R. Reyes, M.N. Miyatake and H.M. Perez Meana, (2011) “Watermarking-Based Image Authentication System in the Discrete Wavelet Transform Domain, Discrete Wavelet Transforms - Algorithms and Applications”
© Copyright 2024 ExpyDoc