SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME
240
A ROBUST AND SECURE VISIBLE WATERMARKING SCHEME
BASED ON MULTI WAVELET TECHNIQUE WITH MODIFIRD FAST
HAAR TRANSFORM [MFHWT]
Shefaly Sharma1
, Jagpreet Kaur2
1
(Computer science and engg., Lovely Professional University, Jalandhar, India)
2
(Computer science and engg., Lovely Professional University, Jalandhar, India)
ABSTRACT
Internet has rapidly become popular worldwide and we can see that people are sharing
huge amount of data [photos, videos, audio files and other crucial information] through
Internet. So security of data is becoming a crucial issue. In this paper, we are providing a robust
image watermarking technique. We are going to apply watermarking using multi wavelet
transformation with modified fast Haar wavelet transformation [MFHWT]. Watermarking is a
technique by which user can get copyright protection of the data so that no other person is able
to use it without the permission of its owner
Keywords: Visible Watermarking, MFHWT, Multi Wavelets, PSNR, MSE.
I. INTRODUCTION
There are a lot of changes being made in the field of internet and multimedia. Now days,
it has become possible to create, manipulate, and transmit data at much higher rates due to the
advancements being made. Protection of multimedia content has become challenging due to
the threats of data authentication, and protection against illegal use of data are being increased
so security has become one of the most significant and challenging problems. Watermarking is
one of the popular techniques of image processing. It is used to observe authentication of
licensed user over e-commerce applications and finds its use in illegal applications like copying
multimedia data. A Watermark system consists of key (public key and private key). The use of
key provides security i.e. prevents unauthorized use of data.[7]
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN
ENGINEERING AND TECHNOLOGY (IJARET)
ISSN 0976 - 6480 (Print)
ISSN 0976 - 6499 (Online)
Volume 4, Issue 2 March – April 2013, pp. 240-247
© IAEME: www.iaeme.com/ijaret.asp
Journal Impact Factor (2013): 5.8376 (Calculated by GISI)
www.jifactor.com
IJARET
© I A E M E
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME
241
1. Technologies used for Security of Multimedia
1.1 Fingerprinting
It is a technique which is used to protect data from unauthorized redistribution. It is used for
embedding a unique ID called fingerprint into each users copy for representing anti collision
code [ACC], which can help to identify the criminal when an unauthorized link is found[5]
1.2 Cryptography
It is a technique used for secure communication. It converts data into such a form that it can
only be read by the receiver. No other person is able to detect it. So for secure communication it
uses public and private keys. These keys are only known to sender and receiver. If other person
wants to read the data than he first needs to know the key value, and detecting this key value is
not an easy task.[3].
1.3 Steganography
It is a method of hiding message such that only the sender and receiver are able to read the
message. It replaces the bits of useless data in regular files with bits of different, invisible
information. The hidden information can be image or text.[7]
1.4 Watermarking
It is used to provide copyright protection and also provides robustness against various attacks.
Watermarking is one of the popular techniques of image processing. It is used to observe
authentication of licensed user over e-commerce applications and finds its use in illegal
applications like copying multimedia data. A Watermark system consists of key (public key
and private key). The use of key provides security i.e. prevents unauthorized use of data.[3]
2. Visible Watermarking
Visible Watermarking is a process by which we embed data into digital and analog
content in order to identify its owner. And then watermark becomes a permanent part of the
content, even it is distributed to others. These are similar to watermarks used on paper. Visible
watermark change the signal such that it is different from the actual signal. Watermark act as a
seal which is placed on an image to provide copyright protection. For e.g. if a photography
company shares its photographs on internet and wants copyright protection for its data then
they can add a watermark to their data so that no other person can use it with a watermark on it
without their permission. Visible watermark is also used to indicate ownership originals to
monitor and track how his image is being use.[7]
3. Types of Watermark
3.1 Visible Watermarking
It is visible semi-transparent text or image overlapped on the original image. In this we are able
to look at the original image but it also provide copyright protection. These watermarks are
more robust against transformation of image. Thus they are preferred for strong copyright
protection digital form.[7]
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME
242
3.2 Invisible watermarking
It is invisible text or image overlapped on original image. In this we cannot see the image. Only
electronic devices can extract the hidden information to identify the copyright owner. Invisible
watermarks are used to provide authentication.[7]
3.2.1 Robust
In this case, watermark is embedded in such a way that if any changes are done to the pixel
value in the image then it will be unnoticeable and can on it be recovered using decoding
mechanism [7]
3.2.2 Fragile
In this case, watermark is embedded in such a way that if any changes are done in the
watermarked image then the image would either alter or will destroy the watermark.[7]
Figure 1: Types of Watermark
4. Characterstics of Watermark
There are three characteristics of watermarking. If we will increase any one feature then others
get decreased. So we should apply it according to our needs
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME
243
4.1 Maximal Capacity
This is a watermarking technique in which the size of watermark to be applied should be such
that it should not degrade the quality of the image.[4][7]
4.2 Robustness
This is a watermarking technique in which watermarked image should stand against image
compression, noise and cropping effects. [4][7]
4.3 Imperceptibility
Human eye should not be able to make any difference between the original image and the
image to which watermark has been applied.[4][7]
4.4 Security
Our watermark should be able to provide security against unauthorized access to the
watermark.[4][7].
5. Wavelet Transformation
Wavelet transformations are used to solve difficult problems of physics, computers, and
mathematics. I t provides various applications like compression, image processing, signal
processing, etc. It allows difficult problems to be decomposed into elementary form and then
reconstructed with high precision.[6][7]
6. Haar Transform
Haar transformation performs average and differentiation functions for deleting data,
sorting coefficients, reconstructing the matrix such that final matrix is similar to initial
matrix.[7]
7. Modified Fast Haar Wavelet Transform
MFHWT is used for 1D approach. It is faster than fast Haar transformation (FHT). By
applying this method we get improved values of approximation and coefficients that fast haar
transformation (FHT) and Haar transformation (HT) because in MFHWT we need to store half
of the original data and hence memory used in this case is also less.[1]
II. PROPOSED SCHEME
In this paper, to overcome the limitations of DWT with modified Haar wavelet
transform and wavelet packet transform we will design an algorithm which is robust enough
that it can withstand different transmission parameters e.g. Compression filters, Reform attack
,File an original copy.
STEP 1: Take an image
STEP 2: Apply multi wavelet packets.
STEP 3: Input text into decomposed sub bands.
STEP 4: Inverse of transformation.
STEP 5: Obtain image
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME
244
III. EXPERIMENTAL RESULTS
Figure 2: GUI Interface for Visible Watermarking
Figure 3: Watermark applies to the top left of original image
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME
245
Figure 4: Watermark applied at the Right top of the original Image
Figure 5: Watermark applied at the Center of original Image
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME
246
IV. RESULTS AND CALCULATIONS
After the experiments performed on registered Images in MATLAB, we have realized that
above factors determine the quality of watermarked image. Our technique is better than those of
other techniques of digital watermarking, because this technique provides high quality of
information. The quality of image is measured by PSNR.
Table 1: Visible Image Watermarking
Table 2: Text Watermarking
V. CONCLUSION
A number of techniques have been proposed for watermarking; however our proposed
technique is better than other techniques as this technique provide better quality of image after
applying watermark on the original image.
Position
of
Watermark.
Left Top Right Top Left
Bottom
Right
Bottom
Center
Watermar
k
Images
PSNR
Values
47.2473 45.2146 45.8974 45.31 46.2579
Text
Watermark
Images
PSNR Values 26.3609
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME
247
VI. REFERENCES
[1] Ali Rashid, Bhardwaj Anuj ,2009, “Image compression using modified fast haar wavelet
transform, “world applied sciences journal
[2] Damien Adams, Patterson Hasley, 2006, ‘The Haar Wavelet Transform: compression and
Reconstruction’.
[3] Dittmann Jana, Wohlmacher Petra Nahr, 2011, “Using cryptographic and watermarking
algorithms,” IEEE.
[4] Hanna Tawfik Magdy, Saaid Monir Mary, Nossair Bassyouni Zaki, 2011, ‘An Image
Watermarking Scheme Based on Multiresolution Analysis’,IEEE
[5] Hu Defa , Li Qiadiang, 2011, “A simple fingerprinting scheme for large user groups,”
Springer.
[6] Islam R M, Sifuzzaman R M, Ali Z M , 2009, ‘Application of Wavelet transform and its
advantages compared to Fourier transform’, Journal of Physical science.
[7] Sharma Shefaly, Jagpreet Kaur, 2013, “An efficient technique of Watermarking using
Multiwavelets with Modified Fast Haar Wavelet Transform’, IJITEEE.
[8] Dr. Sudeep D. Thepade and Jyoti S.Kulkarni, “Novel Image Fusion Techniques using
Global and Local Kekre Wavelet Transforms”, International Journal of Computer
Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 89 - 96, ISSN Print:
0976 – 6367, ISSN Online: 0976 – 6375.
[9] G. B. Khatri and D. S. Chaudhari, “Digital Audio Watermarking Applications and
Techniques”, International journal of Electronics and Communication Engineering &
Technology (IJECET), Volume 4, Issue 2, 2013, pp. 109 - 115, ISSN Print: 0976- 6464,
ISSN Online: 0976 –6472.
[10] Sambhunath Biswas and Amrita Biswas, “Fourier Mellin Transform Based Face
Recognition”, International Journal of Computer Engineering & Technology (IJCET),
Volume 4, Issue 1, 2013, pp. 8 - 15, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

Mais conteúdo relacionado

Mais procurados

IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET Journal
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))IAESIJEECS
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000authority12
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...ijsrd.com
 
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET Journal
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterkingeSAT Publishing House
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...IAEME Publication
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsIRJET Journal
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspectseSAT Publishing House
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...AIRCC Publishing Corporation
 
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...IRJET Journal
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...IRJET Journal
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET Journal
 
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET Journal
 
Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...IJECEIAES
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 

Mais procurados (19)

IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...
 
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking Applications
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspects
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
 
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
 
Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
1709 1715
1709 17151709 1715
1709 1715
 

Destaque

Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2IAEME Publication
 
Modeling, simulation & dynamic analysis of four bar planar
Modeling, simulation & dynamic analysis of four bar planarModeling, simulation & dynamic analysis of four bar planar
Modeling, simulation & dynamic analysis of four bar planarIAEME Publication
 
Inclusion of environmental constraints into siting and sizing
Inclusion of environmental constraints into siting and sizingInclusion of environmental constraints into siting and sizing
Inclusion of environmental constraints into siting and sizingIAEME Publication
 
Recent trends in rapid product development 2-3-4
Recent trends in rapid product development 2-3-4Recent trends in rapid product development 2-3-4
Recent trends in rapid product development 2-3-4IAEME Publication
 
A study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsrA study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsrIAEME Publication
 
An energy efficient protocol based study of wsn to increase the lifetime
An energy efficient protocol based study of wsn to increase the lifetimeAn energy efficient protocol based study of wsn to increase the lifetime
An energy efficient protocol based study of wsn to increase the lifetimeIAEME Publication
 
Application of knowledge engineering and computational intelligence for struc...
Application of knowledge engineering and computational intelligence for struc...Application of knowledge engineering and computational intelligence for struc...
Application of knowledge engineering and computational intelligence for struc...IAEME Publication
 
Fuzzy controller based current harmonics suppression using shunt active filter
Fuzzy controller based current harmonics suppression using shunt active filterFuzzy controller based current harmonics suppression using shunt active filter
Fuzzy controller based current harmonics suppression using shunt active filterIAEME Publication
 
A bridgeless cuk converter based induction motor drive for pfc applications
A bridgeless cuk converter based induction motor drive for pfc applicationsA bridgeless cuk converter based induction motor drive for pfc applications
A bridgeless cuk converter based induction motor drive for pfc applicationsIAEME Publication
 
Positive potential of partial replacement of fine aggregates by waste glass 6...
Positive potential of partial replacement of fine aggregates by waste glass 6...Positive potential of partial replacement of fine aggregates by waste glass 6...
Positive potential of partial replacement of fine aggregates by waste glass 6...IAEME Publication
 
A study on effectiveness of cause related marketing [crm] as a strategic phil...
A study on effectiveness of cause related marketing [crm] as a strategic phil...A study on effectiveness of cause related marketing [crm] as a strategic phil...
A study on effectiveness of cause related marketing [crm] as a strategic phil...IAEME Publication
 
Pre emphasis on data for an adaptive fingerprint image enhancement
Pre emphasis on data for an adaptive fingerprint image enhancementPre emphasis on data for an adaptive fingerprint image enhancement
Pre emphasis on data for an adaptive fingerprint image enhancementIAEME Publication
 
Apostila windows 7_-_o_guia_de_bolso_397pgs_-_by_cherinho
Apostila windows 7_-_o_guia_de_bolso_397pgs_-_by_cherinhoApostila windows 7_-_o_guia_de_bolso_397pgs_-_by_cherinho
Apostila windows 7_-_o_guia_de_bolso_397pgs_-_by_cherinhoCachorrona2
 
Redes de Computadores - Aula 07
Redes de Computadores - Aula 07Redes de Computadores - Aula 07
Redes de Computadores - Aula 07Anderson Andrade
 
Generaciones de las computadoras
Generaciones de las computadorasGeneraciones de las computadoras
Generaciones de las computadorasJ023PH12
 

Destaque (20)

Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2
 
Modeling, simulation & dynamic analysis of four bar planar
Modeling, simulation & dynamic analysis of four bar planarModeling, simulation & dynamic analysis of four bar planar
Modeling, simulation & dynamic analysis of four bar planar
 
Inclusion of environmental constraints into siting and sizing
Inclusion of environmental constraints into siting and sizingInclusion of environmental constraints into siting and sizing
Inclusion of environmental constraints into siting and sizing
 
Recent trends in rapid product development 2-3-4
Recent trends in rapid product development 2-3-4Recent trends in rapid product development 2-3-4
Recent trends in rapid product development 2-3-4
 
A study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsrA study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsr
 
An energy efficient protocol based study of wsn to increase the lifetime
An energy efficient protocol based study of wsn to increase the lifetimeAn energy efficient protocol based study of wsn to increase the lifetime
An energy efficient protocol based study of wsn to increase the lifetime
 
Application of knowledge engineering and computational intelligence for struc...
Application of knowledge engineering and computational intelligence for struc...Application of knowledge engineering and computational intelligence for struc...
Application of knowledge engineering and computational intelligence for struc...
 
Fuzzy controller based current harmonics suppression using shunt active filter
Fuzzy controller based current harmonics suppression using shunt active filterFuzzy controller based current harmonics suppression using shunt active filter
Fuzzy controller based current harmonics suppression using shunt active filter
 
A bridgeless cuk converter based induction motor drive for pfc applications
A bridgeless cuk converter based induction motor drive for pfc applicationsA bridgeless cuk converter based induction motor drive for pfc applications
A bridgeless cuk converter based induction motor drive for pfc applications
 
Positive potential of partial replacement of fine aggregates by waste glass 6...
Positive potential of partial replacement of fine aggregates by waste glass 6...Positive potential of partial replacement of fine aggregates by waste glass 6...
Positive potential of partial replacement of fine aggregates by waste glass 6...
 
A study on effectiveness of cause related marketing [crm] as a strategic phil...
A study on effectiveness of cause related marketing [crm] as a strategic phil...A study on effectiveness of cause related marketing [crm] as a strategic phil...
A study on effectiveness of cause related marketing [crm] as a strategic phil...
 
Pre emphasis on data for an adaptive fingerprint image enhancement
Pre emphasis on data for an adaptive fingerprint image enhancementPre emphasis on data for an adaptive fingerprint image enhancement
Pre emphasis on data for an adaptive fingerprint image enhancement
 
Michu compu 2
Michu compu 2Michu compu 2
Michu compu 2
 
6. yotube
6. yotube6. yotube
6. yotube
 
Biologia As Briófitas
Biologia As BriófitasBiologia As Briófitas
Biologia As Briófitas
 
Malàisia
MalàisiaMalàisia
Malàisia
 
Quitar fondo (2)
Quitar fondo (2)Quitar fondo (2)
Quitar fondo (2)
 
Apostila windows 7_-_o_guia_de_bolso_397pgs_-_by_cherinho
Apostila windows 7_-_o_guia_de_bolso_397pgs_-_by_cherinhoApostila windows 7_-_o_guia_de_bolso_397pgs_-_by_cherinho
Apostila windows 7_-_o_guia_de_bolso_397pgs_-_by_cherinho
 
Redes de Computadores - Aula 07
Redes de Computadores - Aula 07Redes de Computadores - Aula 07
Redes de Computadores - Aula 07
 
Generaciones de las computadoras
Generaciones de las computadorasGeneraciones de las computadoras
Generaciones de las computadoras
 

Semelhante a A robust and secure visible watermarking scheme based on multi

ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwtIAEME Publication
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingEditor IJMTER
 
Understanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical ApproachUnderstanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical ApproachIRJET Journal
 
Copyright protection for images on android phones
Copyright protection for images on android phonesCopyright protection for images on android phones
Copyright protection for images on android phoneseSAT Publishing House
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingIRJET Journal
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarkingijsrd.com
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET Journal
 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...IOSRJVSP
 
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET Journal
 
Color based android shuffling pattern lock
Color based android shuffling pattern lockColor based android shuffling pattern lock
Color based android shuffling pattern lockIRJET Journal
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYIRJET Journal
 
Image processing research proposal
Image processing research proposalImage processing research proposal
Image processing research proposalIftikhar Ahmad
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for securityIJERA Editor
 
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-  	  Comparative Study on Video Steganography in Spatial and IWT DomainIRJET-  	  Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT DomainIRJET Journal
 

Semelhante a A robust and secure visible watermarking scheme based on multi (20)

20320140501014 2
20320140501014 220320140501014 2
20320140501014 2
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwt
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking
 
50120140504020 2
50120140504020 250120140504020 2
50120140504020 2
 
Understanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical ApproachUnderstanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical Approach
 
Copyright protection for images on android phones
Copyright protection for images on android phonesCopyright protection for images on android phones
Copyright protection for images on android phones
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarking
 
1709 1715
1709 17151709 1715
1709 1715
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
 
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
 
Color based android shuffling pattern lock
Color based android shuffling pattern lockColor based android shuffling pattern lock
Color based android shuffling pattern lock
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
 
Image processing research proposal
Image processing research proposalImage processing research proposal
Image processing research proposal
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for security
 
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-  	  Comparative Study on Video Steganography in Spatial and IWT DomainIRJET-  	  Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
 

Mais de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mais de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Último

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

A robust and secure visible watermarking scheme based on multi

  • 1. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME 240 A ROBUST AND SECURE VISIBLE WATERMARKING SCHEME BASED ON MULTI WAVELET TECHNIQUE WITH MODIFIRD FAST HAAR TRANSFORM [MFHWT] Shefaly Sharma1 , Jagpreet Kaur2 1 (Computer science and engg., Lovely Professional University, Jalandhar, India) 2 (Computer science and engg., Lovely Professional University, Jalandhar, India) ABSTRACT Internet has rapidly become popular worldwide and we can see that people are sharing huge amount of data [photos, videos, audio files and other crucial information] through Internet. So security of data is becoming a crucial issue. In this paper, we are providing a robust image watermarking technique. We are going to apply watermarking using multi wavelet transformation with modified fast Haar wavelet transformation [MFHWT]. Watermarking is a technique by which user can get copyright protection of the data so that no other person is able to use it without the permission of its owner Keywords: Visible Watermarking, MFHWT, Multi Wavelets, PSNR, MSE. I. INTRODUCTION There are a lot of changes being made in the field of internet and multimedia. Now days, it has become possible to create, manipulate, and transmit data at much higher rates due to the advancements being made. Protection of multimedia content has become challenging due to the threats of data authentication, and protection against illegal use of data are being increased so security has become one of the most significant and challenging problems. Watermarking is one of the popular techniques of image processing. It is used to observe authentication of licensed user over e-commerce applications and finds its use in illegal applications like copying multimedia data. A Watermark system consists of key (public key and private key). The use of key provides security i.e. prevents unauthorized use of data.[7] INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) ISSN 0976 - 6480 (Print) ISSN 0976 - 6499 (Online) Volume 4, Issue 2 March – April 2013, pp. 240-247 © IAEME: www.iaeme.com/ijaret.asp Journal Impact Factor (2013): 5.8376 (Calculated by GISI) www.jifactor.com IJARET © I A E M E
  • 2. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME 241 1. Technologies used for Security of Multimedia 1.1 Fingerprinting It is a technique which is used to protect data from unauthorized redistribution. It is used for embedding a unique ID called fingerprint into each users copy for representing anti collision code [ACC], which can help to identify the criminal when an unauthorized link is found[5] 1.2 Cryptography It is a technique used for secure communication. It converts data into such a form that it can only be read by the receiver. No other person is able to detect it. So for secure communication it uses public and private keys. These keys are only known to sender and receiver. If other person wants to read the data than he first needs to know the key value, and detecting this key value is not an easy task.[3]. 1.3 Steganography It is a method of hiding message such that only the sender and receiver are able to read the message. It replaces the bits of useless data in regular files with bits of different, invisible information. The hidden information can be image or text.[7] 1.4 Watermarking It is used to provide copyright protection and also provides robustness against various attacks. Watermarking is one of the popular techniques of image processing. It is used to observe authentication of licensed user over e-commerce applications and finds its use in illegal applications like copying multimedia data. A Watermark system consists of key (public key and private key). The use of key provides security i.e. prevents unauthorized use of data.[3] 2. Visible Watermarking Visible Watermarking is a process by which we embed data into digital and analog content in order to identify its owner. And then watermark becomes a permanent part of the content, even it is distributed to others. These are similar to watermarks used on paper. Visible watermark change the signal such that it is different from the actual signal. Watermark act as a seal which is placed on an image to provide copyright protection. For e.g. if a photography company shares its photographs on internet and wants copyright protection for its data then they can add a watermark to their data so that no other person can use it with a watermark on it without their permission. Visible watermark is also used to indicate ownership originals to monitor and track how his image is being use.[7] 3. Types of Watermark 3.1 Visible Watermarking It is visible semi-transparent text or image overlapped on the original image. In this we are able to look at the original image but it also provide copyright protection. These watermarks are more robust against transformation of image. Thus they are preferred for strong copyright protection digital form.[7]
  • 3. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME 242 3.2 Invisible watermarking It is invisible text or image overlapped on original image. In this we cannot see the image. Only electronic devices can extract the hidden information to identify the copyright owner. Invisible watermarks are used to provide authentication.[7] 3.2.1 Robust In this case, watermark is embedded in such a way that if any changes are done to the pixel value in the image then it will be unnoticeable and can on it be recovered using decoding mechanism [7] 3.2.2 Fragile In this case, watermark is embedded in such a way that if any changes are done in the watermarked image then the image would either alter or will destroy the watermark.[7] Figure 1: Types of Watermark 4. Characterstics of Watermark There are three characteristics of watermarking. If we will increase any one feature then others get decreased. So we should apply it according to our needs
  • 4. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME 243 4.1 Maximal Capacity This is a watermarking technique in which the size of watermark to be applied should be such that it should not degrade the quality of the image.[4][7] 4.2 Robustness This is a watermarking technique in which watermarked image should stand against image compression, noise and cropping effects. [4][7] 4.3 Imperceptibility Human eye should not be able to make any difference between the original image and the image to which watermark has been applied.[4][7] 4.4 Security Our watermark should be able to provide security against unauthorized access to the watermark.[4][7]. 5. Wavelet Transformation Wavelet transformations are used to solve difficult problems of physics, computers, and mathematics. I t provides various applications like compression, image processing, signal processing, etc. It allows difficult problems to be decomposed into elementary form and then reconstructed with high precision.[6][7] 6. Haar Transform Haar transformation performs average and differentiation functions for deleting data, sorting coefficients, reconstructing the matrix such that final matrix is similar to initial matrix.[7] 7. Modified Fast Haar Wavelet Transform MFHWT is used for 1D approach. It is faster than fast Haar transformation (FHT). By applying this method we get improved values of approximation and coefficients that fast haar transformation (FHT) and Haar transformation (HT) because in MFHWT we need to store half of the original data and hence memory used in this case is also less.[1] II. PROPOSED SCHEME In this paper, to overcome the limitations of DWT with modified Haar wavelet transform and wavelet packet transform we will design an algorithm which is robust enough that it can withstand different transmission parameters e.g. Compression filters, Reform attack ,File an original copy. STEP 1: Take an image STEP 2: Apply multi wavelet packets. STEP 3: Input text into decomposed sub bands. STEP 4: Inverse of transformation. STEP 5: Obtain image
  • 5. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME 244 III. EXPERIMENTAL RESULTS Figure 2: GUI Interface for Visible Watermarking Figure 3: Watermark applies to the top left of original image
  • 6. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME 245 Figure 4: Watermark applied at the Right top of the original Image Figure 5: Watermark applied at the Center of original Image
  • 7. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME 246 IV. RESULTS AND CALCULATIONS After the experiments performed on registered Images in MATLAB, we have realized that above factors determine the quality of watermarked image. Our technique is better than those of other techniques of digital watermarking, because this technique provides high quality of information. The quality of image is measured by PSNR. Table 1: Visible Image Watermarking Table 2: Text Watermarking V. CONCLUSION A number of techniques have been proposed for watermarking; however our proposed technique is better than other techniques as this technique provide better quality of image after applying watermark on the original image. Position of Watermark. Left Top Right Top Left Bottom Right Bottom Center Watermar k Images PSNR Values 47.2473 45.2146 45.8974 45.31 46.2579 Text Watermark Images PSNR Values 26.3609
  • 8. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 2, March – April (2013), © IAEME 247 VI. REFERENCES [1] Ali Rashid, Bhardwaj Anuj ,2009, “Image compression using modified fast haar wavelet transform, “world applied sciences journal [2] Damien Adams, Patterson Hasley, 2006, ‘The Haar Wavelet Transform: compression and Reconstruction’. [3] Dittmann Jana, Wohlmacher Petra Nahr, 2011, “Using cryptographic and watermarking algorithms,” IEEE. [4] Hanna Tawfik Magdy, Saaid Monir Mary, Nossair Bassyouni Zaki, 2011, ‘An Image Watermarking Scheme Based on Multiresolution Analysis’,IEEE [5] Hu Defa , Li Qiadiang, 2011, “A simple fingerprinting scheme for large user groups,” Springer. [6] Islam R M, Sifuzzaman R M, Ali Z M , 2009, ‘Application of Wavelet transform and its advantages compared to Fourier transform’, Journal of Physical science. [7] Sharma Shefaly, Jagpreet Kaur, 2013, “An efficient technique of Watermarking using Multiwavelets with Modified Fast Haar Wavelet Transform’, IJITEEE. [8] Dr. Sudeep D. Thepade and Jyoti S.Kulkarni, “Novel Image Fusion Techniques using Global and Local Kekre Wavelet Transforms”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 89 - 96, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [9] G. B. Khatri and D. S. Chaudhari, “Digital Audio Watermarking Applications and Techniques”, International journal of Electronics and Communication Engineering & Technology (IJECET), Volume 4, Issue 2, 2013, pp. 109 - 115, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. [10] Sambhunath Biswas and Amrita Biswas, “Fourier Mellin Transform Based Face Recognition”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 8 - 15, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.