ISSN 2319-8885 Vol.03,Issue.33 October-2014, Pages:6543-6546 www.ijsetr.com Reversible Watermarking using Difference Expansion Technique T.SWATHI1, P.AJAY KUMAR REDDY2, DR G.N. KODANDA RAMAIAH2 1 PG Scholar, Dept of ECE, KEC, JNTU Anantapur, Andhrapradesh, India, E-mail: [email protected]. Asst Prof, Dept of ECE, KEC, JNTU Anantapur, Andhrapradesh, India, E-mail: [email protected]. 3 HOD, Dept of ECE, KEC, JNTU Anantapur, Andhrapradesh, India. 2 Abstract: In this paper, we are going to survey on data hiding on lossless images using difference expansion method. Reversible watermarking enables embedding of valuable information in a host signal with no loss of host information. The embedding ensures the minimization of the mean square error (MSE) and PSNR (peak signal to noise ratio) introduced by watermarking. This paper proposes to improve the picture clarity and maintain the security and also provides the authentication for our information. The proposed transform introduces less distortion than the classical prediction-error expansion for complex predictors such as the median edge detector (MED) or the gradient-adjusted predictor (GAP). It is used for copyright protection, authentication. Keywords: DE Difference Expansion, MSE Mean Square Error, GAP Gradient Adjust Predictor, PSNR. I. INTRODUCTION Difference expansion (DE) reversible watermarking, introduced by Tian, It creates space by expanding a difference. The data and the auxiliary information are further added to the expanded difference and embedded into the image. The expanded difference is the one between adjacent pixels, original and predicted pixels, pixels of a block and the mean value of the block; pixels of a block and the median value of the block; and so on. By expanding two times the difference, one data bit can be embedded. The embedding is possible if it does not generate overflow or underflow Embedded bit is extracted and the original pixels are recovered. The high correlation between image pixels ensures rather low values for the differences referred above. Overflow or underflow appears and consequently, high embedding capacity can be entailed. [1]. This project aims at reducing the distortion introduced by the watermarking. It is used for copyright protection, authentication. In application reversible watermarking is used in military, medical and source tracking. (like bank checks) are scanned, protected with an authentication scheme based on a reversible data hiding, and sent through the Internet. In most cases, the watermarked documents will be sufficient to distinguish unambiguously the contents of the documents. This enable the decoder extract the watermarking image and reconstruct the original host image from the watermarked image. Reversible data-hidings insert information bits by modifying the host signal, but enable the exact (lossless) restoration of the original host signal sometimes; expressions like distortion-free, invertible, lossless or erasable watermarking are used as synonyms for reversible watermarking.[2]. In most applications, the small distortion due to the data embedding is usually tolerable. However, the possibility of recovering the exact original image is a desirable property in many fields, like legal, medical and military imaging. Let us consider that sensitive documents Compared with other networks, ZigBee has the following advantages: low power, low cost, short time delay, network large capacity, reliability and safety. MSE (mean square error) <100dB PSNR(peak signal to noise ratio)<30dB II.EXISTING SYSTEM Existing systems consists of so many disadvantages. As show in below figure1 is the example for existing system. While transmitting image from source to destination in the middle of transmission channel attacks are occurs due to this attacks our data will insecurity format and it does not having any authentication. As show in below figure1 is the example for existing system. Figure 1. Existing system. Disadvantages: There is no copy righting protection, No security No protection from attacks No authentication Copyright @ 2014 IJSETR. All rights reserved. T.SWATHI, P.AJAY KUMAR REDDY, DR G.N. KODANDA RAMAIAH To avoid these problems we are proposing this reversible 1. Pre Processing: Preprocessing images commonly involves removing lowwater marking scheme using difference expansion technique. frequency background noise, normalizing the intensity of the III.PROPOSED SYSTEM individual particles images, removing reflections, and In order to avoid the copyright protection, cropping and masking portions of images. Image preprocessing is the editing the images, audios & videos. Provide security and technique of enhancing data images prior to computational authentication. Protect our images from attacks. Improve processing. image clarity, broad casting images without any distortions. As a basic requirement, the quality degradation on the digital 2. Embedding Processes: content after data embedding should be low. When the Embedding the watermark into a define region of interest information is embedded into images, the pixel value in the (ROI) by taking the smallest area around an image. This image will be changed, and thus the image quality is border will be used for our watermark embedding later. The degraded. Since the altered pixels cannot be recovered into watermark generated from hashing the area of interest. The their original state after the secret messages has been embedding region is measured to be outside the region of extracted, permanent distortion will occur. Distortion for interest as to preserve the area for distortion as a result from some application is unacceptable, for example chest X-ray watermarking. In an image, the embedding region‟s pixel images. For this purpose reversible data hiding is necessary. value is 0. This feature will be exploited to create a reversible Copy right protection or invertible watermarking. Source tacking(different recipients get differently water Step1: Original image pixel values converted into binary marked content) form. Example A is original image Step 2: key image pixels values also converted to binary Broad casting, Video authentication form. B is the key image High Capacity Watermarking achieved by Difference Step 3: Adding the both binary values with OR operation Expansion likes same as matrix addition. By adding both matrix This enable the decoder extract the watermarking image obtained matrix is A+B= C where C is water marked image. and reconstruct the original host image from the Step4: water marked image look likes same as original image watermarked image. Reversible data-hidings insert but image properties of image will be varies. information bits by modifying the host signal, but enable the exact (lossless) restoration of the original host signal Embedding using difference equation sometimes; expressions like distortion-free, invertible, x b, if di P and xi xi 1 lossless or erasable watermarking are used as synonyms for yi i reversible watermarking. In most applications, the small xi b, if di P and xi xi 1 (1) distortion due to the data embedding is usually tolerable. However, the possibility of recovering the exact original 3. Extraction Process: image is a desirable property in many fields, like legal, Reverse process of embedding to extract the key image medical and military imaging. Let us consider that and original image separately. Original image and key image sensitive documents (like bank checks) are scanned, will be reconstructed by extraction process. Original image protected with an authentication scheme based on a and key image is separated by difference expansion reversible data hiding, and sent through the Internet. In algorithm. Here b bit is message bit. most cases, the watermarked documents will be sufficient The message bit „b‟ can be extracted by to distinguish unambiguously the contents of the documents. Proposed system as shown in below figure 2 0, if | y x | P i i 1 b 1, if | y x i i 1 | P 1 (2) After the secret data gets embedded or hidden in the cover image, the original cover image will get modification to some extent with respect to the length of the secret data. At the receiving end we are not able to get back the original cover image since our traditional LSB is not providing reversibility. 4. Post Processing: In digital photography post-production, post-processing or simply processing refers to work that is done on the digital files after they have been captured by the camera. The processing stage is term for all activities after shooting which lead to the completion of the work. Examples Image Editors Figure2. Proposed system. International Journal of Scientific Engineering and Technology Research Volume.03, IssueNo.33, October-2014, Pages: 6543-6546 Reversible Watermarking using Difference Expansion Technique Normally an image file is opened in an image editing uploading watermark image embedding will perform in application to change the file and/or improve it. The different between those images by clicking embedding button after types of work completed in image editors are too diverse to completion of embedding click on water mark image then it discuss in detail. The internet is an excellent distribution displays water mark image separately If we want extraction system for the digital media because of its inexpensiveness image click on extraction then it extracts the watermark and efficiency. Also the images can be readily shared, easily image and cover image in separate as shown in figure 3. used, processed and transmitted which causes serious problems such as unauthorized use and manipulation of digital content properties of the three types of reversible watermarking schemes. Usually, higher embedding capacity usually comes along with a higher distortion. The watermark must be able to be easily and securely embedded and retrieved by the owner. Therefore, the overheads of embedding process and retrieving process should be limited in a reasonable range. In Recent years a special kind of digital watermarking is discussed widely, called reversible watermarking. It not only provides the protection of the copyright by embed- ding the assigned watermark into the original image but also can recover the original image from the suspected image. The retrieved watermark can be used to determine the ownership by comparing the retrieved watermark with the assigned one. Similar to conventional watermarking schemes, reversible watermarking schemes have to be robust against the intentional or the unintentional attacks, and should be imperceptible to avoid the attraction of Figure3. Generating watermark image. attacks and value lost. IV.COMPARISION BETWEEN PROPOSED AND EXSISTING SYSTEM Figure4. After clicking extraction button VI.ADVANTAGES AND APPLICATIONS A. Copy right protection: Copy protection, also known as content protection, copy V. EXPERIMENTAL REULTS prevention and copy restriction, is any effort designed to Double click on mat lab and click on file tool open new Mprevent the reproduction of software, films, music, and other file. Write program on a program on mat lab editor window media, usually for copyright reasons on Various methods save that m- file and click debug press run button as After have been devised to prevent reproduction so will gain debugging reversible water mark window will be displayed benefit from each users who obtain a copy of their product. Click on browser and upload picture or image but image Unauthorized copying and leading to proposal of anti-piracy must be in png format After uploading png image (portable laws such as PIPA. Some methods of copy protection have network graphics) and making histogram modification on also led to criticisms because it caused inconvenience for that image by clicking histogram modification button. After honest users or secretly installed additional software to watch International Journal of Scientific Engineering and Technology Research Volume.03, IssueNo.33, October-2014, Pages: 6543-6546 T.SWATHI, P.AJAY KUMAR REDDY, DR G.N. KODANDA RAMAIAH activity on user's computer to detect copying. Effective copy VIII.COUNCLUSION protection as well as protecting user rights is still an ongoing In this work, we propose the reversible watermarking based on prediction error expansion and pixel selection on problem with media publication. images. In our proposed system we focus on the flat region to B. Source tracking: A watermark is embedded into a digital embed the watermark. The proposed transform introduces signal at each point of distribution. If a copy of the work is lower distortions than the one based on high-performance found later, then the watermark may be retrieved from the predictors such as MED and GAP. The proposed method copy and the source of the distribution is known. This outperforms a representative prior art of Tian‟s DE technique reportedly has been used to detect the source of transform, and it is shown that Tian‟s transform is equivalent illegally copied movies. to a pre- diction-error expansion of a simple linear predictor with improved embedding. Practical reversible watermarking C. Steganographic: In digital steganographic, electronic algorithms based on the proposed transform have been communications may include steganographic coding inside investigated. of a transport layer, such as a document file, image file, IX. REFERENCES program or protocol. Media files are ideal for steganographic [1]J. Tian, “Reversible data embedding using a difference transmission because of their large size. For example, a expansion,” IEEE Trans. Circuits Syst. Video Technol. vol. sender might start with an innocuous image file and adjust 13, no. 8, pp. 890–896, Aug. 2003. the color of every 100th pixel to correspond to a letter in the [2] A. M. Alattar, “Reversible watermark using th difference alphabet, a change so subtle that someone not specifically expansion of a generalized integer transform,” IEEE Trans. looking for it is unlikely to notice it. Image Process. vol. 13, no. 8, pp. 1147–1156, Aug. 2004. Hidden messages within wax tablets in ancient Greece, [3] L. Kamstra and H. J. A. M. Heijmans, “Reversible data people wrote messages on the wood, and then covered it embedding into images using wavelet techniques and with wax upon which an innocent covering message was sorting,”IEEE Trans. Image Process. vol. 14, no. 12, pp. written. 2082–2090, Dec. 2005. Hidden messages on messenger's body also used in [4] D. Coltuc and J.-M. Chassery, “Very fast watermarking ancient Greece. Herodotus tells the story of a message by reversible contrast mapping,” tattooed on the shaved head of a slave of Histiaeus, [5]IEEE Signa Xiao long Li, Bin Yang Tienyong Zeng hidden by the hair that afterwards grew over it, and “Efficient Reversible Watermarking Based on Adaptive exposed by shaving the head again. The message Prediction. allegedly carried a warning to Greece about Persian invasion plans. This method has obvious drawbacks, such as delayed transmission while waiting for the slave's hair to grow, and the restrictions on the number and size of messages that can be encoded on one person's scalp.In the early days of the printing press, it was common to mix different typefaces on a printed page due to the printer not having enough copies of some letters otherwise. Because of this, a message could be hidden using 2 (or more) different typefaces, such as normal or italic. D. Video authentication: By using this digital watermarking scheme we can also provide authentication for our image .copy right prevention and copy restriction if any effort to design to prevent the reproduction of software, films, music, and other media for copy right reasons. We can make copy right protection on videos is investigated for the further use with the help of reversible water marking. VII FUTURESCOPE In this project this reversible watermarking using difference expansion has been done on images .Further this can be enhanced by applying this on video clips and audio clips in future. This will be useful to protect our audio and video clips from unauthorized persons to provide privacy and security future extension implementing this method in audio, video files improving the hiding capacity of videos and audio files. International Journal of Scientific Engineering and Technology Research Volume.03, IssueNo.33, October-2014, Pages: 6543-6546
© Copyright 2026 Paperzz