Multimed Tools Appl
DOI 10.1007/s11042-017-4986-1
An IWT based blind and robust image watermarking
scheme using secret key matrix
Kshiramani Naik1 · Saswati Trivedy1 ·
Arup Kumar Pal1
Received: 18 October 2016 / Revised: 20 April 2017 / Accepted: 25 June 2017
© Springer Science+Business Media, LLC 2017
Abstract In this paper, the authors have proposed a binary watermark embedding approach
for protecting the copyright ownership of the gray-scale images. The proposed watermark
embedding process is realized in integer wavelet transform (IWT) domain to defend the
robustness property. Instead of inserting the watermark bits directly in the coefficients
of cover media, an indirect embedding mechanism is proposed with the reference to a
logistic map based secret key matrix which enhance the secrecy of the proposed embedding approach. Initially, the approximate sub band of the IWT transformed cover image is
selected with the intention to embed the watermark. Later, a secret key matrix of size corresponding to the approximate sub band of the cover image is formed using the logistic
map with secret parameters. During the watermark embedding process, the approximate sub
band is modified indirectly with reference to the secret key matrix and a proposed division
table. The scheme is tested on a set of standard images and satisfactory results are achieved.
In addition, the proposed schemes is also able to extract the watermark information in blind
manner. Also, the scheme is comparable with some other related schemes. Finally, the proposed watermarking scheme is able to survive the watermark even after performing certain
types of image manipulation attacks.
Keywords Blind watermarking · Copyright protection · Integer wavelet transform ·
Logistic map · Robust watermarking
Kshiramani Naik
kshiramani@gmail.com
Saswati Trivedy
saswatialo12@gmail.com
Arup Kumar Pal
arupkrpal@gmail.com
1
Department of Computer Science and Engineering, Indian Institute of Technology (ISM) Dhanbad,
Jharkhand 826004, India
Multimed Tools Appl
1 Introduction
The extensive evolution of digital technology facilitates the multimedia data to be transmitted and distributed in digital format over the Internet. As digital data are easily exposed to
illegal possession, duplication and dissemination over the Internet, it has become an essential to think about the copyright protection, ownership verification, and tamper-resistance of
digital data during their applications. Digital watermarking method is one of the widely used
solution for detecting the illegal manipulation occurred in digital data. In digital watermarking method, the information related to the digital data is embedded or hidden in the digital
data itself such that the authenticity and integrity can be verified by extracting or detecting
the embedded information. The embedded information is termed as watermark. The digital
data that contain watermark is termed as cover media. Depending upon the cover media, the
watermarking schemes are classified as image, video or audio watermarking.
Depending upon the specific goal, the watermarking method can be categorized into
robust, semi-fragile and fragile watermarking. The robust watermarking method is generally considered for copyright protection of the digital data [17, 18]. In robust watermarking scheme, the existence of secret information can be known but it is hard to
remove/manipulate the secret information [8]. So in copy right protection scheme robust
watermarking is preferred.
Depending upon the embedding domain, again the robust watermarking schemes can be
divided into two categories, i.e., spatial-domain schemes and frequency-domain schemes. In
Spatial domain, watermark is added directly by modifying pixel values of the cover image.
Several robust watermarking scheme in spatial domain have been devised by researchers
[10, 15–17, 21]. Embedding the watermark into the cover image in spatial domain is a
straight forward method, which has the advantages of low computational complexity and
easy implementation. However, the most serious problem of spatial domains is the weakness
of robustness i.e. spatial domain watermarking algorithms is able to resist some limited
number of attacks. In transform domain, the watermark is embedded by modulating the
coefficients of the transformed cover image. However in case of frequency-domain scheme,
the computational cost is higher than the ones based on spatial domain, more information
can be embedded and better robustness against the common image processing attacks can
be survived. The main advantages of using the frequency domain methods are that they
can easily be adapted to lossy compression systems, which have the ability to embed data
in the compressed representations, and have ability to reveal the watermark even from the
modified watermarked image [9, 20]. The transform domain based watermarking schemes
can be implemented through various transformation tools such as discrete cosine transform
(DCT) [22], discrete wavelet transform (DWT) [23], Discrete Fourier transform(DFT) [12],
Integer wavelet transform(IWT) [4], Singular Value Decomposition(SVD) [11] etc.
Various robust image watermarking schemes based on transform domain have shown
their effectiveness in image data protection. In [24], Thabit et al. proposed another watermarking scheme based on Slantlet transform matrix to transform small blocks of the original
image and hiding the watermark bits by modifying the mean values of the carrier subbands. Fazli et al. [7] proposed a robust watermarking based on a combination of DWT,
DCT, and SVD domains. This paper mainly focuses on the geometric attacks. To address
this goal, the host image is divided into four non overlapping rectangular segments called
sub-images and then watermark is independently embedded into each of them, using the
hybrid scheme. The redundancy reduces effect of cropping attack. Moreover, in order to
correct main geometric attacks, such as rotation, translation, and affine translation, an inventional synchronization technique is utilized to recover the geometrically attacked image
Multimed Tools Appl
via detection of desired image corners. A binary image in the first experiment and some
1D binary random sequences with different lengths in the next experiments are used as
watermarks. Weng et al. proposed another method based on integer Haar wavelet transform
(IHWT), which utilizes block selection and difference expansion (DE) (or histogram shifting (HS)) [28]. IHWT has the characteristic that the average of a block remains unchanged
before and after watermark embedding. Hence, this invariability can be used for determining whether a block is located in a smooth region or not. In [19], Pal et al. proposed a
robust and blind watermarking scheme based on Discrete Cosine Transform (DCT) for protecting the copyright ownership of the digital images. In this work a binary watermark is
embedded into the block based DCT transformed cover image by modifying the middle
significant AC coefficients using repetition code. The proposed approach ensures the protection of copyright information even in compressed form of the watermarked image. In
[13], Kumsawat et al., the watermark has been embeded into the DMT coefficients using
multiwavelet tree techniques. Digital watermarking algorithm using integer wavelet transform(IWT) have received wide range of attention in the recent years due to the property
that it can map integer to integer without the rounding error, and can obtain good imperceptibility . There are many IWT-based watermarking schemes that have been proposed in
recent years. In [25], Verma et al. designed robust digital watermarking scheme using 3level lifting wavelet transform (LWT) with a block selection procedure. Non-overlapping
coefficient blocks from the low pass subband are selected after applying LWT and using certain criterion based on minimum coefficient difference and a threshold value. Ansari et al.
proposed another watermarking scheme using IWT and SVD (singular value decomposition) based to address false positive problem that are suffered in SVD based watermarking
techniques [3]. The properties of IWT and SVD help in achieving high value of robustness. Singular values are used for the watermark embedding. In order to further improve
the quality of watermarking, the optimization of scaling factor (mixing ratio) is performed
with the help of artificial bee colony (ABC) algorithm. In [26], Wang et al. proposed an
efficient integer transform based reversible watermarking scheme. In this paper, Tian’s difference expansion (DE) technique can be reformulated as an integer transform. Then, a
generalized integer transform and a payload-dependent location map are constructed to
extend the DE technique to the pixel blocks of arbitrary length. In [5], Bohra et al. proposed a technique for robust watermarking of images based on lifting-based integer wavelet
transform. The proposed scheme, along with its robustness has got the capability of blind
self–authentication of the watermarked images. This paper also utilizes histogram modification to avoid overflow/underflow problem. In [6], the 2-level IWT based watermarking
scheme for embedding the compressed version of the binary watermark logo has been developed for robust watermarking. In this paper, the source document image is divided into
empty and non-empty segments depending on the absence or presence of the information.
Watermarking is applied for non-empty segments. A binary watermark logo is compressed
using binary block coding technique of appropriate block-size. IWT is applied on the nonempty segment of the source document image. LL-sub–band of the transformed image is
subdivided into blocks of uniform size and compressed watermark bit stream is embedded
into it. In [14], Lingamgunta et al. proposed a reversible watermarking based on IWT. The
proposed algorithm hides the data and the bookkeeping information in the high frequency
subbands of CDF (2,2) integer wavelet coefficients whose magnitudes are similar to a certain predefined threshold. Histogram modification is applied as a preprocessing to prevent
overflow/underflow. The embedding technique is based on the parent–child structure of the
transformed coefficients called “quadruple wavelet tree” (QWT). In this paper, we develop
an invisible robust watermarking scheme based on 1–level IWT domain. Robustness and
Multimed Tools Appl
imperceptibility are strongly achieved in the proposed method through the characteristics
of IWT. Before watermark embedding, the cover image is transformed through IWT. We
have selected the approximate sub band of the integr wavelet transformed cover image for
the watermark insertion. Generally watermark embedding only in the approximate sub band
reduce the chance of removing or destroying the watermark from the watermarked image.
In [27], Wang et al. proposed a 3-level wavelet based intelligent watermarking scheme
using particle swarm optimization (PSO) technique. In this scheme, the high sub–bands of
the DWT transformed cover image are considered. The coefficents to contains watermark
bits are selected randomly from the different sub–bands. Ali & Ahn presented a DWT–
SVD based watermarking algorithm where self-adaptive differential evolution algorithm is
used during embedding process [1]. Another work is presented by Ali et al was in wavelet
domain and SVD domain. In this work the low frequency sub–band is selected and divided
into blocks. Again the blocks were SVD transformed and the left and right singular vector
matrix are used for watermark embedding using artificial bee colony (ABC) algorithm [2].
In some existing schemes, the watermark bits are embedded directly on the selected
coefficients of the cover image. But in the proposed watermarking scheme, instead of
embedding the watermark bits directly to the coefficients of the cover image, an indirect method corresponds to a division method is utilized. However watermark embedding
only in the low subband increase the chance of removing or destroying the watermark
with the attempt of tampering of that portion. Although this proposed method utilize the
low sub–band of the transformed cover image, robustness and imperceptibility are strongly
achieved through the proposed embedding method and the characteristics of IWT. Also
to increase watermarking security, a generated key matrix using logistic is utilized. The
intention of the proposed method is to improve the robustness and invisibility of the watermarked image and this scheme is suitable for extract the watermark information in a blind
manner.
The rest of the paper is organized as follows. Section 2 describes the related fundamentals
for better understanding of the proposed method. Section 3 contains the details of the proposed method. The experimental results and discussion are in Section 4. Section 5 contains
the conclusion of the work done in this paper.
2 Preliminaries
2.1 Integer to integer wavelet transform
Due to the multi-resolution characteristic, the conventional wavelet transform is very popular in signal and image processing field. Also it is a very good computational tool to reduce
the digital image files with higher compression ratios which helps to storing images using
less memory and for transmitting images faster and more reliably. In the Fig. 1, LL subband represents the approximation part of the image and LH, HH, HL represents the detail
part of the image. But the conventional Wavelet transform is not suitable for truly lossless coding because it gives floating point results for any input sequence which generally
create problem for reconstruction of the exact signal or image. Due to this problems, a generalized version of conventional wavelet transform, Integer to Integer Wavelet Transform
(IWT) is very popular for lossless coding method. It is also known as the second generation
of the wavelet transform. The IWT was introduced by Sweldens (1998). The IWT inherits
the multi-resolution characteristics of the conventional wavelet transform and that can map
integer input sequence to integer output sequence by rounding off the values of wavelet
Multimed Tools Appl
Fig. 1 n-level wavelet transform
transformation. Thus as compared to floating point operation they need less storage space
and the implementation is faster than the conventional wavelet coefficients. The IWT was
constructed by means of lifting scheme. The schematic diagram of the lifting scheme is
shown in Fig. 2:
With a lifting scheme, the forward transform is calculated in three steps.
Split The input sequence is Sj decomposed into an even sequence and odd sequence.
Evenj −1 , Oddj −1 ← Split Sj
Where
Evenj −1 = Evenj −1,k = Sj,2k
Oddj −1 = Oddj −1,k = Sj,2k+1
Predict The numbers from one sequence (generally the odd sequence, Oddj −1 )is predicted on the basis of the other sequence(generally the even sequence, Evenj −1 )by the use
of correlation between them.The
difference,
Dj −1 between the actual value Oddj −1 and
the predicted value, P Evenj −1 becomes the wavelet coefficients. The operation of
Fig. 2 Forward integer wavelet transform
Multimed Tools Appl
obtaining the differences from the prediction is called the lifting step.
Dj −1 = Oddj −1 − P Evenj −1
Where
Pk Evenj −1
Evenj −1,k + Evenj −1,k+1
Sj,2k + Sj,2k+1
=
=
2
2
Update The update step follows the prediction step, where the even values are updated
from the input even samples and the updated odd samples. They become the scaling coefficients which will be passed on to the next stage of transform. This is the second lifting
step.
Sj −1 = Evenj −1 + U Dj −1
Where U is the updated operator and defined as follows:
Dj −1,k
Dj −1,k−1 + Dj −1,k
1
=
+
Uk Dj −1 =
2
4
2
The corresponding inverse transform of IWT is calculated as follows:
Evenj −1 ← Sj −1 − U Dj −1
Oddj −1 ← Dj −1 + P Evenj −1
Sj ← Merge Evenj −1 , Oddj −1
In order to achieve multilevel decomposition,the approximation part, Sj −1,k is further
decomposed into approximate and detail parts using split, predict and update stage and we
get Sj,2k and Dj,2k . This process can be repeated n number of times, where n = log2 (N )
for the input image of size N × N .
2.2 Logistic mapping
Chaotic signals are a kind of pseudorandom, irreversible and dynamical signals generated
by deterministic nonlinear equations, which process good characteristics of pseudorandom
sequences .The definition is
(1)
xn+1 = μxn (1 − xn )
Where xn ∈ (0, 1)is the state of the system for (n = 0, 1, 2,..) and μ ∈ [0, 1]. For different
values of parameter, μ, the logistic sequence shows different characteristics. For x ∈ (0, 1)
and μ ∈ [3.57, 4], the logistic map shows the chaotic behaviour.
3 Proposed method
This section describes some motivating factors that are used to design a robust and blind
watermarking method. In the proposed approach, the authors have considered various test
images of size N ×N as cover images(C) and a binary logo (W ) of size w×w as watermark.
To embed the watermark, a region is selected by applying 1–level IWT on the cover image.
As already mentioned, the IWT is an efficient and rapid lifting wavelet transform and its
properties are best suited to enhance the robustness and preserve the imperceptibility. Due
to this, IWT is very popular in case of digital image watermarking. Also the authors have
applied IWT on the cover image to decompose the cover image into four sub-bands, named
LL, HL, LH and HH. After 1–level IWT transformation of C, the approximation part i.e.
LL sub-band with size N 1 × N 1 (N 1 = N2 ) is used for watermark embedding. In this
Multimed Tools Appl
paper, LL sub-band is termed as CA. Before embedding the watermark, the CA part is
decomposed into non-overlapping blocks of size n × n. In the proposed method, the authors
consider the block based watermark embedding procedure. To preserve the watermark bit
unchanged, a single bit is embedded repeatedly in the selected coefficients of a particular
block. Before embedding process some binary key vectors are generated using a division
method (explained in the Key Generation phase) for watermark bit embedding. These binary
key vectors are generated from a key matrix generated by utilizing the chaotic logistic map.
This binary key also utilized to select the coefficients to be embedded in each block. The
detail procedure of the proposed method is carried out through three phases as follows:
3.1 Pre-processing phase
This phase again comprises of two parts. In the first part a key matrix of same size as CA is
generated from the chaotic logistic map. Here, instead of taking the direct values of initial
condition and system parameter, the authors have considers the calculated initial value and
system parameter to generate the logistic sequence. The key matrix is used to generate the
binary key vectors those are used for watermark embedding. In the next part the detail
procedure of required binary key vectors is described.
Key generation using logistic map
Step 1: Generate a random binary key sequence of l bits long, where l = t 2 .
Step 2: Divide the key sequence into blocks of 16-bit each.
K = σ1 σ2 .....σ16
Step 3:
To calculate the initial condition (x0 ) and the system parameter (μ) of the chaotic
logistic map, the ASCII key sequence is used. The intermediate values, γ1 and
γ2 are used to calculate the initial condition and γ3 , γ4 are used to calculate the
system parameter.
x0 = mod ((γ1 + γ2 ) , 2)
μ = mod 3.999 + (γ3 + γ4 ) 1000 , 1
Where
γ1
γ2
γ3
γ4
= (σ1 σ2 σ3 )10 223 ,
= (σ4 σ5 σ6 )10 223 ,
= (σ7 σ8 σ9 )10 223
,
= (σ10 σ11 σ12 )10 223
Step 4: Generate a chaotic sequence, a of length l by using the (1).
Step 5: Reshape the generated chaotic sequence into a square matrix of size t × t.
Step 6: The matrix is concatenated in raster scan order to generate the matrix K EM of
size CA i.e N 1 × N 1.
Binary key vectors generation for watermark embedding
This phase generates the binary keys for the individual block of the decomposed CA. The
detail procedure is described as follows:
Step 1:
Calculate the difference matrix, D using CA sub–band and K EM.
D = |CA − K EM|
Multimed Tools Appl
Step 2:
Divide the difference matrix, D into the non overlapping blocks, b of size, n × n.
b = b1 , b2 , ....., b N 12
n2
Step 3:
Convert each block into row vector.
2
d = d1×n2 , d2×n2 , ......, d N 12 × n
n2
For Example Suppose A is the one of the decomposed block of difference matrix, D.
Then A is converted into row vector as shown below.
Step 4:
Calculate the adjacent differences, Adj Diff in each row using the following
formula
2
−1
For i = 1 : 2 : N1
n2
Adj diff (i) = abs(di − di+1 )
Binary Value Generation using Division Method
Step 5:
Step 6:
Step 7:
Take a range, R with minimum value, min and maximum value, max. As we are
considering gray test images so min = 0 and max = 255.
Divide R with r number of divisions to give r slots.
Then
R = {R1 , R2 , .......Rr }
Where R1 = min and Rr = max
Then the elements of Binary key vectors, Bin CA(i) reference to the individual
block matrix of CA can be generated from the R and Adj diff (i) as follows:
⎧
1
if Rk ≤ Adj diff(j) ≤ Rk+1
⎪
⎪
⎪
⎪
and mod (k, 2) == 1
⎨
(2)
Bin CA(j ) =
⎪
⎪
0
if
R
≤
Adj
diff(j)
≤
R
⎪
k
k+1
⎪
⎩
and mod (k, 2) == 0
Where k = 1 : r and j = 1 : 2 : n2
For example:
Suppose r = 20, the range can be divided into different slots as shown in Fig. 3.
The main objective of the generation of the binary key vectors space is to utilize these
keys as the reference to the coefficients that are to be modified. The utilization of these
reference bits are explained in the next section.
Multimed Tools Appl
Fig. 3 Division of a range
3.2 Watermark embedding phase
This section describes the detail of embedding procedure of watermark of size w × w to
the CA part of size N 1 × N 1. The main objective is to modify the selected coefficients in
such a way that the they fall in the same slot as the watermark bit. The detail procedure is
described as follows:
Phase 3: watermark embedding
Step 1:
Decompose CA part into non-overlapping blocks of size n × n.
b = b1 , b2 , ....., bN 12
n2
Step 2:
Convert each block into row vectors as follows:
d =
d1×n
2 , d2×n2 , ......, d N 12
×n
2
n2
Step 3: Store the watermark bits in a row vector W .
Step 4: The watermark bits of the vector, W are embedded in the blocks of CA part
according to the value of binary vectors Bin CA(i) to generate the watermarked
Image W CA as follows:
Algorithm 1 Watermark embedding algorithm
for i 1:w2 do
12
for
1 2
1 do
2
if
0 then
if
1 then
WCA(i,j) CA(i,j) m
end if
if
0 then
WCA(i,j) CA(i,j)
end if
end if
if
1 then
if
0 then
WCA(i,j) CA(i,j) m
end if
if
1 then
WCA(i,j) CA(i,j)
end if
end if
end for
end for
Multimed Tools Appl
Fig. 4 Block diagram of the proposed watermark embedding method
The block diagram of the watermark embedding method is shown in Fig. 4.
3.3 Extraction method
At the receiver end the watermark is detected by the intended recipient from the watermarked image using the same secret key that was used in the embedding method. In the
proposed method, instead of sending the whole key ,only the initial value of the logistic
map (x0 ) is need to send at the receiver side to generate the required key. The extraction
procedure is just the reverse process of embedding procedure and is given as follows:
Step 1: Generate the key matrix, K EM from the initial condition(x0 ) of the logistic map.
Step 2: Calculate the difference matrix, D using watermarked image, W CA and K EM.
D = |W CA − K EM|
Step 3:
Divide the difference matrix, D into the non overlapping blocks, b of size, 4 × 4.
b = b1 , b2 , ...., b4096
Step 4:
Convert each block into row vectors, d .
d = d1 , d2 , ...., d4096
Step 5:
Calculate the adjacent differences, Adj Diff in each block of d .
Adj diff = di − di+1
Multimed Tools Appl
Fig. 5 Block diagram of the proposed watermark extraction method
Step 6:
Step 7:
Generate the corresponding binary matrix of Adj Diff i.e. Bin Adj using the
division method as described above.
Calculate the watermarked vectors, W E that contains watermark bits using the
following equation:
0
if Bin Adj = 0
WE =
1
if Bin Adj = 1
Step 8: Extract the watermark bits from W E as follows:
0
if max f req (W E (i)) = 0
W EX (i) =
1
if max f req (W E (i)) = 1
Step 9:
Reshape W EX into a matrix of size 64 × 64.
The block diagram of the watermark extraction procedure is depicted in Fig. 5.
4 Experimental results
In the proposed scheme, an embedding process using division method (as discussed in the
Section 3.1) is employed where the value of the parameter r (r = number of divisions) is
given by the user. In this paper, we have considered the value of r = 20, 30, 40 and 50. For
the result analysis, several images of size 512 × 512, given in Fig. 6 and a binary logo of
size 64 × 64, given in Fig. 7 are taken as the cover media and watermark respectively.
The watermark algorithm can be evaluated by considering two important parameters,
imperceptibility and robustness (Fig. 8).
Imperceptibility measurement The imperceptibility means that the human visual quality of the host image should not be affected much even after watermark embedding. We have
generated different sets of watermarked images according to the value of r and are depicted
in Figs. 9, 10, 11, and 12.
Multimed Tools Appl
Fig. 6 Original images: a Lena b Peppers c Houses d Sailboat e Airplane f Goldhill g Couple h Kiel
The corresponding watermarked images with different value of r of the Fig. 6 shown in
Figs. 9, 10, 11, and 12. There is very low visual degradation of the watermarked images than
original images. Also the histograms of the watermarked images in Fig. 13 are similar to the
histogram of original images (Fig. 8) which indicate that the proposed watermark algorithm
ensures high degree of fidelity.
An alternation to measure the degree of imperceptibility is Peak Signal to Noise
Ratio(P SN R) and it can be defined as follows:
P SN R = 10 log10
Fig. 7 Binary logo
2552
MSE
Multimed Tools Appl
Fig. 8 Histogram of original images: a Lena b Peppers c Houses d Sailboat e Airplane f Goldhill g Couple
h Kiel
Where
M
N
MSE =
i−1 j −1
xi,j − x̃i,j
M ×N
where xi,j and x̃i,j denotes the original and encrypted pixel respectively, and the images are
of size M × N .
Fig. 9 Watermarked images using 20 divisions: a Lena b Peppers c Houses d Sailboat e Airplane f Goldhill
g Couple h Kiel
Multimed Tools Appl
Fig. 10 Watermarked images using 30 divisions: a Lena b Peppers c Houses d Sailboat e Airplane f Goldhill
g Couple h Kiel
A larger P SN R indicate that the watermarked image more closely resembles the original
image meaning that the watermark is more imperceptible. Table 1 shows the calculated
P SN R values of the different number of division for the proposed watermarking algorithm.
Fig. 11 Watermarked images using 40 divisions: a Lena b Peppers c Houses d Sailboat e Airplane f Goldhill
g Couple h Kiel
Multimed Tools Appl
Fig. 12 Watermarked images using 50 divisions: a Lena b Peppers c Houses d Sailboat e Airplane f Goldhill
g Couple h Kiel
From the Table 1 and the Fig. 14 it shows that the P SN R values are higher than 32 dB and
also the P SN R values are improving with the increment of number of divisions.
Robustness measurement The robustness of the proposed scheme can be determined in
terms of Bit–Error–Rate(BER) and normalized cross correlation(N C) which are measured
between the original watermark and extracted watermark (without attack/after applying different types of intended attacks). N C measures the similarities between the original and
Fig. 13 Histogram of Watermarked Images: a Lena b Peppers c Houses d Sailboat e Airplane f Goldhill g
Couple h Kiel
Multimed Tools Appl
Table 1 PSNR of the watermarked images with different number of divisions without attack
Image
Using 20 division
Using 30 division
Using 40 division
Using 50 division
Lena
32.7466
36.475
39.0962
40.6873
Peppers
32.8008
36.1867
39.0348
40.7455
House
32.9646
36.3677
39.1705
40.8079
Baboon
32.8328
36.2423
39.0698
40.6771
Tiffany
32.807
36.1754
39.0559
40.6777
Goldhill
32.7808
36.2274
39.057
40.6843
Zelda
32.7901
36.1801
39.0317
40.6968
Kiel
32.753
36.214
39.882
40.6653
Fig. 14 Imperceptibility comparision with different number of divisions without attack
Table 2 BER and NC of the extracted watermark in different number of division without attack
Image
Lena
Peppers
House
Baboon
Tiffany
Goldhill
Zelda
Kiel
20 division
30 division
40 division
50 division
BER
NC
BER
NC
BER
NC
BER
NC
0.0413
0.0012
0.0068
0.0032
0.0027
0.0017
0.0044
0.0022
1
1
0.9986
1
1
1
1
1
0.0017
0.0017
0.0081
0.0032
0.0022
0.0015
0.0012
0.0034
1
1
0.9993
1
1
1
1
1
0.0097
0.0012
0.0029
0.0002
0.0007
0.0004
0.0009
0.0007
1
1
0.9989
1
1
1
1
1
0.0004
0.0004
0.0015
0
0
0.0002
0
0
1
1
0.9996
1
1
1
1
1
Multimed Tools Appl
Fig. 15 N C comparison with different number of divisions
extracted watermark. For an efficient watermark algorithm the N C values for different test
images should be nearly or equal to 1. Generally, N C ≥ 0.75 is acceptable. The BER
values should be very less that means they should be nearly or equal to 0.
The N C can be formulated as follows:
M
N
i=1 j =1
[w (i, j ) − μw ] × [w̄ (i, j ) − μw̄ ]
N C (w, w̄) =
M
M
N
N
2
[w (i, j ) − μw ] ×
[w̄ (i, j ) − μw̄ ]2
i=1 j =1
Fig. 16 BER comparison with different number of divisions
i=1 j =1
Multimed Tools Appl
Table 3 T AF of the watermarked images with different number of divisions without attack
Image
Using 20 division
Using 30 division
Using 40 division
Using 50 division
Lena
0.1709
0.2197
0.0732
0
Peppers
0.1953
0.1709
0.2441
0
0.1953
House
0.7080
0.6836
0.4395
Baboon
0.2930
0.3906
0.1221
0
Tiffany
0.3418
0.1953
0.1953
0.0488
Goldhill
0.1709
0.1465
0.1221
0
Zelda
0.2686
0.2441
0.0977
0
Kiel
0.2197
0.1709
0.0977
0.0244
Where M and N denote the width and the height of the watermark image, wi,j and w̄i,j
denote the original watermark pixel and extracted watermark pixel respectively. μw and μw̄
represent the mean of the original watermark and extracted watermark respectively.
The BER can be calculated as follows:
BER =
Number of error bits
Number of error bits per second
=
Total bits transmitted
Data rate per second
(3)
Table 2 shows the calculated N C and BER values of the proposed scheme. It is observed
that the NC values of the extracted watermark of various test images are equal to 1 or nearly
equal to 1 and the BER values are also very less which indicate that the extracted watermark
is nearly equal to the original watermark. Figures 15 and 16 shows the performance of
N C and BER with different number of divisions. Also the robustness can be measured by
Tamper Assessment Function(T AF ). It is observed by checking the similarity between the
original watermark (w) and extracted watemark(w̄). Mathematically it is written as:
N−1
1
w ⊕ w̄ × 100
T AF (%) =
M ×N
i=0
Fig. 17 T AF comparison with different number of divisions
Multimed Tools Appl
Fig. 18 Result under Gaussian Low pass filtering (2 × 2) attack and recovered watermark image using a 20
division b using 30 division c using 40 division d using 50 division
Where M × N is the size of watermark image. The value of T AF shoule be closer to zero
for the better result.
From the Table 3 and Fig. 17 it is observed that the values are very less which indicates
the similarity of the extracted watermark from the proposed approach with the original
watermark.
In general during transmission, the watermarked image may be exposed to various
attacks on the watermarked images before reaching to the watermark receiver. The attacks
include both geometric and non–geometric attacks. Geometric attacks include cropping,
resize, rotation, scaling, translation etc and non–geometric attacks include image filtering,
averaging, addition of noise, sharpening, brightness, gamma correction compression etc. In
the proposed scheme, the watermarked images are verified against both geometric and non–
geometric attacks using 20 division, 30 division, 40 division and 50 division. Although in
the proposed scheme, number of watermarked images have generated and verified against
robustness to various attacks, but as a representative only results of Lena image are presented. The figures below show the watermarked images with attacks and the extracted
watermarks are shown below.
Low pass filtering To prove the robustness against the low pass filtering attacks, gaussian
low pass filtering attacks with different sizes are applied on the watermarked images with
different value of r. The attacked watermarked images and their corresponding extracted
watermarks(logo) with calculated N C and BER values are presented in the following figures.
Gaussian Low-pass Filtering(2 × 2) (Fig. 18).
Gaussian Low-pass Filtering(3 × 3) (Fig. 19).
Gaussian Low-pass Filtering(5 × 5) (Fig. 20).
Gaussian Low-pass Filtering(7 × 7) (Fig. 21).
Fig. 19 Result under Gaussian Low pass filtering (3 × 3) attack and recovered watermark image using a 20
division b using 30 division c using 40 division d using 50 division
Multimed Tools Appl
Fig. 20 Result under Gaussian Low pass filtering (5 × 5) attack and recovered watermark image using a 20
division b using 30 division c using 40 division d using 50 division
From the above figures with the N C and BER values of the extracted logos, it is observed
that the proposed method is efficient enough to survive the gaussian low pass filter attack.
Median filtering Median filtering attack, the center pixel value is modified by the middle
value of the sorted pixel values. For the analysis, we have examined the proposed scheme is
examined against median filtering attacks with different window sizes.
Median Filtering (3 × 3) (Fig. 22).
Averaging attack In this type of attack, number of many samples of a precondition data
set are inserted with a different secret key or watermark and then are averaged to evaluate the
attacked data. If the amount of data set is sufficiently huge, the inserted watermark cannot
be discovered any more supposing that it will output zero mean on average (Fig. 23).
Image noising One of the common non-geometrical attack is the addition noise. The
proposed method is tested for the robustness against salt and pepper noise attack. Salt &
ppepper noise is caused during the transmission due to the pixel’s error.
Salt and Pepper noise(var = 0.01) (Fig. 24).
Salt and Pepper noise(var = 0.03) (Fig. 25).
Salt and Pepper noise(var = 0.05) (Fig. 26).
Effect of gamma correction Sometimes watermarked images are enhanced intentionally or unintentionally by power law transformation which may causes the destruction or
removal of watermark. The below figures shows the results after the watermarked images
are enhanced by gamma correction technique with different gamma value and the recovered
watermarks from the enhanced images along with their NC and BER values.
Gamma Correction(gamma = 1) (Fig. 27).
Fig. 21 Result under Gaussian Low pass filtering(7 × 7) attack and recovered watermark image using a 20
division b using 30 division c using 40 division d using 50 division
Multimed Tools Appl
Fig. 22 Result under Median filtering(3 × 3) attack and recovered watermark image using a 20 division b
using 30 division c using 40 division d using 50 division
Fig. 23 Result under average filtering attack and recovered watermark image using a 20 division b using 30
division c using 40 division d using 50 division
Fig. 24 Result under salt and pepper noise(var=0.01) attack and recovered watermark image using a 20
division b using 30 division c using 40 division d using 50 division
Fig. 25 Result under salt and pepper noise(var=0.03) attack and recovered watermark image using a 20
division b using 30 division c using 40 division d using 50 division
Multimed Tools Appl
Fig. 26 Result under salt and pepper noise(var=0.05) attack and recovered watermark image using a 20
division b using 30 division c using 40 division d using 50 division
Fig. 27 Result under effect of Gamma Correction(1) and recovered watermark image using a 20 division b
using 30 division c using 40 division d using 50 division
Fig. 28 Result under effect of Gamma Correction(0.75) and recovered watermark image using a 20 division
b using 30 division c using 40 division d using 50 division
Fig. 29 Result under cropping attack(128 × 128) and recovered watermark image using a 20 division b
using 30 division c using 40 division d using 50 division
Multimed Tools Appl
Fig. 30 Result under cropping attack(128 × 128) and recovered watermark image using a 20 division b
using 30 division c using 40 division d using 50 division
Fig. 31 Result under cropping attack(256 × 256) and recovered watermark image using a 20 division b
using 30 division c using 40 division d using 50 division
Fig. 32 Result under cropping attack(256 × 256) and recovered watermark image using a 20 division b
using 30 division c using 40 division d using 50 division
Fig. 33 Result under effect of image resize(512→ 256 →512) and recovered watermark image using a 20
division b using 30 division c using 40 division d using 50 division
Multimed Tools Appl
Table 4 Comparison of N C values with different sub-bands
Sub-bands
LL
Number of division 20
Gaussian
Filtering(33)
Median
Filtering(33)
Gaussian
Noise(0.01)
Gamma
Correction(0.8)
Rotation(20)
Histogram
Equalization
Scaling(0.5,2)
Sharpening
LH
30
40
50
20
HL
30
40
50
20
HH
30
40
50
20
30
40
50
0.98 0.97 0.95 0.93 0.75 0.75 0.73 0.73 0.76 0.74 0.75 0.76 0.88 0.83 0.79 0.78
0.98 0.98 0.99 0.99 0.75 0.74 0.74 0.74 0.77 0.76 0.75 0.75 0.76 0.76 0.76 0.76
0.93 0.93 0.94 0.94 0.75 0.75 0.76 0.75 0.74 0.77 0.75 0.76 0.74 0.79 0.73 0.75
0.87 0.88 0.88 0.88 0.76 0.75 0.74 0.74 0.77 0.75 0.75 0.74 0.99 0.99 0.98 0.93
0.88 0.89 0.89 0.89 0.75 0.75 0.75 0.75 0.77 0.73 0.74 0.74 0.77 0.73 0.76 0.74
0.88 0.88 0.88 0.88 0.74 0.74 0.74 0.77 0.75 0.74 0.74 0.74 0.86 0.83 0.79 0.79
0.97 0.98 0.99 0.99 0.75 0.74 0.72 0.73 0.74 0.75 0.74 0.75 0.74 0.74 0.75 0.8
0.94 0.98 0.96 0.96 0.74 0.74 0.74 0.74 0.75 0.76 0.74 0.73 0.77 0.74 0.75 0.75
Table 5 Comparison of BER values with different sub-bands
Sub-bands
CA
Number of division 20
Gaussian
Filtering(33)
Median
Filtering(33)
Gamma
Correction(0.8)
Histogram
Equalization
Scaling(0.5,2)
CH
30
40
50
20
CV
30
40
50
20
CD
30
40
50
20
30
40
50
0.04 0.08
0.09 0.11 0.51 0.5 0.51 0.49 0.47 0.49 0.48 0.46 0.31 0.39 0.43 0.45
0.19 0.25
0.27 0.29 0.51 0.53 0.51 0.48 0.46 0.5 0.47 0.46 0.48 0.5 0.46 0.46
0.25 0.21
0.2 0.19 0.51 0.52 0.5 0.49 0.47 0.51 0.49 0.48 0.02 0.03 0.04 0.19
0.34 0.4084 0.38 0.4 0.51 0.52 0.5 0.47 0.49 0.51 0.48 0.48 0.35 0.42 0.44 0.41
0.18 0.23
0.24 0.26 0.5 0.51 0.51 0.48 0.49 0.5 0.48 0.47 0.47 0.5 0.48 0.26
Table 6 Comparision of N C values of the proposed method with Kumsawat et al. [13] and Lingamgunta
et al. [14]
Image
Kumsawat et al. [13] Lingamgunta et al. [14] Proposed method
NC
NC
NC
20 division 30 division 40 division 50 division
Lena
Peppers
Baboon
Tiffany
Cameraman
Barbara
0.97
0.93
0.95
0.97
0.94
0.95
0.98
0.95
0.96
0.97
0.95
0.96
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Multimed Tools Appl
Table 7 The comparison results with Ansari et al. [3] and Ali & Ahn et al. [1], for common image processing
operations (N C)
Attack
Ansari
Ali &
et al. [3]
Ahn [1]
Proposed method
Using
Using
Using
Using
20 division
30 division
40 division
50 division
0.93
Gaussian Filtering(33)
0.99
0.96
0.98
0.97
0.95
Median Filtering(33)
0.98
0.94
0.98
0.98
0.99
0.99
Average Filtering(33)
0.97
0.91
0.88
0.89
0.87
0.79
Gaussian Noise(0.01)
0.94
0.85
0.93
0.93
0.94
0.94
Salt & Pepper(0.001)
0.99
0.92
0.97
0.98
0.98
0.99
Gamma Correction(0.8)
0.99
0.96
0.87
0.88
0.88
0.88
Rotation(20◦ )
0.98
0.94
0.88
0.89
0.89
0.89
Histogram Equilization
0.98
0.92
0.88
0.88
0.88
0.88
Scaling(0.5,2)
0.98
0.94
0.97
0.98
0.99
0.99
Sharpening
0.94
0.88
0.94
0.98
0.96
0.96
Gamma Correction(gamma = 0.75) (Fig. 28).
Cropping attack Cropping attack tries to remove some parts of the image with the
intention to destroy the embedded watermark.
Cropping(128 × 128 by black) (Fig. 29).
Cropping(128 × 128 by white) (Fig. 30).
Table 8 The comparison results with Verma et al. [25], for common image processing operations (N C)
Attack
Verma
Proposed Method
et al. [25]
Using
Using
Using
Using
20 division
30 division
40 division
50 division
Gaussian Filtering(3 × 3)
0.97
0.98
0.97
0.95
0.93
Median Filtering(3 × 3)
0.95
0.98
0.98
0.99
0.99
Average Filtering(3 × 3)
0.86
0.88
0.89
0.81
0.79
Gaussian Noise(0.01)
0.97
0.93
0.93
0.94
0.94
Gaussian Noise(0.02)
0.85
0.91
0.91
0.92
0.92
Salt & Pepper(0.01)
0.75
0.96
0.97
0.98
0.98
Speckle Noise(0.01)
0.74
0.96
0.97
0.97
0.98
Cropping(1/4)
0.93
0.97
0.98
0.98
0.99
Rotation(0.1◦ )
0.85
0.97
0.98
0.99
0.99
Rotation(0.02◦ )
0.45
0.97
0.98
0.98
0.98
Histogram Equalization
0.92
0.88
0.88
0.88
0.88
Scaling
0.98
0.97
0.98
0.99
0.99
Sharpening
0.88
0.94
0.95
0.96
0.96
Multimed Tools Appl
Table 9 The comparison results with Ali et al. [2], for common image processing operations (N C)
Attack
Ali
Proposed Method
et al. [2]
Using
Using
Using
Using
20 division
30 division
40 division
50 division
Gaussian Filtering(3 × 3)
0.99
0.98
0.97
0.95
0.93
Median Filtering(2 × 2)
0.9
0.98
0.98
0.99
0.99
Gaussian Noise(0.001)
0.98
0.94
0.94
0.95
0.95
Histogram Equalization
0.99
0.88
0.88
0.88
0.88
Scaling(1/2)
0.91
0.97
0.98
0.99
0.99
Salt & Pepper(0.05)
0.81
0.93
0.94
0.94
0.94
Table 10 The comparison results with Thabit et al. [24], for common image processing operations (N C)
Attack
Thabit
Proposed Method
et al. [24]
Using
Using
Using
Using
20 division
30 division
40 division
50 division
Salt & Pepper(0.002)
0.93
0.97
0.98
0.98
0.98
Salt & Pepper(0.004)
0.96
0.97
0.98
0.98
0.98
Salt & Pepper(0.008)
0.84
0.97
0.97
0.98
0.98
Salt & Pepper(0.01)
0.82
0.96
0.97
0.98
0.98
Salt & Pepper(0.02)
0.81
0.96
0.96
0.97
0.97
Gamma Correction(2)
0.85
0.67
0.66
0.65
0.65
Gamma Correction(1.5)
0.89
0.81
0.80
0.79
0.79
Gamma Correction(1)
1
1
1
1
1
Gamma Correction(0.8)
0.53
0.87
0.88
0.88
0.88
Sharpening
0.92
0.94
0.95
0.96
0.96
Cropping(64 × 64)
0.92
0.97
0.98
0.98
0.99
Cropping(128 × 128)
0.84
0.97
0.98
0.98
0.99
Cropping(200 × 200)
0.82
0.97
0.98
0.98
0.99
Table 11 The comparison results with Wang et al. [27], for common image processing operations (N C)
Attack
Wang
Proposed Method
et al. [27]
Using
Using
Using
Using
20 division
30 division
40 division
50 division
Gaussian Filtering(3 × 3)
0.96
0.98
0.97
0.95
0.93
Median Filtering(3 × 3)
0.95
0.98
0.98
0.99
0.99
Gaussian Noise
0.94
0.93
0.93
0.94
0.94
Cropping
0.76
0.97
0.98
0.98
0.99
Scalling(1/2)
0.91
0.97
0.98
0.99
0.99
Multimed Tools Appl
Fig. 34 The comparison results with Ansari et al. [3] and Ali & Ahn [1], for common image processing
operations (N C)
Cropping(256 × 256 by black) (Fig. 31).
Cropping(256 × 256 by white) (Fig. 32).
The watermarked images after cropping attacks and the recovered watermarks along with
the N C and BER values are shown above. It is observed that the proposed method can
strong enough to survive various types of cropping attacks.
Effect of image resize In image resizing attack, the size of the image is reduced by
different factors and again resize to the original size.
Image resize(512→ 256 →512) (Fig. 33).
Also the robustness of the proposed scheme is observed by considering the different sub-bands
of the images which are indicated in Tables 4 and 5 in terms of the N C and BER values.
Fig. 35 The comparison results with Verma et al. [25], for common image processing operations (N C)
Multimed Tools Appl
Fig. 36 The comparison results with Ali et al. [2], for common image processing operations (N C)
Comparative analysis The proposed robust watermarking scheme is based on IWT
domain. In the previous section we have shown the efficiency of the proposed method in
terms of imperceptibility and robustness to different types of attack by calculating P SN R,
N C and BER values. Also the efficiency of the proposed scheme is compared with some
existing robust watermarking schemes in transform domain on the basis of N C values
before attack and also after applying some image processing attacks on the watermarked
images Tables 6, 7, 8, 9, 10, and 11 and Figs. 34, 35, 36, 37, and 38.
Compared with other existing methods, the proposed watermarking algorithm has better
robustness against various geometric and non-geometric attacks.
Fig. 37 The comparison results with Thabit et al. [24], for common image processing operations (N C)
Multimed Tools Appl
Fig. 38 The comparison results with Wang et al. [27], for common image processing operations (N C)
5 Conclusion
In this paper, a novel robust and blind binary watermarking scheme is proposed. The watermark (logo)is embedded in the low sub–band of the IWT transformed cover image. However
in the low sub–band portion, the chance of watermark distortion or removal is high. But
in the proposed method even after the various types of attacks applied on the watermarked
images, the watermark is able to survive with low BER and high N C values. The quality of
the watermarked images are also good in terms of perceptibility and P SN R. Also as compared with some existing schemes, the proposed scheme indicate its efficiency with high
robustness.
References
1. Ali M, Ahn CW (2014) An optimized watermarking technique based on self-adaptive de in dwt–svd
transform domain. Signal Process 94:545–556
2. Ali M, Ahn CW, Pant M, Siarry P (2015) An image watermarking scheme in wavelet domain with
optimized compensation of singular value decomposition via artificial bee colony. Inf Sci 301:44–60
3. Ansari IA, Pant M, Ahn CW (2016) Robust and false positive free watermarking in iwt domain using
svd and abc. Eng Appl Artif Intell 49:114–125
4. Arsalan M, Malik SA, Khan A (2012) Intelligent reversible watermarking in integer wavelet domain for
medical images. J Syst Softw 85(4):883–894
5. Bohra A, Farooq O et al. (2009) Blind self-authentication of images for robust watermarking using
integer wavelet transform. AEU-Int J Electron C 63(8):703–707
6. Chetan KR, Nirmala S (2015) An efficient and secure robust watermarking scheme for document images
using integer wavelets and block coding of binary watermarks. Journal of Information Security and
Applications 24:13–24
7. Fazli S, M Moeini A (2016) Robust image watermarking method based on dwt, dct, and svd using a new
technique for correction of main geometric attacks. Optik-International Journal for Light and Electron
Optics 127(2):964–972
8. Furht B, Kirovski D (2004) Multimedia security handbook. CRC Press
9. Gunjal BL, Manthalkar RR (2010) An overview of transform domain robust digital image watermarking
algorithms. Journal of Emerging Trends in Computing and Information Sciences 2(1):37–42
Multimed Tools Appl
10. Hwang M-S, Chang C-C, Hwang K-F (1999) A watermarking technique based on one-way hash
functions. IEEE Trans Consum Electron 45(2):286–294
11. Jia S-L (2014) A novel blind color images watermarking based on svd. Optik-International Journal for
Light and Electron Optics 125(12):2868–2874
12. Kaushik AK (2012) A novel approach for digital watermarking of an image using dft. Int JElectronComp
Sci Eng 1(1):35–41
13. Kumsawat P, Attakitmongcol K, Srikaew A (2007) A robust image watermarking scheme using
multiwavelet tree. In: World congress on engineering. Citeseer, pp 612–618
14. Lingamgunta S, Vakulabaranam VK, Thotakura S (2013) Reversible watermarking for image authentication using iwt. Int J Signal Process, Image Process Pattern Recog 6(1):145–156
15. Maity SP, Kundu MK (2002) Robust and blind spatial watermarking in digital image. In: ICVGIP
16. Mukherjee DP, Maitra S, Acton ST (2004) Spatial domain digital watermarking of multimedia objects
for buyer authentication. IEEE Trans Multimedia 6(1):1–15
17. Nikolaidis N, Pitas I (1998) Robust image watermarking in the spatial domain. Signal Process 66(3):385–403
18. Nin J, Ricciardi S (2013) Digital watermarking techniques and security issues in the information and
communication society. In: 27th international conference on advanced information networking and
applications workshops (WAINA), 2013. IEEE, pp 1553–1558
19. Pal AK, Roy S (2016) A robust and blind image watermarking scheme in dct domain. Int J Inf Comput
Secur, In Press
20. Parashar P, Singh R (2014) A survey: digital image watermarking techniques. Int J Signal Process Image
Process Pattern Recognit 7(6):111–124
21. Sebé F, Domingo-Ferrer J, Herrera J (2000) Spatial-domain image watermarking robust against compression, filtering, cropping, and scaling. In: International workshop on information security. Springer,
pp 44–53
22. Sverdlov A, Dexter S, Eskicioglu AM (2005) Robust dct-svd domain image watermarking for copyright
protection: embedding data in all frequencies. In: Signal processing conference, 2005 13th European.
IEEE, pp 1–4
23. Tao P, Eskicioglu AM (2004) A robust multiple watermarking scheme in the discrete wavelet transform
domain. In: Optics east. International society for optics and photonics, pp 133–144
24. Thabit R, Khoo BE (2014) Robust reversible watermarking scheme using slantlet transform matrix. J
Syst Softw 88:74–86
25. Verma VS, Jha RK, Ojha A (2015) Significant region based robust watermarking scheme in lifting
wavelet transform domain. Expert Syst Appl 42(21):8184–8197
26. Wang C, Li X, Yang B (2010) Efficient reversible image watermarking by using dynamical predictionerror expansion. In: 2010 IEEE international conference on image processing. IEEE, pp 3673–3676
27. Wang Y-R, Lin W-H, Yang L (2011) An intelligent watermarking method based on particle swarm
optimization. Expert Syst Appl 38(7):8024–8029
28. Weng S, Pan J-S (2016) Integer transform based reversible watermarking incorporating block selection.
J Vis Commun Image Represent 35:25–35
Multimed Tools Appl
Kshiramani Naik is presently working as an Assistant Professor in the Department of Computer Science
and Engineering and IT, Veer Surendra Sai University of Technology, Odisha,India. She completed her Ph.D
in Computer Science and Engineering from Indian Institute of Technology(ISM), Dhanbad in 2017. She
received her BE in CSE and M.Tech in CSE from BPUT Rourkela and NIT Rourkela respectively. Her
research interest includes Image Cryptosystem, Steganography and Watermarking.
Saswati Trivedy completed her MTech in Computer Science and Engineering from Indian School of Mines,
Dhanbad in 2015. She received her B.Tech in Electronics and Communication Engineering from West Bengal
University of Technology, Kolkata. Her research interest includes Image Cryptography and Watermarking.
Multimed Tools Appl
Arup Kumar Pal is presently working as an Assistant Professor in the Department of Computer Science
and Engineering, Indian School of Mines, Dhanbad, India. Prior to join this institute, he was a Lecturer in the
Department of Computer Science & Engineering, NIT Jamshedpur during April, 2011 to December, 2011.
He did his Ph.D in Computer Science and Engineering from Indian School of Mines, Dhanbad in 2011. He
has around 4 years of teaching and research experiences, and contributed a number of research papers in
several journals and conference proceedings of National and International reputes. His main research interest
includes Vector Quantization, Image Compression, Image Cryptosystem, Steganography, Watermarking and
CBIR.