SR. NO Name of Figures Page No
SR. NO Name of Figures Page No
SR. NO Name of Figures Page No
3. History 3
6. General Framework 9
13. Conclusions 40
15. References 42
1
1. Introduction
The recent progress in the digital multimedia technologies has offered many
facilities in the transmission, reproduction and manipulation of data. However, this
advancement has also brought the challenge such as copyright protection for
content providers. Digital watermarking is one of the proposed solutions for
copyright protection of multimedia data. This technique is better than Digital
Signatures and other methods because it does not increase overhead.
Digital watermarking is not a very old field. Most of research is going on in this
field. Researchers try to invent techniques that increase the security, capacity, and
imperceptibility of watermarked images.
Suppose a person X creates an Image and publish it on the web. A person Y with
bad intentions steals the Image, maybe modify it little bit and then start selling, as
it was his own. X notices that Y is selling his Image. But how can he prove that he
is really the owner and make Y to pay him a lot of money?
Many solutions are there to solve this problem like digital signatures. But these
solutions need additional bandwidth. So, Due to limitations of the traditional
copyright protection system, a new technique came in existence. This technique is
known as digital watermarking.
2
2. What is Digital Watermark?
Digital watermarking is a technique for inserting information (the watermark) into
an image, which can be later extracted or detected for variety of purposes including
identification and authentication purposes.
Also referred to as simply watermark, a pattern of bits inserted into a digital image,
audio, video or text file that identifies the file's copyright information (author,
rights, etc.). The name comes from the faintly visible watermarks imprinted on
stationary that identify the manufacturer of the stationery. The purpose of digital
watermarks is to provide copyright protection for intellectual property that's in
digital format.
3. History of Watermarking
More than 700 years ago, paper watermarks were used in Fabriano, Italy to
indicate the paper brand and the mill that produced it. After their invention,
watermarks quickly spread over Italy and then over Europe, and although
originally used to indicate the paper brand or paper mill, they later served as
indication for paper format, quality, and strength and were also used to date and
authenticate paper.
By the 18th century it began to be used as anti-counterfeiting measures on money
and other documents. They are still widely used as security features in currency
today.
The term watermark was introduced near the end of the 18th century. It was
probably given because the marks resemble the effects of water on paper. The first
example of a technology similar to digital watermarking is a patent filed in 1954
by Emil Hembrooke for identifying music works.
3
In 1988, Komatsu and Tominaga appear to be the first to use the term “digital
watermarking”.
4
symmetric key watermarking) the same keys are used for embedding and detecting
watermarks.
Steganographic&Non-Steganographic watermarking: Steganographic
watermarking is the technique where content users are unaware of the presence of
a watermark. In nonsteganographic watermarking, the users are aware of the
presence of a watermark. Steganographic watermarking is used in fingerprinting
applications while nonsteganographic watermarking techniques can be used to
deter piracy.
public
5
5. How Watermarking is Different from Steganography and Cryptography?
6
Figure 5.1 Cryptography cannot prevent illegal replication of the digital content
Watermarking Attacks
A robust watermark should survive a wide variety of attacks both incidental
(Means modifications applied with a purpose other than to destroy the watermark)
and malicious (attacks designed specifically to remove or weaken the watermark).
Next, we introduce some of the best known attacks.
Simple attacks: (other possible names include “waveform attacks” and “noise
attacks”) are conceptually simple attacks that attempt to impair the embedded
watermark by manipulations of the whole watermarked data (host data plus
7
watermark) without an attempt to identify and isolate the watermark. Examples
include filtering, compression (JPEG, MPEG), addition of noise, addition of an
offset, cropping, Digital to analog and analog to digital conversion.
Removal attacks: are attacks that attempt to analyze the watermarked data,
estimate the watermark or the host data, separate the watermarked data into host
data and watermark, and discard only the watermark. Examples are collusion
attacks, denoising, certain filter operations, or compression attacks using synthetic
modeling of the image (e.g., using texture models or 3-D models). Also included in
this group are attacks that are tailored to a specific watermarking scheme.
It should be noted that the transitions between the groups are sometimes fuzzy and
that some attacks do not clearly belong to one group.
8
6. General Framework for Digital Watermarking
Digital watermarking is similar to watermarking physical objects except that the
watermarking technique is used for digital content instead of physical objects. In
digital watermarking a low energy signal is imperceptibly embedded in another
signal. The low energy signal is called watermark and it depicts some metadata,
like security or rights information about the main signal. The main signal in which
the watermark is embedded is referred to as cover signal since it covers the
watermark. The cover signal is generally a still image, audio clip, video sequence
or a text document in digital format.
watermark
9
and hence the digital watermarking techniques should be resilient to both noise and
security attacks.
In this way the original data is split into four sub-images each of size N/2 by N/2
containing information from different frequency components. Figure 8.1 shows the
12
one decomposition step of the two dimensional grayscale image. Figure 8.2 shows
the four sub-bands in the typical arrangement.
The LL sub-band is the result of low-pass filtering both the rows and columns and
contains a rough description of the image. Therefore the LL sub-band is also called
the approximation sub-band. The HH sub-band was high-pass filtered in both
directions and contains the high-frequency components along the diagonals. The
HL and LH images are the result of low-pass filtering in one direction and high-
pass filtering in the other direction. LH contains mostly the vertical detail
information, which corresponds to horizontal edges. HL represents the horizontal
detail information from the vertical edges. All three sub-bands HL, LH and HH are
called the detail sub-bands, because they add the high-frequency detail to the
approximation image.
8.2. Composition Process
The inverse process is shown in figure 8.3. The information from the four sub-
images is up-sampled and then filtered with the corresponding inverse filters along
the columns. The two results that belong together are added and then again up-
sampled and filtered with the corresponding inverse filters. The result of the last
step is added together and we have the original image again. Note that there is no
loss of information when the image is decomposed and then composed again at full
precision.
13
Figure 8.3 One composition step of the four sub images
With DWT we can decompose an image more than once. Decomposition can be
continued until the signal has been entirely decomposed or stopped before by the
application at hand. For compression and watermarking application, generally no
more than five decompositions steps are computed. Mostly we use two ways for
decomposition. These are:
i.) Pyramidal decomposition
ii.) Packet decomposition
8.3. Pyramidal Decomposition
The simplest and most common way is pyramidal decomposition. For the
pyramidal decomposition we only apply further decompositions to the LL sub-
band. Figure 8.4 shows a systematic diagram of three decomposition steps. At each
level the detail sub-bands are the final results and only the approximation sub-band
is further decomposed.
14
Figure 8.4 Three decomposition steps of an image using Pyramidal Decomposition
Figure 8.4 shows the pyramidal structure that results from this decomposition. At
the lowest level there is one approximation sub-band and there are a total of nine
detail sub-bands at the different levels. After L decompositions we have a total of
D(L) = 3 * L + 1 sub-bands.
15
8.4. Wavelet Packet Decomposition
For the wavelet packet decomposition we do not limit the decomposition to the
approximation sub-band and allow further wavelet decomposition of all sub-bands
on all levels. In figure 8.7 we show the system diagram for a complete two level
wavelet packet decomposition.
Figure 8.7 Two complete decomposition steps using wavelet packet decomposition
In figure 8.8 we show the resulting sub-band structure. We again use the simple
decomposition step as basic building block. The composition step is equal to the
pyramidal case. All four sub-bands on one level are used as input for the inverse
transformation and result in the sub-band on the higher level. This process is
repeated until the original image is reproduced.
16
Figure 8.9 Two level packet decomposition of “Lena”
Figure 8.10 illustrates some of the commonly used wavelet functions. Haar wavelet
is one of the oldest and simplest wavelet. Therefore, any discussion of wavelets
starts with the Haar wavelet. Daubechies wavelets are the most popular wavelets.
They represent the foundations of wavelet signal processing and are used in
numerous applications. These are also called Maxflat wavelets as their frequency
responses have maximum flatness at frequencies 0 and π. This is a very desirable
property in some applications. The Haar, Daubechies, Symlets and Coiflets are
compactly supported orthogonal wavelets. These wavelets along with Meyer
wavelets are capable of perfect reconstruction. The Meyer, Morlet and Mexican
Hat wavelets are symmetric in shape. The wavelets are chosen based on their shape
and their ability to analyze the signal in a particular application.
17
Figure8.10 Several different families of wavelets
18
9.1. Spatial Domain Techniques
Techniques in spatial domain class generally share the following characteristics:
• The watermark is applied in the pixel domain.
• No transforms are applied to the host signal during watermark embedding.
• Combination with the host signal is based on simple operations, in the pixel
domain.
• The watermark can be detected by correlating the expected pattern with the
received signal.
The main strengths of pixel domain methods are that they are conceptually
simple and have very low computational complexities. However, they also
exhibit a major drawback:
The need for absolute spatial synchronization leads to high susceptibility to de-
synchronization attacks.
19
difference between the original and the tagged image is computed. In addition
to this we can also use the correlation coefficient between the original and the
tagged image as a measure for the image degradation due to the tagging
process. A correlation coefficient of one indicates that the two images are
identical, whereas for distorted images the value decreases toward zero.
20
the watermark with negligible impact on the cover object. Furthermore, once
the algorithm is discovered, the embedded watermark could be easily modified
by an intermediate party.
21
Figure 9.2 Watermarking process for two color images
Let input image is F, divide it into m by n blocks. K is the secret key of size m
by n.
We use a weight matrix W and r is number of bits to be inserted in each block.
The algorithm for this technique is
Step 1: Compute Fi ⊕ K.
Step 2: Compute SUM((Fi ⊕ K ) ⊗ W).
Step 3: From the matrix Fj ⊕ K, compute for each w = 1..2r - 1
the following set:
22
Most of the researchers focus on embedding watermark in wavelet domain
because watermarks in this domain are very robust. The existing wavelet based
watermarking techniques are explained below:
Xia, Boncelet, and Arce proposed a watermarking scheme based on the
Discrete Wavelet Transform (DWT). The watermark, modeled as Gaussian
noise, was added to the middle and high frequency bands of the image. The
decoding process involved taking the DWT of a potentially marked image.
Sections of the watermark were extracted and correlated with sections of the
original watermark. If the cross-correlation was above a threshold, then the
watermark was detected. Otherwise, the image was decomposed into finer and
finer bands until the entire, extracted watermark was correlated with the entire,
original watermark. This technique proved to be more robust than the DCT
method.
Improvements on the above schemes were possible by utilizing properties of the
Human Visual System.
Kundur and Hatzinakos (1997) present image fusion watermarking technique.
They use salient features of the image to embed the watermark. They use a
saliency measure to identify the watermark strength and later embed the
watermark additively. Normalized correlation is used to evaluate the robustness
of the extracted watermark. Later the authors propose another technique termed
as FuseMark , which includes minimum variance fusion for watermark
extraction. Here they propose to use a watermark image whose size is a factor
of the host by 2xy.
23
10.1. Implementation details
In this report we are giving a new image watermarking method. This method
increases the security and capacity of robust watermark. To increase
capacity the concept of nesting is used. Means we embed one watermark in
other. And to increase security of watermark cryptography is used. It is a
blind watermarking method. Means original image is not required at the time
of watermark recovery.
For embedding first watermark in second we use spatial domain technique,
because it is less time consuming as compare to wavelet or frequency
domain techniques. Spatial domain techniques are less robust. But
robustness is much more important issue to be consider for second
watermark, because both unintentional and malicious attacks alter the final
watermarked image, which directly affect the second watermark. So for
embedding second watermark we used technique based on DWT, which is
very robust against attacks.
Before embedding watermarks at both levels we encrypt them with XOR
operation. XOR operation has one important property: if we XOR the data
twice with same key we get original data again. This property of XOR is
used for encryption and decryption. For encryption we XOR the binary
image with some key. For decryption we XOR the encrypted image with
same key, it gives the original image.
24
Cover Image – gray scale image to be watermarked.
E1 – key used for encrypting Watermark1
E2 – key used to encrypt watermarked watermark.
W1 – key used to embed encrypted binary watermark into the main
watermark.
W2 – key used to embed encrypted watermarked watermark in Cover Image
Algorithm
1.) We take Watermark1 and encrypt it by performing XOR operation with
the key E1. The output of this step is called Encrypted1.
2.) Apply procedure proposed in section 10.1.4 to embed Encrypted1 in the
second binary watermark image (Watermark2) using key W1. Let output
image is Watermarked1.
3.) Again encrypt Watermarked1 using XOR with key E2 to give the output
image Encrypted2.
4.) Apply procedure given in section 10.1.6 to embed Encrypted2 in the
gray-scale Cover Image using key W2. Output image is final watermarked
image (Watermarked2).
Output
Watermarked2 – finally watermarked image
25
Figure 10.1 Block Diagram of Purposed Watermarks Embedding Procedure
Inputs
S1 – size of watermark1.
S2 – size of watermark2.
W1 – key used to recover encrypted binary watermark from the main watermark.
26
Algorithm
2.) Decrypt Encrypted2′ using XOR with key E2.output of this step is called
Recovered2.
4.) Decrypt Encrypted1’ using XOR with key E1. Output of this step is called
Recovered1.
Output
27
10.1.3. Embedding Watermark in Binary Image
Many other algorithms are also there for embedding watermark in binary images,
but we selected this algorithm because with this we can embed large number of
bits in the binary image.
In this technique we use weight matrix to improve the embedding capacity. Give
an image block of size m x n this scheme can hide as many as log2(mn+1) bits of
data in the image by changing at most 2 bits in the image.
In the algorithm given in we have to give the size of image block and the number
of bits to be inserted in each block. But our scheme automatically calculates the
optimal size of block and the optimal number of bits to be inserted in each block in
such way so as to minimize the distortion in image.
Input
Algorithm
Where m and n are image block dimensions and r is the number of bits to be
inserted in each block.
28
2.) Calculate Weight matrix W of size m x n.
5.) For each block of image say Bi perform the following steps:
(i) Take r bits of the watermark and convert them in decimal and then store in d.
Where ⊗ means multiply each element of first matrix with corresponding element
of the second matrix.
(vii) diff = d – SM
Increase total weight of the block by diff. or decrease weight by (2r – diff) by
complementing one or two bits. For increasing weight by the value of an element
in W, the corresponding value in (Bi ⊕ K1) should be zero. For decreasing weight
by the value of an element in W, the corresponding value in (Bi ⊕ K1) should be
29
one. Else if (diff<0) then Decrease weight by absolute value of diff or increase
weight by (2r – absolute value of diff) by complementing one or 2 bits.
Output
Example: Let F is the Cover binary image, K is key and W is the weight matrix.
W1 = 0 and the first three bit are 001 (equivalent to (1)10 ). So, we have to
increase the weight of first block by 1.the changed bit is shown in shaded area.
W2 = 2 and the next three bits are 010 (equivalent to (2)10). Since difference is 0,
so no need to change any bit in the second block.
W3 = 2 and the next three bits are 000 (equivalent to (0)10 ). So we can either
increase weight by 6 or decrease weight by 2.here we increased weight by 6 by
complementing the last bit.
W4 = 4 and the bits to be inserted are 001 (equivalent to (1)10 ).in this case we
changed two bits to increase the weight by 5.
30
Figure 10.3 Example of embedding binary watermark in a binary image
Input
Algorithm
1.) Create a matrix Recovered of size So and initialize it with all Zeros.
2.) set I = 1.
Where m and n are block dimensions and r is the number of bits inserted in each
block.
31
5.) Calculate key K1 of size m x n from K.
7.) For each block of image say Bi perform the following steps:
Where ⊗ means multiply each element of first matrix with corresponding element
of the second matrix.
(vi) Assign MSB of SB to Ith position of matrix Recovered, Second bit to (I+1)th
position, third bit to (I+2)th position and so on upto LSB of SB.
(vii) Set I = I + r.
Output
32
10.1.6. Algorithm for Embedding Watermark in Gray-Scale Image
Input
Algorithm
1.) Perform DWT decomposition of the Cover Image at level one. And store
(i) Create a random matrix of size Sh with random number generator and store it
in RH.
(iii) Create a random matrix of size Sh with random number generator and store it
in RV.
set H1 = H1 + k * RH1.
33
set V1 = V1 + k * RV1.
Output
Input
Algorithm
1.) Perform DWT decomposition of the Watermarked Binary Image at level one.
And store Approximation, horizontal, vertical and diagonal coefficients in A1, H1,
V1, and D1 respectively.
5.) Create a matrix with one row and N columns with all ones and store in variable
Watermark.
34
6.) Repeat the following for kk = 1 to N
(i) Create a random matrix of size Sh with random number generator and store it in
RH.
(iii) Create a random matrix of size Sh with random number generator and store it
in RV.
(v) Find the correlation between H1 and RH1 and store it in corr_h(kk).
(vi) Find the correlation between V1 and RV1 and store it in corr_v(kk).
(vii) Calculate
Set Watermark(kk) = 0
Output
35
11. Experimental Results:
Difference image
36
The data recovered after de watermarking is :
out=[1 0 0 0 1 1;
1 0 0 0 1 1;
0 1 1 0 1 0;
1 1 0 1 0 1;
0 1 0 0 1 0;
1 1 0 0 1 1;
1 1 1 0 0 0;
1 1 0 1 0 1]
37
Speckle noisy image
PSNR =9.84 Db
Copy Protection: Digital content can be watermarked to indicate that the content
cannot be illegally replicated. Devices capable of replication can then detect such
watermarks and prevent unauthorized replication of the content.
Tracking: Digital watermarks can be used to track the usage of digital content.
Each copy of digital content can be uniquely watermarked with metadata
specifying the authorized users of the content. Such watermarks can be used to
detect illegal replication of content by identifying the users who replicated the
38
content illegally. The watermarking technique used for tracking is called as
fingerprinting.
Tamper Proofing: Digital watermarks, which are fragile in nature, can be used for
tamper proofing. Digital content can be embedded with fragile watermarks that get
destroyed whenever any sort of modification is made to the content. Such
watermarks can be used to authenticate the content. The goal of this application is
to detect alterations and modifications in a document.
39
Medical Safety: Embedding the data and patient’s name in medical image could
increase the confidently of medical information as well as the security.
13. Conclusions
This project presents a blind watermarking technique that uses watermark nesting
(at level 2) and encryption. Nesting means it embeds an extra watermark into the
main watermark and then embeds the main watermark into the cover image. For
encryption we used XOR operation. For embedding watermarked watermark in
Cover Image we used DWT based technique.
Proposed watermarking technique has following advantages:
1. By using watermark nesting we can embed more number of bits in the cover
image as compare to without watermark nesting.
2. Due to nesting feature we can embed some metadata about watermark also.
3. Because our technique uses encryption, so it increases the security of
watermarks. For instance if watermarking key is hacked still the attacker will not
be able to identify the watermark because it is encrypted.
4.It is a blind watermarking technique. So, original image is not required at the
time of watermark recovery.
5. Because we embed final watermark in DWT domain, so this technique is robust
against many attacks.
40
optimal number of bits to 56 be inserted in each block in such a way so as to
minimize the distortion in main watermark. But in we have to give it manually the
number of bits and block size. Then we embedded this watermarked watermark in
gray-scale cover image using DWT based technique. By hiding watermark in
watermark we can embed more number of bits in the cover image as compare to
without watermark nesting.
Before embedding we encrypted both the watermarks with exclusive OR (XOR)
operation. This provides an additional level of security for watermarks. For
instance if watermarking key is hacked still the attacker will not be able to identify
the watermark because it is encrypted.
41
15. References
Aboofazeli, M., Thomas, G., Moussavi, Z.,”A wavelet transform based digital
image watermarking scheme”, in IEEE Canadian Conference on Electrical and
Computer Engineering, Vol. 2, pp. 823 – 826, May 2004.
Internet Links
42
43