SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011



         A New Watermarking Algorithm Based on Image
           Scrambling and SVD in the Wavelet Domain
                                                  U. M. Gokhale1, Y. V. Joshi2
 1
     U.M.Gokhale is working as Asst.Professor in Electronics and Telecommunication Department in G.H.Raisoni Institute of
                           Engineering and Technology for Women, Nagpur., Maharashtra, India
                                               (e-mail : umgokhale@gmail.com)
              2
                Y.V.Joshi is working as Director Walchand College Of Engineering Sangli, Maharashtra, India
                                            (e-mail:yashwant.josh@gmail.com).

Abstract- A new watermarking algorithm which is based on                 modifying the singular vectors instead of singular values. In
image scrambling and SVD in the wavelet domain is discussed              [8] Ghazy et al. Proposed a scheme in which the image is
in this paper. In the proposed algorithm, chaotic signals are            divided into blocks and then watermark is embedded in
generated using logistic mapping and are used for scrambling             singular values of each block separately. In [9] SVD is used
the original watermark. The initial values of logistic mapping
                                                                         with a human visual system (HVS) model. In [11] , however, it
are taken as private keys. The covert image is decomposed
into four bands using integer wavelet transform; we apply                is demonstrated that a counterfeit attack on SVD watermarked
SVD to each band and embed the scrambled watermark data                  image is possible and proposes a method to counterattack it.
by modifying the singular values.                                        In [12] and [13] it is pointed out that SVD watermarking suffers
                                                                         from false watermark detection. In [14] it has been shown
Index words - logistic mapping, singular value decomposition,
discrete wavelet transforms.                                             that SVD based watermarking algorithms are robust to
                                                                         distortions as long as attacks are not severe, also an attack
                                                                         method to extract a false watermark from any watermarked
                      I. INTRODUCTION
                                                                         image is proposed. Thus SVD based watermarking methods
    With the rapid growth of internet and networks techniques,           cannot be used for the ownership of an image. In our
Multimedia data transforming and sharing has become                      proposed scheme watermarking is used for image
common to many people. Multimedia data is easily copied                  authentication.
and modified, so necessity for copyright protection is
increasing. Digital watermarking has been proposed as the                         III.SINGULAR VALUE DECOMPOSITION
technique for copyright protection of multimedia data.                                   AND IMAGE ENCRYPTION
Existing watermarking schemes can be divided into two
categories spatial domain and transform domain. Spatial                  A.       Singular Value Decomposition
domain techniques embed data by directly modifying pixel                   Let A be an image matrix of size N×N. Using SVD the
values of the host image, while transform domain techniques              matrix A can be decomposed as:
embed data by modifying transform domain coefficients.
Discrete cosine transform (DCT) and discrete wavelet
transform (DWT), which are used in image compression
standards JPEG and JPEG2000 respectively , are two main
transform methods used in transform domain watermarking.
However, transform methods attempt to decompose images
in terms of a standard basis set. This is not necessarily the
optimum set. Recently Singular value decomposition (SVD)
has been used for implementation of watermarking algorithms
[1-10].

                  II. THE RELATED WORK
    In [1] Gorodetski et al. embed watermark bits by modifying
the quantized singular values of the host image. In [2],
Chandra computed SVD of both the host and watermark                      Where r is the rank of matrix A(r d” N), UA and VA are or-
images and then singular values of the watermark images are              thogonal matrices of size N×N, whose column vectors are ui
minified and added to those of the host image. In [3] Liu and            and vi. S is an N×N diagonal matrix containing the singular
Tan applied SVD to only host image and watermark bits are                values si assumed to be in decreasing order.
directly added to its singular values. In [4] Ganic et al. Propose
a two layer watermarking scheme. In [5] SVD is used with
DCT and in [6] SVD is used with DWT embedding data in all
frequencies. In [7] Agrawal et al. Propose a scheme of

                                                                     1
© 2011 ACEEE
DOI: 01.IJNS.02.03.141
ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011

In watermarking applications, SVD has following properties:           A. Watermark embedding:
1) SVD is able to efficiently represent the intrinsic algebraic           The watermark embedding algorithm is as follows:
properties of an image, where singular values correspond to           1) Using the integer wavelet transform(IWT), cover image A
the luminance of the image and singular vectors reflect               is first decomposed into four sub bands LL,HL,LH,HH as
geometry characteristics of the image.                                shown in Fig.2.
2) Singular values have good stability, which means small
perturbation added to image will not significantly change the
                                                                      2) Apply SVD to each sub band image :
corresponding singular values.
3) An image matrix has many small singular values compared
with the first value. If these values are ignored it will have        3) Obtain the scrambled or encrypted image from the original
much effect on the quality of reconstructed image.                    image by using logistic mapping as described in section 2.
B. Image Encryption
     Chaos signal are a kind of pseudorandom, irreversible            4) Apply SVD to the encrypted image.
and dynamical signals generated by deterministic non linear
equations, which possess good characteristics of
pseudorandom sequences. There are many ways to generate
chaos sequence. We apply logistic mapping chaos sequence.             5) Modify the singular values of the cover image in each sub
The equation for logistic mapping chaos is given by equation          band with singular values of the encrypted watermark;
(5).


Where 0 d” µ d” 4, is called as branch parameter, x                   6) Obtain the four sets of modified IWT coefficients.
õ(0,1).Logistic map is chaotic when 3.569945d” µ d” 4,chaotic
systems are highly sensitive to initial parameters. In order to       7) Apply the inverse IWT using the four sets of modified
get chaotic sequence, the chaotic signal x (n+1) must be              IWT coefficients to produce the watermarked cover image.
transformed into binary sequences. We use the logistic map
to generate sequence W ( i ). Then, we set a threshold T. If
element of sequence is larger than the threshold, we replace
that element by 1; otherwise, replace by 0, as described by
equation ( 6 ).



Make the xor operation between the sequence and the matrix
of the original watermark to obtain the scrambled watermark
or encrypted watermark. Fig 1 shows the original and the
encrypted watermark.


                                                                                     Figure 2 Wavelet decomposition

                                                                      B.       Watermark detection
                                                                          The watermark detection algorithm is as follows
                                                                      1)Using DWT, decompose the watermarked (and possibly
                                                                      attacked) cover image  into four sub bands LL, HL, LH, HH
                                                                      as shown in Fig 2.
                 IV. PROPOSED METHOD
    Proposed method is explained in the following section.
The scrambled watermark is obtained from the original                 2) Apply SVD to each sub band image :
watermark and is embedded into the cover image. The
watermarked image is distributed. When required the test
image is checked for the presence of the watermark by the             3) Extract the singular values from each sub band
watermark detection algorithm. As the watermark is semi fragile
it allows to alter the image by specific image processing
operations.

                                                                  2
© 2011 ACEEE
DOI: 01.IJNS.02.03.141
ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011

1) Construct four watermark images from four sub bands.


2) The original watermark can be obtained by xor operation
with the chaotic sequence W (i).



                V. EXPERIMENTAL RESULTS                                    Figure 4 Watermarked image after adding salt pepper noise

    The experimental simulation is carried out using
MATLAB. The standard test images of 512×512×8 greyscale
were used for studying the effects of perceptibility and
robustness of the watermarking algorithm on a 256 × 256
binary watermark image. In order to evaluate the difference
between cover image and watermarked image, we used Mean
square error (MSE) and Peak Signal to Noise Ratio (PSNR) to
estimate the watermark imperceptibility.
                                                                                 a) Variance =0.001             b) variance = 0.002
                                                                                                Figure 5 after adding Gaussian noise

Where, MSE is the Mean Square Error between the original
and watermarked image.




   Where x (i, j) and y (i, j) represent the pixel value of the
original and the watermarked image respectively. A higher
PSNR indicates that the quality of the watermarked image is                               a) 300                      b) 45 0
closer to the original image. Fig 2 shows the original and                       Figure 6 Wwatermarked image after Rotation
watermarked image. We estimate the similarity between the
                                                                                 TABLE II PSNR   AND   NC   FOR   G AUSSIAN NOISE ATTACK
original watermark and the extracted watermark using
normalized correlation (NC):




    The NC shows the robustness of the algorithm. Its value                   TABLE III PSNR   AND   NC   FOR   SALT   AND   PEPPER NOISE ATTACK
is 1.0000 before the watermark image is attacked. The results
for different attacks are shown in table I. In order to
investigate robustness watermarked image was attacked by
various attacks. The original image is shown in Figure 3(a),
and the watermarked image is shown in Figure 3(b). Fig 4
shows the salt and pepper noise attack. Fig 5 shows Gaussian
                                                                                   TABLE IV PSNR AND NC FOR R OTATION ATTACK
noise attack and Fig 6 show the rotation attack. Table I-IV
shows the results for the various attacks and their effects on
PSNR, NC and extracted watermark.




     Figure 3 a) Original image       b) Watermarked image
                                                                  3
© 2011 ACEEE
DOI: 01.IJNS.02.03.141
ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011

             TABLE I VARIOUS ATTACKS AND THEIR EFFECT                             VI. CONCLUSIONS
                                                            The proposed watermarking algorithm is non-blind
                                                            watermarking technique as the original image is required for
                                                            the watermark extraction. The PSNR is 52.46 before the
                                                            attacks. The value of NC is close to 1.0000 which shows the
                                                            robustness to the attack. In the existing watermarking
                                                            algorithms there is always a trade off between higher
                                                            robustness and degree of perceptibility. The proposed
                                                            algorithm achieves both high robustness and
                                                            imperceptibility. The security of the watermark is improved
                                                            by its encryption using the chaos sequence generated by
                                                            logistic mapping. Thus it can be used for image authentication.


                                                                                     REFERENCES
                                                            1. V.Gorodetski, L. Popyack, V. Samoilov and V. Skormin, “ SVD
                                                            based approach to transparent embedding data into digital images,”
                                                            in proc. International Workshop on mathematical methods, model
                                                            and architectures for computer network security (MMM-
                                                            ACNS’01), may 2001
                                                            2. Chandra D.V.S.; “Digital image watermarking using singular value
                                                            decomposition”, Circuits and Systems 2002.MWSCAS-2002, vol.3,
                                                            4-7Aug 2002, pp. 264-267.
                                                            3. R. Liu, T. Tan, “An SVD –based watermarking scheme for
                                                            protecting rightful ownership”, IEEE Transaction on Multimedia
                                                            Volume 4, issue 1, March 2002 pp121-128.
                                                            4. E.Gagnic, N. Zubair and A.M.Eskicioglu, “An optimal
                                                            Watermarking based on singular value decomposition,”in proc
                                                            IASTED international Conference on Communication , network
                                                            and Information security(CNIS’03),Dec.2003
                                                            5. A.Sverdlov, S. Dexter and A.M.Eskicioglu, “Robust DCT-SVD
                                                            domain image watermarking for copyright protection : Embedding
                                                            data in all frequencies, in proc. the 2004 Multimedia and Security
                                                            Workshop, ACM press, sep 2004,pp. 166-174.
                                                            6. E. Gagnic and A.M. Eskicioglu, “Robust embedding of visual
                                                            watermarks using discrete wavelet transform and singular value
                                                            decomposition”, Journal of Electronic Imaging vol. 14, no.4, Dec
                                                            2005.
                                                            7. R.Agrawal and M.S.Santhanam, “Digital watermarking in the
                                                            singular vector domain,”Mar.2006.
                                                            8. R.A.Ghazy, N.A El-Fishawy, M. M Hadhoud, M.I.Dessouky
                                                            and F.E. Abd El-Samie, “An efficient Block by block SVD based
                                                            image watermarking scheme”, Ubiquitous computing and
                                                            communication Journal ,2(5),2007,pp. 1-9.
                                                            9. Q.Li, C. Yuan and Y.Z. Zhong, “A novel SVD based watermarking
                                                            scheme using human visual model,” in Proc. The 2nd International
                                                            Symposium on Computational intelligence and Industrial
                                                            Applications, Nov 2006.
                                                            10. Andrews H, Patterson C., “Singular Value Decomposition (SVD)
                                                            Image Coding”, IEEE Transaction on [legacy, pre-1988], Volume
                                                            24, Issue 4, April 1976, pp425-432.
                                                            11. Y.D.Wu, “On the security of an SVD-Based Ownership
                                                            Watermarking, IEEE Transactions on Multimedia, 7 (4), August
                                                            2005, pp.624-627




                                                        4
© 2011 ACEEE
DOI: 01.IJNS.02.03.141
ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011

12. X.P. Zhang, K.Li comments on “An SVD-Based Watermarking                                      Dr. Y. V. Joshi is presently working as Director
scheme for Protecting Rightful Ownership”, IEEE Transaction on                                   of Walchand College of Engineering, Sangli since
multimedia Vol.7,no.2,2005, pp.593-594.                                                          May 2009. Earlier he was at SGGS Institute of
13. R.Rykaczewski, comments on “An SVD-Based Watermarking                                        Engineering and Technology, Vishnupuri,
scheme for Protecting Rightful Ownership”, IEEE Transaction on                                   Nanded since 1986 in various capacities starting
multimedia Vol.9,no.2,2007,pp.421-423.                                                           with Lecturer (1986-1993), Assistant Professor
14. Xiong Changzhen, Guo Fenhong,Li Zhengxi, “Weakness                                           (1993-2001), Professor (2001 onwards). He
Analysis of Singular Value based Watermarking”, in proceedings of                                also served as Head of Electronics and
the 2009 IEEE international Conference on Mechtronics and                   Telecommunication Engineering department (2002-04), First Dean
Automation August 9-12, Changchun, China.                                   of Academics (2004-06), Dean (Finance and Resource Mobilization
                                                                            (2007-08). He did his graduation B. E. Electronics in 1986 and post
                  U.M Gokhale is presently working as                       graduation M. E. Electronics 1991 from SGGS Institute of
                  Asst.Professor and Head in Department of                  Engineering and Technology, Vishnupuri, Nanded. He completed
                  Electronics and Telecommunication in                      Ph. D. (1998) from IIT, Delhi. He has 15 international Journal
                  G.H.Raisoni Institute of Engineering and                  publications and 25 national and international conference
                  Technology for women, Nagpur (MS), India. He              publications to his credit. He is Life Member of ISTE. He conducts
                  is Life member of Indian Society for Technical            and supervises research in the areas of Signal and Image
                  Education (ISTE) and also Associate member of             processing.He has so far supervised more than 25 M.E./M. Tech
Institution of Engineers (IE).He has 22 years teaching experience in        dissertations and 3 Ph. D. students.
Engineering College.




                                                                       5
© 2011 ACEEE
DOI: 01.IJNS.02.03.141

Weitere ähnliche Inhalte

Was ist angesagt?

SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN ijcseit
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
 
nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)ijceronline
 
SVD and Lifting Wavelet Based Fragile Image Watermarking
SVD and Lifting Wavelet Based Fragile Image WatermarkingSVD and Lifting Wavelet Based Fragile Image Watermarking
SVD and Lifting Wavelet Based Fragile Image WatermarkingIDES Editor
 
Blind Image Watermarking Based on Chaotic Maps
Blind Image Watermarking Based on Chaotic MapsBlind Image Watermarking Based on Chaotic Maps
Blind Image Watermarking Based on Chaotic MapsITIIIndustries
 
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...CSCJournals
 
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESijiert bestjournal
 
Aw2419401943
Aw2419401943Aw2419401943
Aw2419401943IJMER
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domainpaperpublications3
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESijma
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
 
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET Journal
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
 

Was ist angesagt? (20)

SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
 
Robust watermarking technique sppt
Robust watermarking technique spptRobust watermarking technique sppt
Robust watermarking technique sppt
 
G0523444
G0523444G0523444
G0523444
 
56 58
56 5856 58
56 58
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
 
nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)nternational Journal of Computational Engineering Research(IJCER)
nternational Journal of Computational Engineering Research(IJCER)
 
Nq2422332236
Nq2422332236Nq2422332236
Nq2422332236
 
SVD and Lifting Wavelet Based Fragile Image Watermarking
SVD and Lifting Wavelet Based Fragile Image WatermarkingSVD and Lifting Wavelet Based Fragile Image Watermarking
SVD and Lifting Wavelet Based Fragile Image Watermarking
 
Blind Image Watermarking Based on Chaotic Maps
Blind Image Watermarking Based on Chaotic MapsBlind Image Watermarking Based on Chaotic Maps
Blind Image Watermarking Based on Chaotic Maps
 
H3602056060
H3602056060H3602056060
H3602056060
 
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
 
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
 
Aw2419401943
Aw2419401943Aw2419401943
Aw2419401943
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
K42016368
K42016368K42016368
K42016368
 

Andere mochten auch

P 9 Killer Halftone Effect
P 9  Killer Halftone EffectP 9  Killer Halftone Effect
P 9 Killer Halftone Effectsumidahilo
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
 
CT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingCT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingAM Publications,India
 
Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarkingJasni Zain
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesPrashant Singh
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessingQaisar Ayub
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 
Watermarking
WatermarkingWatermarking
Watermarkingsunvelu
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 

Andere mochten auch (14)

P 9 Killer Halftone Effect
P 9  Killer Halftone EffectP 9  Killer Halftone Effect
P 9 Killer Halftone Effect
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
CT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingCT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image Watermarking
 
Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarking
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 

Ähnlich wie A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet Domain

A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICESA BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICEScsandit
 
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...ijcsit
 
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
 
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...cscpconf
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyIOSR Journals
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...ijistjournal
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...IRJET Journal
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVD
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVDHybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVD
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVDCSCJournals
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...ijcisjournal
 
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...ijcisjournal
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...ijcisjournal
 
A highly robust and secure image watermarking based on classification and vis...
A highly robust and secure image watermarking based on classification and vis...A highly robust and secure image watermarking based on classification and vis...
A highly robust and secure image watermarking based on classification and vis...AliFatahbeygi
 
DWT-SVD Based Visual Cryptography Scheme for Audio Watermarking
DWT-SVD Based Visual Cryptography Scheme for Audio WatermarkingDWT-SVD Based Visual Cryptography Scheme for Audio Watermarking
DWT-SVD Based Visual Cryptography Scheme for Audio Watermarkinginventionjournals
 
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...IDES Editor
 
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...sipij
 
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...cscpconf
 

Ähnlich wie A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet Domain (20)

Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
 
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICESA BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
 
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
 
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
 
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder Piracy
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVD
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVDHybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVD
Hybrid Digital Image Watermarking using Contourlet Transform (CT), DCT and SVD
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
 
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
 
A highly robust and secure image watermarking based on classification and vis...
A highly robust and secure image watermarking based on classification and vis...A highly robust and secure image watermarking based on classification and vis...
A highly robust and secure image watermarking based on classification and vis...
 
DWT-SVD Based Visual Cryptography Scheme for Audio Watermarking
DWT-SVD Based Visual Cryptography Scheme for Audio WatermarkingDWT-SVD Based Visual Cryptography Scheme for Audio Watermarking
DWT-SVD Based Visual Cryptography Scheme for Audio Watermarking
 
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
 
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
 
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...
A CONTENT BASED WATERMARKING SCHEME USING RADIAL SYMMETRY TRANSFORM AND SINGU...
 

Mehr von IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mehr von IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Kürzlich hochgeladen

Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 

Kürzlich hochgeladen (20)

Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 

A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet Domain

  • 1. ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011 A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet Domain U. M. Gokhale1, Y. V. Joshi2 1 U.M.Gokhale is working as Asst.Professor in Electronics and Telecommunication Department in G.H.Raisoni Institute of Engineering and Technology for Women, Nagpur., Maharashtra, India (e-mail : umgokhale@gmail.com) 2 Y.V.Joshi is working as Director Walchand College Of Engineering Sangli, Maharashtra, India (e-mail:yashwant.josh@gmail.com). Abstract- A new watermarking algorithm which is based on modifying the singular vectors instead of singular values. In image scrambling and SVD in the wavelet domain is discussed [8] Ghazy et al. Proposed a scheme in which the image is in this paper. In the proposed algorithm, chaotic signals are divided into blocks and then watermark is embedded in generated using logistic mapping and are used for scrambling singular values of each block separately. In [9] SVD is used the original watermark. The initial values of logistic mapping with a human visual system (HVS) model. In [11] , however, it are taken as private keys. The covert image is decomposed into four bands using integer wavelet transform; we apply is demonstrated that a counterfeit attack on SVD watermarked SVD to each band and embed the scrambled watermark data image is possible and proposes a method to counterattack it. by modifying the singular values. In [12] and [13] it is pointed out that SVD watermarking suffers from false watermark detection. In [14] it has been shown Index words - logistic mapping, singular value decomposition, discrete wavelet transforms. that SVD based watermarking algorithms are robust to distortions as long as attacks are not severe, also an attack method to extract a false watermark from any watermarked I. INTRODUCTION image is proposed. Thus SVD based watermarking methods With the rapid growth of internet and networks techniques, cannot be used for the ownership of an image. In our Multimedia data transforming and sharing has become proposed scheme watermarking is used for image common to many people. Multimedia data is easily copied authentication. and modified, so necessity for copyright protection is increasing. Digital watermarking has been proposed as the III.SINGULAR VALUE DECOMPOSITION technique for copyright protection of multimedia data. AND IMAGE ENCRYPTION Existing watermarking schemes can be divided into two categories spatial domain and transform domain. Spatial A. Singular Value Decomposition domain techniques embed data by directly modifying pixel Let A be an image matrix of size N×N. Using SVD the values of the host image, while transform domain techniques matrix A can be decomposed as: embed data by modifying transform domain coefficients. Discrete cosine transform (DCT) and discrete wavelet transform (DWT), which are used in image compression standards JPEG and JPEG2000 respectively , are two main transform methods used in transform domain watermarking. However, transform methods attempt to decompose images in terms of a standard basis set. This is not necessarily the optimum set. Recently Singular value decomposition (SVD) has been used for implementation of watermarking algorithms [1-10]. II. THE RELATED WORK In [1] Gorodetski et al. embed watermark bits by modifying the quantized singular values of the host image. In [2], Chandra computed SVD of both the host and watermark Where r is the rank of matrix A(r d” N), UA and VA are or- images and then singular values of the watermark images are thogonal matrices of size N×N, whose column vectors are ui minified and added to those of the host image. In [3] Liu and and vi. S is an N×N diagonal matrix containing the singular Tan applied SVD to only host image and watermark bits are values si assumed to be in decreasing order. directly added to its singular values. In [4] Ganic et al. Propose a two layer watermarking scheme. In [5] SVD is used with DCT and in [6] SVD is used with DWT embedding data in all frequencies. In [7] Agrawal et al. Propose a scheme of 1 © 2011 ACEEE DOI: 01.IJNS.02.03.141
  • 2. ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011 In watermarking applications, SVD has following properties: A. Watermark embedding: 1) SVD is able to efficiently represent the intrinsic algebraic The watermark embedding algorithm is as follows: properties of an image, where singular values correspond to 1) Using the integer wavelet transform(IWT), cover image A the luminance of the image and singular vectors reflect is first decomposed into four sub bands LL,HL,LH,HH as geometry characteristics of the image. shown in Fig.2. 2) Singular values have good stability, which means small perturbation added to image will not significantly change the 2) Apply SVD to each sub band image : corresponding singular values. 3) An image matrix has many small singular values compared with the first value. If these values are ignored it will have 3) Obtain the scrambled or encrypted image from the original much effect on the quality of reconstructed image. image by using logistic mapping as described in section 2. B. Image Encryption Chaos signal are a kind of pseudorandom, irreversible 4) Apply SVD to the encrypted image. and dynamical signals generated by deterministic non linear equations, which possess good characteristics of pseudorandom sequences. There are many ways to generate chaos sequence. We apply logistic mapping chaos sequence. 5) Modify the singular values of the cover image in each sub The equation for logistic mapping chaos is given by equation band with singular values of the encrypted watermark; (5). Where 0 d” µ d” 4, is called as branch parameter, x 6) Obtain the four sets of modified IWT coefficients. õ(0,1).Logistic map is chaotic when 3.569945d” µ d” 4,chaotic systems are highly sensitive to initial parameters. In order to 7) Apply the inverse IWT using the four sets of modified get chaotic sequence, the chaotic signal x (n+1) must be IWT coefficients to produce the watermarked cover image. transformed into binary sequences. We use the logistic map to generate sequence W ( i ). Then, we set a threshold T. If element of sequence is larger than the threshold, we replace that element by 1; otherwise, replace by 0, as described by equation ( 6 ). Make the xor operation between the sequence and the matrix of the original watermark to obtain the scrambled watermark or encrypted watermark. Fig 1 shows the original and the encrypted watermark. Figure 2 Wavelet decomposition B. Watermark detection The watermark detection algorithm is as follows 1)Using DWT, decompose the watermarked (and possibly attacked) cover image  into four sub bands LL, HL, LH, HH as shown in Fig 2. IV. PROPOSED METHOD Proposed method is explained in the following section. The scrambled watermark is obtained from the original 2) Apply SVD to each sub band image : watermark and is embedded into the cover image. The watermarked image is distributed. When required the test image is checked for the presence of the watermark by the 3) Extract the singular values from each sub band watermark detection algorithm. As the watermark is semi fragile it allows to alter the image by specific image processing operations. 2 © 2011 ACEEE DOI: 01.IJNS.02.03.141
  • 3. ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011 1) Construct four watermark images from four sub bands. 2) The original watermark can be obtained by xor operation with the chaotic sequence W (i). V. EXPERIMENTAL RESULTS Figure 4 Watermarked image after adding salt pepper noise The experimental simulation is carried out using MATLAB. The standard test images of 512×512×8 greyscale were used for studying the effects of perceptibility and robustness of the watermarking algorithm on a 256 × 256 binary watermark image. In order to evaluate the difference between cover image and watermarked image, we used Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR) to estimate the watermark imperceptibility. a) Variance =0.001 b) variance = 0.002 Figure 5 after adding Gaussian noise Where, MSE is the Mean Square Error between the original and watermarked image. Where x (i, j) and y (i, j) represent the pixel value of the original and the watermarked image respectively. A higher PSNR indicates that the quality of the watermarked image is a) 300 b) 45 0 closer to the original image. Fig 2 shows the original and Figure 6 Wwatermarked image after Rotation watermarked image. We estimate the similarity between the TABLE II PSNR AND NC FOR G AUSSIAN NOISE ATTACK original watermark and the extracted watermark using normalized correlation (NC): The NC shows the robustness of the algorithm. Its value TABLE III PSNR AND NC FOR SALT AND PEPPER NOISE ATTACK is 1.0000 before the watermark image is attacked. The results for different attacks are shown in table I. In order to investigate robustness watermarked image was attacked by various attacks. The original image is shown in Figure 3(a), and the watermarked image is shown in Figure 3(b). Fig 4 shows the salt and pepper noise attack. Fig 5 shows Gaussian TABLE IV PSNR AND NC FOR R OTATION ATTACK noise attack and Fig 6 show the rotation attack. Table I-IV shows the results for the various attacks and their effects on PSNR, NC and extracted watermark. Figure 3 a) Original image b) Watermarked image 3 © 2011 ACEEE DOI: 01.IJNS.02.03.141
  • 4. ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011 TABLE I VARIOUS ATTACKS AND THEIR EFFECT VI. CONCLUSIONS The proposed watermarking algorithm is non-blind watermarking technique as the original image is required for the watermark extraction. The PSNR is 52.46 before the attacks. The value of NC is close to 1.0000 which shows the robustness to the attack. In the existing watermarking algorithms there is always a trade off between higher robustness and degree of perceptibility. The proposed algorithm achieves both high robustness and imperceptibility. The security of the watermark is improved by its encryption using the chaos sequence generated by logistic mapping. Thus it can be used for image authentication. REFERENCES 1. V.Gorodetski, L. Popyack, V. Samoilov and V. Skormin, “ SVD based approach to transparent embedding data into digital images,” in proc. International Workshop on mathematical methods, model and architectures for computer network security (MMM- ACNS’01), may 2001 2. Chandra D.V.S.; “Digital image watermarking using singular value decomposition”, Circuits and Systems 2002.MWSCAS-2002, vol.3, 4-7Aug 2002, pp. 264-267. 3. R. Liu, T. Tan, “An SVD –based watermarking scheme for protecting rightful ownership”, IEEE Transaction on Multimedia Volume 4, issue 1, March 2002 pp121-128. 4. E.Gagnic, N. Zubair and A.M.Eskicioglu, “An optimal Watermarking based on singular value decomposition,”in proc IASTED international Conference on Communication , network and Information security(CNIS’03),Dec.2003 5. A.Sverdlov, S. Dexter and A.M.Eskicioglu, “Robust DCT-SVD domain image watermarking for copyright protection : Embedding data in all frequencies, in proc. the 2004 Multimedia and Security Workshop, ACM press, sep 2004,pp. 166-174. 6. E. Gagnic and A.M. Eskicioglu, “Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition”, Journal of Electronic Imaging vol. 14, no.4, Dec 2005. 7. R.Agrawal and M.S.Santhanam, “Digital watermarking in the singular vector domain,”Mar.2006. 8. R.A.Ghazy, N.A El-Fishawy, M. M Hadhoud, M.I.Dessouky and F.E. Abd El-Samie, “An efficient Block by block SVD based image watermarking scheme”, Ubiquitous computing and communication Journal ,2(5),2007,pp. 1-9. 9. Q.Li, C. Yuan and Y.Z. Zhong, “A novel SVD based watermarking scheme using human visual model,” in Proc. The 2nd International Symposium on Computational intelligence and Industrial Applications, Nov 2006. 10. Andrews H, Patterson C., “Singular Value Decomposition (SVD) Image Coding”, IEEE Transaction on [legacy, pre-1988], Volume 24, Issue 4, April 1976, pp425-432. 11. Y.D.Wu, “On the security of an SVD-Based Ownership Watermarking, IEEE Transactions on Multimedia, 7 (4), August 2005, pp.624-627 4 © 2011 ACEEE DOI: 01.IJNS.02.03.141
  • 5. ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011 12. X.P. Zhang, K.Li comments on “An SVD-Based Watermarking Dr. Y. V. Joshi is presently working as Director scheme for Protecting Rightful Ownership”, IEEE Transaction on of Walchand College of Engineering, Sangli since multimedia Vol.7,no.2,2005, pp.593-594. May 2009. Earlier he was at SGGS Institute of 13. R.Rykaczewski, comments on “An SVD-Based Watermarking Engineering and Technology, Vishnupuri, scheme for Protecting Rightful Ownership”, IEEE Transaction on Nanded since 1986 in various capacities starting multimedia Vol.9,no.2,2007,pp.421-423. with Lecturer (1986-1993), Assistant Professor 14. Xiong Changzhen, Guo Fenhong,Li Zhengxi, “Weakness (1993-2001), Professor (2001 onwards). He Analysis of Singular Value based Watermarking”, in proceedings of also served as Head of Electronics and the 2009 IEEE international Conference on Mechtronics and Telecommunication Engineering department (2002-04), First Dean Automation August 9-12, Changchun, China. of Academics (2004-06), Dean (Finance and Resource Mobilization (2007-08). He did his graduation B. E. Electronics in 1986 and post U.M Gokhale is presently working as graduation M. E. Electronics 1991 from SGGS Institute of Asst.Professor and Head in Department of Engineering and Technology, Vishnupuri, Nanded. He completed Electronics and Telecommunication in Ph. D. (1998) from IIT, Delhi. He has 15 international Journal G.H.Raisoni Institute of Engineering and publications and 25 national and international conference Technology for women, Nagpur (MS), India. He publications to his credit. He is Life Member of ISTE. He conducts is Life member of Indian Society for Technical and supervises research in the areas of Signal and Image Education (ISTE) and also Associate member of processing.He has so far supervised more than 25 M.E./M. Tech Institution of Engineers (IE).He has 22 years teaching experience in dissertations and 3 Ph. D. students. Engineering College. 5 © 2011 ACEEE DOI: 01.IJNS.02.03.141