dct based watermarking technique
DESCRIPTION
DCT-based Watermark Recovering without Resorting to the Uncorrupted Original ImageTRANSCRIPT
![Page 1: DCT based Watermarking technique](https://reader036.vdocuments.mx/reader036/viewer/2022082808/55509690b4c90595208b4632/html5/thumbnails/1.jpg)
DCT Based watermarking recovering without restoring to the uncorrupted Original Image
Umair Amjad [email protected]
![Page 2: DCT based Watermarking technique](https://reader036.vdocuments.mx/reader036/viewer/2022082808/55509690b4c90595208b4632/html5/thumbnails/2.jpg)
AgendaWatermark embeddingWatermark detection
DCT-basedWatermark Recoveringwithout Resorting to the Uncorrupted Original Image
A. Piva, M. Barni, F. Bartolini, V. CappelliniDipartimento di Ingegneria Elettronica
Universit`a di Firenzevia S. Marta 3, 50139, Firenze, Italy
e-mail [email protected]
![Page 3: DCT based Watermarking technique](https://reader036.vdocuments.mx/reader036/viewer/2022082808/55509690b4c90595208b4632/html5/thumbnails/3.jpg)
Watermark EmbeddingRead image. Lets say, I.DCT transform is applied.DCT coefficients are reordered into a zigzag scan.It is now impossible for the decoder to determine the position of the coefficients with the largest magnitude, since non-marked image is no longer available.
T = {t1, t2, . . . . . . , tL, tL+1, . . . . . . , tL+M}To get perceptual invisibility we skipped first L coefficients.Now, watermark X = {x1, x2, . . . . . . , xM} (choose among pseudo-random sequences) is embedded in the last M numbers, to obtain a new vector.T’ = {t1, t2, . . . . . . , tL, t’L+1, . . . . . . , t’L+M}
According to the rule:t’L+i = tL+i + α |tL+i| xi
Where i = 1, . . . . . , M
Now the vector T’ is inserted in the inverse zigzag scan and the inverse DCT algorithm is performed, obtaining the watermarked image I’.
![Page 4: DCT based Watermarking technique](https://reader036.vdocuments.mx/reader036/viewer/2022082808/55509690b4c90595208b4632/html5/thumbnails/4.jpg)
Watermark DetectionRead watermarked image. Lets say I*.DCT transform is applied.Perform zigzag scan.Now coefficient (L+1)th to (L+M)th are selected to generate a vector.T* = {t*L+1, t*L+2,. . . . . . , t*L+M}
The correlation between the corrupted coefficients T*, and the mark itself is taken as a measure of the mark presence.
For this we generate 1000 random fake watermarks.Correlation is computed for each of the marks and that with the largest correlation is assumed to be the one really present in the image.
![Page 5: DCT based Watermarking technique](https://reader036.vdocuments.mx/reader036/viewer/2022082808/55509690b4c90595208b4632/html5/thumbnails/5.jpg)
Original Image Waterwark Image