Anda di halaman 1dari 5

ISSN:2229-6093

Anand Ghuli et al, Int.J.Computer Technology & Applications,Vol 5 (6),2006-2010

Digital Watermarking-A Combined Approach by DWT, Chirp-Z and Fast


Walsh-Hadamard Transform
Dr. Dayanand.G.Savakar
Department of Computer Science, Rani
Channamma University, Belagavi-591156,
Karnataka, India.
e-mail: dgsavakar@gmail.com.

Anand Ghuli
Department of Computer Applications(M.C.A)
B.L.D.E.As V.P.Dr.P.G.Halakatti College of
Engineering and Technology., Bijapur586103, Karnataka, India.
e-mail: anandghuli@yahoo.co.in

Abstract
Digital Image Watermarking is one of the ways to
protect intellectual property right and copyright of the
information owner. Fidelity, Capacity and Robustness
are the important requirements of digital watermarking
techniques, but these requirements compete with each
other; if one is improved the other two are affected.
This paper presents a combined approach of DWT,
Chirp-Z and Fast Walsh-Hadamard Transforms for
digital image watermarking to minimize the gap
between robustness and fidelity with limited capacity.
The DWT is used for locating the suitable area in the
cover image for watermark embedding. The chirp ztransform is the z-transform of input signal along a
spiral contour defined by a scalar. The output of Chirp
Z-transform is given to Fast discrete WalshHadamard
transform that returns the coefficients of the input.
Then watermark is embedded depending on pseudo
random sequence into predefined mid-band
components of the block of cover image.

1. Introduction
Digital image watermarking is considered as one of
the major research field in image processing and
security. It can strengthen the ownership of the original
image and also can completely recover the original
image from the watermarked image. Several
watermarking schemes and techniques are used for
wide range of applications. (Bhupendra Ram, 2013) has
proposed digital image watermarking technique using
discrete wavelet transform and discrete cosine
transform and shown improved resistance to attacks on
the watermark and demonstrated that this proposed
technique is robust to most of the signal processing
techniques and geometric distortions [1]. (K. Chaitanya
et.al., 2013) have developed the digital color image
watermarking scheme using DWTDCT coefficients in

IJCTA | Nov-Dec 2014


Available online@www.ijcta.com

RGB Planes [2]. (Pratibha Sharma and Shanti Swami


2013) have devised a digital image watermarking
technique using 3 level discrete wavelet transform and
demonstrated that quality is dependent on scaling
factors [3]. (D.Phani Kumar et.al., 2013) presented a
contrast based color watermarking scheme using
Lagrange Polynomials Interpolation in Wavelet
Domain [4]. (Abdelhamid Benhocine et.al., 2013) have
proposed new image watermarking scheme based on
singular value decomposition [5]. (Huming Gao et.al.,
2013) have presented digital watermarking algorithm
for color image based on DWT [6]. (Hongshou Yan
and Weimin Yang2013) proposed a watermarking
algorithm based on wavelet and Hadamard transform
for color image [7]. (Aris Marjuni et.al., 2013) have
presented
an
improved
DCT-Based
image
watermarking scheme using Fast Walsh Hadamard
Transform [8]. (Rama Seshagiri Rao Channapragada
et.al., 2012) proposed digital watermarking algorithm
based on CCC - FWHT technique [9]. (Franklin
Rajkumar.V et.al., 2011) presented an entropy based
robust watermarking scheme using Hadamard
transformation technique [10]. (Liu Ping Feng et.al.,
2010) have proposed a DWT-DCT based blind
watermarking algorithm for copyright protection [11].
(Ali Al-Haj, 2007) has proposed combined DWT-DCT
digital image watermarking scheme [12].
From the literature it is observed that, still there is a
scope to examine and determine the suitability of a
watermarking scheme with respect to properties like;
fidelity, capacity and robustness. The requirements are
application-dependent, but some of them are common
to most practical applications.

2. The Watermark Insertion Methodology


For the effective watermarking it is evident to find
suitable area x to insert watermark, this can be done by
embedding the watermark in the middle frequency sub-

2006

ISSN:2229-6093

Anand Ghuli et al, Int.J.Computer Technology & Applications,Vol 5 (6),2006-2010

bands using Haar wavelets [12]. Set the gain factor k


and block size as 4. The chirp z-transform is applied to
input signal x along a spiral contour defined by a scalar
that specifies i) The length of the transform ii) Ratio
between the points along the z-plane spiral contour of
interest iii) A scalar, the complex starting point on that
contour. The chirp z-transform computes the ztransform on a contour of the form =
where
A and W are arbitrary complex numbers. This path
describes a spiral, starting at an arbitrary point A and
curving in or outwards depending on the value of W.
The transform can be broken into three parts: i)
/
Construct a signal
=
. ii) Circularly
/
convolve the signal with
=
. iii) Weigh the
/
result by
. The Fast WalshHadamard transform
is applied to czt signal, performing an orthogonal,
symmetric, involutional linear operation on 2m complex
numbers yielding walsh functions. This transformation
has no multipliers and is real because the amplitude of
Walsh (or Hadamard) functions has only two values, +1
or -1. The Hadamard transform Hm is a 2m 2m matrix,
the Hadamard matrix (scaled by a normalization
factor), that transforms 2m complex numbers xn into 2m
real numbers Xk. We define Hm for m > 0 by:
=
where the 1/2 is a

normalization that is sometimes omitted. Thus, other


than this normalization factor, the Hadamard matrices
are made up entirely of 1 and 1. The watermark
embedding process discussed so far is depicted in Fig.1
and procedure in Algorithm 1.

Original
Cover
Image

2-Level
DWT

Inverse 2Level DWT

Chirp-Z
Transform

Inverse Fast WalshHadamard Transform

Fast Walsh-Hadamard
Transform

Watermark

Watermark
Formation

Watermark
Embedding
Procedure

Output : Watermarked image


Start
Step.1: Decompose the cover host image into four nonoverlapping multi-resolution sub-bands: LL1, HL1,
LH1, and HH1 using DWT.
Step.2: Apply DWT again to sub-band HL1 to get four
smaller sub-bands and choose the HL2 sub-band.
Step.3: Divide the sub-band HL2 into 4 x 4 blocks.
Step.4: Apply Chirp-Z transform to each block in the
chosen sub-band (HL2).
Step.6: Apply Fast Walsh-Hadamard transform which
performs an orthogonal, symmetric, involutional, linear
operation on 2m numbers (real or complex)
Step.7: Re-formulate the grey-scale watermark image
into a vector of zeros and ones.
Step.8: Generate two uncorrelated pseudorandom
sequences. One sequence is used to embed the
watermark bit 0 and the other sequence is sued to
embed the watermark bit 1.
Step.9: Embed the two pseudorandom sequences;
sequence 0 and sequence 1, with a gain factor some k,
in the FWH-CZT transformed 4x4 blocks of the
selected DWT sub-bands of the host image.
If the watermark bit is 0 then
X '= X + k * pseudorandom sequence for 0
otherwise,
X '= X + k * pseudorandom sequence for 1
[Where X ' represents the pseudorandom sequence
embedded block. X denote the matrix of the midband
coefficients of the FWH-CZT transformed block. ]
Step.10: Apply CZT to each block after its mid-band
coefficients have been modified to embed the
watermark bits as described in the previous step, then
inverse FWH transform to it.
Step.11: Apply the inverse DWT (IDWT) on the DWT
transformed image, including the modified sub-band, to
produce the watermarked host image.
Stop.

Chirp-Z
Transform

Pseudo-random
Sequence

Key

Fig.1-Block diagram of Watermark embedding


scheme

Algorithm 1: Watermark Embedding


Input

: i. Cover image
ii. Watermark image

IJCTA | Nov-Dec 2014


Available online@www.ijcta.com

Fig.2- Input and Output of the Algorithm 1

3. The
Watermark
Methodology

Extraction

Locate middle frequency sub-bands using Haar


wavelets in watermarked image. With gain factor k and

2007

ISSN:2229-6093

Anand Ghuli et al, Int.J.Computer Technology & Applications,Vol 5 (6),2006-2010

block size 4 compute pseudorandom sequence and


apply FWHT block wise then extract middle band
coefficients. Calculate the correlation of the middle
band sequence to pseudorandom sequence and move to
next block to get watermark. The watermark extraction
process discussed so far is depicted in Fig.3 and
procedure in Algorithm 2.

Watermark

Watermark
Formation

Fig.4- Input and Output of the Algorithm 2

4. Evaluation of performance and results


Key

Watermarked
Image

PN-Sequence

2-Level
DWT

Extraction
Procedure

Extracted
Watermark

FWHT

Fig.3- Block diagram of Watermark extraction


scheme

Algorithm 2: Watermark Extraction


Input : Watermarked image.
Output : Watermark.
Start
Step.1: Decompose the watermarked image into four
non-overlapping multi-resolution subbands: LL1, HL1,
LH1, and HH1 using DWT.
Step.2: Apply DWT to HL1 to get four smaller subbands, and choose the sub-band HL2.
Step.3: Divide the sub-band HL2 into 4X4 blocks.
Step.4: Apply CZT to each block in the chosen subband (HL2), and extract the mid-band coefficients of
each CZT transformed block.
Step.5: Regenerate the two pseudorandom sequences
for 0 and 1 using the same seed used in the watermark
embedding procedure.
Step.6: For each block in the sub-band HL2, calculate
the correlation between the mid-band coefficients and
the two generated pseudorandom sequences for 0 and 1.
If the correlation with the pseudorandom sequence 0
was higher than the correlation with pseudorandom
sequence 1, then the extracted watermark bit is
considered 0
Otherwise the extracted watermark is considered 1.
Step.7: Reconstruct the watermark using the extracted
watermark bits, and compute the similarity between the
original and extracted watermarks.
Stop.

IJCTA | Nov-Dec 2014


Available online@www.ijcta.com

The evaluation of proposed scheme is done with


respect to robustness and fidelity. Matlab 2009a
programming tool and the bitmap cover image Lena of
size 225 X 225, binary watermark bitmap image
containing text ANAND of size 50 X 20 are used for
the purpose. The imperceptibility by the presence of
watermark is measured as 35.2584 dB as shown in
Fig.5.1 and Fig.5.2. Better robustness is achieved and
demonstrated with addition of Gaussian noise with
different mean values, variances shown in Fig.6; and
also by adding multiple noise like, Gaussian noise and
Poisson noise, Gaussian noise, Poisson noise and salt
& pepper noise as shown in Fig.5.3 to Fig.5.8. Other
image processing attacks like jpeg compression gives
PSNR 33.61 dB as shown in Fig 5.9, and retrieval of
watermark from cropped watermarked image is also
better as shown in Fig 5.10.The correlation for the
Gaussian noise are shown in Fig.6 and correlation for
other said attacks shown in Table 1.
The charts in Fig.6 represent the behavior of the
algorithm with respect to Gaussian noise with different
mean and respective variances. It is clearly observed
that when mean and variance are increased the
correlation slowly decreases. The algorithm is best
suitable for Gaussian noise with mean 0.4. It is also
observed that the algorithm behavior is feasible with
multiple noise, compression and cropping as depicted
in Table 1.

Table 1- Correlation for different attacks

2008

ISSN:2229-6093

Anand Ghuli et al, Int.J.Computer Technology & Applications,Vol 5 (6),2006-2010

Fig.6- Correlation Graph for Gaussian Noise


(Chart-1 with mean 0.0, chart-2 with mean 0.1 to
0.3)

5. Conclusion
Fig.5-Results and Testing
The DWT, Chirp-Z and Fast Walsh-Hadamard
Transforms are used successfully for digital
watermarking. The experimental results reveal that, this
combined approach gives acceptable psnr value
35.2584 dB and correlation of retrieved watermark with
original is 1. It is observed that the correlation
decreases as mean and variance increased in case of
Gaussian noise attack. The algorithm yields better
result for different noise attacks, multiple noise attack,
compression and cropping as observed in Table 1. This
type of combination is feasible for reducing the gap
between robustness and fidelity with limited capacity.

IJCTA | Nov-Dec 2014


Available online@www.ijcta.com

2009

ISSN:2229-6093

Anand Ghuli et al, Int.J.Computer Technology & Applications,Vol 5 (6),2006-2010

6. References
1. Bhupendra Ram(2013), Digital Image Watermarking
Technique Using Discrete Wavelet Transform And
Discrete Cosine Transform: International Journal of
Advancements in Research & Technology, ISSN 22787763, Vol. 2, No.4, pp 19-27.
2. K. Chaitanya, E. Sreenivasa Reddy & K. Gangadhara
Rao(2013), Digital Color Image Watermarking using
DWTDCT Coefficients in RGB Planes: Global Journal of
Computer Science and Technology Graphics & Vision,
Vol.13:No.5, Online ISSN-0975-4172,Print ISSN : 09754350.
3. Pratibha Sharma and Shanti Swami (2013), Digital Image
Watermarking Using 3 level Discrete Wavelet Transform:
Conference on Advances in Communication and Control
Systems(CAC2S 2013),Atlantis Press, pp 129-133.
4. D.Phani Kumar, G.Rosline Nesakumari, S.Maruthu
Perumal(2013), Contrast Based Color Watermarking
using Lagrange Polynomials Interpolation in Wavelet
Domain, International Journal of Engineering and
Advanced Technology (IJEAT) ISSN: 2249 8958,
Vol.3, No.1, pp 362-367.
5. Abdelhamid Benhocine, Lamri Laouamer, Laurent Nana
and Anca Christine Pascu(2013), New Images
Watermarking Scheme Based on Singular Value
Decomposition: Journal of Information Hiding and
Multimedia
Signal
Processing,ISSN
20734212bUbiquitous International Vol.4, No. 1, pp 9-18.
6. Huming Gao, Liyuan Jia, Meiling Liu,(2013), A Digital
Watermarking Algorithm for Color Image Based on
DWT: TELKOMNIKA, e-ISSN: 2087-278X,Vol.11,No.
6, pp 3271-3278.
7. Hongshou Yan, Weimin Yang(2013), A Watermarking
Algorithm Based on Wavelet and Hadamard Transform
for Color Image: Journal of Software Engineering and
Applications, No.6, pp 58-61.
8. Aris Marjuni, Mohammad Faizal Ahmad Fauzi,
Rajasvaran Logeswaran, and Swee-Huay Heng (2013),
An Improved DCT-Based Image Watermarking Scheme
Using Fast Walsh Hadamard Transform: International
Journal of Computer and Electrical Engineering,Vol.5,
No.3, pp 271-278.
9. Rama Seshagiri Rao Channapragada, Durga Lakshmi
Nukineedi, Munaga V.N.K. Prasad (2012), Digital
Watermarking Algorithm Based on CCC - FWHT
Technique: International Journal of Advancements in
Computing Technology, Vol.4, No.18, pp 593-599.
10. Franklin Rajkumar.V, Manekandan.GRS, V.Santhi
(2011), Entropy based Robust Watermarking Scheme
using
Hadamard
Transformation
Technique:
International Journal of Computer Applications, Vol.12,
No.9, pp 14-21.
11. Liu Ping Feng, Liang Bin Zheng and Peng Cao(2010), A
DWT-DCT Based Blind Watermarking Algorithm for
Copyright Protection:Computer Science and Information
Technology (ICCSIT) 3rd IEEE Conference, Print ISBN
978-1-4244-5537-9, Vol.7, pp 455-458.

12. Ali Al-Haj (2007), Combined DWT-DCT Digital Image


Watermarking: Journal of Computer Science, ISSN
1549-3636,Vol.3, No.9, pp 740-746.

IJCTA | Nov-Dec 2014


Available online@www.ijcta.com

2010

Anda mungkin juga menyukai