SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Electronics and Communication Engineering & Technology (IJECET),
INTERNATIONAL JOURNAL OF ELECTRONICS AND
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME

COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

ISSN 0976 – 6464(Print)
ISSN 0976 – 6472(Online)
Special Issue (November, 2013), pp. 190-195
© IAEME: www.iaeme.com/ijecet.asp
Journal Impact Factor (2013): 5.8896 (Calculated by GISI)
www.jifactor.com

IJECET
©IAEME

ROBUST INVISIBLE QR CODE IMAGE WATERMARKING IN DWT
DOMAIN
V M Jithin1, K K Gupta2
EEE, BITS, Pilani, India
1h2012046@pilani.bits-pilani.ac.in, 2kgupta@pilani.bits-pilani.ac.in

ABSTRACT: Quick Response (QR) code is 2d code and widely used in magazine advertisement,
product packet, museum, and tour tickets. It has high data capacity compare to 1d code. The
invisible QR code is watermarked via popular wavelet transform algorithm in images. The
results show that the proposed method is robust and tested against attacks.

KEYWORDS: QR code, watermarking, Wavelets.
I.

INTRODUCTION

In this modern era mobile and wireless technology is taking over all fields of life. They are
more than a communication device; they act as your PC, music player, your bank, your
shopping area and more [1]. In near future the smart glasses like google glass are going to
replace the current hand held devices which make to overlay the physical world with a digital
layer of tags, ads, maps etc [2].
In current smart phone scenario, one of the important technology used to connect the physical
world to internet or digital world using smart phone, is QR codes. They are used mainly for
marketing and commerce but their applications are numerous including virtual marketing,
virtual maps, QRpedia etc. We are making the QR code as invisible watermark in image using
digital watermarking technology. Other alternatives proposed were marking QR code in
invisible ink which is only visible with Ultraviolet [3], QR transparent stickers etc.
The main challenge in making invisible QR code is the detector part. Since the detection is
expected to be done in smart phone which has slower processors, the detection must be very
simple with very little processing required before passing information to QR reader. Here we
implement and simulate the QR encoder and decoder in MATLAB to study the effectiveness of
algorithm. This paper uses watermarking scheme in wavelet domain where multiple copies of
QR code is inserted into low frequency components of host image. Since the data requires no
secrecy compared to existing watermarking schemes, public watermarking technique is used
[4] [5] [6].
International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

October 18-20, 2013
Page 190
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME

The watermarking is intended to encode secret or copyright information into host digital data
to demonstrate and protect the ownership of products. But in this paper we use this
technology to hide QR code in the background rather than using it to protect the information.
Anyway the same methodologies used in this paper can be used for copyright protection
process. In this paper invisible watermarking of QR code is done in wavelet domain.
The main advantages of invisible QR Code are 1. As opposed to adding yet another element to
the marketing piece or direct mailer, marketers can use existing images within the material to
use as a code; 2. It won’t waste advertisement area with QR.
This paper is organized as follows: QR code is explained in section 2. The implementation is
explained in section 3. The simulation and result are analyzed in section 4 and it followed by
conclusion.

II.

QR CODE

QR Code is the trademark for a type of matrix barcode, first designed for the automotive
industry [7]. Two-dimensional bar code technology comparing with the traditional onedimensional bar code has the following advantages: 1. higher information density; 2. it can
express Chinese characters, images and even sound; 3.with error correction function. More
recently, the system has become popular outside the industry due to its fast readability and
large storage capacity compared to standard UPC barcodes. The code consists of black modules
(square dots) arranged in a square pattern on a white background. QR Code is capable of
handling all types of data, such as numeric and alphabetic characters, Kanji, Kana, Hiragana,
symbols, binary, and control codes. Up to 7,089 characters can be encoded in one symbol [6].
Data can be restored even if the symbol is partially dirty or damaged. A maximum 30% of
codewords can be restored. Fig. 1 shows the QR code structure.

Fig. 1: QR code structure

III.

IMPLEMENTATION

The invisible watermarking of QR code is done in wavelet domain as shown in Fig. 2. Discrete
wavelet transform (DWT) is used due to its spatial resolution: it captures both frequency and
location information (spatial information). The multilevel DWT decomposition is used (4 level
Daubechies-4 wavelet transform). The block diagram of watermarking is shown in Fig. 2.
International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

October 18-20, 2013
Page 191
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME

The watermark is embedded into host image in 4th level of wavelet decomposition. As we go
deeper with decomposing low frequency sub image (approximate component) the data will get
more concentrate on approximate component in next levels. That is information in high
frequency components (horizontal, vertical and diagonal) will be very less compared to low
frequency component. So inserting can be done on high frequency component since it won’t
destroy high amount of information. Usually these components will be black with small amount
of white patches which corresponds to high frequency portion (sudden variation in brightness)
of host image. So the location of insertion of watermark should be suitably selected so that it
won’t include sudden variations. In this paper we use multiple watermarking techniques
where three copies of QR code is inserted in all three high frequency sub images after multiple
levels of wavelet decomposition. The location of insertion is made same for all the three
subimages since at time of reception it would be easier in slower processors to recover QR
code easily by simple pixel manipulations like addition or correlation. The location is found
using approximate subimage such that in particular block selected for insertion is the one with
minimum variation in pixel values.

Fig. 2: watermarking procedure
Another important thing to be noted while insertion is the peak level of pixel value of QR code.
Our empirical studies showed that the insertion with pixel value greater than one by fifteenth
of mean value of approximate subimage give better results while if value exceeds one by
hundredth of maximum pixel value of approximate image make the QR visible after
reconstruction. So trade off done between these values to set the maximum pixel value of
inserted watermark.

Fig. 3: recovery of watermark

International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

October 18-20, 2013
Page 192
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME

At decomposition phase most simple algorithm is used to decrease computational complexity.
We use blind recovery technique which does not require the original image for recovery. We
use QR decoder developed by Z Xing (Zebra barcode decoder an open-source, multi-format
1D/2D barcode image processing library implemented in Java, with ports to other languages
powered by google code project). First we take multilevel DWT and give each high frequency
subimage directly to QR decoder. In the absence of any noise it gives direct output. If QR
decoder fails to decode it directly use group of subimages and use majority check to remove
pixel errors and again give it to QR decoder. Still the QR coder fails which happens in presence
of high noise we use threshold techniques to get a binary image with minimum bit errors
compared with original QR. Our studies show that thresholding at levels between 0.3 and 0.4
gives better results. Those data are provided in simulation and analysis section. The block
diagram for recovery algorithm is shown in Fig. 3.

IV.

SIMULATION AND ANALYSIS

The entire simulation is done using Matlab. The algorithm is tried for more than twenty five
images and the study mainly concentrated on 4 test images – Lena, Baboon, Air Plane and
House Boat. The first three are 512x512 image while last one is 960x536 pixels. QR code for
testing is generated using QR code generator by Z. Xing project. While the maily used QR is
33x33 pixel QR (encoded with www.facebook.com). The Peak signal to noise ratio (PSNR) is
measured after embedding invisible QR code. The PSNR is given in Table 1. The qualitative
result is shown in Fig. 4
Test Image

Lena

Baboon

Airplane

Houseboat

Size

512x512

512x512

512x512

960x536

PSNR

72.66

73.0749

66.5892

73.1276

Table 1: Output performance is measures using peak signal to noise ratio (PSNR) calculation

Fig. 4: The qualitative results- first image without and next same image with watermark
To find out robustness of proposed watermarking techniques, the efficiency is checked with
various attacks. In our smart phone camera scenario most common attacks on images are noise
due to grain, JPEG compression, cropping or white spaces at outer parts of images and rotation.
We tried to model these attacks and found out robustness against them.

International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

October 18-20, 2013
Page 193
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME

Fig. 5: The number of detection Vs PSNR with salt and pepper noise
To analyze noise performance of decoding algorithm we used Lena test image with water mark
as base. The salt and pepper noise is added and plot between PSNR and no of detection as
shown in Fig. 5. The algorithm woks well when PSNR is greater than 28 dB.

Fig. 6: Bit error Vs threshold value
To find out thresholding level noise is fixed at a given value and no of bit errors are finding
with thresholding level between 0 and 1. The plot for bit error vs. threshold value for salt and
pepper noise at 0.05 level is shown in Fig. 6.

Fig. 7: Number of detection Vs JPEG compression
Fig. 7 shows watermarked image with varying level of JPEG compression. Since the watermark
is inserted in wavelet domain chance of distortion is more as extend of compression increases.
Simulating Lena image with various levels of JPEG compression shows that faithful detection is
not possible if compression is more than 60%. One of the highest probable chances of attack on
watermark image is cropping. The chance of small parts at outer ridge of image be cropped
while taking photo in mobile camera is more. To avoid data loss due to these type of attack a
10% margin is set where watermark is not inserted. Even though for smaller images if large
part is got cropped chance of recovery is little due to spatial properties of wavelet transform.
International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

October 18-20, 2013
Page 194
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME

V.

CONCLUSION AND FUTURE WORK

In this paper we try to model a new scheme to embed QR code in host images so as to make it
hidden from visual perception. We used multilevel wavelet transform and multiple copies
watermark is inserted for faithful and easy detection. The insertion location and value are
found using algorithm. Also we checked the robustness of technique with various attacks. The
results show that this scheme gives better result even in presence of noise (When PSNR greater
than 28dB). It can resist JPEG compression upto 60%. Data can be recovered when image is
cropped along the boundary region. However performance of this algorithm is not tested in
smartphone environment in this study. We are looking into the implementation of this
algorithm in android and iphone platforms and further modification based on performance.

REFERENCES
[1]Lee Garber, Scanning the Future with New Barcodes, IEEE Computer Magazine, 2011, 20-21.
[2]Chung-Hsin Liu Chia-Hong Chou, Two-dimensional bar code mobile commerce
Implementation and Performance Analysis, IEEE International Conference, 632-635.
[3]K. Kamijo, N. Kamijo, Zhang Gang, Invisible barcode with optimized error correction, IEEE
International Conference on Image Processing, 2008. ICIP 2008, 2036-2039.
[4]P.H.W. Wong, O.C. Au, and Y.M. Yeung, A novel blind multiple watermarking technique for
images, IEEE Trans. Circuits System Video Technology, 13(), 2003, 813-830.
[5]P. Premaratne, C.C. Ko, A novel watermark embedding and detection scheme for images in
DFT domain, Proc. 7th Int. IPA, 2, 1999, 780-783.
[6]C. T. Hsu, and J. L. Wu, Hidden digital watermarks in images, IEEE Transactions on Image
Processing, 8(), 1999, 58-68.
[7]QR code website -- http://www.qrcode.com/en/index.html
[8]C. S. Lu, and H. Y. M. Liao, Multipurpose watermarking for image authentication and
protection, IEEE Trans. Image Processing, 10(), 2001, 1579-1592.

BIOGRAPHY
Jithin V M was born in Payyanur, Kerala, India in 1989. He received the
B.Tech degree in Electronics and Communication Engineering from
Government College of Engineering Kannur (Kerala), India in 2011. He is
pursuing his M. E in Communication Engineering at BITS Pilani,Pilani
Rajasthan,India. His current research interests focus on Image Processing,
DSP and Wireless communication.
Gupta K K was born in UP, India in 1969. He received the PhD degree from
BITS, Pilani, India in 2008. His current research interests focus on Image
Processing, DSP and Instrumentation.

International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

October 18-20, 2013
Page 195

More Related Content

What's hot

A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
 
Noor’s Algorithmic Flow of Electronics and Communication Engineering
Noor’s Algorithmic Flow of Electronics and Communication EngineeringNoor’s Algorithmic Flow of Electronics and Communication Engineering
Noor’s Algorithmic Flow of Electronics and Communication EngineeringIRJET Journal
 
IRJET- Personal Assistant for Visually Impaired People in Malls
IRJET-  	  Personal Assistant for Visually Impaired People in MallsIRJET-  	  Personal Assistant for Visually Impaired People in Malls
IRJET- Personal Assistant for Visually Impaired People in MallsIRJET Journal
 
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry PiIRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry PiIRJET Journal
 
Maintain load balancing in wireless sensor networks using virtual grid based ...
Maintain load balancing in wireless sensor networks using virtual grid based ...Maintain load balancing in wireless sensor networks using virtual grid based ...
Maintain load balancing in wireless sensor networks using virtual grid based ...zaidinvisible
 
Low cost energy-efficient smart monitoring system using open-source microcont...
Low cost energy-efficient smart monitoring system using open-source microcont...Low cost energy-efficient smart monitoring system using open-source microcont...
Low cost energy-efficient smart monitoring system using open-source microcont...zaidinvisible
 
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...IDES Editor
 
IRJET - Garbage Management System for Smart City using LORA Technology
IRJET -  	  Garbage Management System for Smart City using LORA TechnologyIRJET -  	  Garbage Management System for Smart City using LORA Technology
IRJET - Garbage Management System for Smart City using LORA TechnologyIRJET Journal
 
A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...eSAT Journals
 
Hiding voice data in center density of speech spectrum for secure transmission
Hiding voice data in center density of speech spectrum for secure transmissionHiding voice data in center density of speech spectrum for secure transmission
Hiding voice data in center density of speech spectrum for secure transmissioneSAT Journals
 
Design and implementation smart home alarm system with zigbee transceiver
Design and implementation smart home alarm system with zigbee transceiverDesign and implementation smart home alarm system with zigbee transceiver
Design and implementation smart home alarm system with zigbee transceiverzaidinvisible
 
Software engineering model based smart indoor localization system using deep-...
Software engineering model based smart indoor localization system using deep-...Software engineering model based smart indoor localization system using deep-...
Software engineering model based smart indoor localization system using deep-...TELKOMNIKA JOURNAL
 
Global wireless e voting
Global wireless e votingGlobal wireless e voting
Global wireless e votingDibya Ranjan
 
Thinking differently zig bee based smart home automation
Thinking differently zig bee based smart home automationThinking differently zig bee based smart home automation
Thinking differently zig bee based smart home automationeSAT Publishing House
 
Global Wireless E-Voting Documentation
Global Wireless E-Voting DocumentationGlobal Wireless E-Voting Documentation
Global Wireless E-Voting DocumentationCharan Reddy Mutyala
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...IJTET Journal
 

What's hot (20)

A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
 
Noor’s Algorithmic Flow of Electronics and Communication Engineering
Noor’s Algorithmic Flow of Electronics and Communication EngineeringNoor’s Algorithmic Flow of Electronics and Communication Engineering
Noor’s Algorithmic Flow of Electronics and Communication Engineering
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
IRJET- Personal Assistant for Visually Impaired People in Malls
IRJET-  	  Personal Assistant for Visually Impaired People in MallsIRJET-  	  Personal Assistant for Visually Impaired People in Malls
IRJET- Personal Assistant for Visually Impaired People in Malls
 
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry PiIRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
 
Maintain load balancing in wireless sensor networks using virtual grid based ...
Maintain load balancing in wireless sensor networks using virtual grid based ...Maintain load balancing in wireless sensor networks using virtual grid based ...
Maintain load balancing in wireless sensor networks using virtual grid based ...
 
QR code optimization
QR code optimizationQR code optimization
QR code optimization
 
Low cost energy-efficient smart monitoring system using open-source microcont...
Low cost energy-efficient smart monitoring system using open-source microcont...Low cost energy-efficient smart monitoring system using open-source microcont...
Low cost energy-efficient smart monitoring system using open-source microcont...
 
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...
 
60 312-318
60 312-31860 312-318
60 312-318
 
IRJET - Garbage Management System for Smart City using LORA Technology
IRJET -  	  Garbage Management System for Smart City using LORA TechnologyIRJET -  	  Garbage Management System for Smart City using LORA Technology
IRJET - Garbage Management System for Smart City using LORA Technology
 
A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...
 
Hiding voice data in center density of speech spectrum for secure transmission
Hiding voice data in center density of speech spectrum for secure transmissionHiding voice data in center density of speech spectrum for secure transmission
Hiding voice data in center density of speech spectrum for secure transmission
 
RC4 Technique in Visual Cryptography
RC4 Technique in Visual CryptographyRC4 Technique in Visual Cryptography
RC4 Technique in Visual Cryptography
 
Design and implementation smart home alarm system with zigbee transceiver
Design and implementation smart home alarm system with zigbee transceiverDesign and implementation smart home alarm system with zigbee transceiver
Design and implementation smart home alarm system with zigbee transceiver
 
Software engineering model based smart indoor localization system using deep-...
Software engineering model based smart indoor localization system using deep-...Software engineering model based smart indoor localization system using deep-...
Software engineering model based smart indoor localization system using deep-...
 
Global wireless e voting
Global wireless e votingGlobal wireless e voting
Global wireless e voting
 
Thinking differently zig bee based smart home automation
Thinking differently zig bee based smart home automationThinking differently zig bee based smart home automation
Thinking differently zig bee based smart home automation
 
Global Wireless E-Voting Documentation
Global Wireless E-Voting DocumentationGlobal Wireless E-Voting Documentation
Global Wireless E-Voting Documentation
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
 

Similar to Robust Invisible QR Code Image Watermarking

IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr CodeIRJET Journal
 
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOTVEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOTIRJET Journal
 
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private InformationA Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private InformationIRJET Journal
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYacijjournal
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET Journal
 
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...IRJET Journal
 
IRJET- ROI based Automated Meter Reading System using Python
IRJET-  	  ROI based Automated Meter Reading System using PythonIRJET-  	  ROI based Automated Meter Reading System using Python
IRJET- ROI based Automated Meter Reading System using PythonIRJET Journal
 
IRJET- Number Plate Extraction from Vehicle Front View Image using Image ...
IRJET-  	  Number Plate Extraction from Vehicle Front View Image using Image ...IRJET-  	  Number Plate Extraction from Vehicle Front View Image using Image ...
IRJET- Number Plate Extraction from Vehicle Front View Image using Image ...IRJET Journal
 
Re-SPark: Reservation based Smart Parking system using FRDM KL-25Z
Re-SPark: Reservation based Smart Parking system using FRDM KL-25ZRe-SPark: Reservation based Smart Parking system using FRDM KL-25Z
Re-SPark: Reservation based Smart Parking system using FRDM KL-25ZIRJET Journal
 
IRJET- Review Paper on Iot Based Technology in Automobiles
IRJET-  	  Review Paper on Iot Based Technology in AutomobilesIRJET-  	  Review Paper on Iot Based Technology in Automobiles
IRJET- Review Paper on Iot Based Technology in AutomobilesIRJET Journal
 
A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...IRJET Journal
 
IRJET- Smart Trolley for Billing System
IRJET-   	  Smart Trolley for Billing SystemIRJET-   	  Smart Trolley for Billing System
IRJET- Smart Trolley for Billing SystemIRJET Journal
 
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLINGAUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLINGIRJET Journal
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET Journal
 
LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMLORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMIRJET Journal
 
Use of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in IndiaUse of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in IndiaIRJET Journal
 
Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofDigital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofIAEME Publication
 
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET Journal
 
IRJET - Efficient Approach for Number Plaque Accreditation System using W...
IRJET -  	  Efficient Approach for Number Plaque Accreditation System using W...IRJET -  	  Efficient Approach for Number Plaque Accreditation System using W...
IRJET - Efficient Approach for Number Plaque Accreditation System using W...IRJET Journal
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR CodeIRJET Journal
 

Similar to Robust Invisible QR Code Image Watermarking (20)

IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr Code
 
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOTVEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
 
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private InformationA Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private Information
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYDATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
 
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...IRJET -  	  Secure Watermarking through Optimized Embedding of Images in QR C...
IRJET - Secure Watermarking through Optimized Embedding of Images in QR C...
 
IRJET- ROI based Automated Meter Reading System using Python
IRJET-  	  ROI based Automated Meter Reading System using PythonIRJET-  	  ROI based Automated Meter Reading System using Python
IRJET- ROI based Automated Meter Reading System using Python
 
IRJET- Number Plate Extraction from Vehicle Front View Image using Image ...
IRJET-  	  Number Plate Extraction from Vehicle Front View Image using Image ...IRJET-  	  Number Plate Extraction from Vehicle Front View Image using Image ...
IRJET- Number Plate Extraction from Vehicle Front View Image using Image ...
 
Re-SPark: Reservation based Smart Parking system using FRDM KL-25Z
Re-SPark: Reservation based Smart Parking system using FRDM KL-25ZRe-SPark: Reservation based Smart Parking system using FRDM KL-25Z
Re-SPark: Reservation based Smart Parking system using FRDM KL-25Z
 
IRJET- Review Paper on Iot Based Technology in Automobiles
IRJET-  	  Review Paper on Iot Based Technology in AutomobilesIRJET-  	  Review Paper on Iot Based Technology in Automobiles
IRJET- Review Paper on Iot Based Technology in Automobiles
 
A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...A Survey On Secrete Communication Through QR Code Steganography For Military ...
A Survey On Secrete Communication Through QR Code Steganography For Military ...
 
IRJET- Smart Trolley for Billing System
IRJET-   	  Smart Trolley for Billing SystemIRJET-   	  Smart Trolley for Billing System
IRJET- Smart Trolley for Billing System
 
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLINGAUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMLORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEM
 
Use of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in IndiaUse of QR Code: A Step Towards Development in India
Use of QR Code: A Step Towards Development in India
 
Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofDigital image watermarking using dct with high security of
Digital image watermarking using dct with high security of
 
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
 
IRJET - Efficient Approach for Number Plaque Accreditation System using W...
IRJET -  	  Efficient Approach for Number Plaque Accreditation System using W...IRJET -  	  Efficient Approach for Number Plaque Accreditation System using W...
IRJET - Efficient Approach for Number Plaque Accreditation System using W...
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Robust Invisible QR Code Image Watermarking

  • 1. International Journal of Electronics and Communication Engineering & Technology (IJECET), INTERNATIONAL JOURNAL OF ELECTRONICS AND ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Special Issue (November, 2013), pp. 190-195 © IAEME: www.iaeme.com/ijecet.asp Journal Impact Factor (2013): 5.8896 (Calculated by GISI) www.jifactor.com IJECET ©IAEME ROBUST INVISIBLE QR CODE IMAGE WATERMARKING IN DWT DOMAIN V M Jithin1, K K Gupta2 EEE, BITS, Pilani, India 1h2012046@pilani.bits-pilani.ac.in, 2kgupta@pilani.bits-pilani.ac.in ABSTRACT: Quick Response (QR) code is 2d code and widely used in magazine advertisement, product packet, museum, and tour tickets. It has high data capacity compare to 1d code. The invisible QR code is watermarked via popular wavelet transform algorithm in images. The results show that the proposed method is robust and tested against attacks. KEYWORDS: QR code, watermarking, Wavelets. I. INTRODUCTION In this modern era mobile and wireless technology is taking over all fields of life. They are more than a communication device; they act as your PC, music player, your bank, your shopping area and more [1]. In near future the smart glasses like google glass are going to replace the current hand held devices which make to overlay the physical world with a digital layer of tags, ads, maps etc [2]. In current smart phone scenario, one of the important technology used to connect the physical world to internet or digital world using smart phone, is QR codes. They are used mainly for marketing and commerce but their applications are numerous including virtual marketing, virtual maps, QRpedia etc. We are making the QR code as invisible watermark in image using digital watermarking technology. Other alternatives proposed were marking QR code in invisible ink which is only visible with Ultraviolet [3], QR transparent stickers etc. The main challenge in making invisible QR code is the detector part. Since the detection is expected to be done in smart phone which has slower processors, the detection must be very simple with very little processing required before passing information to QR reader. Here we implement and simulate the QR encoder and decoder in MATLAB to study the effectiveness of algorithm. This paper uses watermarking scheme in wavelet domain where multiple copies of QR code is inserted into low frequency components of host image. Since the data requires no secrecy compared to existing watermarking schemes, public watermarking technique is used [4] [5] [6]. International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India October 18-20, 2013 Page 190
  • 2. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME The watermarking is intended to encode secret or copyright information into host digital data to demonstrate and protect the ownership of products. But in this paper we use this technology to hide QR code in the background rather than using it to protect the information. Anyway the same methodologies used in this paper can be used for copyright protection process. In this paper invisible watermarking of QR code is done in wavelet domain. The main advantages of invisible QR Code are 1. As opposed to adding yet another element to the marketing piece or direct mailer, marketers can use existing images within the material to use as a code; 2. It won’t waste advertisement area with QR. This paper is organized as follows: QR code is explained in section 2. The implementation is explained in section 3. The simulation and result are analyzed in section 4 and it followed by conclusion. II. QR CODE QR Code is the trademark for a type of matrix barcode, first designed for the automotive industry [7]. Two-dimensional bar code technology comparing with the traditional onedimensional bar code has the following advantages: 1. higher information density; 2. it can express Chinese characters, images and even sound; 3.with error correction function. More recently, the system has become popular outside the industry due to its fast readability and large storage capacity compared to standard UPC barcodes. The code consists of black modules (square dots) arranged in a square pattern on a white background. QR Code is capable of handling all types of data, such as numeric and alphabetic characters, Kanji, Kana, Hiragana, symbols, binary, and control codes. Up to 7,089 characters can be encoded in one symbol [6]. Data can be restored even if the symbol is partially dirty or damaged. A maximum 30% of codewords can be restored. Fig. 1 shows the QR code structure. Fig. 1: QR code structure III. IMPLEMENTATION The invisible watermarking of QR code is done in wavelet domain as shown in Fig. 2. Discrete wavelet transform (DWT) is used due to its spatial resolution: it captures both frequency and location information (spatial information). The multilevel DWT decomposition is used (4 level Daubechies-4 wavelet transform). The block diagram of watermarking is shown in Fig. 2. International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India October 18-20, 2013 Page 191
  • 3. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME The watermark is embedded into host image in 4th level of wavelet decomposition. As we go deeper with decomposing low frequency sub image (approximate component) the data will get more concentrate on approximate component in next levels. That is information in high frequency components (horizontal, vertical and diagonal) will be very less compared to low frequency component. So inserting can be done on high frequency component since it won’t destroy high amount of information. Usually these components will be black with small amount of white patches which corresponds to high frequency portion (sudden variation in brightness) of host image. So the location of insertion of watermark should be suitably selected so that it won’t include sudden variations. In this paper we use multiple watermarking techniques where three copies of QR code is inserted in all three high frequency sub images after multiple levels of wavelet decomposition. The location of insertion is made same for all the three subimages since at time of reception it would be easier in slower processors to recover QR code easily by simple pixel manipulations like addition or correlation. The location is found using approximate subimage such that in particular block selected for insertion is the one with minimum variation in pixel values. Fig. 2: watermarking procedure Another important thing to be noted while insertion is the peak level of pixel value of QR code. Our empirical studies showed that the insertion with pixel value greater than one by fifteenth of mean value of approximate subimage give better results while if value exceeds one by hundredth of maximum pixel value of approximate image make the QR visible after reconstruction. So trade off done between these values to set the maximum pixel value of inserted watermark. Fig. 3: recovery of watermark International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India October 18-20, 2013 Page 192
  • 4. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME At decomposition phase most simple algorithm is used to decrease computational complexity. We use blind recovery technique which does not require the original image for recovery. We use QR decoder developed by Z Xing (Zebra barcode decoder an open-source, multi-format 1D/2D barcode image processing library implemented in Java, with ports to other languages powered by google code project). First we take multilevel DWT and give each high frequency subimage directly to QR decoder. In the absence of any noise it gives direct output. If QR decoder fails to decode it directly use group of subimages and use majority check to remove pixel errors and again give it to QR decoder. Still the QR coder fails which happens in presence of high noise we use threshold techniques to get a binary image with minimum bit errors compared with original QR. Our studies show that thresholding at levels between 0.3 and 0.4 gives better results. Those data are provided in simulation and analysis section. The block diagram for recovery algorithm is shown in Fig. 3. IV. SIMULATION AND ANALYSIS The entire simulation is done using Matlab. The algorithm is tried for more than twenty five images and the study mainly concentrated on 4 test images – Lena, Baboon, Air Plane and House Boat. The first three are 512x512 image while last one is 960x536 pixels. QR code for testing is generated using QR code generator by Z. Xing project. While the maily used QR is 33x33 pixel QR (encoded with www.facebook.com). The Peak signal to noise ratio (PSNR) is measured after embedding invisible QR code. The PSNR is given in Table 1. The qualitative result is shown in Fig. 4 Test Image Lena Baboon Airplane Houseboat Size 512x512 512x512 512x512 960x536 PSNR 72.66 73.0749 66.5892 73.1276 Table 1: Output performance is measures using peak signal to noise ratio (PSNR) calculation Fig. 4: The qualitative results- first image without and next same image with watermark To find out robustness of proposed watermarking techniques, the efficiency is checked with various attacks. In our smart phone camera scenario most common attacks on images are noise due to grain, JPEG compression, cropping or white spaces at outer parts of images and rotation. We tried to model these attacks and found out robustness against them. International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India October 18-20, 2013 Page 193
  • 5. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME Fig. 5: The number of detection Vs PSNR with salt and pepper noise To analyze noise performance of decoding algorithm we used Lena test image with water mark as base. The salt and pepper noise is added and plot between PSNR and no of detection as shown in Fig. 5. The algorithm woks well when PSNR is greater than 28 dB. Fig. 6: Bit error Vs threshold value To find out thresholding level noise is fixed at a given value and no of bit errors are finding with thresholding level between 0 and 1. The plot for bit error vs. threshold value for salt and pepper noise at 0.05 level is shown in Fig. 6. Fig. 7: Number of detection Vs JPEG compression Fig. 7 shows watermarked image with varying level of JPEG compression. Since the watermark is inserted in wavelet domain chance of distortion is more as extend of compression increases. Simulating Lena image with various levels of JPEG compression shows that faithful detection is not possible if compression is more than 60%. One of the highest probable chances of attack on watermark image is cropping. The chance of small parts at outer ridge of image be cropped while taking photo in mobile camera is more. To avoid data loss due to these type of attack a 10% margin is set where watermark is not inserted. Even though for smaller images if large part is got cropped chance of recovery is little due to spatial properties of wavelet transform. International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India October 18-20, 2013 Page 194
  • 6. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME V. CONCLUSION AND FUTURE WORK In this paper we try to model a new scheme to embed QR code in host images so as to make it hidden from visual perception. We used multilevel wavelet transform and multiple copies watermark is inserted for faithful and easy detection. The insertion location and value are found using algorithm. Also we checked the robustness of technique with various attacks. The results show that this scheme gives better result even in presence of noise (When PSNR greater than 28dB). It can resist JPEG compression upto 60%. Data can be recovered when image is cropped along the boundary region. However performance of this algorithm is not tested in smartphone environment in this study. We are looking into the implementation of this algorithm in android and iphone platforms and further modification based on performance. REFERENCES [1]Lee Garber, Scanning the Future with New Barcodes, IEEE Computer Magazine, 2011, 20-21. [2]Chung-Hsin Liu Chia-Hong Chou, Two-dimensional bar code mobile commerce Implementation and Performance Analysis, IEEE International Conference, 632-635. [3]K. Kamijo, N. Kamijo, Zhang Gang, Invisible barcode with optimized error correction, IEEE International Conference on Image Processing, 2008. ICIP 2008, 2036-2039. [4]P.H.W. Wong, O.C. Au, and Y.M. Yeung, A novel blind multiple watermarking technique for images, IEEE Trans. Circuits System Video Technology, 13(), 2003, 813-830. [5]P. Premaratne, C.C. Ko, A novel watermark embedding and detection scheme for images in DFT domain, Proc. 7th Int. IPA, 2, 1999, 780-783. [6]C. T. Hsu, and J. L. Wu, Hidden digital watermarks in images, IEEE Transactions on Image Processing, 8(), 1999, 58-68. [7]QR code website -- http://www.qrcode.com/en/index.html [8]C. S. Lu, and H. Y. M. Liao, Multipurpose watermarking for image authentication and protection, IEEE Trans. Image Processing, 10(), 2001, 1579-1592. BIOGRAPHY Jithin V M was born in Payyanur, Kerala, India in 1989. He received the B.Tech degree in Electronics and Communication Engineering from Government College of Engineering Kannur (Kerala), India in 2011. He is pursuing his M. E in Communication Engineering at BITS Pilani,Pilani Rajasthan,India. His current research interests focus on Image Processing, DSP and Wireless communication. Gupta K K was born in UP, India in 1969. He received the PhD degree from BITS, Pilani, India in 2008. His current research interests focus on Image Processing, DSP and Instrumentation. International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India October 18-20, 2013 Page 195