Professional Documents
Culture Documents
com
International Journal of Modern Engineering Research (IJMER) Vol.2, Issue.4, July-Aug. 2012 pp-1940-1943 ISSN: 2249-6645
Keywords:
authentication;
Discrete
Wavelet
Transform;
contour
I. INTRODUCTION
As the electronic media is get popular for communication, the secure communication is the important task in electronic media. Now a days there are large techniques available with different technologies. among them authentication is the important task for secure communication. On the basis of authentication we can able to find out the authorized user, image or data. There are number of existing technique which provides the authentication on which we can find the authorized data. The most important technique used for digital data authentication is encryption i.e. public key encryption which is also called traditional method of authentication. Another technique available is watermarking. Digital watermarking is a technique which hide some logo or data in the given image so that we prevent copyright, integrity and/or the authenticity of the original data [1-2]. Usually, a robust watermarking is used to protect the copyright while a fragile or semi-fragile watermarking is used to verify the authenticity [3-4]. Authentication of image data is a challenging task. Content modification or tampering is defined as an object appearance or disappearance, a modification to an object position, or changes to texture, color or edges. Image watermarking algorithm used to detect tampering has several essential properties. First is transparency. The embedding processing should not degrade the quality of the original digital media and should be perceptually invisible to maintain its protective secrecy and sensitivity. The embedded watermark is robust to resist normal image processing (such as JPEG compression) while it is fragile to malicious tampering to image content. The watermark is embedded in a secure way and it can't be removed illegally [5-10]. www.ijmer.com
Image=YcBcR
Apply Contour
1940 | Page
www.ijmer.com
International Journal of Modern Engineering Research (IJMER) Vol.2, Issue.4, July-Aug. 2012 pp-1940-1943 ISSN: 2249-6645 the inverse displacing, and we get the extracted watermark image W*. D(i,j)=|W(i,j)-W*(i,j)| where i,j denotes the rows and column number. Step3. The calculated image and extracted image is subtracted, the result will be used to authenticate image content.
The above diagram for the watermark embedding and details of the diagram are given in the mathematical model.
Image=YcBcR Divide Y component DWT transform Watermark Extraction Arnold Transform Extracted Contour Subtraction Authentication Result Figure 2: Watermark Extraction Process As watermark is embedded we need to extract the watermark. Block diagram for the watermark extraction are shown above.
(a)
(b)
(c)
(d) (e) (f) Figure 3: Perceptibility Test (a)Original Image (b) 2-level DWT (c) Contour Image (d) Selected area (e) Inverse DWT (f) Watermarked Image TABLE1: COMPARISION OF PSNR Block size 2x2 4x4 8x8 Watermark Region LH or HL LH or HL LH or HL PSNR 47.94 58.36 65.07
Step3.
Step4.
Step5.
Step6.
2. Operational Test: In the different operational test we found the given algorithm is best for paste attacked image.
After embedding the watermark PSNR is calculated for all these three blocks size. 2. Watermark Extraction Process Step1. Original image is executed two level DWT transforms to calculate the contour image W using Canny calculator just like the operations in watermark embedding. Step2. The watermark information is extracted from middle coefficients which are selected to embed watermark . Construct the watermark image by www.ijmer.com
(a)
(b)
(c)
1941 | Page
www.ijmer.com
International Journal of Modern Engineering Research (IJMER) Vol.2, Issue.4, July-Aug. 2012 pp-1940-1943 ISSN: 2249-6645
REFERENCES
[1] [2] (d) (e) (f) [3] I. J. Cox, M. L. Miller and J. A. Bloom, Digital Watermarking, New York: Academic Press , 2002. I. Cox, J. Kilian, F. T. Leighton and T. Shamoon, "Secure spread spectrum watermarking for ultimedia," IEEE Transactions on Image Processing, vol. 6, pp. 1673-1687, December 1997. S. Walton, Authentication for a slippery new age, Dr. Dobbs Journal, vol. 20, no. 4, pp. 18-26, April 1995. C. Lu and H. Liao, Multipurpose watermarking for image authentication and protection, IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1579- 1592, October 2001. C. Y. Lin and S. F. Chang. Semi-fragile watermarking for authenticating JPEG visual content, Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents II, San Jose, USA, vol.3971, pp.140-151, 2000. S. Yang, Z. Lu and F. Zou. A Novel Semi-fragile Watermarking Technique for Image Authentication, ICSP Proceedings, pp. 2282 2285, 2005. J. Huang, Y. Shi and W. Cheng, "Image watermarking in DCT: An embedding strategy and algorithm," Acta Electronica Sinic, vol.28, no.4,pp.57-60, 2000. (in Chinese) X. Li, "Blocked DCT and quantization based blind image watermark algorithm," Computer Engineering, vol.32, no.21, pp.139-144, 2006. (in Chinese) J. Zhang and C. Zhang, Semi-fragile watermarking for JPEG2000 image authentication, ACTA Electronica Sinica, vol.32, no.1, pp.157-160, 2004. (in Chinese) X. Wang, L. Meng and H. Yang, Geometrically invariant color image watermarking scheme using feature points, Sci China Ser F-Inf Sci, vol.52, no.9, pp.1605-1616, September.
Figure 4: (a) Original Image (b) Canny Image (c)Gray scale Image (d) Arnold Transfer (e)Inverse DWT (f) Authentication From the above results we can say that our algorithm is sensitive for the authentication of watermarked image.
[4]
[5]
V. CONCLUSION
In this paper we used DWT transform method for watermark embedding. Also due to arnold transform space relativity is get reduced. From the above result we can say that algorithm which is proposed here is good as compared to previous one. In this particular algorithm we can use any logo or another image as the watermark to embed in the given region. So it is easy to improve the result by such experiment.
[6]
[7]
[8]
[9]
[10]
www.ijmer.com
1942 | Page