A Novel Spatial Domain Technique For Digital Image Watermarking Using Block Entropy
A Novel Spatial Domain Technique For Digital Image Watermarking Using Block Entropy
A Novel Spatial Domain Technique For Digital Image Watermarking Using Block Entropy
Ambar Dutta
Watermarking;
Entropy;
CI
Watermark
Embedder
Attack
Communication
Channel
LSB;
I. INTRODUCTION
Due to the expeditious and tremendous evolutionof
multimedia and the outspread use of the Internet, there is a
need for efficient and effective copyright protection
approaches [1, 2, 3, 4].Techniques are required to counter the
copying,falsification and unauthorized handling of images and
video. In the absenceof such methods, storingimages on a
public network place them at danger of theft andundiscovered
alteration. Cryptography, Steganography and Digital
Watermarking are the approaches which have been advanced
to defend information during the transfer of data from sources
to destination.With the help of digital watermarking, it is
possible to mask the data or identify information inner to the
digital multimedia [1, 3].Digital Watermarking techniques
include two principal steps-(i)watermark embedding, (ii)
watermark extraction.A watermarked imaged is ideal if it is
identical from the original image even if one uses maximal
quality equipment.Integrity and Security are also two crucial
requirements of ideal watermarking.
Recently, the large number of algorithm has been
developed in the field of watermarking.So it is necessary to
categorizethese algorithms for their proper understanding. In
this paper the watermarking techniques has been classified on
the basis oftheir application and characteristics [1, 3, 4].On the
basis of characteristics, watermarking can be divided as (i)
978-1-4673-9802-2/16/$31.00 2016 IEEE
Noise
Watermark
Watermark
Detector
E = pi log 2 pi
i
1 M N
[C (m, n) W (m, n)]
MN m=1 n=1
1 M N
MAE (W , C ) =
C (m, n) W (m, n)
MN m=1 n=1
MSE (W , C ) =
2
x
)(
+ y + C1 * x + y + C 2
Dataset
3
Watermark
PSNR
SSIM(1)
SSIM (2)
1stBit
Substitution
0.0078
69.2098
0.9999
0.3148
2nd
Bit
Substitution
0.0439
61.7061
0.9994
0.4287
3rd
Bit
Substitution
0.2023
55.0708
0.9980
0.4539
4th
Bit
Substitution
0.8987
48.5946
0.9945
0.4382
5th
Bit
Substitution
4.0991
42.0039
0.9893
0.3130
6th
Bit
Substitution
17.3389
35.7405
0.9847
0.2961
7th
Bit
Substitution
49.2443
31.2072
0.9837
0.2916
Dataset
1
PSNR
SSIM (1)
SSIM (2)
1 Bit
Substitution
0.0079
69.1545
0.9998
0.0909
2nd
Bit
Substitution
0.0311
63.2031
0.9996
0.2428
3rd
Bit
Substitution
0.1188
57.3826
0.9990
0.4339
4th
Bit
Substitution
0.4903
51.2261
0.9978
0.6213
5th
Bit
Substitution
2.0067
45.1059
0.9956
0.7602
6th
Bit
Substitution
7.4669
39.3994
0.9922
0.8316
7th
Bit
Substitution
27.5303
33.7326
0.9879
0.8556
st
Dataset
2
PSNR
SSIM (1)
SSIM (2)
1 Bit
Substitution
0.0078
69.2377
0.9999
0.3155
2nd
Bit
Substitution
0.0292
63.4730
0.9995
0.7037
3rd
Bit
Substitution
0.1173
57.4365
0.9986
0.8554
4th
Bit
Substitution
0.4436
51.6610
0.9967
0.9111
5th
Bit
Substitution
1.7193
45.7773
0.9938
0.9304
6th
Bit
Substitution
7.4077
39.4339
0.9901
0.9370
st
th
7
Bit
Substitution
19.9327
35.1352
0.9877
0.9389
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]