SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
108
VISIBLE WATERMARKING USING SPREAD SPECTRUM
Nikhat Nawaz,
Asso.prof, Dept of ECE,
Ayaan College of Engg & Tech
G.Prasanna Lakshmi,
Research Scholar,Gitam University,
Syed Saifuddin,
Asst.prof, Dept of ECE,
Ayaan College of Engg & Tech
Altaf.C,
Asst.Prof, Dept of ECE,
Ayaan College of Engg & Tech
ABSTRACT:
A method of visible watermarking with lossless recovery has been proposed in this paper
using spread spectrum. This method makes use of one-to-one compound mappings of image pixel
values which is used to embed a variety of visible watermarks of different sizes on cover images. The
compound mappings method is reversible, thus provides lossless recovery of original image from
watermarked images. Different types of visible watermarks like opaque, monochrome and translucent
are embedded in this paper. A monotonically increasing compound mapping is created which are
more distinctive visible watermarks in the watermarked image.
Index Terms: Lossless recovery, visible watermarking, mapping, reversible, opaque, monochrome,
one-to-one compound mapping, translucent
1. INTRODUCTION
The cost effectiveness of software selling and high quality art work which are in the form of
digital images and video sequences, which are transmitted over World Wide Web (www) are highly
enhanced, consequent to the improvement of technology. Though the commercial exploitation of the
www is steadily being more appreciated, apprehension on the
Security aspect of the trade has only funneled the exploitation to be restricted to the
transmission of demo and free versions of software and art. The ease by which digital information can
be duplicated and distributed has led to the need for effective copyright protection tools. To address
these growing concerns various software products have been introduced. It should be possible to hide
data (information) within digital audio, images and video files. The data (information) is hidden in
the sense that it is perceptually and statistically undetectable [3]. The way to protect multimedia
images against illegal recording and retransmission is embed a small signal in the form of text or
image, called digital signature or watermark that characterizes the ownership and marks it as his
intellectual property.
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN
ENGINEERING AND TECHNOLOGY (IJARET)
ISSN 0976 - 6480 (Print)
ISSN 0976 - 6499 (Online)
Volume 4, Issue 3, April 2013, pp. 108-114
© IAEME: www.iaeme.com/ijaret.asp
Journal Impact Factor (2013): 5.8376 (Calculated by GISI)
www.jifactor.com
IJARET
© I A E M E
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
109
Watermarking techniques are particular embodiments of Stegnography [2]. Digital
Watermarking is the solution to the need to provide value added protection on top of data encryption
and scrambling for content protection [4]. Watermarking is the process that embeds data called a
watermark or digital signature or tag or label into a multimedia object such that watermark can be
detected or extracted later. Digital watermarking methods for images are usually of two types:
invisible and visible. Visible watermarking is generally clearly visible after common image operations
are applied. The visible watermarks convey ownership information directly on the media and can
deter attempts of copyright violations. Embedding of watermarks, either invisible or visible, degrade
the quality of the host media in general. The techniques of reversible watermarking [8]–[12], allow
legitimate users to remove the embedded watermark and restore the original content. But mostly the
reversible watermarking techniques do not guarantee lossless image recovery, i.e. the recovered image
is identical to the original image. Lossless recovery is important in many applications where serious
concerns about image quality arise.
II) SPREAD SPECTRUM COMMUNICATION
The watermark should not be placed in perceptually insignificant regions of the image or its
spectrum since many common signals and geometric processes attack these components. For
example, a watermark in the high frequency spectrum of an image can be easily eliminated with
little degradation to the image by any process that directly or indirectly performs low pass filtering.
The major problem is to insert a watermark into the most significant regions of a spectrum. Clearly,
any spectral coefficient can be changed, provided such modification is small. But very small changes
are susceptible to noise [3].
To solve this problem, the frequency domain of image is a communication channel, and the
watermark acts as a signal that is transmitted through it. Attacks and signal distortions can be
treated as noise that the immersed signal must be immune to. Thus, the watermarking can be
considered as an application of spread spectrum communications. In spread spectrum
communication, a narrow band signal over a much larger bandwidth such that the signal energy
present in any single frequency is imperceptible. Hence, the watermark is spread over many
frequency bins so that the energy in any one bin is very small and certainly undetectable. Since the
watermark verification process knows the location and context of the watermark, it is possible to
concentrate these weak signals with a high signal to noise ratio (SNR). However, to destroy such a
watermark we would require noise of high amplitude to be added to all frequency bins.
Spreading of the watermark throughout the spectrum of an image ensures a large measure of
security against unintentional or intentional attack. First the spatial location of the watermark is not
obvious, and also the frequency regions should be selected in a fashion that ensures severe
degradation of the original data following any attack on the watermark.
III) Existing methods
Many lossless invisible watermarking techniques have been proposed in the past. The
common approach is to compress a portion of the original host and then embed the compressed data
together with the intended payload into the host [8]. Another approach is to superimpose the spread-
spectrum signal of the payload on the host so that the signal is detectable and removable. Another
approach is the manipulation of a group of pixels as a unit to embed a bit of information. Though it is
possible to use lossless invisible techniques to embed removable visible watermarks, due to the low
embedding capacities of these techniques there is no possibility of implanting large-sized visible
watermarks into the host. In case of lossless visible watermarking, a common approach is to embed a
monochrome watermark using deterministic and reversible mapping of pixel values or DCT
coefficients in the watermark region. Another approach is to rotate consecutive watermark pixels to
embed a visible watermark. An advantage of these approaches is that watermarks of any sizes can be
embedded into any host image. But, only binary visible watermarks can be embedded using these
techniques, which is restrictive since most logos are colourful.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
110
IV) PROPOSED METHOD
This paper proposes a new method for lossless visible watermarking using compound
mapping, through which mapped values can be controlled. The mappings are reversible for lossless
recovery of the original image. The technique leads to the possibility of embedding different types of
visible watermarks into cover images. The original image can be recovered from a resulting
watermarked image by using the corresponding reverse mappings without any loss.
Algorithm for Lossless Watermarking:
Let Input image be I and let the watermark image be W then the Output watermarked image is WL.
Steps to Implement:
1. Select any set of pixel values p from input Image I and let L be the watermark to be embedded,
then WA is called the watermarking area. Also let the set of pixels in P in WL be R.
2. For each pixel x with value p in WA and let the corresponding pixel in B be Y and the value of
the corresponding pixel in Y as L as l , and then apply the following steps:
a) An estimation technique is applied to get a value close to the values of the neighbouring
pixels (excluding it).
b) Set b = l.
c) Map p to a new value by using the below formula
d) Set the value of Z to R
e) Set the value of each pixel in L, which is outside the region WA such that it is equal to that of
the corresponding pixel in I.
Cover Image Watermark Image
Watermarked Image
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
111
Algorithm: Generic Watermark Removal for Lossless Image Recovery (decoding):
Here the input is a watermarked image WL, and L is the watermark then the recovered output image
is B.
Steps:
a) Select a watermarking area Q in WL.
b) Set the value of each pixel in B , which is outside the region R, such that it is equal to
corresponding pixel in WL.
c) For each pixel z with value q in R, let the corresponding pixel in the recovered image B be A
and the value of the corresponding pixel y in L be l,
d) Obtain the value derived in Step 3 of Algorithm 1 by applying the estimation technique.
Watermark Image Cover Image
Decoded Output
Monochrome Watermarking:
Let Input image be I and let the watermark image be L then the Output watermarked image is WL.
Steps:
a) Select any watermarking area WA which is the set of pixels corresponding spatially to those
in L with no transparency (with alpha values larger than zero).
b) Denote the set of pixels corresponding to P as Q.
c) For each pixel x with value p in A, let the corresponding pixel in R be Z and the value of the
corresponding pixel Y in L is l, and then apply the following steps.
1) A neighbour based parameter is set which estimates the colour value by using colours
of neighbouring pixels.
2) Get this parameter with alpha blending according to the formula
3) Map this value to a new value
4) Set the value of z to be s.
d) Set the value of each pixel in WL, which is outside the region WA, to be equal to the
corresponding pixel in I.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
112
Cover Image Watermark Image
Watermark converted to binary image
Watermark and Watermark dash
Translucent watermarking:
Let Input image be I and let the watermark image be L then the Output watermarked image is WL.
Steps:
a) Select the watermarking area WA as the set of pixels corresponding spatially to those in L
which are not transparent (with alpha values larger than zero).
b) Let the set of pixels corresponding to WA in WL as R.
c) For each pixel X with value p in WA, let the corresponding pixel in R be z and the value of the
corresponding pixel Y in L be l, then apply the following steps.
1) A neighbour based parameter is set which estimates the colour value by using colours
of neighbouring pixels.
2) Gets this parameter with alpha blending according to the formula
.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
113
3) Map this value to a new value using
4) Set the value of z to be q
5) Set the values of the remaining pixel in WL, which are outside the region WA to the
corresponding pixel in I.
Cover Image Watermark Image
Translucent Watermarked Image
V) CONCLUSION
In this paper, a new method for visible watermarking with lossless image recovery has been
proposed. This paper uses one-to-one compound mapping that maps image pixel values to the desired
visible watermarks. This allows different visible watermarks to be embedded and an example has
been presented for embedding opaque and monochrome watermarks as well as translucent full-colour
watermarks. A translucent watermark is clearly visible which is more appropriate than traditional
transparent watermarks in applications like advertising, copyright protection. Experimental results
have show that the proposed system is more feasible and effective.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
114
VI) REFERENCES
[1] B. Macq, “Lossless multiresolution transform for image authenticating watermarking,” presented
at the European Signal Processing Conf., Tampere, Finland, and Sep. 2000
[2] N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding. Steganog- raphy and Watermarking—
Attacks and Countermeasures. Boston, MA: Kluwer, 2001.
[3] M. Awrangjeb and M. S. Kankanhalli, “Lossless watermarking con- sidering the human visual
system,” presented at the Int. Workshop on Digital Watermarking, Seoul, Korea, and Oct. 2003
[4] M. S. Kankanhalli, Rajmohan, and K. R. Ramakrishnan, “Adaptive visible watermarking of
images,” in Proc. IEEE Int. Conf. Multimedia Computing and Systems, 1999, vol. 1, pp. 568–573.
[5] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for
multimedia,” IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673– 1687, Jun. 1997.
[6] Y. Hu and S. Kwong, “Wavelet domain adaptive visible watermarking,” Electron. Lett., vol. 37, no.
20, pp. 1219–1220, Sep. 2001.
[7] G. Braudaway, K. A. Magerlein, and F. Min t zer, “Protecting publicly available images with a
visible image watermark,” in Proc. SPIE Int. Conf. Electronic Imaging, Feb. 1996, vol. 2659, pp. 126–
133.
[8] Y. J. Cheng and W. H. Tsai, “A new method for copyright and integrity protection for bitmap
images by removable visible watermarks and irremovable invisible watermarks,” presented at the Int.
ComputerSymp.—Workshop on Cryptology and Information Security, Hualien, Taiwan, R.O.C., Dec.
2002.
[9] P. M. Huang and W. H. Tsai, “Copyright protection and authentication of grayscale images by
removable visible watermarking and invisible signal embedding techniques: A new approach,”
presented at the Conf. Computer Vision, Graphics and Image Processing, Kinmen, Taiwan, R.O.C.,
Aug. 2003.
[10] Y. Hu and B. Jeon, “Reversible visible watermarking and lossless re- covery of original
images,” IEEE Trans. Circuits Syst. Video Technol.,vol. 16, no. 11, pp. 1423–1429, Nov. 2006.
[11] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding—A survey,” Proc.
IEEE, vol. 87, no. 7, pp. 1062–1078, Jul.1999.
[12] B. Macq, “Lossless multiresolution transform for image authenticating watermarking,”
presented at the European Signal Processing Conf., Tampere, Finland, and Sep. 2000.
[13] S. P. Mohanty, K. R. Ramakrishnan, and M. S. Kankanhalli, “A DCT Domain visible
watermarking technique for images,” in Proc. IEEE Int. Conf. Multimedia and Expo, Jul. 2000, vol. 2,
pp. 1029–1032.
[14] C. de Vleeschouwer, J. F. Delaigle, and B. Macq, “Circular interpretation of objective
transformations in lossless watermarking for media asset management,” IEEE Trans. Multimedia, vol.
5, no. 1, pp. 97–105, Mar. 2003.
[15] J. Fridrich, M. Goljan, and R. Du, “Lossless data embedding—New paradigm in digital
watermarking,” J. Appl. Signal Process., vol. 2002,no. 2, pp. 185–196, Feb. 2002.
[16] M. Awrangjeb and M. S. Kankanhalli, “Reversible watermarking using a perceptual Model,” J.
Electron. Imag, vol. 14, no. 013014, Mar. 2005.
[17] Y. Hu, S. Kwong, and J. Huang, “An algorithm for removable visible watermarking,” IEEE
Trans. Circuits Syst. Video Technol., vol. 16, no. 1, pp. 129–133, Jan. 2006.
[18] Fahd N. Al-Wesabi, Adnan Z. Alsakaf And Kulkarni U. Vasantrao, “A Zero Text Watermarking
Algorithm Based On The Probabilistic Patterns For Content Authentication Of Text Documents”
International Journal of Computer Engineering & Technology (IJCET) Volume 4, Issue 1, 2013, pp.
284 - 300, ISSN PRINT : 0976 – 6367, ISSN ONLINE : 0976 – 6375.
[19] Mr. N. R. Bamane, Dr. Mrs. S. B. Patil, Prof. B. S. Patil and Prof. R. K. Undegaonkar, “Hybrid
Video Watermarking Technique By Using Dwt & Pca”International Journal Of Electronics And
Communication Engineering &Technology (IJECET) Volume 4, Issue 2, 2013, pp. 172 - 179, ISSN
PRINT : 0976- 6464, ISSN ONLINE : 0976 –6472.

Mais conteúdo relacionado

Mais procurados

Shadow Detection and Removal using Tricolor Attenuation Model Based on Featur...
Shadow Detection and Removal using Tricolor Attenuation Model Based on Featur...Shadow Detection and Removal using Tricolor Attenuation Model Based on Featur...
Shadow Detection and Removal using Tricolor Attenuation Model Based on Featur...
ijtsrd
 
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &
IAEME Publication
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
prjpublications
 
Robust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS BasedRobust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS Based
CSCJournals
 
An Image Enhancement Approach to Achieve High Speed using Adaptive Modified B...
An Image Enhancement Approach to Achieve High Speed using Adaptive Modified B...An Image Enhancement Approach to Achieve High Speed using Adaptive Modified B...
An Image Enhancement Approach to Achieve High Speed using Adaptive Modified B...
TELKOMNIKA JOURNAL
 

Mais procurados (20)

Shadow Detection and Removal using Tricolor Attenuation Model Based on Featur...
Shadow Detection and Removal using Tricolor Attenuation Model Based on Featur...Shadow Detection and Removal using Tricolor Attenuation Model Based on Featur...
Shadow Detection and Removal using Tricolor Attenuation Model Based on Featur...
 
A0540106
A0540106A0540106
A0540106
 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniques
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
 
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &
 
Ijcet 06 09_001
Ijcet 06 09_001Ijcet 06 09_001
Ijcet 06 09_001
 
Visibility Enhancement of Hazy Images using Depth Estimation Concept
Visibility Enhancement of Hazy Images using Depth Estimation ConceptVisibility Enhancement of Hazy Images using Depth Estimation Concept
Visibility Enhancement of Hazy Images using Depth Estimation Concept
 
A fast single image haze removal algorithm using color attenuation prior
A fast single image haze removal algorithm using color attenuation priorA fast single image haze removal algorithm using color attenuation prior
A fast single image haze removal algorithm using color attenuation prior
 
Multi Image Deblurring using Complementary Sets of Fluttering Patterns by Mul...
Multi Image Deblurring using Complementary Sets of Fluttering Patterns by Mul...Multi Image Deblurring using Complementary Sets of Fluttering Patterns by Mul...
Multi Image Deblurring using Complementary Sets of Fluttering Patterns by Mul...
 
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
 
CVGIP 2010 Part 3
CVGIP 2010 Part 3CVGIP 2010 Part 3
CVGIP 2010 Part 3
 
A Review over Different Blur Detection Techniques in Image Processing
A Review over Different Blur Detection Techniques in Image ProcessingA Review over Different Blur Detection Techniques in Image Processing
A Review over Different Blur Detection Techniques in Image Processing
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
 
Iw3615491554
Iw3615491554Iw3615491554
Iw3615491554
 
Review on Various Algorithm for Cloud Detection and Removal for Images
Review on Various Algorithm for Cloud Detection and Removal for ImagesReview on Various Algorithm for Cloud Detection and Removal for Images
Review on Various Algorithm for Cloud Detection and Removal for Images
 
The single image dehazing based on efficient transmission estimation
The single image dehazing based on efficient transmission estimationThe single image dehazing based on efficient transmission estimation
The single image dehazing based on efficient transmission estimation
 
Robust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS BasedRobust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS Based
 
Minimum image disortion of reversible data hiding
Minimum image disortion of reversible data hidingMinimum image disortion of reversible data hiding
Minimum image disortion of reversible data hiding
 
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
Tchebichef image watermarking along the edge using YCoCg-R color space for co...Tchebichef image watermarking along the edge using YCoCg-R color space for co...
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
 
An Image Enhancement Approach to Achieve High Speed using Adaptive Modified B...
An Image Enhancement Approach to Achieve High Speed using Adaptive Modified B...An Image Enhancement Approach to Achieve High Speed using Adaptive Modified B...
An Image Enhancement Approach to Achieve High Speed using Adaptive Modified B...
 

Semelhante a Visible watermarking using spread spectrum

Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofDigital image watermarking using dct with high security of
Digital image watermarking using dct with high security of
IAEME Publication
 
A130104
A130104A130104
A130104
irjes
 
A130104
A130104A130104
A130104
irjes
 
Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—a
Agnianbu Wrong
 

Semelhante a Visible watermarking using spread spectrum (20)

50120140506015
5012014050601550120140506015
50120140506015
 
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
 
Reversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting TechniqueReversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting Technique
 
50120130406010
5012013040601050120130406010
50120130406010
 
Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image Watermarking
 
Comparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator ApproachComparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator Approach
 
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane ExtractionIRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
 
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
 
Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofDigital image watermarking using dct with high security of
Digital image watermarking using dct with high security of
 
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
 
A130104
A130104A130104
A130104
 
A130104
A130104A130104
A130104
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
 
Digital Image Watermarking using Discrete Wavelet Transform
Digital Image Watermarking using Discrete Wavelet TransformDigital Image Watermarking using Discrete Wavelet Transform
Digital Image Watermarking using Discrete Wavelet Transform
 
Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—a
 
20120140505013
2012014050501320120140505013
20120140505013
 

Mais de IAEME Publication

A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 

Mais de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Visible watermarking using spread spectrum

  • 1. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 108 VISIBLE WATERMARKING USING SPREAD SPECTRUM Nikhat Nawaz, Asso.prof, Dept of ECE, Ayaan College of Engg & Tech G.Prasanna Lakshmi, Research Scholar,Gitam University, Syed Saifuddin, Asst.prof, Dept of ECE, Ayaan College of Engg & Tech Altaf.C, Asst.Prof, Dept of ECE, Ayaan College of Engg & Tech ABSTRACT: A method of visible watermarking with lossless recovery has been proposed in this paper using spread spectrum. This method makes use of one-to-one compound mappings of image pixel values which is used to embed a variety of visible watermarks of different sizes on cover images. The compound mappings method is reversible, thus provides lossless recovery of original image from watermarked images. Different types of visible watermarks like opaque, monochrome and translucent are embedded in this paper. A monotonically increasing compound mapping is created which are more distinctive visible watermarks in the watermarked image. Index Terms: Lossless recovery, visible watermarking, mapping, reversible, opaque, monochrome, one-to-one compound mapping, translucent 1. INTRODUCTION The cost effectiveness of software selling and high quality art work which are in the form of digital images and video sequences, which are transmitted over World Wide Web (www) are highly enhanced, consequent to the improvement of technology. Though the commercial exploitation of the www is steadily being more appreciated, apprehension on the Security aspect of the trade has only funneled the exploitation to be restricted to the transmission of demo and free versions of software and art. The ease by which digital information can be duplicated and distributed has led to the need for effective copyright protection tools. To address these growing concerns various software products have been introduced. It should be possible to hide data (information) within digital audio, images and video files. The data (information) is hidden in the sense that it is perceptually and statistically undetectable [3]. The way to protect multimedia images against illegal recording and retransmission is embed a small signal in the form of text or image, called digital signature or watermark that characterizes the ownership and marks it as his intellectual property. INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) ISSN 0976 - 6480 (Print) ISSN 0976 - 6499 (Online) Volume 4, Issue 3, April 2013, pp. 108-114 © IAEME: www.iaeme.com/ijaret.asp Journal Impact Factor (2013): 5.8376 (Calculated by GISI) www.jifactor.com IJARET © I A E M E
  • 2. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 109 Watermarking techniques are particular embodiments of Stegnography [2]. Digital Watermarking is the solution to the need to provide value added protection on top of data encryption and scrambling for content protection [4]. Watermarking is the process that embeds data called a watermark or digital signature or tag or label into a multimedia object such that watermark can be detected or extracted later. Digital watermarking methods for images are usually of two types: invisible and visible. Visible watermarking is generally clearly visible after common image operations are applied. The visible watermarks convey ownership information directly on the media and can deter attempts of copyright violations. Embedding of watermarks, either invisible or visible, degrade the quality of the host media in general. The techniques of reversible watermarking [8]–[12], allow legitimate users to remove the embedded watermark and restore the original content. But mostly the reversible watermarking techniques do not guarantee lossless image recovery, i.e. the recovered image is identical to the original image. Lossless recovery is important in many applications where serious concerns about image quality arise. II) SPREAD SPECTRUM COMMUNICATION The watermark should not be placed in perceptually insignificant regions of the image or its spectrum since many common signals and geometric processes attack these components. For example, a watermark in the high frequency spectrum of an image can be easily eliminated with little degradation to the image by any process that directly or indirectly performs low pass filtering. The major problem is to insert a watermark into the most significant regions of a spectrum. Clearly, any spectral coefficient can be changed, provided such modification is small. But very small changes are susceptible to noise [3]. To solve this problem, the frequency domain of image is a communication channel, and the watermark acts as a signal that is transmitted through it. Attacks and signal distortions can be treated as noise that the immersed signal must be immune to. Thus, the watermarking can be considered as an application of spread spectrum communications. In spread spectrum communication, a narrow band signal over a much larger bandwidth such that the signal energy present in any single frequency is imperceptible. Hence, the watermark is spread over many frequency bins so that the energy in any one bin is very small and certainly undetectable. Since the watermark verification process knows the location and context of the watermark, it is possible to concentrate these weak signals with a high signal to noise ratio (SNR). However, to destroy such a watermark we would require noise of high amplitude to be added to all frequency bins. Spreading of the watermark throughout the spectrum of an image ensures a large measure of security against unintentional or intentional attack. First the spatial location of the watermark is not obvious, and also the frequency regions should be selected in a fashion that ensures severe degradation of the original data following any attack on the watermark. III) Existing methods Many lossless invisible watermarking techniques have been proposed in the past. The common approach is to compress a portion of the original host and then embed the compressed data together with the intended payload into the host [8]. Another approach is to superimpose the spread- spectrum signal of the payload on the host so that the signal is detectable and removable. Another approach is the manipulation of a group of pixels as a unit to embed a bit of information. Though it is possible to use lossless invisible techniques to embed removable visible watermarks, due to the low embedding capacities of these techniques there is no possibility of implanting large-sized visible watermarks into the host. In case of lossless visible watermarking, a common approach is to embed a monochrome watermark using deterministic and reversible mapping of pixel values or DCT coefficients in the watermark region. Another approach is to rotate consecutive watermark pixels to embed a visible watermark. An advantage of these approaches is that watermarks of any sizes can be embedded into any host image. But, only binary visible watermarks can be embedded using these techniques, which is restrictive since most logos are colourful.
  • 3. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 110 IV) PROPOSED METHOD This paper proposes a new method for lossless visible watermarking using compound mapping, through which mapped values can be controlled. The mappings are reversible for lossless recovery of the original image. The technique leads to the possibility of embedding different types of visible watermarks into cover images. The original image can be recovered from a resulting watermarked image by using the corresponding reverse mappings without any loss. Algorithm for Lossless Watermarking: Let Input image be I and let the watermark image be W then the Output watermarked image is WL. Steps to Implement: 1. Select any set of pixel values p from input Image I and let L be the watermark to be embedded, then WA is called the watermarking area. Also let the set of pixels in P in WL be R. 2. For each pixel x with value p in WA and let the corresponding pixel in B be Y and the value of the corresponding pixel in Y as L as l , and then apply the following steps: a) An estimation technique is applied to get a value close to the values of the neighbouring pixels (excluding it). b) Set b = l. c) Map p to a new value by using the below formula d) Set the value of Z to R e) Set the value of each pixel in L, which is outside the region WA such that it is equal to that of the corresponding pixel in I. Cover Image Watermark Image Watermarked Image
  • 4. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 111 Algorithm: Generic Watermark Removal for Lossless Image Recovery (decoding): Here the input is a watermarked image WL, and L is the watermark then the recovered output image is B. Steps: a) Select a watermarking area Q in WL. b) Set the value of each pixel in B , which is outside the region R, such that it is equal to corresponding pixel in WL. c) For each pixel z with value q in R, let the corresponding pixel in the recovered image B be A and the value of the corresponding pixel y in L be l, d) Obtain the value derived in Step 3 of Algorithm 1 by applying the estimation technique. Watermark Image Cover Image Decoded Output Monochrome Watermarking: Let Input image be I and let the watermark image be L then the Output watermarked image is WL. Steps: a) Select any watermarking area WA which is the set of pixels corresponding spatially to those in L with no transparency (with alpha values larger than zero). b) Denote the set of pixels corresponding to P as Q. c) For each pixel x with value p in A, let the corresponding pixel in R be Z and the value of the corresponding pixel Y in L is l, and then apply the following steps. 1) A neighbour based parameter is set which estimates the colour value by using colours of neighbouring pixels. 2) Get this parameter with alpha blending according to the formula 3) Map this value to a new value 4) Set the value of z to be s. d) Set the value of each pixel in WL, which is outside the region WA, to be equal to the corresponding pixel in I.
  • 5. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 112 Cover Image Watermark Image Watermark converted to binary image Watermark and Watermark dash Translucent watermarking: Let Input image be I and let the watermark image be L then the Output watermarked image is WL. Steps: a) Select the watermarking area WA as the set of pixels corresponding spatially to those in L which are not transparent (with alpha values larger than zero). b) Let the set of pixels corresponding to WA in WL as R. c) For each pixel X with value p in WA, let the corresponding pixel in R be z and the value of the corresponding pixel Y in L be l, then apply the following steps. 1) A neighbour based parameter is set which estimates the colour value by using colours of neighbouring pixels. 2) Gets this parameter with alpha blending according to the formula .
  • 6. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 113 3) Map this value to a new value using 4) Set the value of z to be q 5) Set the values of the remaining pixel in WL, which are outside the region WA to the corresponding pixel in I. Cover Image Watermark Image Translucent Watermarked Image V) CONCLUSION In this paper, a new method for visible watermarking with lossless image recovery has been proposed. This paper uses one-to-one compound mapping that maps image pixel values to the desired visible watermarks. This allows different visible watermarks to be embedded and an example has been presented for embedding opaque and monochrome watermarks as well as translucent full-colour watermarks. A translucent watermark is clearly visible which is more appropriate than traditional transparent watermarks in applications like advertising, copyright protection. Experimental results have show that the proposed system is more feasible and effective.
  • 7. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 114 VI) REFERENCES [1] B. Macq, “Lossless multiresolution transform for image authenticating watermarking,” presented at the European Signal Processing Conf., Tampere, Finland, and Sep. 2000 [2] N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding. Steganog- raphy and Watermarking— Attacks and Countermeasures. Boston, MA: Kluwer, 2001. [3] M. Awrangjeb and M. S. Kankanhalli, “Lossless watermarking con- sidering the human visual system,” presented at the Int. Workshop on Digital Watermarking, Seoul, Korea, and Oct. 2003 [4] M. S. Kankanhalli, Rajmohan, and K. R. Ramakrishnan, “Adaptive visible watermarking of images,” in Proc. IEEE Int. Conf. Multimedia Computing and Systems, 1999, vol. 1, pp. 568–573. [5] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673– 1687, Jun. 1997. [6] Y. Hu and S. Kwong, “Wavelet domain adaptive visible watermarking,” Electron. Lett., vol. 37, no. 20, pp. 1219–1220, Sep. 2001. [7] G. Braudaway, K. A. Magerlein, and F. Min t zer, “Protecting publicly available images with a visible image watermark,” in Proc. SPIE Int. Conf. Electronic Imaging, Feb. 1996, vol. 2659, pp. 126– 133. [8] Y. J. Cheng and W. H. Tsai, “A new method for copyright and integrity protection for bitmap images by removable visible watermarks and irremovable invisible watermarks,” presented at the Int. ComputerSymp.—Workshop on Cryptology and Information Security, Hualien, Taiwan, R.O.C., Dec. 2002. [9] P. M. Huang and W. H. Tsai, “Copyright protection and authentication of grayscale images by removable visible watermarking and invisible signal embedding techniques: A new approach,” presented at the Conf. Computer Vision, Graphics and Image Processing, Kinmen, Taiwan, R.O.C., Aug. 2003. [10] Y. Hu and B. Jeon, “Reversible visible watermarking and lossless re- covery of original images,” IEEE Trans. Circuits Syst. Video Technol.,vol. 16, no. 11, pp. 1423–1429, Nov. 2006. [11] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding—A survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, Jul.1999. [12] B. Macq, “Lossless multiresolution transform for image authenticating watermarking,” presented at the European Signal Processing Conf., Tampere, Finland, and Sep. 2000. [13] S. P. Mohanty, K. R. Ramakrishnan, and M. S. Kankanhalli, “A DCT Domain visible watermarking technique for images,” in Proc. IEEE Int. Conf. Multimedia and Expo, Jul. 2000, vol. 2, pp. 1029–1032. [14] C. de Vleeschouwer, J. F. Delaigle, and B. Macq, “Circular interpretation of objective transformations in lossless watermarking for media asset management,” IEEE Trans. Multimedia, vol. 5, no. 1, pp. 97–105, Mar. 2003. [15] J. Fridrich, M. Goljan, and R. Du, “Lossless data embedding—New paradigm in digital watermarking,” J. Appl. Signal Process., vol. 2002,no. 2, pp. 185–196, Feb. 2002. [16] M. Awrangjeb and M. S. Kankanhalli, “Reversible watermarking using a perceptual Model,” J. Electron. Imag, vol. 14, no. 013014, Mar. 2005. [17] Y. Hu, S. Kwong, and J. Huang, “An algorithm for removable visible watermarking,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 1, pp. 129–133, Jan. 2006. [18] Fahd N. Al-Wesabi, Adnan Z. Alsakaf And Kulkarni U. Vasantrao, “A Zero Text Watermarking Algorithm Based On The Probabilistic Patterns For Content Authentication Of Text Documents” International Journal of Computer Engineering & Technology (IJCET) Volume 4, Issue 1, 2013, pp. 284 - 300, ISSN PRINT : 0976 – 6367, ISSN ONLINE : 0976 – 6375. [19] Mr. N. R. Bamane, Dr. Mrs. S. B. Patil, Prof. B. S. Patil and Prof. R. K. Undegaonkar, “Hybrid Video Watermarking Technique By Using Dwt & Pca”International Journal Of Electronics And Communication Engineering &Technology (IJECET) Volume 4, Issue 2, 2013, pp. 172 - 179, ISSN PRINT : 0976- 6464, ISSN ONLINE : 0976 –6472.