Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Abstract — This paper utilizes a spatial domain Watermarking implies for the modification of the pixel values in an image and
algorithm applicable on grayscale images. Spatial domain retains the quality of the image. The Frequency and Multi-
technique is utilized taking advantage of it low computational resolution domain are transformation domains having more
complexity. The initial stage of approach is accomplished by computational complexity but provides a much stronger
building the algorithm on MATLAB R2014a© platform and then
shifting the base to ISE Design Suite 14.7© platform. The VLSI
medium for embedding Watermarks. In Frequency domain,
implementation of the spatial domain Watermarking algorithm is frequency or cosine constituents of the image are taken into
targeted on device xc5vlx50t-1ff1136 of Virtex-5 family. The consideration [8] whereas in Multi-resolution domain, Wavelet
robustness of the Watermarking algorithm is verified by attacking transformation of the image as per JPEG2000 standards is
the Watermarked image with various types of noise, compression, carried out [9]. This domain is widely used one in
transformation and geometrical attacks. The application of Watermarking as it sustains various types of attacks and
Multiple Watermarking technique also renders the effectiveness maintains the quality of the image.
and robustness of the watermarking algorithm.
Also, there are various techniques based upon the human
Keywords — Spatial domain, Threshold, Multiple Watermarking
perception system namely Visible & Invisible Watermarking
[10]. In Visible watermarking, the human eye is able to
I. INTRODUCTION distinguish the fact that some additional information has been
added to the original pixel values of the image. The Invisible
In this era of multimedia and mass communication, the watermarking accounts for Robust, Fragile or both Robust &
easy availability of multimedia contents within a blink of eye Fragile Techniques which are categorized depending upon
without copyright ownership, authentication, ownership resistance to attacks. Robust Watermarking can survive
verification has raised several issues of breaching norms of different types of Watermarking attacks and can maintain the
digital world, forgery and piracy [1]. Digital Watermarking and important information under various circumstances. It is mainly
Steganography are the promising useful solutions in the present useful for copyright protection. Fragile Watermarking process,
world of multimedia [2]. Digital watermarking is the means by on the other hand, have the watermarks that are vulnerable to
which the authenticated user of any data can maintain the Watermarking attacks and which when tampered can result in
integrity and the security of the information contained in the the loss of important data that it contained. It can be useful for
data whereas Steganography is the process of data hiding in a authentication and content verification purpose. There are also
set of media file which appears to be unimportant and the user some Watermarking methods which are Robust to some
can easily transmit the media file containing the information Watermarking attack and some specific image processing
hiding it from the attentive eyes [3,4,5]. It is a process of operations while being fragile to other attacks. Such type of
embedding the secret or special information which a user wants methods are referred to as Semi-Fragile Watermarking
to hide called as Watermark. The means of media elements like techniques by some authors [11].
image, audio, video by which a user succeeds in hiding the
information and can protect the contents or information from
forgery will serve as Host to the Watermark. Watermarking II. WATERMARKING ALGORITHM
technique finds a place in Consumer Electronics, Medical
Imaging, Data handling, Finger printing [1,6] etc. In this paper, we have used a Spatial domain Watermarking
technique by the name Save Algorithm proposed by
There are several watermarking techniques available H.H.Larijani, G.R.Rad [7] which is modified to include a fixed
depending upon the modes of embedding domain namely threshold instead of optional threshold to improve the
Spatial domain, Frequency and Multi-resolution domain [7]. computational time. The fixed threshold has been included
The Spatial domain has less computational complexity and instead of an optional value based on the fact that the human
247 243 255 137 8 if ( a & b are equal ) or (difference < Threshold)
Store (k,l) location in a vector called Secret_Key
240 235 255 138 6 Select next pixel value (i,j)
Repeat till all watermark image pixels are compared
233 226 255 137 4 End
247 255 6
Save Secret_key for comparison and Extraction
226 219 252 134 2 Save ‘B’ as WATERMARKED image
136 250 133
499
Algorithm (Extracting Process) B) Data flow for Extraction process
Input: ‘A’ is HOST image & ‘Secret_key’ is a vector Two RAMs of sizes corresponding to Host image and Secret
Output: ‘W’ is the Retrieved Watermark Image Key sizes are declared. The comparator is used to check for the
Create Size of W = m*n matrix location stored in the Secret Key with the corresponding location
in the Host image RAM. The pixel value of the matched location
Initializing counter to search for pixel location in HOST image in the Host image will be stored at the matched location of the
Secret Key in the Output RAM which is the required Watermark
While counter <= m*n Image pixels.
(i,j)
Search for a match such that-
Secret key data represents location of pixel values
W(i,j) = A(Secret_key(counter),Secret_key(counter+1))
Incrementing counter
End
Reconstructing the WATERMARK IMAGE from W(i,j) values.
500
Simulation Results Embedding & Extraction time
Threshold = 2
2.327s 233.10μs
0.348s 230.34μs
(64×64) (64×64)
Threshold = 4
Fig-6 Controller for Embedding & Extraction process 6.746s 581.766μs
0.702s 581.766μs
501
Table I – Analysis with noise and transformation attacks Table II – Analysis with Compression and Geometrical attacks
EXTRACTED EXTRACTED
ATTACKS WATERMARK PSNR NCC SSIM ATTACKS WATERMARK PSNR NCC SSIM
IMAGES IMAGES
(QF = 5)
Gaussian
Noise 19.1393 0.8877 0.4752 JPEG
(Variance = Compression 32.3980 0.9923 0.9072
0.02) (default value of
QF = 75)
Speckle
Noise 26.5161 0.9922 0.8501 (QF = 20)
(Variance =
0.02)
Scaling 11.7158 0.7676 0.2211
(In terms of
Salt & pepper
Original Host
Noise 19.7787 0.9088 0.7909
Image)
(Variance = (2 times)
0.02)
Blurring
23.9372 0.8838 0.8716 8.8387 0.0485 0.0072
Rotation
(In Degrees) (2º)
Image
Contrasting 18.9873 0.9388 0.7182
7.5428 0.0898 0.0030
(-2º)
Image
Transformation 19.1538 0.9130 0.7351
502
is utilized using the proposed algorithm and its effectiveness V. CONCLUSION
against various noise attacks has been tabulated. The watermark
images used are of size 64×64 and the Host image is same as Thus, we can conclude that the proposed Watermarking
used for testing the proposed algorithm. Embedding technique when targeted on Hardware wherein
FPGA Virtex-5 board was utilized is fast as compared to
software implementation wherein MATLAB 2014a© Platform
was utilized and is robust to various noise attacks, compression
Table III – Multiple Watermarking Analysis attacks and transformation but fragile to geometrical attacks.
The proposed algorithm also gives flexibility of utilizing
Multiple Watermarking technique with different watermark
images.
503