a secure digital watermarking technique using multiple ... · sudhanshu s.gonge1, ashok a.ghatol2,...

16
International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: [email protected] Volume 5, Issue 9, September 2016 ISSN 2319 - 4847 Volume 5, Issue 9, September 2016 Page 53 Abstract E-Commerce is related with worldwide web. Worldwide web and E-Commerce is a collection of customers & service providers. E-Commerce transfers data with the help of electronic data interchange (EDI).The secure e-transactions of are carried out by using master cards, visa cards, and online payments between customer, merchants, and bank system through EDI at minimum extra charge. The payments made through bank cheque don’t apply any charge to customer. The bank cheques are cleared with the help of cheque truncation system. It passes and clears the cheque image from home bank branch to clearing house of cheque bank branch through digital communication channel. During this transmission process, there may be intruders who are always watching the flow of data passing through channel. This may create issue of security & copyright protection for bank cheque image. To solve this problem there are two techniques i.e. digital watermarking technique to provide copyright protection service and advanced encryption standard technique for facilitating security service. In this research work combination of DWT-DCT-SVD transforms are used for digital bank cheque image watermarking and 256 bit key AES technique is used for encryption & decryption of digital watermarked bank cheque image. Keywords: dct, dwt, svd, aes, watermark, attacks 1. INTRODUCTION Due to daily enhancement in internet technology, E-commerce business is increased on large scale. More than 90% of people have their email-id and are well connected to banking system. Bank system provides their customer various services of doing payments through debit card, visa card, ATM cum-debit card, online payment with help of OLTP i.e. online transaction processing tools. It also allows their customer to do payments through cheques. Bank cheques are cleared through cheque truncation system. It scan bank cheque document. This cheque image is passed to home bank branch to clearing house of bank cheque branch. It avoids the physical work of the employee’s. It clears the cheque very fast as compare to previous traditional method used for clearing cheque. During transmission of bank cheque image through channel, many hackers are watching the flow of data [1-5]. There may be chances of active & passive attacks may occur on bank cheque image. To overcome this problem, 256 bit key AES encryption and decryption technique is used to provide security [6]. There are also chances of attacks like cropping attack, salt & pepper noise attack, Gaussian noise attack, Jpeg compression attack, rotation attack, median filtering attack, etc[7,8]. on bank cheque image. To solve this issue & providing copyright protection service to bank cheque image, combination of DWT-DCT-SVD transform domain digital image watermarking technique is used for bank cheque image [9]. 2. PROPOSED SYSTEM The following system is divided into 3 parts. 1. Embedding digital watermark into bank cheque image & AES encryption of watermarked cheque image [5-9]. 2. Various attacks on encrypted &digital watermarked bank cheque image [5-9]. 3. Extraction of digital watermark from decrypted bank cheque image [5-9]. A Secure Digital Watermarking Technique Using Multiple Transforms and Advanced Encryption Standard Technique used for Security of Bank Cheque Image Sudhanshu S.Gonge 1 , Ashok A.Ghatol 2 , Vilas M.Thakare 3 1 Resecrch Scholar, Department of Computer Science & Engineering, SGBAU, Amravati 2 Former Vice-chancellor, Dr. Babasaheb Ambedkar Technological University, Lonere 3 Professor & Head of P.G. Department of Computer Science & Engineering, SGBAU, Amravati

Upload: others

Post on 17-Oct-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A Secure Digital Watermarking Technique Using Multiple ... · Sudhanshu S.Gonge1, Ashok A.Ghatol2, Vilas M.Thakare3 1Resecrch Scholar, Department of Computer Science & Engineering,

International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: [email protected]

Volume 5, Issue 9, September 2016 ISSN 2319 - 4847

Volume 5, Issue 9, September 2016 Page 53

Abstract E-Commerce is related with worldwide web. Worldwide web and E-Commerce is a collection of customers & service providers. E-Commerce transfers data with the help of electronic data interchange (EDI).The secure e-transactions of are carried out by using master cards, visa cards, and online payments between customer, merchants, and bank system through EDI at minimum extra charge. The payments made through bank cheque don’t apply any charge to customer. The bank cheques are cleared with the help of cheque truncation system. It passes and clears the cheque image from home bank branch to clearing house of cheque bank branch through digital communication channel. During this transmission process, there may be intruders who are always watching the flow of data passing through channel. This may create issue of security & copyright protection for bank cheque image. To solve this problem there are two techniques i.e. digital watermarking technique to provide copyright protection service and advanced encryption standard technique for facilitating security service. In this research work combination of DWT-DCT-SVD transforms are used for digital bank cheque image watermarking and 256 bit key AES technique is used for encryption & decryption of digital watermarked bank cheque image. Keywords: dct, dwt, svd, aes, watermark, attacks

1. INTRODUCTION Due to daily enhancement in internet technology, E-commerce business is increased on large scale. More than 90% of people have their email-id and are well connected to banking system. Bank system provides their customer various services of doing payments through debit card, visa card, ATM cum-debit card, online payment with help of OLTP i.e. online transaction processing tools. It also allows their customer to do payments through cheques. Bank cheques are cleared through cheque truncation system. It scan bank cheque document. This cheque image is passed to home bank branch to clearing house of bank cheque branch. It avoids the physical work of the employee’s. It clears the cheque very fast as compare to previous traditional method used for clearing cheque. During transmission of bank cheque image through channel, many hackers are watching the flow of data [1-5]. There may be chances of active & passive attacks may occur on bank cheque image. To overcome this problem, 256 bit key AES encryption and decryption technique is used to provide security [6]. There are also chances of attacks like cropping attack, salt & pepper noise attack, Gaussian noise attack, Jpeg compression attack, rotation attack, median filtering attack, etc[7,8]. on bank cheque image. To solve this issue & providing copyright protection service to bank cheque image, combination of DWT-DCT-SVD transform domain digital image watermarking technique is used for bank cheque image [9].

2. PROPOSED SYSTEM The following system is divided into 3 parts. 1. Embedding digital watermark into bank cheque image & AES encryption of watermarked cheque image [5-9]. 2. Various attacks on encrypted &digital watermarked bank cheque image [5-9]. 3. Extraction of digital watermark from decrypted bank cheque image [5-9].

A Secure Digital Watermarking Technique Using Multiple Transforms and Advanced Encryption Standard Technique used for Security of Bank

Cheque Image

Sudhanshu S.Gonge1, Ashok A.Ghatol2 , Vilas M.Thakare3

1Resecrch Scholar, Department of Computer Science & Engineering, SGBAU, Amravati

2Former Vice-chancellor, Dr. Babasaheb Ambedkar Technological University, Lonere

3Professor & Head of P.G. Department of Computer Science & Engineering, SGBAU, Amravati

Page 2: A Secure Digital Watermarking Technique Using Multiple ... · Sudhanshu S.Gonge1, Ashok A.Ghatol2, Vilas M.Thakare3 1Resecrch Scholar, Department of Computer Science & Engineering,

International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: [email protected]

Volume 5, Issue 9, September 2016 ISSN 2319 - 4847

Volume 5, Issue 9, September 2016 Page 54

A) Embedding process of watermark using combination of DWT-DCT-SVD technique & AES encryption technique: Following Fig.1 shows flow diagram of combined DWT-DCT-SVD watermarked & AES encryption process used for copyright protection & security of bank cheque.

Figure 1 Flow Diagram of combined DWT-DCT-SVD watermarking and 256 bit key AES encryption process.

Following are the steps based on above figure.1:- A) Select bank cheque image as covered image. B) Select watermark logo image for embedding purpose into covered image. C) Apply discrete wavelet transform on bank cheque image i.e. 1-Level DWT using haar wavelet function. It

decomposes bank cheque image into 4 non-overlapping bands i.e. (LL1, LH1, HL1, and HH1). D) Apply 2-D discrete cosine transform on approximate band i.e. LL1 band of DWT transformed bank cheque image. E) Apply singular valued decomposition transform on combined DWT-DCT transformed part of bank cheque image. F) Generate exactly two PN_Sequence which are different from each other which are being obtained from the

formation of watermark logo image. G) By using above step, W_0 & W_1 are two PN_sequence are used for inserting watermark logo image bit with the

Bank cheque image Watermark logo image

Apply 1-level DWT using haar wavelet function on 2-D bank

cheque image

Apply 2-DCT on DWT transformed bank cheque

image

Apply SVD on DWT-DCT transformed bank cheque

image

Formation of watermark logo image

PN_Sequence Gain Factor

Select highest complexity block i.e. ‘I’ from bank

cheque image

Modify & update components of ‘U’ & ‘V’ from bank cheque image

Take inverse of SVD

Take inverse of 2-DCT

Take inverse of DWT Combined DWT-DCT-SVD watermarked bank cheque image

Apply 256 bit key AES Technique on watermarked bank cheque image

Combination of DWT-DCT-SVD watermarked & AES encrypted bank cheque image

Page 3: A Secure Digital Watermarking Technique Using Multiple ... · Sudhanshu S.Gonge1, Ashok A.Ghatol2, Vilas M.Thakare3 1Resecrch Scholar, Department of Computer Science & Engineering,

International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: [email protected]

Volume 5, Issue 9, September 2016 ISSN 2319 - 4847

Volume 5, Issue 9, September 2016 Page 55

help of gain factor ‘β’ .These bits are inserted into covered image of bank cheque by selecting highest complexity block with the help of attributes of combined DWT-DCT-SVD transformed image I(x, y).

H) Apply the following equation if watermark logo image bit is ‘0’ then:- IW = I + [(β)×W_1] = UW_1 × I W_1 × V W_1

T (1)

Otherwise, IW = I + [(β) ×W_0] = UW_0 × I W_0 × V W_0

T (2) I) Modify & update the component ‘U’ & ‘V’ with help of step 7 & step 8. J) Take inverse of singular valued decomposition transform of process image. K) Apply inverse of 2-D DCT on inverse SVD processed image. L) Take inverse of discrete wavelet transform. M) Thus, combined DWT-DCT-SVD digital bank watermarked cheque image is obtained. N) Apply 256 bit key advanced encryption standard technique on above step M. O) Finally, combination of DWT-DCT-SVD digital watermarked & AES encrypted bank cheque image is obtained.

B) Attack Phase: In this phase, hackers & intruders are always watching the flow of data going from source to destination. After successful watermarking & encryption of bank cheque, it is passed from home bank branch to clearing house bank branch through digital communication channel. During this process there may be occurance of different types of attacks on bank cheque image as discussed in introduction part [1-9]. C) Decryption of DWT-DCT-SVD watermarked cheque image & extraction of watermark logo image process. Following figure.2 shows the flow diagram of decryption of watermarked image & extraction of watermark logo image from decrypted watermarked image.

Figure 2 Flow Diagram of 256 bit key AES decryption & extraction process of watermark from decrypted combined DWT-DCT-SVD watermarked image.

Following are the steps used for decryption process of AES using 256 bit key & extraction of watermark from decrypted DWT-DCT-SVD watermarked bank cheque. A) Read received combined AES encrypted & DWT-DCT-SVD watermarked bank cheque image. B) Apply 256 bit key AES decryption technique on above step A. C) Read decrypted DWT-DCT-SVD watermarked cheque image and apply discrete wavelet transform using 1-level

Read combined AES encrypted & DWT-DCT-SVD watermarked cheque image

Apply 256 bit key AES decryption process

Watermark logo image

Watermark formation

Apply 1-level haar wavelet function on decrypted DWT-DCT-SVD watermarked

cheque image

Apply 2-D DCT on DWT transformed LL1 band

Gain factor PN_Sequence

Apply SVD on DWT-DCT transformed image

Determined highest complexity block ‘I’ of decrypted watermarked image

Modify ‘U’ & ‘V’ component of SVD transformed image

Watermark logo image extraction process

Extracted watermark logo

image

Page 4: A Secure Digital Watermarking Technique Using Multiple ... · Sudhanshu S.Gonge1, Ashok A.Ghatol2, Vilas M.Thakare3 1Resecrch Scholar, Department of Computer Science & Engineering,

International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: [email protected]

Volume 5, Issue 9, September 2016 ISSN 2319 - 4847

Volume 5, Issue 9, September 2016 Page 56

haar wavelet function. It decomposed decrypted DWT-DCT-SVD watermarked cheque image into non overlapping bands i.e. (LL1, LH1, HL1, and HH1).

D) Apply discrete cosine transform on LL1 band of discrete wavelet transformed image. E) Apply singular valued decomposition transformed on combined DWT-DCT transformed image. F) The highest complexity block of image determined by calculating non zero coefficient of ‘I’ component in each

block. G) The same stem of watermark logo image pixel formation is used for generating two PN_Sequence i.e. W_0 & W_1

with help of gain factor ‘β’. H) Extract the watermark logo image bit ‘1’ if the correlation with W_1 is greater than W_0, if not watermark logo

image is not extracted and it is consider as ‘0’. I) Robustness of watermark is calculated by checking similarity between original watermark logo image & extracted

watermark logo image. J) It can be calculated by repairing of watermark logo image with help of extracted bit of watermark logo image.

3. MEASURABLE FACTORS USED FOR ANALYSIS OF EXPERIMENT

3.1 Imperceptibility Imperceptibility is used to measure & calculate peak signal to noise ratio in dB. If value of PSNR is low means the quality of image is good. It is used to maintain the quality of image & calculated as:-

PSNR dB =20Log10 {Max1/ MSE ^ (1/2)} =10Log10 {Max2

1 / MSE} (3)

3.2 Robustness It is used to calculate the quality of watermark extracted from watermarked image. It is also defined as normalized cross co-relation co-efficient and denoted as:-

(4)

3.3 Mean Square Error It is an error function between original image pixel value & watermarked image pixel value. It is denoted by dB. Mathematically, it is calculated as:-

S.E = (1/M x N). ∑x=1 to N. ∑y=1 to M [I(x, y) - I’(x, y)]2 (5)

3.4 Elapsed Time Time is an important parameter in each every research work. Elapsed time is complete computation time taken for complete process. There are many sub process in this experiment. Every sub process will take its own time for completion of working process in second. These sub processes are embedding process, encryption process, decryption process, extraction process and complete elapsed time in seconds calculated against various attack discussed in introductory part.

4. RESULTS AND EXPERIMENTAL DISCUSSION

4.1 Figures and Tables Following figure 3 shows the cheque image used as covered image and figure 4. is watermark logo image used for embedding in covered cheque image. The covered cheque image has vertical and horizontal resolution of 96 dpi.The covered bank cheque image has specific dimension. It width is 512 pixels and height is 512 pixels. The bit depth of covered bank cheque image used for experiment is 24 bit depth. The size of cheque image is 41.3 KB. The watermark logo image has a size of 31.8 KB. The vertical and horizontal resolution of watermark logo image is 96 dpi.The dimension of watermark logo image is same as that of original covered cheque image. Following observation table shows time taken by each sub process discussed above in section 3.4.

N

1i)iW( 2N

1i)i(W 2

iWN

1iiW

)W(W,

Page 5: A Secure Digital Watermarking Technique Using Multiple ... · Sudhanshu S.Gonge1, Ashok A.Ghatol2, Vilas M.Thakare3 1Resecrch Scholar, Department of Computer Science & Engineering,

International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: [email protected]

Volume 5, Issue 9, September 2016 ISSN 2319 - 4847

Volume 5, Issue 9, September 2016 Page 57

Figure 3 Covered cheque image.

Figure 4 Watermark logo image

Table 1: Observation Table of Time Taken by Attacks on DWT-DCT-SVD processed image for gain factor β=0.5

Types of Attacks Embedding time required for watermark

in seconds

Encryption time required for watermarked

image in seconds

Extraction time required for

watermark logo in seconds

Decryption time required for watermarked

image in seconds

Complete elapsed time in

seconds for whole process

Cropping 3.494 0.343 4.290 0.327 0.185

Gaussian Noise (0.04 dB)

3.759 0.358 4.056 0.421 0.177

JPEG Compression (50%)

3.759 0.358 4.134 0.358 0.187

Median Filtering 3.463 0.343 4.024 0.327 0.176

Rotation (45 ) 3.603 0.343 4.040 0.358 0.181

Salt &Pepper Noise (0.04 db)

3.962 0.327 3.962 0.343 0.178

Without any Attack 3.322 0.358 3.744 0.343 0.177

Page 6: A Secure Digital Watermarking Technique Using Multiple ... · Sudhanshu S.Gonge1, Ashok A.Ghatol2, Vilas M.Thakare3 1Resecrch Scholar, Department of Computer Science & Engineering,

International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: [email protected]

Volume 5, Issue 9, September 2016 ISSN 2319 - 4847

Volume 5, Issue 9, September 2016 Page 58

0

0.5

1

1.5

2

2.5

3

3.5

4

4.5

5T

ime i

n Se

cond

s

Types Attacks

Embedding time required for watermark in seconds

Encryption time required for watermarked image in secondsExtraction time required for watermark logo in seconds

Decryption time required for watermarked image in secondsComplete elapsed time in seconds for whole process

Figure 5 Graphical representation of time taken for execution of embedding process, encryption process, decryption

process, extraction process against various attacks on cheque image.

Above figure.5 shows the graphical representation of time taken for embedding watermark logo image in covered bank cheque image, encryption time taken after successful DWT-DCT-SVD watermarking process, decryption process and extraction of watermark logo image from decrypted DWT-DCT-SVD watermarked cheque image. From graph shown in figure.5 explains that the time taken encryption and decryption process of AES technique using 256 bit key is less than that of DWT-DCT-SVD watermark embedding and extraction process. It also shows that the embedding time taken for inserting watermark logo image is less as compared to the time taken by extraction process of watermark logo image from decrypted combined DWT-DCT-SVD watermarked image.

Table 2: Observation Table of PSNR value, MSE value and NCC value of image after performing various attacks for gain factor β=0.5

Types of Attacks PSNR value of watermarked image in dB

PSNR value of image after

extraction in dB

MSE value of watermarked image in dB

MSE value of image after watermark

extraction in dB

NCC value of watermark image

After Encryption & watermarked

image

After decryption & extraction of

watermark logo Cropping 55.417 70.824 0.117 0.005 1 0.968

Gaussian Noise (0.04 dB)

86.164 66.359 0.0001 0.015 0.964 0.917

JPEG Compression (50%)

86.164 82.028 0.0001 0.0004 1 0.997

Median Filtering 86.164 77.853 0.0001 0.0010 0.999 0.994

Rotation (45 ) 86.164 64.141 0.0001 0.0250 0.008 0.865

Salt &Pepper Noise (0.04 db)

86.164 71.512 0.0001 0.0045 0.934 0.974

Without any Attack 86.164 82.082 0.0001 0.0004 1 0.997

Page 7: A Secure Digital Watermarking Technique Using Multiple ... · Sudhanshu S.Gonge1, Ashok A.Ghatol2, Vilas M.Thakare3 1Resecrch Scholar, Department of Computer Science & Engineering,

International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: [email protected]

Volume 5, Issue 9, September 2016 ISSN 2319 - 4847

Volume 5, Issue 9, September 2016 Page 59

0102030405060708090

100V

alue

of p

eak

signa

l to

nois

e rat

io in

dB

Types of Attacks

PSNR value of watermarked image in dBPSNR value of image after extraction in dB

Figure 6 Graphical representation of PSNR value in dB against various attacks on cheque image for gain factor β = 0.5

Above figure.6 shows the graphical representation of peak signal to noise ratio in decibels against various attacks for gain factor 0.5.The graph also shows that peak signal to noise ratio value of combined DWT-DCT-SVD watermarked cheque image against cropping attack is less than that of other attack. The peak signal to noise ratio of combined DWT-DCT-SVD watermarked cheque image is constant for without attack as well as for other attacks except cropping attack. The graph also explains the peak signal to noise ratio value of bank cheque image after successful extraction of watermark from decrypted combined DWT-DCT-SVD watermarked bank cheque image.

0

0.2

0.4

0.6

0.8

1

1.2

MSE

and

NC

C V

alue

of w

ater

mar

k Im

age B

efor

e & A

fter

of E

ncry

ptio

n &

Dec

rypt

ion

of

wat

erm

arke

d I

mag

e

Types of Attacks

MSE value of watermarked image in dB

MSE value of image after watermark extraction in dB

NCC value of watermark image after Encryption & watermarked image

NCC value of watermark image after decryption & extraction of watermark logo

Figure 7 Graphical representation of MSE value in dB and NCC value against various attacks on cheque image for

gain factor β = 0.5

Page 8: A Secure Digital Watermarking Technique Using Multiple ... · Sudhanshu S.Gonge1, Ashok A.Ghatol2, Vilas M.Thakare3 1Resecrch Scholar, Department of Computer Science & Engineering,

International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: [email protected]

Volume 5, Issue 9, September 2016 ISSN 2319 - 4847

Volume 5, Issue 9, September 2016 Page 60

Above figure.7 shows mean square error value in dB is calculated against various attacks. From observation Table II and above figure.7 it is observed that mean square error value of combined DWT-DCT-SVD watermarked cheque image is less for all attacks except cropping attack. It is also observed that the MSE value for Watermarked cheque image is constant for all attacks except cropping attack. From above graph shown in figure.7 it is seen that mean square error value increases against all attacks except cropping attack. It is also observed that Normalized cross correlation coefficient value of watermark logo image after encryption & watermarked image remain ‘1’ against cropping attack, Jpeg compression attack and without performing any attack. It is also been observed that the NCC value of watermark logo image is very low against rotational attack with 45o.The normalized cross correlation coefficient value of watermark obtained after extraction process from decrypted watermarked cheque image is better against rotational attack i.e. above 86.5% is maintained where as NCC value of watermark logo image after successful extraction of watermark is maintained above 91.7% against Gaussian attack, salt & pepper noise attack, cropping attack. The NCC values of extracted watermark logo image against Jpeg compression attack up to 50% & without any attack are maintained above 99.7%.

4.2 Resultant Process Image

Figure 8 Combined DWT-DCT-SVD watermarked bank cheque image

Figure 9 AES encrypted & combined DWT-DCT-SVD watermarked bank cheque image

Above Fig.8 shows the combined DWT-DCT-SVD watermarked bank cheque image using gain factor β=0.5.Fig.9 is advanced encrypted digital watermarked bank cheque image. This encryption process takes place with the help of 256 bit key AES technique. It takes 14 rounds for complete encryption process of combined DWT-DCT-SVD watermarked cheque image.

Page 9: A Secure Digital Watermarking Technique Using Multiple ... · Sudhanshu S.Gonge1, Ashok A.Ghatol2, Vilas M.Thakare3 1Resecrch Scholar, Department of Computer Science & Engineering,

International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: [email protected]

Volume 5, Issue 9, September 2016 ISSN 2319 - 4847

Volume 5, Issue 9, September 2016 Page 61

Figure 10 Cropping attack applied on AES encrypted & combined DWT-DCT-SVD watermarked bank cheque image.

Figure 11 Decrypted combined DWT-DCT-SVD watermarked bank cheque image after applying cropping attack.

Figure 12 Extracted watermark logo image.

Above fig.10 explains the combined DWT-DCT-SVD watermarked & AES encrypted bank cheque image on which cropping attack is applied. Fig.11 explains the decrypted combined DWT-DCT-SVD watermarked bank cheque image using 256 bit key AES decryption process.Fig.12 explains the extracted watermark logo image obtained from decrypted combined DWT-DCT-SVD watermarked bank cheque image.

Page 10: A Secure Digital Watermarking Technique Using Multiple ... · Sudhanshu S.Gonge1, Ashok A.Ghatol2, Vilas M.Thakare3 1Resecrch Scholar, Department of Computer Science & Engineering,

International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: [email protected]

Volume 5, Issue 9, September 2016 ISSN 2319 - 4847

Volume 5, Issue 9, September 2016 Page 62

Figure 13 Gaussian attack applied on AES encrypted & combined DWT-DCT-SVD watermarked bank cheque image.

Figure 14 Decrypted combined DWT-DCT-SVD watermarked bank cheque image after applying Gaussian attack.

Figure 15 Extracted watermark logo image.

Above Fig.13 explains Gaussian attack applied on combined DWT-DCT-SVD watermarked and AES encrypted cheque image.Fig.14 shows the decrypted combined DWT-DCT-SVD watermarked bank cheque image obtained using 256 bit key AES decryption process from Gaussian attack AES encrypted image.Fig.15 shows the extracted watermark logo image from decrypted combined DWT-DCT-SVD watermarked bank cheque image using gain factor β =0.5.

Page 11: A Secure Digital Watermarking Technique Using Multiple ... · Sudhanshu S.Gonge1, Ashok A.Ghatol2, Vilas M.Thakare3 1Resecrch Scholar, Department of Computer Science & Engineering,

International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: [email protected]

Volume 5, Issue 9, September 2016 ISSN 2319 - 4847

Volume 5, Issue 9, September 2016 Page 63

Figure 16 JPEG compression attack applied on AES encrypted & combined DWT-DCT-SVD watermarked bank

cheque image.

Figure 17 Decrypted combined DWT-DCT-SVD watermarked bank cheque image after applying JPEG compression

attack.

Figure 18 Extracted watermark logo image.

Above Fig.16 shows combined AES encrypted and DWT-DCT-SVD watermarked bank cheque image on which compression attack is applied up to 50%.After successful decryption of watermarked cheque image, the quality of cheque image in terms of resolution and dimension remains same as that of covered cheque image shown in Fig.17. Extracted watermark logo image obtained from decrypted watermarked cheque image is maintained up to 99.7% shown in Fig.18.

Page 12: A Secure Digital Watermarking Technique Using Multiple ... · Sudhanshu S.Gonge1, Ashok A.Ghatol2, Vilas M.Thakare3 1Resecrch Scholar, Department of Computer Science & Engineering,

International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: [email protected]

Volume 5, Issue 9, September 2016 ISSN 2319 - 4847

Volume 5, Issue 9, September 2016 Page 64

Figure 19 Median filtering attack applied on AES encrypted & combined DWT-DCT-SVD watermarked bank cheque

image.

Figure 20 Decrypted combined DWT-DCT-SVD watermarked bank cheque image after applying median filtering

attack.

Figure 21 Extracted watermark logo image.

Above Fig. 19 shows the median filter attack applied on combined encrypted and watermarked bank cheque image.Fig.20 shows the decrypted watermarked cheque image obtained after successful AES decryption process using 256 bit key. Fig.21 shows the extracted watermark logo image obtained from decrypted combined DWT-DCT-SVD watermarked cheque image whose robustness is maintained up to 99.4%.

Page 13: A Secure Digital Watermarking Technique Using Multiple ... · Sudhanshu S.Gonge1, Ashok A.Ghatol2, Vilas M.Thakare3 1Resecrch Scholar, Department of Computer Science & Engineering,

International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: [email protected]

Volume 5, Issue 9, September 2016 ISSN 2319 - 4847

Volume 5, Issue 9, September 2016 Page 65

Figure 22 Rotation attack applied on AES encrypted & combined DWT-DCT-SVD watermarked bank cheque image.

Figure 23 Decrypted combined DWT-DCT-SVD watermarked bank cheque image after applying rotation attack.

Figure 24 Extracted watermark logo image.

Above Fig.22 shows rotational attack applied on combined AES encrypted and combined DWT-DCT-SVD watermarked bank cheque image with 45o .However, Fig.23 shows the decrypted watermarked bank cheque image but imperceptibility of watermarked bank cheque image is not maintained. But on other side, Fig.24 shows extracted watermark logo image obtained from decrypted watermarked bank cheque image on which rotational attack was being applied with 45o.It is able to extract watermark logo bits and it robustness is maintained up to 86.5% after reconstruction of extracted watermark.

Page 14: A Secure Digital Watermarking Technique Using Multiple ... · Sudhanshu S.Gonge1, Ashok A.Ghatol2, Vilas M.Thakare3 1Resecrch Scholar, Department of Computer Science & Engineering,

International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: [email protected]

Volume 5, Issue 9, September 2016 ISSN 2319 - 4847

Volume 5, Issue 9, September 2016 Page 66

Figure 25 Salt & Pepper noise attack applied on AES encrypted & combined DWT-DCT-SVD watermarked bank

cheque image.

Figure 26 Decrypted combined DWT-DCT-SVD watermarked bank cheque image after applying Salt & Pepper noise

attack.

Figure 27 Extracted watermark logo image.

Above Fig.25 explains the salt & pepper noise attack applied with an intensity of 0.04dB on combination of AES encrypted and DWT-DCT-SVD watermarked bank cheque image.Fig.26 shows the resultant image obtained after applying salt & pepper noise & performing AES decryption process using 256 bit key. Thus, decrypted DWT-DCT-SVD watermarked bank cheque image is obtained.Fig.27 shows the extracted watermark logo image obtained after performing watermark extraction process on Fig.26.

Page 15: A Secure Digital Watermarking Technique Using Multiple ... · Sudhanshu S.Gonge1, Ashok A.Ghatol2, Vilas M.Thakare3 1Resecrch Scholar, Department of Computer Science & Engineering,

International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: [email protected]

Volume 5, Issue 9, September 2016 ISSN 2319 - 4847

Volume 5, Issue 9, September 2016 Page 67

Figure 28 Decrypted combined DWT-DCT-SVD watermarked bank cheque image.

Figure 29 Extracted watermark logo image.

Above Fig.28 shows the AES decrypted combined DWT-DCT-SVD watermarked bank cheque image obtained on which no attack was applied .The quality of image remains same as that of original bank cheque. Similarly, it is also observed that the robustness of extracted watermark obtained from this decrypted watermarked bank cheque image is same as that of extracted watermark obtained from JPEG compression attack. Their robustness is maintained up to 99.7% which is nearly equal to ‘1’ i.e. 100% extracted & recovered watermark.

Conclusion In this research work, combinations of multiple transforms are used for digital watermarking of bank cheque image. Further, Advanced encryption standard technique is used for encryption and decryption of combined DWT-DCT-SVD watermarked bank cheque image using 256 bit key. It is also concluded that the watermark extracted from combined AES encrypted & watermarked cheque image is robust against JPEG compression attack up to 50%.The robustness of watermark is maintained above 86.5% for rotational attack whereas robustness of extracted watermark is maintained above 91.5% for remaining attack. This experiment also explains clearance of bank cheques using cheque truncation system & avoids the physical & documentation work of bank employees. It gives good example of Green Information technology by using minimum the paper work required for clearance of bank cheque. This experiment shows the compatibility of multiple transform domain techniques used for this research work.

References [1] R. C. Gonzalez, and R. E. Woods, Digital image processing, Pearson Education, india, 2010. [2] Data Communication and Networking, Fourth Edition by-Forouzan Copyright © the McGraw-Hill Companies,

Inc. [3] William Stallings, “Cryptography and Network Security Principles and Practices”, Fourth Edition.

Page 16: A Secure Digital Watermarking Technique Using Multiple ... · Sudhanshu S.Gonge1, Ashok A.Ghatol2, Vilas M.Thakare3 1Resecrch Scholar, Department of Computer Science & Engineering,

International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: [email protected]

Volume 5, Issue 9, September 2016 ISSN 2319 - 4847

Volume 5, Issue 9, September 2016 Page 68

[4] W.Stallings, Cryptography and Network Security. NJ: Prentice Hall, 2003. [5] A. V. Subramanyam, Sabu Emmanuel and Mohan S. Kankanhalli, “Robust Watermarking of Compressed and

Encrypted JPEG2000 Images”, IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 14, NO. 3, JUNE 2012,Pages 703-716.

[6] A. Nikolaidis and I. Pitas, “Asymptotically optimal detection for additive watermarking in the DCT and DWT domains,” IEEE Trans. Image Process., vol. 12, no. 5, pp. 563–571, May 2003.

[7] A. Umaamaheshvariand K. Thanuskodi, “Survey of watermarking algorithms for medical images,” International Journal of Engineering Trends and Technology, Volume3-Issue3- 2012.

[8] Navnidhi Chaturvedi, Dr S.J. Basha, “ A Novel SVD based Digital Watermarking Scheme using DWT and A comparative study with DWT-Arnold, SVD-DCT and SVD-DFT based watermarking”, International Journal of Digital Application & Contemporary research, Volume 1, Issue 4, November 2012.

[9] Hina Saxena, Praful Saxena and Shubham Rastogi, “DWT-DCT-SVD based semi-blind reference image watermarking scheme using trignometric function”, International Journal of Conceptions on Computing and Information Technology,Vol.2, Issue 2, April’ 2014; ISSN: 2345 – 9808.

AUTHOR

Sudhanshu S.Gonge has received his bachelor degree from Sipna College of Engineering & Technology .He received his masters of engineering in Information Technology from P.I.I.T, Mumbai University. He is also perusing his Ph.D. from Sant Gadge Baba Amravati University, Amravati, in the faculty of Engineering and Technology. He has 4 years of teaching and 2 years of research experience to his credit. He has published 26 research papers in various reputed international journals & conference including IEEE and Springer. He has received best paper presentation award in 1st International conference on computer science and information technology (ICCSIT-2011) organized by IRNET at Bangalore during 24th -25th July 2011.He has also chaired a various session of IEEE International Conference. He is also a life member of

ISTE, IAENG, Internet Society, and Computer society of India.

Dr. Ashok A. Ghatol has received his Ph.D. in Electrical from Indian Institute of Technology; Bombay. He is a winner of best teacher awards for the year 1999. He is involved over last 40 years in the field of Technical education as an academician, researcher, teacher, planner, and administrator. He was former Vice-chancellor of Dr.Babasaheb Ambedkar Technological University; Lonere-Raigad.He was chairman of A.I.B of vocational education, AICTE. He has served as principal at C.O.E.P & Government college of Engineering, Amravati during 1994 to 2005.He has lectured extensively in various National & International conferences. He has also received a Quality Environment Award in the year 2002. He has to his credit 22 Ph.D. students, 3 books and till today a number of research scholars are working

under him for their Ph.D. degree.

Dr. Vilas M. Thakare has received his Ph.D. degree in field of computer science from Sant Gadge Baba Amravati University, Amravati. He has received National Level Excellent Paper award at National conference Gwalior. He also received UGC fellowship (10th Plan).He was member on various expert committee like AICTE, YCMOU, and CEDIT from (1999 to 2001). He was also member of advisory committee of IICC, at Nagpur University from (2000-2002). He was member of Board of Studies (1995-2000) for 3 reputed State Government University of Maharashtra. He is recognized Supervisor in field of computer science, computer engineering & electronics engineering. He has to his credit more than 21 years of teaching experience & taught more than 45 subjects at UG & PG level in computers and related field. Currently, He is working as Professor & Head in computer science, Faculty of Engineering& Technology, Post

Graduation department of computer science at Sant Gadge Baba Amravati University, Amravati.