Security Based On Compression And Decomposition Method Computer Science Essay

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Seetaiah Kilaru1, Yojana Kanukuntla2, Dr Chary K.B.S3

1Asssistant Professor 2 Associate Professor 3 Professor and Retired DRDO Scientist

Electronics & Communication Engineering Department, Swarna Bharathi Institute of Science & Technology

Khammam

[email protected]

[email protected]

[email protected]

Abstract— security is the main concern in any field. With the frequent attacks, it is a big challenge for the users to protect the digital images which are transmitting over internet. Singular Value Decomposition (SVD) [7] provides a solution up to a greater extent. This paper mainly concentrates on the invisible watermarking. By using the Wavelets, invisible watermark embed into the original watermark. The main focus concentrated on the wireless communications; hence it is important to consider some factors into consideration, they are size of an image and requirements of bandwidth. Keeping in view of all these parameters, compression and transmission should be done. The proposed algorithm uses the SVD method along with compression. The proposed algorithm is robust against all common attacks which exist in image processing field. Tests has been done and results are satisfactory in terms of imperceptibility and security.

Keywords—Singular Value Decomposition, Compression,

Image histogram, Correlation coefficient, Structural

Similarity Index Measure (SSIM), Similarity index

Introduction

The application of multimedia over internet is playing major role in current scenario. Web applications are also designing with the features of fast computation and convenient. The sending of document contains secret or important images for the intended user without participation of unknown third party is always a tough challenge [2]. The ownership and Authentication are challenging tasks for the users to protect their information. Current existing Digital Watermarking Techniques plays a vital role to protect the data and to define the right ownership. The increased hacking and other web technologies are trying to modify the watermarking process [5]. Then it is a new challenge for the researchers to implement effective watermarking technique which provides security. A digital watermark [3] is a unnoticeable cover work which hides the owner information. There are various watermarking techniques available in the market. Broadly, there are two types of watermarking. They are visible and invisible watermarks. The watermarking technique [3, 4] is said to be robust only when it resists all possible attacks. In this paper, Singular Value Decomposition (SVD) method help taken to define and design the perfect watermarking process which increases the security. The combination of image features with SVD and digital watermarking algorithm were implemented by using the wavelet phenomenon [2,6,8]. This process concentrates on content watermarking rather than pixel watermarking.

Background

The property of human perception is giving us a chance to accept small distortion. These small distortions are not possible to determine with our eye. The theory of HVS model [11] also suggested same principle. In linear algebra, SVD plays a significant role and it is used by renowned mathematicians. It can be performed on any matrix of order (m.n). For example, a matrix M has m rows and n columns with the rank r such that r ≤ n ≤ m. Then the matrix can be represented as USVT. [1]

Figure1: SVD Components

Where Matrix U is an m × m and V is the n × n orthogonal matrices

Let us consider, S is the singular value diagonal matrix, such that

quality analysis

It is common practice to analyse the performance of the system to know how much effective when compared to the existing system. There are various parameters are available to check the robustness and peak SNR values. The image analysis also explains about the efficiency of the system against attacks. The following are the some of the parameters to analyse quality of an image.

Normalised Hamming Distance (NHD):

This is the measurement of similarity which measures the ration of similarity index between original tested image and output image. The definition of the NHD [7] in mathematical form can be written as

Here, w represents test image watermarked image and w’ represents the extracted watermarked image. Nw is the length of watermark. The defined ranges for the equation are 0-1.

Peak Signal to Noise Ratio (PSNR):

It is one of the absolute measurements of quality between the tested watermarked image and distorted watermarked image [7]. The value represented in a single number with the unit of decibels. That value shows matching of similarity.

Let us consider the tested image w(i.j) with the M rows and N columns and distorted image is W’(i,j). The calculation of the error depends on the luminance calculation and also pixel position arrangement. The luminance of any pixel varies in between 0 and 255. To measure PSNR of an image it is suggested to measure Mean Square Error (MSE). T he MSE is defined as

The PSNR is defined as

Index Measure Analysis:

Let us consider the tested image w(i.j) with the M rows and N columns and distorted image is W’(i,j). Then the similarity index measurement can be defined [7] as

WATERMARK EMBEDDING SCHEME

The Define the image which is to protect and set the image for dividing into number of blocks.

It is suitable to divide the image into block ratio of 8 × 8. [4]

For every block apply singular value decomposition method and obtain the SVD.

Select the watermark which is to embed and read it.

Before embedding, try to perform addition of secret key ( Recommended )

According to the pattern ( bit pattern ) of watermark, change the diagonal vector S of each block.

By remainder of the diagonal vector S (1,1) divided by the set value the image quality ‘Q’ factor.

For all changed vectors, calculate inverse SVD by using the concept of modulation by watermark.

Now, combine all blocks to construct final watermarked image.

Compress the image until it is suitable for the mobile transmission. [3,5]

The following figure shows the process of embedding watermark for the image Lena.

Figure2: SVD based image watermarking and compression scheme

Experimental Results

For experimental purpose, different images are tested. By using SVD method, embedding process possible in smooth way. Lena is taking as a reference image to do the watermark procedure.

The good algorithm is always robust against attacks. Attacks are common in these type of proceedings especially signal processing and geometric attacks.

Used versions: Windows XP, 1 GB RAM, 2.3GHz CPU and for program development MATLAB was used.

Histogram analysis:

By considering intensity of pixel as a reference, we obtain Histogram. The following figure (a) shows test image and (b) shows the logo of the watermark. Figure (c) represents final watermarked image. This watermarked image is also compressed by compression method. Figure (d) shows histogram of (c). From all these results, we can conclude that, our human eye is not able to find out the difference between images.

Figure3: Original test image and watermak logo

Figure4: Histogram of original image

Figure5: compressed and watermarked image; recovered logo

Figure6: compressed and watermarked Histogram

Correlation coefficient analysis:

Correlation coefficient analysis is carried for adjacent pixel of the encrypted images of different test images between horizontally, vertically and diagonally adjacent pixels. From the experiment, it is clear that scrambling phenomenon was reversed for all the pixel f the adjacent pixels.

The correlated function is defined as

Where r represents correlation coefficient between all possible cases like diagonal, vertical and etc..

For the correlation coefficient of horizontal pixel is 0.9898, the horizontally spaced adjacent image characteristics is as follows:

Figure7: plot of horizontally spaced test image for coefficient = 0.9898

For the correlation coefficient of horizontal pixel is 0.9785, the horizontally spaced adjacent image characteristics is as follows:

Figure9: plot of horizontally spaced test image for coefficient = 0.9785

Index measure analysis:

The basic index parameter in this analysis is similarity. Hence, this method is also called as Structural Similarity Index Analysis (SSIA). The inventor of this process was Wang. The main parameter in this scheme was correlation of output with the Human Visual System (HVS). The main parameters of this method are luminance (l), contrast (c) and comparision of structures (s). Hence it can be defined as a function of all these three elements.

The range of SSIA lies between 0 and 1.

SSIA = 0 when there is no correlation and

SSIA = 1 when there is a maximum correlation.

SSIA values for the original and reference test image.

Table 1

SSIM values of original vs reference test images

Name of Reference Image

Original image SSIM

Watermarked and compressed SSIM

Clown

1

0.8765

Crowd

1

0.8732

Lena

1

0.8896

Peak Signal to Noise Ratio (PSNR):

it is also one of the best method in image processing analysis. High PSNR result analyze about efficiency of designed algorithm and complexity of system. The following table shows the output results of different images i.e. original and test images.

TABLE I

Name of Reference image

Test image PSNR

Test and watermarked image PSNR

Clown

39.43

32.52

Couple

39.57

30.69

Lena

39.12

31.46

Attacks on images:

In wireless process of transmission there are variety of chances to undergo noise attack on images. The designed algorithm is called as robust only when it resists all attacks of an image. The added noise has different type of forms viz.. Pseudo Random Noise generation or poisson distributed noise generation. It depends on the environment from where we are proceeding. The following statistics gives a clear idea about the process of recovering of an image from several attacks.

Guassian noise attack:

If the guassioan noise parameters are µ = 0.01 and Ϭ = 0.001 then the watermarked image and logo look like as

Figure10: for µ = 0.01 and Ϭ = 0.001, watermarked image and watermark logo under Guassian noise

The following table shows the comparision between original/test watermarked image and the image recovered from the guassian noise.

Table 2

PSNR values of original vs watermarked and

original Vs Watermarked and compressed images

Name of Reference Image

Correlation coeficient

Hamming distance

Index measure

(structural similarity)

Clown

0.4978

0.1432

0.8156

Couple

0.6546

0.0984

0.8967

Lena

0.7102

0.1058

0.9043

Frequency attack:

In median filtering process, every pixel in selected mask should be replaced by the value which is median or average of all pixels. the selected mask size depends on the application and requirement of the system. The term median is always less sensitive than mean and hence it is easy to remove the outliers without any distrubance to the sharpness to the image. In this analysis MIDFILT2 function is used.

Figure11: attacked image and extracyed logo from the watermarked image

The following table shows the analysis of original test image and recovered image (median filter)

Table 3

Image analysis between the original watermark and the watermark recovered from the attacked watermark image with Gaussian noise.

Name of Test image

Correlation value

Hammin distance

Index measure

Clown

0.7834

0.0643

0.9314

Couple

0.6984

0.1206

0.9123

Lena

0.9365

0.0198

0.9786

Conclusion

The paper describes about the robust watermarking technique based on SVD. Based on the quality of different parameters, the algorithm was designed. Experiments results were satisfactory in PSNR, Similarity index and performance against attacks. Finally, we conclude that, this watermark technique is useful in real time applications and in transmitting applications against all common attacks.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now