hybrid robust watermarking technique based on dwt, dct and svd
TRANSCRIPT
ISSN (Print): 2278-8948, Volume-2, Issue-5, 2013
137
Hybrid Robust Watermarking Technique
Based on DWT, DCT and SVD
Harish N J, B B S Kumar & Ashok Kusagur
Department of ECE, RRCE,Bangalore
E-mail : [email protected], [email protected], [email protected]
Abstract - In this paper, we propose a hybrid
watermarking scheme for digital images based on singular
value decomposition (SVD). The two key aspects of
watermarking schemes are copyright protected and
robustness. In this, we are embedded the principal
components of the watermark in the DCT domain of DWT
subband of host image, for providing copyright protection
as well as reliability. Since Scaling factor is an image
dependent. Experimental results are provided to illustrate
that the proposed scheme is able to withstand a variety of
image processing attacks as well as imperceptibility.
Keywords - Copy Right Protection, Discrete Cosine
transform, Discrete Wavelet Transform, Singular Value
Decomposition, Watermarking.
I. INTRODUCTION
Watermarking has been considered to be a
promising solution that can protect the copyright of
multimedia data through Trans coding, because the
embedded message is always included in the data.
However, today, there is no evidence that watermarking
techniques can achieve the ultimate goal to retrieve the
right owner information from the received data after all
kinds of content-preserving manipulations. Because of
the fidelity constraint, watermarks can only be
embedded in a limited space in the multimedia data.
There is always a biased advantage for the attacker
whose target is only to get rid of the watermarks by
exploiting various manipulations in the finite
watermarking embedding space.
There are many solutions that have been proposed
like Cryptography [1], Steganography and
Watermarking [2]. The watermarking technique
provides one of the best solutions among them. This
technique embeds information so that it is not easily
perceptible to the others. The embedded watermark
should not degrade the quality of the image and should
be perceptually invisible to maintain its protective
secrecy [1].
The important requirements to be satisfied by any
digital watermarking scheme are as follows.
Fidelity: This is about the perceptual similarity between
the original image and the watermarked image. The
watermark should be imperceptible and no visual effect
should be perceived by the end user. The watermark
may degrade the quality of the content, but in some
applications a little degradation may accepted to have
higher robustness or lower cost.
Robustness: Even though an unauthorized person
performs some modifications to the watermarked image
through some common signal processing attacks and
compression attacks etc. But the watermark can still be
extracted. The scheme should resist the various attacks
from hackers.
Non-invertibility: If we are unable to generate the same
watermarked image with the help of different
combinations of host and watermark images then it is
called as Non-invertible watermarking scheme. This
provides copyright protection.
According to the domain in which watermark is
embedded, these are divided into spatial domain and
transform domain schemes. Embedding the watermark
in the spatial domain is the direct method. It has less
computational cost, high capacity, more perceptual
quality but less robust and it mainly suits for
authentication applications. In the frequency domain
schemes, we embed the watermark with the transformed
coefficients of host image. It has more robust, less
control of perceptual quality and mainly suits for
copyright application. The robustness and perceptual
quality of the watermarking schemes are mainly
depends on how much percentage of the watermark is
embedded into host image i.e., Scaling factor.
The main impediments of SVD based watermarking
schemes are as follows:
International Journal of Advanced Electrical and Electronics Engineering, (IJAEEE)
ISSN (Print): 2278-8948, Volume-2, Issue-5, 2013
138
False positive Problem: when a specific watermark is
detected from content in which a different watermark
was embedded, causing an ambiguous situation [6], [7]
and [8].
Diagonal Line Problem: If we modify the singular
values of the cover image directly with the watermark
image then there will be a diagonal line in the
reconstructed watermark from the attacked watermarked
images [9].
So to avoid the false positive problem and diagonal
line problems, here we are embedding the principle
components [7] of the watermark in the host image. The
scaling factor controls the robustness and transparency
of the scheme, which is imadependent.
The discrete cosine transform (DCT) represents an
image as a sum of sinusoids of varying magnitudes and
frequencies. The DCT has special property of Energy
Compaction. The Discrete Wavelet Transform is useful
for multi resolution analysis and subband coding. In this
paper we are embedding the watermark in the DCT
domain of DWT coefficients of host image. Hence we
can achieve better performance when compared to using
DCT alone [13].
II. EXISTING SYSTEM
There are many solutions that have been proposed
like Cryptography, Steganography and Watermarking.
The watermarking technique provides one of the best
solutions among them. This technique embeds
information so that it is not easily perceptible to the
others. The embedded watermark should not degrade the
quality of the image and should be perceptually invisible
to maintain its protective secrecy. The robustness and
perceptual quality of the watermarking schemes are
mainly depends on how much percentage of the
watermark is embedded into host image i.e., Scaling
factor.
Disadvantages:
False positive problem occurs
Diagonal line problem occurs
PSNR is less
Correlation coefficient is less
III. PROPOSED SYSTEM
The proposed Watermarking scheme is
implemented as in two phases first watermarking and
then extraction. First on image we will apply haar
wavelet transform and will get four sub band images.
On sub band we are applying first DCT and on that DCT
matrix we are going to apply SVD in all values. Then
the watermarking step is performed by scaling down the
pixel values of watermark and then embedding those
values into the cover image. After this the watermarked
image is obtained on which various attacks are applied
in order to achieve the robustness in watermarking.
Then we follow the extraction phase where we apply
again the wavelet transform, DCT and SVD and extract
the watermark under attacks. Finally the correlation is
determined between the watermark extracted and
original watermark.
Advantages:
False positive problem is resolved
Diagonal line problem is resolved
PSNR is good
Correlation coefficient is high
IV. PROBLEM DESCRIPTION
The main motive to implement this project is to
solve the problems arising like False Positive and
Diagonal Line problem. Also, the demerits of low PSNR
and less correlation coefficient after extraction phase is
to be resolved here. Considering these disadvantages of
previous existing watermarking techniques, the project
implemented to extract the image having a good quality
of data and also if any type of attack is inserted in the
channel and the effect of this attack should be nullified.
V. THE CHOICE OF MATLAB
MATLAB [2] brings to Digital Image Processing is
an extensive set of functions for processing
multidimensional arrays of which images(two-
dimensional numerical arrays) are a special case. The
Image Processing Toolbox(IPT) with Wavelet
Toolbox(WT)is a collection of function that extend the
capability of the MATLAB numeric computing
environment. These functions, and the expressiveness of
the MATLAB language, make many image-processing
operations easy to write in a compact, clear manner, thus
providing an ideal software prototype environment for
the solution of image processing problems.
There are a several low-level programming
languages that can be used to demonstrate the
application of DSP & DIP, such as C++, and Java; but
these require a high proficiency in programming.
There are several high-level software packages that
can be used to teach signal processing, such as
Mathematica, Octave, and MATLAB. A good overview
of these and other packages in terms of engineering
education can be found. Mathematica is meant more for
symbolic mathematics than creating applications.
International Journal of Advanced Electrical and Electronics Engineering, (IJAEEE)
ISSN (Print): 2278-8948, Volume-2, Issue-5, 2013
139
Octave, a free open-source mathematics software
application, is quite compatible with MATLAB code,
but it lacks much of the rich library of functions
available in MATLAB. In addition there is no easy way
to create graphical user interfaces (GUIs).
VI. DIGITAL WATERMARKING
Digital watermarking is the process of embedding
information into a digital signal which may be used to
verify its authenticity or the identity of its owners, in the
same manner as paper bearing a watermark for visible
identification. In digital watermarking, the signal may
be audio, pictures, or video. If the signal is copied, then
the information also is carried in the copy. A signal may
carry several different watermarks at the same time.
In visible digital watermarking, the information is
visible in the picture or video. Typically, the
information is text or a logo, which identifies the owner
of the media. The image on the right has a visible
watermark. When a television broadcaster adds its logo
to the corner of transmitted video, this also is a visible
watermark.
In invisible digital watermarking, information is
added as digital data to audio, picture, or video, but it
cannot be perceived as such (although it may be possible
to detect that some amount of information is hidden in
the signal). The watermark may be intended for
widespread use and thus, is made easy to retrieve or, it
may be a form of steganography, where a party
communicates a secret message embedded in the digital
signal. In either case, as in visible watermarking, the
objective is to attach ownership or other descriptive
information to the signal in a way that is difficult to
remove. It also is possible to use hidden embedded
information as a means of covert communication
between individuals.
One application of watermarking is in copyright
protection systems, which are intended to prevent or
deter unauthorized copying of digital media. In this use,
a copy device retrieves the watermark from the signal
before making a copy; the device makes a decision
whether to copy or not, depending on the contents of the
watermark.
VII. DIGITAL WATERMARKING LIFE-CYCLE
PHASES
Fig.1: General digital watermark life-cycle phases with
embedding, attacking, and detection and retrieval functions
The information to be embedded in a signal is
called a digital watermark, although in some contexts
the phrase digital watermark means the difference
between the watermarked signal and the cover signal.
The signal where the watermark is to be embedded is
called the host signal. A watermarking system is usually
divided into three distinct steps, embedding, attack, and
detection. In embedding, an algorithm accepts the host
and the data to be embedded, and produces a
watermarked signal.
Then the watermarked digital signal is transmitted
or stored, usually transmitted to another person. If this
person makes a modification, this is called an attack.
While the modification may not be malicious, the term
attack arises from copyright protection application,
where pirates attempt to remove the digital watermark
through modification. There are many possible
modifications, for example, lossy compression of the
data (in which resolution is diminished), cropping an
image or video or intentionally adding noise.
Detection (often called extraction) is an algorithm
which is applied to the attacked signal to attempt to
extract the watermark from it. If the signal was
unmodified during transmission, then the watermark still
is present and it may be extracted. In robust digital
watermarking applications, the extraction algorithm
should be able to produce the watermark correctly, even
if the modifications were strong. In fragile digital
watermarking, the extraction algorithm should fail if any
change is made to the signal.
VIII. DISCRETE COSINE TRANSFORM
The discrete cosine transform (DCT) is a function
that has the ability to convert a signal into elementary
frequency components. It represents an image as a sum
of sinusoids of varying magnitudes and frequencies. The
popular block-based DCT transform segments an image
non-overlapping block and applies DCT to each block.
This result in giving three frequency sub-bands: low
frequency sub band, mid-frequency sub-band and high
frequency sub-band. DCT-based watermarking is based
on two facts [10]. The first fact is that most of the signal
energy lies at low-frequencies sub band which contains
the most important visual parts of the image. The second
fact is that high frequency components of the image are
usually removed through compression and noise attacks.
[3] The watermark is therefore embedded by modifying
the coefficients of the middle frequency sub band so that
the visibility of the image will not be affected and the
watermark will not be removed by compression.
International Journal of Advanced Electrical and Electronics Engineering, (IJAEEE)
ISSN (Print): 2278-8948, Volume-2, Issue-5, 2013
140
IX. DISCRETE WAVELET TRANSFORM
In mathematics, a wavelet series is the best
representation of a square integrable (real or complex-
valued) function by certain orthonormal series generated
by a wavelet. This article provides a formal,
mathematical definition of an orthonormal wavelet and
of the integral wavelet transform. The wavelet transform
can provide us with the frequency of the signals and the
time associated to those frequencies, making it very
convenient for its application in numerous fields. For
instance, signal processing of accelerations for gait
analysis.
In numerical analysis and functional analysis, a
discrete wavelet transform (DWT) is any wavelet
transform for which the wavelets are discretely sampled.
As with other wavelet transforms, a key advantage it has
over Fourier transforms is temporal resolution: it
captures both frequency and location information
(location in time). The discrete wavelet transform has a
huge number of applications in science, engineering,
and mathematics and computer science. Most notably, it
is used for signal coding, to represent a discrete signal in
a more redundant form, often as a preconditioning
for data compression.
Fig. 2: Block diagram of filter banks of DWT first level
The Wavelet Transform of Digital Image
The basic thought of wavelet transform is using the
same function by expanding and shifting to approach the
original signal. The wavelet coefficients carry the time-
frequency information in certain areas. It has good local
characteristics both in time domain and frequency
domain. It can maintain the fine structure of the original
images in various resolutions and it is convenient to
combine with human vision characteristics. Compared
with the orthogonal wavelet, bi-orthogonal wavelet has
more obvious superiority in image processing because it
balances the orthogonality and symmetry. In addition,
the reconstructing signal of biorthogonal wavelet
transform is suitable to embed watermark for its
balance. Daubechies9/7 wavelet is recommended in
JPEG2000. In this algorithm Daubechies9/7
biorthogonal wavelet is selected because it is one of the
most suitable biorthogonal wavelets implicated in digital
watermark.
A digital image is decomposed into three high
frequency sub bands and a low frequency sub band by
one level wavelet transform. The low frequency sub
band can be decomposed continuously. With the more
levels the image is decomposed by wavelet transform,
the energy of the image is diffused better and the
stronger image intensity can be embedded. So the
wavelet decomposing levels adopted in the algorithms
should be chosen as far as possible.
The symmetry extension is adopted in wavelet
decomposing process, while repeat symmetrical
extension is adopted in wavelet reconstruction process.
The standard test sequence Lena is decomposed by two-
level wavelet decomposition into low frequency sub
band LL2, horizontal high frequency sub bands LH2
LH1, vertical high frequency sub band HL2 HL1 and
diagonal direction high frequency sub band HH2 HH1,
as shown in figure 3. (In order to display, the high
frequency sub bands coefficients are amplified.)
Fig.3: (a) Lena image after one level wavelet decomposition
and (b) Two level wavelet decomposition
X. SINGULAR VALUE DECOMPOSITION
In linear algebra, the singular value decomposition
(SVD) is a factorization of a real or complex matrix,
with many useful applications in signal processing and
statistics. Formally, the singular value decomposition of
an m×n real or complex matrix M is a factorization of
the form
*VUM
where U is an m×m real or complex unitary matrix,
Σ is an m×n rectangular diagonal matrix with
nonnegative real numbers on the diagonal, and V* (the
conjugate transpose of V) is an n×n real or complex
unitary matrix. The diagonal entries Σi,i of Σ are known
as the singular values of M. The m columns of U and the
n columns of V are called the left-singular vectors and
International Journal of Advanced Electrical and Electronics Engineering, (IJAEEE)
ISSN (Print): 2278-8948, Volume-2, Issue-5, 2013
141
right-singular vectors of M, respectively. US are called
the principal components of M.
XI. ALGORITHAMS FOR PROPOSED METHOD
The proposed Watermarking scheme is
characterized as follows:
A. Watermark Embedding:
Step 1: Apply one-level Haar DWT to decompose the
host image A, into four sub bands i.e.
ALL , AHL , ALH , and AHH .
Step 2: Consider AHL and perform 2D DCT and using
zig-zag sequence, map the DCT Co-efficients of AHL
into four quadrants: B1, B2, B3 and B4.
Step 3: Apply SVD to all four quadrants, Bk =UkSkVkT ,
where k=1, 2, 3 and 4.
Step 4: Apply the SVD on the watermark image and
calculate the principal components of the watermark.
W = UW SW VWT , P = UW ∗ SW
Step 5: Divide the principal components P, into four
quadrants: P1, P2, P3 and P4.
Step 6: Modify the singular values of the DCT
coefficients of the cover image with the principal
components of watermark image i.e.,
SWk = Sk + Φ. Pk , k = 1, 2, 3 and 4.
Step 7: Perform, BWk =Uk Swk VkT , where k = 1, 2,
3and4.
Step 8: Map the coefficients of BWk back to their
original positions and apply DCT to produce the
modified HL band, AHLW .
Step 9: Perform the inverse DWT by using modified and
non-modified coefficients to get the watermarked image,
AW .
B. Watermark Extraction:
Step 1: Apply one-level Haar DWT to decompose the
watermarked (possibly attacked) image Aw into four
subbands: ALL∗ , AHL
∗ , ALH∗ , and AHH
∗ .
Step 2: Apply DCT on AHL∗ and using zig-zag scan
arrange the DCT coefficients of AHL∗ into four
quadrants B1∗, B2
∗, B3∗ and B4
∗ .
Step 3: Subtract each quadrant with the original
transformed quadrants: Ck= Bk∗ - Bk , where k=1, 2, 3,
and 4.
Step 4: Compute the distorted principal component parts
EPCk = (Uk ∗ Ck ∗ VkT )/ Φ
Step 5: Construct the distorted principal component
from their parts i.e.
Epc = Epc
1 Epc2
Epc3 Epc
4
Step 6: Obtain the extracted watermark.
EW = Epc ∗ VWT
XII. EXPERIMENTAL RESULTS
In this paper the simulation process is implemented
in MATLAB using different types of host and
watermark images. For testing purpose gray scaled
(JPEG format) image is used.
The opted host (original) and watermark images are as
follows:
Lena Home Girl
Fig.4: Host or Cover (original) images of size 256 x 256 pixels
Text Text Girl
Fig.5: Watermark (original) images of size 128x128 pixels
For robustness inspection of the scheme the
watermarked image was tested against several types of
attacks namely Histogram equalization, Speckle noise,
Gaussian noise, Rotate-45, Best contrast, Salt & Pepper
noise, Poisson noise, JPEG compression, Low pass filter
and High pass filter.
The quality of the watermarked image can be
estimated using peak-signal-to-noise ratio (PSNR) and is
calculated as follows
MSEPSNR
2
10
255log10
Where MSE represents the mean square error and is given
by
International Journal of Advanced Electrical and Electronics Engineering, (IJAEEE)
ISSN (Print): 2278-8948, Volume-2, Issue-5, 2013
142
Where A and Aw are original and watermarked
images. The similarities between the original, W and
extracted watermarks, eW can be determined by using the
normalized correlation coefficient (NC) and it is defined
as follows:
21
1 1 1
2
1
1 1
)),((*)),((
)),()()),((
w
n
j
m
i
n
j
w
m
i
m
I
n
j
w
jiEwjiw
wjiwjiw
NC
where w and Ew are mean values of W and Ew
respectively.
The following figures represent the extracted
watermark images with several attacks of the proposed
scheme.
The different values of PSNR & MSE for different
images are listed in Table 1. Also for different attacks
the values of Normalized Correlation Coefficient and
Correlation Coefficient also changes. The different
values of Normalized Correlation Coefficient and
Correlation Coefficient for different attacks have been
listed in Table 2.
Fig.6: Extracted watermark images with several attacks
Table 1: Different values of PSNR and MSE for
different images
Image PSNR (in dB) MSE
Lena 46.0068 1.6308
House 45.7364 1.6416
Girl 45.9573 1.6495
Boat 45.9804 1.6407
Table 2: Different values of NCC and CC for different
attacks on Lena Image
Noise Type
Normalized
Correlation
coefficient
(NCC)
Correlation
Coefficient
(NC)
Histogram equalize 0.949 0.918
Speckle noise 0.982 0.989
Gaussian noise 0.961 0.969
Rotate by +45
degree 0.992 0.998
Best contrast 0.94 0.918
Salt n pepper noise 0.946 0.894
Poisson noise 0.944 0.939
JPEG Compression 0.987 0.993
Low Pass Filter 0.982 0.991
High Pass Filter 0.982 0.991
XIII. CONCLUSIONS
In this proposed paper taken for analysis of
different cover images like Lena and House for
comparing the difference between PSNR and MSE
values. In all the cases the value of PSNR is well above
20dB which shows the good quality of embedding
algorithm in comparison of other techniques like DWT
watermarking or DCT watermarking of DWT and SVD
watermarking, the evaluated PSNR value limited up to
20-30dB along with diagonal line problems or false
positive problems.
By embedding the principle components of the
watermark into the DCT of horizontal sub band of DWT
decomposition of host image, it provides better
imperceptibility as well as reliability in the quality and
recovery of image. By implementing, can avoid the false
positive problem and hence provides the copyright
protection. From the extracted watermarks have proved
the there is no diagonal line problem. And also achieved
the suitable scaling factor for any watermark which is
image dependent. Hence the robustness and
transparency of the scheme for any watermarking can be
processed.
The performance of the proposed method is tested
by applying 1-level DWT compression technique and
image processing attacks like Histogram equalization,
Speckle noise, Gaussian noise, Rotate-45, Best contrast,
Salt & Pepper noise, etc. and has got the values of NCC
and CC are all above 0.85 which are acceptable. Thus
proposed method is robust as well as reliable
watermarking technique. The scheme has been tested
International Journal of Advanced Electrical and Electronics Engineering, (IJAEEE)
ISSN (Print): 2278-8948, Volume-2, Issue-5, 2013
143
with success on various test images on a MATLAB
simulation platform.
XIV. FUTURE SCOPE
This project further can be extended with multilevel
DWT or two levels DCT or two levels SVD to enhance
PSNR and Normalized Correlation Coefficient values.
Also the method can be tried to analyze watermarking
for RGB or color images with embedding in all three
channels and extraction can also be done from all the
three channels. Also, instead of hiding watermark image
inside the cover image the project can be extended for
hiding a text message inside the cover image. This
technique can also be analyzed for audio watermarking
or video watermarking.
XV. REFERENCES
[1] Hernandez, J.R., M., Amado, and F.P., Gonzalez,
2000. “DCT-domain watermarking techniques
for still for still Images: Detector performance
analysis and a new structure”, IEEE Trans. on
Image Processing, Vol. 9, pp. 55-68.
[2] I.J. Cox, et al, "Digital watermarking and
Steganography" (Second Edition), Morgan
Kaufmann, 2008.
[3] Chin-chin Lai, and Cheng-Chih Tsai “Digital Image
Watermarking Using Discrete Wavelet Transform
and Singular Value Decomposition”, IEEE
Transactions on Instrumentation and Measurement,
Vol. 59, no. 11, pp. 3060-3063, NOV. 2010.
[4] Emir Ganic and Ahmet M. Eskicioglu, “Robust
DWT-SVD Domain Image Watermarking:
Embedding Data in All Frequencies,” in Proc.
Workshop Multimedia Security, Magdeburg,
Germany, pp. 166-174, 2004.
[5] G. Bhatnagar and B. Raman, “A new robust
reference watermarking scheme based on DWT-
SVD,’’ Computer Standards Interfaces, vol. 31, no.
5, pp. 1002-1013, Sep. 2009.
[6] R. Liu and T. Tan, “An SVD-based watermarking
scheme for protecting rightful ownership,” IEEE
Transactions on Multimedia, Vol. 4, no. 1, pp. 121-
128, Mar. 2002.
[7] Jain, C., Arora, S., &Panigrahi, P. K., (2008). “A
reliable SVD based watermarking scheme”, adsabs.
Harvard .edu/ABS/ 2008ar Xiv 0808. 0309J.
[8] Xiao-Ping Zhang, Senior Member, IEEE, and Kan
Li , Comments on “An SVD-Based
Watermarking Scheme for Protecting Rightful
Ownership”, IEEE Trans on Multimedia, Vol. 7, no.
2, pp. 593-594, Apr. 2005
[9] Roman Rykaczewski. “Comments on “An SVD-
Based Watermarking Scheme for Protecting
Rightful Ownership,” IEEE Transactions on
Multimedia, Vol. 9, No. 2, pp. 421-423, Feb. 2007.
[10] Ziqiang Wang, Xia Sun, and Wexian Zhang, “A
Novel Watermarking Scheme Based on PSO
Algorithm,” LSMS 2007, LNCS 4688, PP. 307-
314, 2007 @ Springer-Verlag Berlin Heidelberg
2007.
[11] Veysel Aslantas, A. Latif Dogan and Serkan Ozturk,
“DWT-SVD based Image Watermarking Using
Particle Swarm Optimizer,” ICME 2008.
[12] www.swarmintelligence.org
[13] Baisa L. Gunjal, R. R. Manthalkar, “An Overview
of Transform Domain Robust Digital Image
Watermarking Algorithms”, CIS Journal, Vol. 2
No.1, pp. 37-42, 2010-2011.
[14] Amol R. Madane, K T. Talele and M. M. Shah
“Watermark Logo in Digital Image using DWT”
Proceedings of SPIT-IEEE Colloquium and
International Conference, Mumbai, India, IEEE,
Vol.1,121, 2007.
[15] Sha Wang, Dong Zheng and Jiying Zhao proposed
“An Image Quality Evaluation Method Based on
Digital Watermarking” Proceedings of IEEE
Transactions on Circuits And Systems For Video
Technology, Vol. 17, No. 1, January 2007.
[16] L. Robert and T. Shanmugapriya proposed “A Study
on Digital Watermarking
Techniques” Proceedings of International Journal of
Recent Trends in Engineering, Vol. 1, No. 2, May
2009.
[17] Yasunori Ishikawa, Kazutake Uehira, and Kazuhisa
Yanaka proposed “Optimization of Size of Pixel
Blocks for Orthogonal Transform in Optical
Watermarking Technique”, IEEE, 2012.
[18] Stephen J. Chapman -“MATLAB Programming for
Engineers”, page no. 1-74, 3rd
Edition 2005.
[19] Rafael C. Gonzalez, Richard E. Woods, Steven L.
Eddins – “Digital Image Processing Using
MATLAB”, page no. 1-78, 256-295 & 296-547, 1st
Edition 2006, www.mathsworks.com
[20] Rudra Pratap - “Getting started with MATLAB7”,
page no. 1-15, 17-44 & 49-79, 2nd
Edition 2006.
[21] Anil K. Jain – “Fundamentals of Digital Image
Processing”, page no. 1-9, 15, 41, 135, 141, 145,
476, 2nd
Indian reprint 2004, www.pearonsed.co.in