SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Computer Engineering COMPUTER ENGINEERING & –
     INTERNATIONAL JOURNAL OF and Technology (IJCET), ISSN 0976
                               TECHNOLOGY (IJCET)
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 3, Issue 3, October - December (2012), pp. 01-08
                                                                                  IJCET
© IAEME: www.iaeme.com/ijcet.html                                             ©IAEME
Journal Impact Factor (2012): 3.9580 (Calculated by GISI)
www.jifactor.com



     INVISIBLE WATER MARKING WITHIN MEDIA FILES USING
               STATE-OF-THE-ART TECHNOLOGY

                                   1.       Karimella Vikram
                                    Head of the Dept. of CSE
                           Medak College of Engineering & Technology
                              Siddipet, Kondapaka, Meddak, (RR)
                             Email Id: vikramkarimella@yahoo,com

                                     2. Dr. V. Murali Krishna
                                          Prof.& Principal
                             Murthy Institute of Technology & Science
                              AnkiReddy pally, Kesara, Hyderabad
                                Email: Vmkrishna99@yahoo.com

                                          3.Dr. Shaik Abdul Muzeer
                               Professor & Director of PG studies
                         Siddhartha Institute of Engineering & Technology
                                     Ibrahimpatnam, R.R.. Dist.
                                e-mail: bdl_muzeer @ yahoo.co.in

                                       4.Mr.K. Narasimha
                                Assoc.Professor & HOD of E.C.E.
                                 Murthy Institute of technology
                               AnkiReddy pally, Kesara, Hyderabad
                                 Email : nrsimha_9@yahoo.com
ABSTRACT

This paper facilitates the techniques to be used with the images that cannot be misused by
unauthorized users. This method is to provide the security for images by using key concepts. The
Invisible Watermarking concept is used for secret message and images to send one node to another
node with a private key. A package is developed to attain the above said technology. This package is
mainly applicable for a software company which focuses on how to secure the data from the hackers
while transferring the information. It gives controlled redundancy, data independence, more accuracy
and integrity, privacy and security and also a good performance.

Keywords- Invisible Watermarking, Stegnography, Encryption

1. INTRODUCTION
DIGITAL watermarking is a process of embedding marks which are typically invisible and that can
be extracted only by owner’s authentication. This technology is to be used with the image that cannot


                                                 1
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME
be misused by the unauthorized users. This allows one to do without any distortion and keeping much
better stegno-image quality, also in a reliable and secured manner guaranteeing efficient retrievals of
secret file. Digital watermarking finds wide application in security, authentication, copyright
protection and all walks of internet applications. There has been effective growth in developing
techniques to discourage the unauthorized duplication of data and applications. The watermarking
technique is one, which is feasible to design to protect the data and also applications related The term’
cover’ is used to describe the original message in which it will hide our secret message, data file or
image file. Invisible watermarking and visible watermarking are the two important types of the above
said technology. The main objective of this package is to reduce the unauthorized duplication of data
and application, provide security, authentication, and copyright protections to all walks of internet
applications. During the implementation stage, the system is physically created, necessary programs
are coded, debugged and documented and operating procedures are developed. The test plan is also
established. Based on the specification above, the necessary code is developed in “.NET” and tested
successfully with the test data. Software is tested with real data and the report generated are accurate
and error free. The system is portable and flexible for further development. It gives user friendly
screens to enter data and enquire database. It is also tested on various browsers in order to check the
consistency and reliability. This application has a great impact on the people who want to gather latest
information and very useful as well as user friendly.

2. PROBLEM IDENTIFICATION

Here the problem is to transfer a message in a safe and secure way. Previously we had used the
method of cryptography to transfer a message in a safe way with the help of encryptions and
decryptions algorithm. Growth of internet transferring a message or file using this concept made a
problem since the hackers easily hack the data. To overcome this problem a new technique called
watermarking is used. In this technique the information is using with a media file (image, audio, and
video).Visible Watermarking means information hidden with image but that has visible on the image.
It also made problem to transfer data. So the invisible watermarking scheme is selected for
transferring the information. In this method, the information is hidden with media file, while
transferring data it fully converted as media file. When the receiver wants to retrieve it, he will open
with the help of the private key of receiver. As we are transferring message embedded with image,
audio, video file, while transferring data from sender to receiver it is necessary to encrypt it by private
key. After decryption, the information fully converted as the media file. The receiver decrypts the
message whenever he wants to access by the same key. Likewise, we are transferring the message
with media file.

3. PROPOSED SYSTEM

The most widely used existing method is encryption, which takes data and mixes it up with an
algorithm and a key to output unreadable data. The receiver then must also have a key to decrypt the
data in order to read it. Another form of data hiding is encryptions using steganography.
Steganography is the act of hiding data inside other data. For example, hiding the words into an
image. But we can conceal limited words into image here. The digital images can be protected from
illegal copying and manipulation through the digital watermarking technique. Commonly,
watermarking is built to endure un-malicious or malicious attacks like scaling, cropping, compression
and so forth. It is chiefly intended towards copyright Protection. The proposed watermarking scheme
is blind, since it doesn’t require the original image or any of its characteristics for the extraction of
watermark. This scheme makes use of a binary image as watermark data for protecting the copyrights
of images. The term cover is used to describe the original message in which it will hide our secret
message, data file and image. Once it embeds our secret file into the cover, the new image is known
as the stegno image.
3.1 Software Requirement Specification
The software requirements specification (SRS) is produced at the culmination of analysis task
establishing a complete functional descriptor. Design constraints and the other data pertinent to


                                                    2
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME
requirements and refines the function and performance allocated to software as part of the system
engineering. This is the base of all software engineering activities that flow.

3.2 Formal Description
This technology mainly contains four modules, namely authentication, embedding, retrieval module
and data transmission. In that embedding technique covers message embedding, word document
embedding and image embedding. Retrieval module consists of message retrieval, word document
retrieval and also image retrieval. Application architecture is as shown in fig. 2. The main objectives
concentrated in data design are, controlled redundancy, data independence, accuracy and integrity,
privacy and security also performance.

4. FUNCTIONAL DESIGN
Functional design is otherwise known as hierarchy (or) structural chart. It is a graphical tool for
representing hierarchy. The following principles are used for architectural design.

4.1 Modularity and Partitioning

Each system should consist of a hierarchy of modules. Lower level modules are generally small in
scope and size compared to higher level modules and serve to partition processes into separate
functions.

4.2 Coupling
Modules should have little dependence on other modules in a system. Coupling between the modules
is the strength of interconnection between modules (or) a measure of interdependence among
modules. There are two types of coupling. First one is highly coupled (modules are joined by strong
inter connections), and the second one is loosely coupled (modules have weak inter connections).

4.3 Interface Design

The user interface design activity focuses on supporting the interaction between the user and the
developed site. User Interface design is frequently a prototyping process where the working models or
prototypes of user interface methods are design and modified several times with the feedback from the
customer. Data design activity focus on the design of the structure of the database and files to be used
by the proposed websites. In this paper the data design of the website have a detailed description of
data flow.

5. PROCESS DESIGN

This activity focuses on the design of the user interaction forms i.e. the program and procedures
needed to develop the forms. (See fig. 1 , 2)

5.1 System Specification
It formalizes the design of the applications user interface methods, Database structures and
processing, and controlled procedures. Therefore system designers will frequently develop hardware,
software, data and personal specifications for proposed system.
5.2. Low Level Design

The procedural design or component level design is also treated as low level design which will deal
with the lowest level of the functional details such as implementation details etc., Addition and
modification of user information procedure is given below.

5.3 Adding User information
Function Name : Adding User information
Input : Reading User details


                                                   3
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME
Output : Store User details to the database
Process : Display the User details
D. Modify User information
Function Name : Modify User information
Input : Reading User details
Output : Store User details to the database
Process : Display the User details




                                         Fig-1: Process Flow




                                    Fig(2) Application architecture



                                                  4
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME
6. IMPLEMENTATION

Operating procedures must be developed. The test plan must be established. The implementation stage
normally ends Execution is the stage of the system when the theoretical design is turned into a
working system. During the implementation stage, the system is physically created, necessary
programs are coded, debugged and documented and with formal system test involving all components
and procedures if the implementation stage is not carefully planned and controlled. It can cause chaos.
Thus it can be considered to be the most crucial stage in achieving a new successful system. Based on
the specification above, the necessary code is developed in “.NET” and tested successfully with the
test data (See Fig. 3).




                                 Fig-3: Watermarking Settings Screen

7. FORSEEABLE ENHANCEMENTS

Every application has its own merits and demerits. This invisible watermarking technology has
covered almost all the requirements. Further requirements and improvements can easily be done since
the coding is mainly structured or modular in nature. Changing the existing modules or adding new
modules can append improvements. Further enhancements can be made to the application, so that the
windows functions very attractive and useful manner than the present one.
8. CONCLUSION

We hope that the developed software would be of great help in the process of transferring data in a
secured way. This is used to automate secure file management system and to overcome client
difficulties by providing all the latest information to achieve the desire goals of them. This software
includes all the facilities like navigation from one page to another page using links. Software is tested
with real data and the report generated are accurate and error free. The system is portable and flexible
for further development. It gives user friendly screens to enter data and enquire database. It is also
tested on various browsers in order to check the consistency and reliability. This application has a
great impact on the people who want to gather latest information and very useful as well as user
friendly.

                                                   5
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME
REFERENCES

1] Vashistha, A.; Nallusamy.R: Das.: Paul.S.;” Watermarking video content using visual cryptography and
scene averaged image, Multimedia and Expo (ICME)”, International Conference on IEEE, 2010, PP.: 1641 –
1646.
[2] Xiaozhong Pan: Bo Tao Yan: Ke Niu; “Multiclass detect of current steganogrphic methods for JPEG format
based re-stengoraphy,” international Conference on Advanced Computer Control (ICACC), 2010, PP.: 79- 82.
[3] Jinsuk Baek; Kim Cheonshik; Fisher, Paul S.; Hongyang Chao; (N,I) “Secret sharing approach based on
steganography with gray digital images”, IEEE International Conference on Wireless Communications,
Networking and Information Security (WCNIS) 2010,pp: 325 – 329.
[4] Ying Zhang; Jun Xiao; Ying Wang; “Side informed image watermarking algorithm with high security
Information”, IEEE Youth Conference on Computing and Telecommunication, 2009, PP: 395-398
[5] Mehboob, B. Faruqui, R.A.; “A stenography implementation” International Symposium on Biometrics and
Security Technologies ISBAST, 2008, pp. 1-5.
[6] Shu-Chien Huang: Chu-Fu-Wang; “The image Watermarking Technique Using Visual Secret Sharing
Strategy”, Eight International Conference on Intelligent Systems Design and Applications ISDA,2008 vol. :2
pp: 190 – 195.
[7] Mohanty, S.P; Sheth, R,; Pinto, A.; Chandy, M.; “Crypt Mark: A Novel Secure Invisible Watermarking
Technique for Color Images”, IEEE on Consumer Electronics, 2007,
 [8] Bartlow , N.; Kalka, N.; Cukic, B.; Ross, “Protecting Iris Image through Asymmetric Digital
Watermarking”, IEEE workshop on Automatic Identification Advanced Technologies, 2007 pp: 192-197.
[9] Moon, S.K.; Kawitkar, R.S. “Data security using data hiding”, International Conference on Conference on
Computational Intelligence and Multimedia Applications, 2007, pp: 247 – 251.
[10] Au, O.C, “ Joint visual cryptogtaphy and watermarking Ming Sun Fu”; IEEE International Conference on
Multimedia and Expo, ICME 2004, Vol.: 2 ,pp: 975–978.
[11] N. Nikolaidis and I. Pitas, “Copyright protection of images using robust digital signatures,” in Proc. IEEE
Int. Conf. Acoustics, Speech,Signal Processing (ICASSP ’96), vol. 4, Atlanta, GA, May 1996, pp2168–2171.
[12] A. Piva,M. Barni, F. Bartolini, and V. Capellini, “DCT-based watermark recovering without resorting to
the uncorrupted original image,” in ProcIEEE Int. Conf. Image Processing (ICIP’97), vol. 1, Santa Barbara,
CA,Oct. 1997, pp. 520–523.
[13] T. N. Pappas, “An adaptive clustering algorithm for image segmentation,”IEEE Trans. Signal Processing,
vol. 40, pp. 901–914, Apr. 1992.
[14] R. L. Devaney, An Introduction to Dynamical Systems. New York:Penjamine/Cummings, 1986.
[15] L. Vincent and P. Soille, “Watersheds in digital spaces: An efficient algorithm based on immersion
simulations,” IEEE Trans. Pattern Anal. Machine Intell., vol. 13, pp. 583–598, June 1991.
[16] L. Vincent, “Morphological grayscale reconstruction in image analysis: Applications and efficient
algorithms,” IEEE Trans. Image Processing, vol. 2, pp. 176–201, Feb. 1993.
[17] A. S. Wright and S. T. Acton, “Watershed pyramids for edge detection,”in Proc. IEEE ICIP ’97, Santa
Barbara, CA, Oct. 1997, pp. 578–581.
[18] D. Cortez, P. Nunes, M. M. de Sequeira, and F. Pereira, “Image segmentation toward new image
representation models,” Signal Process.:Image Commun., vol. 6, no. 6, pp. 485–498, 1995.
[19] J. Besag, “On the statistical analysis of dirty pictures,” J. R. Statist. SocB, vol. 48, no. 3, pp. 259–302,
1986.
[20] J. Luo, R. T. Gray, and H.-C. Lee, “Incorporation of derivative priors in adaptive Bayesian color image
segmentation,” in Proc. ICIP ’98, vol. 3,Chicago, IL, Oct. 1998, pp. 780–784.
21.Zhu98a] Wenwu Zhu, Zixiang Xiong, and Ya-Qin Zhang. Multiresolution watermarking for images and
video: a unified approach. In Proceedings of the IEEE International Conference on Image Processing, ICIP '98,
Chicago, IL, USA, October 1998.
22.[Xie98a] Liehua Xie and Gonzalo R. Arce. Joint wavelet compression and authentication watermarking. In
Proceedings of the IEEE International Conference on Image Processing, ICIP '98, Chicago, IL, USA, 1998
23 Adelson87a] Edward H. Adelson, Eero P. Simoncelli, and Rajesh Hingorani. Orthogonal pyramid
transforms for image coding. In Proceedings of SPIE, volume 845, October 1987.
[Algazi95a] V. R. Algazi and R. R. Estes.
24Analysis based coding of image transform and subband coefficients. In Applications of Digital Image
Processing XVII, Proceedings of the SPIE,, volume 2564, pages 11 - 21, 1995.
25.[Benham97a] Dave Benham, Nasir Memon, Boon-Lock Yeo, and Minerva M. Yeung. Fast atermarking of
DCT-based compressed images. In Hamid R. Arabnia, editor, Proceedings of the International Conference on
Image Science, Systems, and Technology, CISST '97, Las Vegas, USA, 1997.



                                                       6
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME
27 [Bottou98a] Leon Bottou, Patrick Haffner, Paul G. Howard, Patrice Simard, Yoshua Bengio, and Yann
LeCun. High quality document image compression with djvu. Journal of Electronic Imaging, July 1998.
28. [Bruyndonckx95a] O. Bruyndonckx, Jean-Jacques Quisquater, and Benoit M. Macq. Spatial method for
copyright labeling of digital images. In IEEE Workshop on Nonlinear Signal and Image Processing '95,
Thessaloniki, Greece, pages 456 - 459, 1995.
29 [Buccigrossi97a] Robert W. Buccigrossi and Eero P. Simoncelli. Progressive wavelet image coding based
on a conditional probability model. In Proceedings of the IEEE International Conference on Acoustics, Speech
and Signal Processing, ICASSP '97, Munich, Germany, April 1997.
30. [Corvi97a] Marco Corvi and Gianluca Nicchiotti. Wavelet-based image watermarking for copyright
protection. In Scandinavian Conference on Image Analysis SCIA '97, Lappeenranta, Finland, June 1997.
31.[Cox97b] Ingemar J. Cox, Joe Kilian, Tom Leighton, and Talal G. Shamoon. Secure spread spectrum
watermarking for multimedia. In Proceedings of the IEEE International Conference on Image Processing, ICIP
'97, volume 6, pages 1673 - 1687, Santa Barbara, California, USA, 1997.
32. [Davis97a] Geoffrey M. Davis and Sumit Chawla. Image coding using optimized significance tree
quantization. In Proceedings of Data Compression Conference, pages 387 - 396, 1997.
33. [Dugad98a] Rakesh Dugad, Krishna Ratakonda, and Narendra Ahuja. A new wavelet-based scheme for
watermarking images. In Proceedings of the IEEE International Conference on Image Processing, ICIP '98,
Chicago, IL, USA, October 1998.
34.[Fridrich97a] Jiri Fridrich. Methods for data hiding. Technical report, Center for Intelligent Systems, SUNY
Binghamton, USA, 1997.
35.[Fridrich98c] Jiri Fridrich. Combining low-frequency and spread spectrum watermarking. In Proceedings of
the SPIE Symposium on Optical Science, Engineering and Instrumentation, San Diego, USA, July 1998.
36.[Inoue98a] Hisashi Inoue, Akio Miyazaki, Akihiro Yamamoto, and Takashi Katsura. A digital watermark
based on the wavelet transform and its robustness on image compression. In Proceedings of the IEEE
International Conference on Image Processing, ICIP '98, Chicago, IL, USA, 1998.
37.[Kim99c] Jong Ryul Kim and Young Shik Moon. A robust wavelet-based digital watermark using level-
adaptive thresholding. In Proceedings of the 6th IEEE International Conference on Image Processing ICIP '99,
page 202, Kobe, Japan, October 1999.
38.[Koch95a] Eckhard Koch and Jian Zhao. Towards robust and hidden image copyright labeling. In
Proceedings of the IEEE International Workshop on Nonlinear Signal and Image Processing, pages 452 - 455,
Halkidiki, Marmaras, Greece, June 1995.
39.[Kundur98a] Deepa Kundur and Dimitrios Hatzinakos. Digital watermarking using multiresolution wavelet
decomposition. In Proceedings of IEEE ICASSP '98, volume 5, pages 2969 - 2972, Seattle, WA, USA, May
1998.
40.[Kutter97a] Martin Kutter, Frédéric Jordan, and Frank Bossen. Digital signature of color images using
amplitude modulation. In Ishwar K. Sethi, editor, Proceedings of the SPIE Conference on Storage and Retrieval
for Image and Video Databases, volume 2952, pages 518 - 526, San Jose, USA, 1997.
41.[Langelaar97a] Gerrit C. Langelaar, Reginald L. Lagendijk, and Jan Biemond. Robust labeling methods for
copy protection of images. In Ishwar K. Sethi, editor, Proceedings of the SPIE Conference on Storage and
Retrieval for Image and Video Databases, volume 3022, San Jose, USA, 1997.
42.[Pennebaker93a] W. B. Pennebaker and J. L. Mitchell. JPEG Still Image Compression Standard. Van
Nostrand Reinhold, New York, 1993.
43.[Petitcolas99c] Fabien A. P. Petitcolas and Ross J. Anderson. Evaluation of copyright marking systems. In
Proceedings of IEEE Multimedia Systems '99, volume 1, pages 574 - 579, Florence, Italy, June 1999.
44.[Said96a] Amir Said and William A. Pearlman. A new, fast, and efficient image codec based on set
partitioing in hierarchical trees. In IEEE Transactions on Circuits and Systems for Video Technology, volume 6,
pages 243 - 250, June 1996.
45.[Shapiro93a] Jerome M. Shapiro. Embedded image coding using zerotrees of wavelet coefficients. In IEEE
Transactions on Signal Processing, volume 41, pages 3445 - 3462, December 1993.
46.[Voyatzis98a] George Voyatzis and Ioannis Pitas. Digital image watermarking using mixing systems.
Computer & Graphics, 22 pp. 405 - 416, August 1998.
47.[Wang98b] Houng-Jyh Wang, Po-Chyi Su, and C.-C. Jay Kuo. Wavelet-based digital image watermarking.
Optics Express, 3 pp. 497, December 1998.
48.[Xia98a] Xiang-Gen Xia, Charles G. Boncelet, and Gonzalo R. Arce. Wavelet transform based watermark
for digital images. Optics Express, 3 pp. 497, December 1998.
49.[Xie98a] Liehua Xie and Gonzalo R. Arce. Joint wavelet compression and authentication watermarking. In
Proceedings of the IEEE International Conference on Image Processing, ICIP '98, Chicago, IL, USA, 1998.
50. [Zhu98a] Wenwu Zhu, Zixiang Xiong, and Ya-Qin Zhang. Multiresolution watermarking for images and
video: a unified approach. In Proceedings of the IEEE International Conference on Image Processing, ICIP '98,
Chicago, IL, USA, October 1998.


                                                      7
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME
AUTHORS

               K.Vikram is working as a Vice-Principal at Medak College of Engineering and
               Technology (MCET), Hyderabad, India. He has received MCA and ME.(Computer
               Science and Engineering) from Anna University. Presently, he is a Research
               Scholar. He has published and presented good number of technical papers in
               National and International Conferences. His main research interests are Software
               Engineering, Data Mining, and Network Security.




               Dr. V. Murali Krishna is a Prof.& Principal of Murthy Institute of Technology and
               Science.. He received M.Tech from JNTUH and Ph.D from MGKVP University.
               He Published so many Papers in national & Inter National Journals. His research
               areas are data Mining and Image Processing, Wireless Communications. He is
               member of MISTE


                Dr.S.A.Muzeer is Graduated from Andhra University college of Engineering,
                Visakhapatnam in the year 1984 in Electronics & Communication Engineering. He
                completed his post graduation from Osmania University Engineering college with
                specialisation in Digital systems Engineering.. He obtained his Doctoral degree
                from Bundel Khand university in the year 2006. His areas of interest are DSP and
                Instrumentation.


               Mr. K. Narasimha working as Assoc. Prof. & HOD of ECE Dept. in MITS. He
               published so many papers and Journals. His interest areas are Image Processing,
               Microwave Engineering ,Data Communications, DSP and VLSI. He has received
               B.E & M.E from Osmania University.




                                              8

More Related Content

What's hot

A virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data miningA virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data miningeSAT Journals
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET Journal
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
 
A Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesA Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesEswar Publications
 
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT IAEME Publication
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for securityIJERA Editor
 
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSSPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSijwmn
 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography IRJET Journal
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Publishing House
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Journals
 
Photography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating SystemPhotography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating SystemIJRES Journal
 
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile DevicesIRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile DevicesIRJET Journal
 
IRJET- Confidential Data Access through Deep Learning Iris Biometrics
IRJET- Confidential Data Access through Deep Learning Iris BiometricsIRJET- Confidential Data Access through Deep Learning Iris Biometrics
IRJET- Confidential Data Access through Deep Learning Iris BiometricsIRJET Journal
 
A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...IJCNCJournal
 

What's hot (18)

A virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data miningA virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data mining
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
A Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesA Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research Challenges
 
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
 
P1151351311
P1151351311P1151351311
P1151351311
 
19_2
19_219_2
19_2
 
P1151345302
P1151345302P1151345302
P1151345302
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for security
 
P1151442348
P1151442348P1151442348
P1151442348
 
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSSPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Photography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating SystemPhotography Capture and Encryption on Smart Phones with Android Operating System
Photography Capture and Encryption on Smart Phones with Android Operating System
 
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile DevicesIRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
IRJET- Deep Feature Fusion for Iris Biometrics on Mobile Devices
 
IRJET- Confidential Data Access through Deep Learning Iris Biometrics
IRJET- Confidential Data Access through Deep Learning Iris BiometricsIRJET- Confidential Data Access through Deep Learning Iris Biometrics
IRJET- Confidential Data Access through Deep Learning Iris Biometrics
 
A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...
 

Viewers also liked (20)

השואה
השואההשואה
השואה
 
250 th
250 th250 th
250 th
 
Italian
ItalianItalian
Italian
 
Conflict and respect
Conflict and respectConflict and respect
Conflict and respect
 
Unit 1
Unit 1Unit 1
Unit 1
 
Inbound Marketing
Inbound MarketingInbound Marketing
Inbound Marketing
 
Notes on validation
Notes on validationNotes on validation
Notes on validation
 
Water Governance
Water GovernanceWater Governance
Water Governance
 
miywh
miywhmiywh
miywh
 
rgls present
rgls presentrgls present
rgls present
 
Schovanek
SchovanekSchovanek
Schovanek
 
Urilga
UrilgaUrilga
Urilga
 
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...
 
Presentation1
Presentation1Presentation1
Presentation1
 
Capnjackxmastreat
CapnjackxmastreatCapnjackxmastreat
Capnjackxmastreat
 
REACT Singapore: Caring For The Caretaker
REACT Singapore: Caring For The CaretakerREACT Singapore: Caring For The Caretaker
REACT Singapore: Caring For The Caretaker
 
As media studies task
As media studies taskAs media studies task
As media studies task
 
2011 12-08 tudelft goes mobile
2011 12-08 tudelft goes mobile2011 12-08 tudelft goes mobile
2011 12-08 tudelft goes mobile
 
Become an agent member
Become an agent memberBecome an agent member
Become an agent member
 
Guestbook Hotel Tirsus Aggiornato Maggio 2012
Guestbook Hotel Tirsus Aggiornato Maggio  2012Guestbook Hotel Tirsus Aggiornato Maggio  2012
Guestbook Hotel Tirsus Aggiornato Maggio 2012
 

Similar to Invisible water marking within media files using state of-the-art technology

IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...IRJET Journal
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password schemeIAEME Publication
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingIRJET Journal
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsIRJET Journal
 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...IRJET Journal
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))IAESIJEECS
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemIRJET Journal
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET Journal
 
Blockchain based security framework for sharing digital images using reversib...
Blockchain based security framework for sharing digital images using reversib...Blockchain based security framework for sharing digital images using reversib...
Blockchain based security framework for sharing digital images using reversib...Christo Ananth
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityEditor IJCATR
 
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
 
Color based android shuffling pattern lock
Color based android shuffling pattern lockColor based android shuffling pattern lock
Color based android shuffling pattern lockIRJET Journal
 

Similar to Invisible water marking within media files using state of-the-art technology (20)

IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking Applications
 
50120130406038
5012013040603850120130406038
50120130406038
 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
Revanth Vemulapalli_pdf
Revanth Vemulapalli_pdfRevanth Vemulapalli_pdf
Revanth Vemulapalli_pdf
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
Blockchain based security framework for sharing digital images using reversib...
Blockchain based security framework for sharing digital images using reversib...Blockchain based security framework for sharing digital images using reversib...
Blockchain based security framework for sharing digital images using reversib...
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
 
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...
 
Color based android shuffling pattern lock
Color based android shuffling pattern lockColor based android shuffling pattern lock
Color based android shuffling pattern lock
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Invisible water marking within media files using state of-the-art technology

  • 1. International Journal of Computer Engineering COMPUTER ENGINEERING & – INTERNATIONAL JOURNAL OF and Technology (IJCET), ISSN 0976 TECHNOLOGY (IJCET) 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 3, Issue 3, October - December (2012), pp. 01-08 IJCET © IAEME: www.iaeme.com/ijcet.html ©IAEME Journal Impact Factor (2012): 3.9580 (Calculated by GISI) www.jifactor.com INVISIBLE WATER MARKING WITHIN MEDIA FILES USING STATE-OF-THE-ART TECHNOLOGY 1. Karimella Vikram Head of the Dept. of CSE Medak College of Engineering & Technology Siddipet, Kondapaka, Meddak, (RR) Email Id: vikramkarimella@yahoo,com 2. Dr. V. Murali Krishna Prof.& Principal Murthy Institute of Technology & Science AnkiReddy pally, Kesara, Hyderabad Email: Vmkrishna99@yahoo.com 3.Dr. Shaik Abdul Muzeer Professor & Director of PG studies Siddhartha Institute of Engineering & Technology Ibrahimpatnam, R.R.. Dist. e-mail: bdl_muzeer @ yahoo.co.in 4.Mr.K. Narasimha Assoc.Professor & HOD of E.C.E. Murthy Institute of technology AnkiReddy pally, Kesara, Hyderabad Email : nrsimha_9@yahoo.com ABSTRACT This paper facilitates the techniques to be used with the images that cannot be misused by unauthorized users. This method is to provide the security for images by using key concepts. The Invisible Watermarking concept is used for secret message and images to send one node to another node with a private key. A package is developed to attain the above said technology. This package is mainly applicable for a software company which focuses on how to secure the data from the hackers while transferring the information. It gives controlled redundancy, data independence, more accuracy and integrity, privacy and security and also a good performance. Keywords- Invisible Watermarking, Stegnography, Encryption 1. INTRODUCTION DIGITAL watermarking is a process of embedding marks which are typically invisible and that can be extracted only by owner’s authentication. This technology is to be used with the image that cannot 1
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME be misused by the unauthorized users. This allows one to do without any distortion and keeping much better stegno-image quality, also in a reliable and secured manner guaranteeing efficient retrievals of secret file. Digital watermarking finds wide application in security, authentication, copyright protection and all walks of internet applications. There has been effective growth in developing techniques to discourage the unauthorized duplication of data and applications. The watermarking technique is one, which is feasible to design to protect the data and also applications related The term’ cover’ is used to describe the original message in which it will hide our secret message, data file or image file. Invisible watermarking and visible watermarking are the two important types of the above said technology. The main objective of this package is to reduce the unauthorized duplication of data and application, provide security, authentication, and copyright protections to all walks of internet applications. During the implementation stage, the system is physically created, necessary programs are coded, debugged and documented and operating procedures are developed. The test plan is also established. Based on the specification above, the necessary code is developed in “.NET” and tested successfully with the test data. Software is tested with real data and the report generated are accurate and error free. The system is portable and flexible for further development. It gives user friendly screens to enter data and enquire database. It is also tested on various browsers in order to check the consistency and reliability. This application has a great impact on the people who want to gather latest information and very useful as well as user friendly. 2. PROBLEM IDENTIFICATION Here the problem is to transfer a message in a safe and secure way. Previously we had used the method of cryptography to transfer a message in a safe way with the help of encryptions and decryptions algorithm. Growth of internet transferring a message or file using this concept made a problem since the hackers easily hack the data. To overcome this problem a new technique called watermarking is used. In this technique the information is using with a media file (image, audio, and video).Visible Watermarking means information hidden with image but that has visible on the image. It also made problem to transfer data. So the invisible watermarking scheme is selected for transferring the information. In this method, the information is hidden with media file, while transferring data it fully converted as media file. When the receiver wants to retrieve it, he will open with the help of the private key of receiver. As we are transferring message embedded with image, audio, video file, while transferring data from sender to receiver it is necessary to encrypt it by private key. After decryption, the information fully converted as the media file. The receiver decrypts the message whenever he wants to access by the same key. Likewise, we are transferring the message with media file. 3. PROPOSED SYSTEM The most widely used existing method is encryption, which takes data and mixes it up with an algorithm and a key to output unreadable data. The receiver then must also have a key to decrypt the data in order to read it. Another form of data hiding is encryptions using steganography. Steganography is the act of hiding data inside other data. For example, hiding the words into an image. But we can conceal limited words into image here. The digital images can be protected from illegal copying and manipulation through the digital watermarking technique. Commonly, watermarking is built to endure un-malicious or malicious attacks like scaling, cropping, compression and so forth. It is chiefly intended towards copyright Protection. The proposed watermarking scheme is blind, since it doesn’t require the original image or any of its characteristics for the extraction of watermark. This scheme makes use of a binary image as watermark data for protecting the copyrights of images. The term cover is used to describe the original message in which it will hide our secret message, data file and image. Once it embeds our secret file into the cover, the new image is known as the stegno image. 3.1 Software Requirement Specification The software requirements specification (SRS) is produced at the culmination of analysis task establishing a complete functional descriptor. Design constraints and the other data pertinent to 2
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME requirements and refines the function and performance allocated to software as part of the system engineering. This is the base of all software engineering activities that flow. 3.2 Formal Description This technology mainly contains four modules, namely authentication, embedding, retrieval module and data transmission. In that embedding technique covers message embedding, word document embedding and image embedding. Retrieval module consists of message retrieval, word document retrieval and also image retrieval. Application architecture is as shown in fig. 2. The main objectives concentrated in data design are, controlled redundancy, data independence, accuracy and integrity, privacy and security also performance. 4. FUNCTIONAL DESIGN Functional design is otherwise known as hierarchy (or) structural chart. It is a graphical tool for representing hierarchy. The following principles are used for architectural design. 4.1 Modularity and Partitioning Each system should consist of a hierarchy of modules. Lower level modules are generally small in scope and size compared to higher level modules and serve to partition processes into separate functions. 4.2 Coupling Modules should have little dependence on other modules in a system. Coupling between the modules is the strength of interconnection between modules (or) a measure of interdependence among modules. There are two types of coupling. First one is highly coupled (modules are joined by strong inter connections), and the second one is loosely coupled (modules have weak inter connections). 4.3 Interface Design The user interface design activity focuses on supporting the interaction between the user and the developed site. User Interface design is frequently a prototyping process where the working models or prototypes of user interface methods are design and modified several times with the feedback from the customer. Data design activity focus on the design of the structure of the database and files to be used by the proposed websites. In this paper the data design of the website have a detailed description of data flow. 5. PROCESS DESIGN This activity focuses on the design of the user interaction forms i.e. the program and procedures needed to develop the forms. (See fig. 1 , 2) 5.1 System Specification It formalizes the design of the applications user interface methods, Database structures and processing, and controlled procedures. Therefore system designers will frequently develop hardware, software, data and personal specifications for proposed system. 5.2. Low Level Design The procedural design or component level design is also treated as low level design which will deal with the lowest level of the functional details such as implementation details etc., Addition and modification of user information procedure is given below. 5.3 Adding User information Function Name : Adding User information Input : Reading User details 3
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME Output : Store User details to the database Process : Display the User details D. Modify User information Function Name : Modify User information Input : Reading User details Output : Store User details to the database Process : Display the User details Fig-1: Process Flow Fig(2) Application architecture 4
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME 6. IMPLEMENTATION Operating procedures must be developed. The test plan must be established. The implementation stage normally ends Execution is the stage of the system when the theoretical design is turned into a working system. During the implementation stage, the system is physically created, necessary programs are coded, debugged and documented and with formal system test involving all components and procedures if the implementation stage is not carefully planned and controlled. It can cause chaos. Thus it can be considered to be the most crucial stage in achieving a new successful system. Based on the specification above, the necessary code is developed in “.NET” and tested successfully with the test data (See Fig. 3). Fig-3: Watermarking Settings Screen 7. FORSEEABLE ENHANCEMENTS Every application has its own merits and demerits. This invisible watermarking technology has covered almost all the requirements. Further requirements and improvements can easily be done since the coding is mainly structured or modular in nature. Changing the existing modules or adding new modules can append improvements. Further enhancements can be made to the application, so that the windows functions very attractive and useful manner than the present one. 8. CONCLUSION We hope that the developed software would be of great help in the process of transferring data in a secured way. This is used to automate secure file management system and to overcome client difficulties by providing all the latest information to achieve the desire goals of them. This software includes all the facilities like navigation from one page to another page using links. Software is tested with real data and the report generated are accurate and error free. The system is portable and flexible for further development. It gives user friendly screens to enter data and enquire database. It is also tested on various browsers in order to check the consistency and reliability. This application has a great impact on the people who want to gather latest information and very useful as well as user friendly. 5
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME REFERENCES 1] Vashistha, A.; Nallusamy.R: Das.: Paul.S.;” Watermarking video content using visual cryptography and scene averaged image, Multimedia and Expo (ICME)”, International Conference on IEEE, 2010, PP.: 1641 – 1646. [2] Xiaozhong Pan: Bo Tao Yan: Ke Niu; “Multiclass detect of current steganogrphic methods for JPEG format based re-stengoraphy,” international Conference on Advanced Computer Control (ICACC), 2010, PP.: 79- 82. [3] Jinsuk Baek; Kim Cheonshik; Fisher, Paul S.; Hongyang Chao; (N,I) “Secret sharing approach based on steganography with gray digital images”, IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS) 2010,pp: 325 – 329. [4] Ying Zhang; Jun Xiao; Ying Wang; “Side informed image watermarking algorithm with high security Information”, IEEE Youth Conference on Computing and Telecommunication, 2009, PP: 395-398 [5] Mehboob, B. Faruqui, R.A.; “A stenography implementation” International Symposium on Biometrics and Security Technologies ISBAST, 2008, pp. 1-5. [6] Shu-Chien Huang: Chu-Fu-Wang; “The image Watermarking Technique Using Visual Secret Sharing Strategy”, Eight International Conference on Intelligent Systems Design and Applications ISDA,2008 vol. :2 pp: 190 – 195. [7] Mohanty, S.P; Sheth, R,; Pinto, A.; Chandy, M.; “Crypt Mark: A Novel Secure Invisible Watermarking Technique for Color Images”, IEEE on Consumer Electronics, 2007, [8] Bartlow , N.; Kalka, N.; Cukic, B.; Ross, “Protecting Iris Image through Asymmetric Digital Watermarking”, IEEE workshop on Automatic Identification Advanced Technologies, 2007 pp: 192-197. [9] Moon, S.K.; Kawitkar, R.S. “Data security using data hiding”, International Conference on Conference on Computational Intelligence and Multimedia Applications, 2007, pp: 247 – 251. [10] Au, O.C, “ Joint visual cryptogtaphy and watermarking Ming Sun Fu”; IEEE International Conference on Multimedia and Expo, ICME 2004, Vol.: 2 ,pp: 975–978. [11] N. Nikolaidis and I. Pitas, “Copyright protection of images using robust digital signatures,” in Proc. IEEE Int. Conf. Acoustics, Speech,Signal Processing (ICASSP ’96), vol. 4, Atlanta, GA, May 1996, pp2168–2171. [12] A. Piva,M. Barni, F. Bartolini, and V. Capellini, “DCT-based watermark recovering without resorting to the uncorrupted original image,” in ProcIEEE Int. Conf. Image Processing (ICIP’97), vol. 1, Santa Barbara, CA,Oct. 1997, pp. 520–523. [13] T. N. Pappas, “An adaptive clustering algorithm for image segmentation,”IEEE Trans. Signal Processing, vol. 40, pp. 901–914, Apr. 1992. [14] R. L. Devaney, An Introduction to Dynamical Systems. New York:Penjamine/Cummings, 1986. [15] L. Vincent and P. Soille, “Watersheds in digital spaces: An efficient algorithm based on immersion simulations,” IEEE Trans. Pattern Anal. Machine Intell., vol. 13, pp. 583–598, June 1991. [16] L. Vincent, “Morphological grayscale reconstruction in image analysis: Applications and efficient algorithms,” IEEE Trans. Image Processing, vol. 2, pp. 176–201, Feb. 1993. [17] A. S. Wright and S. T. Acton, “Watershed pyramids for edge detection,”in Proc. IEEE ICIP ’97, Santa Barbara, CA, Oct. 1997, pp. 578–581. [18] D. Cortez, P. Nunes, M. M. de Sequeira, and F. Pereira, “Image segmentation toward new image representation models,” Signal Process.:Image Commun., vol. 6, no. 6, pp. 485–498, 1995. [19] J. Besag, “On the statistical analysis of dirty pictures,” J. R. Statist. SocB, vol. 48, no. 3, pp. 259–302, 1986. [20] J. Luo, R. T. Gray, and H.-C. Lee, “Incorporation of derivative priors in adaptive Bayesian color image segmentation,” in Proc. ICIP ’98, vol. 3,Chicago, IL, Oct. 1998, pp. 780–784. 21.Zhu98a] Wenwu Zhu, Zixiang Xiong, and Ya-Qin Zhang. Multiresolution watermarking for images and video: a unified approach. In Proceedings of the IEEE International Conference on Image Processing, ICIP '98, Chicago, IL, USA, October 1998. 22.[Xie98a] Liehua Xie and Gonzalo R. Arce. Joint wavelet compression and authentication watermarking. In Proceedings of the IEEE International Conference on Image Processing, ICIP '98, Chicago, IL, USA, 1998 23 Adelson87a] Edward H. Adelson, Eero P. Simoncelli, and Rajesh Hingorani. Orthogonal pyramid transforms for image coding. In Proceedings of SPIE, volume 845, October 1987. [Algazi95a] V. R. Algazi and R. R. Estes. 24Analysis based coding of image transform and subband coefficients. In Applications of Digital Image Processing XVII, Proceedings of the SPIE,, volume 2564, pages 11 - 21, 1995. 25.[Benham97a] Dave Benham, Nasir Memon, Boon-Lock Yeo, and Minerva M. Yeung. Fast atermarking of DCT-based compressed images. In Hamid R. Arabnia, editor, Proceedings of the International Conference on Image Science, Systems, and Technology, CISST '97, Las Vegas, USA, 1997. 6
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME 27 [Bottou98a] Leon Bottou, Patrick Haffner, Paul G. Howard, Patrice Simard, Yoshua Bengio, and Yann LeCun. High quality document image compression with djvu. Journal of Electronic Imaging, July 1998. 28. [Bruyndonckx95a] O. Bruyndonckx, Jean-Jacques Quisquater, and Benoit M. Macq. Spatial method for copyright labeling of digital images. In IEEE Workshop on Nonlinear Signal and Image Processing '95, Thessaloniki, Greece, pages 456 - 459, 1995. 29 [Buccigrossi97a] Robert W. Buccigrossi and Eero P. Simoncelli. Progressive wavelet image coding based on a conditional probability model. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '97, Munich, Germany, April 1997. 30. [Corvi97a] Marco Corvi and Gianluca Nicchiotti. Wavelet-based image watermarking for copyright protection. In Scandinavian Conference on Image Analysis SCIA '97, Lappeenranta, Finland, June 1997. 31.[Cox97b] Ingemar J. Cox, Joe Kilian, Tom Leighton, and Talal G. Shamoon. Secure spread spectrum watermarking for multimedia. In Proceedings of the IEEE International Conference on Image Processing, ICIP '97, volume 6, pages 1673 - 1687, Santa Barbara, California, USA, 1997. 32. [Davis97a] Geoffrey M. Davis and Sumit Chawla. Image coding using optimized significance tree quantization. In Proceedings of Data Compression Conference, pages 387 - 396, 1997. 33. [Dugad98a] Rakesh Dugad, Krishna Ratakonda, and Narendra Ahuja. A new wavelet-based scheme for watermarking images. In Proceedings of the IEEE International Conference on Image Processing, ICIP '98, Chicago, IL, USA, October 1998. 34.[Fridrich97a] Jiri Fridrich. Methods for data hiding. Technical report, Center for Intelligent Systems, SUNY Binghamton, USA, 1997. 35.[Fridrich98c] Jiri Fridrich. Combining low-frequency and spread spectrum watermarking. In Proceedings of the SPIE Symposium on Optical Science, Engineering and Instrumentation, San Diego, USA, July 1998. 36.[Inoue98a] Hisashi Inoue, Akio Miyazaki, Akihiro Yamamoto, and Takashi Katsura. A digital watermark based on the wavelet transform and its robustness on image compression. In Proceedings of the IEEE International Conference on Image Processing, ICIP '98, Chicago, IL, USA, 1998. 37.[Kim99c] Jong Ryul Kim and Young Shik Moon. A robust wavelet-based digital watermark using level- adaptive thresholding. In Proceedings of the 6th IEEE International Conference on Image Processing ICIP '99, page 202, Kobe, Japan, October 1999. 38.[Koch95a] Eckhard Koch and Jian Zhao. Towards robust and hidden image copyright labeling. In Proceedings of the IEEE International Workshop on Nonlinear Signal and Image Processing, pages 452 - 455, Halkidiki, Marmaras, Greece, June 1995. 39.[Kundur98a] Deepa Kundur and Dimitrios Hatzinakos. Digital watermarking using multiresolution wavelet decomposition. In Proceedings of IEEE ICASSP '98, volume 5, pages 2969 - 2972, Seattle, WA, USA, May 1998. 40.[Kutter97a] Martin Kutter, Frédéric Jordan, and Frank Bossen. Digital signature of color images using amplitude modulation. In Ishwar K. Sethi, editor, Proceedings of the SPIE Conference on Storage and Retrieval for Image and Video Databases, volume 2952, pages 518 - 526, San Jose, USA, 1997. 41.[Langelaar97a] Gerrit C. Langelaar, Reginald L. Lagendijk, and Jan Biemond. Robust labeling methods for copy protection of images. In Ishwar K. Sethi, editor, Proceedings of the SPIE Conference on Storage and Retrieval for Image and Video Databases, volume 3022, San Jose, USA, 1997. 42.[Pennebaker93a] W. B. Pennebaker and J. L. Mitchell. JPEG Still Image Compression Standard. Van Nostrand Reinhold, New York, 1993. 43.[Petitcolas99c] Fabien A. P. Petitcolas and Ross J. Anderson. Evaluation of copyright marking systems. In Proceedings of IEEE Multimedia Systems '99, volume 1, pages 574 - 579, Florence, Italy, June 1999. 44.[Said96a] Amir Said and William A. Pearlman. A new, fast, and efficient image codec based on set partitioing in hierarchical trees. In IEEE Transactions on Circuits and Systems for Video Technology, volume 6, pages 243 - 250, June 1996. 45.[Shapiro93a] Jerome M. Shapiro. Embedded image coding using zerotrees of wavelet coefficients. In IEEE Transactions on Signal Processing, volume 41, pages 3445 - 3462, December 1993. 46.[Voyatzis98a] George Voyatzis and Ioannis Pitas. Digital image watermarking using mixing systems. Computer & Graphics, 22 pp. 405 - 416, August 1998. 47.[Wang98b] Houng-Jyh Wang, Po-Chyi Su, and C.-C. Jay Kuo. Wavelet-based digital image watermarking. Optics Express, 3 pp. 497, December 1998. 48.[Xia98a] Xiang-Gen Xia, Charles G. Boncelet, and Gonzalo R. Arce. Wavelet transform based watermark for digital images. Optics Express, 3 pp. 497, December 1998. 49.[Xie98a] Liehua Xie and Gonzalo R. Arce. Joint wavelet compression and authentication watermarking. In Proceedings of the IEEE International Conference on Image Processing, ICIP '98, Chicago, IL, USA, 1998. 50. [Zhu98a] Wenwu Zhu, Zixiang Xiong, and Ya-Qin Zhang. Multiresolution watermarking for images and video: a unified approach. In Proceedings of the IEEE International Conference on Image Processing, ICIP '98, Chicago, IL, USA, October 1998. 7
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME AUTHORS K.Vikram is working as a Vice-Principal at Medak College of Engineering and Technology (MCET), Hyderabad, India. He has received MCA and ME.(Computer Science and Engineering) from Anna University. Presently, he is a Research Scholar. He has published and presented good number of technical papers in National and International Conferences. His main research interests are Software Engineering, Data Mining, and Network Security. Dr. V. Murali Krishna is a Prof.& Principal of Murthy Institute of Technology and Science.. He received M.Tech from JNTUH and Ph.D from MGKVP University. He Published so many Papers in national & Inter National Journals. His research areas are data Mining and Image Processing, Wireless Communications. He is member of MISTE Dr.S.A.Muzeer is Graduated from Andhra University college of Engineering, Visakhapatnam in the year 1984 in Electronics & Communication Engineering. He completed his post graduation from Osmania University Engineering college with specialisation in Digital systems Engineering.. He obtained his Doctoral degree from Bundel Khand university in the year 2006. His areas of interest are DSP and Instrumentation. Mr. K. Narasimha working as Assoc. Prof. & HOD of ECE Dept. in MITS. He published so many papers and Journals. His interest areas are Image Processing, Microwave Engineering ,Data Communications, DSP and VLSI. He has received B.E & M.E from Osmania University. 8