SHORT PAPER International Journal of Recent Trends in Engineering, Vol. 1, No. 1, May 2009 508 Pioneering the Technique for Invisible Image Watermarking on Color Image Soumik Das 1 , Pradosh Bandyopadhyay 2 , Shauvik Paul 3 , Arindam SinhaRay 4 & Dr.Monalisa Banerjee 5 Techno India/MCA, Salt Lake, India Email: 1 soumikdas.techno@yahoo.co.in Email: 2 bandyopadhyay_pradosh@rediffmail.com, 3 paulshauvik@yahoo.co.in, 4 arindam.sinharay@gmail.com, 5 monalisa_erjee@yahoo.com AbstractAccessibility and ease of internet, together with availability of relatively inexpensive digital recording and storage devices has created an environment where duplication, unauthenticated use and maldistribution of digital content has become very easy. This also facilitates unauthorized use, misappropriation, misrepresentation. Thus authentication of multimedia contents (such as image, video, audio) has achieved a sharp attention in recent times. In this perspective we’ve already introduced a framework for invisible image watermarking for color image authentication. In this paper we propose a method for embedding color watermark image to color host image in a more efficient manner. We introduce a new arena of embedding color watermark image at LSB to different positions of color host image in this paper. In proposed watermarking framework, it allows a user with an appropriate secret key and a hash function to verify the authencity, integrity and ownership of an image. We’ve used blind extraction method. I. INTRODUCTION igital Watermarking is the process of embedding information into a digital signal. A watermarking approach provides a persistent link between the authenticator and the content it authenticates. [1] The Digital Image Watermarking (will be referred to as watermarking for rest of the paper) can be classified into two categories - Visible Watermarking and Invisible Watermarking [4], as well as Fragile and Semi fragile watermarking. Our focused area is Invisible Fragile Watermarking. In this kind of watermarking the information is added as digital data to the original, but it can not be perceived as such. Moreover it is highly sensitive to any type of data alteration and tampering can easily be detected [2]. At best to our knowledge we are pioneering the technology which can embed a color watermark image in a color host image. In this sort of watermark, our proposal with 2-bit LSB’s scheme (will be referred to as 2-bit scheme for rest of the paper) is already accepted [8]. In this paper we’ve improved our scheme to 1-bit LSB scheme (will be referred to as 1-bit scheme for rest of the paper) to achieve a much better result regarding PSNR value (Detailed Analysis is reported in the sub section B of Section III). Our proposed framework will ensure- 1] The extracted watermark remains intact. i.e., image authentication is guaranteed. 2] Quality of generated watermarked image is much improved. w.r.t. others. [5] 3] The security issues [3] related to the watermark by using a secret key and a hash function. In current communication, we’ve discussed the technique for embedding the watermark and technique for extraction of the watermark in Section II. We’ve reported experimental analysis in Section III and conclusions are made in Section IV. II. TECHNIQUE FOR EMBEDDING WATERMARK AND EXTRACTION OF WATERMARK With contrast to the previous one, a major improvement is being made in this paper. Our already proposed framework will extract two LSB’s of ‘Blue(B)’ value from each pixel of individual tiles of host image using a secret key and a hash function. Instead of embedding the watermark image at two LSB’s of ‘Blue’(B) value of each pixel of individual tiles, here we’ve taken only the LSB of ‘Blue’(B) value of each pixel of individual tiles of host image. As ‘Blue’ is less sensitive to Human Visual System (HVS) [5],[6], we are only manipulating the ‘Blue’ value. The ‘Red’ value and ‘Green’ value of color host image are getting unchanged. The comparative study of the algorithms for 2-bit scheme and 1-bit scheme is reported below. According to our proposed frame work minimum no. of host image block multiplied by no. of bit embedded should be equal to the bit size of RGB. If the size of host image is not sufficient for 1-bit scheme, we can easily apply 2-bit scheme because PSNR value for 2-bit scheme is also very good. Detailed analysis will be found in Section III. Here we’ve made a comparative study between our already proposed framework (2-bit scheme) [8] [9] and the new framework (1-bit scheme). A. Algorithm for Embedding Watermark using 1-bit Scheme: Let the color host image be ‘Y’. A color watermark ‘A’ will be inserted in it and again will be extracted from it for authentication. The color host image is divided into twenty-four equal blocks (Y i ), where each block size is same with color watermark ‘A’. In the following discussion, we concentrate on inserting and extracting some bit information of color watermark ‘A’ into the D © 2009 ACADEMY PUBLISHER