Security image transmission
Using Image Watermarking

DCT, DWT, Digital Image Watermarking

Intro

The snowballing of digitisation due to rapid growth in internet and computer technologies , image authentication and image restoration in case of any attack is one of the major factors in today’s environment. Digital watermarking is one such saviour that has been developed to protect digital images from illegal manipulations.

A combined approach of DCT-DWT based image watermarking is put forward in this paper that effectively enhances the image restoration and authentication capability.

Methodology used

DWT Based Image breakDown

Combined DCT-DWT Algorithm [EMBEDDING]

Apply DWT onto each portion of cover image to give non-overlapping bands LL1,HL1,LH1and HH1.

Apply DWT now on the either of sub-band amongst HH1 or HL1 as depicted in above figure for LL1.

Divide sub-band HH2 or HL2 into 4 * 4 blocks.

Apply DCT to each of these blocks now .

Embedding of watermark will be done in the mid sub-band coefficients fetched out of DCT and a scale factor we need to define in order to decide the perceptibility of watermark post embedding.mid_coeff’=mid_coeff (+/-) ALPHA * watermark

Apply inverse operation of DCT [IDCT] to after embedding the mid sub-band coefficients based on above formula

Apply IDWT on this transformed image, include modified sub-bands , to produce the watermarked host image.

Convert the watermarked Image now into complete image portion by portion .

EXTRACTION [Blind water marking - therefore host image not needed for this].

Combine and convert back portions using inverse spiral of matrix in each portion.

Apply DWT to this watermarked Image which may be altered or unaltered.

Apply DWT in (HL1 to form four frequency sub-bands)

Divide sub-bands like step 3 in embedding into 4*4 blocks.

DCT will be applied now to chosen sub-band and take out the mid-band coefficients for each DCT transformed 4*4 block.

Regenerate watermark pattern , this will help in comparing the original watermark with the current coefficients and will help in tamper localisation.

For each block in the sub-band (HL2 or HH2), calculate the correlation between the mid-band coefficients and generated pattern from previous step. Based on correlation mark each of this watermarking bits [this will be based on whether the watermarking image is RGB or GRAY ], after remaking the watermark time to compare both original and extracted for tamper localisation and authenticity.

Reconstruct the watermark using the extracted watermark bits, and compute the dis-similarity between the original and extracted watermarks.

Result Evaluation

Proposed Algo

PSNR = 100 Perceptibility * fragility = high. Solves Drawbacks of both Image quality after embedding = high , But not as good as original. Robustness = High

DCT

PSNR = 41.4 MSE = 0.67 While transmission can be easily altered and attacked can get to know the type of information being transmitted. Perceptibility * fragility = medium. Not suitable for image contains almost same intensities or pixel values. Robustness and image quality after embedding = medium.

DWT

PSNR=27.46 MSE=17.45 While transmission can be easily altered and attacked can get to know the type of information being transmitted. Perceptibility * fragility = medium. Robustness and Image quality = low.