Permutation Based Invisible Digital Watermarking Technique Using DCT Domain
Permutation Based Invisible Digital Watermarking Technique Using DCT Domain
( ) ( ) ( ) ( )
( ) ( )
1 1
0 0
2 1 2 1
, , cos cos
2 2
N N
u v
x u y v
f x y a u a v C u v
N N
t t
= =
+ + | | | |
=
| |
\ . \ .
Here C is the DC transformed block, f is the inverse DCT block
and u = 0,1,2, ...,K 1,v = 0,1,2, ...L1; K and L are length and
breadth of the image. a(u) and a(v) are defined in the following
equation.
( )
1
0
,
2
,
1 1
u
K
u K
K
a u
=
s s
( )
1
0
,
2
,
1 1
v
L
v L
L
a v
=
s s
16 11 10 16 24 40 51 61
12 12 14 19 26 48 16 55
14 13 16 24 40 57 69 56
14 17 22 29 51 87 80 62
18 22 37 56 68 109 108 77
24 35 55 64 81 104 113 92
49 64 78 87 103 121 120 101
72 92 95 98 112 100 103 99
International Journal of Computer Applications (0975 8887)
Volume 31 No.6, October 2011
42
3. WATERMARK EMBEDDING AND
EXTRACTING PROCESS
In Embedding process insert or embed the watermark
information within the original image by modifying all or
selected pixel values (spatial domain); or coefficients (frequency
domain), in such a way that the watermark is undetectable to
human eye and is achieved by minimizing the embedding
distortion to the host image [8].
The system block diagram for the embedding process is shown
in Figure 3.
Figure 3: Watermark Embidding Process
The watermark extraction follows a reverse embedding
algorithm, but with a similar input parameter set [9]. In this
paper we used the DCT domain for Watermark embedding and
extracting process on permuted image.
4. WATERMARK EMBEDDING
ALGORITHM
The algorithm which is used to embed a watermark on an image
is given below. We take input as Original Image and Watermark
data and produce output as Watermarked Image.
Step1: Start
Step2: Read input gray scale Image in 256 256 standard and
Watermark Data.
Step3: If the Watermark is small then it is padded with ones
(1s) so the small watermark image scale up to the max message
length for original image.
Step4: Permuted the original image using pseudo random
sequence.
Step5: Perform DCT on Each 8*8 block of image and Embed
the watermarking information into the (3,3) and (4,4) pixel of
the 8x8 DCT coefficient block by classical coefficient exchange
scheme. DCT of each block is calculated.
Step6: DCT co-efficient at the position say (3,3) and (4,4) are
compared for every block. The DCT block will encode a 0 if
pixel at position (3,3) is greater than or equal to the pixel at the
position (4,4) otherwise it will encode a 1. The coefficients are
then swapped if the relative size of each coefficient does not
agree with the bit that is to be encoded.
Step7: Re-permuted the image.
Step8: Stop.
The insertion of the watermark in the mid band of the coefficient
block of each averaged DCT block gives extra robustness to the
watermark.
5. WATERMARK EXTRACTING
ALGORITHM
For check the original image is watermarked or not, after
embedding the watermark into original image we apply the
watermark extracting algorithm. The algorithm which is used to
extract a watermark is given below.
Step1: Start
Step2: Permuted the Watermarked Image pseudo random
sequence.
Step3: Subdivide the Watermarked image into 8x8 sub-images
using DCT domain.
Step4: DCT co-efficient at the position say (3,3) and (4,4) are
compared for every block. If pixel at position (3,3) is greater
than or equal to the pixel at the position (4,4) then Watermark
bit hidden would be black or DCT block will encode a 0 else
white or DCT block will encode a 1.
Step5: Stop.
6. SIMULATION RESULTS AND THEIR
ANALYSIS
Two metrics for quality of watermarked images have been used
which are Peak Signal to Noise Ratio (PSNR) and Similarity
Factor(SM).
In order to test the performance of this watermarking scheme,
we have used 256256 gray scale images which are Lighthouse,
Girl and Pepper. The original watermark is shown in figure 4.
The watermarked images and the extracted watermark are
shown in figure 5-7.
For image with 255 gray levels, the PSNR is defined as:
( )
2
10
255
10log PSNR db
MSE
| |
= |
|
\ .
Where MSE is the mean square error of two images of N x N
pixels is defined as
( )
2
'
2
1 1
1
N N
ij ij
i j
MSE p p
N
= =
=
Where P
ij
is the original pixel value and
'
ij
p is the reconstructed
pixel value.
The similarity factor has value [0,1] calculated using following
equation . If SM = 1 then the embedded watermark and the
extracted watermark are same. Generally value of SM>.75 is
accepted as reasonable watermark extraction.
( ) ( )
( ) ( )
*
1 1
2 2
*
1 1 1 1
, ,
, ,
M N
M M
i j
M N M N
M M
i j i j
W i j W i j
SM
W i j W i j
= =
= = = =
=
Where W
M
is Original Watermark and
*
M
W is detected
watermark.
International Journal of Computer Applications (0975 8887)
Volume 31 No.6, October 2011
43
Figure 4: Original Watermark and extract watermark
Figure 5: Permuted Lighthouse image and Watermarked
Lighthouse image
Figure 6: Permuted Girl image and Watermarked Girl
image
Figure 7: Permuted Pepper image and Watermarked Pepper
image
The following Table 2 shows the PSNR of the different
watermarked images and the Similarity factor (SM) of their
extract watermarks.
Table 2: PSNR and SM values for different images
Image Degree of
Permutation
PSNR(db) SM(db)
Lighthouse 100
200
400
40.36
39.93
36.13
0.89
0.90
0.97
Girl 100
200
400
43.94
43.22
40.10
0.99
0.99
1.00
Pepper 100
200
400
44.87
40.79
34.62
0.99
0.99
1.00
When PSNR is higher than 30, Watermarked image has a very
good quality and the eye could hardly tell the difference between
the original and the Watermarked image. While when SM is
higher than 0.75, the extracted Watermarked is considered as
valid one. From the above Table we can safely say that the
watermarking schema discuss in this paper has a good
invisibility and can extract the marks correct. Figure 8 show the
graph between SM and different degree of permutation.
Figure 8: SM values of different watermarked images are
increases using permutation
7. CONCLUSION
Digital Watermarking is the process of inserting watermark data
into original images in a way that the degradation of quality is
minimized and remain in an invisible level. Many digital
watermarking algorithms have been proposed in special and
transform domains. The techniques in the spatial domain still
have relative low-bit capacity. On the other hand, frequency
domain-based techniques can embed more bits for watermark
International Journal of Computer Applications (0975 8887)
Volume 31 No.6, October 2011
44
and are more robust to attack. In this paper, we use DCT
transform watermark algorithms based on robustness.
We use the permutation method for more secure watermarking
algorithm. The robustness of the watermarking methods has
been measured by computing the Peak Signal to Noise Ratio
(PSNR) of the Watermarked Image and Similarity between
original Watermark and extract Watermark using Similarity
Factor (SM).
8. ACKNOWLEDGEMENTS
We would like to express our gratitude to experts Professor
Naveen Hemrajani, Dean (Engineering), Associate Prof.
Vibhakar Pathak (HOD, IT Department) and Inder Pratap Singh
(Asst.Professor, IT) for their guidance and contributions. We
would also like to thank for the valuable informations they
provided us. We would like to thank our family members for the
love and care.
9. REFERENCES
[1] J. R. Hemandez, M. Amado, DCT domain watermarking
techniques for still images as detector performance analysis
and a new structure, in IEEE Transactions on Image
Processing, 2000, vol. 9, pp. 55-68.
[2] Q. Du, Color image digital watermarking algorithm based
on DCT and quantifying, in Journal of Soochow
university, 2006, vol. 26, pp. 47-51.
[3] Z. M. Zhang, L. Wang, Semiblind image watermarking
algorithm in DCT domain with chaotic encryption, in
Computer Engineering, 2003, vol. 29, pp. 10.
[4] L. S. Liu, R. H. Li, Q. Gao, Method of embedding digital
watermark into the green component of color image, in
Journal of XianJiaotong university, 2004, vol. 38, pp. 1256-
1259.
[5] N. Bourbakits and C. Alexopoulos, Picture data
encryption using scan patterns, Pattern Recognition, Vol.
25, No. 6, 1992, pp. 567581.
[6] L. Wei, H. T. Lu, F. L. Chung, Robust digital image
watermarking based on subsampling, in Applied
Mathematics and Computation, 2006, vol. 181, pp. 886-
893.
[7] S. Z. Yu, A color image-adptive watermark based on
wavelet transform, in Computer Simulation, 2006, vol. 23,
pp. 132-134.
[8] C. C. Chang and H. M. Tsai, A generalized secret sharing
scheme, Journal of Systems and Software, Vol. 36, No. 3,
1997, pp. 267272.
[9] C. C. Chang, J. Y. Hsiao, and C. S. Chan, Finding optimal
LSB substitution in image hiding by using dynamic
programming strategy, Pattern Recognition, Vol. 36, No.7,
2003, pp.15831595.