SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 186-193 © IAEME
186
SECURE HYBRID WATERMARKING USING DISCRETE WAVELET
TRANSFORM (DWT) & DISCRETE COSINE TRANSFORM (DCT)
Neetu Rathi 1
and Dr. Anil Kumar Sharma2
M. Tech. Scholar1
, Professor & Principal2
Department of Electronics & Communication Engineering,
Institute of Engineering & Technology, Alwar-301030 (Raj.), India
ABSTRACT
Digital image watermarking is a technique used for copyright protections of digital data.
A digital watermark is a kind of marker covertly embedded in a noise-tolerant signal such as audio or
image data. It is typically used to identify ownership of the copyright of such signal. This paper
presents an efficient hybrid digital watermarking technique using DWT & DCT for copy right
protection. In addition, a concise introduction about digital marking is presented along with its
properties, techniques & attacks. The simulation results show that this algorithm has good robustness
for some common image processing operations & also gives improved results in terms of PSNR &
Correlation coefficients.
Keyword: Attacks, Authentication, DCT, DWT, PSNR.
1. INTRODUCTION
Everyday tons of data is embedded on digital media or distributed over the internet. The data
so distributed can easily be imitated without error, putting the rights of their owners at risk. Even
when encrypted for distribution, data can easily be decrypted and copied. One way to discourage
illegal duplication is to insert information known as watermark, into potentially vulnerable data in
such a way that it is impossible to separate the watermark from the data. These challenges motivated
researchers to carry out intense research in the field of watermarking. A watermark is a form, image
or text that is impressed onto paper, which provides indication of its authenticity. Digital
watermarking is an extension of the same concept. Digital watermarking is the process of embedding
information into digital multimedia content such that the information can be extracted or detected at
the later stage for a variety of purposes including copy prevention and control [1]. A digital
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 4, April (2014), pp. 186-193
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2014): 8.5328 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp.
watermark is used for this purpose which is a digital signal inserted into a digital image and may also
serve as a digital signature [2]. Digital watermarking is also to be contrasted with public
encryption, which also transforms original files into another form. Unlike encryption, digital
watermarking leaves the original image uncontaminated and recognizable. In addition, digital
watermarks, as signatures, may not be validated without special software. Further, decrypted
documents are far from of any residual effects of encryption, whereas digital watermarks are
designed to be persistent in viewing, printing, or subsequent retransmission or dissemination.
are two types of watermarks: visible watermark and invisible waterma
concentrated on implementing watermark in image. The main factor of consideration for any
watermarking scheme is its robustness to various attacks. Watermarking dependency on the original
image increases its robustness but at the
imperceptible.
2. CLASSIFICATION OF WATERMARKING
The classification of watermarks and watermarking techniques is very broad. These are
divided into various categories [5, 6, 7] based on
the type of Document it can be divided into four categories
Watermarking, Audio Watermarking
Fig. 1: Classification of watermarking Techniques
On the basis of domain used for watermarking the techniques fall in two categories: those
which use spatial domain and those which use transform domain. Spatial
technologies change the intensity of original image or gray levels of its p
watermarking is simple and with low computing complexity, because no frequency transform is
needed. However, there must be trade
common image processing and noise. Trans
the transformed image. According to the human perception [5, 6, 9],
watermark, Invisible-Robust watermark
According to the application it is either source based or destination based. Source
are desirable for ownership identification or authentication where a unique watermark identifying the
owner is introduced to all the copies of a particular image being distri
watermark could be used for authentication and to determine whether a received image or other
electronic data has been tampered with. The watermark could also be destination based where each
distributed copy gets a unique watermark id
watermark could be used to trace the buyer in the case of illegal reselling.
enable watermarking in the spatial domain. The simplest is just to flip the lowest
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976
6375(Online), Volume 5, Issue 4, April (2014), pp. 186-193 © IAEME
187
watermark is used for this purpose which is a digital signal inserted into a digital image and may also
serve as a digital signature [2]. Digital watermarking is also to be contrasted with public
ms original files into another form. Unlike encryption, digital
watermarking leaves the original image uncontaminated and recognizable. In addition, digital
watermarks, as signatures, may not be validated without special software. Further, decrypted
nts are far from of any residual effects of encryption, whereas digital watermarks are
designed to be persistent in viewing, printing, or subsequent retransmission or dissemination.
are two types of watermarks: visible watermark and invisible watermark. In this paper we have
concentrated on implementing watermark in image. The main factor of consideration for any
watermarking scheme is its robustness to various attacks. Watermarking dependency on the original
image increases its robustness but at the same time we need to make sure that the watermark is
CLASSIFICATION OF WATERMARKING
The classification of watermarks and watermarking techniques is very broad. These are
divided into various categories [5, 6, 7] based on different criterions as shown in Fig
can be divided into four categories i.e. Text Watermarking
Audio Watermarking and Video Watermarking.
Fig. 1: Classification of watermarking Techniques
On the basis of domain used for watermarking the techniques fall in two categories: those
which use spatial domain and those which use transform domain. Spatial-domain watermarking
technologies change the intensity of original image or gray levels of its pixels. This kind of
watermarking is simple and with low computing complexity, because no frequency transform is
needed. However, there must be trade-offs between invisibility and robustness, and it is hard to resist
common image processing and noise. Transform-domain watermarking embeds the watermark into
According to the human perception [5, 6, 9], it can be divided into Visible
Robust watermark, Invisible-Fragile watermark and Dual watermark
either source based or destination based. Source-
are desirable for ownership identification or authentication where a unique watermark identifying the
owner is introduced to all the copies of a particular image being distributed. A source
watermark could be used for authentication and to determine whether a received image or other
electronic data has been tampered with. The watermark could also be destination based where each
distributed copy gets a unique watermark identifying the particular buyer. The destination
watermark could be used to trace the buyer in the case of illegal reselling. Several different methods
enable watermarking in the spatial domain. The simplest is just to flip the lowest-order bit of ch
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
watermark is used for this purpose which is a digital signal inserted into a digital image and may also
serve as a digital signature [2]. Digital watermarking is also to be contrasted with public-key
ms original files into another form. Unlike encryption, digital
watermarking leaves the original image uncontaminated and recognizable. In addition, digital
watermarks, as signatures, may not be validated without special software. Further, decrypted
nts are far from of any residual effects of encryption, whereas digital watermarks are
designed to be persistent in viewing, printing, or subsequent retransmission or dissemination. There
rk. In this paper we have
concentrated on implementing watermark in image. The main factor of consideration for any
watermarking scheme is its robustness to various attacks. Watermarking dependency on the original
same time we need to make sure that the watermark is
The classification of watermarks and watermarking techniques is very broad. These are
ig.1. According to
Text Watermarking, Image
On the basis of domain used for watermarking the techniques fall in two categories: those
domain watermarking
ixels. This kind of
watermarking is simple and with low computing complexity, because no frequency transform is
offs between invisibility and robustness, and it is hard to resist
domain watermarking embeds the watermark into
can be divided into Visible
Dual watermark.
-based watermark
are desirable for ownership identification or authentication where a unique watermark identifying the
buted. A source-based
watermark could be used for authentication and to determine whether a received image or other
electronic data has been tampered with. The watermark could also be destination based where each
entifying the particular buyer. The destination -based
Several different methods
order bit of chosen
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 186-193 © IAEME
188
pixels. This works well only if the image is not subject to any change. A more robust watermark can
be embedded by superimposing a symbol on picture. The resulting mark may be visible or invisible,
depending upon the intensity value. Picture cropping, e.g., (a common operation of image editors),
can be used to remove the watermark.
Spatial watermarking can also be applied using color separation. In this way, the watermark
appears in only one of the color bands. This renders the watermark visibly subtle such that it is
difficult to identify under regular viewing. However, the mark appears immediately when the colors
are separated for printing. This renders the document useless for the printer unless the watermark can
be removed from the color band. This approach is used commercially for journalists to inspect digital
pictures from a photo-stockhouse before buying unmarked versions. Watermarking can be applied in
the frequency domain (and other transform domains) by first applying a transform like the Fast
Fourier Transform (FFT). In a similar manner to spatial domain watermarking, the values of chosen
frequencies can be altered from the original. Since high frequencies will be lost by compression or
scaling, the watermark signal is applied to lower frequencies, or better yet, applied adaptively to
frequencies that contain important information of the original picture. Since watermarks applied to
the frequency domain will be dispersed over the whole of the spatial image upon inverse
transformation, this method is not as vulnerable to defeat by cropping as the spatial technique.
However, there is more a trade-off here between invisibility and decodability, since the watermark is
in effect applied indiscriminately across the spatial image.
3. ATTACKS ON WATERMARKS
A watermarked image is likely to be subjected to certain manipulations [2, 13], some
intentional such as compression and transmission noise and some intentional such as cropping,
filtering, etc. The main type of attacks is as follows.
• Active Attacks: Here, the hacker tries intentionally to remove the watermark or simply make
it unnoticeable. This is a big issue in copyright protection, fingerprinting or copy control for
example.
• Passive attacks: In this case, the attacker is not trying to remove the watermark but simply
trying to determine if a given mark is existing or not. As the reader should understand,
protection against passive attacks is of the greatest importance in covert communications
where the simple knowledge of the presence of watermark is often more than one want to
grant.
• Collusion attacks: In collusive attacks [2], the goal of the hacker is the same as for the
active attacks but the process is somewhat different. In order to remove the watermark, the
hacker uses several copies of the same data, containing each different watermark, to
construct a new copy without any watermark. This is a problem in fingerprinting
applications (e.g. in the film industry) but is not the widely spread because the attacker must
have access to multiple copies of the same data and that the number needed can be pretty
important.
• Forgery attacks: This is probably the main concern in data authentication. In forgery
attacks, the hacker aims at embedding a new, valid watermark rather than removing one. By
doing so, it allows him to make change in the protected data as he wants and then, re-inserts
a new given key to replace the destructed (fragile) one, thus making the corrupted image
seems genuine.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 186-193 © IAEME
189
4. PROPOSED ALGORITHM AND SIMULATION
In this work an algorithm is proposed for secure hybrid digital watermarking using DWT &
DCT. For this a word “Hi” is used as a watermark & the image “lena” is used as a cover image. This
watermark is first decomposed into equal parts in the form of binary matrix (0,1). Then the size of
watermark image or message image is checked in comparison to the cover image. The size of the
watermark should not be greater than that of cover image so that it can hide behind the cover image.
Next the DWT is applied & the cover image is decomposed into its approximation coefficient’s.
After applying DWT we get low frequency components of the cover image (cA1) & next we set a
key=1982 for security purpose & a value of factor=10 which can vary. Then the watermarked image
is to be hide behind the cover image in an encrypted manner (i.e. changing pixel value of cover
image according to the watermark image). Afterwards extracting of the watermark image is done in a
decrypted manner using DCT so that only a known receiver can decode it. Then PSNR &
Correlation Value are computed for the recovered watermarked image. Fig. 2 shows the steps of
simulation.
(a) Cover image “Lena” (b) Watermark Image “Hi”
(c) Decomposed Watermark (d) Watermarked Image
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 186-193 © IAEME
190
(e) Extracted Watermark (f) Normalized Correlation Plot
Fig. 2: Watermark Embedding & Extraction Using DWT & DCT
Here we have observed that the For Original Image Vs. Extracted Watermark Image,
The value of PSNR = 56.7416, Correlation Value = 1.
Next we are going to simulate the process with Attacks of Gaussian Noise as shown in Fig.3.
(a) Decomposed Image (b) Watermarked Image
(c) Extracted Watermark (d) Normalized correlation plot
Fig. 3: Simulation with Attacks of Gaussian Noise
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 186-193 © IAEME
191
Here we have observed that the For Original Image Vs. Extracted Watermark Image,
The value of PSNR = 56.7109, Correlation Value = 0.9964
Next we go for compression attack as shown in Fig. 4.
(a) Decomposed Watermark (b) Extracted Watermark
(d) Normalized Correlation Plot
Fig. 4: Simulation with Compression Attack
Here we have observed, The value of PSNR = 56.7416, Correlation Value = 1
Next we carry out the Simulation with Salt & Pepper Attack as shown in Fig. 5.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 186-193 © IAEME
192
(a) Decomposed Watermark (b) Watermarked Image
(c) Extracted Watermark (d) Normalized Correlation Plot
Fig. 5: Simulation with Considering Salt & Peeper Attack
Here we have observed that for Original Image Vs. Salt & Peeper Attacked Watermark
Image, the value of PSNR = 54.1684, Correlation Value = -0.036327
Observation: From Table-1 we can see that with reference to previous work we obtain much better
result in terms of PSNR & Correlation Coefficient. Both parameters are improved for different cases
i. e. without attack & on application of attack.
Table-1: Summary of Results as Compared to Previous Work
Various Results Results of
Previous Work
Result 1 using
Hybrid
Technique
without Attack
Result 2 using
Hybrid
Technique with
Attack
Result 3 using
Hybrid
Technique with
Attack
Result 4 using
Hybrid
Technique
with Attack
Techniques Original EOG
Signal Vs.
Watermarked
Signal
Original Image
Vs. Extracted
Watermark
Image
Original Image
Vs. Gaussian
attacked
Watermark
Image
Original Image
Vs. Compression
attacked
Watermark Image
Original Image
Vs. Salt
&peeper
attacked
Watermark
Image
PSNR 31.552 56.7416 56.7109 56.7416 54.1684
Correlation
Coefficient
0.9965 1 0.9964 1 -0.036327
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 186-193 © IAEME
193
5. CONCLUSION
The purpose of this paper is to provide a Hybrid Techniques i.e. combination of DWT & DCT
which provides much security & robustness. The results obtained from the algorithm have provided
simpler and a faster approach to find out the extracted images. The algorithm being proposed here
has been shown to have good efficiency, but it is good enough to extract information from noisy
environment in many application cases as: Biomedical signal processing, Image Processing, Image
de-noising, Satellite Image Resolution, speech processing. Thus using MATLAB Hybrid
Watermarking Techniques are implemented. Then Noise is added to the images in the form of
Attacks. The noise is later removed & the base & watermark images are separated from the
watermarked image. Finally a benchmarking of original & recovered image is done based on PSNR
& correlation values.
REFERENCES
[1] Md. MoshiulHoque and Md. IqbalHasanSarkar, “Combined DWT-DCT Based Digital Image
Watermarking Technique for Copyright Protection”2012, 7th International Conference on
Electrical and Computer Engineering, 20-22 December, 2012, Dhaka, Bangladesh.
[2] Kaushik Deb, Md. Sajib Al-Seraj, Mir Md. Saki Kowsar and IqbalHasanSarkar., “A Joint DWT-
DCT Based Watermarking Technique for Avoiding Unauthorized Replication ”. 2013 IEEE.
[3] Zhen Li, Kim-Hui Yap and Bai-Ying Lei, “A New Blind Robust Image Watermarking Scheme in
SVD-DCT Composite domain”.2011 ,IEEE International Conference on Image Processing.
[4] Mingwei Zhao Yanzhong Dang, “Color Image Copyright Protection Digital Watermarking
Algorithm Based on DWT &DCT”.Dalian University of Technology Dalian, China.2008 IEEE.
[5] Yi-linBei, De-yun Yang “A multi-channel Watermarking scheme based on HVS & DCT-
DWT”.2011 IEEE.
[6] ShikhaTripathi, R.C. Jain, “Novel DCT and DWT based Watermarking Techniques for Digital
Images”.2006 IEEE.
[7] Saied AmirgholipourKasmani, AhmadrezaNaghsh-Nilchi, “A New Robust Digital Image
Watermarking Technique Based On Joint DWT –DCT Transformation”. 2008 IEEE.
[8] NilanjanDey, DebalinaBiswas, “DWT-DCT-SVD based blind watermarking technique of gray
Image in Electrooculogram Signal”.2012 IEEE.
[9] SuchitraShrestha, Student Member IEEE, and Khan A. Wahid, Member, IEEE, “Cyber
Journals:Multidisciplinary Journal in Science & Technology(JSAB),November Edition 2010.
[10] Navas K A, Ajay Mathews, ArchanaTampy.S, Sasikumar M., “DWT-DCT-SVD Based
Watermarking ”.
[11] Jinwei Wang, ShiguoLian, Zhongxuan Liu, Haila Wang, “Image Watermarking Scheme Based on
3-D DCT”.2006 IEEE.
[12] GauravBhatnagar, Balasubramanian Raman,” A new robust reference watermarking scheme
based on DWT-SVD”, 2008 Elsevier.
[13] Karimella Vikram, Dr. V. Murali Krishna, Dr. Shaik Abdul Muzeer and K. Narasimha, “Invisible
Water Marking Within Media Files using State-of-the-Art Technology”, International Journal of
Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012, pp. 1 - 8, ISSN Print:
0976 – 6367, ISSN Online: 0976 – 6375.
[14] G. B. Khatri and Dr. D. S. Chaudhari, “A High Capacity Digital Audio Watermarking using
Discrete Wavelet and Cosine Transform”, International Journal of Electronics and
Communication Engineering &Technology (IJECET), Volume 4, Issue 6, 2013, pp. 71 - 84,
ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.
[15] N. R. Bamane, Dr. S. B. Patil, Prof. B. S. Patil and Prof. R. K. Undegaonkar, “Hybrid Video
Watermarking Technique By Using DWT & PCA”, International Journal of Electronics and
Communication Engineering &Technology (IJECET), Volume 4, Issue 2, 2013, pp. 172 - 179,
ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.

Mais conteúdo relacionado

Mais procurados

Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking TechniquesNazeera Sheth
 
An analysis of digital watermarking in frequency domain
An analysis of digital watermarking in frequency domainAn analysis of digital watermarking in frequency domain
An analysis of digital watermarking in frequency domainLikan Patra
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Samarth Godara
 
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSDIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSdebasis sahoo
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniquestheijes
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
 
Digital Image Watermarking
Digital Image WatermarkingDigital Image Watermarking
Digital Image WatermarkingPralin Pavithran
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applicationsKannekanti Utthej
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingParag Agarwal
 
Watermarking Techniques
Watermarking TechniquesWatermarking Techniques
Watermarking Techniquesabhijeetmi90
 

Mais procurados (20)

Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking Techniques
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
An analysis of digital watermarking in frequency domain
An analysis of digital watermarking in frequency domainAn analysis of digital watermarking in frequency domain
An analysis of digital watermarking in frequency domain
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
 
Dz31840846
Dz31840846Dz31840846
Dz31840846
 
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSDIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
 
50120130406038
5012013040603850120130406038
50120130406038
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
Digital Water marking
Digital Water markingDigital Water marking
Digital Water marking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
E04122330
E04122330E04122330
E04122330
 
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
 
Digital Image Watermarking
Digital Image WatermarkingDigital Image Watermarking
Digital Image Watermarking
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Watermarking Techniques
Watermarking TechniquesWatermarking Techniques
Watermarking Techniques
 

Semelhante a Secure Hybrid DWT DCT Watermarking

A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueIRJET Journal
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET Journal
 
IRJET- Survey of Digital Watermarking Techniques and its Application
IRJET- Survey of Digital Watermarking Techniques and its ApplicationIRJET- Survey of Digital Watermarking Techniques and its Application
IRJET- Survey of Digital Watermarking Techniques and its ApplicationIRJET Journal
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYIRJET Journal
 
A robust fsm watermarking scheme for ip protection of sequential circuit desi...
A robust fsm watermarking scheme for ip protection of sequential circuit desi...A robust fsm watermarking scheme for ip protection of sequential circuit desi...
A robust fsm watermarking scheme for ip protection of sequential circuit desi...Ece Rljit
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
 
IRJET-A study of video watermarking techniques based on energy model
IRJET-A study of video watermarking techniques based on energy modelIRJET-A study of video watermarking techniques based on energy model
IRJET-A study of video watermarking techniques based on energy modelIRJET Journal
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsYogeshIJTSRD
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET Journal
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology vijay rastogi
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH acijjournal
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000authority12
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 

Semelhante a Secure Hybrid DWT DCT Watermarking (20)

A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
IRJET- Survey of Digital Watermarking Techniques and its Application
IRJET- Survey of Digital Watermarking Techniques and its ApplicationIRJET- Survey of Digital Watermarking Techniques and its Application
IRJET- Survey of Digital Watermarking Techniques and its Application
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
 
B010510613
B010510613B010510613
B010510613
 
A robust fsm watermarking scheme for ip protection of sequential circuit desi...
A robust fsm watermarking scheme for ip protection of sequential circuit desi...A robust fsm watermarking scheme for ip protection of sequential circuit desi...
A robust fsm watermarking scheme for ip protection of sequential circuit desi...
 
Iw2415551560
Iw2415551560Iw2415551560
Iw2415551560
 
B011110614
B011110614B011110614
B011110614
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
IRJET-A study of video watermarking techniques based on energy model
IRJET-A study of video watermarking techniques based on energy modelIRJET-A study of video watermarking techniques based on energy model
IRJET-A study of video watermarking techniques based on energy model
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and Applications
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 

Mais de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mais de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Último

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Secure Hybrid DWT DCT Watermarking

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 186-193 © IAEME 186 SECURE HYBRID WATERMARKING USING DISCRETE WAVELET TRANSFORM (DWT) & DISCRETE COSINE TRANSFORM (DCT) Neetu Rathi 1 and Dr. Anil Kumar Sharma2 M. Tech. Scholar1 , Professor & Principal2 Department of Electronics & Communication Engineering, Institute of Engineering & Technology, Alwar-301030 (Raj.), India ABSTRACT Digital image watermarking is a technique used for copyright protections of digital data. A digital watermark is a kind of marker covertly embedded in a noise-tolerant signal such as audio or image data. It is typically used to identify ownership of the copyright of such signal. This paper presents an efficient hybrid digital watermarking technique using DWT & DCT for copy right protection. In addition, a concise introduction about digital marking is presented along with its properties, techniques & attacks. The simulation results show that this algorithm has good robustness for some common image processing operations & also gives improved results in terms of PSNR & Correlation coefficients. Keyword: Attacks, Authentication, DCT, DWT, PSNR. 1. INTRODUCTION Everyday tons of data is embedded on digital media or distributed over the internet. The data so distributed can easily be imitated without error, putting the rights of their owners at risk. Even when encrypted for distribution, data can easily be decrypted and copied. One way to discourage illegal duplication is to insert information known as watermark, into potentially vulnerable data in such a way that it is impossible to separate the watermark from the data. These challenges motivated researchers to carry out intense research in the field of watermarking. A watermark is a form, image or text that is impressed onto paper, which provides indication of its authenticity. Digital watermarking is an extension of the same concept. Digital watermarking is the process of embedding information into digital multimedia content such that the information can be extracted or detected at the later stage for a variety of purposes including copy prevention and control [1]. A digital INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 4, April (2014), pp. 186-193 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. watermark is used for this purpose which is a digital signal inserted into a digital image and may also serve as a digital signature [2]. Digital watermarking is also to be contrasted with public encryption, which also transforms original files into another form. Unlike encryption, digital watermarking leaves the original image uncontaminated and recognizable. In addition, digital watermarks, as signatures, may not be validated without special software. Further, decrypted documents are far from of any residual effects of encryption, whereas digital watermarks are designed to be persistent in viewing, printing, or subsequent retransmission or dissemination. are two types of watermarks: visible watermark and invisible waterma concentrated on implementing watermark in image. The main factor of consideration for any watermarking scheme is its robustness to various attacks. Watermarking dependency on the original image increases its robustness but at the imperceptible. 2. CLASSIFICATION OF WATERMARKING The classification of watermarks and watermarking techniques is very broad. These are divided into various categories [5, 6, 7] based on the type of Document it can be divided into four categories Watermarking, Audio Watermarking Fig. 1: Classification of watermarking Techniques On the basis of domain used for watermarking the techniques fall in two categories: those which use spatial domain and those which use transform domain. Spatial technologies change the intensity of original image or gray levels of its p watermarking is simple and with low computing complexity, because no frequency transform is needed. However, there must be trade common image processing and noise. Trans the transformed image. According to the human perception [5, 6, 9], watermark, Invisible-Robust watermark According to the application it is either source based or destination based. Source are desirable for ownership identification or authentication where a unique watermark identifying the owner is introduced to all the copies of a particular image being distri watermark could be used for authentication and to determine whether a received image or other electronic data has been tampered with. The watermark could also be destination based where each distributed copy gets a unique watermark id watermark could be used to trace the buyer in the case of illegal reselling. enable watermarking in the spatial domain. The simplest is just to flip the lowest International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6375(Online), Volume 5, Issue 4, April (2014), pp. 186-193 © IAEME 187 watermark is used for this purpose which is a digital signal inserted into a digital image and may also serve as a digital signature [2]. Digital watermarking is also to be contrasted with public ms original files into another form. Unlike encryption, digital watermarking leaves the original image uncontaminated and recognizable. In addition, digital watermarks, as signatures, may not be validated without special software. Further, decrypted nts are far from of any residual effects of encryption, whereas digital watermarks are designed to be persistent in viewing, printing, or subsequent retransmission or dissemination. are two types of watermarks: visible watermark and invisible watermark. In this paper we have concentrated on implementing watermark in image. The main factor of consideration for any watermarking scheme is its robustness to various attacks. Watermarking dependency on the original image increases its robustness but at the same time we need to make sure that the watermark is CLASSIFICATION OF WATERMARKING The classification of watermarks and watermarking techniques is very broad. These are divided into various categories [5, 6, 7] based on different criterions as shown in Fig can be divided into four categories i.e. Text Watermarking Audio Watermarking and Video Watermarking. Fig. 1: Classification of watermarking Techniques On the basis of domain used for watermarking the techniques fall in two categories: those which use spatial domain and those which use transform domain. Spatial-domain watermarking technologies change the intensity of original image or gray levels of its pixels. This kind of watermarking is simple and with low computing complexity, because no frequency transform is needed. However, there must be trade-offs between invisibility and robustness, and it is hard to resist common image processing and noise. Transform-domain watermarking embeds the watermark into According to the human perception [5, 6, 9], it can be divided into Visible Robust watermark, Invisible-Fragile watermark and Dual watermark either source based or destination based. Source- are desirable for ownership identification or authentication where a unique watermark identifying the owner is introduced to all the copies of a particular image being distributed. A source watermark could be used for authentication and to determine whether a received image or other electronic data has been tampered with. The watermark could also be destination based where each distributed copy gets a unique watermark identifying the particular buyer. The destination watermark could be used to trace the buyer in the case of illegal reselling. Several different methods enable watermarking in the spatial domain. The simplest is just to flip the lowest-order bit of ch International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), watermark is used for this purpose which is a digital signal inserted into a digital image and may also serve as a digital signature [2]. Digital watermarking is also to be contrasted with public-key ms original files into another form. Unlike encryption, digital watermarking leaves the original image uncontaminated and recognizable. In addition, digital watermarks, as signatures, may not be validated without special software. Further, decrypted nts are far from of any residual effects of encryption, whereas digital watermarks are designed to be persistent in viewing, printing, or subsequent retransmission or dissemination. There rk. In this paper we have concentrated on implementing watermark in image. The main factor of consideration for any watermarking scheme is its robustness to various attacks. Watermarking dependency on the original same time we need to make sure that the watermark is The classification of watermarks and watermarking techniques is very broad. These are ig.1. According to Text Watermarking, Image On the basis of domain used for watermarking the techniques fall in two categories: those domain watermarking ixels. This kind of watermarking is simple and with low computing complexity, because no frequency transform is offs between invisibility and robustness, and it is hard to resist domain watermarking embeds the watermark into can be divided into Visible Dual watermark. -based watermark are desirable for ownership identification or authentication where a unique watermark identifying the buted. A source-based watermark could be used for authentication and to determine whether a received image or other electronic data has been tampered with. The watermark could also be destination based where each entifying the particular buyer. The destination -based Several different methods order bit of chosen
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 186-193 © IAEME 188 pixels. This works well only if the image is not subject to any change. A more robust watermark can be embedded by superimposing a symbol on picture. The resulting mark may be visible or invisible, depending upon the intensity value. Picture cropping, e.g., (a common operation of image editors), can be used to remove the watermark. Spatial watermarking can also be applied using color separation. In this way, the watermark appears in only one of the color bands. This renders the watermark visibly subtle such that it is difficult to identify under regular viewing. However, the mark appears immediately when the colors are separated for printing. This renders the document useless for the printer unless the watermark can be removed from the color band. This approach is used commercially for journalists to inspect digital pictures from a photo-stockhouse before buying unmarked versions. Watermarking can be applied in the frequency domain (and other transform domains) by first applying a transform like the Fast Fourier Transform (FFT). In a similar manner to spatial domain watermarking, the values of chosen frequencies can be altered from the original. Since high frequencies will be lost by compression or scaling, the watermark signal is applied to lower frequencies, or better yet, applied adaptively to frequencies that contain important information of the original picture. Since watermarks applied to the frequency domain will be dispersed over the whole of the spatial image upon inverse transformation, this method is not as vulnerable to defeat by cropping as the spatial technique. However, there is more a trade-off here between invisibility and decodability, since the watermark is in effect applied indiscriminately across the spatial image. 3. ATTACKS ON WATERMARKS A watermarked image is likely to be subjected to certain manipulations [2, 13], some intentional such as compression and transmission noise and some intentional such as cropping, filtering, etc. The main type of attacks is as follows. • Active Attacks: Here, the hacker tries intentionally to remove the watermark or simply make it unnoticeable. This is a big issue in copyright protection, fingerprinting or copy control for example. • Passive attacks: In this case, the attacker is not trying to remove the watermark but simply trying to determine if a given mark is existing or not. As the reader should understand, protection against passive attacks is of the greatest importance in covert communications where the simple knowledge of the presence of watermark is often more than one want to grant. • Collusion attacks: In collusive attacks [2], the goal of the hacker is the same as for the active attacks but the process is somewhat different. In order to remove the watermark, the hacker uses several copies of the same data, containing each different watermark, to construct a new copy without any watermark. This is a problem in fingerprinting applications (e.g. in the film industry) but is not the widely spread because the attacker must have access to multiple copies of the same data and that the number needed can be pretty important. • Forgery attacks: This is probably the main concern in data authentication. In forgery attacks, the hacker aims at embedding a new, valid watermark rather than removing one. By doing so, it allows him to make change in the protected data as he wants and then, re-inserts a new given key to replace the destructed (fragile) one, thus making the corrupted image seems genuine.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 186-193 © IAEME 189 4. PROPOSED ALGORITHM AND SIMULATION In this work an algorithm is proposed for secure hybrid digital watermarking using DWT & DCT. For this a word “Hi” is used as a watermark & the image “lena” is used as a cover image. This watermark is first decomposed into equal parts in the form of binary matrix (0,1). Then the size of watermark image or message image is checked in comparison to the cover image. The size of the watermark should not be greater than that of cover image so that it can hide behind the cover image. Next the DWT is applied & the cover image is decomposed into its approximation coefficient’s. After applying DWT we get low frequency components of the cover image (cA1) & next we set a key=1982 for security purpose & a value of factor=10 which can vary. Then the watermarked image is to be hide behind the cover image in an encrypted manner (i.e. changing pixel value of cover image according to the watermark image). Afterwards extracting of the watermark image is done in a decrypted manner using DCT so that only a known receiver can decode it. Then PSNR & Correlation Value are computed for the recovered watermarked image. Fig. 2 shows the steps of simulation. (a) Cover image “Lena” (b) Watermark Image “Hi” (c) Decomposed Watermark (d) Watermarked Image
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 186-193 © IAEME 190 (e) Extracted Watermark (f) Normalized Correlation Plot Fig. 2: Watermark Embedding & Extraction Using DWT & DCT Here we have observed that the For Original Image Vs. Extracted Watermark Image, The value of PSNR = 56.7416, Correlation Value = 1. Next we are going to simulate the process with Attacks of Gaussian Noise as shown in Fig.3. (a) Decomposed Image (b) Watermarked Image (c) Extracted Watermark (d) Normalized correlation plot Fig. 3: Simulation with Attacks of Gaussian Noise
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 186-193 © IAEME 191 Here we have observed that the For Original Image Vs. Extracted Watermark Image, The value of PSNR = 56.7109, Correlation Value = 0.9964 Next we go for compression attack as shown in Fig. 4. (a) Decomposed Watermark (b) Extracted Watermark (d) Normalized Correlation Plot Fig. 4: Simulation with Compression Attack Here we have observed, The value of PSNR = 56.7416, Correlation Value = 1 Next we carry out the Simulation with Salt & Pepper Attack as shown in Fig. 5.
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 186-193 © IAEME 192 (a) Decomposed Watermark (b) Watermarked Image (c) Extracted Watermark (d) Normalized Correlation Plot Fig. 5: Simulation with Considering Salt & Peeper Attack Here we have observed that for Original Image Vs. Salt & Peeper Attacked Watermark Image, the value of PSNR = 54.1684, Correlation Value = -0.036327 Observation: From Table-1 we can see that with reference to previous work we obtain much better result in terms of PSNR & Correlation Coefficient. Both parameters are improved for different cases i. e. without attack & on application of attack. Table-1: Summary of Results as Compared to Previous Work Various Results Results of Previous Work Result 1 using Hybrid Technique without Attack Result 2 using Hybrid Technique with Attack Result 3 using Hybrid Technique with Attack Result 4 using Hybrid Technique with Attack Techniques Original EOG Signal Vs. Watermarked Signal Original Image Vs. Extracted Watermark Image Original Image Vs. Gaussian attacked Watermark Image Original Image Vs. Compression attacked Watermark Image Original Image Vs. Salt &peeper attacked Watermark Image PSNR 31.552 56.7416 56.7109 56.7416 54.1684 Correlation Coefficient 0.9965 1 0.9964 1 -0.036327
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 186-193 © IAEME 193 5. CONCLUSION The purpose of this paper is to provide a Hybrid Techniques i.e. combination of DWT & DCT which provides much security & robustness. The results obtained from the algorithm have provided simpler and a faster approach to find out the extracted images. The algorithm being proposed here has been shown to have good efficiency, but it is good enough to extract information from noisy environment in many application cases as: Biomedical signal processing, Image Processing, Image de-noising, Satellite Image Resolution, speech processing. Thus using MATLAB Hybrid Watermarking Techniques are implemented. Then Noise is added to the images in the form of Attacks. The noise is later removed & the base & watermark images are separated from the watermarked image. Finally a benchmarking of original & recovered image is done based on PSNR & correlation values. REFERENCES [1] Md. MoshiulHoque and Md. IqbalHasanSarkar, “Combined DWT-DCT Based Digital Image Watermarking Technique for Copyright Protection”2012, 7th International Conference on Electrical and Computer Engineering, 20-22 December, 2012, Dhaka, Bangladesh. [2] Kaushik Deb, Md. Sajib Al-Seraj, Mir Md. Saki Kowsar and IqbalHasanSarkar., “A Joint DWT- DCT Based Watermarking Technique for Avoiding Unauthorized Replication ”. 2013 IEEE. [3] Zhen Li, Kim-Hui Yap and Bai-Ying Lei, “A New Blind Robust Image Watermarking Scheme in SVD-DCT Composite domain”.2011 ,IEEE International Conference on Image Processing. [4] Mingwei Zhao Yanzhong Dang, “Color Image Copyright Protection Digital Watermarking Algorithm Based on DWT &DCT”.Dalian University of Technology Dalian, China.2008 IEEE. [5] Yi-linBei, De-yun Yang “A multi-channel Watermarking scheme based on HVS & DCT- DWT”.2011 IEEE. [6] ShikhaTripathi, R.C. Jain, “Novel DCT and DWT based Watermarking Techniques for Digital Images”.2006 IEEE. [7] Saied AmirgholipourKasmani, AhmadrezaNaghsh-Nilchi, “A New Robust Digital Image Watermarking Technique Based On Joint DWT –DCT Transformation”. 2008 IEEE. [8] NilanjanDey, DebalinaBiswas, “DWT-DCT-SVD based blind watermarking technique of gray Image in Electrooculogram Signal”.2012 IEEE. [9] SuchitraShrestha, Student Member IEEE, and Khan A. Wahid, Member, IEEE, “Cyber Journals:Multidisciplinary Journal in Science & Technology(JSAB),November Edition 2010. [10] Navas K A, Ajay Mathews, ArchanaTampy.S, Sasikumar M., “DWT-DCT-SVD Based Watermarking ”. [11] Jinwei Wang, ShiguoLian, Zhongxuan Liu, Haila Wang, “Image Watermarking Scheme Based on 3-D DCT”.2006 IEEE. [12] GauravBhatnagar, Balasubramanian Raman,” A new robust reference watermarking scheme based on DWT-SVD”, 2008 Elsevier. [13] Karimella Vikram, Dr. V. Murali Krishna, Dr. Shaik Abdul Muzeer and K. Narasimha, “Invisible Water Marking Within Media Files using State-of-the-Art Technology”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012, pp. 1 - 8, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [14] G. B. Khatri and Dr. D. S. Chaudhari, “A High Capacity Digital Audio Watermarking using Discrete Wavelet and Cosine Transform”, International Journal of Electronics and Communication Engineering &Technology (IJECET), Volume 4, Issue 6, 2013, pp. 71 - 84, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. [15] N. R. Bamane, Dr. S. B. Patil, Prof. B. S. Patil and Prof. R. K. Undegaonkar, “Hybrid Video Watermarking Technique By Using DWT & PCA”, International Journal of Electronics and Communication Engineering &Technology (IJECET), Volume 4, Issue 2, 2013, pp. 172 - 179, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.