Development of an Invisible Digital Watermarking on Image

Download Report

Transcript Development of an Invisible Digital Watermarking on Image

Application of Biometric Image as a
Key in Ensuring Security of Data
using Steganographic Approach
Presented By….
Sabyasachi Samanta
Assistant Professor,
Haldia Institute of Technology,
Haldia, WB, INDIA
E-mail id:
[email protected]
Guided By…..
Prof (DR). Saurabh Dutta
Dr. B. C. Roy Engineering College,Durgapur, WB, INDIA
E-mail id: [email protected]
Prof (DR). Gautam Sanyal
National Institute of Technology,Durgapur, WB, INDIA,
E-mail id: [email protected]
Digital Watermarking
A technique which allows an individual to add hidden
copyright notices or other verification messages to digital
audio, video, or image signals and documents.
Any media
Detected
message
Watermark
embedder
Message
Watermarked
work
(looks like
original)
Watermark
detector
Fig 1: Basic design of a system
Types of Watermarking
A. Visible watermarking
B. Invisible watermarking
Fragile Watermarking-
It should be able to detect any
change in the signal and identify where it has taken place and
possibly what the signal was before modification.
Semi-Fragile Watermarking- Which is highly sensitive to a
modification of the stego-medium.
Robust Watermarking- Should be stuck to the document it
has been embedded in, in such a way that any signal
transform of reasonable strength cannot remove the
watermark.
Visible Watermarks
It changes the signal altogether such that the
watermarked signal is totally different from the
actual signal.
Fig. 2: Watermarked Image
Invisible watermarks
It does not change the signal to a perceptually
great extent, i.e., there are only minor
variations in the output signal.
Fig. 3: Watermarked Image
Application of Digital Watermarking
•
•
•
•
•
Ownership assertion
Fingerprinting
Content Protection
Copy prevention or control
Medical Applications
Information Hiding
• Cryptography- hides the content of the message, but not the
existence of the message.
• Steganography- performs message hiding such that an
attacker cannot detect the presence of the message in the
image/video/audio.
• Watermarking- hides the message such that an attacker
cannot tamper with the message contained within the
image/video/audio.
Abstract:
 Data bits from textual message are embedded about the entire
image to some suitable pixel positions.
 The root pixel position is selected depending on the key value
and the remaining is considered as the child nodes are calculated
in binary tree.
 After that we have formed three different image shares using any
two components of R, G and B of entire stego-image. The key is
also divided into three different logical blocks by digits.
 Out of those three shares, only addition of any two is able to
make the full image or key.
 At the decryption end through appropriate arrangement of
shares of key and image, make possible to retrieve hidden data
bits from stego-image and reform into its original content.
The Scheme
(A) Encryption of data bits about the image
i. Create an array from message data
ii. Formation of subset of key taking key input from keyboard
iii. Selection of pixel positions using key
iv. Replacement of array elements with R, G & B values of pixels
v. Creation of image shares from the watermarked image
(B) Decryption of the data bits from the image
i) Regain of replaced bits from the stego- image and formation of original
content
IMPLEMENTATON
Let the message to be encrypt is “NONLINEAR”.
So the length of the message
=09(Decimal equivalent)
=00001001(8 Bit Binary equivalent)
Table 1: Characters with binary equivalent
Contd...
 Store the bits for length to the array earr[bit] and then
store the bits from text respectively as:
Table 2: Data bits in encrypted array
 The array elements are replaced with R, G and B values in
selected nonlinear pixels and bit position about the image.
Experimental Result:
(a)
(b)
(d)
(c)
(e)
Figure : (a) is the first original image, (b) the stego-image, (c) (d) and (e) image shares
with absent of R, G and B components respectively
Histogram
The histogram for the cover image and stegoimage is given.
(a)
(b)
Figure: (a) and (b) the histogram for cover image and
stego-image respectively
PSNR & MSE
• Mean squared error (MSE) of the stego-image as
follows:
• The PSNR is computed using the following formulae:
Table : PSNR values after embedding text in host image
Analysis:
Here we have generated root pixel position depending
on key value. And the remaining positions are calculated
as the child nodes are calculated in binary tree.
Here we have produced an invisible watermarked image
and then the image shares using any two components of
three (R, G and B).
 We have not used any compression and/or encryption
technique before the creation of array .
 Any body can employ the compression and/or
encryption technique(s) at the time of creation of array.
Then length of array will be less and the strength of
encryption will be higher than present. In addition the
number of affected pixel will also be fewer than now.
Conclusion:
 We have generated random pixel positions depending on key.
 After that we generated image shares from watermarked image
and key shares from key by which the data is embedded to image.
 At the time of decryption only a proper combination of image
and key shares may produce the original watermarked image and
key from which data can be extracted.
 It produces the almost nearly similar image at the time to produce
the watermarked image using this method. If the key become
unknown to anybody who wants to attack the information, the
set of random figures i.e. the essential pixel positions will be
unknown.
References
[1] P. S. Revenkar, Anisa Anjum, W .Z. Gandhare “Secure Iris Authentication
Using Visual Cryptography”, International Journal of Computer Science and
Information Security, Vol. 7, No.3, 2010, ISSN 1947-5500, pp.-217-221
[2] Souvik Bhattacharyya, Goutam Sanyal “A Data Hiding Model with High
Security Features Combining Finite State Machines and PMM method”,
International Journal of Electrical and Computer Engineering 5:2 2010, pp.
78-85
[3] Sabyasachi Samanta, Saurabh Dutta, Goutam Sanyal, “An Enhancement of
Security on Image Applying Asymmetric Key Algorithm”, International
Journal of Computer Applications (0975 – 8887), Volume 25– No.5, July
2011, pp. 19-23
[4] Thi Hoang Ngan Le, Kim Hung Nguyen, Hoai Bac Le “Literature Survey on
Image Watermarking Tools, Watermark Attacks, and Benchmarking Tools”,
2010 Second International Conferences on Advances in Multimedia, pp. 6773.
Contd...
[5] M. Kameswara Rao, Sushma Yalamanchili, “Copyright Protection of Gray Scale
Images by Watermarking Technique Using (N, N) Secret Sharing Scheme”,
Journal of Emerging Technologies in Web Intelligence, Vol. 2, No. 2, May 2010,
pp. 101-105
[6] Mahmoud A. Hassan, Mohammed A. Khalili, “Self Watermarking based on
Visual Cryptography”, World Academy of Science, Engineering and Technology
8, 2005
[7] V. Lokeswara Reddy, Dr. A. Subramanyam, Dr. P. Chenna Reddy,
“Implementation of LSB Steganography and its Evaluation for Various File
Formats”, International Journal Advanced Networking and Applications
Volume: 02, Issue: 05, Pages: 868-872 (2011)
[8] Mrs. Kavitha, Kavita Kadam, Ashwini Koshti, Priya Dunghav, ”Steganography
Using Least Significant Bit Algorithm”, “International Journal of Engineering
Research and Applications (IJERA)” ISSN: 2248-9622, Vol. 2, Issue 3, May-Jun
2012, pp. 338-341
Contd...
[9] Chung-Ming Wang , Nan-I Wu , Chwei-Shyong Tsai , Min-Shiang Hwang, “A
high quality steganographic method with pixel-value differencing and modulus
function”, The Journal of Systems and Software (2007), pp. 1-9
[10] J. K. Mandal, Debashis Das, “Steganography Using Adaptive Pixel Value
Differencing (APVD) of Gray Images through Exclusion of
Overflow/Underflow”, CS & IT-CSCP 2012, pp. 93-102
[11] Muhammad A Khan, Vidyasagar Potdar, Elizabeth Chang, “An Architecture
Platform for Grey Level Modification Steganography System”
[12] Rajkumar Yadav, Ravi Saini, Kamaldeep, “A New Image Steganography
Approach for Information Security Using Gray Level Images in Spatial
Domain”, International Journal on Computer Science and Engineering
(IJCSE), Vol. 3, No. 7, July 2011, pp. 2679-2690
[13] Dr. Ekta Walia, Payal Jain, An Analysis of LSB & DCT based Steganography”,
Global Journal of Computer Science and Technology, Vol. 10, Issue 1 (Ver
1.0), April 2010, pp. 4-8
[14] Chia-Chen Lin, Pei-Feng Shiu, “DCT-based Reversible Data Hiding Scheme”,
Journal of Software, Vol. 5, No. 2, February 2010, pp. 214-224
THANK YOU…..