You are on page 1of 2

Digital Watermarking

First A. Author, Second B. Author, Jr., and Third C. Author, Member, IEEE
Abstract In this paper, a new embedding
strategy
for
DWT-based
watermarking
is
proposed.
Different
from
the
existing
watermarking schemes in which low frequency
coefficients
are
explicitly
excluded
from
watermark
embedding,
we
claim
that
watermarks should be embedded in the low
frequency subband firstly, and the remains
should be embedded in high frequency subbands
according to the significance of subbands. We
also claim that different embedding formula
should be applied on the low frequency subband
and high frequency subbands respectively.
Applying this strategy, an adaptive algorithm
incorporating the feature of visual masking of
human vision system into watermarking is
proposed. In the algorithm, a novel method to
classify wavelet blocks is presented. The
experimental results demonstrate that the
watermarks generated with the proposed
algorithm are invisible and robust against noise
and
commonly
used
image
processing
techniques.
Keywords Image Watermarking, Robust, Copyright
Protection, Security

produce the watermarked image. The watermark, however,


was not robust to additive noise. Cox et al. [2] noted that in
order for a watermark to be robust to attack, it must be placed
in perceptually significant areas of the image. Their method
was robust to image scaling, JPEG coding, dithering,
cropping, and rescanning. Xia, Boncelet, and Arce [5]
proposed a watermarking scheme based on the Discrete
Wavelet Transform (DWT). We have used DWT and
watermark, modeled as Gaussian noise, was added to the low
frequency bands of the image.
ALGORITHM USED
1.The wavelet transform on the input image is performed
.Only one level of decomposition is performed to get four
subbands i.e.LL,HH,HL,LH .
2.The key, which is nothing but the image to be embedded, is
taken, the key is multiplied with the weighting function and it
is then added to the subband information of the original
image.
3.The inverse wavelet transform is then taken to get the
watermarked image.
4.In order to retrieve the key, the forward wavelet transform
of the watermarked image is taken and it is substracted from
the wavelet coefficients of the original image to retrieve the
key image.
5.The mean square error between the original image and
watermarked image is also calculated and displayed in the
command window.

INTRODUCTION
We are living in the era of information where billions of bits
of data is created in every fraction of a second and with the
advent of internet, creation and delivery of digital data has
grown many fold. Since copying a digital data is very easy
and fast too so, issues like, protection of rights of the content
and proving ownership, arises. Digital watermarking came as
a technique and a tool to overcome shortcomings of current
copyright laws for digital data. The specialty of watermark is
that it remains intact to the cover work even if it is copied. So
to prove ownership or copyrights of data watermark is
extracted and tested. It is very difficult for counterfeiters to
remove or alter watermark. As such the real owner
can always have his data safe and secure. Counterfeiters try to
degrade the quality of watermarked image by attacking an
image (generally attacks are median and Gaussian filter,
scaling, compression and rotation of watermarked image).By
attacking watermarked image it become very difficult to
recover watermark back from the watermarked image and
even if it extracted one may no longer use it to prove the
ownership and copyrights.
Many watermarking methods have been proposed. Schyndel,
Tirkel, and Osborne [1] generated a watermark using a msequence generator. The watermark was either embedded or
added to the least significant bit of the original image to

CONCLUSION
In the method employed for digital watermarking of images,
the copyright inserted is invisible to others. The authenticity
of the images can be easily achieved. Here, at very first, the
colour image is taken, then converting it into grayscale
image. The DWT based watermarking algorithm is applied
between two images. The watermarked image is obtained
where the authentic images is invisible to outside world. Also,
the original content is also not modified relatively. The error
performance metrics also calculated which varies according
to the weighting function values. The mean square error

between original image and watermarked was 0.0575. The


robust watermarking algorithm has been thus implemented.
REFERENCES
[1] R. Schyndel, A. Tirkel, and C. Osborne, A Digital
Watermark, Proc. IEEE Int. Conf. on Image Processing,
Nov. 1994, vol. II, pp. 86-90.
[2] I. Cox, J. Kilian, F. Leighton, and T. Shamoon, Secure
Spread Spectrum Watermarking for Multimedia, IEEE
Transactions on Image Processing, vol. 6, no. 12, pp. 16731687, Dec. 1997.
[3] J. Eggers, J. Su and B. Girod," Robustness of a Blind
Image Watermarking Scheme", Proc. IEEE Int. Conf. on
Image Proc., Vancouver, 2000.
[4] Barni M., Bartolini F., Piva A., Multichannel
watermarking of color images, IEEE Transaction on Circuits
and Systems of Video Technology 12(3) (2002) 142-156.
[5] Kundur D., Hatzinakos D., Towards robust logo
watermarking using multiresolution image fusion, IEEE
Transcations on Multimedia 6
(2004) 185-197.
[6] C.S. Lu, H.Y.M Liao, Multipurpose watermarking for
image authentication and protection, IEEE Transaction on
Image Processing, vol.
10, pp. 1579-1592, Oct. 2001.
[7] L. Ghouti, A. Bouridane, M.K. Ibrahim, and S. Boussakta,
Digital image watermarking using balanced multiwavelets,
IEEE Trans. Signal
Process., 2006, Vol. 54, No. 4, pp. 1519-1536.
[8]. P. Tay and J. Havlicek, "Image Watermarking Using
Wavelets", in Proceedings of the 2002 IEEE, pp. II.258
II.261, 2002.
[9]. P. Kumswat, Ki. Attakitmongcol and A. Striaew, "A New
Approach for Optimization in Image Watermarking by Using
Genetic
Algorithms", IEEE Transactions on Signal Processing, Vol.
53, No. 12, pp. 4707-4719, December, 2005.
[13] . H. Daren, L. Jifuen,H. Jiwu, and L. Hongmei, "A DWTBased Image Watermarking Algorithm", in Proceedings of the
IEEE International
Conference on Multimedia and Expo, pp. 429-432, 2001.
[14]. C. Hsu and J. Wu, "Multi-resolution Watermarking for
Digital Images", IEEE Transactions on Circuits and SystemsII, Vol. 45, No. 8, pp.
1097-1101, August 1998.
[15]. R. Mehul, "Discrete Wavelet Transform Based Multiple
Watermarking Scheme", in Proceedings of the 2003 IEEE
TENCON, pp. 935-938,
2003.

You might also like