Abstract: In thispaper a vigorous watermarking system is proposed by using SVD(Singular Value Decomposition)and DWT(Discrete WaveletTransform). SVD is being used for numerous applications along with supplementarymethods In addition to usual hiding arrangements a random moniker is utilizedto increase its heftinessin contradiction tobogusburglars. The unitary matricesare utilized to produce a moniker which is going to be embedded into the fourthlevel decomposition of shield image. After extraction, image be checked withthe Moniker embedded. If these Monikers are harmonized, unitary matrices areused to excerpt watermark from watermarked images.
Diverse attacks are well-thought-outand the simulation outcomes show that the extraction of watermark after attackshad minor effects. Keywords: attacks,authentication, moniker, SVD, watermarking I. IntroductionThesecurity of data transmitted from one place to other using regular wired orwireless network is a major concern in the current era. Large amount of secreteinformation is being sent using a regular network it may be wired or wireless.
Most of the networks will not employ additional security measures on how thedata is being transferred from one place to other. Hence the users of thesekinds of networks are themselves responsible to take care of their data. Anattempt to transmit images safely was made in this paper. The components of adigital watermarking system are embedding and extraction. Depending on whatdomain of shield image was used to embed the watermark, spatial and transformor frequencydomain watermarking systems are proposed in the literature.
The chiefadvantageof transform domain tactics is their extreme robustness to common image falsifications.Discrete cosine transformis a fundamental technique which was used extensivelyin early days of image processing and specifically used in image compression.Later, the revolution of wavelet has shifted the view of researcher as well asthe people from industry with a wide range of applications. While the DCTprovides an efficient representation for the input image, the DWT in additionto efficient representation it also enable different mechanisms by whichdifferent image processing tasks can ease their implementations and improvesthe performance of their task. The interesting feature of wavelet transform isthat it separates the image in terms of frequency with multiple levels.
Some ofthe levels are playing a vital role in reconstruction and other a minor role. Nowthe secret information can be saved in bands which has not much work inreconstruction. Thisis somehow or other similar to the LSB based technique of spatial domain 1.The LSB based technique concentrates in hiding the message bits in the LSBlocations of the cover image. The original LSB bits will be lost and theimportance of these bits is less in the sense that these bits if changed fromzero to one or one to zero results in a change of pixel value by only one,hence has less effect on the display. In addition to the said watermarkingscheme numerous watermarking techniques robust to symmetrical attacks have beenproposed in the literature 23. The wavelet based watermarking schemes arefound to be robust against multiple attacks like compression, blurring, saltand pepper noise and many other 4. Awatermarking scheme will have the following basic components.
Watermark is theprime component of the scheme, which is to be conveyed securely to thedestination which sustains many attacks. Cover image, which is usually largeenough for the watermarking scheme to embed the watermark on to it. Watermarkedimage, which is the outcome of the watermarking scheme. Embedding means a processof hiding the watermark in the cover image. Attack is an activity of modifyingthe effective appearance or the effective pixel value plane to a different set.The extraction is the process of separating the watermark from the watermarkedimage 5.
In theliterature a number modifications and improvements has been made to thewatermarking schemes. In 6, Mohammad Ali et.al presented a blind digital watermarking scheme based on quantization ofEigen values in Wavelet domain. In the literature fuzzy and artificial neuralnetworks based techniques 7-9, SVD based techniques 1011, hybridtechniques 1213, Biometric template based techniques 14, Evolutionaryalgorithm based techniques 15, Quadtrees based techniques 16, GEP basedtechniques 17 and video watermarking schemes 1819 are proposed. A largenumber of surveys are also being conducted 2021. Inthis paper a watermarking scheme is proposed which is a modified version orimproved version of traditional SVD-DWT based watermarking scheme.
The rest ofthe paper is organized as follows. In section-IIthe basic or standard DWT-SVDbased watermarking scheme was presented. In section-III the authenticationissue of the standard DWT-SVD based technique is described. Section-IV isconcerned the solution of the authentication problem. Section-V presents the simulationresults and the last section concludes the paper. II. The Standard DWT-SVD WatermarkingAlgorithmThestandard DWT-SVD watermarking scheme considers the cascade of DWT and SVD asthe main building block for the watermarking scheme.
First the DWT will beapplied to the cover image or the carrier image. The DWT as usual decomposesthe cover image into four frequency bands: Low-Low, Low-High, High-Low andHigh-High. The Low-Low band characterizeslow frequency, High-Low and Low-Highbandsdescribe middle frequency and High-High bandcharacterizes high frequency bands,respectively.The Low-Low band signifies approximate details, High-Low band horizontaldetails, Low-High vertical details and High-High band diagonal details of theimage. Thesedifferent bands contain different grades of information in it.
The cover imageis basically an image hence the Low-Low band contains all the small variationswhich crucial in determining the boundary of different objects present in theimage. Similarly the Low-High and High-Low has some useful information inreconstruction than that of High-High band of frequency. Hence the High-Highfrequency band was selected as the candidate to store the information relatedto the secrete data. To provide additional security the SVD is applied to theHigh-High band of cover image as well as to the watermark. The concept of thisscheme is to replace the singular values obtained after applying the SVD ofcover image with the singular values of watermark. It is observed that singular values rangefrom85to 175 for most of the standard images.