© 2015 IJSRET
116
International Journal of Scientific Research & Engineering Trends
Volume 1, Issue 6, Nov.-2015, ISSN (Online): 2395-566X
BCH Encoded DWT Based Watermarking Scheme
Based on Singular Value Decomposition for Higher
PSNR Ratio
Pravesh Chaubey, Ashish Singhadia
Vedica Institute of Technology, Bhopal MP, India
Email: erpravesh9113@gmail.com
Abstract – In this era of digital media, digital information suffers from copyright and integrity violations. In case of any
dispute like rights violation and ownership of content creator, digital watermark play a vital role to protect the property rights
of the original owner of digital information. Numerous of watermarking has been proposed recently but image quality ie
imperceptibility and robustness of host image at receiving is need to be improved. Where the PSNR value indicate the visual
quality of the image where higher PSNR value lead better image quality. So main research gap need to developed a
watermarking scheme which prevent authentication of digital information with maintain higher PSNR ratio also. The
embedding algorithm is robust against common image processing operations. It is concluded that the embedding and
extraction of the proposed algorithm is well optimized, robust and show an improvement over other similar reported
methods..Towards higher degree of robustness, transparency and blindness this paper proposed encoded hybrid digital
watermarking Scheme (EHDWS) which is based discrete wavelet transform (DWT) and singular value decomposition (SVD).
In EHDWS watermark singular bits are encoded by BCH code followed by DWT and SVD. In proposed hybrid digital image
watermarking using of BCH based Singular Value Decomposition and Discrete wavelet Transformation algorithm is best .by
using of this hybrid digital watermarking possible to harmless our image from many type of attack and higher PSNR value.
Keywords – Digital Watermark, DWT, Haar Transform, SVD , BCH Code
I. INTRODUCTION
The rapid development of digital technologies has
improved access to information resources. These new
technologies allow us to store, transfer and manage digital
content with less time, less complexity and efficiency.
However, the analysis also brings disadvantages, such as
illegal copying and distribution of digital content. Internet
plays an important role in the movement of unauthorized
and illegal digital content. [1] This increases the risk of
violating the owner of the copyright and prevent the
authenticity of digital content. One way to protect digital
content from illegal copying and distribution is to include
additional information called watermark on it.
Digital watermarking is injected to prevent the digital
authentication information. Digital watermarking is
integrated permanently in the care sector as an
identification code or image that is visible or invisible and
tends to discourage unauthorized copying. [2]
If an intrusion attempt to harm or temper the water
marked numerical data, Watermark help capture the action
taken by the intruders based on the protection of
copyright. Watermark with many features such as
invisibility, transparency, security and robust protection of
copyright servers, video authentication and fingerprint and
copy control [3].
Tattoo work scenario can be divided in the spatial
domain or frequency based on the human perception
watermark can be visible or invisible. Watermark should
be applied to the source and destination application.
Watermark joins change the coefficient frequency image
host using a common method such as the discrete Fourier
transform (DFT), discrete cosine transform (DCT),
Discrete Wavelet Transform (DWT), etc. [1].
In this paper the proposed technique will use the DWT
transformation scheme for the digital watermarking.
Which decomposes the input image in four components,
namely, LL, HL, LH and HH, where the first letter
corresponds with frequency offset of the row either low or
high and second latter refer to filter applied to the
columns. The lowest resolution level LL refer to
approximate part of the host image [4] whereas rest three
refer to detail parts and give the vertical high (LH),
horizontal high (HL) and high (HH) frequencies. In the
proposed algorithm, watermark is embedded into the host
image by modifying the high frequency coefficients band
i.e. HH sub band .
The method of error correction coding used in this
article is the BCH (Bose Chaudhuri Hocquenghem-) code
(Lin and Costello, 1983). The algorithm is commonly
applied to CCIR 584-1. This is a type of cyclic code that is
capable of correcting random errors. BCH codes method
used in this document each of the four data bits of a data
flow of 7 bits. Therefore, we can call BCH (7, 4). It is
assumed that the authentication data using encoding a
BCH C (7, 4). When c is 1 error little can be converted
back to an original. When AC 2-bit error can not be
restored but can detect the existence of error. This method
provides a method that is not only capable of
authentication, but can also restore the authentication data
manipulated to its original form. A cyclic code has good
mathematical structure that includes a mechanism for
automatic synchronization. This mechanism is provided by
a shift register with linear feedback. If the data is not