Академический Документы
Профессиональный Документы
Культура Документы
= =
(6)
So, the value of peak signal to noise ratio (PSNR) in
the directly decrypted image is
PSNR=
10
10log ( ) AE
(7)
If the receiver has both the image-hiding and the
encryption keys will extract the embedded image and
recover the original image. According to the image-
hiding key, the values of D, M and V, the original
LSB of the Pn selected encrypted pixels, and the (P-
Pn)V/M-Pn additional bits are extracted from the
encrypted image containing embedded image. By
putting the Pn LSB into their original positions, the
encrypted image of the Pn selected pixels are retrieved
three planes of colour image and their original
intensity values are correctly decrypted using the
encryption keys. To recover the original intensity
values of the other (P-Pn) pixels. Considering a pixel-
group, because B(k,1), B(k,2),...B(k,D.M-V) in (3)
are given, [B(k,1), B(k,2), ..B(k,M)]
T
must be one of
the vectors meeting [16]
S=[B(k,1),B(k,2),....B(k,ML-S)00..0]
T
+a.H (8)
In equation (8), a is an arbitrary binary vector sized
1V and H is an V DM matrix made up of the
transpose of Q and an VV identity matrix
H=[Q
T
I
V
] (9)
Equation (10) denoting the decrypted pixel-group as
Gk and the intensity values in it as t
i,j
, then calculate
the total difference between the decrypted and
estimated intensity values [16] in the all group of RGB
planes
, ,
( , )
di
i j i j
i j Gk
t p
e
=
(10)
where the estimated intensity values is generated from
the neighbors in the directly decrypted image.
1 1 , 1 , 1 1
,
' / 2 ' / 2 ' / 2 ' / 2
2 2
4
D D D D
i i i j i j D D
i j
p p p p
p
+ +
( ( ( ( + + +
= +
(11)
By (11), the estimated pixel values [16] are only
dependent on the MSB of neighbour pixels. Mean
square error (MSE) is calculated using following
formula (12)
512
2
1
2
( )
(512)
512
i
error
MSE
=
=
(12)
International Journal of Communication and Computer Technologies
Volume 02 No.01 Issue: 02 Feb 2014
ISSN NUMBER : 2278-9723
Volume 01 No.2, Issue: 01 Page 10
International Journal of Communication and Computer Technologies www.ijccts.org
Similarity ratio (SR) is calculated using following
equation (13)
SR =
Maximum similar data
Total data
(13)
3. EXPERIMENTAL RESULTS
The test colour image Lena of size 512512 as shown in
Fig.4 (A) is used as the original cover image in the
experiment. Logo of size 128128 was embedded in the
cover image using Curvelet transform results in visible
watermarking and then inverse Curvelet transform is
performed. Then the watermarked image containing Logo
is encrypted using encryption key. For information
hiding, information in form of binary image (camera
man) of size 185185 is written as bits in LSB of the
Encrypted image using image hiding key. So to decrypt
the image and to recover the hidden binary image two
keys are necessary as shown in Fig..4 (G). If receiver has
image hiding key will recover binary image but
decryption of image is not possible. If the receiver has
encryption key will decrypt the watermarked image but
not possible to extract hidden binary image as shown in
Fig.4 (F). TABLE 1 shows Experimental results of
proposed scheme applied for different colour images.
Separable method is applied to various colour image and
results of directly decrypted(image hiding key) images
are compared with recovered images (both image hiding
key and encryption key).
(A) (B) (C) (D)
(E) (F) (G)
Figure 4: (A)Cover image of size 512512, (B) Logo of size 128128, (C)Secret binary image of size 185185
(D)Watermarked image (E) Encrypted watermarked image containing secret binary image with embedding capacity of
(F) Directly decrypted image (only encryption key) with PSNR 36.7dB (G) Recovered image (encryption key image
hiding key) with PSNR 45.06 dB
Table 1.Experimental results of proposed scheme applied for different colour images
International Journal of Communication and Computer Technologies
Volume 02 No.01 Issue: 02 Feb 2014
ISSN NUMBER : 2278-9723
Volume 01 No.2, Issue: 01 Page 11
International Journal of Communication and Computer Technologies www.ijccts.org
4. Conclusion
The proposed scheme offers an effective protection,
data embedding along with high security. It offers
authentication by curvelet transform based visible
watermarking and allows secret transmission of image
within cover image. For transferring confidential
image, a content owner encrypts the original
uncompressed colour image using an encryption key.
Then image hider may compress the LSB of all three
planes of encrypted colour image using image-hiding
key for embedding secret image. Though the receiver
has lost any of the two keys it is either possible to
extract secret image or to decrypt image. Lower
memory requirements, speed of the encryption process
and randomized encryption key generation are
improved by parallel RC4 algorithm. Hidden image
security has increased by odd and even shuffling of
secret image.
4.1 Future scopes
In future the processed image will be implemented in
FPGA to calculate power, memory requirements etc
and extend to apply this concept from image to video.
4.2 Applications
With the conception of separable encrypted
watermarking on colour image, the identification and
copyright ownership protection are carried out. Digital
content embedded with watermarks depicting
metadata identifies the copyright owners. It plays a
vital role in military application where the secret
transmission of confidential data is significant.
REFERENCES
[1] T. J. Anumol, V. A. Binson and S. Rasheed,
FPGA Implementation of Low Power, High
Speed, Area Efficient Invisible Image
Watermarking Algorithm for Images,
International Journal of scientific and
engineering research, 4(8), 2013.
[2] A. Chitla and M. C. Mohan, Authentication
of images through lossless watermarking
International Journal of Communication and Computer Technologies
Volume 02 No.01 Issue: 02 Feb 2014
ISSN NUMBER : 2278-9723
Volume 01 No.2, Issue: 01 Page 12
International Journal of Communication and Computer Technologies www.ijccts.org
technique with the aid of elliptic curve
cryptography (ECC), International Journal
of computer applications, 57(6), 2012, pp. 17-
25.
[3] B. L. Gunjal, Wavelet based colour image
watermarking scheme giving high robustness
and exact correlation, International Journal
of Emerging Trends in Engineering and
Technology, 1(1), 2011, pp. 23-30.
[4] B. Evelyn, W. Michael and H. Robert, The
Effect of Wavelet Families on
Watermarking, Journal of computers, 4(6),
2009, pp 554-566.
[5] M. Devapriya and K. Ramar, Statistical
Image Watermarking In DWT with Capacity
Improvement, Global Journal of Computer
Science and Technology, 10(2), 2010, pp. 20-
24.
[6] S. Kumar and R. Bansal, Enhanced
Technique for Watermarking Using
MFHWT, International Journal of Advanced
Research in Computer Science and Software
Engineering, 3(5), 2013, pp. 1199-1202.
[7] P. Y. Jih, W. L.Che, J. L. Wei and H. W.
Hung, Watermarking technique based on
DWT associated with embedding rule,
International Journal of Circuits, Systems and
Signal Processing, 4(2), 2010, pp. 72-82.
[8] A. Umaamaheshvari and K. Thanushkodi, A
novel watermarking technique based on visual
cryptography, International Journal of
advanced research in computer engineering
and technology, 1(7), 2012, pp. 70-74.
[9] R. Manikandan, M. Uma and S. M.
MahalakshmiPreethi, Reversible Data Hiding
for Encrypted Image, Journal of Computer
Applications, 5(1), 2012, pp.104-110.
[10] Z. Ni, Y. Q. Shi, N. Ansari and W. Su,
Reversible data hiding, IEEE Transactions
Circuits System Video Technology, 16(3),
2006, pp. 354-362.
[11] X. Zhang, Reversible data hiding in
encrypted image, IEEE signal processing
letters, 18(4), 2011, pp. 255258.
[12] X. Zhang, Separable reversible data hiding in
encrypted image, IEEE transactions on
information forensics and security, 7(2),
2012, pp. 826-832.
[13] P. Gupta, Cryptography based digital image
watermarking algorithm to increase security
of watermark data, International Journal of
Scientific and Engineering Research, 3(9),
2012, pp 1-4.
[14] A. Mousa and A. Hamad, Evaluation of
the RC4 Algorithm for Data Encryption,
International Journal of Computer Science
and Applications, 3(2), 2006, pp. 44-56.
[15] J. Singh, K. Munjal, A New Robust
Enrichment Symmetric Stream Cipher
Approach for Confidentiality Based on RC4
Stream Cipher Algorithm, International
Journal of Engineering Research &
Technology, vol. 2, no.3, pp. 1-8, Mar. 2013.