Sei sulla pagina 1di 5

International Journal of Advanced and Innovative Research (2278-7844) /

Volume 6 Issue 12

Robust Watermarking Using Dwt-Svd & Torus


Automorphism (DSTA) Based With High
PSNR
Prateek Shrivastava, SRIST, Jabalpur
Md.Suhel, SRIST, Jabalpur

Abstract: Proposed work is another arrangement Figure 1 watermarking hiding scenario


of picture watermarking which join pre-preparing
of cover picture with DWT and SVD, Proposed The major problems of secure data communication
work using an alphanumeric key which at first are as follow:-
alters watermark using fundamental 'XOR' Watermarking is an overhead for communication
operation, and at beneficiary end this key must be system it is requires just to secure data but not
there so recipient may remove watermark. necessary for data communication. In
Proposed work is moreover using torus watermarking the measure of cover picture must
Automorphism which at first change watermark be high than watermark picture. We can't utilize
into a scramble plan which can't be affirmation as same calculation for all kind of cover picture and
remarkable watermark. Case picture from database watermark. In watermarking the ideal opportunity
has been picked as cover picture and host picture. for concealing watermark ought to be sufficiently
Viability of figuring took a gander at by using low so it doesn't bother correspondence. To start
parameter, for example, PSNR, BER and MSE. It with issue is to keep up adjust between subtlety,
has been found that PSNR upgrade by 10.64%. heartiness and limit as expanding one factor
This exhibits capability of computation. The work unfavorably influence on other and a decent
is been design and attempted on MATLAB 2013 computerized watermarking framework have
test framework above element. To accomplish great intangibility,
Keywords: DWT: Discrete Wave Transform, watermark ought to be implanted in high
SVD: Singular Value Decomposition, TA: Torus recurrence segment though vigor happens in low
Automorphism, AS: Arnold scrambling, LL: rough recurrence segment.
band, LH: Vertical Band, HL: Horizontal band, II-METHODOLOGY
HH: askew detail band Proposed work is another outline of picture
I-INTRODUCTION watermarking which incorporate first pre-handling
There are a few picture watermarking plans with a of cover picture with DWT and SVD. DWT based
test to give both perceptual quality and in addition watermarking can be versatile and as cover picture
power against assaults, as these two measures changes, its frequencies likewise get changes so
struggle with each other. As indicated by the area the watermark picture additionally get stows away
of installing, there are two kinds of watermarking at various areas and spread at various areas. SVD
plans - spatial space and change space based is been connected for concealing bits of watermark
watermarking plans. Spatial area watermarking and SVD is been taken of 8x8 piece which shroud
plans install watermark by changing pixels of host a solitary piece of watermark at 64 diverse
picture, while change space plans insert watermark particular estimations of each square, in light of
in change space coefficients. SVD affect all sort of correspondence assaults like
tweak, clamor, pressure and channel can be
Cover abstained from, Changing SVs somewhat does not
Image influence the nature of the flag and if nature of flag
(C) Watermarking Cipher changes because of some other reason SVs still get
Image marginally change as contrast with different
Watermark (Ci)
Ci=f(C,W) specimens of flag. So if in correspondence some of
Image De-Watermarking
(W)
SVs changes our singles bit which is covered up at

34
©2017 IJAIR. All Rights Reserved
http://ijairjournal.com
International Journal of Advanced and Innovative Research (2278-7844) /
Volume 6 Issue 12

8x8=64 SVs areas still can be recouped. Proposed 𝒙(𝒏)𝑳𝑳 = 𝒙(𝒏)𝑳 𝒈(𝟐𝒏 − 𝒌) (𝟑) 𝒙(𝒏)𝑳𝑯
work utilizing an alphanumeric key which at first 𝒌 ∞

alters the watermark utilizing straightforward
= 𝒙(𝒏)𝑳 𝒉(𝟐𝒏 − 𝒌) (𝟒)
'XOR' operation, and at the collector end this key 𝒌 ∞

must be there so recipient can remove the
𝒙(𝒏)𝑯𝑳 = 𝒙(𝒏)𝑯 𝒈(𝟐𝒏 − 𝒌) (𝟓) 𝒙(𝒏)𝑯𝑯
watermark. Proposed work is likewise utilizing 𝒌 ∞
torus Automorphism which at first change the ∞

= 𝒙(𝒏)𝑯 𝒉(𝟐𝒏 − 𝒌) (𝟔)


watermark into a scramble organize which can't be 𝒌 ∞
acknowledgment as unique watermark, this gives Equation (3), (4), (5) and (6) are the level one
additional security of the watermark and if some DWT decomposition
interloper recoup watermark from cover picture, he
will get a scramble watermark which will ∞

𝒙(𝒏)𝑯𝑯𝑯 = 𝒙(𝒏)𝑯𝑯 𝒈(𝟐𝒏 − 𝒌) (𝟕) 𝒙(𝒏)𝑯𝑯𝑳


additionally expected to get in its unique shape. 𝒌 ∞

= 𝒙(𝒏)𝑯𝑯 𝒉(𝟐𝒏 − 𝒌) (𝟖)


ALGORITHM ADOPTED FOR
𝒌 ∞
WATERMARKING: Let C is the cover image of

MxN size and W is the watermark image of PxQ 𝒙(𝒏)𝑳𝑳𝟏 = 𝒙(𝒏)𝑯𝑯𝑳 𝒈(𝟐𝒏 − 𝒌) (𝟗) 𝒙(𝒏)𝑳𝑯𝟏
size, DWT applied on ‘C’, proposed work use 𝒌 ∞

‘sym4’ type wavelet for decomposition of Cover
= 𝒙(𝒏)𝑯𝑯𝑳 𝒉(𝟐𝒏 − 𝒌) (𝟏𝟎)
image 𝒌 ∞

𝒙(𝒏)𝑯𝑳𝟏 = 𝒙(𝒏)𝑯𝑯𝑯 𝒈(𝟐𝒏 − 𝒌) (𝟏𝟏) 𝒙(𝒏)𝑯𝑯𝟏


𝒌 ∞
Sym h0 = - g0 = - ∞

4 0.0757657148, 0.0322231006, = 𝒙(𝒏)𝑯𝑯𝑯 𝒉(𝟐𝒏 − 𝒌) (𝟏𝟐)



h1 = - g1 = - 𝒌
Equation (9), (10), (11) and (12) are the level one
0.0296355276 0.0126039673 DWT decomposition
h2 = 0.497618667 g2 = 0.099219543
6, 6,
h3 = 0.803738751 g3 = 0.297857795
8 6
h4 = 0.297857795 g4 = -
6, h5 = - 0.8037387518,

0.0992195436 g5 = 0.497618667
𝒙(𝒏)𝑯𝑯𝟏𝑯 = 𝒙(𝒏)𝑯𝑯𝟏 𝒈(𝟐𝒏 − 𝒌) (𝟏𝟑) 𝒙(𝒏)𝑯𝑯𝟏𝑳
h6 = - 6 𝒌 ∞

0.0126039673, g6 = 0.029635527
= 𝒙(𝒏)𝑯𝑯𝟏 𝒉(𝟐𝒏 − 𝒌) (𝟏𝟒)
h7 = 0.032223100 6, g7 = - 𝒌 ∞
6 0.0757657148 Equation (9), (10), (11) and (12) are the level one
DWT decomposition
Figure 2 DWT HP and LP coefficient generation ∞


𝒙(𝒏)𝑳𝑳𝟐 = 𝒙(𝒏)𝑯𝑯𝟏𝑳 𝒈(𝟐𝒏 − 𝒌) (𝟏𝟓) 𝒙(𝒏)𝑳𝑯𝟐
𝒌 ∞
𝒙(𝒏)𝑳 = 𝒙(𝒌)𝒈(𝟐𝒏 − 𝒌) (𝟏) 𝒙(𝒏)𝑯 ∞

𝒌 ∞

= 𝒙(𝒏)𝑯𝑯𝟏𝑳 𝒉(𝟐𝒏 − 𝒌) (𝟏𝟔)
𝒌 ∞
= 𝒙(𝒌)𝒉(𝟐𝒏 − 𝒌) (𝟐) ∞

𝒌 ∞ 𝒙(𝒏)𝑯𝑳𝟐 = 𝒙(𝒏)𝑯𝑯𝟏𝑯 𝒈(𝟐𝒏 − 𝒌) (𝟏𝟕) 𝒙(𝒏)𝑯𝑯𝟐


𝒌 ∞

Where g and h coefficients taken from the table = 𝒙(𝒏)𝑯𝑯𝟏𝑯 𝒉(𝟐𝒏 − 𝒌) (𝟏𝟖)
3.1. DWT2 is use for Images for two dimension 𝒌 ∞

DWT, hence 𝒙(𝒏)𝑳 and 𝒙(𝒏)𝑯 further need to


filtered as below Equation (15), (16), (17) and (18) are the level one
DWT decomposition

35
©2017 IJAIR. All Rights Reserved
http://ijairjournal.com
International Journal of Advanced and Innovative Research (2278-7844) /
Volume 6 Issue 12

Size of 𝒙(𝒏)𝑯𝑯 is (MxN)/4 size and 𝒙(𝒏)𝑯𝑯𝟏 is 𝑥1 −𝑥2 −𝑥3 −𝑥4 −𝑥5 −𝑥6 −𝑥7 −𝑥8
𝑥8 𝑥1 −𝑥2 −𝑥3 −𝑥4 −𝑥5 −𝑥6 −𝑥7
(MxN)/16 and 𝒙(𝒏)𝑯𝑯𝟐 is (MxN)/64, Let size of 𝑥7 𝑥8 𝑥1 −𝑥2 −𝑥3 −𝑥4 −𝑥5 −𝑥6
𝒙(𝒏)𝑯𝑯𝟐 is RxS where R=M/8 and S=N/8. SVD 𝑈 = 𝑥6 𝑥7 𝑥8 𝑥1 −𝑥2 −𝑥3 −𝑥4 −𝑥5
𝑥5 𝑥6 𝑥7 𝑥8 𝑥1 −𝑥2 −𝑥3 −𝑥4
taken of 8x8 block of 𝒙(𝒏)𝑳𝑳𝟐 , 𝒙(𝒏)𝑳𝑯𝟐 , 𝑥4 𝑥5 𝑥6 𝑥7 𝑥8 𝑥1 −𝑥2 −𝑥3
𝒙(𝒏)𝑯𝑳𝟐𝟐 𝒂𝒏𝒅 𝒙(𝒏)𝑯𝑯𝟐 means at each DWT 𝑥3 𝑥4 𝑥5 𝑥6 𝑥7 𝑥8 𝑥1 −𝑥2
𝑥2 𝑥3 𝑥4 𝑥5 𝑥6 𝑥7 𝑥8 𝑥1
decomposed level 𝒙(𝒏)𝑳𝑳𝟐 , 𝒙(𝒏)𝑳𝑯𝟐 , And if
𝒙(𝒏)𝑯𝑳𝟐𝟐 𝒂𝒏𝒅 𝒙(𝒏)𝑯𝑯𝟐 will have total RxS/64 𝑊2 = 𝐵1 𝑥𝐵1
SVD. We total 4 𝒙(𝒏)𝑳𝑳𝟐 , 𝒙(𝒏)𝑳𝑯𝟐 , (𝑊2 − 𝜎 𝐼)𝑥 = 0 (𝟐𝟏)
𝒙(𝒏)𝑯𝑳𝟐𝟐 𝒂𝒏𝒅 𝒙(𝒏)𝑯𝑯𝟐 components after three And if values of 𝝈𝒊 again put into equation (21) we
level DWT decomposition. Means (RxS/64)x4 obtain x1, x2, x3, x4, x5, x6 x7 and x8 value
watermark bit can be hide. And as known R=M/8
𝑥1 𝑥2 𝑥3 𝑥4 𝑥5 𝑥6 𝑥7 𝑥8
and S=N/8 −𝑥8 𝑥1 𝑥2 𝑥3 𝑥4 𝑥5 𝑥6 𝑥7
−𝑥7 −𝑥8 𝑥1 𝑥2 𝑥3 𝑥4 𝑥5 𝑥6
𝑡𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑡 𝑜𝑓 𝑤𝑎𝑡𝑒𝑟𝑚𝑎𝑟𝑘 𝑏𝑖𝑡 𝑡ℎ𝑎𝑡 𝑐𝑎𝑛 𝑽 = −𝑥6 −𝑥7 −𝑥8 𝑥1 𝑥2 𝑥3 𝑥4 𝑥5
−𝑥5 −𝑥6 −𝑥7 −𝑥8 𝑥1 𝑥2 𝑥3 𝑥4
𝑅𝑥𝑆𝑥4 𝑀𝑥𝑁𝑥4 𝑀𝑥𝑁 −𝑥4 −𝑥5 −𝑥6 −𝑥7 −𝑥8 𝑥1 𝑥2 𝑥3
𝑏𝑒 ℎ𝑖𝑑𝑒 𝑖𝑛 𝑐𝑜𝑣𝑒𝑟 = = = −𝑥3 −𝑥4 −𝑥5 − 𝑥6 −𝑥7 −𝑥8 𝑥1 𝑥2
64 8𝑥8𝑥64 1024 −𝑥2 −𝑥3 −𝑥4 −𝑥5 −𝑥6 −𝑥7 −𝑥8 𝑥1

Here we are explaining the Calculation of SVD for U, S and V computed for each 8x8 block of all
𝒙(𝒏)𝑯𝑯𝟐 only although it is been computed for all level three DWT decomposed
8x8 block of 𝒙(𝒏)𝑳𝑳𝟐 , 𝒙(𝒏)𝑳𝑯𝟐 , 𝒙(𝒏)𝑳𝟐𝟐 𝒂𝒏𝒅 𝒙(𝒏)𝑯𝑯𝟐 ,
𝒙(𝒏)𝑳𝑳𝟐 , 𝒙(𝒏)𝑳𝑯𝟐 , 𝒙(𝒏)𝑯𝑳𝟐𝟐 𝒂𝒏𝒅 𝒙(𝒏)𝑯𝑯𝟐 As explain above.

Let B1 is the first 8x8 block of 𝒙(𝒏)𝑯𝑯𝟐 . the 𝑈 ( ) , 𝑆 ( ) ,𝑉 ( )


singular value decomposition of an 8x8 real = 𝑆𝑉𝐷(𝑥(𝑛) ) (22) 𝑈 ( ) ,𝑆 ( ) ,𝑉 ( )
= 𝑆𝑉𝐷(𝑥(𝑛) ) (23)
matrix B1 is a factorization of the form 𝑼𝑺𝑽𝑻 , 𝑈 ( ) , 𝑆 ( ) ,𝑉 ( )
where U is an 8x8 real matrix, S is = 𝑆𝑉𝐷(𝑥(𝑛) ) (24) 𝑈 ( ) ,𝑆 ( ) ,𝑉 ( )
a 8x8 rectangular diagonal matrix with non- = 𝑆𝑉𝐷(𝑥(𝑛) ) (25)
negative real numbers on the diagonal, and V is
an 8x8 real or complex unitary matrix. The On the other hand W is the watermark image of
diagonal entries 𝝈𝒊 of S are known as the singular PxQ size will logical XOR with the 8 bit key ‘K’
values of B1. The columns of U and the columns W1= (W xor K) (26)
of V are called the left-singular vectors and right- The Torus Automorphism disarranges the
singular vectors of B1, respectively. watermark bits equally and randomly before
embedding and reconstructing it after extraction.
𝑊1 = 𝐵1𝑥𝐵1 (𝑊1 − 𝜎 𝐼) = 0 (19) Torus Automorphism is one of the kinds of a
For a unique set of eigenvalues to determinant of dynamic system. A dynamic system, changes the
the matrix (W1-𝝈𝒊 ) must be equal to zero. Thus stats s when time t changes. Where p is a user
from the solution of the characteristic equation, input, it basically swap the pixel positions.
|W1-𝝈𝒊 |=0 we obtain eight singular values of
𝝈𝒊 𝒘𝒉𝒆𝒓𝒆 𝒊 = 𝟏, 𝟐, … . . 𝟖 𝑥 , ↔ 𝑥 , 𝑤ℎ𝑒𝑟𝑒 𝑡 = 𝑝 −𝑖 (27)

W2=torus(W1) with p=2


W3=torus(W2) with p=4
𝜎1 0 0 0 0 0 0 0 W4=torus(W3) with p=8
0 𝜎2 0 0 0 0 0 0 W5=torus(W4) with p=16
0 0 𝜎3 0 0 0 0 0
W6=torus(W5) with p=32
𝑆= 0 0 0 𝜎4 0 0 0 0
0 0 0 0 𝜎5 0 0 0
0 0 0 0 0 𝜎6 0 0 This is how scrambling done on watermark image
0 0 0 0 0 0 𝜎7 0
0 0 0 0 0 0 0 𝜎8 W1 and W6 is developed after five time Torus
Automorphism. Each samples of W6 converted
And if values of 𝝈𝒊 again put into equation (20) we into binary and an binary sequence generated
obtain x1, x2, x3, x4, x5, x6 x7 and x8 value
(𝑊1 − 𝜎 𝐼)𝑥 = 0 (20) BW6=dec2bin(W6,8) (28)

36
©2017 IJAIR. All Rights Reserved
http://ijairjournal.com
International Journal of Advanced and Innovative Research (2278-7844) /
Volume 6 Issue 12

Now BW6 is the watermark which is need to be


hide inside the DWT and SVD decamped cover
images which are shown in equations (22), (23),
(24) and (25)
𝑀𝑆 ( ) = 𝑙𝑠𝑏 𝑆 ( ) 𝑥𝑜𝑟 𝐵𝑊 (29) 𝑀𝑆 ( ) ,
,
= 𝑙𝑠𝑏 𝑆 ( ) 𝑥𝑜𝑟 𝐵𝑊 (30)
Cover image Watermark Cipher image
𝑀𝑆 ( ) , = 𝑙𝑠𝑏 𝑆 ( ) 𝑥𝑜𝑟 𝐵𝑊 (31) 𝑀𝑆 ( ) , image
= 𝑙𝑠𝑏 𝑆 ( ) 𝑥𝑜𝑟 𝐵𝑊 (32)
Equation (29), (30), (31) and (32) develop Figure 5 Selected cover image (1) and watermark
modified S components of SVD images(2) and cipher image developed (3)

(𝑥(𝑛) ) =𝑈 ( )
∗ 𝑀𝑆 ( ) ∗ 𝑉 ( ) (𝑥(𝑛) )
= 𝑈 ( ) ∗ 𝑀𝑆 ( ) ∗𝑉( )
(𝑥(𝑛) ) =𝑈 ( ) ∗ 𝑀𝑆 ( )
∗𝑉( ) (𝑥(𝑛) ) =𝑈 ( )
∗ 𝑀𝑆 ( ) ∗𝑉 ( )

IDWT 3rd level Figure 6 watermark image torus Automorphism



𝑛 𝑛
𝑥(𝑛) = {𝑥 ±𝑥 } 𝑥(𝑛) level
2 2


𝑛 𝑛
= {𝑥 ±𝑥 }
2 2


𝑛 𝑛
𝑥(𝑛) = {𝑥 ±𝑥 } 𝑥(𝑛) If Where D is cipher image, C is cover image, len
2 2

∞ is length of cover image then
𝑛 𝑛 MSE= (D – C)^2/ Len, SNR= 10 log 10 (256^2/MSE), BER =
= {𝑥 ±𝑥 }
2 2 sum of (Data xor Cipher) / (Len x 8)


𝑛 𝑛
𝑥(𝑛) = {𝑥 ±𝑥 } 𝑥(𝑛) Observe Results test cover image of Lena
2 2


𝑛 𝑛 (512x512, 712 kb) and the cover images of 60x60
= {𝑥
2
±𝑥
2
} (4kb), 95x95 (8kb) and 128x128 (12 kb)


𝑛 𝑛
𝑥(𝑛) = {𝑥
2
±𝑥
2
} 𝑥(𝑛) Cover Size Watermar SN MS BER


𝑛 𝑛 k size R E
= {𝑥
2
±𝑥
2
} 512x512/ 60x60/4kb 80.5 0.27 0.244


𝑛 𝑛
712kb 7 4
𝑥(𝑛) = {𝑥
2
±𝑥
2
} 512x512/ 95x95/8kb 70.9 1.20 0.78

712kb 9
𝒙(𝒏)𝑵 is the final cipher image which will have 512x512/712 128x128/12 68.9 1.63 0.84
watermark image hidden inside it. kb kb 7
Table 1 observe results for cover Lena image with
different size watermark image
The deciphering is process for as can be observed
it exact reverse order than the ciphering process COMPARATIVE RESULTS: The comparative
and our aim is to extract watermark not construct results are comparison between proposed method
the original image so we did the process to have watermarking with available method of
original data only. watermarking and it can be done on the behalf of
SNR observe by the different methods for the
III-RESULTS standard cover image of 512x152 and watermark
of 128x128 size.

Sr. NO. AUTHOR Output


37
©2017 IJAIR. All Rights Reserved
http://ijairjournal.com
International Journal of Advanced and Innovative Research (2278-7844) /
Volume 6 Issue 12

1. Po-Yueh Chen et al 46.74dB [2] Amra Siddiqui, Arashdeep Kaur, A protected


2. Tanmay Bhattacharya et 27.3850 and powerful picture watermarking framework
3. al dB
Archana S. Vaidya et al 29.64 utilizing wavelet space, 2017 seventh International
dB dB Conference on Cloud Computing, Data Science
4. Hyung -Shin Kim et al 36
and Engineering - Confluence, IEEE, DOI:
5. Mayank Awasthi et al 49.91 10.1109/CONFLUENCE.2017.7943222
6. Nallagarla.Ramamurthy 51.8dB dB [3] Aniket Roy, Arpan Kumar Maiti, Kuntal
7. et
G. al Rosline Nesa 49.48 Ghosh, A discernment based shading picture
8. Kumari
Krishna etRao
al Kakkirala dB52.56 versatile watermarking plan in YCbCr space, 2015
9. et al Roy et al
Aniket dB
51.9541 second International Conference on Signal
10 Amra siddiqui et al dB
PSNR Processing and Integrated Networks (SPIN), 978-
11 Zhi Zhang et al 41.92
PSNR 1-4799-5991-4/15/2015 IEEE
62.28 [4] Krishna Rao Kakkirala, Srinivasa Rao
12 Proposed work PSNR Chalamala, Block Based Robust Blind Image
Table 2 Comparative result68.97 Watermarking Using Discrete Wavelet Transform,
From the comparative results above we can clearly 2014 IEEE tenth International Colloquium on
observe that the proposed work has best SNR Signal Processing and its Applications
among all available work. (CSPA2014), 7 - 9 Mac. 2014, Kuala Lumpur,
Malaysia
IV-CONCLUSION [5] G.Rosline Nesa Kumari,
Watermarking is a way to deal with shroud the Dr.S.Maruthuperumal, Dr.V.Vijayakumar,
information (picture for our situation) productively Hierarchical-Edge based Torus Automorphism for
into any covering object (picture for our situation) Digital Watermarking, International Journal of
and it ought to do that any gatecrasher can't Science, Engineering and Technology Research
translate it by any methods, it can be finished up (IJSETR) Volume 2, Issue 2, February 2013
based on writing work that accessible strategies are [6] Nallagarla.Ramamurthy, Dr.S.Varadarajan,
great in watermarking yet there are still a few Effect of Various Attacks on Watermarked
issues with those procedures and that can be make Images, (IJCSIT) International Journal of
strides. . It can be inferred that DWT is the most Computer Science and Information Technologies,
appropriate technique for versatile watermarking Vol. 3 (2) , 2012,3582-3587
and SVD is the strategy which most appropriate
for lossless and assault free correspondence.
The first target of the proposal work was to build
up an enhanced system for concealing picture and
information inside cover picture additionally to
diminish the measure of information on channel
while stenograph information transmission which
is been accomplished. The issue with
watermarking is that it requires heaps of
information implies another greater picture for
sending some little watermark picture, proposed
work accomplished that same size of watermark
can be transmitted with little size of cover picture
as accomplished SNR is superior to accessible
work 69.4.

REFERENCES

[1] Zhi Zhang, Chengyou Wang, Xiao Zhou,


Image Watermarking Scheme Based on Arnold
Transform and DWT-DCT-SVD, ICSP2016, 978-
1-5090-1345-6/16/2016 IEEE
38
©2017 IJAIR. All Rights Reserved
http://ijairjournal.com

Potrebbero piacerti anche