Page 25 - 2023-Vol19-Issue2
P. 25

21 |                                                            Taheri

      Fig. 4. Watermark Embedding Process

the hopfield neural network of associative memory process,                    Fig. 5. Watermark Extracting Process
the final extracted watermark is gotten through transformed
and restructures according to inverse process. The watermark    watermarked image, and results have been integrated in Tables
embedding procedure is shown in Fig. 5.                         (I-III). In equation (2) OW is the original watermark and EW
                                                                is the Extracted Watermark image from separating watermark
     III. IMPLEMENTATIONS AND RESULT                            calculation. Dot operation in this equation is explanatory sum
                                                                of product of respective entries. The highlighted rows in each
   The original and watermarked images have been displayed      Tables show our better algorithm robustness versus previous
in Figs.6-11. Barbara, Baboon, and Cameraman images have        methods. The reason of comparison of our algorithm with
been utilized to execute the watermarking calculation. Orig-    our previous methods is, these methods have better adaptation
inal watermark is a twofold image and its size is 64 × 64.      and robustness versus other methods from other researchers.
The original watermark image is displayed in Fig.12 The
performed attacks on the watermarked images are as per the                         IV. CONCLUSION
following: Gaussian noise; median filtering 3*3; low pass
filtering; cropping 25% and resizing 1/5 the image; jpeg com-      Proposed method achieved PSNR more than mentioned
pression with quality elements of 10, 25, and 75, lastly jpeg   methods of DWT-DCT. PSNR signify robustness against vi-
2000 compression with bit rate 3.                               sual and statistical attacks for invisible watermarking. So IWT
                                                                based watermarking process is more imperceptible and robust
SIM(OW, EW )  =     OW.EW          × 100                   (2)  for visual attacks. In the proposed work, watermark is em-
                      OW 2                                      bedded in high frequency band or edge and noise information
                                                                not in characteristics and shapes information of cover image.
PSN   R  =  10log(         (OI(i,  255   W  I(i,  j))  )2  (3)  Further proposed technique may be verified for robustness of
                                   j) -                         statistical attacks in future. PSNR of recovered watermarked
                    ?i  j                                       image is higher compared to existing DWT-DCT technique
                                                                so loss of secret information is also reduced using proposed
    The gauge of similitude (SIM) or mean square estimate, as   technique due to avoid of fraction loss in Integer wavelet trans-
mentioned in abstract, between the extracted watermark image    form. The watermark signal is preprocessed by scrambling
and the original watermark image as equation (2), along the     technology. Integer wavelet transform plays most roles in the
peak sign to noise ratio (PSNR) of watermarked image (WI),      robustness of algorithm, because the integer values of coeffi-
and original image (OI) image will be determined having         cients have more margins tolerate about watermarking attacks
played out every last one of the referenced attacks on the
   20   21   22   23   24   25   26   27   28   29   30