SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Vaishali Ghune Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1837-1840

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Comparative Analysis of Various Watermarking Techniques for
Digital Image
Vaishali Ghune
Acropolis Institute of Technology and Research Indore (M.P.)
Abstract
Three digital image watermarking techniques that have higher level of security compared to most of the existing
algorithms have been proposed.Watermarking is a technique for labeling digital pictures by hiding secret
information into the images. Watermarking is a technique for labeling digital pictures by hiding secret
information into the image. In Digital watermarking technique, image is embedded information data within an
insensible form for human visual system but in a way that protects from attacks such as common image
processing techniques. In our approach, analysis the quality of image compression by( Discrete Cosine
Transform(DCT)) and (Discrete Wavelet Transform(DWT)) and (least significant bit(LSB)). We embed the
watermarks with visually recognizable patterns into the images by selectively modifying the middle-frequency
parts of the image. Several variations of the methods will be addressed. The experimental results show that the
technique successfully survives image processing operations and compare the results.
Keywords: Digital watermarking; Discrete cosine transform (DCT), discrete wavelet transform (DWT),least
significant bit(LSB)

I.

Introduction

Due to the rapid and extensive growth of
electronic publishing industry, data can now be
distributed much faster and easier. Unfortunately,
engineers still see immense technical challenges in
discouraging unauthorized copying and distributing
of electronic documents[2].
Watermarking technique is to hide secret
information into the digital signals so as to
discourage unauthorized copying or attest the origin
of the media. And the watermark is a digital code
embedded in the image data and is invisible[4].
Watermark is an invisible mark containing
information. In the form of text, images and
multimedia or protected multimedia data placed on
an image that can be detected when the image is
compared with the origin[3]. There are some
necessary characteristics for digital image
watermarking. These requirements are:
Invisible: The digital watermark embedded into the
image data should be invisible to the human.
Security: Unauthorized removal and detection of the
watermark must be impossible even if the basic
Scheme used for watermarking is known.
Robustness: Robustness is a measure of the
immunity of the watermark against attempt to remove
it by different types of attacks. We measure the
similarity between the original watermark and the
extracted watermark from the attacked image using
the Normalized Correlation (NC) factor[7].

www.ijera.com

Watermarking is a technique for labeling digital
pictures by hiding secret information into the images.
The growth of networked multimedia systems has
created the need for the copyright protection of
various digital medium, e.g., images, audio clips,
video, etc. In the literature, several techniques have
been developed for watermarking. three coding
methods for hiding electronic marking in document
were proposed. the watermarks are applied on the
spatial domain[1]. The major disadvantage of spatial
domain watermarking is that a common picture
cropping operation may eliminate the watermark.
Other than spatial domain watermarking, frequency
domain approaches have also been proposed. In a
copyright code and its random sequence of locations
for embedding are produced, and then superimposed
on the image based on a JPEG model. The watermark
is a Symbol or an random number which comprises
of a sequence of bits, and can only be “detected” by
employing the “detection theory.” That is, during the
verification phase, the original image is subtracted
from the image in question, and the similarity
between the difference and the specific watermark is
obtained. Therefore, an experimental threshold is
chosen and compared to determine whether the image
is watermarked [8].
In our scheme, watermarks are embedded
and extracted by modifying the middle-frequency
coefficients within each image block of the original
image in considering the effect of quantization using
DCT techniques, LSB techniques and DWT
techniques. There is a technique that has been used
for digital watermarking. The experimental results

1837 | P a g e
Vaishali Ghune Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1837-1840
show and used DCT , DWT and LSB techniques
apply on the several images after compare the results.

II.

METHODS OF EMBEDDING

In our approach, a block DCT-based
algorithm is developed to embed the image
watermarking. Let X be the original gray-level image
of size (N1*N2) , and the digital watermark W be a
binary image of size (M1*M2) . In the watermark, the
marked pixels are valued as one‟s, and the others are
zeros. Since only the middle-frequency range of the
host image will be processed during the watermark
embedding, the resolution of a watermark image W is
assumed to be smaller than that of the original image
X. For example, for each 8*8 image block, only
(64*M1*M2/N1*N2 ) coefficients will be used for the
Watermark embedding. Fig (a) shows the embedded
watermark. The ratio of (M1*M2) and (N1*N2)
determines the amount of information to be
embedded into the image. In general, for more robust
and invisible embedding, the amount of information
can be embedded should be reduced. The original
image X and digital watermark W are represented as
X={x(i,j),0< i < N1,0 < j < N2 }

(1)

Where x(i,j)ε {0,...,2L-1} is the intensity of pixel
x(i,j)and L is the number of bits used in each pixel.
W = {w(i,j),0 < i <M1,0 < j < M2}
Where w (i,j) ε {0,1}.

(2)

In X, there are N1/8 * N2/8 image blocks
with size 8*8. To obtain the same number N1/8 *
N2/8 of blocks as the image X, the watermark W is
decomposed into several blocks with size
(M1*8/N1)*(M2*8/N2).
A- Pseudorandom Permutation of the Watermark
In our approach, the permutation is
implemented as follows. First, number each pixel
from zero to(M1*M2) . Second, generate each number
in random order. Finally, generate the coordinate
pairs by mapping the random sequence number into a
2-D sequence. For example, for a digital watermark
of size 128*128, use a “linear feedback shift register”
[11] to generate a random sequence from 1 to 16383.
Then, for each sequence element number, compute
and (M mod 128) and as the permuted vertical and
horizontal coordinates. The watermark to disperse its
spatial relationship, i.e.,
WP= Permute (W)
B- Block-Based Image-Dependent Permutation of
the Watermark
In order to improve the perceptual
invisibility, For each image block of size 8*8, the
variances (which is used as a measure of invisibility
under watermark embedding) are computed and
www.ijera.com

www.ijera.com

sorted.
For
each
watermark
block
of
size,(M1*8/N1)*(M2*8/N2),
the
amount
of
information (i.e.,the number of signed pixels) are
sorted also. Then, shuffle each watermark block into
the spatial position according the corresponding
sorting order of the image block, i.e.,
WP =Permute (Wp)
C- Block Transformation of the Image
Since the discrete cosine transform (DCT)
used by JPEG [12] is performed on blocks of 8*8, the
input image X is divided into blocks of 8*8, and each
block is DCT Transformed independently. That is,
Y=FDCT(X)
Where FDCT denotes the operation of forward DCT.
D- Choice of Middle-Frequency Coefficients
The human eye is more sensitive to noise in
lower frequency components than in higher
frequency ones. However, the energy of most natural
images are concentrated in the lower frequency
range, and the information hidden in the higher
frequency components might be discarded after
quantization operation of lossy compression. To this
end, for each 8*8 image block, only
(64*(M1*M2/N1*N2)) coefficients are selected out of
the 64 DCT coefficients. Those selected coefficients
are then mapped into a reduced image block of size
(M1*8/N1)*(M2*8/N2). That is, the middle-frequency
coefficients selected from the image of size(N1*N2)
are collected to compose a reduced image of
size(M1*M2), which has the same resolution with the
binary watermark.
YR= Reduce(Y)
E. Modification of the DCT Coefficients
Now, a permuted digital watermark and a
reduced image (Which contains only the middlefrequency components of the original image) both
with size (M1*M2) are obtained. For each watermark
block of size (M1*8/N1)*(M2*8/N2) , the reduced
image block of size(M1*8/N1)*(M2*8/N2) at the
corresponding spatial position will be modified
adequately to embed the watermarked pixels.
P = Polarity (Yr)
F- Inverse Block Transform
Finally, map the modified middle-frequency
coefficients Yr Into Y to get Y. Then, inverse DCT
(IDCT) of the associated result to obtained the
embedded image
^
^
X = IDCT(Y)

1838 | P a g e
Vaishali Ghune Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1837-1840

www.ijera.com

image and the watermark. Based on the mapping,
reverse permute Wb to get Wp .
D- Reverse Pseudorandom Permutation
Reverse-permute Wp to get the watermark W.

Fig-a Watermark embedding steps.

III.

WATERMARK EXTRACTING
METHOD

The extraction of watermark requires the
original image, The watermarked image, and either
the watermark or the Permutation mapping used in
image-dependent permutation during the embedding
steps. The extraction steps are described as follows
.fig (b) shows the watermark extracting steps.
A- Block Transformation
Both the original image and the image in
question are DCT transformed.
Y = FDCT(X)
Y = FDCT᷈
(X)
B- Generation of Polarity Patterns
Generate the reduced images which contain
only the middle frequency coefficients and then use
these middle-frequency DCT coefficients to produce
the polarity patterns. That is
Yr = Reduce (Y)
Yr = Reduce (X)
And then
P = Polarity (Yr)
P = Polarity (Yr)
C- Reverse
Block-Based
Image-Dependent
Permutation
The image-dependent permutation mapping
could be obtained either by saving as a file during the
embedding steps or recomputed from the original

www.ijera.com

Fig –b Watermark extracting steps

IV.

LSB TECHNIQUE

The best known Watermarking method that
works in the Spatial Domain is the Least Significant
Bit (LSB), which replaces the least significant bits of
pixels selected to hide the information. This method
has several implementation versions that improve the
algorithm in certain aspects.
Techniques in spatial domain class generally
share the following characteristics:
᷈ he watermark is applied in the pixel domain.
T
᷈ o transforms are applied to the host signal during
N
Watermark embedding.
᷈ ombination with the host signal is based on
C
simple
Operations, in the pixel domain.
᷈ he watermark can be detected by correlating the
T
expected pattern with the received signal.
In a digital image, information can be
inserted directly into every bit of image information
or the more busy areas of an image can be calculated
so as to hide such messages in less perceptible parts
of an image.
If we use a greyscale bitmap image, which is
8- bit, we would need to read in the file and then add
data to the least significant bits of each pixel, in every
8-bit pixel. In a greyscale image each pixel is
represented by 1 byte consist of 8 bits. It can
represent 256 gray colours between the black which
is 0 to the white which is 255.The principle of
encoding uses the Least Significant Bit of each of
these bytes, the bit on the far right side. If data is
encoded to only the last two significant bits (which
are the first and second LSB) of each colour
component it is most likely not going to be
1839 | P a g e
Vaishali Ghune Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1837-1840
detectable; the human retina becomes the limiting
factor in viewing pictures[10].

V.

Conclusion

This paper has presented a three digital
watermarking techniques DCT, DWT and LSB.
Embedding digital watermark and extracting digital
watermark methods is DCT-based approach.After use
this algorithm the result show that the quality of the
watermarked image is higher. These algorithms apply
for the image compression of original or digital
image. The values of all particular point after image
compression are compare based on the algorithm
DCT, DWT and LSB. To increase the
imperceptibility, the watermark image is adjusted by
the weighted correction in the spatial domain.Here
we present the comparision of PSNR value and NC
factor The results of experiments have showed that
the algorithm has better visibility and has stronger
robustness when it is attacked by JPEG compression,
cropping, contrast adjustments, filtering, noises and
so on.

[10]

[11]

[12]

www.ijera.com

Proceedings of the 2009International
Symposium on Web Information Systems
and Applications (WISA‟09) Nanchang, P.
R. China, May 22-24, 2009, pp. 104-107.
Chiou-Ting Hsu and Ja-Ling Wu.” Hidden
Digital Watermarks in Images” Senior
Member, IEEE. TRANSACTIONS ON
IMAGE PROCESSING, VOL. 8, NO. 1,
JANUARY.
”Digital watermarking for digital media”
Juergen Seitz University of Cooperative
Education Heidenheim, Germany.
Gonzalez R, wood R”.Digital image
processing”,
published
by
Pearson
Education.

References
[1]

[2]

[3]

[4]

[5]

[6]

[7]

[8]

[9]

B. M. Macq and J. J. Quisquater,
“Cryptology
for
digital
TV
broadcasting,”Proc. IEEE, vol. 83, pp. 954–
957, June 1995.
I. Pitas and T. H. Kaskalis, “Applying
signatures on digital images,” in Proc. IEEE
Nonlinear Signal and Image Processing,
June 1995, pp.460–463.
O. Bruyndonckx, J. J. Quisquater, and B.
Macq, “Spatial method for copyright
labeling of digital images,” in Proc. IEEE
Nonlinear Signal and Image Processing,
June 1995, pp. 456–459.
W. Bender, D. Gruhl, and N. Morimoto,
“Techniques for data hiding,” Proc. SPIE,
vol. 2420, p. 40, Feb. 1995.
N.Nikolaidis, I.Pitas, "Robust image
watermarking in the spatial domain," Signal
Process, 66(1998) 385-403
Keshav S Rawat.”Digital watermarking
schemes for authorization against copying or
piracy of color images” Member, IEEE
Keshav S Rawat et. al. / Indian Journal of
Computer Science Vol. 1 No. 4 295-300
T.Jayamalar.‘‘Survey on Digital Video
Watermarking Techniques and Attacks on
Watermarks” International Journal of
Engineering Science and Technology Vol.
2(12), 2010, 6963-6967
Kritika
Singla.
„„Invigible
digital
watermarking
for
color
images”
International Journal of advanced of
engineering sciencs and technologies Vol
No. 10, Issue No. 2, 270 – 274
Mei Jiansheng.” A Digital Watermarking
Algorithm Based On DCT and DWT”

www.ijera.com

1840 | P a g e

Weitere ähnliche Inhalte

Was ist angesagt?

Reversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A ReviewReversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A Reviewiosrjce
 
Intelligent Parallel Processing and Compound Image Compression
Intelligent Parallel Processing and Compound Image CompressionIntelligent Parallel Processing and Compound Image Compression
Intelligent Parallel Processing and Compound Image CompressionDR.P.S.JAGADEESH KUMAR
 
An enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hidingAn enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hidingAlexander Decker
 
Effect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital ImagesEffect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital ImagesDr. Michael Agbaje
 
Matlab Based Image Compression Using Various Algorithm
Matlab Based Image Compression Using Various AlgorithmMatlab Based Image Compression Using Various Algorithm
Matlab Based Image Compression Using Various Algorithmijtsrd
 
Implementation of a modified counterpropagation neural network model in onlin...
Implementation of a modified counterpropagation neural network model in onlin...Implementation of a modified counterpropagation neural network model in onlin...
Implementation of a modified counterpropagation neural network model in onlin...Alexander Decker
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )ijsc
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419IJRAT
 
Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...IJECEIAES
 
A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...eSAT Publishing House
 
06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...IAESIJEECS
 
Improved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document imagesImproved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document imageseSAT Journals
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentCSCJournals
 
3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compressionAlexander Decker
 
IMAGE COMPRESSION AND DECOMPRESSION SYSTEM
IMAGE COMPRESSION AND DECOMPRESSION SYSTEMIMAGE COMPRESSION AND DECOMPRESSION SYSTEM
IMAGE COMPRESSION AND DECOMPRESSION SYSTEMVishesh Banga
 
Novel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital imagesNovel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital imagesIDES Editor
 

Was ist angesagt? (19)

Reversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A ReviewReversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A Review
 
Intelligent Parallel Processing and Compound Image Compression
Intelligent Parallel Processing and Compound Image CompressionIntelligent Parallel Processing and Compound Image Compression
Intelligent Parallel Processing and Compound Image Compression
 
An enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hidingAn enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hiding
 
Ceis 4
Ceis 4Ceis 4
Ceis 4
 
Effect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital ImagesEffect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital Images
 
Matlab Based Image Compression Using Various Algorithm
Matlab Based Image Compression Using Various AlgorithmMatlab Based Image Compression Using Various Algorithm
Matlab Based Image Compression Using Various Algorithm
 
Implementation of a modified counterpropagation neural network model in onlin...
Implementation of a modified counterpropagation neural network model in onlin...Implementation of a modified counterpropagation neural network model in onlin...
Implementation of a modified counterpropagation neural network model in onlin...
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419
 
A0360105
A0360105A0360105
A0360105
 
Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...
 
A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...
 
06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...
 
Improved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document imagesImproved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document images
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
 
3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression
 
J017426467
J017426467J017426467
J017426467
 
IMAGE COMPRESSION AND DECOMPRESSION SYSTEM
IMAGE COMPRESSION AND DECOMPRESSION SYSTEMIMAGE COMPRESSION AND DECOMPRESSION SYSTEM
IMAGE COMPRESSION AND DECOMPRESSION SYSTEM
 
Novel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital imagesNovel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital images
 

Andere mochten auch

Trabajo sobre la salud
Trabajo sobre la saludTrabajo sobre la salud
Trabajo sobre la saludjuan1119
 
Jpg Magazine Issue 13
Jpg Magazine Issue 13Jpg Magazine Issue 13
Jpg Magazine Issue 13kaa kaa
 
Trabajos para un exámenes.docx
Trabajos para un exámenes.docxTrabajos para un exámenes.docx
Trabajos para un exámenes.docxjose23424
 
Winnick & Company Los Angeles Business Journal 071715
Winnick & Company Los Angeles Business Journal 071715Winnick & Company Los Angeles Business Journal 071715
Winnick & Company Los Angeles Business Journal 071715Grapeshot
 
JPM_060308_Transcript
JPM_060308_TranscriptJPM_060308_Transcript
JPM_060308_Transcriptfinance18
 
VOLANS如何備份或回復飛魚星路由器的系統設定檔?
VOLANS如何備份或回復飛魚星路由器的系統設定檔?VOLANS如何備份或回復飛魚星路由器的系統設定檔?
VOLANS如何備份或回復飛魚星路由器的系統設定檔?臺灣塔米歐
 
Jp mexico es un pais multicultural
Jp mexico es un pais multiculturalJp mexico es un pais multicultural
Jp mexico es un pais multiculturalJuampis54
 
Frases hechas (de toda la clase)
Frases hechas (de toda la clase)Frases hechas (de toda la clase)
Frases hechas (de toda la clase)elpiruspopprimaria
 
Trabalho de História: George Washington
Trabalho de História: George WashingtonTrabalho de História: George Washington
Trabalho de História: George Washingtonpunkstars
 
Quisia Gonzalez: Healing for Cultural Survival by Introducing the Ideas of He...
Quisia Gonzalez: Healing for Cultural Survival by Introducing the Ideas of He...Quisia Gonzalez: Healing for Cultural Survival by Introducing the Ideas of He...
Quisia Gonzalez: Healing for Cultural Survival by Introducing the Ideas of He...Moral Economy
 
Proyecto Grace Medicals2
Proyecto Grace Medicals2Proyecto Grace Medicals2
Proyecto Grace Medicals2taller22
 
Sybase Analytic Appliance
Sybase Analytic ApplianceSybase Analytic Appliance
Sybase Analytic Appliancefocusbi
 
JPMorgan Chase Third Quarter 2008 Financial Results Conference Call Investor ...
JPMorgan Chase Third Quarter 2008 Financial Results Conference Call Investor ...JPMorgan Chase Third Quarter 2008 Financial Results Conference Call Investor ...
JPMorgan Chase Third Quarter 2008 Financial Results Conference Call Investor ...finance2
 
Querella contra senador Bianchi por fraude al fisco
Querella contra senador Bianchi por fraude al fiscoQuerella contra senador Bianchi por fraude al fisco
Querella contra senador Bianchi por fraude al fiscoJQM69
 

Andere mochten auch (17)

Vuelve
VuelveVuelve
Vuelve
 
Trabajo sobre la salud
Trabajo sobre la saludTrabajo sobre la salud
Trabajo sobre la salud
 
Jpg Magazine Issue 13
Jpg Magazine Issue 13Jpg Magazine Issue 13
Jpg Magazine Issue 13
 
Trabajos para un exámenes.docx
Trabajos para un exámenes.docxTrabajos para un exámenes.docx
Trabajos para un exámenes.docx
 
Swp consultation general presentation
Swp consultation general presentationSwp consultation general presentation
Swp consultation general presentation
 
Winnick & Company Los Angeles Business Journal 071715
Winnick & Company Los Angeles Business Journal 071715Winnick & Company Los Angeles Business Journal 071715
Winnick & Company Los Angeles Business Journal 071715
 
JPM_060308_Transcript
JPM_060308_TranscriptJPM_060308_Transcript
JPM_060308_Transcript
 
VOLANS如何備份或回復飛魚星路由器的系統設定檔?
VOLANS如何備份或回復飛魚星路由器的系統設定檔?VOLANS如何備份或回復飛魚星路由器的系統設定檔?
VOLANS如何備份或回復飛魚星路由器的系統設定檔?
 
Jp mexico es un pais multicultural
Jp mexico es un pais multiculturalJp mexico es un pais multicultural
Jp mexico es un pais multicultural
 
Frases hechas (de toda la clase)
Frases hechas (de toda la clase)Frases hechas (de toda la clase)
Frases hechas (de toda la clase)
 
Trabalho de História: George Washington
Trabalho de História: George WashingtonTrabalho de História: George Washington
Trabalho de História: George Washington
 
Quisia Gonzalez: Healing for Cultural Survival by Introducing the Ideas of He...
Quisia Gonzalez: Healing for Cultural Survival by Introducing the Ideas of He...Quisia Gonzalez: Healing for Cultural Survival by Introducing the Ideas of He...
Quisia Gonzalez: Healing for Cultural Survival by Introducing the Ideas of He...
 
Proyecto Grace Medicals2
Proyecto Grace Medicals2Proyecto Grace Medicals2
Proyecto Grace Medicals2
 
Sybase Analytic Appliance
Sybase Analytic ApplianceSybase Analytic Appliance
Sybase Analytic Appliance
 
JPMorgan Chase Third Quarter 2008 Financial Results Conference Call Investor ...
JPMorgan Chase Third Quarter 2008 Financial Results Conference Call Investor ...JPMorgan Chase Third Quarter 2008 Financial Results Conference Call Investor ...
JPMorgan Chase Third Quarter 2008 Financial Results Conference Call Investor ...
 
Querella contra senador Bianchi por fraude al fisco
Querella contra senador Bianchi por fraude al fiscoQuerella contra senador Bianchi por fraude al fisco
Querella contra senador Bianchi por fraude al fisco
 
Winphone
WinphoneWinphone
Winphone
 

Ähnlich wie Kt3618371840

Enhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackEnhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackijfcstjournal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
 
Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofDigital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofIAEME Publication
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
Improved anti-noise attack ability of image encryption algorithm using de-noi...
Improved anti-noise attack ability of image encryption algorithm using de-noi...Improved anti-noise attack ability of image encryption algorithm using de-noi...
Improved anti-noise attack ability of image encryption algorithm using de-noi...TELKOMNIKA JOURNAL
 
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...IRJET Journal
 
Semi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svdSemi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svdsipij
 
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarkingijsrd.com
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...ijcisjournal
 
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...ijcisjournal
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...ijcisjournal
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption cscpconf
 
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey  Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey ijsc
 

Ähnlich wie Kt3618371840 (20)

Enhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackEnhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attack
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics
 
Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofDigital image watermarking using dct with high security of
Digital image watermarking using dct with high security of
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
1820 1824
1820 18241820 1824
1820 1824
 
1820 1824
1820 18241820 1824
1820 1824
 
B017120611
B017120611B017120611
B017120611
 
14 vikram kumar_150-159
14 vikram kumar_150-15914 vikram kumar_150-159
14 vikram kumar_150-159
 
Improved anti-noise attack ability of image encryption algorithm using de-noi...
Improved anti-noise attack ability of image encryption algorithm using de-noi...Improved anti-noise attack ability of image encryption algorithm using de-noi...
Improved anti-noise attack ability of image encryption algorithm using de-noi...
 
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
 
Semi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svdSemi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svd
 
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
 
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption
 
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey  Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey
 

Kürzlich hochgeladen

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Kürzlich hochgeladen (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Kt3618371840

  • 1. Vaishali Ghune Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1837-1840 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Comparative Analysis of Various Watermarking Techniques for Digital Image Vaishali Ghune Acropolis Institute of Technology and Research Indore (M.P.) Abstract Three digital image watermarking techniques that have higher level of security compared to most of the existing algorithms have been proposed.Watermarking is a technique for labeling digital pictures by hiding secret information into the images. Watermarking is a technique for labeling digital pictures by hiding secret information into the image. In Digital watermarking technique, image is embedded information data within an insensible form for human visual system but in a way that protects from attacks such as common image processing techniques. In our approach, analysis the quality of image compression by( Discrete Cosine Transform(DCT)) and (Discrete Wavelet Transform(DWT)) and (least significant bit(LSB)). We embed the watermarks with visually recognizable patterns into the images by selectively modifying the middle-frequency parts of the image. Several variations of the methods will be addressed. The experimental results show that the technique successfully survives image processing operations and compare the results. Keywords: Digital watermarking; Discrete cosine transform (DCT), discrete wavelet transform (DWT),least significant bit(LSB) I. Introduction Due to the rapid and extensive growth of electronic publishing industry, data can now be distributed much faster and easier. Unfortunately, engineers still see immense technical challenges in discouraging unauthorized copying and distributing of electronic documents[2]. Watermarking technique is to hide secret information into the digital signals so as to discourage unauthorized copying or attest the origin of the media. And the watermark is a digital code embedded in the image data and is invisible[4]. Watermark is an invisible mark containing information. In the form of text, images and multimedia or protected multimedia data placed on an image that can be detected when the image is compared with the origin[3]. There are some necessary characteristics for digital image watermarking. These requirements are: Invisible: The digital watermark embedded into the image data should be invisible to the human. Security: Unauthorized removal and detection of the watermark must be impossible even if the basic Scheme used for watermarking is known. Robustness: Robustness is a measure of the immunity of the watermark against attempt to remove it by different types of attacks. We measure the similarity between the original watermark and the extracted watermark from the attacked image using the Normalized Correlation (NC) factor[7]. www.ijera.com Watermarking is a technique for labeling digital pictures by hiding secret information into the images. The growth of networked multimedia systems has created the need for the copyright protection of various digital medium, e.g., images, audio clips, video, etc. In the literature, several techniques have been developed for watermarking. three coding methods for hiding electronic marking in document were proposed. the watermarks are applied on the spatial domain[1]. The major disadvantage of spatial domain watermarking is that a common picture cropping operation may eliminate the watermark. Other than spatial domain watermarking, frequency domain approaches have also been proposed. In a copyright code and its random sequence of locations for embedding are produced, and then superimposed on the image based on a JPEG model. The watermark is a Symbol or an random number which comprises of a sequence of bits, and can only be “detected” by employing the “detection theory.” That is, during the verification phase, the original image is subtracted from the image in question, and the similarity between the difference and the specific watermark is obtained. Therefore, an experimental threshold is chosen and compared to determine whether the image is watermarked [8]. In our scheme, watermarks are embedded and extracted by modifying the middle-frequency coefficients within each image block of the original image in considering the effect of quantization using DCT techniques, LSB techniques and DWT techniques. There is a technique that has been used for digital watermarking. The experimental results 1837 | P a g e
  • 2. Vaishali Ghune Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1837-1840 show and used DCT , DWT and LSB techniques apply on the several images after compare the results. II. METHODS OF EMBEDDING In our approach, a block DCT-based algorithm is developed to embed the image watermarking. Let X be the original gray-level image of size (N1*N2) , and the digital watermark W be a binary image of size (M1*M2) . In the watermark, the marked pixels are valued as one‟s, and the others are zeros. Since only the middle-frequency range of the host image will be processed during the watermark embedding, the resolution of a watermark image W is assumed to be smaller than that of the original image X. For example, for each 8*8 image block, only (64*M1*M2/N1*N2 ) coefficients will be used for the Watermark embedding. Fig (a) shows the embedded watermark. The ratio of (M1*M2) and (N1*N2) determines the amount of information to be embedded into the image. In general, for more robust and invisible embedding, the amount of information can be embedded should be reduced. The original image X and digital watermark W are represented as X={x(i,j),0< i < N1,0 < j < N2 } (1) Where x(i,j)ε {0,...,2L-1} is the intensity of pixel x(i,j)and L is the number of bits used in each pixel. W = {w(i,j),0 < i <M1,0 < j < M2} Where w (i,j) ε {0,1}. (2) In X, there are N1/8 * N2/8 image blocks with size 8*8. To obtain the same number N1/8 * N2/8 of blocks as the image X, the watermark W is decomposed into several blocks with size (M1*8/N1)*(M2*8/N2). A- Pseudorandom Permutation of the Watermark In our approach, the permutation is implemented as follows. First, number each pixel from zero to(M1*M2) . Second, generate each number in random order. Finally, generate the coordinate pairs by mapping the random sequence number into a 2-D sequence. For example, for a digital watermark of size 128*128, use a “linear feedback shift register” [11] to generate a random sequence from 1 to 16383. Then, for each sequence element number, compute and (M mod 128) and as the permuted vertical and horizontal coordinates. The watermark to disperse its spatial relationship, i.e., WP= Permute (W) B- Block-Based Image-Dependent Permutation of the Watermark In order to improve the perceptual invisibility, For each image block of size 8*8, the variances (which is used as a measure of invisibility under watermark embedding) are computed and www.ijera.com www.ijera.com sorted. For each watermark block of size,(M1*8/N1)*(M2*8/N2), the amount of information (i.e.,the number of signed pixels) are sorted also. Then, shuffle each watermark block into the spatial position according the corresponding sorting order of the image block, i.e., WP =Permute (Wp) C- Block Transformation of the Image Since the discrete cosine transform (DCT) used by JPEG [12] is performed on blocks of 8*8, the input image X is divided into blocks of 8*8, and each block is DCT Transformed independently. That is, Y=FDCT(X) Where FDCT denotes the operation of forward DCT. D- Choice of Middle-Frequency Coefficients The human eye is more sensitive to noise in lower frequency components than in higher frequency ones. However, the energy of most natural images are concentrated in the lower frequency range, and the information hidden in the higher frequency components might be discarded after quantization operation of lossy compression. To this end, for each 8*8 image block, only (64*(M1*M2/N1*N2)) coefficients are selected out of the 64 DCT coefficients. Those selected coefficients are then mapped into a reduced image block of size (M1*8/N1)*(M2*8/N2). That is, the middle-frequency coefficients selected from the image of size(N1*N2) are collected to compose a reduced image of size(M1*M2), which has the same resolution with the binary watermark. YR= Reduce(Y) E. Modification of the DCT Coefficients Now, a permuted digital watermark and a reduced image (Which contains only the middlefrequency components of the original image) both with size (M1*M2) are obtained. For each watermark block of size (M1*8/N1)*(M2*8/N2) , the reduced image block of size(M1*8/N1)*(M2*8/N2) at the corresponding spatial position will be modified adequately to embed the watermarked pixels. P = Polarity (Yr) F- Inverse Block Transform Finally, map the modified middle-frequency coefficients Yr Into Y to get Y. Then, inverse DCT (IDCT) of the associated result to obtained the embedded image ^ ^ X = IDCT(Y) 1838 | P a g e
  • 3. Vaishali Ghune Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1837-1840 www.ijera.com image and the watermark. Based on the mapping, reverse permute Wb to get Wp . D- Reverse Pseudorandom Permutation Reverse-permute Wp to get the watermark W. Fig-a Watermark embedding steps. III. WATERMARK EXTRACTING METHOD The extraction of watermark requires the original image, The watermarked image, and either the watermark or the Permutation mapping used in image-dependent permutation during the embedding steps. The extraction steps are described as follows .fig (b) shows the watermark extracting steps. A- Block Transformation Both the original image and the image in question are DCT transformed. Y = FDCT(X) Y = FDCT᷈ (X) B- Generation of Polarity Patterns Generate the reduced images which contain only the middle frequency coefficients and then use these middle-frequency DCT coefficients to produce the polarity patterns. That is Yr = Reduce (Y) Yr = Reduce (X) And then P = Polarity (Yr) P = Polarity (Yr) C- Reverse Block-Based Image-Dependent Permutation The image-dependent permutation mapping could be obtained either by saving as a file during the embedding steps or recomputed from the original www.ijera.com Fig –b Watermark extracting steps IV. LSB TECHNIQUE The best known Watermarking method that works in the Spatial Domain is the Least Significant Bit (LSB), which replaces the least significant bits of pixels selected to hide the information. This method has several implementation versions that improve the algorithm in certain aspects. Techniques in spatial domain class generally share the following characteristics: ᷈ he watermark is applied in the pixel domain. T ᷈ o transforms are applied to the host signal during N Watermark embedding. ᷈ ombination with the host signal is based on C simple Operations, in the pixel domain. ᷈ he watermark can be detected by correlating the T expected pattern with the received signal. In a digital image, information can be inserted directly into every bit of image information or the more busy areas of an image can be calculated so as to hide such messages in less perceptible parts of an image. If we use a greyscale bitmap image, which is 8- bit, we would need to read in the file and then add data to the least significant bits of each pixel, in every 8-bit pixel. In a greyscale image each pixel is represented by 1 byte consist of 8 bits. It can represent 256 gray colours between the black which is 0 to the white which is 255.The principle of encoding uses the Least Significant Bit of each of these bytes, the bit on the far right side. If data is encoded to only the last two significant bits (which are the first and second LSB) of each colour component it is most likely not going to be 1839 | P a g e
  • 4. Vaishali Ghune Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1837-1840 detectable; the human retina becomes the limiting factor in viewing pictures[10]. V. Conclusion This paper has presented a three digital watermarking techniques DCT, DWT and LSB. Embedding digital watermark and extracting digital watermark methods is DCT-based approach.After use this algorithm the result show that the quality of the watermarked image is higher. These algorithms apply for the image compression of original or digital image. The values of all particular point after image compression are compare based on the algorithm DCT, DWT and LSB. To increase the imperceptibility, the watermark image is adjusted by the weighted correction in the spatial domain.Here we present the comparision of PSNR value and NC factor The results of experiments have showed that the algorithm has better visibility and has stronger robustness when it is attacked by JPEG compression, cropping, contrast adjustments, filtering, noises and so on. [10] [11] [12] www.ijera.com Proceedings of the 2009International Symposium on Web Information Systems and Applications (WISA‟09) Nanchang, P. R. China, May 22-24, 2009, pp. 104-107. Chiou-Ting Hsu and Ja-Ling Wu.” Hidden Digital Watermarks in Images” Senior Member, IEEE. TRANSACTIONS ON IMAGE PROCESSING, VOL. 8, NO. 1, JANUARY. ”Digital watermarking for digital media” Juergen Seitz University of Cooperative Education Heidenheim, Germany. Gonzalez R, wood R”.Digital image processing”, published by Pearson Education. References [1] [2] [3] [4] [5] [6] [7] [8] [9] B. M. Macq and J. J. Quisquater, “Cryptology for digital TV broadcasting,”Proc. IEEE, vol. 83, pp. 954– 957, June 1995. I. Pitas and T. H. Kaskalis, “Applying signatures on digital images,” in Proc. IEEE Nonlinear Signal and Image Processing, June 1995, pp.460–463. O. Bruyndonckx, J. J. Quisquater, and B. Macq, “Spatial method for copyright labeling of digital images,” in Proc. IEEE Nonlinear Signal and Image Processing, June 1995, pp. 456–459. W. Bender, D. Gruhl, and N. Morimoto, “Techniques for data hiding,” Proc. SPIE, vol. 2420, p. 40, Feb. 1995. N.Nikolaidis, I.Pitas, "Robust image watermarking in the spatial domain," Signal Process, 66(1998) 385-403 Keshav S Rawat.”Digital watermarking schemes for authorization against copying or piracy of color images” Member, IEEE Keshav S Rawat et. al. / Indian Journal of Computer Science Vol. 1 No. 4 295-300 T.Jayamalar.‘‘Survey on Digital Video Watermarking Techniques and Attacks on Watermarks” International Journal of Engineering Science and Technology Vol. 2(12), 2010, 6963-6967 Kritika Singla. „„Invigible digital watermarking for color images” International Journal of advanced of engineering sciencs and technologies Vol No. 10, Issue No. 2, 270 – 274 Mei Jiansheng.” A Digital Watermarking Algorithm Based On DCT and DWT” www.ijera.com 1840 | P a g e