SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

TECHNOLOGY (IJCET)

ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 6, November - December (2013), pp. 347-354
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com

IJCET
©IAEME

COMPARATIVE ANALYSIS OF DIGITAL WATERMARKING BASED ON
EMBEDDING AND EXTRACTION TECHNIQUE
Mrs. Rashmi Soni1,

Dr. M.K. Gupta2

1

2

Research Scholar, Department of CSE, AISECT University, Bhopal
Research Supervisor, AISECT University & Professor, Department of ECE, MANIT, Bhopal

ABSTRACT
Digital watermarking knowledge is a leading edge research field and it mainly focuses on the
intellectual property rights, hides data and embedded inside an image to show authenticity or proof
of ownership, discovery and authentication of the digital media to protect the important documents.
Digital watermarking can help to verify ownership, to recognize a misappropriate person and find the
marked documents. One of the significant technological actions of the last two decades was the
attack of digital media in a complete range of everyday life aspects.
Digital data can be stored efficiently with a very high quality and it can be manipulated very
easily using computers. In addition digital data can be transmitted in a fast and inexpensive way
through data communication networks without losing quality. According to the necessary study of
digital image watermarking, the digital watermarking model consists of two modules, which are
watermark embedding module and watermark extraction and detection module.
Keywords: Digital watermarking, Digital image watermarking, Embedding, Extraction.
1. INTRODUCTION
The digital data can be transmitted in a fast and cheap way through data communication
networks not including losing quality. Digital media offer numerous different advantages over
analog media. The quality of digital audio, images and video signals are superior to that of their
analog counterparts. Editing is easy because one can allow the exact discrete locations that need to
be changed. Copying is easy with no loss of information and a copy of a digital media is related to
the original.
In case of watermarking, the digital multimedia distribution over World Wide Web,
Intellectual Property Rights (IPRs) are more in risky than ever due to the possibility of unlimited
copying. This difficulty can be handled by hiding some ownership data into the multimedia data,
347
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

which can be extracted afterwards to prove the ownership, a concept called “watermarking”.
Everyday, in general, a lot of data is embedded on digital media or spread over the internet. This
data, which include still images, video, audio, or text are stored and transmitted in a digital format
can be easily copied without loss of quality and well distributed [1].
The protection of intellectual property rights has become more and more important. Information
stored in digital format because of simplicity of reproduction, retransmission and even manipulation
allows a pirate either to get rid of a watermark and go against a copyright or to transmit the same
watermark after changing the data to copy the proof of authenticity [6]. The design of techniques for
preserving the ownership of digital information is in the beginning of the development of upcoming
multimedia services.
1.1 Digital Image Watermarking
Proof of ownership of data is done by embedding copyright statements.
Embedding

Watermarking

Detection

Data, Signature

Data, Signature

ID etc

ID etc

Fig1.1 Block Diagram of Digital Image Watermarking

As shown in figure1.1 for watermarking, embedding and detection mainly consist of a key,
digital data, signature id etc in which a key and digital data embeds watermarked digital data and a
key and digital data detects watermark. An existing scheme for still image watermarking in spatial
domain is studied. Watermark is embedded and retrieval of embedded watermark is easy in this way.
Cryptography can be used which ensures confidentiality, authenticity and integrity.
To explain the above figure of digital image watermarking more accurately, which consists of
elements of watermarking system that uses watermark signal, that passes through embedder which is
communicated with respect to channel & finally detection is done. Digital watermarking technology,
is directly related to information security, information hiding, cryptography and authentication
technologies, is a cutting edge research area of the international academic research in current years.
Currently, the quick development of network of information and e-commerce make digital
watermarking technology very important for all types of digital products protection, and its use is
becoming increasingly more widespread. All these place higher demands for people to plan an
enhanced watermarking algorithm. It must be common that digital watermarking technology
requirements to be mutual with these disciplines and technologies so as to oppose all kinds of attacks
and structure integrated solutions for digital products copyright protection. The requirement for this
type of technology can be predictable to grow extremely as businesses request to declare some
control over their property on the “freeness” Internet. Digital image watermarking methods can be
modeled as communication method involving an embedder and detector as shown in Figure1.2.

348
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

Cover Image

Watermarked
signal

Watermark
embedder

Stego
image

Watermark
detector

Detected
watermark
signal

Fig1.2 Basic Watermarking Method

2. VARIOUS DIGITAL WATERMARKING TECHNIQUES
2.1 Related to Document
Watermarking techniques can also be divided into four categories, according to the type of
document to be watermarked, as follows:
a) Image Watermarking: Image is watermarked using a main image, original mage and finally
image is then watermarked. This is used to hide the special information into the image and to later
detect and extract that special information for the author‘s ownership.
b) Audio watermarking: This application area is one of the most popular and happening issue due
to internet music, MP3.
c) Video watermarking: This adds watermark in the video stream to classify video applications. It
is the development of image watermarking. This method requires real time extraction and robustness
for compression.
d) Text watermarking: This adds watermark to the PDF, DOC and other text file to prevent the
changes made to text. The watermark is inserted in the font shape and the space between characters
and line spaces.
e) Graphic watermarking: It embeds the watermark to 2D or 3D computer generated graphics to
indicate the copyright.
2.2 Related to Human Perception
According to the human perception, the digital watermarks can be divided into 4 different
types: Visible watermark, Invisible-Semi fragile watermark, fragile watermark, robust watermark.
a) Visible watermark: This is a secondary transparent overlaid into the primary image. The
information is visible in the picture. Typically, the information is text or a logo, which identifies the
owner of the media.
b) Invisible watermark: There is technology available which can insert information into an image
which cannot be seen. We cannot prevent the theft of our images this way, but we can prove that the
image that was stolen was ours, which is almost as good.

349
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

c) Robust watermark: Embedded invisible watermarks. It prevents image processing or attacks
without affecting embedded watermark. It is against challenging based attack (e.g. noise addition to
images), mainly used in copy protection application.
d) Fragile Watermark: The fragile watermark is embedded in such a way that any manipulation or
modification of the image would change or destroy the watermark. Fragile watermarks are destroyed
by data manipulation, mainly used for tamper detection.
e) Semi Fragile Watermark: This is sensitive to signal modification containing feature of both
robust and fragile watermarks which provide data authentication. This, in nature, is robust against
user-level operation (e.g. image compression).
2.3 Related to Application Domain
According to application domain, source-based watermarks are desirable for ownership
identification or authentication where a single watermark identifies the owner. A source based
watermark could be used for authentication and to determine whether a received image or other
electronic data has been tampered.
The watermark could also be destination based where each distributed copy gets a single
watermark identifying the particular buyer. The destination based watermark could be used to trace
the buyer in the case of illegal reselling. This is used in fingerprinting.
2.4 Related to Watermarking Domain
Based on their embedding domain, watermarking schemes can be classified as follows:
a) Spatial Domain: The watermarking system directly alters the main data elements (like pixels in
an image) to hide the watermark data. Spatial domain digital watermarking algorithms directly load
the raw data into the original image [2]. Spatial watermarking can also be applied using color
separation. In this way, the watermark appears in only one of the color bands.
b) Frequency Domain: The watermarking system exchange the frequency transforms of data
elements to hide the watermark data. This has proved to be more robust than the spatial domain
watermarking. The aim is to embed the watermarks in the spectral coefficients of the image. The
most commonly used transforms are the Discrete Cosine Transform (DCT), Discrete Fourier
Transform (DFT), Discrete Wavelet Transform (DWT), the reason for watermarking in the
frequency domain is that the characteristics of the human visual system (HVS) are better captured by
the spectral coefficients [3].
c) Feature Domain: The watermarking system takes into account the region, boundary and object
characteristics. It presents better detection and recovery from attacks.
3. REQUIREMENTS OF DIGITAL WATERMARKING
The requirements of digital watermarking are:
There are a number of important characteristics that a watermark can exhibit. The most
important properties of digital watermarking techniques are transparency, robustness, security,
capacity, invert ability (reversibility) and complexity and possibility of verification.

350
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

a) Transparency: The quality of the embedded watermark should be clear and transparent. The
embedded watermark should not reduce the quality of the original image. It relates to the properties
of the human sensory. A translucent watermark never causes any type of quality loss.
b) Robustness: Robustness means resistance to blind, non-targeted changes, or common media
operations on basis of the requirements for watermark extraction [5].There are various types of
attack for destroying the watermark such as cropping, compression, scaling etc. The watermark
should be design in such a way that, it is invariant to all attacks. There are two major problems when
trying to guaranty robustness; the watermark must be still present in the media after the
transformation or it must be still possible for the watermark detector to detect it. When a signal is
distorted, its reliability is only preserved if it’s perceptually important region remain undamaged,
while perceptually unimportant regions might be extensively changed with little effect on reliability.
c) Security: Security describes whether the embedded watermarking information cannot be removed
beyond constant detection by targeted attacks based on a full awareness of the embedding algorithm
and the detector, except the key, and the knowledge of at least one watermarked data. Watermarking
security implies that the watermark should be difficult to remove or alter without damaging the host
signal. As all watermarking systems request to protect watermark information, without loss of
generality, watermarking security can be regarded as the ability to guarantee secrecy and integrity of
the watermark information, and resist malicious attacks [4].
d) Capacity: Capacity describes the maximum amount of data that can be embedded into image,
audio, video or text for suitable retrieval of watermark during extraction. Capacity describes how
many information bits can be embedded. It addresses also the opportunity of embedding multiple
watermarks in one document in parallel. Capacity requirement always struggle against two other
essential requirements, that is, imperceptibility and robustness. A higher capacity is usually obtained
at the cost of either robustness strength or imperceptibility.
e) Imperceptibility: watermark should not be visible to the viewer neither the watermark corrupt the
value of the content. The term imperceptible is widely used in this case. If a signal is accurately
imperceptible, then perceptually based lossy compression algorithms either introduce further changes
that jointly exceed the visibility threshold or avoid such a signal. It is then essential to expand
techniques that can be used to add imperceptible or unnoticeable watermark signals in perceptually
significant regions to oppose the effects of signal processing.
f) Modification and Multiple Watermarks: Altering a watermark can be done by either removing
the first watermark or then adding a new one, or inserting a second watermark. The first option goes
against the rule of tamper resistance, because it implies that a watermark is easily removable.
Allowing various watermarks to coexist is the ideal solution. There is, still a security problem
associated to the use of multiple watermarks. It means that watermarking security can be interpreted
as encryption security leading directly to the principle that it must be positioned mainly in the choice
of the embedded key. These allows insertion of multiple, independently noticeable watermarks in an
image.
g) Invertibility: Invertibility describes the chance to produce the original data during the watermark
retrieval. The optimization of the parameters is equally competitive and cannot be clearly done at the
same time. If we want to embed a large message, we cannot need large robustness at the same time.
A practical compromise is always a need. Hence, if robustness to strong distortion is an issue, the
message that can be reliably hidden must not be too long.
351
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

4. EMBEDDING AND EXTRACTION
Digital watermarking involves the ideas and theories of different subject coverage, such as
signal processing, cryptography, probability theory, network technology, algorithm design, and other
techniques [3].
Digital watermarking hides the copyright information into the digital data through certain
algorithm. The secret information to be embedded can be some text, author‘s serial number,
company logo, images with a number of special importance. This secret information is embedded to
the digital data (images, audio, and video) to guarantee the security, data authentication,
identification of owner and copyright protection. The watermark can be hidden in the digital data
either visibly or invisibly. The process of embedding the watermark requires modifying the original
image and in essence the watermarking process inserts a controlled amount of “distortion” in the
image. The recovery of this distortion allows the one to identify the owner of the image. Invisible or
transparent marks use the properties of the human visual system to minimize the perceptual
distortion in the watermarked image [7].
For a strong watermark embedding, a good watermarking technique is needed to be applied.
Watermark can be embedded either in spatial or frequency domain. Both the domains are different
and have their own pros and cons and are used in different situation.
4.1 Watermarking Algorithm
a) Embedding Algorithm
1. Generate ‘e’ with the secret key shared with the detector.
2. For each pixel i in image h
a) Calculate the secret dependency P (i) according to
P (i) = ∑ (e (i) ⊕ e (j)) (-1) e (j) h M (j)
j Є N (i)
where ⊕ denotes the (XOR) operation.

---------- (1)

b) Adjust h1 (i) so that the following equation holds
Parity (h (i) +P (i)) = e (i)

------------ (2)

Simple Digital watermarking is a technology in which a watermark (secret information) is
hidden in the digital media using an appropriate algorithm for the authentication and identification of
unique owner of the product. Outcome we get is watermarked image. Simple digital watermarking
technique consists of two modules watermark embedding module and watermark detection and
extraction module. Watermark embedding embeds the watermark into the original image using a key
[2]. The watermark embedding module is shown in Fig 4.1.
Key

Watermark
Watermark
embedded
Original works

module

Works with watermark
Fig 4.1 Watermark Embedding Module
352
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

b) Detection Algorithm
1. Generate ‘e’ with the secret key shared with the embedder.
2. For each pixel ‘p’,
a) Calculate the secret dependency P (i) from the received image h′ according to Eq (1)
b) Extract the watermark bit e′ (i) according to:
e′ (i) = Parity (h′ (i) +P (i))

----------- (3)

c) Calculate C(i) between e(i) and e'(i) using:
C (i) = 0 will be e (i) = e′ (i) or, 255 otherwise ---------- (4)
Watermark detection and extraction module is used to determine whether the data contains
specified watermark or the watermark can be extracted [2]. The watermark embedding module is
given in Fig 4.2.

Works to be
detected

Watermark

Key

detection
module

Original works

Watermark

Fig 4.2 Watermark Detection and Extraction Module

V. CONCLUSION
The beginning work carried out on digital watermarks has been described, including the brief
study of various watermarking schemes, requirements, techniques and its potential applications.
Some of the watermarking techniques carried out with their pros and cons have been discussed. It
firstly provided a general description of the attractive characteristics of digital watermarking system.
Various watermarking techniques are discussed in short with the possible applications of the
watermarking methodology. Finally, certain points are summarized based on embedding and
detection technique. Watermarking provides owner authentication.
REFERENCES
[1]
[2]

[3]

http://en.wikipedia.org/wiki/Digital_watermarking.
Jiang Xuehua, “Digital Watermarking and Its Application in Image Copyright Protection”,
International Conference on Intelligent Computation Technology and Automation, TBD
Changsha, China, 11-12 May 2010.
Manpreet Kaur, Sonia Jindal, Sunny Behl, “A Study of Digital image watermarking”, Vol 2,
Issue 2, Feb 2012.
353
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

[4]

C.-T. Li and F.M. Yang., “One-dimensional Neighborhood Forming Strategy for Fragile
Watermarking”, Journal of Electronic Imaging, Vol. 12, Issue No. 2, pp. 284-291, 2003.
[5] Ahmed Salma, Randa Atta, and Rawya Rizk, “A Robust Digital Image Watermarking
Technique Based on Wavelet Transform” IEEE International Conference on System
Engineering and Technology (ICSET), University of Technology, Mara (UTM),
Shah Alam, Malaysia, 2011.
[6] Liu J. and He X., “A Review Study on Digital Watermark, Information and Communication
Technologies”, International Conference (ICICT), pp. 337-341, 2005.
[7] R. B. Wolfgang, C. I. Podilchuk, and E. J. Delp, "Perceptual Watermarks for Digital Images
and Video", Proceedings of the IEEE, Vol. 87, No. 7, pp. 1108-1126, July 1999.
[8] Karimella Vikram, Dr. V. Murali Krishna, Dr. Shaik Abdul Muzeer and K. Narasimha,
“Invisible Water Marking within Media Files using State-of-the-Art Technology”,
International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3,
2012, pp. 1 - 8, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[9] N. R. Bamane, Dr. S. B. Patil, Prof. B. S. Patil and Prof. R. K. Undegaonkar, “Hybrid Video
Watermarking Technique by using DWT & PCA”, International Journal of Electronics and
Communication Engineering & Technology (IJECET), Volume 4, Issue 2, 2013,
pp. 172 - 179, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.
[10] G. B. Khatri and D. S. Chaudhari, “Digital Audio Watermarking Applications and
Techniques”, International Journal of Electronics and Communication Engineering &
Technology (IJECET), Volume 4, Issue 2, 2013, pp. 109 - 115, ISSN Print: 0976- 6464,
ISSN Online: 0976 –6472.

354

Weitere ähnliche Inhalte

Was ist angesagt?

Technical seminar
Technical seminarTechnical seminar
Technical seminar
10e11a0545
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
authority12
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Ankush Kr
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
rupareliab14
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
ncct
 

Was ist angesagt? (18)

Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
50120140504020 2
50120140504020 250120140504020 2
50120140504020 2
 

Andere mochten auch

30120130406024
3012013040602430120130406024
30120130406024
IAEME Publication
 

Andere mochten auch (8)

30120130406024
3012013040602430120130406024
30120130406024
 
30120130406022
3012013040602230120130406022
30120130406022
 
1. tutorial unity3d introducción
1.  tutorial unity3d introducción1.  tutorial unity3d introducción
1. tutorial unity3d introducción
 
2. tutorial unity3d-disparo
2.  tutorial unity3d-disparo2.  tutorial unity3d-disparo
2. tutorial unity3d-disparo
 
10120130406026
1012013040602610120130406026
10120130406026
 
Työmarkkinapoliittinen mielipideilmasto 2012
Työmarkkinapoliittinen mielipideilmasto 2012Työmarkkinapoliittinen mielipideilmasto 2012
Työmarkkinapoliittinen mielipideilmasto 2012
 
20320130406032
2032013040603220320130406032
20320130406032
 
20320130406020 2
20320130406020 220320130406020 2
20320130406020 2
 

Ähnlich wie 50120130406038

A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarking
ijsrd.com
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
Bharath
 

Ähnlich wie 50120130406038 (20)

1709 1715
1709 17151709 1715
1709 1715
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarking
 
B011110614
B011110614B011110614
B011110614
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking
 
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 

Mehr von IAEME Publication

A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 

Mehr von IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

50120130406038

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 6, November - December (2013), pp. 347-354 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET ©IAEME COMPARATIVE ANALYSIS OF DIGITAL WATERMARKING BASED ON EMBEDDING AND EXTRACTION TECHNIQUE Mrs. Rashmi Soni1, Dr. M.K. Gupta2 1 2 Research Scholar, Department of CSE, AISECT University, Bhopal Research Supervisor, AISECT University & Professor, Department of ECE, MANIT, Bhopal ABSTRACT Digital watermarking knowledge is a leading edge research field and it mainly focuses on the intellectual property rights, hides data and embedded inside an image to show authenticity or proof of ownership, discovery and authentication of the digital media to protect the important documents. Digital watermarking can help to verify ownership, to recognize a misappropriate person and find the marked documents. One of the significant technological actions of the last two decades was the attack of digital media in a complete range of everyday life aspects. Digital data can be stored efficiently with a very high quality and it can be manipulated very easily using computers. In addition digital data can be transmitted in a fast and inexpensive way through data communication networks without losing quality. According to the necessary study of digital image watermarking, the digital watermarking model consists of two modules, which are watermark embedding module and watermark extraction and detection module. Keywords: Digital watermarking, Digital image watermarking, Embedding, Extraction. 1. INTRODUCTION The digital data can be transmitted in a fast and cheap way through data communication networks not including losing quality. Digital media offer numerous different advantages over analog media. The quality of digital audio, images and video signals are superior to that of their analog counterparts. Editing is easy because one can allow the exact discrete locations that need to be changed. Copying is easy with no loss of information and a copy of a digital media is related to the original. In case of watermarking, the digital multimedia distribution over World Wide Web, Intellectual Property Rights (IPRs) are more in risky than ever due to the possibility of unlimited copying. This difficulty can be handled by hiding some ownership data into the multimedia data, 347
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME which can be extracted afterwards to prove the ownership, a concept called “watermarking”. Everyday, in general, a lot of data is embedded on digital media or spread over the internet. This data, which include still images, video, audio, or text are stored and transmitted in a digital format can be easily copied without loss of quality and well distributed [1]. The protection of intellectual property rights has become more and more important. Information stored in digital format because of simplicity of reproduction, retransmission and even manipulation allows a pirate either to get rid of a watermark and go against a copyright or to transmit the same watermark after changing the data to copy the proof of authenticity [6]. The design of techniques for preserving the ownership of digital information is in the beginning of the development of upcoming multimedia services. 1.1 Digital Image Watermarking Proof of ownership of data is done by embedding copyright statements. Embedding Watermarking Detection Data, Signature Data, Signature ID etc ID etc Fig1.1 Block Diagram of Digital Image Watermarking As shown in figure1.1 for watermarking, embedding and detection mainly consist of a key, digital data, signature id etc in which a key and digital data embeds watermarked digital data and a key and digital data detects watermark. An existing scheme for still image watermarking in spatial domain is studied. Watermark is embedded and retrieval of embedded watermark is easy in this way. Cryptography can be used which ensures confidentiality, authenticity and integrity. To explain the above figure of digital image watermarking more accurately, which consists of elements of watermarking system that uses watermark signal, that passes through embedder which is communicated with respect to channel & finally detection is done. Digital watermarking technology, is directly related to information security, information hiding, cryptography and authentication technologies, is a cutting edge research area of the international academic research in current years. Currently, the quick development of network of information and e-commerce make digital watermarking technology very important for all types of digital products protection, and its use is becoming increasingly more widespread. All these place higher demands for people to plan an enhanced watermarking algorithm. It must be common that digital watermarking technology requirements to be mutual with these disciplines and technologies so as to oppose all kinds of attacks and structure integrated solutions for digital products copyright protection. The requirement for this type of technology can be predictable to grow extremely as businesses request to declare some control over their property on the “freeness” Internet. Digital image watermarking methods can be modeled as communication method involving an embedder and detector as shown in Figure1.2. 348
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME Cover Image Watermarked signal Watermark embedder Stego image Watermark detector Detected watermark signal Fig1.2 Basic Watermarking Method 2. VARIOUS DIGITAL WATERMARKING TECHNIQUES 2.1 Related to Document Watermarking techniques can also be divided into four categories, according to the type of document to be watermarked, as follows: a) Image Watermarking: Image is watermarked using a main image, original mage and finally image is then watermarked. This is used to hide the special information into the image and to later detect and extract that special information for the author‘s ownership. b) Audio watermarking: This application area is one of the most popular and happening issue due to internet music, MP3. c) Video watermarking: This adds watermark in the video stream to classify video applications. It is the development of image watermarking. This method requires real time extraction and robustness for compression. d) Text watermarking: This adds watermark to the PDF, DOC and other text file to prevent the changes made to text. The watermark is inserted in the font shape and the space between characters and line spaces. e) Graphic watermarking: It embeds the watermark to 2D or 3D computer generated graphics to indicate the copyright. 2.2 Related to Human Perception According to the human perception, the digital watermarks can be divided into 4 different types: Visible watermark, Invisible-Semi fragile watermark, fragile watermark, robust watermark. a) Visible watermark: This is a secondary transparent overlaid into the primary image. The information is visible in the picture. Typically, the information is text or a logo, which identifies the owner of the media. b) Invisible watermark: There is technology available which can insert information into an image which cannot be seen. We cannot prevent the theft of our images this way, but we can prove that the image that was stolen was ours, which is almost as good. 349
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME c) Robust watermark: Embedded invisible watermarks. It prevents image processing or attacks without affecting embedded watermark. It is against challenging based attack (e.g. noise addition to images), mainly used in copy protection application. d) Fragile Watermark: The fragile watermark is embedded in such a way that any manipulation or modification of the image would change or destroy the watermark. Fragile watermarks are destroyed by data manipulation, mainly used for tamper detection. e) Semi Fragile Watermark: This is sensitive to signal modification containing feature of both robust and fragile watermarks which provide data authentication. This, in nature, is robust against user-level operation (e.g. image compression). 2.3 Related to Application Domain According to application domain, source-based watermarks are desirable for ownership identification or authentication where a single watermark identifies the owner. A source based watermark could be used for authentication and to determine whether a received image or other electronic data has been tampered. The watermark could also be destination based where each distributed copy gets a single watermark identifying the particular buyer. The destination based watermark could be used to trace the buyer in the case of illegal reselling. This is used in fingerprinting. 2.4 Related to Watermarking Domain Based on their embedding domain, watermarking schemes can be classified as follows: a) Spatial Domain: The watermarking system directly alters the main data elements (like pixels in an image) to hide the watermark data. Spatial domain digital watermarking algorithms directly load the raw data into the original image [2]. Spatial watermarking can also be applied using color separation. In this way, the watermark appears in only one of the color bands. b) Frequency Domain: The watermarking system exchange the frequency transforms of data elements to hide the watermark data. This has proved to be more robust than the spatial domain watermarking. The aim is to embed the watermarks in the spectral coefficients of the image. The most commonly used transforms are the Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), Discrete Wavelet Transform (DWT), the reason for watermarking in the frequency domain is that the characteristics of the human visual system (HVS) are better captured by the spectral coefficients [3]. c) Feature Domain: The watermarking system takes into account the region, boundary and object characteristics. It presents better detection and recovery from attacks. 3. REQUIREMENTS OF DIGITAL WATERMARKING The requirements of digital watermarking are: There are a number of important characteristics that a watermark can exhibit. The most important properties of digital watermarking techniques are transparency, robustness, security, capacity, invert ability (reversibility) and complexity and possibility of verification. 350
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME a) Transparency: The quality of the embedded watermark should be clear and transparent. The embedded watermark should not reduce the quality of the original image. It relates to the properties of the human sensory. A translucent watermark never causes any type of quality loss. b) Robustness: Robustness means resistance to blind, non-targeted changes, or common media operations on basis of the requirements for watermark extraction [5].There are various types of attack for destroying the watermark such as cropping, compression, scaling etc. The watermark should be design in such a way that, it is invariant to all attacks. There are two major problems when trying to guaranty robustness; the watermark must be still present in the media after the transformation or it must be still possible for the watermark detector to detect it. When a signal is distorted, its reliability is only preserved if it’s perceptually important region remain undamaged, while perceptually unimportant regions might be extensively changed with little effect on reliability. c) Security: Security describes whether the embedded watermarking information cannot be removed beyond constant detection by targeted attacks based on a full awareness of the embedding algorithm and the detector, except the key, and the knowledge of at least one watermarked data. Watermarking security implies that the watermark should be difficult to remove or alter without damaging the host signal. As all watermarking systems request to protect watermark information, without loss of generality, watermarking security can be regarded as the ability to guarantee secrecy and integrity of the watermark information, and resist malicious attacks [4]. d) Capacity: Capacity describes the maximum amount of data that can be embedded into image, audio, video or text for suitable retrieval of watermark during extraction. Capacity describes how many information bits can be embedded. It addresses also the opportunity of embedding multiple watermarks in one document in parallel. Capacity requirement always struggle against two other essential requirements, that is, imperceptibility and robustness. A higher capacity is usually obtained at the cost of either robustness strength or imperceptibility. e) Imperceptibility: watermark should not be visible to the viewer neither the watermark corrupt the value of the content. The term imperceptible is widely used in this case. If a signal is accurately imperceptible, then perceptually based lossy compression algorithms either introduce further changes that jointly exceed the visibility threshold or avoid such a signal. It is then essential to expand techniques that can be used to add imperceptible or unnoticeable watermark signals in perceptually significant regions to oppose the effects of signal processing. f) Modification and Multiple Watermarks: Altering a watermark can be done by either removing the first watermark or then adding a new one, or inserting a second watermark. The first option goes against the rule of tamper resistance, because it implies that a watermark is easily removable. Allowing various watermarks to coexist is the ideal solution. There is, still a security problem associated to the use of multiple watermarks. It means that watermarking security can be interpreted as encryption security leading directly to the principle that it must be positioned mainly in the choice of the embedded key. These allows insertion of multiple, independently noticeable watermarks in an image. g) Invertibility: Invertibility describes the chance to produce the original data during the watermark retrieval. The optimization of the parameters is equally competitive and cannot be clearly done at the same time. If we want to embed a large message, we cannot need large robustness at the same time. A practical compromise is always a need. Hence, if robustness to strong distortion is an issue, the message that can be reliably hidden must not be too long. 351
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME 4. EMBEDDING AND EXTRACTION Digital watermarking involves the ideas and theories of different subject coverage, such as signal processing, cryptography, probability theory, network technology, algorithm design, and other techniques [3]. Digital watermarking hides the copyright information into the digital data through certain algorithm. The secret information to be embedded can be some text, author‘s serial number, company logo, images with a number of special importance. This secret information is embedded to the digital data (images, audio, and video) to guarantee the security, data authentication, identification of owner and copyright protection. The watermark can be hidden in the digital data either visibly or invisibly. The process of embedding the watermark requires modifying the original image and in essence the watermarking process inserts a controlled amount of “distortion” in the image. The recovery of this distortion allows the one to identify the owner of the image. Invisible or transparent marks use the properties of the human visual system to minimize the perceptual distortion in the watermarked image [7]. For a strong watermark embedding, a good watermarking technique is needed to be applied. Watermark can be embedded either in spatial or frequency domain. Both the domains are different and have their own pros and cons and are used in different situation. 4.1 Watermarking Algorithm a) Embedding Algorithm 1. Generate ‘e’ with the secret key shared with the detector. 2. For each pixel i in image h a) Calculate the secret dependency P (i) according to P (i) = ∑ (e (i) ⊕ e (j)) (-1) e (j) h M (j) j Є N (i) where ⊕ denotes the (XOR) operation. ---------- (1) b) Adjust h1 (i) so that the following equation holds Parity (h (i) +P (i)) = e (i) ------------ (2) Simple Digital watermarking is a technology in which a watermark (secret information) is hidden in the digital media using an appropriate algorithm for the authentication and identification of unique owner of the product. Outcome we get is watermarked image. Simple digital watermarking technique consists of two modules watermark embedding module and watermark detection and extraction module. Watermark embedding embeds the watermark into the original image using a key [2]. The watermark embedding module is shown in Fig 4.1. Key Watermark Watermark embedded Original works module Works with watermark Fig 4.1 Watermark Embedding Module 352
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME b) Detection Algorithm 1. Generate ‘e’ with the secret key shared with the embedder. 2. For each pixel ‘p’, a) Calculate the secret dependency P (i) from the received image h′ according to Eq (1) b) Extract the watermark bit e′ (i) according to: e′ (i) = Parity (h′ (i) +P (i)) ----------- (3) c) Calculate C(i) between e(i) and e'(i) using: C (i) = 0 will be e (i) = e′ (i) or, 255 otherwise ---------- (4) Watermark detection and extraction module is used to determine whether the data contains specified watermark or the watermark can be extracted [2]. The watermark embedding module is given in Fig 4.2. Works to be detected Watermark Key detection module Original works Watermark Fig 4.2 Watermark Detection and Extraction Module V. CONCLUSION The beginning work carried out on digital watermarks has been described, including the brief study of various watermarking schemes, requirements, techniques and its potential applications. Some of the watermarking techniques carried out with their pros and cons have been discussed. It firstly provided a general description of the attractive characteristics of digital watermarking system. Various watermarking techniques are discussed in short with the possible applications of the watermarking methodology. Finally, certain points are summarized based on embedding and detection technique. Watermarking provides owner authentication. REFERENCES [1] [2] [3] http://en.wikipedia.org/wiki/Digital_watermarking. Jiang Xuehua, “Digital Watermarking and Its Application in Image Copyright Protection”, International Conference on Intelligent Computation Technology and Automation, TBD Changsha, China, 11-12 May 2010. Manpreet Kaur, Sonia Jindal, Sunny Behl, “A Study of Digital image watermarking”, Vol 2, Issue 2, Feb 2012. 353
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME [4] C.-T. Li and F.M. Yang., “One-dimensional Neighborhood Forming Strategy for Fragile Watermarking”, Journal of Electronic Imaging, Vol. 12, Issue No. 2, pp. 284-291, 2003. [5] Ahmed Salma, Randa Atta, and Rawya Rizk, “A Robust Digital Image Watermarking Technique Based on Wavelet Transform” IEEE International Conference on System Engineering and Technology (ICSET), University of Technology, Mara (UTM), Shah Alam, Malaysia, 2011. [6] Liu J. and He X., “A Review Study on Digital Watermark, Information and Communication Technologies”, International Conference (ICICT), pp. 337-341, 2005. [7] R. B. Wolfgang, C. I. Podilchuk, and E. J. Delp, "Perceptual Watermarks for Digital Images and Video", Proceedings of the IEEE, Vol. 87, No. 7, pp. 1108-1126, July 1999. [8] Karimella Vikram, Dr. V. Murali Krishna, Dr. Shaik Abdul Muzeer and K. Narasimha, “Invisible Water Marking within Media Files using State-of-the-Art Technology”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012, pp. 1 - 8, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [9] N. R. Bamane, Dr. S. B. Patil, Prof. B. S. Patil and Prof. R. K. Undegaonkar, “Hybrid Video Watermarking Technique by using DWT & PCA”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 4, Issue 2, 2013, pp. 172 - 179, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. [10] G. B. Khatri and D. S. Chaudhari, “Digital Audio Watermarking Applications and Techniques”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 4, Issue 2, 2013, pp. 109 - 115, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. 354