SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
Computer Engineering and Intelligent Systems                                                  www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3


                             Digital Image Watermarking

                                              Karimella Vikram
                               Head of the Department of Computerscience
                           Medak College of     Engineering , Siddipet Medak(M)
                                       vikramkarimella@yahoo.com


                                              Neeraj Upadyaya
                                         Dean of Computer science
                                              Jbiet, Hyderabad
                                           drnirajup@gmail.com


Abstract

In this paper, a novel watermarking scheme to ensure the authenticity of digital images is presented. In this
watermarking scheme the characteristics of both spatial and frequency techniques are combined to achieve
robustness against image processing and geometric transformations. Among the widely used watermarking
techniques, spread spectrum modulation based method becomes appealing due to its inherent advantage of
greater robustness and is used widely for various applications. Some watermarking applications, for
example, digital television broadcasting, Internet protocol television (IP-TV), etc. essentially demand
development of low cost watermark algorithms in order to implement in real time environment. This paper
proposes a block based multiple bit spatial domain spread spectrum image watermarking cheme where a
gray scale watermark image is represented by less number of binary digits using novel channel coding and
spatial biphasic modulation principle. VLSI implementation using Field Programmable Gate array(FPGA)
has been developed for the algorithm and circuit can be integrated into the existing digital still camera
framework. The proposed image watermarking algorithm may be applied for authentication as well            as
secured communication in real time environment.

Keywords: SS watermarking, channel coding, biphase modulation, FPGA, VL SI

I. INTRODUCTION

Digital watermarking, the art of hiding information in multimedia data, can be considered as
communication scheme where an auxiliary message is embedded in digital multimedia signals and are
available wherever latter signals move. The decoded message latter on serves the purpose of copyright
protection, content authentication, broadcast monitoring, and security in communication etc. Robustness,
imperceptibility, payload, computational cost, complexity and oblivious extraction are essential criteria in
digital watermarking schemes needed for data hiding and recovery process. But all these requirements are
related in conflicting manner and the particular application based algorithm emphasizes on one or more
such requirements to a greater extent (vikram K, 2011). The SS modulation technique in digital
                                                    150
Computer Engineering and Intelligent Systems                                                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3

communication offers anti-jamming and interference rejection property. These had motivated the several
researchers for developing SS water-marking algorithms for multimedia signals either in spatial domain or
in transform domain by using Discrete Cosine Transform (DCT), Fourier-Mellin, Discrete Hilbert
Transform (DHT), and wavelet decomposition (vikram K, 2011). SS watermarking schemes, although can
be implemented in various different way, the method that uses distinct pseudo noise (PN) spreading codes
for embedding each binary digit is popular and proven to be efficient, robust and cryptographically secured.
At this point the use of various channel coding schemes and M–ary modulation techniques can be found
efficient for robustness improvement as they are widely used in digital communication for improving data
transmission reliability. Spread spectrum (SS) watermarking, although has      proven to be cryptographically
secured and robust(5,6) may also be used to design fragile and semi fragile watermarking by keeping the
chip rate smaller. The term chip rate in SS watermarking indicates the number of cover signal's sample over
which each    watermark bit is spread (7). Such image watermarking algorithms when developed in spatial
domain may provide facility of real time implementation through hardware realization. Hardware
implementation of digital watermarking offers advantages over software realization in terms of less area,
low execution time, and less power (8,9).If a chip is fitted in the digital devices, the output video or images
can be marked right at the origin although the same can be done using software after those videos or images
downloaded to the computer But in this case embedding software will take more time compared to
hardware. The example of TV Digital Image Watermarking ���
significance where digital media is to be marked in real time and hardware is the only solution. VLSI
architecture have been developed for some of the digital image and video watermarking algorithms. The
objective of this paper is to develop an image watermarking algorithm that can serve the purpose of media
authentication as well as secured communication of a image like message signal in real time environment.
This has been accomplished by exploiting the strong spatial correlation of the neighboring pixel values of
the cover image. This correlation offers relative stability of the MSB (most significant bit) planes of the
gray levels against various image processing operations and is used for watermark signal representation.
Gray scale image is used as information signal! watermark so that decoded message preserves its
recognizability when watermarked images undergo noise addition or other signal processing operations.
Robustness is further improved using channel coding scheme in the form of variable redundancy that is
incorporated among the different bit planes of the watermark based on their relative significance. Spatia
bi-phase modulation scheme reduces effective payload capacity that is increased in channel coding
scheme.VLSI design using FPGA has also been developed for both watermark embedding and decoding
process The rest of the paper is organized as follows. Section II describes the proposed watermarking
algorithm. Section III represents Scots the digital desin of proposed method respectively.

II. PROPOSED ALGORITHM

The cover image of size (Mc× Nc) is partitioned into(8 × 8) non-overlapping blocks. Each image block is
then decomposed using Fast Walsh transform [8] The size of the image block is considered (8 × 8) in order
to make the scheme compatible with JPEG compression operation. The widely used code pattern for SS
modulation technique is pseudo noise (PN) sequence and is generated using LFSR (Linear feedback shift

                                                     151
Computer Engineering and Intelligent Systems                                                      www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3

register)[9]. The size of the PN sequence is identical to the size of the Walsh coefficient matrix. Thus a set
of PN matrices denoted by (Pi) of number (Mm.Nm) are generated. It is preferable to use antipodal
signaling scheme for data embedding in order to increase robustness performance. So the data embedding
rule can be expressed as follows:

A. Message Encoding and Watermark Embedding Step 1: Ring message formation The cover image ( I ) is
divided into kl x kl non overlapping blocks where the value of kl may be 2, 4, 8, 16 etc. The MSB plane of
2-D pixel values of each block are converted to 1-D string and are concatenated to form a large string of
pixel values (string 1). Another binary string is formed using the different bit plane values of the gray-scale
watermark image. An extended binary string (string 2) is made y incorporating different degree of
redundancy repeating by suitable odd number of times) among the various bits based on their relative
significance. Strings 1 and 2 are partitioned into sub strings of equal and fixed number of symbols. If there
occurs more than 50% positional match of the symbols in the two respective sub strings of strings 1 and 2,
a bit '1' is assigned for the sub string otherwise bit '0' Bit 'I' indicates in-phase condition of two sub strings
while out of phase condition is denoted by bit '0' Assigning a binary digit corresponding to each substring
of particular number of symbols is called as bi-phase modulation technique. The newly obtained binary
string is the derived watermark to be embedded in the host signal. Step 2: Watermark embedding &
formation of watermarked image It is preferable to use antipodal signaling scheme for data embedding in
order to increase robustness performance. So the data embedding rule can be expressed as follows:

Xe =X + kP if b = 0

X - kP if b = I

Where X is the pixel value of the cover image, Xe is the pixel value of the watermarked image, k is the
modulation index, P is the PN(Pseudo noise) matrix. Watermark dehiding & message decoding The
watermark recovery process requires the sets of PN matrices (Pi) that were used for data embedding.
Different steps for watermark decoding are described as follows:

Step 1: Correlation calculation

Correlation values between the watermarked image matrix and each code pattern of the set (Pi) are
calculated. We have a total of (Mm.Nm) (equal to the number of watermark bits) correlation values (mi)
where i--I, 2,.. Mm.Nm. The decision rule for the decoded watermark bit is as follows: (i) formi > 0, the
extracted bit is 0 (ii) for mi < 0, the extracted bit is.

Step 2; Substring decoding

MSB plane of the watermarked image or its distorted version is picked up in the same way as was used for
binary message formation and partitioned into substrings of fixed and equal number of bits. Biphase
demodulation scheme is used in this stage. Based on the value of a binary digit in the decoded watermark,
the substring either remains unchanged (if detected bit is '1') or complemented (if detected bit is '0').
                                                            152
Computer Engineering and Intelligent Systems                                                    www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3

Step 3: Message decoding

Each substring obtained is then partitioned into sub substrings (smaller substrings) according to the rules
used during watermark embedding. Binary detection is        then applied for each sub substring based on the
majority decision rule i.e. if more than 50% symbols are '1' in a sub substring, decision for decoding is '1',
otherwise '0' The binary digit of all the sub substrings of a substring are then converted to the pixel and gray
scale watermark image is decoded.

III. VLSI DESIGN FOR PROPOSED METHOD

The synthesis of both the watermark embedding and decoding will be implemented on Xilinx (ISE version
12.1) based FPGA. The Virtex series of FPGA to fit the complexities of the design must be chosen. The
device to be used is xc4vlx25- 10ff676 for the implementation and the language to be used is VHDL. The
behavioral simulation should be done with Modelsim XE III 6.le to verify the functionality of the design.
Fig.1 shows the top-level RTL schematic

A. Digital Design of Watermark Embedding.

Digital Design of Watermark decoding. Digital Design of Watermark embedding The VLSI design is made
here for the cover image of size (256 x 256) with 8 bits per pixel. On the other hand, the watermark image
size taken was (64 x 64), with 4 bits per pixel. Now, the cover image is partitioned in (8 x 8) non-
overlapping blocks and watermark image in (2 x 2) non-overlapping blocks. Say the partitioned watermark
images are a, b, c, d. The partitioning of the cover and the watermark image followed by the conversion of
the integer image data to binary was done with the help of MATLAB. With the binary image data for both
the partitioned cover and the partitioned watermark image, we put them in the test bench as input cover and
input watermark image. The partitioned cover and the watermark image data in binary are padded with 0 in
the sign bit to represent the signed image data. So, 8 bit/pixel grey scale cover image is now represented by
9 bits and 4 bits/pixel grey scale watermark image is represented by 5 bits. Then normalization is done for
the pixel values of the cover image by subtracting 128 from each gray values and normalization circuit is
shown in Fig. 1. Figs. 2,3,4 represent the corresponding redundancy addition to the respective bit plane of
each pixel value for the watermark image.( Fig. 5) finally indicates how a string of 64 bits are formed for
the 4 pixel values of the watermark image. The generation of Pseudo Noise(PN) code using LFSR(Linear
eedback Shift Register) is shown in Fig.6. Fig. 7 shows the required circuit for watermark embedding.

Code Generation module: VLSI architecture of spreading code generation unit consists of the two major
sub blocks, PN1 and PN2 blocks. Each block enerates two set pseudo noise (PN) sequences of length 64
These PN sequences are added and is obtained at the output of each block. The outputs of PN1 and PN2
blocks are subtracted and the result is passed through a zero/one padding unit. The resultant PN sequence is
obtained at the output of padding    nit. Data embedding module: The output from code        generation unit is
added with the output from Walsh transform unit to obtain coefficient of the embedded data.


                                                     153
Computer Engineering and Intelligent Systems                                                    www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3

B. Digital Design of Watermark Decoding

Watermark decoding is accomplished by calculating the correlation values between the watermarked image
block and respective LFSR outpu matrices. Similarly block Embedx buffer represents elements of
embedded matrix Blocks A, B and C shown in this figure represent the hardware for necessary
multiplication and addition for correlation calculation. Block F indicates the accumulated sum for the
correlation values and its output is divided by 64 to obtain normalized correlation value. Correlation
calculation module: The code generation units PN1 and PN2 used at transmitter are also used here. Input
A[15:0] is set to zero. The Walsh coefficients are applied to the input pin (15:0)with the clock C. The PN
sequences coming from PN1 and PN2          are applied to the control input of MUXs. If the element of the
code matrix is ”1”, then it allows the value of B(15:0) to pass through MUXs. On the other hand, if the
element of the code matrix is ”0”, it allows the value of A(15:0) to pass through MUXs. The outputs of the
MUXs are fed to the one input of the adders unit. The outputs of the adders are fed to the data registers and
outputs of the data register are fed back to the other inputs of the adders. Applying proper state sequence to
C1, the correlation values Q(15:0), R(15:0), S(15:0),T(15:0) are calculated. The required components of
this unit are four MUXs (16 bit)- 2:1, 4- adders (16 bit), 4 data registers (16bit), PN1 and PN2 units.




                                Fig. 1: Normalization Circuit




         Fig. 2: Encoding of MSB of Watermark PixelAdding Redundancy 9 Times)


                                                     154
Computer Engineering and Intelligent Systems                     www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3




        Fig. 3: Encoding of 2nd bit of Watermark Pixel




        Fig. 4: Encoding of 3rd and 4th bit of Watermark Pixel

        (without Adding Redundancy)




Fig. 5: Encoding of 4 bits Watermark Image into 64 bits




                                                   155
Computer Engineering and Intelligent Systems           www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3




        Fig. 6: PN Code Generator using LFSR




        Fig. 7: Circuit of Watermark Embedding Block




IV. RESULTS

A. Performance Evaluation

                                                156
Computer Engineering and Intelligent Systems                                                 www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3

The proposed watermarking methodology is based on the combination of channel coding and spread
spectrum technique. We consider a 4 bits/pixel of size (64 x 64) and 8 bits/pixel of size 256 x 256)
grayscale images as watermark and the cover image respectively for experiment purpose. The binary
watermark image of size (32x 32) is obtained using spatial bi-phase modulation by assigning a binary digit
for a substring consisting of 64 bit symbols. The proposed SS watermarking method has been tested against
mean, median filtering, noise addition, image sharpening and lossy compression operations and the
experiment results show that the proposed method is robust against such signal processing operations. .




B. Results of Hardware Implementation




Fig. 8: Behavioral Simulation Output Shown in Modelsim XE 6.3e




TABLE 1: SYNTHESIS RESULTS FROM XILINX ISE 12.1




                                                   157
Computer Engineering and Intelligent Systems                                              www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3




The behavioral simulation is done in Modelsim SE 6.3f. The synthesis result is shown in table 1. The
minimum clock period is 4.6ns (Maximum frequency: 220 MHz). Maximum output required time after
clock is 102.5ns. Maximum combinational path delay: 104ns.

V. CONCLUSION

The paper proposes a semi fragile spatial image watermarking scheme by combined use of channel coding
and spread spectrum modulation. The algorithm is simple with low computation cost and can be easily
implemented in hardware. Digital design of the proposed algorithm using FPGA will be developed and thus
makes it suitable for real time authentication as well as secured communication.

References
Wu M. and Liu B, (1999), Multimedia Data Hiding, New York : pringer-Verlag, 2002 Smith, Joe, ,
One of Volvo's core values. (Online) Available: http://www.volvo.com/environment/index.htm (July 7,
1999)

Special issue on copyright and privacy protection, IEEE Journal on Selected Areas in Communication
(JSCA), 16(4), May 1998.

Special issue on enabling security technologies for digital right management, Proceedings of IEEE, 92(6),
June 2004

Paquet. A.H, Ward.R.K, and     Pitas. I, Wavelet packet-based digital watermarking for image verification
and authentication, Signal processing, 83, pp. 2117-2132, 2003.

Cox .I.J,    Kilian .J,    Leighton.T, and    Shamoon .T, Secure spread spectrum watermarking for
multimedia, IEEE Transaction on Image Processing, 6 (12), pp. 1673-1687, 1997.
                                                    158
Computer Engineering and Intelligent Systems                                                www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3

Maity. S.P,     Kundu. M.K. and      Das T.S., "Robust SS watermarking with improved capacity", Pattern
     Recognition Letters "Advances in Visual Information Processing", Elsevier,28, pp. 350-357, 2007.

Maity. S,P,       Banerjee.A, A. and . Kundu M. K, VLSI design of               Spread Specturum Image
watermarking-113th National conference on communications (NCC-2007), Indian Institute of
Technology

Techn N.      Mathai, J,   Kundur D. and Sheikholeslami A, Hardware implementation perspectives of digital
video watermarking algorithms, IEEE Transaction on Signal Processing, vol. 51, pp. 925- 938, April 2003




                                                     159

Weitere ähnliche Inhalte

Was ist angesagt?

A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET Journal
 
Self Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOMSelf Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOMIDES Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit GoelMohit Goel
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
 
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...CSCJournals
 
International Journal for Research in Applied Science & Engineering
International Journal for Research in Applied Science & EngineeringInternational Journal for Research in Applied Science & Engineering
International Journal for Research in Applied Science & Engineeringpriyanka singh
 

Was ist angesagt? (17)

A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
 
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
Ja2415771582
Ja2415771582Ja2415771582
Ja2415771582
 
Steganography
Steganography Steganography
Steganography
 
Self Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOMSelf Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOM
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit Goel
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
20120140505013
2012014050501320120140505013
20120140505013
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
 
International Journal for Research in Applied Science & Engineering
International Journal for Research in Applied Science & EngineeringInternational Journal for Research in Applied Science & Engineering
International Journal for Research in Applied Science & Engineering
 
92 97
92 9792 97
92 97
 

Ähnlich wie 14 vikram kumar_150-159

Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
 
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...ijiert bestjournal
 
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic AlgorithmImage Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithmijsrd.com
 
Hybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaHybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaIAEME Publication
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithmeSAT Journals
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithmeSAT Publishing House
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...prjpublications
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
 
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color ImagesRobust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color ImagesCSCJournals
 
Protection of Multispectral Images using Watermarking and Encryption
Protection of Multispectral Images using Watermarking and EncryptionProtection of Multispectral Images using Watermarking and Encryption
Protection of Multispectral Images using Watermarking and EncryptionIRJET Journal
 
Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...IJECEIAES
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
 

Ähnlich wie 14 vikram kumar_150-159 (20)

50120140506015
5012014050601550120140506015
50120140506015
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
 
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic AlgorithmImage Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
 
Hybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaHybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pca
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithm
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithm
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
 
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
 
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color ImagesRobust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
 
T4408103107
T4408103107T4408103107
T4408103107
 
1820 1824
1820 18241820 1824
1820 1824
 
1820 1824
1820 18241820 1824
1820 1824
 
Protection of Multispectral Images using Watermarking and Encryption
Protection of Multispectral Images using Watermarking and EncryptionProtection of Multispectral Images using Watermarking and Encryption
Protection of Multispectral Images using Watermarking and Encryption
 
Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
 

Mehr von Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Mehr von Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Kürzlich hochgeladen

PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServiceRenan Moreira de Oliveira
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfAnna Loughnan Colquhoun
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdfJamie (Taka) Wang
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 

Kürzlich hochgeladen (20)

PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdf
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 

14 vikram kumar_150-159

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Digital Image Watermarking Karimella Vikram Head of the Department of Computerscience Medak College of Engineering , Siddipet Medak(M) vikramkarimella@yahoo.com Neeraj Upadyaya Dean of Computer science Jbiet, Hyderabad drnirajup@gmail.com Abstract In this paper, a novel watermarking scheme to ensure the authenticity of digital images is presented. In this watermarking scheme the characteristics of both spatial and frequency techniques are combined to achieve robustness against image processing and geometric transformations. Among the widely used watermarking techniques, spread spectrum modulation based method becomes appealing due to its inherent advantage of greater robustness and is used widely for various applications. Some watermarking applications, for example, digital television broadcasting, Internet protocol television (IP-TV), etc. essentially demand development of low cost watermark algorithms in order to implement in real time environment. This paper proposes a block based multiple bit spatial domain spread spectrum image watermarking cheme where a gray scale watermark image is represented by less number of binary digits using novel channel coding and spatial biphasic modulation principle. VLSI implementation using Field Programmable Gate array(FPGA) has been developed for the algorithm and circuit can be integrated into the existing digital still camera framework. The proposed image watermarking algorithm may be applied for authentication as well as secured communication in real time environment. Keywords: SS watermarking, channel coding, biphase modulation, FPGA, VL SI I. INTRODUCTION Digital watermarking, the art of hiding information in multimedia data, can be considered as communication scheme where an auxiliary message is embedded in digital multimedia signals and are available wherever latter signals move. The decoded message latter on serves the purpose of copyright protection, content authentication, broadcast monitoring, and security in communication etc. Robustness, imperceptibility, payload, computational cost, complexity and oblivious extraction are essential criteria in digital watermarking schemes needed for data hiding and recovery process. But all these requirements are related in conflicting manner and the particular application based algorithm emphasizes on one or more such requirements to a greater extent (vikram K, 2011). The SS modulation technique in digital 150
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 communication offers anti-jamming and interference rejection property. These had motivated the several researchers for developing SS water-marking algorithms for multimedia signals either in spatial domain or in transform domain by using Discrete Cosine Transform (DCT), Fourier-Mellin, Discrete Hilbert Transform (DHT), and wavelet decomposition (vikram K, 2011). SS watermarking schemes, although can be implemented in various different way, the method that uses distinct pseudo noise (PN) spreading codes for embedding each binary digit is popular and proven to be efficient, robust and cryptographically secured. At this point the use of various channel coding schemes and M–ary modulation techniques can be found efficient for robustness improvement as they are widely used in digital communication for improving data transmission reliability. Spread spectrum (SS) watermarking, although has proven to be cryptographically secured and robust(5,6) may also be used to design fragile and semi fragile watermarking by keeping the chip rate smaller. The term chip rate in SS watermarking indicates the number of cover signal's sample over which each watermark bit is spread (7). Such image watermarking algorithms when developed in spatial domain may provide facility of real time implementation through hardware realization. Hardware implementation of digital watermarking offers advantages over software realization in terms of less area, low execution time, and less power (8,9).If a chip is fitted in the digital devices, the output video or images can be marked right at the origin although the same can be done using software after those videos or images downloaded to the computer But in this case embedding software will take more time compared to hardware. The example of TV Digital Image Watermarking ��� significance where digital media is to be marked in real time and hardware is the only solution. VLSI architecture have been developed for some of the digital image and video watermarking algorithms. The objective of this paper is to develop an image watermarking algorithm that can serve the purpose of media authentication as well as secured communication of a image like message signal in real time environment. This has been accomplished by exploiting the strong spatial correlation of the neighboring pixel values of the cover image. This correlation offers relative stability of the MSB (most significant bit) planes of the gray levels against various image processing operations and is used for watermark signal representation. Gray scale image is used as information signal! watermark so that decoded message preserves its recognizability when watermarked images undergo noise addition or other signal processing operations. Robustness is further improved using channel coding scheme in the form of variable redundancy that is incorporated among the different bit planes of the watermark based on their relative significance. Spatia bi-phase modulation scheme reduces effective payload capacity that is increased in channel coding scheme.VLSI design using FPGA has also been developed for both watermark embedding and decoding process The rest of the paper is organized as follows. Section II describes the proposed watermarking algorithm. Section III represents Scots the digital desin of proposed method respectively. II. PROPOSED ALGORITHM The cover image of size (Mc× Nc) is partitioned into(8 × 8) non-overlapping blocks. Each image block is then decomposed using Fast Walsh transform [8] The size of the image block is considered (8 × 8) in order to make the scheme compatible with JPEG compression operation. The widely used code pattern for SS modulation technique is pseudo noise (PN) sequence and is generated using LFSR (Linear feedback shift 151
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 register)[9]. The size of the PN sequence is identical to the size of the Walsh coefficient matrix. Thus a set of PN matrices denoted by (Pi) of number (Mm.Nm) are generated. It is preferable to use antipodal signaling scheme for data embedding in order to increase robustness performance. So the data embedding rule can be expressed as follows: A. Message Encoding and Watermark Embedding Step 1: Ring message formation The cover image ( I ) is divided into kl x kl non overlapping blocks where the value of kl may be 2, 4, 8, 16 etc. The MSB plane of 2-D pixel values of each block are converted to 1-D string and are concatenated to form a large string of pixel values (string 1). Another binary string is formed using the different bit plane values of the gray-scale watermark image. An extended binary string (string 2) is made y incorporating different degree of redundancy repeating by suitable odd number of times) among the various bits based on their relative significance. Strings 1 and 2 are partitioned into sub strings of equal and fixed number of symbols. If there occurs more than 50% positional match of the symbols in the two respective sub strings of strings 1 and 2, a bit '1' is assigned for the sub string otherwise bit '0' Bit 'I' indicates in-phase condition of two sub strings while out of phase condition is denoted by bit '0' Assigning a binary digit corresponding to each substring of particular number of symbols is called as bi-phase modulation technique. The newly obtained binary string is the derived watermark to be embedded in the host signal. Step 2: Watermark embedding & formation of watermarked image It is preferable to use antipodal signaling scheme for data embedding in order to increase robustness performance. So the data embedding rule can be expressed as follows: Xe =X + kP if b = 0 X - kP if b = I Where X is the pixel value of the cover image, Xe is the pixel value of the watermarked image, k is the modulation index, P is the PN(Pseudo noise) matrix. Watermark dehiding & message decoding The watermark recovery process requires the sets of PN matrices (Pi) that were used for data embedding. Different steps for watermark decoding are described as follows: Step 1: Correlation calculation Correlation values between the watermarked image matrix and each code pattern of the set (Pi) are calculated. We have a total of (Mm.Nm) (equal to the number of watermark bits) correlation values (mi) where i--I, 2,.. Mm.Nm. The decision rule for the decoded watermark bit is as follows: (i) formi > 0, the extracted bit is 0 (ii) for mi < 0, the extracted bit is. Step 2; Substring decoding MSB plane of the watermarked image or its distorted version is picked up in the same way as was used for binary message formation and partitioned into substrings of fixed and equal number of bits. Biphase demodulation scheme is used in this stage. Based on the value of a binary digit in the decoded watermark, the substring either remains unchanged (if detected bit is '1') or complemented (if detected bit is '0'). 152
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Step 3: Message decoding Each substring obtained is then partitioned into sub substrings (smaller substrings) according to the rules used during watermark embedding. Binary detection is then applied for each sub substring based on the majority decision rule i.e. if more than 50% symbols are '1' in a sub substring, decision for decoding is '1', otherwise '0' The binary digit of all the sub substrings of a substring are then converted to the pixel and gray scale watermark image is decoded. III. VLSI DESIGN FOR PROPOSED METHOD The synthesis of both the watermark embedding and decoding will be implemented on Xilinx (ISE version 12.1) based FPGA. The Virtex series of FPGA to fit the complexities of the design must be chosen. The device to be used is xc4vlx25- 10ff676 for the implementation and the language to be used is VHDL. The behavioral simulation should be done with Modelsim XE III 6.le to verify the functionality of the design. Fig.1 shows the top-level RTL schematic A. Digital Design of Watermark Embedding. Digital Design of Watermark decoding. Digital Design of Watermark embedding The VLSI design is made here for the cover image of size (256 x 256) with 8 bits per pixel. On the other hand, the watermark image size taken was (64 x 64), with 4 bits per pixel. Now, the cover image is partitioned in (8 x 8) non- overlapping blocks and watermark image in (2 x 2) non-overlapping blocks. Say the partitioned watermark images are a, b, c, d. The partitioning of the cover and the watermark image followed by the conversion of the integer image data to binary was done with the help of MATLAB. With the binary image data for both the partitioned cover and the partitioned watermark image, we put them in the test bench as input cover and input watermark image. The partitioned cover and the watermark image data in binary are padded with 0 in the sign bit to represent the signed image data. So, 8 bit/pixel grey scale cover image is now represented by 9 bits and 4 bits/pixel grey scale watermark image is represented by 5 bits. Then normalization is done for the pixel values of the cover image by subtracting 128 from each gray values and normalization circuit is shown in Fig. 1. Figs. 2,3,4 represent the corresponding redundancy addition to the respective bit plane of each pixel value for the watermark image.( Fig. 5) finally indicates how a string of 64 bits are formed for the 4 pixel values of the watermark image. The generation of Pseudo Noise(PN) code using LFSR(Linear eedback Shift Register) is shown in Fig.6. Fig. 7 shows the required circuit for watermark embedding. Code Generation module: VLSI architecture of spreading code generation unit consists of the two major sub blocks, PN1 and PN2 blocks. Each block enerates two set pseudo noise (PN) sequences of length 64 These PN sequences are added and is obtained at the output of each block. The outputs of PN1 and PN2 blocks are subtracted and the result is passed through a zero/one padding unit. The resultant PN sequence is obtained at the output of padding nit. Data embedding module: The output from code generation unit is added with the output from Walsh transform unit to obtain coefficient of the embedded data. 153
  • 5. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 B. Digital Design of Watermark Decoding Watermark decoding is accomplished by calculating the correlation values between the watermarked image block and respective LFSR outpu matrices. Similarly block Embedx buffer represents elements of embedded matrix Blocks A, B and C shown in this figure represent the hardware for necessary multiplication and addition for correlation calculation. Block F indicates the accumulated sum for the correlation values and its output is divided by 64 to obtain normalized correlation value. Correlation calculation module: The code generation units PN1 and PN2 used at transmitter are also used here. Input A[15:0] is set to zero. The Walsh coefficients are applied to the input pin (15:0)with the clock C. The PN sequences coming from PN1 and PN2 are applied to the control input of MUXs. If the element of the code matrix is ”1”, then it allows the value of B(15:0) to pass through MUXs. On the other hand, if the element of the code matrix is ”0”, it allows the value of A(15:0) to pass through MUXs. The outputs of the MUXs are fed to the one input of the adders unit. The outputs of the adders are fed to the data registers and outputs of the data register are fed back to the other inputs of the adders. Applying proper state sequence to C1, the correlation values Q(15:0), R(15:0), S(15:0),T(15:0) are calculated. The required components of this unit are four MUXs (16 bit)- 2:1, 4- adders (16 bit), 4 data registers (16bit), PN1 and PN2 units. Fig. 1: Normalization Circuit Fig. 2: Encoding of MSB of Watermark PixelAdding Redundancy 9 Times) 154
  • 6. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Fig. 3: Encoding of 2nd bit of Watermark Pixel Fig. 4: Encoding of 3rd and 4th bit of Watermark Pixel (without Adding Redundancy) Fig. 5: Encoding of 4 bits Watermark Image into 64 bits 155
  • 7. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Fig. 6: PN Code Generator using LFSR Fig. 7: Circuit of Watermark Embedding Block IV. RESULTS A. Performance Evaluation 156
  • 8. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 The proposed watermarking methodology is based on the combination of channel coding and spread spectrum technique. We consider a 4 bits/pixel of size (64 x 64) and 8 bits/pixel of size 256 x 256) grayscale images as watermark and the cover image respectively for experiment purpose. The binary watermark image of size (32x 32) is obtained using spatial bi-phase modulation by assigning a binary digit for a substring consisting of 64 bit symbols. The proposed SS watermarking method has been tested against mean, median filtering, noise addition, image sharpening and lossy compression operations and the experiment results show that the proposed method is robust against such signal processing operations. . B. Results of Hardware Implementation Fig. 8: Behavioral Simulation Output Shown in Modelsim XE 6.3e TABLE 1: SYNTHESIS RESULTS FROM XILINX ISE 12.1 157
  • 9. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 The behavioral simulation is done in Modelsim SE 6.3f. The synthesis result is shown in table 1. The minimum clock period is 4.6ns (Maximum frequency: 220 MHz). Maximum output required time after clock is 102.5ns. Maximum combinational path delay: 104ns. V. CONCLUSION The paper proposes a semi fragile spatial image watermarking scheme by combined use of channel coding and spread spectrum modulation. The algorithm is simple with low computation cost and can be easily implemented in hardware. Digital design of the proposed algorithm using FPGA will be developed and thus makes it suitable for real time authentication as well as secured communication. References Wu M. and Liu B, (1999), Multimedia Data Hiding, New York : pringer-Verlag, 2002 Smith, Joe, , One of Volvo's core values. (Online) Available: http://www.volvo.com/environment/index.htm (July 7, 1999) Special issue on copyright and privacy protection, IEEE Journal on Selected Areas in Communication (JSCA), 16(4), May 1998. Special issue on enabling security technologies for digital right management, Proceedings of IEEE, 92(6), June 2004 Paquet. A.H, Ward.R.K, and Pitas. I, Wavelet packet-based digital watermarking for image verification and authentication, Signal processing, 83, pp. 2117-2132, 2003. Cox .I.J, Kilian .J, Leighton.T, and Shamoon .T, Secure spread spectrum watermarking for multimedia, IEEE Transaction on Image Processing, 6 (12), pp. 1673-1687, 1997. 158
  • 10. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Maity. S.P, Kundu. M.K. and Das T.S., "Robust SS watermarking with improved capacity", Pattern Recognition Letters "Advances in Visual Information Processing", Elsevier,28, pp. 350-357, 2007. Maity. S,P, Banerjee.A, A. and . Kundu M. K, VLSI design of Spread Specturum Image watermarking-113th National conference on communications (NCC-2007), Indian Institute of Technology Techn N. Mathai, J, Kundur D. and Sheikholeslami A, Hardware implementation perspectives of digital video watermarking algorithms, IEEE Transaction on Signal Processing, vol. 51, pp. 925- 938, April 2003 159