As the internet users are increasing day by day it is easy to transfer digital data. By this new
problem of data piracy is increasing. For this different methods of watermarking are developed for
protecting the digital data like video, audio, image, etc. Out of these many researcher are working on
image watermarking field from last few decades. This paper focus on the image watermarking features
combination with various techniques which are broadly categorized into spatial and frequency domain.
Many features are studied with their different requirement and functionality. It has been observed that
most of the researcher combines many features for achieving the prior goal of the watermark that is to
embed watermark and extract from the carrier image in presence of different attack.
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH acijjournal
Image watermarking has come to wide use in the recent past. It is by the authentication problems and limitation means that the setting accuracy of the image watermarking operation is minimized. Different types of integration schemes have been proposed in the past to improve efficiency and makes the
embedding resistant against various attacks .Although transformation, spatial domain approaches have been developed PSNR improvements in image artifacts due to the fringes are still to be observed. To improvise the embedding, image artifacts in this paper a forward – based image embedding scheme is proposed.
Iaetsd literature review on generic lossless visible watermarking &Iaetsd Iaetsd
This document discusses literature on lossless visible watermarking and lossless image recovery. It begins by introducing digital watermarking and classifying methods as visible or invisible. Reversible watermarking allows removal of embedded watermarks and restoration of the original content. The document then reviews existing watermarking techniques in the spatial, frequency and wavelet domains. It proposes a novel method for generic visible watermarking using deterministic one-to-one compound mappings that are reversible, allowing lossless recovery of original images from watermarked images. This approach can embed various visible watermarks of arbitrary sizes into images in a lossless manner.
Lsb Based Digital Image Watermarking For Gray Scale ImageIOSR Journals
The document describes a technique for watermarking grayscale images using the least significant bit (LSB) method. It begins with an abstract that introduces digital watermarking and LSB watermarking. It then provides more details on the LSB algorithm and how it embeds a watermark by replacing the LSB of selected image pixels. The paper tests the technique on various images, embedding the watermark in different bit positions. It calculates the mean squared error and peak signal-to-noise ratio for the watermarked images. Finally, it applies different noise attacks to the watermarked images and measures the effect on quality.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
The segmentation algorithms vary for the types of medical images such as MRI, CT, US, etc.The current study work
can further be extended to develop a GUI tool based approach for separating the ROI. Additionally, a new technique of
separating ROI form the original image that will be applicable for all type of medical images can be evolved. Separated ROI
can be stored with xmin, xmax, ymin and ymax value so that at the end of embedding process before transmitting watermarked
image, the segmented ROI can be attached with watermarked image. Any medical image watermarking approach will be
suitable, if we segment the ROI from medical image with the four values, then embedding of watermark can be done on whole
medical image, in this paper work on different scan like ctscan ,brain scan etc. our results significant high than other.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...ijistjournal
1) The document discusses a method for preventing copyright infringement of images using watermarking in the transform domain and a full counter propagation neural network.
2) It aims to encode the host image before watermark embedding to enhance security. The fast and effective full counter propagation neural network then helps successfully embed the watermark without deteriorating the image quality.
3) Previous techniques embedded watermarks directly in images, but the authors find neural network synapses provide a better way to reduce distortion and increase message capacity when embedding watermarks.
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...IOSRJVSP
One of the biggest and important issues in the video watermarking is the distortion and attacks. The attacks and distortion affect the digital watermarking. Watermarking is an embedding process. With the help of watermarking, we insert the data into the digital objects. There are few methods are available for authentication of data, securing/protection of data. The watermarking technique also provides the data security, copyright protection and authentication of the data. Watermarking provides a comfortable life to authorized users. In my proposed work, we are working on distorted watermarked video. The distortion is present on the watermarked video is rational 7 th and 8 th order distortion model. In this paper, firstly we are embedding the watermark information into the original video and after that work on the distortion model which may be come into the watermarked video. We are also calculating the PSNR (Peak signal to noise ratio), SSIM (Structural similarity index measure), Correlation, BER (Bit Error Rate) and MSE (Mean Square Error) parameters for distorted watermarked video. We are showing the relationship between correlation and SSIM with BER, MSE and PSNR.
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH acijjournal
Image watermarking has come to wide use in the recent past. It is by the authentication problems and limitation means that the setting accuracy of the image watermarking operation is minimized. Different types of integration schemes have been proposed in the past to improve efficiency and makes the
embedding resistant against various attacks .Although transformation, spatial domain approaches have been developed PSNR improvements in image artifacts due to the fringes are still to be observed. To improvise the embedding, image artifacts in this paper a forward – based image embedding scheme is proposed.
Iaetsd literature review on generic lossless visible watermarking &Iaetsd Iaetsd
This document discusses literature on lossless visible watermarking and lossless image recovery. It begins by introducing digital watermarking and classifying methods as visible or invisible. Reversible watermarking allows removal of embedded watermarks and restoration of the original content. The document then reviews existing watermarking techniques in the spatial, frequency and wavelet domains. It proposes a novel method for generic visible watermarking using deterministic one-to-one compound mappings that are reversible, allowing lossless recovery of original images from watermarked images. This approach can embed various visible watermarks of arbitrary sizes into images in a lossless manner.
Lsb Based Digital Image Watermarking For Gray Scale ImageIOSR Journals
The document describes a technique for watermarking grayscale images using the least significant bit (LSB) method. It begins with an abstract that introduces digital watermarking and LSB watermarking. It then provides more details on the LSB algorithm and how it embeds a watermark by replacing the LSB of selected image pixels. The paper tests the technique on various images, embedding the watermark in different bit positions. It calculates the mean squared error and peak signal-to-noise ratio for the watermarked images. Finally, it applies different noise attacks to the watermarked images and measures the effect on quality.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
The segmentation algorithms vary for the types of medical images such as MRI, CT, US, etc.The current study work
can further be extended to develop a GUI tool based approach for separating the ROI. Additionally, a new technique of
separating ROI form the original image that will be applicable for all type of medical images can be evolved. Separated ROI
can be stored with xmin, xmax, ymin and ymax value so that at the end of embedding process before transmitting watermarked
image, the segmented ROI can be attached with watermarked image. Any medical image watermarking approach will be
suitable, if we segment the ROI from medical image with the four values, then embedding of watermark can be done on whole
medical image, in this paper work on different scan like ctscan ,brain scan etc. our results significant high than other.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...ijistjournal
1) The document discusses a method for preventing copyright infringement of images using watermarking in the transform domain and a full counter propagation neural network.
2) It aims to encode the host image before watermark embedding to enhance security. The fast and effective full counter propagation neural network then helps successfully embed the watermark without deteriorating the image quality.
3) Previous techniques embedded watermarks directly in images, but the authors find neural network synapses provide a better way to reduce distortion and increase message capacity when embedding watermarks.
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...IOSRJVSP
One of the biggest and important issues in the video watermarking is the distortion and attacks. The attacks and distortion affect the digital watermarking. Watermarking is an embedding process. With the help of watermarking, we insert the data into the digital objects. There are few methods are available for authentication of data, securing/protection of data. The watermarking technique also provides the data security, copyright protection and authentication of the data. Watermarking provides a comfortable life to authorized users. In my proposed work, we are working on distorted watermarked video. The distortion is present on the watermarked video is rational 7 th and 8 th order distortion model. In this paper, firstly we are embedding the watermark information into the original video and after that work on the distortion model which may be come into the watermarked video. We are also calculating the PSNR (Peak signal to noise ratio), SSIM (Structural similarity index measure), Correlation, BER (Bit Error Rate) and MSE (Mean Square Error) parameters for distorted watermarked video. We are showing the relationship between correlation and SSIM with BER, MSE and PSNR.
A novel attack detection technique to find attack in watermarked images with ...prjpublications
The document describes a novel technique for detecting attacks on watermarked images. The technique uses Peak Signal-to-Noise Ratio (PSNR) and RGB color intensity values to analyze differences between an original watermarked image and a tested watermarked image. If the PSNR value is above a threshold, the images are considered identical. Otherwise, RGB intensity levels are compared. A match suggests no attack, while a mismatch identifies an attacked image and the type of attack applied. The technique is demonstrated by hiding data in an image, applying attacks, and correctly detecting the attacks based on PSNR and RGB analyses. Evaluation shows the approach effectively identifies various watermark attacks.
The embedding of a digital signature, or tag data is carried out in the frequency domain. The
high frequency varieties are chosen by any LH and HL in the wavelet domain which are to be
applicable in DCT. Coefficients are changed mid-frequency DCT coefficients such transactions by a
low frequency of the watermark to be embedded. Watermark can be recovered from the video by
selecting a random watermark of any reference framework. The proposed techniques are more
secure, robust and are efficient due to the use of static DCT. Watermark techniques uses a bands HL
and LH for adding watermark where the movement does not impact the quality the extracted
watermark until if the video displays for different types of malware attacks.
In this work we have taken three video watermarking techniques i.e. BIT GET (spatial),
DWT, DCT and one video formats ie.MPEG video to perform a comparative analysis of different
techniques using single video formats, to obtain the best performing technique for video
watermarking. Such that to increase robustness of the video and decrease the embedding time
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...cscpconf
The rapid advancement of internet has made it easier to send the data/image accurate and
faster to the destination. Besides this, it is easier to modify and misuse the valuable information
through hacking at the same time. In order to transfer the data/image securely to the destination
without any modifications, there are many approaches like Cryptography, Watermarking and
Steganography. This paper presents the general overview of image watermarking and different
security issues. In this paper, Image Watermarking using Least Significant Bit (LSB) algorithm
has been used for embedding the message/logo into the image. This work has been implemented
through MATLAB
Realtime Energy Efficient Digital Image Watermarking on Mobile Devices using ...CSCJournals
This document summarizes a research paper that proposes a real-time and energy efficient image watermarking scheme for mobile devices using Android. The method uses a hybrid of discrete cosine transform (DCT) and discrete wavelet transform (DWT) along with extreme learning machine (ELM), a single layer feedforward neural network. Low frequency DCT coefficients of the Y component of captured color images are selected to generate a dataset for ELM, which produces a key for embedding watermark data like capture time, device ID, etc. Experiments show the process embeds and extracts watermarks in under a second, making it suitable for a mobile app. Analysis found the overall and LCD energy usage was 34.4J and 31.
Comparison of Wavelet Watermarking Method With & without Estimator Approachijsrd.com
1. The document compares a wavelet watermarking method with and without an estimator approach for improving robustness against noise attacks.
2. Using an M-estimator at extraction improves imperceptibility and robustness by estimating and rejecting outlier pixels caused by noise.
3. Statistical analysis on watermarked images subjected to noise attacks shows the estimator approach reduces MSE and increases PSNR and correlation, indicating superior extraction quality compared to the standard wavelet method without estimator.
This document summarizes a research paper on lossless reversible visible watermarking. It begins with an abstract that describes digital watermarking techniques and introduces a new approach for lossless reversible visible watermarking with robust security. It then provides a literature review of previous lossless invisible and visible watermarking techniques. The proposed technique aims to allow legitimate users to remove embedded watermarks and perfectly recover the original image content. Finally, it outlines the system architecture and provides a mathematical model for the watermark generation, embedding, and extraction processes.
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET Journal
The document proposes a reversible image data hiding scheme that operates in an encrypted domain. It embeds data through public key modulation without needing access to the secret encryption key. It uses a support vector machine classifier at the decoder to jointly decode the embedded message and reconstruct the original image by distinguishing encrypted from non-encrypted image patches. Experimental results on 100 test images validate that the proposed approach provides higher embedding capacity while perfectly reconstructing the original image and embedded message.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Image Authentication Using Digital Watermarkingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
here it introduces an efficient multi-resolution watermarking methodology for copyright protection of digital images. By adapting the watermark signal to the wavelet coefficients, the proposed method is highly image adaptive and the watermark signal can be strengthen in the most significant parts of the image. As this property also increases the watermark visibility, usage of the human visual system is incorporated to prevent perceptual visibility of embedded watermark signal. Experimental results show that the proposed system preserves the image quality and is vulnerable against most common image processing distortions. Furthermore, the hierarchical nature of wavelet transform allows for detection of watermark at various resolutions, resulting in reduction of the computational load needed for watermark detection based on the noise level. The performance of the proposed system is shown to be superior to that of other available schemes reported in the literature.
This document discusses an enhanced technique for secure and reliable watermarking using Modified Haar Wavelet Transform (MFHWT). The proposed technique embeds a watermark into an original image using discrete wavelet transform (DWT) and wavelet packet transform (WPT) according to the size of the watermark. MFHWT is a memory efficient, fast, and simple transform. The watermarking process involves embedding and extraction processes. Various watermarking techniques in different transform domains are discussed, including DWT and WPT. The proposed algorithm uses MFHWT for decomposition and reconstruction. Image quality is measured using metrics like MSE and PSNR, with higher PSNR indicating better quality. The technique achieves robustness
A review-on-digital-image-watermarking-techniquesEditor IJMTER
Due to the rapid expansion in internet technology copyright protection and data
authenticity are two major problems in handling digital multimedia. Watermarking is a very
important field for copyrights of various electronic documents and media. A variety of
techniques have been proposed for copyright protection of digital images which include
spatial domain and transform domain watermarking. This paper aims to provide some basic
concepts of digital image watermarking techniques and comparisons between them.
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...IJERA Editor
This document summarizes and compares various video watermarking techniques with a focus on their applicability to mobile devices. It first defines key properties of video watermarking like imperceptibility, robustness, capacity, security, and computational cost. It then classifies watermarking techniques into spatial domain, frequency domain, and spatio-frequency domain methods. Popular techniques discussed include DCT, DWT, SVD. The document surveys several proposed video watermarking methods and compares them based on robustness, imperceptibility, payload, and time complexity. It also surveys methods specifically designed for mobile devices, discussing challenges like limited resources and evaluating algorithms based on their energy and performance on mobile.
Developing and comparing an encoding system using vector quantization &IAEME Publication
Developing and comparing an encoding system using vector quantization and edge detection for image and video compression. Downsample methods provide higher compression ratios and better edge detection compared to Haar transforms, with encoding times of microseconds for images versus seconds for Haar. Edge detection on compressed videos and images shows compression is effective at preserving edges. Compression ratios increased up to 99.67% with downsample versus 75% for Haar, with downsample providing more accurate edge detection. The encoding system applies vector quantization for lossy data compression and edge detection techniques to evaluate compression quality.
Towards Optimal Copyright Protection Using Neural Networks Based Digital Imag...rahulmonikasharma
In the field of digital watermarking, digital image watermarking for copyright protection has attracted a lot of attention in the research community. Digital watermarking contains varies techniques for protecting the digital content. Among all those techniques,Discrete Wavelet Transform (DWT) provides higher image imperceptibility and robustness. Over the years, researchers have been designing watermarking techniques with robustness in mind, in order for the watermark to be resistant against any image processing techniques. Furthermore, the requirements of a good watermarking technique includes a tradeoff between robustness, image quality (imperceptibility) and capacity. In this paper, we have done an extensive literature review for the existing DWT techniques and those combined with other techniques such as Neural Networks. In addition to that, we have discuss the contribution of Neural Networks in copyright protection. Finally we reached our goal in which we identified the research gaps existed in the current watermarking schemes. So that, it will be easily to obtain an optimal techniques to make the watermark object robust to attacks while maintaining the imperceptibility to enhance the copyright protection.
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
This paper aims at developing a hybrid image watermarking algorithm which satisfies both
imperceptibility and robustness requirements. In order to achieve our objectives we have used
singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark.
Further to increase and control the strength of the watermark, we use a scale factor. An optimal
watermark embedding method is developed to achieve minimum watermarking distortion. A
secret embedding key is designed to securely embed the fragile watermarks so that the new
method is robust to counterfeiting, even when the malicious attackers are fully aware of the
watermark embedding algorithm. Experimental results are provided in terms of Peak signal to
noise ratio (PSNR), Normalized cross correlation (NCC) and gain factor to demonstrate the
effectiveness of the proposed algorithm. Image operations such as JPEG compression from
malicious image attacks and, thus, can be used for semi-fragile watermarking
Digital image copyright protection based on visual cryptographyinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...P singh
The document discusses a proposed method for video watermarking that uses spatial and frequency domain techniques for embedding watermark information, and tests the method's robustness against rational 6th order distortion. The key steps are: (1) extracting frames from a video and selecting the highest entropy frame, (2) using spread spectrum and LSB techniques to embed a watermark in the spatial domain and DWT in the frequency domain, (3) applying rational 6th order distortion to test the effect on the watermarked video, (4) calculating metrics like correlation, SSIM, PSNR, BER and MSE to evaluate the method and detect the watermark from the distorted video. The results show the values of correlation and SSIM
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET Journal
This document summarizes and compares various reversible watermarking techniques for image security. It discusses how reversible watermarking allows a watermark to be fully extracted from an image while also restoring the original cover image. The document reviews early techniques that used modulo addition and later techniques that improved imperceptibility by compressing image bits. It categorizes reversible techniques into data compression, difference expansion, and histogram shifting methods. Comparisons of techniques are presented to improve understanding of advances in reversible watermarking for image security.
Comparison of Invisible Digital Watermarking Techniques for its RobustnessIRJET Journal
This document compares two digital image watermarking techniques, discrete cosine transform (DCT) and discrete wavelet transform (DWT), to analyze their robustness. The techniques are implemented in MATLAB to embed a watermark into an original image. Various attacks are performed on the watermarked images and the correlation between the original and extracted watermarks is calculated. The results show that the DWT technique maintains a higher correlation than DCT after attacks like JPEG compression, indicating it is more robust to distortions.
A Review of Digital Watermarking Technique for the Copyright Protection of Di...IRJET Journal
This document reviews digital watermarking techniques for copyright protection of digital data using transform functions. It discusses how transform-based watermarking systems like discrete wavelet transform and discrete cosine transform are robust against many attacks but are vulnerable to geometric attacks like rotation and noise attacks. The document provides an overview of different watermarking types and reviews several related works on digital watermarking techniques. It also discusses various types of attacks on watermarks like subtractive attacks aimed at detecting and extracting the watermark and distortive attacks that apply transformations to degrade the watermark.
A Quick Glance over the Digital Watermarkingijsrd.com
Digital watermarking is a process for modifying physical or electronic media to embed a machine-readable code into the media. The media may be modified such that the embedded code is imperceptible or nearly imperceptible to the user, yet may be detected through an automated detection process. Watermarking is the art of imperceptibly embedding a message into a work. More than 700 years ago in Fabriano (Italy), paper watermarks appeared in handmade paper, in order to identify its provenance, format, and quality. In this context, the watermark is a kind of invisible signature that allows identifying the creator or the owner of a document, and to detect possible copyright violations, and especially non-authorized copying [1]. More recently, different watermarking techniques and strategies have been proposed in order to solve a number of problems, ranging from the detection of content manipulations, to information hiding (steganography), to document usage tracing. In particular, the insertion of multiple watermarks to trace a document during its lifecycle is a very interesting and challenging application [1]. The main property of the proposed method is that it allows the insertion of multiple watermarks by different users, who sequentially come into play one after the other and do not need any extra information besides the public keys. This characteristic makes the present approach more attractive than previously available solutions.
A novel attack detection technique to find attack in watermarked images with ...prjpublications
The document describes a novel technique for detecting attacks on watermarked images. The technique uses Peak Signal-to-Noise Ratio (PSNR) and RGB color intensity values to analyze differences between an original watermarked image and a tested watermarked image. If the PSNR value is above a threshold, the images are considered identical. Otherwise, RGB intensity levels are compared. A match suggests no attack, while a mismatch identifies an attacked image and the type of attack applied. The technique is demonstrated by hiding data in an image, applying attacks, and correctly detecting the attacks based on PSNR and RGB analyses. Evaluation shows the approach effectively identifies various watermark attacks.
The embedding of a digital signature, or tag data is carried out in the frequency domain. The
high frequency varieties are chosen by any LH and HL in the wavelet domain which are to be
applicable in DCT. Coefficients are changed mid-frequency DCT coefficients such transactions by a
low frequency of the watermark to be embedded. Watermark can be recovered from the video by
selecting a random watermark of any reference framework. The proposed techniques are more
secure, robust and are efficient due to the use of static DCT. Watermark techniques uses a bands HL
and LH for adding watermark where the movement does not impact the quality the extracted
watermark until if the video displays for different types of malware attacks.
In this work we have taken three video watermarking techniques i.e. BIT GET (spatial),
DWT, DCT and one video formats ie.MPEG video to perform a comparative analysis of different
techniques using single video formats, to obtain the best performing technique for video
watermarking. Such that to increase robustness of the video and decrease the embedding time
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...cscpconf
The rapid advancement of internet has made it easier to send the data/image accurate and
faster to the destination. Besides this, it is easier to modify and misuse the valuable information
through hacking at the same time. In order to transfer the data/image securely to the destination
without any modifications, there are many approaches like Cryptography, Watermarking and
Steganography. This paper presents the general overview of image watermarking and different
security issues. In this paper, Image Watermarking using Least Significant Bit (LSB) algorithm
has been used for embedding the message/logo into the image. This work has been implemented
through MATLAB
Realtime Energy Efficient Digital Image Watermarking on Mobile Devices using ...CSCJournals
This document summarizes a research paper that proposes a real-time and energy efficient image watermarking scheme for mobile devices using Android. The method uses a hybrid of discrete cosine transform (DCT) and discrete wavelet transform (DWT) along with extreme learning machine (ELM), a single layer feedforward neural network. Low frequency DCT coefficients of the Y component of captured color images are selected to generate a dataset for ELM, which produces a key for embedding watermark data like capture time, device ID, etc. Experiments show the process embeds and extracts watermarks in under a second, making it suitable for a mobile app. Analysis found the overall and LCD energy usage was 34.4J and 31.
Comparison of Wavelet Watermarking Method With & without Estimator Approachijsrd.com
1. The document compares a wavelet watermarking method with and without an estimator approach for improving robustness against noise attacks.
2. Using an M-estimator at extraction improves imperceptibility and robustness by estimating and rejecting outlier pixels caused by noise.
3. Statistical analysis on watermarked images subjected to noise attacks shows the estimator approach reduces MSE and increases PSNR and correlation, indicating superior extraction quality compared to the standard wavelet method without estimator.
This document summarizes a research paper on lossless reversible visible watermarking. It begins with an abstract that describes digital watermarking techniques and introduces a new approach for lossless reversible visible watermarking with robust security. It then provides a literature review of previous lossless invisible and visible watermarking techniques. The proposed technique aims to allow legitimate users to remove embedded watermarks and perfectly recover the original image content. Finally, it outlines the system architecture and provides a mathematical model for the watermark generation, embedding, and extraction processes.
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET Journal
The document proposes a reversible image data hiding scheme that operates in an encrypted domain. It embeds data through public key modulation without needing access to the secret encryption key. It uses a support vector machine classifier at the decoder to jointly decode the embedded message and reconstruct the original image by distinguishing encrypted from non-encrypted image patches. Experimental results on 100 test images validate that the proposed approach provides higher embedding capacity while perfectly reconstructing the original image and embedded message.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Image Authentication Using Digital Watermarkingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
here it introduces an efficient multi-resolution watermarking methodology for copyright protection of digital images. By adapting the watermark signal to the wavelet coefficients, the proposed method is highly image adaptive and the watermark signal can be strengthen in the most significant parts of the image. As this property also increases the watermark visibility, usage of the human visual system is incorporated to prevent perceptual visibility of embedded watermark signal. Experimental results show that the proposed system preserves the image quality and is vulnerable against most common image processing distortions. Furthermore, the hierarchical nature of wavelet transform allows for detection of watermark at various resolutions, resulting in reduction of the computational load needed for watermark detection based on the noise level. The performance of the proposed system is shown to be superior to that of other available schemes reported in the literature.
This document discusses an enhanced technique for secure and reliable watermarking using Modified Haar Wavelet Transform (MFHWT). The proposed technique embeds a watermark into an original image using discrete wavelet transform (DWT) and wavelet packet transform (WPT) according to the size of the watermark. MFHWT is a memory efficient, fast, and simple transform. The watermarking process involves embedding and extraction processes. Various watermarking techniques in different transform domains are discussed, including DWT and WPT. The proposed algorithm uses MFHWT for decomposition and reconstruction. Image quality is measured using metrics like MSE and PSNR, with higher PSNR indicating better quality. The technique achieves robustness
A review-on-digital-image-watermarking-techniquesEditor IJMTER
Due to the rapid expansion in internet technology copyright protection and data
authenticity are two major problems in handling digital multimedia. Watermarking is a very
important field for copyrights of various electronic documents and media. A variety of
techniques have been proposed for copyright protection of digital images which include
spatial domain and transform domain watermarking. This paper aims to provide some basic
concepts of digital image watermarking techniques and comparisons between them.
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...IJERA Editor
This document summarizes and compares various video watermarking techniques with a focus on their applicability to mobile devices. It first defines key properties of video watermarking like imperceptibility, robustness, capacity, security, and computational cost. It then classifies watermarking techniques into spatial domain, frequency domain, and spatio-frequency domain methods. Popular techniques discussed include DCT, DWT, SVD. The document surveys several proposed video watermarking methods and compares them based on robustness, imperceptibility, payload, and time complexity. It also surveys methods specifically designed for mobile devices, discussing challenges like limited resources and evaluating algorithms based on their energy and performance on mobile.
Developing and comparing an encoding system using vector quantization &IAEME Publication
Developing and comparing an encoding system using vector quantization and edge detection for image and video compression. Downsample methods provide higher compression ratios and better edge detection compared to Haar transforms, with encoding times of microseconds for images versus seconds for Haar. Edge detection on compressed videos and images shows compression is effective at preserving edges. Compression ratios increased up to 99.67% with downsample versus 75% for Haar, with downsample providing more accurate edge detection. The encoding system applies vector quantization for lossy data compression and edge detection techniques to evaluate compression quality.
Towards Optimal Copyright Protection Using Neural Networks Based Digital Imag...rahulmonikasharma
In the field of digital watermarking, digital image watermarking for copyright protection has attracted a lot of attention in the research community. Digital watermarking contains varies techniques for protecting the digital content. Among all those techniques,Discrete Wavelet Transform (DWT) provides higher image imperceptibility and robustness. Over the years, researchers have been designing watermarking techniques with robustness in mind, in order for the watermark to be resistant against any image processing techniques. Furthermore, the requirements of a good watermarking technique includes a tradeoff between robustness, image quality (imperceptibility) and capacity. In this paper, we have done an extensive literature review for the existing DWT techniques and those combined with other techniques such as Neural Networks. In addition to that, we have discuss the contribution of Neural Networks in copyright protection. Finally we reached our goal in which we identified the research gaps existed in the current watermarking schemes. So that, it will be easily to obtain an optimal techniques to make the watermark object robust to attacks while maintaining the imperceptibility to enhance the copyright protection.
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
This paper aims at developing a hybrid image watermarking algorithm which satisfies both
imperceptibility and robustness requirements. In order to achieve our objectives we have used
singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark.
Further to increase and control the strength of the watermark, we use a scale factor. An optimal
watermark embedding method is developed to achieve minimum watermarking distortion. A
secret embedding key is designed to securely embed the fragile watermarks so that the new
method is robust to counterfeiting, even when the malicious attackers are fully aware of the
watermark embedding algorithm. Experimental results are provided in terms of Peak signal to
noise ratio (PSNR), Normalized cross correlation (NCC) and gain factor to demonstrate the
effectiveness of the proposed algorithm. Image operations such as JPEG compression from
malicious image attacks and, thus, can be used for semi-fragile watermarking
Digital image copyright protection based on visual cryptographyinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...P singh
The document discusses a proposed method for video watermarking that uses spatial and frequency domain techniques for embedding watermark information, and tests the method's robustness against rational 6th order distortion. The key steps are: (1) extracting frames from a video and selecting the highest entropy frame, (2) using spread spectrum and LSB techniques to embed a watermark in the spatial domain and DWT in the frequency domain, (3) applying rational 6th order distortion to test the effect on the watermarked video, (4) calculating metrics like correlation, SSIM, PSNR, BER and MSE to evaluate the method and detect the watermark from the distorted video. The results show the values of correlation and SSIM
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET Journal
This document summarizes and compares various reversible watermarking techniques for image security. It discusses how reversible watermarking allows a watermark to be fully extracted from an image while also restoring the original cover image. The document reviews early techniques that used modulo addition and later techniques that improved imperceptibility by compressing image bits. It categorizes reversible techniques into data compression, difference expansion, and histogram shifting methods. Comparisons of techniques are presented to improve understanding of advances in reversible watermarking for image security.
Comparison of Invisible Digital Watermarking Techniques for its RobustnessIRJET Journal
This document compares two digital image watermarking techniques, discrete cosine transform (DCT) and discrete wavelet transform (DWT), to analyze their robustness. The techniques are implemented in MATLAB to embed a watermark into an original image. Various attacks are performed on the watermarked images and the correlation between the original and extracted watermarks is calculated. The results show that the DWT technique maintains a higher correlation than DCT after attacks like JPEG compression, indicating it is more robust to distortions.
A Review of Digital Watermarking Technique for the Copyright Protection of Di...IRJET Journal
This document reviews digital watermarking techniques for copyright protection of digital data using transform functions. It discusses how transform-based watermarking systems like discrete wavelet transform and discrete cosine transform are robust against many attacks but are vulnerable to geometric attacks like rotation and noise attacks. The document provides an overview of different watermarking types and reviews several related works on digital watermarking techniques. It also discusses various types of attacks on watermarks like subtractive attacks aimed at detecting and extracting the watermark and distortive attacks that apply transformations to degrade the watermark.
A Quick Glance over the Digital Watermarkingijsrd.com
Digital watermarking is a process for modifying physical or electronic media to embed a machine-readable code into the media. The media may be modified such that the embedded code is imperceptible or nearly imperceptible to the user, yet may be detected through an automated detection process. Watermarking is the art of imperceptibly embedding a message into a work. More than 700 years ago in Fabriano (Italy), paper watermarks appeared in handmade paper, in order to identify its provenance, format, and quality. In this context, the watermark is a kind of invisible signature that allows identifying the creator or the owner of a document, and to detect possible copyright violations, and especially non-authorized copying [1]. More recently, different watermarking techniques and strategies have been proposed in order to solve a number of problems, ranging from the detection of content manipulations, to information hiding (steganography), to document usage tracing. In particular, the insertion of multiple watermarks to trace a document during its lifecycle is a very interesting and challenging application [1]. The main property of the proposed method is that it allows the insertion of multiple watermarks by different users, who sequentially come into play one after the other and do not need any extra information besides the public keys. This characteristic makes the present approach more attractive than previously available solutions.
27 5 jun17 28apr 15859 ammar final (edti ari baru))IAESIJEECS
The transition from analog technologies to digital technologies has increased the ever-growing concern for protection and authentication of digital content and data. Owners of digital content of any type are seeking and exploring new technologies for the protection of copyrighted multimedia content. Multimedia protection has become an issue in recent years, and to deal with this issue, researchers are continuously searching for and exploring new effective and efficient technologies. This thesis study has been prepared in order to increase the invisibility and durability of invisible watermarking by using the multilayer Discrete Wavelet Transform (DWT) in the frequency plane and embedding two marks into an image for the purpose of authentication and copyright when digital content travels through an unsecured channel. A novel watermarking algorithm has been proposed based on five active positions and on using two marks. In addition to the extraction process, watermarking images will be subjected to a set of attack tests. The evaluation criteria have been the bases of assessing the value of SNR, PNSR, MAE and RMSE for both the watermarking images and the watermarking images after attacks, followed by the invisibility of the watermarking being measured before and after the attacks. Our lab results show high robustness and high quality images obtaining value for both SNR and PNSR.
This document discusses a new approach to providing secure data transmission that combines digital watermarking and image compression techniques. Digital watermarking involves embedding hidden information in multimedia content like images, audio or video. The proposed approach uses discrete cosine transform (DCT) based watermarking combined with an improved adaptive Huffman encoding image compression algorithm. This combined technique aims to enhance security for data transmission while reducing storage space requirements compared to other compression methods.
This document discusses a proposed technique for secure data transmission that combines digital image watermarking and image compression. It begins with background information on digital watermarking, including its classifications, requirements, general system, and techniques such as spatial domain and frequency domain methods. It then provides an overview of image compression, including its benefits, techniques such as lossless and lossy compression, and common compression methods. The proposed technique embeds a watermark into an image using discrete cosine transform (DCT) based watermarking in the frequency domain. It then applies lossy image compression to the watermarked image using an improved adaptive Huffman coding algorithm. The goal is to achieve higher security for data transmission by combining these two techniques compared to
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...IRJET Journal
This document summarizes several techniques for adding watermarks to multimedia data for digital copyright protection. It first discusses how watermarking works and its applications, including owner identification, copy protection, and content authentication. It then reviews five specific papers on watermarking techniques: 1) Using discrete cosine transform, discrete Fourier transform, and discrete wavelet transform to watermark educational videos. 2) Using stationary wavelet transform for robust watermarking and hash functions for fragile watermarking of images. 3) An audio watermarking method using discrete wavelet transform and singular value decomposition that is robust against attacks. 4) An image encryption method combining Camellia cipher with a chaotic map. 5) Image encryption techniques using chaotic system hash
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
Gowtham.T ,Pradeep Kumar.G " Security Based Data Transfer and Privacy Storage through Watermark Detection ", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Digital watermarking has been proposed as a technology to ensure copyright protection by embedding an imperceptible, yet detectable signal in visual multimedia content such as images or video. In every field key aspect is the security Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service. Several attempts has been made for increasing the security related works and avoidance of data loss. Existing system had attain its solution up to its level where it can be further able to attain the parameter refinement. In this paper improvising factor been made on the successive compressive sensing reconstruction part and Peak Signal-to-Noise Ratio (PSNR).Another consideration factor is to increase (CS) rate through de-emphasize the effect of predictive variables that become uncorrelated with the measurement data which eliminates the need of (CS) reconstruction.
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
Digital watermarking is an essential technique to add hidden copyright notices or secret messages to digital audio, image, or image forms. In this paper we introduce a new approach for digital image watermarking for real time applications. We have successfully implemented the digital watermarking technique on digital images based on 2-level Discrete Wavelet Transform and compared the performance of the proposed method with Level-1 and Level-2 and Level-3 Discrete Wavelet Transform using the parameter peak signal to noise ratio. To make the watermark robust and to preserve visual significant information a 2-Level Discrete wavelet transform used as transformation domain for both secret image and original image. The watermark is embedded in the original image using Alpha blending technique and implemented using Matlab Simulink.
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
The rapid advancement of internet has made it easier to send the data/image accurate and faster to the destination. But thisadvantage is also accompanied with the disadvantage of modifying and misusing the valuable information through intercepting or hacking.So In order to transfer the data/image to the intended user at destination without anyalterations or modifications, there are many approaches like Cryptography, Watermarking and Steganography. This paper presents the general overview of image watermarking and different security issues. In this paper, Image Watermarking using Least Significant Bit (LSB) algorithm has been used for embedding the message/logo into the image. This work has been implemented through MATLAB.
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
The rapid advancement of internet has made it easier to send the data/image accurate and faster to the destination. But thisadvantage is also accompanied with the disadvantage of modifying and misusing the valuable information through intercepting or hacking.So In order to transfer the data/image to the intended user at destination without anyalterations or modifications, there are many approaches like Cryptography, Watermarking and Steganography. This paper presents the general overview of image watermarking and different security issues. In this paper, Image Watermarking using Least Significant Bit (LSB) algorithm has been used for embedding the message/logo into the image. This work has been implemented through MATLAB.
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...IRJET Journal
This document proposes an optimized security method for transmitting images over networks that combines watermarking, steganography, and embedding another image within the host image. The method works by first watermarking the host image in both its image and text form to obscure it. Then another image is embedded within the watermarked host image as a carrier, providing another layer of security. This combined output image is then transmitted to the receiver, who can extract both the original host image and watermark text using extraction techniques. The goal of this optimized approach is to provide stronger security and resistance to unauthorized access during transmission compared to prior individual techniques.
Digital watermarking knowledge is a leading edge research field and it mainly focuses on the
intellectual property rights, hides data and embedded inside an image to show authenticity or proof
of ownership, discovery and authentication of the digital media to protect the important documents.
Digital watermarking can help to verify ownership, to recognize a misappropriate person and find the
marked documents. One of the significant technological actions of the last two decades was the
attack of digital media in a complete range of everyday life aspects.
Digital data can be stored efficiently with a very high quality and it can be manipulated very
easily using computers. In addition digital data can be transmitted in a fast and inexpensive way
through data communication networks without losing quality. According to the necessary study of
digital image watermarking, the digital watermarking model consists of two modules, which are
watermark embedding module and watermark extraction and detection module.
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
Digital Image Watermarking Using Different Levels of Intermediate Significant...CSCJournals
This document summarizes a research paper that proposes a new digital image watermarking technique. The technique embeds watermarks into different bit planes of cover images using a zig-zag embedding approach. This is done to improve imperceptibility and security. The technique repeats watermark bits multiple times within blocks of pixels to increase robustness against attacks. Experimental results show the proposed technique provides better image quality after embedding, as measured by PSNR, compared to other methods. It also extracts watermarks at an acceptable rate after various attacks.
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image,
which is overlaid on the host image, and provides a means of protecting the image. In order to provide high quality watermarked
image, the watermarked image should be imperceptible. This paper presents different techniques of digital image watermarking based
on spatial & frequency domain, which shows that spatial domain technique provides security & successful recovery of watermark
image and higher PSNR value compared to frequency domain.
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
Digital Watermarking is the process of embedding data called watermark or signature or label or tag into a multimedia object (image or audio or video) so that the watermark can be extracted for ownership verification or authentication. A visible watermark is a secondary translucent image overlaid into the primary image and appears visible to a viewer on a careful inspection. The invisible watermark is embedded in such a way that the modification made to the pixel value is perceptually not noticed and it can be recovered only with an appropriate decoding mechanism. Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital watermark inside the information so that ownership of the information cannot be claimed by third party.
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET Journal
This document summarizes a research paper on reversible image watermarking based on histogram shifting technique. It begins with an abstract that describes reversible watermarking and its goal of allowing exact recovery of the original image. It then provides background on reversible watermarking categories and discusses histogram shifting methods. The document outlines the proposed system, which aims to minimize distortion by selecting an optimal embedding point. It presents results comparing the proposed technique to previous histogram shifting methods, showing improved PSNR. Finally, it concludes the proposed method reduces image distortion through optimal embedding point selection.
Similar to A Survey on Features Combination for Image Watermarking (20)
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
System-on-chip (soc) based system has so many disadvantages in power-dissipation as
well as clock rate while the data transfer from one system to another system in on-chip. At the same
time, a higher operated system does not support the lower operated bus network for data transfer.
However an alternative scheme is proposed for high speed data transfer. But this scheme is limited to
SOCs. Unlike soc, network-on-chip (NOC) has so many advantages for data transfer. It has a special
feature to transfer the data in on-chip named as transitional encoder. Its operation is based on input
transitions. At the same time it supports systems which are higher operated frequencies. In this
project, a low-power encoding scheme is proposed. The proposed system yields lower dynamic
power dissipation due to the reduction of switching activity and coupling switching activity when
compared to existing system. Even-though many factors which is based on power dissipation, the
dynamic power dissipation is only considerable for reasonable advantage. The proposed system is
synthesized using quartus II 9.1 software. Besides, the proposed system will be extended up to
interlink PE communication with help of routers and PE’s which are performed by various
operations. To implement this system in real NOC’s contains the proposed encoders and decoders for
data transfer with regular traffic scenarios should be considered.
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
Coins are important part of our life. We use coins in a places like stores, banks, buses, trains
etc. So it becomes a basic need that coins can be sorted, counted automatically. For this, there is
necessary that the coins can be recognized automatically. Automated Coin Recognition System for the
Indian Coins of Rs. 1, 2, 5 and 10 with the rotation invariance. We have taken images from the both
sides of coin. So this system is capable to recognizing coins from both sides. Features are taken from the
images using techniques as a Hough Transformation, Pattern Averaging etc.
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
This document reviews several studies that analyzed the performance of VoIP traffic over WiMAX networks using different VoIP codecs and WiMAX service classes. It summarizes the findings of various papers on how QoS parameters like throughput, delay, jitter compared for codecs like G.711, G.723, G.729 when using the UGS, rtPS, nrtPS and BE service classes. Most studies found that UGS generally performed best for VoIP due to its ability to guarantee bandwidth and minimize jitter and delay, while G.711 typically provided the best voice quality. The document aims to compare the results across different service classes and codecs.
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
The cloud backup is used for the personal storage of the people in terms of reducing the
mainlining process and managing the structure and storage space managing process. The challenging
process is the deduplication process in both the local and global backup de-duplications. In the prior
work they only provide the local storage de-duplication or vice versa global storage de-duplication in
terms of improving the storage capacity and the processing time. In this paper, the proposed system
is called as the ALG- Dedupe. It means the Application aware Local-Global Source De-duplication
proposed system to provide the efficient de-duplication process. It can provide the efficient deduplication process with the low system load, shortened backup window, and increased power
efficiency in the user’s personal storage. In the proposed system the large data is partitioned into
smaller part which is called as chunks of data. Here the data may contain the redundancy it will be
avoided before storing into the storage area.
Aging protocols that could incapacitate the InternetEditor IJMTER
The biggest threat to the Internet is the fact that it was never really designed. For e.g., the
BGP protocol is used by Internet routers to exchange information about changes to the Internet's
network topologies. However, it also is among the most fundamentally broken; as Internet routing
information can be poisoned with bogus routing information. Instead, it evolved in fits and start,
thanks to various protocols that have been cobbled together to fulfill the needs of the moment. Few
of protocols from them were designed with security in mind. or if they were sported no more than
was needed to keep out a nosy neighbor, not a malicious attacker. The result is a welter of aging
protocols susceptible to exploit on an Internet scale. Here are six Internet protocols that could stand
to be replaced sooner rather than later or are (mercifully) on the way out.
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
1. The document proposes a design for using wireless sensor networks and cloud computing together for agricultural applications. It describes how sensor nodes can collect environmental data and send it to the cloud for storage, analysis and decision making.
2. The proposed system has three main components - a sensing cluster with various sensors to collect data, a cloud service cluster to process and analyze the data, and a mechanism cluster with actuator nodes that can take actions based on the cloud's decisions.
3. Some potential applications discussed are image processing of unhealthy plants, predicting crop diseases based on sensor readings, and automatically controlling the cultivation environment through actuators. The system is aimed to help farmers optimize resources and increase productivity.
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
Carpooling (also car-sharing, ride-sharing, lift-sharing), is the sharing of car journeys so
that more than one person travels in a car. It helps to resolve a variety of problems that continue to
plague urban areas, ranging from energy demands and traffic congestion to environmental pollution.
Most of the existing method used stochastic disturbances arising from variations in vehicle travel
times for carpooling. However it doesn’t deal with the unmet demand with uncertain demand of the
vehicle for car pooling. To deal with this the proposed system uses Chance constrained
formulation/Programming (CCP) approach of the problem with stochastic demand and travel time
parameters, under mild assumptions on the distribution of stochastic parameters; and relates it with a
robust optimization approach. Since real problem sizes can be large, it could be difficult to find
optimal solutions within a reasonable period of time. Therefore solution algorithm using tabu
heuristic solution approach is developed to solve the model. Therefore, we constructed a stochastic
carpooling model that considers the in- fluence of stochastic travel times. The model is formulated as
an integer multiple commodity network flow problem. Since real problem sizes can be large, it could
be difficult to find optimal solutions within a reasonable period of time.
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
This document discusses the use of foam concrete as a sustainable building material. Foam concrete is produced using cement, fine sand, water, and aluminium powder, which reacts to produce hydrogen gas bubbles that lighten the concrete. It has benefits like lower carbon dioxide emissions in production than traditional concrete, good thermal and sound insulation, fire resistance, and cost-effectiveness. The document reports on tests showing that foam concrete made with quarry dust has higher compressive strength than that made with sand. Strength generally decreases as aluminium powder content increases. Foam concrete is proposed as a sustainable alternative building material.
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
A good education system is required for overall prosperity of a nation. A tremendous
growth in the education sector had made the administration of education institutions complex. Any
researches reveal that the integration of ICT helps to reduce the complexity and enhance the overall
administration of education. This study has been undertaken to identify the various functional areas
to which ICT is deployed for information administration in education institutions and to find the
current extent of usage of ICT in all these functional areas pertaining to information administration.
The various factors that contribute to these functional areas were identified. A theoretical model was
derived and validated.
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
Data partitioning methods are used to partition the data values with similarity. Similarity
measures are used to estimate transaction relationships. Hierarchical clustering model produces tree
structured results. Partitioned clustering produces results in grid format. Text documents are
unstructured data values with high dimensional attributes. Document clustering group ups unlabeled text
documents into meaningful clusters. Traditional clustering methods require cluster count (K) for the
document grouping process. Clustering accuracy degrades drastically with reference to the unsuitable
cluster count.
Textual data elements are divided into two types’ discriminative words and nondiscriminative
words. Only discriminative words are useful for grouping documents. The involvement of
nondiscriminative words confuses the clustering process and leads to poor clustering solution in return.
A variation inference algorithm is used to infer the document collection structure and partition of
document words at the same time. Dirichlet Process Mixture (DPM) model is used to partition
documents. DPM clustering model uses both the data likelihood and the clustering property of the
Dirichlet Process (DP). Dirichlet Process Mixture Model for Feature Partition (DPMFP) is used to
discover the latent cluster structure based on the DPM model. DPMFP clustering is performed without
requiring the number of clusters as input.
Document labels are used to estimate the discriminative word identification process. Concept
relationships are analyzed with Ontology support. Semantic weight model is used for the document
similarity analysis. The system improves the scalability with the support of labels and concept relations
for dimensionality reduction process.
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
There are many algorithms we found for matrices multiplication. Until now it has been
found that complexity of matrix multiplication is O(n3). Though Further research found that this
complexity can be decreased. This paper focus on the algorithm and its complexity of matrices
multiplication methods.
Malware is a worldwide pandemic. It is designed to damage computer systems without
the knowledge of the owner using the system. Software‟s from reputable vendors also contain
malicious code that affects the system or leaks information‟s to remote servers. Malware‟s includes
computer viruses, spyware, dishonest ad-ware, rootkits, Trojans, dialers etc. Malware detectors are
the primary tools in defense against malware. The quality of such a detector is determined by the
techniques it uses. It is therefore imperative that we study malware detection techniques and
understand their strengths and limitations. This survey examines different types of Malware and
malware detection methods.
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
GLAUCOMA is a chronic eye disease that can damage optic nerve. According to WHO It
is the second leading cause of blindness, and is predicted to affect around 80 million people by 2020.
Development of the disease leads to loss of vision, which occurs increasingly over a long period of
time. As the symptoms only occur when the disease is quite advanced so that glaucoma is called the
silent thief of sight. Glaucoma cannot be cured, but its development can be slowed down by
treatment. Therefore, detecting glaucoma in time is critical. However, many glaucoma patients are
unaware of the disease until it has reached its advanced stage. In this paper, some manual and
automatic methods are discussed to detect glaucoma. Manual analysis of the eye is time consuming
and the accuracy of the parameter measurements also varies with different clinicians. To overcome
these problems with manual analysis, the objective of this survey is to introduce a method to
automatically analyze the ultrasound images of the eye. Automatic analysis of this disease is much
more effective than manual analysis.
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
Reliability is playing very vital role in some application of Wireless Sensor Networks
and multipath routing is one of the ways to increase the probability of reliability. More over energy
consumption is constraint. In this paper, we provide a survey of the state-of-the-art of proposed
multipath routing algorithm for Wireless Sensor Networks. We study the design, analyze the tradeoff
of each design, and overview several presenting algorithms.
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
This paper is devoted to the Quasi Z source network based DC Drive. The cascaded
(two-stage) Quasi Z Source network could be derived by the adding of one diode, one inductor,
and two capacitors to the traditional quasi-Z-source inverter The proposed cascaded qZSI inherits all
the advantages of the traditional solution (voltage boost and buck functions in a single stage,
continuous input current, and improved reliability). Moreover, as compared to the conventional qZSI,
the proposed solution reduces the shoot-through duty cycle by over 30% at the same voltage boost
factor. Theoretical analysis of the two-stage qZSI in the shoot-through and non-shoot-through
operating modes is described. The proposed and traditional qZSI-networks are compared. A
prototype of a Quasi Z Source network based DC Drive was built to verify the theoretical
assumptions. The experimental results are presented and analyzed.
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
The paper reflects the spiritual philosophy of Aurobindo Ghosh which is helpful in today’s
education. In 19th century he wrote about spirituality, in accordance with that it is a core and vital part
of today’s education. It is very much essential for today’s kid. Here I propose the overview of that
philosophy.At the utmost regeneration of those values in today’s generation is the great deal with
education system. To develop the values and spiritual education in the youngers is the great moto of
mine. It is the materialistic world and without value redefinition among them is the harder task but not
difficult.
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
The software test coverage is used measure the safety measures. The safety critical analysis is
carried out for the source code designed in Java language. Testing provides a primary means for
assuring software in safety-critical systems. To demonstrate, particularly to a certification authority, that
sufficient testing has been performed, it is necessary to achieve the test coverage levels recommended or
mandated by safety standards and industry guidelines. Mutation testing provides an alternative or
complementary method of measuring test sufficiency, but has not been widely adopted in the safetycritical industry. The system provides an empirical evaluation of the application of mutation testing to
airborne software systems which have already satisfied the coverage requirements for certification.
The system mutation testing to safety-critical software developed using high-integrity subsets of
C and Ada, identify the most effective mutant types and analyze the root causes of failures in test cases.
Mutation testing could be effective where traditional structural coverage analysis and manual peer
review have failed. They also show that several testing issues have origins beyond the test activity and
this suggests improvements to the requirements definition and coding process. The system also
examines the relationship between program characteristics and mutation survival and considers how
program size can provide a means for targeting test areas most likely to have dormant faults. Industry
feedback is also provided, particularly on how mutation testing can be integrated into a typical
verification life cycle of airborne software. The system also covers the safety and criticality levels of
Java source code.
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
The software defect factors are used to measure the quality of the software. The software
effort estimation is used to measure the effort required for the software development process. The defect
factor makes an impact on the software development effort. Software development and cost factors are
also decided with reference to the defect and effort factors. The software defects are predicted with
reference to the module information. Module link information are used in the effort estimation process.
Data mining techniques are used in the software analysis process. Clustering techniques are used
in the property grouping process. Rule mining methods are used to learn rules from clustered data
values. The “WHERE” clustering scheme and “WHICH” rule mining scheme are used in the defect
prediction and effort estimation process. The system uses the module information for the defect
prediction and effort estimation process.
The proposed system is designed to improve the defect prediction and effort estimation process.
The Single Objective Genetic Algorithm (SOGA) is used in the clustering process. The rule learning
operations are carried out sing the Apriori algorithm. The system improves the cluster accuracy levels.
The defect prediction and effort estimation accuracy is also improved by the system. The system is
developed using the Java language and Oracle relation database environment.
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
Software cost estimation is an important task in the software design and development process.
Planning and budgeting tasks are carried out with reference to the software cost values. A variety of
software properties are used in the cost estimation process. Hardware, products, technology and
methodology factors are used in the cost estimation process. The software cost estimation quality is
measured with reference to the accuracy levels.
Software cost estimation is carried out using three types of techniques. They are regression based
model, anology based model and machine learning model. Each model has a set of technique for the
software cost estimation process. 11 cost estimation techniques fewer than 3 different categories are
used in the system. The Attribute Relational File Format (ARFF) is used maintain the software product
property values. The ARFF file is used as the main input for the system.
The proposed system is designed to perform the clustering and ranking of software cost
estimation methods. Non overlapped clustering technique is enhanced with optimal centroid estimation
mechanism. The system improves the clustering and ranking process accuracy. The system produces
efficient ranking results on software cost estimation methods.
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfBalvir Singh
Sri Guru Hargobind Ji (19 June 1595 - 3 March 1644) is revered as the Sixth Nanak.
• On 25 May 1606 Guru Arjan nominated his son Sri Hargobind Ji as his successor. Shortly
afterwards, Guru Arjan was arrested, tortured and killed by order of the Mogul Emperor
Jahangir.
• Guru Hargobind's succession ceremony took place on 24 June 1606. He was barely
eleven years old when he became 6th Guru.
• As ordered by Guru Arjan Dev Ji, he put on two swords, one indicated his spiritual
authority (PIRI) and the other, his temporal authority (MIRI). He thus for the first time
initiated military tradition in the Sikh faith to resist religious persecution, protect
people’s freedom and independence to practice religion by choice. He transformed
Sikhs to be Saints and Soldier.
• He had a long tenure as Guru, lasting 37 years, 9 months and 3 days
Covid Management System Project Report.pdfKamal Acharya
CoVID-19 sprang up in Wuhan China in November 2019 and was declared a pandemic by the in January 2020 World Health Organization (WHO). Like the Spanish flu of 1918 that claimed millions of lives, the COVID-19 has caused the demise of thousands with China, Italy, Spain, USA and India having the highest statistics on infection and mortality rates. Regardless of existing sophisticated technologies and medical science, the spread has continued to surge high. With this COVID-19 Management System, organizations can respond virtually to the COVID-19 pandemic and protect, educate and care for citizens in the community in a quick and effective manner. This comprehensive solution not only helps in containing the virus but also proactively empowers both citizens and care providers to minimize the spread of the virus through targeted strategies and education.
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Dr.Costas Sachpazis
Consolidation Settlement Calculation Program-The Python Code
By Professor Dr. Costas Sachpazis, Civil Engineer & Geologist
This program calculates the consolidation settlement for a foundation based on soil layer properties and foundation data. It allows users to input multiple soil layers and foundation characteristics to determine the total settlement.
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
A Survey on Features Combination for Image Watermarking
1. Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 534
e-ISSN: 2349-9745
p-ISSN: 2393-8161
A Survey on Features Combination for Image Watermarking
Dhiraj Singh Kushwah1
, Pragyesh Kumar Agrawal2
1
Research Scholor, Atal Bihari Vajpayi Hindi Vishwavidyala, Bhopal
2
Professor of Physics, Sarojini Naidu Govt. Girls P.G. College, Bhopal
Abstract - As the internet users are increasing day by day it is easy to transfer digital data. By this new
problem of data piracy is increasing. For this different methods of watermarking are developed for
protecting the digital data like video, audio, image, etc. Out of these many researcher are working on
image watermarking field from last few decades. This paper focus on the image watermarking features
combination with various techniques which are broadly categorized into spatial and frequency domain.
Many features are studied with their different requirement and functionality. It has been observed that
most of the researcher combines many features for achieving the prior goal of the watermark that is to
embed watermark and extract from the carrier image in presence of different attack.
Keywords - Digital Watermarking, Frequency domain, DWT, LSB, Attack.
I. INTRODUCTION
With the increase in the digital electronics era most of the work get easy, one of them is transferring of
data. But this technology gives rise to new problem of piracy or in other words proprietary get easily
stolen. To overcome this problem different techniques are used for preserving the proprietary of the
owner, one of such digital approach is watermarking which is a subsection of hiding information that is
used to put some information in the original image which will specify the originality of the digital data
[1, 2]. One of the basic causes of the copyright issue is the ease available of the internet and some
software that can modify the content as per the user requirement.
Watermark is a kind of digital data in form of text or image which can be stored in the original signal.
This text or image acts as the owner signature in the data so that pirated and original data can be easily
classified. As the pirated data do not have the original watermark that may be in the form of text or
image. Now watermarking technique is broadly classified into two fields first is visible watermarking
while other is invisible watermarking. Example of visible watermarking in figure 1 and 2 is the digital
page containing logo, T.V. channel containing logo of their channel.
2. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 535
Figure1. Example of visible watermark in digital page Figure 2. Example of visible watermark in video
Most of the watermarking techniques focus on the invisible watermarking [3, 4]. As embedding the
watermark into the digital data is quite tough and challenging, although it is done by different methods.
This paper focuses on the digital image invisible watermarking techniques. Watermarking process is
done in two steps, first is embedding and other is extraction. In case of embedding digital watermark is
hidden in the original data, such that visibility of the watermark by naked eyes is not possible. In case of
extraction watermark should be successfully retrieved from the received data without any loss of
information of the original data as well as watermark. Here as the network data get affected by different
type of attacks so algorithm should be robust enough against those attacks [11]. So the quality of
watermarking algorithm depends on the embedding and extraction of watermark in presence of different
attacks.
II. LITERATURE SURVEY
In [7] watermark information is hidden in the edge portion of the image, and for finding the exact edge
pixels in the image this paper adopts DAM and BCV technique. The Whole work is done for the binary
image only as the DAM is based on the binary image. So here in this method image has to be in binary
form and watermark information is also in binary format. With this limitation it is found that robustness
of the algorithm is quite good against different attacks of noise, filter.
In [8] the extension of the paper [7] is done where hiding is done at the edge region only using same
technique of DAM and BCV but here edge selecting region is increased by searching surrounding region
of the evaluating pixel. It has shown in the result that with this new approach robustness increases and
the watermark information can be increase in the original image.
In [10] new concept is developed by the paper which is termed as content reconstruction using self
embedding, here watermark image is embedded in the original image using a fountain coding algorithm,
where multiple packets are designed for the network. So if some of the packet gets corrupt by the attack
then rest of the packets are use for regenerating the original watermark. As this method cover different
attacks on the image and recover watermark in original condition up to few level of attack. One problem
is that after embedding image get transformed in fountain codes packet, but embedded image is not
3. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 536
available for the user to display and it get reconstruct into original only by decoding the fountain codes.
So this algorithm is beneficial for data transferring purpose only.
In [13] instead of embedding the external watermark image, the original image is so utilized in the
algorithm that it will generate its own watermark bits for the image. This paper focus on the image
expansion where spatial domain is used for embedding and supporting information is stored for the
image which is required during extraction. Robustness of the image is done against compression attack
and scaling is also covered. But to cover both intra-codeblock and inter-codeblock method is utilized.
In [16] during embedding the algorithm uses DWT technique and modulus method for the pixel position
selection. At the extraction end embedded image with some supporting information is supplied for
generating the original image and watermark bits. This recovery of original watermark is reversible
watermarking scheme.
In [14] carrier image is reverse into original matrix with the use of the Linear Prediction technique and
error threshold value where watermark is embedded in the carrier image in those pixel positions only
which have error in a fix range where other pixel are edited so that overall change in pixel values is
always out of threshold range. This addition of noise will increase the robustness of the image against
various attacks.
In [12] spatial common technique is used for the watermarking, here image is divide into Red, Green
and Blue matrix then whole embedding is done at the Blue matrix of the image where some of the
LSB’s are replaced by the watermark bits while rest of the MSB’s remain same. It has observed that
image quality has not affected by the embedding of watermark. This paper work is robust against
compression attack as it most affects the MSB’s while LSB’s remain unaffected during attack.
In [18] a new technique is introduced that is “visible watermark”. Here the proprietorship is identified
directly while image information remains same. It is robust enough such that any attempt of attack will
present the watermark in same condition and removing of watermark will change whole image. But here
image watermark can be easily copy and other can also use the same for their fake data.
In [22] introduction of the new technique that is image tagging, is done which enforce copyright,
counterfeit access and controlled access. While complete description of the work is not explained but
this concept gives dynamic direction for the image watermarking.
In [15] an electronic watermarking is done for the textual document, in form of word or line shifting.
Here a secret key is distributed among different users for the extraction of the embedded text data. This
can be applied on non-ascii text representation, and not to images.
In [20] a definition for the invisible watermarking is specified which are required for the embedding of
image. There should be a proper place for the watermark which can be replaced by the watermark
information. The embedding and extraction method is based on the secret key so that common method is
used by the different users. Such as DWT are the collection of a specific class of pixel value and depend
on the requirement particular class is utilized.
III. PROBLEM IDENTIFICATION
As the authentication of digital data is major problem and to resolve it watermarking technique is
evolved where different methods or algorithms are developed for the same. One of the major focuses of
4. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 537
the watermarking algorithm is retrieving of the watermark from the carrier image but the carrier image is
not recovered in the algorithms so this is the major problem this is solved by few of the researcher who
name it as a reversible watermark.
One more issue in the watermarking is the developing of the algorithm that will not only embed the
image but also maintain the originality or the quality of the carrier signal [13, 10]. So the embedding
method should be perfect enough that image will show the approx similarity as previous.
In [14] reversible watermarking scheme is developed, but the work focus only on the reversibility of the
watermark while that work is not robust against the various attack this is the major drawback of the
work. Although it has shown its superiority against various existing algorithms such as median edge
detector, gradient-adjusted predictor or the simple rhombus neighborhood. So the work need to be done
in this field that will regenerate the watermark as well as the carrier image with a minimum loss of the
signal under various attacks such as addition of noise in the embedded image, or passing image from the
different filter, or compression of the image, cropping of the image.
Few more flexibility for the system need to develop that is the amount of data to be inserted into the
image should be control by the algorithm as most of the work focus on the embedding and that is totally
depends on the type of image but, if the same image can be used for transferring the different amount of
data then it is not always possible. This is a kind of limitation of the field which should be removed.
IV. FEATURES FOR WATERMARKING
As Image is a collection or sequence of pixel and each pixel is treated as single value which is a kind of
cell in a matrix. In order to identify an object in that image some features need to be maintained as
different object have different feature to identify them which are explained as follows:
4.1. Color Feature: Image is a matrix of light intensity values, these intensity values represent different
kind of color. So to identify an object color is an important feature, one important property of this
feature is low computational cost. Different Image files available in different color formats like images
have different color format ranging from RGB which stands for red, green, and blue. This is a three
dimensional representation of a single image in which two dimensional matrix represents single color
and collection of those matrices tends to the third dimension. In order to make the intensity calculation
for each pixel gray format is used, which is a two dimension values range from 0 to 255. In case of
binary format which is a black and white color matrix, whose values are only 0 or 1. With the help of
this color feature face has been detected efficiently in [8, 19].
5. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 538
Figure 3. Represent the HSV (Hue, Saturation value) format of an image
4.2. Edge Feature: As image is a collection of intensity values, and with the sudden change in the
values of an image one important feature arises as the Edge as shown in figure 4. This feature is used
for different type of image object detection such as building on a scene, roads, etc [5, 6]. There are
many algorithms has been developed to effectively point out all the images of the image or frames,
which are Sobel, perwitt, canny, etc. out of these algorithm canny edge detection is one of the best
algorithm to find all possible boundaries of an image, this is shown in figure 4.
Figure 4. Represent the Edge feature of an image
4.3. Texture Feature: Texture is a degree of intensity difference of a surface which enumerates
properties such as regularity and smoothness. Compared to color space model, texture requires a
processing step. The texture features on the basis of color are less sensitive to illumination changes as
same as to edge features.
4.4. Corner Feature: In order to stabilize the video frames in case of moving camera it require the
difference between the two frames which are point out by the corner feature in the image or frame. So
by finding the corner position of the two frames, one can detect resize the window in original view [21].
This feature is also used to find the angles as well as the distance between the object of the two different
frames. As they represent points in the image so it is used to track the target object.
6. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 539
Figure 5. Represent the corner feature of an image with green point
V. CONCLUSION
In order to provide invisible image watermarking this paper provides a detailed literature survey for the
different approaches follow by the various researchers. It has been observed that during extraction
watermark is the main focus of most of the researcher, but few of them work on original image as well,
but reverse process of both watermark and original image is not done by any. A Watermark is mainly
compared on the basis of the attack but most of the paper work on the spatial attack and show effective
results in various attacks with different levels. Concentration on the geometric attack is very less and not
done by most of the papers. So strength and weakness of the different papers, features, and techniques
are well discussed in the paper. A unique algorithm is still required, which focus on both watermark and
original image with high robustness against spatial as well as geometric attacks.
REFERENCES
[1] Hanieh Khalilian, Student Member, IEEE, and Ivan V. Bajic, “Video Watermarking with Empirical PCA-Based
Decoding”, IEEE Transactions On Image Processing, Vol. 22, No. 12, Dec 2013.
[2] Walter Godoy Jr., Charles Way Hun Fung, “A novel DWT-SVD Video Watermarking Scheme using Side View”,
IEEE Signal Processing and Communication Systems (ICSPCS), 5th International Conference, pp. 1-4, Dec 2011.
[3] Tamanna Tabassum, S.M. Mohidul Islam, “A Digital Image Watermarking Technique Based on Identical Frame
Extraction in 3-Level DWT”, Vol. 13, no. 7, pp. 560 –576, July 2003.
[4] Frank Hartung, Jonathan K. Su, and Bernd Girod, “Spread Spectrum Watermarking: Malicious Attacks and
Counterattacks”, International Journal of Research in Engineering and Technology, eISSN: 2319-1163 | pISSN: 2321-
7308, Jan 1999.
[5] CHAPTER 2, “Wavelet Transforms on Images”, sundoc.bibliothek.uni-halle.de/diss-online/02/03H033/t4.pdf.
[6] Priya Porwal, Tanvi Ghag, Nikita Poddar, Ankita Tawde, “Digital Video Watermarking using Modified LSB and DCT
Technique”, International Journal of Research in Engineering and Technology, Vol. 3, Issue 4, Apr 2014.
[7] Kazuki Yamato, Madoka Hasegawa, Yuichi Tanaka‡ and Shigeo Kato, “Digital Image Watermarking Method Using
Between-Class Variance”, IEEE Image Processing (ICIP), 19th IEEE International Conference, 2012.
7. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 540
[8] Ashwary Rajpoot, Ranjana Batham, Navin Chourasia, “Spatial Domain base Image Watermarking by Edge Feature”,
IJCSEC- International Journal of Computer Science and Engineering Communications, Vol.2, Issue 5, Oct 2014.
[9] Mohan A Chimanna, S.R.Khot, “Digital Video Watermarking Techniques for Secure Multimedia Creation and
Delivery”, Vol. 3, Issue 2, pp.839-844, March-April 2013.
[10] Paweł Korus, Student Member, IEEE, and Andrzej Dziech, “Efficient Method for Content Reconstruction with Self-
Embedding”, IEEE Transactions On Image Processing, Vol. 22, No. 3, March 2013.
[11] J. Zhao and E. Koch, “Embedding Robust Labels into Images For Copyright Protection”, In: Proc. of the Int. Congress
on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Vienna, August 1995.
[12] L. M. Vargas and E. Vera, “An Implementation of Reversible Watermarking for Still Images”, IEEE Latin America
Transactions, Vol. 11, No. 1, Feb 2013.
[13] Angela Piper, Reihaneh Safavi-Naini, “Scalable Fragile Watermarking for Image Authentication”, IET Information
Security, Vol. 7, Issue 4, pp. 300–311, Dec 2013.
[14] Ioan-Catalin Dragoi, Member, IEEE, and Dinu Coltuc, “Local-Prediction-Based Difference Expansion Reversible
Watermarking”, IEE Transactions on Image Processing, Vol. 23, No. 4, April 2014.
[15] J. Brassil ans S. Low, N. Maxemchuck, and L. O’Gorman, “Electronic Marking and Identification Techniques to
Discourage Document Copying”, In IEEE INFOCOM’94 - Networking for global communications, 1994.
[16] F.M. Boland, J.J.K. O’ Ruanaidh, and C. Dautzenberg, “Watermarking Digital Images for Copyright Protection”,
Image Processing And Its Applications, pp. 326–330, July 1995.
[17] D. Boneh and J. Shaw, “Collusion-Secure Fingerprinting for Digital Data”, In D. Coppersmith, editor, CRYPTO 95,
number 963 in Lecture Notes in Computer Science, pages 452–564, Springer, 1995.
[18] G. W. Braudaway, K. A. Magerlein, and F. Mintzer, “Protecting Publicly-Available Images with a Visible Image
Watermark”, Technical Report RC 20336 (89918) 1/15/96, IBM Research Division, 1996.
[19] Bender, W., Gruhl, D., Morimoto, N. and Lu, A, “Techniques for Data Hiding”, IBM Systems Journal, Vol. 35, Issue
3.4, 1996.
[20] E. Koch and J. Zhao, “Towards Robust and Hidden Image Copyright Labeling”, In Proc. of 1995, IEEE Workshop on
Nonlinear Signal and Image Processing, 1995.
[21] B. Pfitzmann and M. Schunter, “Asymmetric Fingerprinting”, In U. Maurer, editor, EUROCRYPT 96, number 1070 in
Lecture Notes in Computer Science, pages 84–95. Springer, 1996.
[22] R.G. Van Schyndel, A.Z. Tirkel, and C.F. Osborne, “Towards a Robust Digital Watermark”, In S.Z. Li, D.P. Mital,
E.K. Teoh, and H.Wan, editors, ACCV’95, Second Asian Conference on Computer Vision, number 1035 in Lecture
Notes in Computer Science, pages 504–508. Springer, 1995.