Ms.Kapre Bhagyashri S (senior Lect.
)
MGM` College oI Engineering, Nanded
bhagyashrikapre24gmail.com
$EVWUDFW  Due Due Due Due   to to to to   the the the the   advancement advancement advancement advancement   in in in in   Computer Computer Computer Computer
technology technology technology technology and and and and readily readily readily readily available available available available tools, tools, tools, tools, it it it it is is is is very very very very easy easy easy easy for for for for
the the the the   unknown unknown unknown unknown   users users users users   to to to to   produce produce produce produce   illegal illegal illegal illegal   copies copies copies copies   of of of of
multimedia multimedia multimedia multimedia   data data data data   which which which which   are are are are   floating floating floating floating   across across across across   the the the the
Internet.In Internet.In Internet.In Internet.In order order order order  to to to to protect protect protect protect  those those those those  multimedia multimedia multimedia multimedia data data data data  on on on on
the the the the  Internet Internet Internet Internet   many many many many techniques techniques techniques techniques  are are are are  available available available available including including including including
various various various various encryption encryption encryption encryption   techniques, techniques, techniques, techniques,   steganography steganography steganography steganography
techniques, techniques, techniques, techniques,   watermarking watermarking watermarking watermarking  techniques techniques techniques techniques  and and and and  information information information information
hiding hiding hiding hiding techniques. techniques. techniques. techniques. Digital Digital Digital Digital watermarking watermarking watermarking watermarking is is is is aaaa technique technique technique technique
in in in in which which which which a aaa piece piece piece piece of of of of digital digital digital digital information information information information is is is is embedded embedded embedded embedded into into into into
an an an an image image image image and and and and extracted extracted extracted extracted later later later later for for for for ownership ownership ownership ownership verification. verification. verification. verification.
Secret Secret Secret Secret  digital digital digital digital   data data data data  can can can can  be be be be  embedded embedded embedded embedded  either either either either  in in in in  spatial spatial spatial spatial
domain domain domain domain or or or or  in in in in frequency frequency frequency frequency  domain domain domain domain of of of of  the the the the  cover cover cover cover  data. data. data. data.   In In In In
this this this this paper, paper, paper, paper, a aaa new new new new singular singular singular singular value value value value decomposition decomposition decomposition decomposition (SVD) (SVD) (SVD) (SVD)
and and and and   discrete discrete discrete discrete   wavelet wavelet wavelet wavelet   transformation transformation transformation transformation   (DWT) (DWT) (DWT) (DWT)   based based based based
technique technique technique technique   is is is is   proposed proposed proposed proposed  for for for for   hiding hiding hiding hiding   watermark watermark watermark watermark  in in in in  full full full full
frequency frequency frequency frequency band band band band of of of of color color color color images images images images (DSFW). (DSFW). (DSFW). (DSFW). The The The The quality quality quality quality of of of of
the the the the   watermarked watermarked watermarked watermarked  image image image image   and and and and  extracted extracted extracted extracted  watermark watermark watermark watermark  is is is is
measured measured measured measured using using using using peak peak peak peak signal signal signal signal to to to to noise noise noise noise ratio ratio ratio ratio (PSNR) (PSNR) (PSNR) (PSNR) and and and and
normalized normalized normalized normalized correlation correlation correlation correlation (NC) (NC) (NC) (NC) respectively. respectively. respectively. respectively. It It It It is is is is observed observed observed observed
that that that that   the the the the   quality quality quality quality   of of of of   the the the the   watermarked watermarked watermarked watermarked   image image image image   is is is is
maintained maintained maintained maintained   with with with with   the the the the   value value value value   of of of of   36dB. 36dB. 36dB. 36dB.   Robustness Robustness Robustness Robustness   of of of of
proposed proposed proposed proposed   algorithm algorithm algorithm algorithm   is is is is   tested tested tested tested   for for for for   various various various various   attacks attacks attacks attacks
including including including including  salt salt salt salt   and and and and  pepper pepper pepper pepper  noise noise noise noise  and and and and  Gaussian Gaussian Gaussian Gaussian  noise, noise, noise, noise,
cropping cropping cropping cropping and and and and 1PEG 1PEG 1PEG 1PEG compression. compression. compression. compression.
Keywords-   Digital Digital Digital Digital   watermarking, watermarking, watermarking, watermarking,   Discrete Discrete Discrete Discrete   Wavelet Wavelet Wavelet Wavelet
transformation transformation transformation transformation   technique, technique, technique, technique,   SVD-Watermarking, SVD-Watermarking, SVD-Watermarking, SVD-Watermarking,
Transform Transform Transform Transform Domain Domain Domain Domain watermarking. watermarking. watermarking. watermarking.
I. I. I. I. INTRODUCTION INTRODUCTION INTRODUCTION INTRODUCTION
In   recent   days,   usage   oI   computer   networks   Ior
communication and Ior inIormation sharing leads to
increase in size oI Internet. As the size oI the Internet
grows, the volume oI multimedia data (images, text,
video / audio) Iloating around also increases day by
day. As many advanced tools are readily available to
duplicate and modiIy those data in the Internet easily,
security  is  the  major  concern,   which  requires  some
mechanisms to protect digital multimedia data. Thus
watermarking   is   a   technique   which   supports   with
Ieasible solution. Digital Watermarking is deIined as
the  process  oI  hiding  a  piece  oI  digital   data  in  the
cover data which is to be protected and extracted later
Ior ownership veriIication |1|. Some oI the important
applications oI watermarking technique are copyright
protection,   ownership   veriIication,   Iinger   printing,
and   broadcast   monitoring.   The   Ieatures   oI
watermarking  include  robustness   and  perceptibility.
Robustness   indicates   the   resistivity   oI   watermark
against   diIIerent   types  oI   attacks  such  as  cropping,
rotating, scaling, low pass Iiltering, resizing, addition
oI
Mrs. Joshi M.Y. (Asst. ProI.)
MGM` College oI Engineering, Nanded
manisha.y.joshigmail.com
noise,   JPEG   compression,   sharpness,   histogram
equalization  and  contrast   adjustment.   Those  attacks
are either intentional or unintentional. Robustness is
the   property   which   is   important   Ior   ownership
veriIication   whereas   the   Iragility  is   important   Ior
image   authentication.   Robustness   oI   watermarking
algorithm  is   obtained   to   a   maximum  level   when
inIormation is hidden in robust components oI cover
data. The increasing perceptibility will also decrease
the quality oI watermarked image.
General   y   inIormation   could   be   hidden,
directly  by  modiIying  the   intensity   value   or   pixel
value  oI  an  image  or  its  Irequency  components  |2|.
The   Iormer   technique   is   called   spatial   domain
technique   and   later   is   cal   ed   Irequency   domain
technique.   To   obtain   Irequency   components   oI   an
image,   it needs  to  be  transIormed  using  any  one  oI
the   transIormation   techniques   such   as   Discrete
Fourier TransIormation (DFT), Discrete short Fourier
transIormation   (DSFT),   Discrete   Cosine
TransIormation   (DCT)   |3||4|,   Walsh   Hadamard
transIormation  (DHT)   |5||6|,   and  Discrete   wavelet
TransIormation   (DWT)|7||8||9||10|.   In   TransIorm
domain  casting  oI   watermark  can  be   done   in  Iull
Irequency band oI an image or in speciIic Irequency
band   such   as   in   low  Irequency   band   or   in   high
Irequency band or in middle Irequency band.
In the proposed method DSFW, inIormation is
hidden in YUV space oI a color image. The Ieatures
oI   SVD  technique|11|   are  combined  with  DWT  to
embed data in Irequency domain oI cover data. The
review  oI   related   work   is   given   in   section   II.   In
section III overview oI singular value   decomposition
is   given.   The   proposed  algorithm  is   discussed  in
detail in section IV. Results and analysis oI proposed
algorithm is discussed in section V.
II. II. II. II. REVIEW REVIEW REVIEW REVIEW OF OF OF OF RELATED RELATED RELATED RELATED WORKS WORKS WORKS WORKS
Review oI literature survey has been conducted on
discrete   wavelet   transIormation  combined  with singular
value   decomposition  techniques   Ior   hiding  image
into   bands   oI   diIIerent   Irequency  and   a   particular
band   is   converted   into   blocks   oI   size   4x4   Ior
embedding   data.   Each   oI   those   blocks   is   SVD
transIormed   and watermark is hidden into diagonal
matrix  oI  every  block.   The  similarity  between  the
All All All All Frequency Frequency Frequency Frequency Band Band Band Band DWT-SVD DWT-SVD DWT-SVD DWT-SVD Robust Robust Robust Robust
Watermarking Watermarking Watermarking Watermarking Technique Technique Technique Technique for for for for Color Color Color Color Images Images Images Images in in in in
YUV YUV YUV YUV Color Color Color Color Space Space Space Space
___________________________________
978-1-4244-8728-8/11/$26.00 2011 IEEE  
  
original watermark and the extracted watermark Irom
the attacked image is measured   using the correlation
Iactor NC.   The algorithm shows  that when DWT is
combined   with   SVD  technique   the   watermarking
algorithm  outperIorms   than  the   conventional   DWT
algorithm with respect to robustness against Gaussian
noise,   compression  and  cropping  attacks.   In  |9|  the
DWT is combined with SVD technique to hide data
in  high  Irequency  band  oI   an  image.   This   scheme
perIorms   well   Ior   variety   oI   image   processing
operations.   In  |10|  Image  is  transIormed   by  DWT
technique to K level. The middle Irequency band LH
and   HL   are   SVD  transIormed   and   watermark   is
hidden.Similarly   in   low   Irequency   and   high
Irequency   band   the   watermark   is   embedded  using
distributed   discrete   wavelet   transIorm   method
(DDWT). Both algorithms  are tested  against  attacks
and   proved   that   they   are   robust   against   cropping
attacks. For at acks such as Gaussian Noise, contrast
adjustment,   sharpness,   histogram  equalization,   and
rotation, the proposed scheme is robust by exploiting
the  advantage  oI  the  SVD  watermarking  technique.
In  |12|  both  cover  image  and  watermark  image  are
pre   processed   to   hide   watermark   in   transIorm
domain.   The  perIormance  evaluation  shows  that  the
algorithm is robust against at acks such as cropping,
Gaussian   noise,   JPEG  compression   and   low  pass
Iiltering. In |14|, three level decomposition oI DWT
is   applied   on   an   image   to   get   ten   bands   oI
Irequencies. Al   ten bands oI Irequency  coeIIicients
are  SVD  transIormed  to  embed  watermark.   A  new
watermarking  scheme  Ior   images   based  on  Human
Visual   System   (HVS)   and   Singular   Value
Decomposition   (SVD)   in   the   wavelet   domain   is
discussed  |15|.Experimental   results   show  its   better
perIormance  Ior   compression,   cropping  and  scaling
attack.   As   per   the   review   many   algorithms   are
available to hide watermark in intensity images rather
than color images. In DSFW, color image is taken as
cover data in which al   the pixel color components are
highly correlated, so the cover data in RGB color domain is
converted   into   YUV  domain   where   intensity(Y)   and
chrominance   (UV)   components   are   decorreleted.   Secret
data  can  be  hidden  either  in   intensity  components  or  in
color  components.   The  quality  oI   watermarked  data  and
extracted.
III. III. III. III. OVERVIEW OVERVIEW OVERVIEW OVERVIEW OF OF OF OF SINGULAR SINGULAR SINGULAR SINGULAR VALUE VALUE VALUE VALUE
DECOMPOSITION DECOMPOSITION DECOMPOSITION DECOMPOSITION
Singular   value   decomposition   is   a   linear   algebra
technique   sed to solve many mathematical   problems |11|.
The  theoretical   background  oI  SVD   technique  in  image
processing applications to be  noticed is |15|:
a) The SVs (Singular Values) oI an image has very
good  stability,   which  means  that   when  a   smal   value  is
added  to  an  image,   this  does  not   aIIect   the  quality  with
great variation.
b) SVD is able to eIIiciently represent the   intrinsic
algebraic   properties   oI   an  image,   where   singular   values
correspond  to  the   brightness  oI  the   image  and  singular
vectors reIlect geometry characteristics oI the image.
c) An image matrix has many small singular values
compared with the Iirst singular value. Even ignoring  these
small   singular  values  in  the  reconstruction   oI  the  image
does not aIIect the quality oI the  reconstructed image
Any  image  can  be  considered  as  a  square  matrix
without   loss   oI   generality.   So   SVD  technique   can   be
applied to any kind oI images. II it is a gray scale image the
matrix   values   are   considered   as   intensity   values   and   it
could be modiIied directly or changes could be done aIter
transIorming  images   into  Irequency  domain.   The   SVD
belongs   to  orthogonal   transIorm  which   decompose   the
given   matrix   into   three   matrices   oI   same   size   |3|.   To
decompose the matrix using SVD technique it need not be a
square matrix.   Let  us   denote the image  as  matrix A.The
SVD decomposition oI matrix A is given using (1)
AAAA   USV USV USV USV
TTTT
(1) (1) (1) (1)
U  and  V  are  unitary  matrices  such  that   UU
T
I,
VV
T
 I, where I is an Identity matrix.   U|u1,u2,u3,..un|
V|v1,v2,v3,..vn|   ,   U  matrix   is   called   leIt   singular
values  and  V  matrix  is  called  right   singular  values.   The
decomposition oI matrix A is   obtained using (2
such that all the elements in main diagonal
are in decreasing order like 1   23  ... n0,
where  S  is  the  diagonal   matrix  having  in  its  main
diagonal all positive singular values oI A. Number oI
nonzero values equals the rank oI the matrix. These
positive   singular   values   can   be   used   to   embed
watermark. The order oI singular matrix is same as A,
and hence the resultant matrix is also square. Hence
images oI equal size can be taken as cover
object.
IV. IV. IV. IV. PROPOSED PROPOSED PROPOSED PROPOSED SYSTEM SYSTEM SYSTEM SYSTEM  DSFW DSFW DSFW DSFW
$ $ $ $ (PEHGGLQJ (PEHGGLQJ (PEHGGLQJ (PEHGGLQJ 3URFHGXUH 3URFHGXUH 3URFHGXUH 3URFHGXUH
The  block  diagram  Ior  embedding  watermark  in
transIorm domain using SVD technique is shown in Fig.1.
As   color   image   is   used  as   cover   data  in  the  proposed
system DSFW, the RGB value oI each pixel is converted
into   RGB   color   spaces   |13|   |12|   in   which   only   R
components   constitute   R   color   space,   G   components
constitute G  color space and B   components constitute B
color space. Watermark can be hidden in any one or in the
three   color   channels.   Since   pixel   values   are   highly
correlated in RGB color spaces,   inIormation can be hidden
in  YUV  color   spaces.   The  RGB   components  oI   color
image is converted into RG color   spaces which in turn is
converted into YUV color spaces using (3).The YUV color
spaces consists oI luminance   (intensity) and chrominance
(color)  components.   The  input   image  in  YUV  domain  is
shown in Fig.3. The Y component   consists oI
intensity  values  whereas  the  UV  components   consist   oI
chrominance values oI color image. The energy content oI
Y component is higher   than the chrominance   components
oI  U  and  V.   In  DSFW,   YUV  color  spaces  are   used  Ior
embedding  secret   data  aIter   transIormed  into   Irequency
coeIIicients using Haar wavelet. The Haar wavelet is a tool
which  is  used  to  convert   given  image  into  Iour   band  oI
Irequency by decompose it. In each level oI decomposition
the   input   image   is   decomposed   into   Iour   band   oI
Irequencies named LL, LH, HL and HH   band. Each band
oI Irequency is SVD transIormed and watermark is hidden
in   the   singular   values   (diagonal   elements)   oI   singular
matrix.   Then  inverse  SVD  technique  and  inverse  wavelet
transIormation technique is applied to get the watermarked
image.
(a)RGB Image (b)Y Component (c)U Component (d) V
Component
Fig.1 Fig.1 Fig.1 Fig.1 RGB RGB RGB RGB Image Image Image Image Transformed Transformed Transformed Transformed into into into into YUV YUV YUV YUV Color Color Color Color Space Space Space Space
Fig.2. Fig.2. Fig.2. Fig.2. Process Process Process Process of of of of Embedding Embedding Embedding Embedding Watermark Watermark Watermark Watermark in in in in an an an an Image Image Image Image
% % % % $OJRULWKP $OJRULWKP $OJRULWKP $OJRULWKP IRU IRU IRU IRU (PEHGGLQJ (PEHGGLQJ (PEHGGLQJ (PEHGGLQJ :DWHUPDUN :DWHUPDUN :DWHUPDUN :DWHUPDUN
In   the   proposed   method,   Iull   band   Irequency   is
selected to hide watermark in al   the three channel oI   YUV
color space. The embedding Iactor or control Iactor is used
to control the energy oI the watermark and it is denoted as
   and  its   value  range  Irom  0  to  1  (0__1).   The
algorithm Ior hiding inIormation is   given below:
Step Step Step Step 1 111   RGB components oI color image A is   converted
into YUV color spaces using (3)
y (0.275*R)(0.504*G)(0.098*B)16
v(0.439*R)-(0.368*G)-(0.071*B)128
u(0.148*R)-(0.291*G)(0.439*B)128
Step Step Step Step 2222 Discrete wavelet transIormation technique is applied
to  YUV  matrices  to  decompose  it   into  diIIerent   range  oI
Irequency  bands.   For   each  level   oI  decomposition,   input
image matrix Y is transIormed  into   Iour bandoI
Irequency   named  LLY,LHY,HLY,HHY(5).   Similarly  U
and V image matrices are also transIormed into Iour band
oI Irequencies using (5)
LL,LH,HL,HH]DWT(Y,U,V) LL,LH,HL,HH]DWT(Y,U,V) LL,LH,HL,HH]DWT(Y,U,V) LL,LH,HL,HH]DWT(Y,U,V)   (5) (5) (5) (5)
Step Step Step Step 3 333   SVD technique is applied on each band oI YUV
color spaces oI cover data as well as on watermark using
(6).
U U U U SSSS V]SVD( V]SVD( V]SVD( V]SVD(%DQG %DQG %DQG %DQG))))
U U U U` ``` S SSS```` VVVV````]SVD(W) ]SVD(W) ]SVD(W) ]SVD(W)   (6)
Let   8 9 be orthogonal matrices, 6 is   a   diagonal
matrix. The diagonal matrix 6 is used to embed   watermark
in its diagonal   elements using (7). Here Band  represents
any one oI the Irequency band suchas LL, LH, HL and HH.
SSSS`` `` `` ``S+ S+ S+ S+ssss````   (7) (7) (7) (7)
The watermark S` is embedded into the non zero
elements oI the diagonal matrix 6  to obtain the
watermarked
Diagonal   matrix S``.
Step Step Step Step 4444 Inverse SVD is applied on watermarked   S`` matrix
to get the modiIied Image Band using (8)
%DQG %DQG %DQG %DQG````    UUUU ` ``` SSSS`` `` `` `` `V] `V] `V] `V]   (8) (8) (8) (8)
Step Step Step Step 5555 Inverse transIormation Technique is applied to   get
the watermarked image matrices oI Y,U,V using   (9)
Y Y Y Y````,U ,U ,U ,U` ```,V ,V ,V ,V` ```]DWT(LL ]DWT(LL ]DWT(LL ]DWT(LL````,LH ,LH ,LH ,LH` ```,HL ,HL ,HL ,HL` ```HH HH HH HH````) )))   (9) (9) (9) (9)
Step Step Step Step 6666 YUV color spaces are converted into R`G`B` color
spaces by (10)
AAAA````YUV(R YUV(R YUV(R YUV(R````G GGG` ```B BBB````) )))   (10) (10) (10) (10)
Where A` is an watermarked Image
& & & & $OJRULWKP $OJRULWKP $OJRULWKP $OJRULWKP IRU IRU IRU IRU ([WUDFWLQJ ([WUDFWLQJ ([WUDFWLQJ ([WUDFWLQJ :DWHUPDUN :DWHUPDUN :DWHUPDUN :DWHUPDUN
During Extraction process, the RGB components oI
the watermarked color image are converted into YUV color
spaces   which  in  turn  can  be   converted  into   Irequency
coeIIicients oI Iour bands. Each band oI Irequency is SVD
transIormed   to   extract   watermark   Irom  the   diagonal
elements.   The   block   diagram  oI   watermark   extraction
procedure is shown in Fig.3.
Fig.3. Fig.3. Fig.3. Fig.3. Process Process Process Process of of of of Extracting Extracting Extracting Extracting Watermark Watermark Watermark Watermark from from from froman an an an Image Image Image Image
Step Step Step Step 1111 Let $ be a watermarked image matrix, apply
transIormation technique to convert RGB color space
into YUV color space using (11)
YYYY````U UUU````V VVV````RGB(A RGB(A RGB(A RGB(A````) )))   (11)
Step Step Step Step 2222 Wavelet ransIormation Technique is applied
to YUV matrices to decompose it into diIIerent range
oI Irequency bands in (12).
LL LL LL LL````,LH ,LH ,LH ,LH````,HL ,HL ,HL ,HL` ```HH HH HH HH` ```]DWT(Y ]DWT(Y ]DWT(Y ]DWT(Y` ```U UUU` ```V VVV````) )))   (12)
Step Step Step Step 3333 SVD transIormation is applied on Iull band oI
wavelet transIormed YUV matrices
U U U U S SSS  V]SVD( V]SVD( V]SVD( V]SVD(%DQG %DQG %DQG %DQG````) )))   (13 (13 (13 (13)
Where %DQG %DQG %DQG %DQG```` means one oI wavelet transIormed
Irequency bands oI YUV matrices
Step Step Step Step 4444 Watermark is extracted using (14)
SSSS` ```(S (S (S (S-S)/ -S)/ -S)/ -S)/    (14)
Step Step Step Step 5555 Apply inverse SVD on retrieved watermark
using unitary matrices U and V
W`U S` V
Step Step Step Step 6666 The  similarity  oI  original  watermark  and
extracted watermark is measured using (15).
where W and We are original and extracted
watermark.
V. V. V. V. PPPPERFORMANCE ERFORMANCE ERFORMANCE ERFORMANCE AAAANALYSIS NALYSIS NALYSIS NALYSIS
The   perIormance   oI   algorithm  DSFW  is   analyzed
through the results which are obtained by embedding
large  sized  watermark  in  all   the  three  channels   oI
cover   image   in   YUV  space.   The   quality   oI   the
watermarked   image   can   be   measured   either
subjectively  or   objectively  and   it   is   observed   that
both subjective and objective quality oI watermarked
image is good. The PSNR is the objective criteria
used to measure the quality oI the watermarked image.
Similarly  the  quality  oI   the  extracted  watermark  is
measured by comparing it with the original watermark
and  is  called  similarity  measure.   The  peak  signal  to
noise  ratio  and  normalized  correlation  are  obtained
using (15) and (16) respectively.
host image  and  the  watermarked  image  respectively
and parameters PQ speciIy row and column size oI
images respectively.
In the DSFW the boat image oI size 256 X 256 is
taken  as  watermark  whereas  the  lena  image  oI  size
512 X 512 is taken as cover image and watermark is
hidden in Iull band oI Y, U and V channels oI cover
data.   The   original   image,   watermark   image   and
watermarked  is   shown  in  Fig.4.   The  quality  oI   the
watermarked  image  is  measured  through  PSNR  and
calculated  values  are  tabulated  in  Table.1.   Similarly
the   measured   normalized   correlation   values   are
tabulated in Table.2
Fig.4   (c)   shows   that   the   watermarked   image
quality  is   not   degraded  and  also  the   watermark  is
imperceptible,   so   the   proposed   algorithm   is
characterized   as   imperceptible   algorithm.   The
proposed  algorithm  is  tested  in  YUV  channels.   The
extracted   watermark   Irom   three   channels   (YUV)
under normal condition without any attack is shown
Fig   5.   Which   shows   that   watermark   could   be
embedded   in   any   one   oI   the   channel   iI   computer
network   is   highly   secured.   But   normally   the
communication   networks   are   not   secured   and   also
noisy   in   nature.   It   is   required   to   identiIy   a   good
channel   to   embed   watermark   such   that   it   should
withstand  maximum  possible  attacks  which  may  be
intentional or unintentional. The extracted watermark
aIter salt and pepper noise, Gaussian noise, cropping
and histogram equalization attacks are shown in Fig.6,
Fig.7, Fig. 8 and Fig.9 respectively. Table 1 shows the
quality oI the watermarked image through peak signal
to noise ratio.
Fig.5 Fig.5 Fig.5 Fig.5 Extracted Extracted Extracted Extracted Watermark Watermark Watermark Watermark from from from fromYUV YUV YUV YUV Channel Channel Channel Channel without without without without attack attack attack attack
The calculated value oI PSNR is above 36 decibels in
Y channel and 33decibals in U channel and 30 in V
channel   respectively.   The  PSNR  value   shows   that
the quality oI the watermarked image is good and not
degraded much when inIormation is added in the Y
channel than U and V channel.
Table.1 Table.1 Table.1 Table.1
PSNR PSNR PSNR PSNRvalues values values values of of of of Watermarked Watermarked Watermarked Watermarked image image image image Under Under Under Under normal normal normal normal
condition condition condition condition
Table.2 Table.2 Table.2 Table.2
Similarity Similarity Similarity Similarity Measure Measure Measure Measure of of of of Extracted Extracted Extracted Extracted and and and and Original Original Original Original
Watermark Watermark Watermark Watermark (NC) (NC) (NC) (NC)
Normalized   correlation   oI   extracted   watermark   is
measured  Ior   non-tampered  image  and  tabulated  in
Table.2.It   shows   that   the   quality   oI   the   extracted
watermark   Irom  U  channel   is   good   as   its   NC  is
0.9994   compared   to   calculated   NC  oI   Y  and   V
channels.   Thus   the   algorithm   shows   that   the
watermark can be hidden in U channel than Y and V.
The   robustness   oI   DSFW  algorithm  is   tested
against   various  attacks  such  as  addition  oI   salt   and
pepper noise, Gaussian noise, cropping and histogram
equalization.   The   original   and  extracted  watermark
aIter attacks Irom Y U and V channels are shown in
Fig.6-9.   The   calculated   values   oI   normalized
correlation  coeIIicients  are  tabulated  in  Table  3  and
Table  4.As   per   the  observation  the  quality  oI   both
watermarked image  and  extracted watermark  quality
is  high  Ior  additive  noise  attack  when  watermark  is
hidden into Y channel compared to U and V channel.
For   cropping   attack   the   quality   oI   the   extracted
watermark Irom V channel is better the quality oI Y
and  U  channel.   The   DSFW  algorithm  is   robust   to
cropping attack as watermark is hidden into Iull band
oI Irequency oI cover image.
Fig.6 Fig.6 Fig.6 Fig.6 Extracted Extracted Extracted Extracted watermark watermark watermark watermark after after after after salt salt salt salt and and and and pepper pepper pepper pepper noise noise noise noise
attack attack attack attack from from from fromY, Y, Y, Y, UUUU and and and and VVVV channels channels channels channels (Variance (Variance (Variance (Variance 0.001) 0.001) 0.001) 0.001)
Fig.7 Fig.7 Fig.7 Fig.7 Extracted Extracted Extracted Extracted watermark watermark watermark watermark after after after after Gaussian Gaussian Gaussian Gaussian noise noise noise noise attack attack attack attack
from from from fromY, Y, Y, Y, UUUUand and and and VVVV channel channel channel channel (Variance (Variance (Variance (Variance 0.01) 0.01) 0.01) 0.01)
Fig.8 Fig.8 Fig.8 Fig.8 Extracted Extracted Extracted Extracted watermark watermark watermark watermark after after after after cropping cropping cropping cropping attack attack attack attack from from from fromY, Y, Y, Y, UUUU
and and and and VVVV channel channel channel channel
Fig.9 Fig.9 Fig.9 Fig.9 Extracted Extracted Extracted Extracted watermark watermark watermark watermark after after after after Histogram Histogram Histogram HistogramEqualization Equalization Equalization Equalization
attack attack attack attack from from from fromY, Y, Y, Y, UUUU and and and and VVVVchannel channel channel channel
Similarity Measure oI Extracted and Original Watermark
aIter noise addition attack
Table Table Table Table 3333
Similarity Measure oI Extracted and Original atermark
aIter cropping and HISTOGRAM EQUALIZATION  attack
Table Table Table Table 4 444
VI. VI. VI. VI. C CCCONCLUSION ONCLUSION ONCLUSION ONCLUSION AND AND AND AND FFFFUTURE UTURE UTURE UTURE WWWWORK ORK ORK ORK
DWT-SVD combined Iull band robust watermarking
technique   DSFW  Ior   color   images   in   YUV  color
space is discussed in this paper. In this algorithm the
multi-resolution capability oI wavelet transIormation
technique   is   combined   with   singular   value
decomposition technique to make it robust. Since the
watermark  is   hidden  in  Iull   band  oI   YUV  channel
algorithm  DSFW  is   highly  robust   against   common
attacks   such   as   addition   oI   noise,   histogram
equalization  and  cropping,   which  are  considered  as
one   oI   the   serious   attacks.   The   quality   oI   the
extracted  watermark  shows   that   the   new  proposed
algorithm  is   robust   and   also   the   quality   oI   cover
image  is  not   degraded.   In  Iuture,   DSFW  algorithm
can be extended
REFERENCES
|1|   F.   Hartung   and   M.   Kutter,   "Multimedia   Watermarking
Techniques," in Proc. oI the IEEE, vol. 87, no. 7, pp. 1079-1107,
July 1999.
|2|   V.   Potdar,   et   al   "A  Survey  oI   Digital   Image  Watermarking
Techniques",   in   Proc.oI   the   EEE  International   ConIerence   on
Industrial InIormatics, Australia Perth, pp. 709-716, 2005.
|3|  Liu  Quan,   AI   Qingsong  'A  combination  oI  DCT  based  and
SVD based watermarking, ICSP proceedings oI IEEE International
conIerence on signal processing, pp. 873-876, 2004.
|4| Feng Liu, et al. 'A Watermarking Algorithm Ior Digital Image
Based   on   DCT   and   SVD   Congress   on   Image   and   Signal
Processing, 2008.
|5|   Emad   E.   Abdallah,   et   al.   'A  robust   block-based   image
watermarking scheme using Iast Hadamard transIorm and singular
value   decomposition   proceedings   oI   The   18th   International
ConIerence on Pattern Recognition, pp:673 - 676 , 2006.
|6| Tang Xianghong, Yang Lianjie, Yue Hengli, Yin Zhongke, 'A
Watermarking Algorithm Based on the SVD and Hadamard
TransIorm,   Proceedings   oI   International   ConIerence   on
Communications, Circuits and Systems,Volume 2, pp. 874-877 ,
27-30 May 2005.
|7|   Ali   Al-Haj,   'A   Hybrid   Digital   Image   Watermarking
Algorithm,   4th   International   ConIerence   on   Innovations   in
InIormation Technology. pp: 690 - 694 Nov. 2007.
|8|   Liu   Liang   and   Sun   Qi   'A   new   SVD-DWT   composite
watermarking,ICSP proceedings oI IEEE International conIerence
on signal processing .2006
|9| Jung-Chun Liu, Chu-Hsing Lin, and Li-Ching Kuo   A Robust
Iull   band   image   watermarking   scheme   Proceedings   on
IEEE .2006
|10| Qiang Li, et al, 'Adaptive DWT-SVD Domain Image
Watermarking Using Human Visual Model  proceedings oI 9th
international conIerence on advanced communication Technology,
Volume 3, pp:1947 - 1951, Feb.2007.
|11|   H.   Andrews   and   C.   Patterson,   "Singular   Value
decompositions  and  Digital   Image  Processing,"  IEEE  Trans.   on
Acoustics, Speech ,and Signal Processing, vol. 24, no. 1, pp. 26-53,
Feb. 1976.
|12|   Ruth  Buse  Dili,   Elijah  Mwangi,   'An  Image  Watermarking
method based on the singular value transIormation and the wavelet
transIormation 'Proceedings on IEEE. 2007
|13|   Cheng-qun  Yin,   Li   Li,   An-qiang  Lv  and  Li   Qu,   'Color   Image
Watermarking  Algorithm  Based  on  DWT-SVD   Proceedings   oI   the
IEEE   International   ConIerence   on   Automation   and   Logistics,
Page(s):2607   2611, August 18 - 21, 2007,Aug. 2007
|14|   Ali   Al-Haj,   et   al   'Non-Invertible   Copyright   Protection  oI
Digital   Images   Using   DWT   and   SVD   Proceedings   oI
International   ConIerence   on   Digital   InIormation   anagement,
Volume 1, 28-31 Page(s):448 - 453 2007.
|15| Ke-Ieng he, et al , 'Watermarking Ior images using the HVS
and   SVD   in   the   wavelet   domain   Proceedings   oI   IEEE
International   ConIerence   on   Mechatronics   and   Automation,
pp.2352- 2356, 2006.