AU2021101400A4 - An improved cyber security system with digital watermarking using combined transformation approach - Google Patents

An improved cyber security system with digital watermarking using combined transformation approach Download PDF

Info

Publication number
AU2021101400A4
AU2021101400A4 AU2021101400A AU2021101400A AU2021101400A4 AU 2021101400 A4 AU2021101400 A4 AU 2021101400A4 AU 2021101400 A AU2021101400 A AU 2021101400A AU 2021101400 A AU2021101400 A AU 2021101400A AU 2021101400 A4 AU2021101400 A4 AU 2021101400A4
Authority
AU
Australia
Prior art keywords
image
transform
digital watermarking
digital
cyber security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2021101400A
Inventor
Harisha A.
Deepak Bhaskar Acharya
Supriya B. Rao
Vanishree B. S.
Babitha
Pooja N. S.
Srinivas P. M.
Shwetha R. J.
Megha Rani R.
Shailesh Shetty S.
Suketha
Supriya
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
B Rao Supriya Miss
B S Vanishree Miss
Babitha Mrs
N S Pooja Mrs
R J Shwetha Mrs
R Megha Rani Miss
Shetty S Shailesh Mr
Suketha Mrs
Supriya Miss
Original Assignee
A Harisha Mr
B Rao Supriya Miss
B S Vanishree Miss
Babitha Mrs
N S Pooja Mrs
P M Srinivas Mr
R J Shwetha Mrs
R Megha Rani Miss
Shetty S Shailesh Mr
Suketha Mrs
Supriya Miss
Acharya Deepak Bhaskar Mr
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by A Harisha Mr, B Rao Supriya Miss, B S Vanishree Miss, Babitha Mrs, N S Pooja Mrs, P M Srinivas Mr, R J Shwetha Mrs, R Megha Rani Miss, Shetty S Shailesh Mr, Suketha Mrs, Supriya Miss, Acharya Deepak Bhaskar Mr filed Critical A Harisha Mr
Priority to AU2021101400A priority Critical patent/AU2021101400A4/en
Application granted granted Critical
Publication of AU2021101400A4 publication Critical patent/AU2021101400A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • H04N1/32165Transform domain methods using cosine transforms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • H04N1/3217Transform domain methods using wavelet transforms

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

AN IMPROVED CYBER SECURITY SYSTEM WITH DIGITAL WATERMARKING USING COMBINED TRANSFORMATION APPROACH ABSTRACT The quick advancement of viable Multimedia Mass Communication advances over the web expanding the Digital Data Transfer between the clients. The security is the major requirement for an effective Multimedia Mass Communication. The Cyber Security is generally used for protecting sensitive data, personal data, intellectual property data, copying of illegal data, tampering of data and any industry information from cyber thefts and damaged attempts. The Digital Watermarking is an invisible information shield to protect the multimedia data in the Cyber Security Systems for ownership identification and authentication of multimedia data. The Digital Watermarking alone structurally liable to suffer from the cyber attacks. The security in the Multimedia Mass Communication can be improved with Digital Watermarking in combination with the transformation approach. The present invention disclosed herein is An Improved Cyber Security System with Digital Watermarking using Combined Transformation Approach comprising of Input Image (201), DWC Transform (202), SVD Transform (203), Image for Watermarking (204), DWC Transform (205), SVD Transform (206), Embed Process (207), Inverse Transform (208), and Watermarked Image (209); used to provides the improved security in cyber security systems. The present invention disclosed herein uses the combined transformation approach which is the combination of Discrete Wavelet, Cosine, and Singular Valued Decomposition Transformations. The original Input Image is extracted from the Digital Watermarked Image to know the damaged attempts or attacks on the original Input Image. The present invention disclosed herein has the capability of performing the embedding process in which the Digital Watermarked Image is generated for the original Input Image in less time around 0.75 seconds and the original Input Image can be extracted from the Digital Watermarked Image with extraction process takes around 0.06 seconds. The present invention disclosed herein showing the better performance of Peak Signal Noise Power Ratio (PSNR) values of 121.3dB, 183dB in embedding and extraction process compared existing methods. The present invention disclosed herein is implemented on Matlab R2019a environment with JPEG formatted natural Images. 1/3 AN IMPROVED CYBER SECURITY SYSTEM WITH DIGITAL WATERMARKING USING COMBINED TRANSFORMATION APPROACH DRAWINGS 102 WATER MARK MAGE 1011014 ORIGAL 0AGEWATERMARKED ORIGINALIMAGE BEDDING W MAGE Figure 1: General Model of Digital Watermarking 201 20_0 0 INT IMAGE DWCTRANSIORM SVD TRANSfORM EMED INVE WATERMARKED 20 20 20 pmoCES T RANSFORM Ef MAGE F F T IMAGE FOR DWCTRANSFORM SVD TRANSFORM WATERMARKNG Figure 2: An Improved Cyber Security System with Digital Watermarking using Combined Transformation Approach.

Description

1/3
AN IMPROVED CYBER SECURITY SYSTEM WITH DIGITAL WATERMARKING USING COMBINED TRANSFORMATION APPROACH DRAWINGS
102
WATER MARK MAGE
1011014
ORIGAL ORIGINALIMAGE 0AGEWATERMARKED BEDDING W MAGE
Figure 1: General Model of Digital Watermarking
201 20_0 0
INT IMAGE DWCTRANSIORM SVD TRANSfORM
EMED INVE WATERMARKED 20 20 20 pmoCES T RANSFORM Ef MAGE F F T IMAGE FOR DWCTRANSFORM SVD TRANSFORM WATERMARKNG
Figure 2: An Improved Cyber Security System with Digital Watermarking using
Combined Transformation Approach.
I AN IMPROVED CYBER SECURITY SYSTEM WITH DIGITAL WATERMARKING USING COMBINED TRANSFORMATION APPROACH FIELD OF INVENTION
[0001] The present invention relates to the technical field of Computer Science Engineering.
[0002] Particularly, the present invention is related to an Improved Cyber Security System with Digital Watermarking using Combined Transformation Approach of the broader field of Cyber Security in Computer Science Engineering.
[0003] More particularly, the present invention is relates to an Improved Cyber Security System with Digital Watermarking using Combined Transformation Approach that provides the improved security in cyber security systems with Digital Watermarking in combination with the Combined Transformation approach.
BACKGROUND OF INVENTION
[0004] The quick advancement of viable Multimedia Mass Communication advances over the web expanding the Digital Data Transfer between the clients. The security is the major requirement for an effective Multimedia Mass Communication.
[0005] The Cyber Security is generally used for protecting sensitive data, personal data, intellectual property data, copying of illegal data, tampering of data and any industry information from cyber thefts and damaged attempts.
[0006] The Digital Watermarking is an invisible information shield to protect the multimedia data in the Cyber Security Systems for ownership identification and authentication of multimedia data. The Digital Watermarking alone structurally liable to suffer from the cyber attacks. The security in the Multimedia Mass Communication can be improved with Digital Watermarking in combination with the transformation approach.
[0007] The Digital Watermarking is either visible or invisible. The Digital Watermarking technique can provide the security similar to the other secure methods such as encryption, cryptograph, and steganography. The Digital Image Watermarking in cyber security embeds an image into another image for final ownership identification and authentication.
[0007a] The present invention disclosed herein uses invisible Digital Watermarking. This invisible digital watermarking is either robust type or fragile type. The robust type watermarking is used to know the significance of resistivity of the watermarking against different security attacks such as Scaling, Resaling, Rotating, Cropping, lowpass filtering, noises such as salt and pepper, Gaussian Noise and so on. The fragile digital watermarking is the responsible to know the ownership authentications.
[0007b] The Digital Watermarking can be performed in two domains namely spatial domain and frequency domain. In spatial domain, Digital Watermark is embedded directly on the cover image by changing the pixel values. In frequency domain, Digital Watermark is embedded by modulating the coefficients of the host image using transforms.
[0008] The Multimedia Mass Communication uses multimedia data especially Digital Image for transmitting the information. All the data at present is stored in the form of Digital Data. The Multimedia Mass Communication uses internet for retrieving the information stored on the server or on the personal devices. Due to the use of internet, more chance is there for the cyber attacks. The Cyber security system protects the sensitive data which is stored in the server on the personal devices.
[0009] The Digital Watermarking alone structurally liable to suffer from the cyber attacks. The security in the Multimedia Mass Communication can be improved with Digital Watermarking in combination with the transformation approach.
[0010] The Transformation approaches such as Discrete Wavelet, Discrete Cosine, and Singular Valued Decomposition are used along with the Digital Watermarking to improve the security in protecting the sensitive data.
[0011] The major problem with the existing inventions is robustness due to which more cyber attacks are occurring, and creating cyber thefts and damaged attempts on the sensitive data, personal data, intellectual property data.
[0012] The present invention disclosed herein uses the combined transformation approach which is the combination of Discrete Wavelet, Cosine, and Singular Valued Decomposition Transformations. The original Input Image is extracted from the Digital Watermarked Image to know the damaged attempts or attacks on the original Input Image.
[0013] The present invention disclosed herein has the capability of performing the embedding process in which the Digital Watermarked Image is generated for the original Input Image in less time around 0.75 seconds and the original Input Image can be extracted from the Digital Watermarked Image with extraction process takes around 0.06 seconds.
[0014]The present invention disclosed herein showing the better performance of Peak Signal Noise Power Ratio (PSNR) values of 121.3dB, 183dB in embedding and extraction process compared existing methods. The present invention disclosed herein is implemented on Matlab R2019a environment with JPEG formatted natural Images.
[0015] Referring to Figure 1, illustrates General Model of Digital Watermarking comprising of Original Image (101), Watermark Image (102), Embedding (103), and Watermarked Image (104); shows how the Watermarked Image can be obtained for the input Original Image.
[0015a] The Original Image (101) is a digital image to which the protection is required from the cyber attacks. The original Input Image (101) may have sensitive data and is converted into the watermarked image (104) with the process namely Embedding (103). The Embedding (103) performs an algorithm for embedding the Watermark Image (102) on the Original Input Image (101). In Invisible Digital watermarking the appearance of the Watermarked Image (104) and the Original Image (101) is same.
[0015b] The Watermarked Image (104) contains the Original Image and Watermark Image. The Original Input Image (101) is extracted from the Watermarked Image (104) by the extraction process.
[0016] The present invention disclosed herein provides the improved security for the data in cyber security systems. The performance of the cyber security system is improved due to the use of combined transformation approach. There are several inventions related to the security in cyber security systems with the Digital Watermarking. But the present invention uses Digital Watermarking along with the Combine Transformation approach to provide better security against the cyber attacks.
[0017] The present invention disclosed herein is having the applications such privacy engineering, Voting Systems, Public Safety Communication, Smart Grids, Small Business sectors, Cyber Crime Prevention, and Vulnerability management.
SUMMARY OF INVENTION
[0018] Referring to Figure 1, illustrates General Model of Digital Watermarking comprising of Original Image (101), Watermark Image (102), Embedding (103), and Watermarked Image (104); shows how the Watermarked Image can be obtained for the input Original Image.
[0018a] The Original Image (101) is a digital image to which the protection is required from the cyber attacks. The original Input Image (101) may have sensitive data and is converted into the watermarked image (104) with the process namely Embedding (103). The Embedding (103) performs an algorithm for embedding the Watermark Image (102) on the Original Input Image (101). In Invisible Digital watermarking the appearance of the Watermarked Image (104) and the Original Image (101) is same.
[0018b] The Watermarked Image (104) contains the Original Image and Watermark Image. The Original Input Image (101) is extracted from the Watermarked Image (104) by the extraction process.
[0019]The present invention, Referring to Figure 2, an Improved Cyber Security System with Digital Watermarking using Combined Transformation Approach comprising of Input Image (201), DWC Transform (202), SVD Transform (203), Image for Watermarking (204), DWC Transform (205), SVD Transform (206), Embed Process (207), Inverse Transform (208), and Watermarked Image (209); used to provides the improved security in cyber security systems, in accordance with another exemplary embodiment of the present disclosure.
[0019a] The Input Image (201) is a host image on which Digital Watermarking is performing. The size of Input Image (201) is 512x512 pixels. The Input Image (201) is a colour image that contains RGB (Red, Green, and Blue) components.
[0019b] The DWC Transform (202) is the combination of the two transformation techniques such as Discrete Wavelet Transform and Discrete Cosine Transform. The DWC Transform (202) uses Discrete Wavelet Transform (DWT) in 3-levels on the B (Blue) component of the Input Image (201) which is not that much responsive to the human eye. The B Component is decomposed into wavelets level by level. In first level the decomposition, the wavelet subbands are [LLi, LHi, H , HH]. In second level, DWT is applied to LLi of first level and produces the wavelet subbands as [LL2, LH2,
HL2, HH 2 ]. In third level, DWT is applied to LL2 of second level and produces the
wavelet subbands as [LL3, LH3, HL3, HH 3 ]. For the four wavelet subbands obtained after the 3-level DWT, Discrete Cosine Transform (DCT) is applied to compress the high frequency components present in the subbands. The SVD Transform (203) is performed on all the compressed subbands after DCT. The Image for Watermarking (204) is another image used to cover the original input Image (201). This image can be called as cover image. The size of Cover Image (204) is 128x128 Pixels. The B Component is decomposed into wavelets level by level. In first level the decomposition, the wavelet subbands are [LLi, LHi, H , HH]. In second level, DWT is applied to
LLi of first level and produces the wavelet subbands as [LL2, LH2, HL2, HH2]. In third
level, DWT is applied to LL2 of second level and produces the wavelet subbands as
[LL3, LH3, HL3, HH 3 ]. For the four wavelet subbands obtained after the 3-level DWT, Discrete Cosine Transform (DCT) is applied to compress the high frequency components present in the subbands.
[0019c] The Singular Valued Decomposition (SVD) Transform (206) used to progress the quality of the watermark and robustness against various attacks. This SVD Transform (206) is performed on all the compressed subbands after DCT. The Singular Valued Decomposed values are less effective for the image processing operation or to
U
the attacks such as scale, rescale, rotate and so on. The strength of the watermarking also improved with SVD Transform. The Embed Process is used to embed the Input Image with Cover Image to form Watermarked Image. After embedding means after combining the Singular Values of Input Image and Cover Image, Inverse Transforms such as inverse DWT, Inverse DCT, Inverse SVD are applied to get perfect Watermarked Image.
[0020] Referring to Figure 3, illustrates Block Diagram of Extraction Process of original Image comprising of Watermarked Image (301), DWC Transform (302), SVD Transform (303), Extraction (304), Inverse Transform (305)(306), Output Image (307), and Image for Watermarking (308); used to extract the original Image from the Digital Watermarked Image.
[0020a] The Watermarked Image (301) is the original image covered with the host image or watermark image. The Watermarked image is full secure and original image from the watermarked Image (301) can be extracted. The DWC Transform (302) is performed same as in the embedding process. The Watermarked Image (301) is decomposed into wavelets level by level. In first level the decomposition, the wavelet subbands are [LL, LH, HL, HH]. Divide each subband into 8x8 blocks ans apply Discrete Cosine Transform (DCT) to each block to obtain 32x32 DC values. The Singular Valued Decomposition (SVD) Transform (303) used to progress the quality of the watermark and robustness against various attacks. This SVD Transform (303) is performed on all the compressed subbands after DCT. The chaotic reverse sequence also in order to extract (304) watermark and original image (307). The Inverse transformation (305)(306) such as inverse DWT, Inverse DCT, Inverse SVD are applied to get perfect Watermarked Image (209).
[0021] Referring to Figure 4, illustrates PSNR Values in Embedding and Extraction Process of invention proposed herein (401). The present invention disclosed herein showing the better performance of Peak Signal Noise Power Ratio (PSNR) values 121.3dB, 183dB in embedding and extraction process compared existing methods.
[0022] Referring to Figure 5, illustrates the Graph of Embedding and Extraction Process Time of invention proposed herein (501). The present invention disclosed herein has the capability of performing the embedding process in which the Digital Watermarked Image is generated for the original Input Image in less time around 0.75 seconds and the original Input Image can be extracted from the Digital Watermarked Image with extraction process takes around 0.06 seconds.
BRIEF DESCRIPTION OF DRAWINGS
[0023] The Accompanying Drawings are included to provide further understanding of the invention disclosed here, and are incorporated in and constitute a part this specification. The drawing illustrates exemplary embodiments of the present disclosure and, together with the description, serves to explain the principles of the present disclosure. The Drawings are for illustration only, which thus not a limitation of the present disclosure.
[0024] Referring to Figure 1, illustrates General Model of Digital Watermarking comprising of Original Image (101), Watermark Image (102), Embedding (103), and Watermarked Image (104); shows how the Watermarked Image can be obtained for the input Original Image, in accordance with an exemplary embodiment of the present disclosure.
[0025]The present invention, Referring to Figure 2, an Improved Cyber Security System with Digital Watermarking using Combined Transformation Approach comprising of Input Image (201), DWC Transform (202), SVD Transform (203), Image for Watermarking (204), DWC Transform (205), SVD Transform (206), Embed Process (207), Inverse Transform (208), and Watermarked Image (209); used to provides the improved security in cyber security systems, in accordance with another exemplary embodiment of the present disclosure.
[0026] Referring to Figure 3, illustrates Block Diagram of Extraction Process of original Image comprising of Watermarked Image (301), DWC Transform (302), SVD Transform (303), Extraction (304), Inverse Transform (305)(306), Output Image (307), and Image for Watermarking (308); used to extract the original Image from the Digital Watermarked Image, in accordance with another exemplary embodiment of the present disclosure.
[0027] Referring to Figure 4, illustrates PSNR Values in Embedding and Extraction Process of invention proposed herein (401), in accordance with another exemplary embodiment of the present disclosure.
[0028] Referring to Figure 5, illustrates the Graph of Embedding and Extraction Process Time of invention proposed herein (501), in accordance with another exemplary embodiment of the present disclosure.
DETAIL DESCRIPTION OF INVENTION
[0029] Referring to Figure 1, illustrates General Model of Digital Watermarking comprising of Original Image (101), Watermark Image (102), Embedding (103), and Watermarked Image (104); shows how the Watermarked Image can be obtained for the input Original Image.
[0029a] The Original Image (101) is a digital image to which the protection is required from the cyber attacks. The original Input Image (101) may have sensitive data and is converted into the watermarked image (104) with the process namely Embedding (103). The Embedding (103) performs an algorithm for embedding the Watermark Image (102) on the Original Input Image (101). In Invisible Digital watermarking the appearance of the Watermarked Image (104) and the Original Image (101) is same.
[0029b] The Watermarked Image (104) contains the Original Image and Watermark Image. The Original Input Image (101) is extracted from the Watermarked Image (104) by the extraction process.
[0030]The present invention, Referring to Figure 2, an Improved Cyber Security System with Digital Watermarking using Combined Transformation Approach comprising of Input Image (201), DWC Transform (202), SVD Transform (203), Image for Watermarking (204), DWC Transform (205), SVD Transform (206), Embed Process (207), Inverse Transform (208), and Watermarked Image (209); used to provides the y improved security in cyber security systems, in accordance with another exemplary embodiment of the present disclosure.
[0030a] The Input Image (201) is the original Digital Image, Natural Digital Image taken from the freely available Database. The Input Image (201) is a host image on which Digital Watermarking is performing. The size of Input Image (201) is 512x512 pixels. The Input Image (201) is a colour image that contains RGB (Red, Green, and Blue) components. The Input Image (201) is said to be a host image because it is hosted by the individual user on the hosting server and it is stored on the server. Other user can allow to access with the code provided by the hosting server. When other user accessed, there is a chance of tampered, copying, and damaging the information present in the host image, and is to be protected to know the correct owner identification with the invention disclosed herein.
[0030b] The DWC Transform (202) is the combination of the two transformation techniques such as Discrete Wavelet Transform and Discrete Cosine Transform. The DWC Transform (202) uses Discrete Wavelet Transform (DWT) in 3-levels on the B (Blue) component of the Input Image (201) which is not that much responsive to the human eye. The B Component is decomposed into wavelets level by level. In first level the decomposition, the wavelet subbands are [LLi, LHi, H , HH]. In second level, DWT is applied to LLi of first level and produces the wavelet subbands as [LL2, LH2,
HL2, HH 2 ]. In third level, DWT is applied to LL2 of second level and produces the
wavelet subbands as [LL3, LH3, HL3, HH 3 ]. For the four wavelet subbands obtained after the 3-level DWT, Discrete Cosine Transform (DCT) is applied to compress the high frequency components present in the subbands.
[0030c] The Singular Valued Decomposition (SVD) Transform (203) used to progress the quality of the watermark and robustness against various attacks. This SVD Transform (203) is performed on all the compressed subbands after DCT. The Singular Valued Decomposed values are less effective for the image processing operation or to the attacks such as scale, rescale, rotate and so on. The strength of the watermarking also improved with SVD Transform.
[0030d] The Image for Watermarking (204) is another image used to cover the original
1U
input Image (201). This image can be called as cover image. The size of Cover Image (204) is 128x128 pixels. The Cover Image (204) is a colour image that contains RGB (Red, Green, and Blue) components.
[0030e] The DWC Transform (205) is the combination of the two transformation techniques such as Discrete Wavelet Transform and Discrete Cosine Transform. The DWC Transform (205) uses Discrete Wavelet Transform (DWT) in 3-levels on the B (Blue) component of the Cover Image (204) which is not that much responsive to the human eye. The B Component is decomposed into wavelets level by level. In first level the decomposition, the wavelet subbands are [LLi, LHi, H , HHi]. In second level, DWT is applied to LLi of first level and produces the wavelet subbands as [LL2, LH2,
HL2, HH 2 ]. In third level, DWT is applied to LL2 of second level and produces the
wavelet subbands as [LL3, LH3, HL3, HH 3 ]. For the four wavelet subbands obtained after the 3-level DWT, Discrete Cosine Transform (DCT) is applied to compress the high frequency components present in the subbands.
[0030f] The Singular Valued Decomposition (SVD) Transform (206) used to progress the quality of the watermark and robustness against various attacks. This SVD Transform (206) is performed on all the compressed subbands after DCT. The Singular Valued Decomposed values are less effective for the image processing operation or to the attacks such as scale, rescale, rotate and so on. The strength of the watermarking also improved with SVD Transform.
[0030g] The Embed Process (207) is used to embed the Input Image with Cover Image to form Watermarked Image. After embedding means after combining the Singular Values of Input Image and Cover Image, Inverse Transforms (208) such as inverse DWT, Inverse DCT, Inverse SVD are applied to get perfect Watermarked Image (209).
[0031] Referring to Figure 3, illustrates Block Diagram of Extraction Process of original Image comprising of Watermarked Image (301), DWC Transform (302), SVD Transform (303), Extraction (304), Inverse Transform (305)(306), Output Image (307), and Image for Watermarking (308); used to extract the original Image from the Digital Watermarked Image.
[0031a] The Watermarked Image (301) is the original image covered with the host image or watermark image. The Watermarked image is full secure and original image from the watermarked Image (301) can be extracted. The DWC Transform (302) is performed same as in the embedding process. The DWC Transform (302) is the combination of the two transformation techniques such as Discrete Wavelet Transform and Discrete Cosine Transform. The DWC Transform (302) uses Discrete Wavelet Transform (DWT) in 3-levels on the B (Blue) component of the Watermarked Image (301) which is not that much responsive to the human eye. The Watermarked Image (301) is decomposed into wavelets level by level. In first level the decomposition, the wavelet subbands are [LL, LH, HL, HH]. Divide each subband into 8x8 blocks ans apply Discrete Cosine Transform (DCT) to each block to obtain 32x32 DC values. The Singular Valued Decomposition (SVD) Transform (303) used to progress the quality of the watermark and robustness against various attacks. This SVD Transform (303) is performed on all the compressed subbands after DCT. The Singular Valued Decomposed values are less effective for the image processing operation or to the attacks such as scale, rescale, rotate and so on. The strength of the watermarking also improved with SVD Transform. The chaotic reverse sequence also in order to extract (304) watermark and original image (307). The Inverse transformation (305)(306) such as inverse DWT, Inverse DCT, Inverse SVD are applied to get perfect Watermarked Image (209).
[0032] Referring to Figure 4, illustrates PSNR Values in Embedding and Extraction Process of invention proposed herein (401). The present invention disclosed herein showing the better performance of Peak Signal Noise Power Ratio (PSNR) values of 121.3dB, 183dB in embedding and extraction process compared existing methods.
[033] Referring to Figure 5, illustrates the Graph of Embedding and Extraction Process Time of invention proposed herein (501). The present invention disclosed herein has the capability of performing the embedding process in which the Digital Watermarked Image is generated for the original Input Image in less time around 0.75 seconds and the original Input Image can be extracted from the Digital Watermarked Image with extraction process takes around 0.06 seconds.

Claims (5)

  1. AN IMPROVED CYBER SECURITY SYSTEM WITH DIGITAL WATERMARKING USING COMBINED TRANSFORMATION APPROACH
    We claim: 1. An Improved Cyber Security System with Digital Watermarking using Combined Transformation Approach comprising of Input Image (201), DWC Transform (202), SVD Transform (203), Image for Watermarking (204), DWC Transform (205), SVD Transform (206), Embed Process (207), Inverse Transform (208), and Watermarked Image (209); used to provides the improved security in cyber security systems.
  2. 2. An Improved Cyber Security System with Digital Watermarking using Combined Transformation Approach as claimed in claim 1, wherein it is uses Combined Transformation approach which is the combination of the two transformation techniques such as Discrete Wavelet Transform and Discrete Cosine Transform. The DWC Transform (202) uses Discrete Wavelet Transform (DWT) in 3-levels on the B (Blue) component of the Input Image (201) along with the Singular Valued Decomposition (SVD) transform.
  3. 3. An Improved Cyber Security System with Digital Watermarking using Combined Transformation Approach as claimed in claim 1, wherein The B Component is decomposed into wavelets level by level. In first level the decomposition, the wavelet subbands are [LL, LH1, HL1, HH 1 ]. In second level, DWT is applied to LL1 of first
    level and produces the wavelet subbands as [LL2, LH2, HL2, HH 2 ]. In third level, DWT is applied to LL2 of second level and produces the wavelet subbands as [LL3, LH3, HL3, HH3 ]. For the four wavelet subbands obtained after the 3-level DWT, Discrete Cosine Transform (DCT) is applied to compress the high frequency components present in the subbands.
  4. 4. An Improved Cyber Security System with Digital Watermarking using Combined Transformation Approach as claimed in claim 1, wherein Embed Process is used to embed the Input Image with Cover Image to form Watermarked Image. After embedding means after combining the Singular Values of Input Image and Cover Image, Inverse Transforms such as inverse DWT, Inverse DCT, and Inverse SVD are applied to get perfect Watermarked Image.
  5. 5. An Improved Cyber Security System with Digital Watermarking using Combined Transformation Approach as claimed in claim 1, wherein it Extraction Process of original Image comprising of Watermarked Image (301), DWC Transform (302), SVD Transform (303), Extraction (304), Inverse Transform (305)(306), Output Image (307), and Image for Watermarking (308); used to extract the original Image from the Digital Watermarked Image, the embedding process in which the Digital Watermarked Image is generated for the original Input Image in less time around 0.75 seconds and the original Input Image can be extracted from the Digital Watermarked Image with extraction process takes around 0.06 seconds, showing Peak Signal Noise Power Ratio (PSNR) values of 121.3dB, 183dB in embedding and extraction process compared existing methods.
    1/3 18 Mar 2021
    AN IMPROVED CYBER SECURITY SYSTEM WITH DIGITAL WATERMARKING USING COMBINED TRANSFORMATION APPROACH
    DRAWINGS 2021101400
    Figure 1: General Model of Digital Watermarking
    Figure 2: An Improved Cyber Security System with Digital Watermarking using Combined Transformation Approach.
    2/3 18 Mar 2021 2021101400
    Figure 3: Block Diagram of Extraction Process of original Image.
    Figure 4: PSNR Values in Embedding and Extraction Process.
    3/3 18 Mar 2021 2021101400
    Figure 5: Graph of Embedding and Extraction Process Time.
AU2021101400A 2021-03-18 2021-03-18 An improved cyber security system with digital watermarking using combined transformation approach Ceased AU2021101400A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2021101400A AU2021101400A4 (en) 2021-03-18 2021-03-18 An improved cyber security system with digital watermarking using combined transformation approach

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2021101400A AU2021101400A4 (en) 2021-03-18 2021-03-18 An improved cyber security system with digital watermarking using combined transformation approach

Publications (1)

Publication Number Publication Date
AU2021101400A4 true AU2021101400A4 (en) 2021-05-13

Family

ID=75829075

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2021101400A Ceased AU2021101400A4 (en) 2021-03-18 2021-03-18 An improved cyber security system with digital watermarking using combined transformation approach

Country Status (1)

Country Link
AU (1) AU2021101400A4 (en)

Similar Documents

Publication Publication Date Title
Paul Review of robust video watermarking techniques
Dharwadkar et al. An Efficient Non-blind Watermarking Scheme for Color Images using Discrete Wavelet Transformation”
Totla et al. Comparative analysis of watermarking in digital images using DCT & DWT
Saturwar et al. Secure visual secret sharing scheme for color images using visual cryptography and digital watermarking
Kannan et al. An extensive research on robust digital image watermarking techniques: A review
AU2021101400A4 (en) An improved cyber security system with digital watermarking using combined transformation approach
Mohammed et al. A new robust binary image embedding algorithm in discrete wavelet domain
Gupta et al. Robust and secured image watermarking using DWT and encryption with QR codes
Patel et al. Digital robust video watermarking using 4-level DWT
Shahid et al. A Non-Blind Watermarking Scheme for Gray Scale Images in Discrete Wavelet Transform Domain using Two Subbands
Rajput et al. A novel technique for RGB invisible watermarking based on 2-DWT-DCT algorithm
Al-Dabbas et al. Digital Watermarking, Methodology, Techniques, and Attacks: A Review
Mudassar et al. Hybrid DWT-SVD digital image watermarking
Dhawas et al. Invisible video watermarking for data integrity and security based on discrete wavelet transform–a review
Al-Haj A hybrid digital image watermarking algorithm
Rana et al. Digital Watermarking Image Using Discrete Wavelet Transform and Discrete Cosine Transform with Noise Identification
Prajapati Transform based digital image watermarking techniques for image authentication
Saiyyad et al. Authentication and tamper detection in images using dual watermarking approach
Lee et al. Reversible data embedding for tamper-proof watermarks
Soppari et al. Study of digital watermarking algorithms for digital rights management and their attacks
Dharwadkar et al. An efficient and secured non blind watermarking scheme for color images using DWT and Arnold transform
Elbaşi Robust mpeg watermarking in dwt four bands
Singh et al. An efficient multiple data hiding technique for medical images using qr code authentication
Shekhawat et al. A robust watermarking technique based on biorthogonal wavelet transform
Chaudhary et al. Digital video watermarking scheme using wavelets with MATLAB

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry