Skip to main content
Log in

An ASIC based invisible watermarking of grayscale images using pixel value search algorithm (PVSA)

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Digital image watermarking has become more popular due to its applications in copyright protection and secret communication. Most of the image watermarking algorithms reported till date involve modification of the host contents for embedding a secret data, leading to a reduced robustness and a limited embedding capacity. In the present work, a novel spatial domain watermarking scheme called Pixel Value Search Algorithm (PVSA) is proposed using a linear search operation to achieve high robustness and a theoretically unlimited embedding capacity. In the proposed scheme, secret data are embedded into a host image by mapping their intensity values into row and column locations. Due to this linear mapping of secret data, the host structural content is not altered. In addition, multiple watermarks can be mapped into a single host image using the PVSA technique. The proposed algorithm is verified using MATLAB® simulations and its performance characteristics are assessed using a standard benchmark tool called strimark. Experimental results illustrate the robustness of the PVSA technique against the attacks of Gaussian blurring, Gaussian noise, salt and pepper noise, Poisson noise, speckle noise, mean and median filtering, histogram equalization, image sharpening, intensity transformation, unsharp filtering, JPEG attack, etc. Subsequently an ASIC implementation of the PVSA algorithm is carried out using Verilog HDL and various modules of the Cadence® EDA tool so as to integrate the chip as a watermark co-processor. The ASIC implementation using a 0.18 μm technology at an operating frequency of 100 MHz consumes a power of 326.34 μW for the complete hardware architecture.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Anderson RJ, Petitcolas FAP (1998) On the limits of steganography. IEEE Sel Areas Commun 16(4):474–481

    Article  Google Scholar 

  2. Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized -LSB data embedding. IEEE Trans Image Process 14(2):253–266

    Article  Google Scholar 

  3. Chu WC (2003) DCT Based Image watermarking using subsampling. IEEE Trans Multimed 5(1):34–38

    Article  Google Scholar 

  4. Cox IJ, Killian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687

    Article  Google Scholar 

  5. Craver S, Memon N, Yeo BL, Yeung MM (1998) Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks and implications. IEEE Sel Areas Commun 16(4):573–586

    Article  Google Scholar 

  6. Das S, Maity R, Maity NP (2017) VLSI based pipeline architecture for reversible Image watermarking by difference expansion with high-level synthesis approach. Circuits Syst Signal Process. https://doi.org/10.1007/s0034-017-0609-3

  7. Eskicioglu AM, Delp EJ (2001) An overview of multimedia content protection in consumer electronic devices. Elsevier Signal Process 16(7):681–699

    Google Scholar 

  8. Fates N, Petitcolas FAP (2000) Watermarking scheme evaluation tool. Proc IEEE international symposium on multimedia software engineering. Taipei, Taiwan, 13-Dec. https://doi.org/10.1109/MMSE.2000.897231

  9. Garimella A, Sataynarayanan MVV, Murugesh PS, Niranjan UC (2003) VLSI implementation of online digital watermarking techniques with difference encoding for the 8 bit grayscale images. Proceedings of the International conference on VLSI Design 792–796. https://doi.org/10.1109/ICVD.2003.1183151

  10. Garimella A, Sataynarayanan MVV, Murugesh PS, Niranjan UC (2004) Asic for digital colour image watermarking. Proceedings of 11th IEEE Digital signal processing workshop. 292–295. https://doi.org/10.1109/DSPWS.2004.1437961

  11. Hazra S, Ghosh S, Sayandip D, Rahaman H (2017) FPGA implementation of semifragile reversible watermarking by histogram bin shifting in real time. J Real-Time Image Proc. https://doi.org/10.1007/s1154-017-0672-9

  12. Jayanthi VE (2011) High performance VLSI architecture for block based visible image watermarking. Int J Electron 99(9):1191–1206

    Article  Google Scholar 

  13. Joshi AM, Mishra V, Patrikar RM (2016) FPGA prototyping of video watermarking for ownership verification based on H.264/AVC. Multimed Tools Appl 75(6):3121–3144

    Article  Google Scholar 

  14. Karthigaikumar P, Baskaran K (2011) FPGA and ASIC implementation of robust invisible binary image watermarking algorithm using connectivity preserving criteria. Microelectron J 42(1):82–88

    Article  Google Scholar 

  15. Khodaei M, Faez K (2012) New adaptive stenographic method using least significant bit substitution and pixel-value differencing. IET Image Process 6(6):677–686

    Article  Google Scholar 

  16. Kougianos E, Mohanty SP, Mahapatra RN (2009) Hardware assisted watermarking for multimedia. Int J Comput Electr Eng 35(2):339–358

    Article  Google Scholar 

  17. Kumar C, Singh AK, Kumar P (2017) A recent survey on image watermarking techniques and its application in e-governance. Multimed Tools Appl. https://doi.org/10.1007/s11042-017-5222-8

    Article  Google Scholar 

  18. Langelar GC, Setyawan I, Lagendik RL (2000) Watermarking digital image and video data. A state - of - the- art overview. IEEE Signal Process Mag 17(5):20–46

    Article  Google Scholar 

  19. Larijani H, Rad GR (2008) A new spatial domain algorithm for gray scale images watermarking. Proceedings of the International Conference on Computer and Communication Engineering May 13–15, Kuala Lumpur, Malaysia. https://doi.org/10.1109/ICCCE.2008.4580587

  20. Lu W, Sun W, Lu H (2012) Novel robust image watermarking based on subsampling and DWT. Multimed Tools Appl 60(1):31–46

    Article  Google Scholar 

  21. Maity HK, Maity SP (2014) FPGA implementation of reversible watermarking in digital images using reversible contrast mapping. Int J Syst Softw 96(1):93–104

    Article  Google Scholar 

  22. Maity SP, Kundu M, Maity S (2009) Dual purpose FWT domain spread spectrum image watermarking in real time. Int J Comput Electr Eng 35(2):415–433

    Article  Google Scholar 

  23. Marvel LM, Boncelet CG, Retter CT (1999) Spread spectrum image steganography. IEEE Trans Image Process 8(8):1075–1083

    Article  Google Scholar 

  24. Mathai NJ, Kundur D, Sheikholeslami A (2003) Hardware implementation perspectives of digital video watermarking algorithms. IEEE Trans Signal Process 51(4):925–938

    Article  Google Scholar 

  25. Minh T, Tanaka K (2015) Comparison of watermarking schemes using linear and nonlinear feature matching. Proceedings of the Int. Conf. on knowledge and Systems Engineering Ho Chi Minh City Vietnam Oct 8–10. https://doi.org/10.1109/KSE.2015.67

  26. Miyazaki A, Sangyo K (2005) An improved correlation based watermarking method for images using a nonlinear programming algorithm. Proceedings of international conference on Non Linear Signal and Image Processing NSIP Abstracts IEEE Eurasip, Sapporo. https://doi.org/10.1109/NSIP.2005.15002212

  27. Mohanty SP (2009) A secure digital camera architecture for integrated real time digital rights management. J Syst Archit 55(10–12):468–480

    Article  Google Scholar 

  28. Mohanty SP, Ranganathan N, Namballa RK (2003) VLSI implementation of digital watermarking algorithms toward the development of a secure JPEG encoder. Proceedings of IEEE Workshop Signal Processing Systems 183–188. https://doi.org/10.1109/SIPS.2003.1235666

  29. Mohanty SP, Ranganathan N, Namballa RK (2005) A VLSI architecture for visible watermarking in a secure still digital camera (S2DC) design. IEEE Trans Very Large Scale Integr (TVLSI) Syst 13(8):1002–1012

    Article  Google Scholar 

  30. Mohanty SP, Ranganathan N, Balakrishnan K (2006) A dual voltage-frequency VLSI chip for image watermarking in DCT domain. IEEE Trans Circuits Syst II, Express Briefs 53(5):394–398

    Article  Google Scholar 

  31. Mohanty SP, Kougnios E, Ranganathan N (2007) VLSI architecture and chip for combined invisible robust and fragile watermarking. IET Comput Digit Tech 1(5):600–611

    Article  Google Scholar 

  32. Nayak MR, Joyashree B, Sarkar S, Sarkar SK (2017) Hardware implementation of a novel watermarking algorithm based on phase congruency and singular value decomposition technique. Int J Electron Commun (AEU) 71:1–8

    Article  Google Scholar 

  33. Petitcolas FAP (2000) Watermarking schemes evaluation. IEEE Signal Process Mag 17(5):58–64

    Article  Google Scholar 

  34. Petticolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding – a survey. Proc IEEE Spec Issue Prot Multimed Content 87(7):1062–1078

    Google Scholar 

  35. Roy SD, Lin X, Shoshan Y, Fish A (2013) Hardware implementation of a digital watermarking system for video authentication. IEEE Trans Circuits Syst Video Technol 23(2):289–300

    Article  Google Scholar 

  36. Sakthivel SM, Ravi Sankar A (2015) A real time watermarking of grayscale images without altering its content. Proceedings of the Int. Conf. on VLSI Systems, Architecture, Technology, and Applications, Bangalore, India, Jan. 8–10. https://doi.org/10.1109/VLSI-SATA.2015.7050469

  37. Sakthivel SM, Ravi Sankar A (2016) Real time watermarking of grayscale images using integer DWT transform. Proceedings of the Int. Conf. on VLSI Systems, Architecture, Technology, and Applications, Bangalore, India Jan. 8–10. https://doi.org/10.1109/VLSI-SATA.2016.7593056

  38. Shet KS, Aswath AR, Hanumanatharaju MC, Gao XZ (2016) Design and development of reconfigurable architectures for LSB/multi-bit image steganography system. Multimed Tools Appl 76(11):1–23

    Google Scholar 

  39. Singh AK (2017) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed Tools Appl 76(6):8881–8900

    Article  Google Scholar 

  40. Tao H, Chongmin L, Zain JM, Abdalla AN (2014) Robust image watermarking theories and techniques: a review. J Appl Res Technol 12(1):122–138

    Article  Google Scholar 

  41. Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593–1601

    Article  Google Scholar 

  42. Wong PHW, Au OC, Yeung YM (2003) A novel blind watermarking technique for images. IEEE Trans Circuits Syst Video Technol 13(8):813–830

    Article  Google Scholar 

  43. Wu M, Liu B (2003) Data hiding in image and video: part I- fundamental issues and solutions. IEEE Trans Image Process 12(6):685–695

    Article  Google Scholar 

  44. Zear A, Singh AK, Kumar P (2016) A proposed secure multiple watermarking technique based on DWT DCT and SVD for application in medicine. Multimed Tools Appl. https://doi.org/10.1007/s11042-016-03862-8

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Ravi Sankar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sakthivel, S.M., Ravi Sankar, A. An ASIC based invisible watermarking of grayscale images using pixel value search algorithm (PVSA). Multimed Tools Appl 77, 26793–26819 (2018). https://doi.org/10.1007/s11042-018-5889-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-5889-5

Keywords