SlideShare a Scribd company logo
1 of 5
Download to read offline
LITERATURE REVIEW ON GENERIC LOSSLESS VISIBLE WATERMARKING &
LOSSLESS IMAGE RECOVERY
1
D. Phaneendra, 2
I.Suneetha, 3
A. Rajani,
M.Tech(DECS) Student, Associate professor & Head, Assistant professor
Department of ECE, AITS
Annamacharya Institute of Technology and Sciences,Tirupati,India-517520
1
dorasalaphanendrakumarreddy@gmail.com
2
iralasuneetha.aits@gmail.com
3
rajanirevanth446@gmail.com
Abstract — One way for copyright protection is
digital watermarking. Digital watermarking is the
process of embedding information regarding the
authenticity or the identity of the owners into a image
or any piece of data. Digital watermarking has been
classified into two types: Visible and Invisible
Watermarking. By the use of Reversible watermarking
the embedded watermark can be removed and restore
the original content. The lossless image recovery is a
difficult task but; it is important in most of the
applications where the quality of the image is
concerned. There are many methods for visible
watermarking with lossless image recovery. One to One
compound mapping is one of the technique. The
compound mapping is reversible and it allows lossless
recovery of original images from the watermarked
images. Security protection measures can be used to
prevent illegal attackers.
Key Terms: Reversible visible watermarking,
Discrete Cosine Transform (DCT), Discrete Fourier
Transform (DFT), Discrete Wavelet Transform (DWT).
I. INTRODUCTION
The concepts of authenticity and copyright
protection are of major importance in the framework
of our information society. For example, TV channels
usually place a small visible logo on the image corner
(or a wider translucent logo) for copyright protection.
In this way, unauthorized duplication is discouraged
and the recipients can easily identify the video
source. Official scripts are stamped or typed on
watermarked papers for authenticity proof. Bank
notes also use watermarks for the same purpose,
which are very difficult to reproduce by conventional
photocopying techniques.
Digital Image watermarking methods are usually
classified into two types: visible and invisible [1-7].
The invisible watermarking aims to embed copyright
information into host media, in case of copyright
infringements, to identify the ownership of the
protected host the hidden information can be
retrieved. It is important that the watermarked image
must be resistant to common image operations which
ensure that the hidden information after alterations is
still retrievable without any defect that means the
recovered image is same as the original. On the other
hand, methods of the visible watermarking yield
visible watermarks. These visible watermarks are
generally clearly visible after applying common
image operations. In addition, ownership information
is conveyed directly on the media and copyright
violations attempts can be deterred.
In general Embedding of watermarks, degrade the
quality of the host media. The legitimate users are
allowed to remove the embedded watermark and
original content can be restored as needed using a
group of techniques, namely reversible watermarking
[8-11]. However, lossless image recovery is not
guaranteed by all reversible watermarking
techniques, which means that the recovered image is
same as the original. Lossless recovery is important
where there is serious concerns about image quality
such as include forensics, military applications,
historical art imaging, or medical image analysis.
The most common approach is to embed a
monochrome watermark using deterministic and
reversible mappings of pixel values or DCT
coefficients in the watermark region [6,9,11].
Another is to rotate consecutive watermark pixels to
embed watermark that is visible [11].the watermarks
of arbitrary sizes can be embedded into any host
image. Only binary visible watermarks can be
embedded using these approaches.
The lossless visible watermarking is proposed by
using one-to-one compound mappings which allow
mapped values to be controllable The approach is
generic, leading to the possibility of embedding
different types of visible watermarks into cover
images. Two applications of the proposed method are
demonstrated; where we can embed opaque
monochrome watermarks and non-uniformly
translucent full-color ones into color images.
INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
180
ISBN: 378-26-138420-01
II. RELATED WORK
2.1 EXISTING WATERMARKING
TECHNOLOGIES
A. Spatial-Domain technologies
Spatial-domain technologies refer to those
embedding watermarks by directly changing pixel
values of host images. Some common spatial domain
algorithms include Least Significant Bit (LSB). The
LSB is the most straight-forward method of
watermark embedding. The most serious drawback of
spatial-domain technologies is limited robustness.
In the spatial domain, pixels in randomly selected
regions of the image are modified according to the
signature or logo desired by the author of the product.
This method involves modifying the pixel values of
the original image where the watermark should be
embedded. Fig. 1 shows the block diagram of a
spatial-domain data embedding system.
Fig.1. Spatial domain data embedding system
Randomly selected image data are dithered by a
small amount according to a predefined algorithm,
whose complexity may vary in practical systems. The
algorithm defines the intensity and the position of the
watermark on the original image. One of the major
disadvantages of the conventional watermarking is
that it can be easily extracted from the original image
which makes this technique unsuitable for copyright
authentication. There are three factors that determine
the parameters of the algorithm applied in the spatial
domain watermarking. The three factors are:
• The information associated with the signature.
Basically, the signature is the watermark
embedded on the original image. The
information of the signature is closely related to
the size and quality of the signature.
• The secret random key.
The secret key may be included in the process of
watermarking to improve the security during
transmission. If a key is also included, only the
receiver who knows the key can extract the
watermark, and not any intruders.
• The masking property of the image.
The masking property of the image is also related
to the quality and composition of the image which
signifies the clarity of the watermark on the
original image.
One form of the data embedding algorithm is given
by the equation ,
ŷ=y +αI
Where y(i,j), is the original image intensity at pixe
position (i,j), ŷ is the watermarked image, and αI
represents the embedded data in the form of small
changes in intensity levels. The author of the
watermark holds two keys:
• The region of the image where the logo is
marked and
• The information in the watermark, αI.
Given the marked image, the original owner will be
able to recover the watermark by comparing the
marked image with the original. In the reconstruction
of the embedded watermark, the following
computation is made,
I= (ŷ-y)/α
Fig. 2. Watermarking result of a color host image. (a) Host
image. (b) Logo image. (c) Resulting watermarked Image.
(d) Watermark extracted image.
Fig.2. shows the output results of spatial domain
technique with host image, logo image, watermarked
image and watermark extracted image respectively.
INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
181
ISBN: 378-26-138420-01
It is difficult for spatial-domain watermarks to
survive under attacks such as lossy compression and
low-pass filtering. Also the information can be
embedded in spatial domain is very limited
B. Frequency-Domain Technologies
Compared to spatial-domain watermark,
watermark in frequency domain is more robust and
compatible to popular image compression standards.
Thus frequency-domain watermarking obtains much
more attention. To embed a watermark, a frequency
transformation is applied to the host data. Then,
modifications are made to the transform coefficients.
Possible frequency image transformations include the
Discrete Fourier Transform (DFT), Discrete Cosine
Transform (DCT) and others
The first efficient watermarking scheme was
introduced by Koch et al. In their method, the image
is first divided into square blocks of size 8x8 for
DCT computation. A pair of mid-frequency
coefficients is chosen for modification from 12
predetermined pairs. Bors and Pitas developed a
method that modifies DCT coefficients satisfying a
block site selection constraint. After dividing the
image into blocks of size 8x8, certain blocks are
selected based on a Gaussian network classifier
decision. The middle range frequency DCT
coefficients are then modified, using either a linear
DCT constraint or a circular DCT detection region. A
DCT domain watermarking technique based on the
frequency masking of DCT blocks was introduced by
Swanson. Cox developed the first frequency-domain
watermarking scheme. After that a lot of
watermarking algorithms in frequency domain have
been proposed.
Figure 3 and Figure 4 illustrate the watermark
embedding and detection/extraction in frequency
domain, respectively. Most frequency-domain
algorithms make use of the spread spectrum
communication technique. By using a bandwidth
larger than required to transmit the signal, we can
keep the SNR at each frequency band small enough,
even the total power transmitted is very large. When
information on several bands is lost, the transmitted
signal can still being recovered by the rest ones. The
spread spectrum watermarking schemes are the use of
spread spectrum communication in digital
watermarking. Similar to that in communication,
spread spectrum watermarking schemes embed
watermarks in the whole host image. The watermark
is distributed among the whole frequency band. To
destroy the watermark, one has to add noise with
INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
182
ISBN: 378-26-138420-01
sufficiently large amplitude, which will heavily
degrade the quality of watermarked image and be
considered as an unsuccessful attack.
One major reason why frequency domain
watermarking schemes are attractive is their
compatibility with existing image compression
standards, in particular, the JPEG standard. The
compatibility ensures those schemes a good
performance when the watermarked image is subject
to lossy compression, which is one of the most
common image processing methods today.
Besides its own advantages it has a disadvantage
that it is not suitable for visible watermarking. And
only invisible watermarking is mostly performed in
frequency domain.
C. Wavelet-domain Technologies
The wavelet transform is identical to a hierarchical
sub-band system, where the sub-bands are
logarithmically spaced in frequency. The basic idea
of the DWT for a two dimensional image is described
as follows. An image is first decomposed into four
parts of high, middle and low frequencies (i.e. LL1,
HL1, LH1, HH1 sub bands) by critically sub-
sampling horizontal and vertical channels using
Daubechies filters. The sub-band HL1, LH1 and HH1
represent the finest scale of wavelet coefficients as
shown in figure 5. To obtain the next coarser scaled
wavelet coefficient, the sub-band LL1 is further
decomposed and critically sub-sampled. This process
is repeated several times, which is determined by the
application in hand. An example of an image
decomposed into ten sub-bands for three levels is
shown in Figure 6. Each level has various bands
information such as low-low, low-high, high-low and
high-high frequency bands.
Fig.5. Three level wavelet decomposition
Fig.6. (a) Three-level Decomposition. (b) Coefficient
Distribution.
Furthermore, from these DWT coefficients, the
original image can be reconstructed. For
reconstruction process same filter must be used. This
reconstruction process is called the inverse DWT
(IDWT). If I (m, n) represent an image, the DWT and
IDWT for I (m, n) can be similarly defined by
implementing the DWT and IDWT on each
dimension m and n separately.
III. CONCLUSION
In this paper we have briefly discussed regarding
the methods (Spatial domain, Frequency domain and
Wavelet domain) which are formerly used in visible
watermarking. The former methods used DCT, DFT,
DWT and LSB (Least Significant Bit) for desired
visible watermarking.
A novel method for generic visible watermarking
with a capability of lossless image recovery is
proposed. The method is based on the use of
deterministic one-to-one compound mappings of
image pixel values for overlaying a variety of visible
watermarks of arbitrary sizes on cover images. The
compound map-pings are proved to be reversible,
which allows for lossless recovery of original images
from watermarked images. The mappings may be
adjusted to yield pixel values close to those of desired
visible watermarks. Different types of visible
watermarks, including opaque monochrome and
translucent full color ones, are embedded as
applications of the proposed generic approach. A
two-fold monotonically increasing compound
mapping is created and proved to yield more
distinctive visible watermarks in the watermarked
image. Security protection measures by parameter
and mapping randomizations have also been
proposed to deter attackers from illicit image
recoveries. Experimental results demonstrating the
effectiveness of the proposed approach are also
included.
INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
183
ISBN: 378-26-138420-01
REFERENCES
[1] G. Braudaway, K. A. Magerlein, and F. Mintzer,
“Protecting publicly available images with a
visible image watermark,” in Proc. SPIE Int.
Conf. Electronic Imaging, Feb. 1996, vol. 2659,
pp. 126–133.
[2] I. J. Cox, J. Kilian, F. T. Leighton, and T.
Shamoon, “Secure spread spectrum
watermarking for multimedia,” IEEE Trans.
Image Process., vol. 6, no. 12, pp. 1673– 1687,
Jun. 1997.
[3] F.A.P Patitcolas, R.J.Anderson, and
M.G.Kun“Information hiding- A survey”-
Proc.IEEE, vol:87, no.7, jul. 1999.
[4] M. S. Kankanhalli, Rajmohan, and K. R.
Ramakrishnan, “Adaptive visible watermarking
of images,” in Proc. IEEE Int. Conf. Multimedia
Computing and Systems, 1999, vol. 1, pp.
[5] S. P. Mohanty, K. R. Ramakrishnan, and M. S
Kankanhalli, “A DCT domain visible
watermarking technique for images,” in Proc.
IEEE Int. Conf. Multimedia and Expo, Jul. 2000,
vol. 2, pp. 1029– 1032.
[6] N. F. Johnson, Z. Duric, and S. Jajodia,
Information Hiding. Steganography and
Watermarking Attacks and Countermeasures.
Boston, MA: Kluwer, 2001.
[7] Y. Hu and S.Kwong,“Wavelet domain adaptive
visiblewatermarking,” Electron. Lett., vol. 37,
no. 20, pp. 1219–1220, Sep. 2001.
[8] Y. J. Cheng and W. H. Tsai, “A new
method for copyright and integrity protection
for bitmap images by removable visible
watermarks and irremovable invisible
watermarks,” presented at the Int. Computer
Symp. Workshop on Cryptology and Information
Security, Hualien,Taiwan, R.O.C., Dec. 2002.
[9] P. M. Huang and W. H. Tsai, “Copyright
protection and authentication of grayscale
images by removable visible watermarking and
invisible signal embedding techniques: A new
approach,” presented at the Conf. Computer
Vision, Graphics and Image Processing, Kinmen,
Taiwan, R.O.C., Aug. 2003.
[10]Y. Hu, S. Kwong, and J. Huang, “An algorithm
for removable visible watermarking,” IEEE
Trans. Circuits Syst. Video Technol., vol. 16, no.
1, pp. 129– 133, Jan.2006.
[11]S. K. Yip, O. C. Au, C. W. Ho, and H. M. Wong,
“Lossless visible watermarking,” in Proc. IEEE
Int. Conf. Multimedia and Expo, Jul. 2006, pp.
853–856.”
[12]Neminath Hubballi and Kanyakumari D P,
“Novel DCT based watermarking scheme for
digital images”, International Journal of Recent
Trends in Engineering, Vol. 1, No. 1, pp. 430-
433, May 2009.
[13]Mohammad Reza Soheili “A Robust Digital
image Watermarking Scheme Based on DWT”
Journal of Advances in Computer Research,
m2(2010) 75-82.1.
[14]R.AARTHI, V. JAGANYA, & S.
POONKUNTRAN “Modified Lsb
Watermarking For Image Authentication”
International Journal of Computer &
Communication Technology (IJCCT) ISSN
(ONLINE): 2231 - 0371 ISSN (PRINT): 0975 –
7449 Vol-3, Iss-3, 2012.
[15]Vaishali S. Jabade and Dr. Sachin R. Gengaje,
“Literature Review of Wavelet Based Digital
Image Watermarking Techniques”, International
Journal of Computer Applications, Vol 31, No.1,
pp. 28-35, October 2011.
INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
184
ISBN: 378-26-138420-01

More Related Content

What's hot

Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image WatermarkingIJERA Editor
 
Image Retrieval Based on its Contents Using Features Extraction
Image Retrieval Based on its Contents Using Features ExtractionImage Retrieval Based on its Contents Using Features Extraction
Image Retrieval Based on its Contents Using Features ExtractionIRJET Journal
 
Information search using text and image query
Information search using text and image queryInformation search using text and image query
Information search using text and image queryeSAT Publishing House
 
Robust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS BasedRobust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS BasedCSCJournals
 
Dual-layer Digital Image Watermarking for Intellectual Property Right Protection
Dual-layer Digital Image Watermarking for Intellectual Property Right ProtectionDual-layer Digital Image Watermarking for Intellectual Property Right Protection
Dual-layer Digital Image Watermarking for Intellectual Property Right ProtectionIDES Editor
 
IRJET- Comparison and Simulation based Analysis of an Optimized Block Mat...
IRJET-  	  Comparison and Simulation based Analysis of an Optimized Block Mat...IRJET-  	  Comparison and Simulation based Analysis of an Optimized Block Mat...
IRJET- Comparison and Simulation based Analysis of an Optimized Block Mat...IRJET Journal
 
5 ashwin kumar_finalpaper--41-46
5 ashwin kumar_finalpaper--41-465 ashwin kumar_finalpaper--41-46
5 ashwin kumar_finalpaper--41-46Alexander Decker
 
Halftoning-based BTC image reconstruction using patch processing with border ...
Halftoning-based BTC image reconstruction using patch processing with border ...Halftoning-based BTC image reconstruction using patch processing with border ...
Halftoning-based BTC image reconstruction using patch processing with border ...TELKOMNIKA JOURNAL
 
Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colo...
Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colo...Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colo...
Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colo...IDES Editor
 
Novel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital imagesNovel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital imagesIDES Editor
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
 
Ieee projects 2012 2013 - Digital Image Processing
Ieee projects 2012 2013 - Digital Image ProcessingIeee projects 2012 2013 - Digital Image Processing
Ieee projects 2012 2013 - Digital Image ProcessingK Sundaresh Ka
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image ProcessingAnkur Nanda
 
Video inpainting using backgroung registration
Video inpainting using backgroung registrationVideo inpainting using backgroung registration
Video inpainting using backgroung registrationeSAT Publishing House
 

What's hot (19)

Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image Watermarking
 
538 207-219
538 207-219538 207-219
538 207-219
 
Image Retrieval Based on its Contents Using Features Extraction
Image Retrieval Based on its Contents Using Features ExtractionImage Retrieval Based on its Contents Using Features Extraction
Image Retrieval Based on its Contents Using Features Extraction
 
Information search using text and image query
Information search using text and image queryInformation search using text and image query
Information search using text and image query
 
Robust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS BasedRobust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS Based
 
Dual-layer Digital Image Watermarking for Intellectual Property Right Protection
Dual-layer Digital Image Watermarking for Intellectual Property Right ProtectionDual-layer Digital Image Watermarking for Intellectual Property Right Protection
Dual-layer Digital Image Watermarking for Intellectual Property Right Protection
 
IRJET- Comparison and Simulation based Analysis of an Optimized Block Mat...
IRJET-  	  Comparison and Simulation based Analysis of an Optimized Block Mat...IRJET-  	  Comparison and Simulation based Analysis of an Optimized Block Mat...
IRJET- Comparison and Simulation based Analysis of an Optimized Block Mat...
 
5 ashwin kumar_finalpaper--41-46
5 ashwin kumar_finalpaper--41-465 ashwin kumar_finalpaper--41-46
5 ashwin kumar_finalpaper--41-46
 
Medical Image Compression
Medical Image CompressionMedical Image Compression
Medical Image Compression
 
A0360105
A0360105A0360105
A0360105
 
Halftoning-based BTC image reconstruction using patch processing with border ...
Halftoning-based BTC image reconstruction using patch processing with border ...Halftoning-based BTC image reconstruction using patch processing with border ...
Halftoning-based BTC image reconstruction using patch processing with border ...
 
Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colo...
Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colo...Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colo...
Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colo...
 
Novel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital imagesNovel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital images
 
M1803016973
M1803016973M1803016973
M1803016973
 
E1083237
E1083237E1083237
E1083237
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics
 
Ieee projects 2012 2013 - Digital Image Processing
Ieee projects 2012 2013 - Digital Image ProcessingIeee projects 2012 2013 - Digital Image Processing
Ieee projects 2012 2013 - Digital Image Processing
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
 
Video inpainting using backgroung registration
Video inpainting using backgroung registrationVideo inpainting using backgroung registration
Video inpainting using backgroung registration
 

Similar to Iaetsd literature review on generic lossless visible watermarking &

Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
 
A130104
A130104A130104
A130104irjes
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...ijistjournal
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessIRJET Journal
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingEditor IJMTER
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
 
Robust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueRobust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueCSCJournals
 
Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—aAgnianbu Wrong
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH acijjournal
 
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic AlgorithmImage Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithmijsrd.com
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageIOSR Journals
 
A Robust Watermarking Technique Based On Dwt on Digital Images
A Robust Watermarking Technique Based On Dwt on Digital  ImagesA Robust Watermarking Technique Based On Dwt on Digital  Images
A Robust Watermarking Technique Based On Dwt on Digital ImagesIJMER
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarkingijceronline
 
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET Journal
 
Reversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting TechniqueReversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET Journal
 

Similar to Iaetsd literature review on generic lossless visible watermarking & (20)

Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domains
 
A130104
A130104A130104
A130104
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
 
50120140506015
5012014050601550120140506015
50120140506015
 
1820 1824
1820 18241820 1824
1820 1824
 
1820 1824
1820 18241820 1824
1820 1824
 
Robust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueRobust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet Technique
 
Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—a
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
 
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic AlgorithmImage Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
A Robust Watermarking Technique Based On Dwt on Digital Images
A Robust Watermarking Technique Based On Dwt on Digital  ImagesA Robust Watermarking Technique Based On Dwt on Digital  Images
A Robust Watermarking Technique Based On Dwt on Digital Images
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarking
 
G1803063741
G1803063741G1803063741
G1803063741
 
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
 
Reversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting TechniqueReversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting Technique
 

More from Iaetsd Iaetsd

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdlIaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmIaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatIaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationIaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSIaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...Iaetsd Iaetsd
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bikeIaetsd Iaetsd
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technologyIaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdIaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid GrowthIaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT AlgorithmIaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolicIaetsd Iaetsd
 

More from Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
 

Recently uploaded

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Recently uploaded (20)

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

Iaetsd literature review on generic lossless visible watermarking &

  • 1. LITERATURE REVIEW ON GENERIC LOSSLESS VISIBLE WATERMARKING & LOSSLESS IMAGE RECOVERY 1 D. Phaneendra, 2 I.Suneetha, 3 A. Rajani, M.Tech(DECS) Student, Associate professor & Head, Assistant professor Department of ECE, AITS Annamacharya Institute of Technology and Sciences,Tirupati,India-517520 1 dorasalaphanendrakumarreddy@gmail.com 2 iralasuneetha.aits@gmail.com 3 rajanirevanth446@gmail.com Abstract — One way for copyright protection is digital watermarking. Digital watermarking is the process of embedding information regarding the authenticity or the identity of the owners into a image or any piece of data. Digital watermarking has been classified into two types: Visible and Invisible Watermarking. By the use of Reversible watermarking the embedded watermark can be removed and restore the original content. The lossless image recovery is a difficult task but; it is important in most of the applications where the quality of the image is concerned. There are many methods for visible watermarking with lossless image recovery. One to One compound mapping is one of the technique. The compound mapping is reversible and it allows lossless recovery of original images from the watermarked images. Security protection measures can be used to prevent illegal attackers. Key Terms: Reversible visible watermarking, Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), Discrete Wavelet Transform (DWT). I. INTRODUCTION The concepts of authenticity and copyright protection are of major importance in the framework of our information society. For example, TV channels usually place a small visible logo on the image corner (or a wider translucent logo) for copyright protection. In this way, unauthorized duplication is discouraged and the recipients can easily identify the video source. Official scripts are stamped or typed on watermarked papers for authenticity proof. Bank notes also use watermarks for the same purpose, which are very difficult to reproduce by conventional photocopying techniques. Digital Image watermarking methods are usually classified into two types: visible and invisible [1-7]. The invisible watermarking aims to embed copyright information into host media, in case of copyright infringements, to identify the ownership of the protected host the hidden information can be retrieved. It is important that the watermarked image must be resistant to common image operations which ensure that the hidden information after alterations is still retrievable without any defect that means the recovered image is same as the original. On the other hand, methods of the visible watermarking yield visible watermarks. These visible watermarks are generally clearly visible after applying common image operations. In addition, ownership information is conveyed directly on the media and copyright violations attempts can be deterred. In general Embedding of watermarks, degrade the quality of the host media. The legitimate users are allowed to remove the embedded watermark and original content can be restored as needed using a group of techniques, namely reversible watermarking [8-11]. However, lossless image recovery is not guaranteed by all reversible watermarking techniques, which means that the recovered image is same as the original. Lossless recovery is important where there is serious concerns about image quality such as include forensics, military applications, historical art imaging, or medical image analysis. The most common approach is to embed a monochrome watermark using deterministic and reversible mappings of pixel values or DCT coefficients in the watermark region [6,9,11]. Another is to rotate consecutive watermark pixels to embed watermark that is visible [11].the watermarks of arbitrary sizes can be embedded into any host image. Only binary visible watermarks can be embedded using these approaches. The lossless visible watermarking is proposed by using one-to-one compound mappings which allow mapped values to be controllable The approach is generic, leading to the possibility of embedding different types of visible watermarks into cover images. Two applications of the proposed method are demonstrated; where we can embed opaque monochrome watermarks and non-uniformly translucent full-color ones into color images. INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 180 ISBN: 378-26-138420-01
  • 2. II. RELATED WORK 2.1 EXISTING WATERMARKING TECHNOLOGIES A. Spatial-Domain technologies Spatial-domain technologies refer to those embedding watermarks by directly changing pixel values of host images. Some common spatial domain algorithms include Least Significant Bit (LSB). The LSB is the most straight-forward method of watermark embedding. The most serious drawback of spatial-domain technologies is limited robustness. In the spatial domain, pixels in randomly selected regions of the image are modified according to the signature or logo desired by the author of the product. This method involves modifying the pixel values of the original image where the watermark should be embedded. Fig. 1 shows the block diagram of a spatial-domain data embedding system. Fig.1. Spatial domain data embedding system Randomly selected image data are dithered by a small amount according to a predefined algorithm, whose complexity may vary in practical systems. The algorithm defines the intensity and the position of the watermark on the original image. One of the major disadvantages of the conventional watermarking is that it can be easily extracted from the original image which makes this technique unsuitable for copyright authentication. There are three factors that determine the parameters of the algorithm applied in the spatial domain watermarking. The three factors are: • The information associated with the signature. Basically, the signature is the watermark embedded on the original image. The information of the signature is closely related to the size and quality of the signature. • The secret random key. The secret key may be included in the process of watermarking to improve the security during transmission. If a key is also included, only the receiver who knows the key can extract the watermark, and not any intruders. • The masking property of the image. The masking property of the image is also related to the quality and composition of the image which signifies the clarity of the watermark on the original image. One form of the data embedding algorithm is given by the equation , ŷ=y +αI Where y(i,j), is the original image intensity at pixe position (i,j), ŷ is the watermarked image, and αI represents the embedded data in the form of small changes in intensity levels. The author of the watermark holds two keys: • The region of the image where the logo is marked and • The information in the watermark, αI. Given the marked image, the original owner will be able to recover the watermark by comparing the marked image with the original. In the reconstruction of the embedded watermark, the following computation is made, I= (ŷ-y)/α Fig. 2. Watermarking result of a color host image. (a) Host image. (b) Logo image. (c) Resulting watermarked Image. (d) Watermark extracted image. Fig.2. shows the output results of spatial domain technique with host image, logo image, watermarked image and watermark extracted image respectively. INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 181 ISBN: 378-26-138420-01
  • 3. It is difficult for spatial-domain watermarks to survive under attacks such as lossy compression and low-pass filtering. Also the information can be embedded in spatial domain is very limited B. Frequency-Domain Technologies Compared to spatial-domain watermark, watermark in frequency domain is more robust and compatible to popular image compression standards. Thus frequency-domain watermarking obtains much more attention. To embed a watermark, a frequency transformation is applied to the host data. Then, modifications are made to the transform coefficients. Possible frequency image transformations include the Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT) and others The first efficient watermarking scheme was introduced by Koch et al. In their method, the image is first divided into square blocks of size 8x8 for DCT computation. A pair of mid-frequency coefficients is chosen for modification from 12 predetermined pairs. Bors and Pitas developed a method that modifies DCT coefficients satisfying a block site selection constraint. After dividing the image into blocks of size 8x8, certain blocks are selected based on a Gaussian network classifier decision. The middle range frequency DCT coefficients are then modified, using either a linear DCT constraint or a circular DCT detection region. A DCT domain watermarking technique based on the frequency masking of DCT blocks was introduced by Swanson. Cox developed the first frequency-domain watermarking scheme. After that a lot of watermarking algorithms in frequency domain have been proposed. Figure 3 and Figure 4 illustrate the watermark embedding and detection/extraction in frequency domain, respectively. Most frequency-domain algorithms make use of the spread spectrum communication technique. By using a bandwidth larger than required to transmit the signal, we can keep the SNR at each frequency band small enough, even the total power transmitted is very large. When information on several bands is lost, the transmitted signal can still being recovered by the rest ones. The spread spectrum watermarking schemes are the use of spread spectrum communication in digital watermarking. Similar to that in communication, spread spectrum watermarking schemes embed watermarks in the whole host image. The watermark is distributed among the whole frequency band. To destroy the watermark, one has to add noise with INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 182 ISBN: 378-26-138420-01
  • 4. sufficiently large amplitude, which will heavily degrade the quality of watermarked image and be considered as an unsuccessful attack. One major reason why frequency domain watermarking schemes are attractive is their compatibility with existing image compression standards, in particular, the JPEG standard. The compatibility ensures those schemes a good performance when the watermarked image is subject to lossy compression, which is one of the most common image processing methods today. Besides its own advantages it has a disadvantage that it is not suitable for visible watermarking. And only invisible watermarking is mostly performed in frequency domain. C. Wavelet-domain Technologies The wavelet transform is identical to a hierarchical sub-band system, where the sub-bands are logarithmically spaced in frequency. The basic idea of the DWT for a two dimensional image is described as follows. An image is first decomposed into four parts of high, middle and low frequencies (i.e. LL1, HL1, LH1, HH1 sub bands) by critically sub- sampling horizontal and vertical channels using Daubechies filters. The sub-band HL1, LH1 and HH1 represent the finest scale of wavelet coefficients as shown in figure 5. To obtain the next coarser scaled wavelet coefficient, the sub-band LL1 is further decomposed and critically sub-sampled. This process is repeated several times, which is determined by the application in hand. An example of an image decomposed into ten sub-bands for three levels is shown in Figure 6. Each level has various bands information such as low-low, low-high, high-low and high-high frequency bands. Fig.5. Three level wavelet decomposition Fig.6. (a) Three-level Decomposition. (b) Coefficient Distribution. Furthermore, from these DWT coefficients, the original image can be reconstructed. For reconstruction process same filter must be used. This reconstruction process is called the inverse DWT (IDWT). If I (m, n) represent an image, the DWT and IDWT for I (m, n) can be similarly defined by implementing the DWT and IDWT on each dimension m and n separately. III. CONCLUSION In this paper we have briefly discussed regarding the methods (Spatial domain, Frequency domain and Wavelet domain) which are formerly used in visible watermarking. The former methods used DCT, DFT, DWT and LSB (Least Significant Bit) for desired visible watermarking. A novel method for generic visible watermarking with a capability of lossless image recovery is proposed. The method is based on the use of deterministic one-to-one compound mappings of image pixel values for overlaying a variety of visible watermarks of arbitrary sizes on cover images. The compound map-pings are proved to be reversible, which allows for lossless recovery of original images from watermarked images. The mappings may be adjusted to yield pixel values close to those of desired visible watermarks. Different types of visible watermarks, including opaque monochrome and translucent full color ones, are embedded as applications of the proposed generic approach. A two-fold monotonically increasing compound mapping is created and proved to yield more distinctive visible watermarks in the watermarked image. Security protection measures by parameter and mapping randomizations have also been proposed to deter attackers from illicit image recoveries. Experimental results demonstrating the effectiveness of the proposed approach are also included. INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 183 ISBN: 378-26-138420-01
  • 5. REFERENCES [1] G. Braudaway, K. A. Magerlein, and F. Mintzer, “Protecting publicly available images with a visible image watermark,” in Proc. SPIE Int. Conf. Electronic Imaging, Feb. 1996, vol. 2659, pp. 126–133. [2] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673– 1687, Jun. 1997. [3] F.A.P Patitcolas, R.J.Anderson, and M.G.Kun“Information hiding- A survey”- Proc.IEEE, vol:87, no.7, jul. 1999. [4] M. S. Kankanhalli, Rajmohan, and K. R. Ramakrishnan, “Adaptive visible watermarking of images,” in Proc. IEEE Int. Conf. Multimedia Computing and Systems, 1999, vol. 1, pp. [5] S. P. Mohanty, K. R. Ramakrishnan, and M. S Kankanhalli, “A DCT domain visible watermarking technique for images,” in Proc. IEEE Int. Conf. Multimedia and Expo, Jul. 2000, vol. 2, pp. 1029– 1032. [6] N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding. Steganography and Watermarking Attacks and Countermeasures. Boston, MA: Kluwer, 2001. [7] Y. Hu and S.Kwong,“Wavelet domain adaptive visiblewatermarking,” Electron. Lett., vol. 37, no. 20, pp. 1219–1220, Sep. 2001. [8] Y. J. Cheng and W. H. Tsai, “A new method for copyright and integrity protection for bitmap images by removable visible watermarks and irremovable invisible watermarks,” presented at the Int. Computer Symp. Workshop on Cryptology and Information Security, Hualien,Taiwan, R.O.C., Dec. 2002. [9] P. M. Huang and W. H. Tsai, “Copyright protection and authentication of grayscale images by removable visible watermarking and invisible signal embedding techniques: A new approach,” presented at the Conf. Computer Vision, Graphics and Image Processing, Kinmen, Taiwan, R.O.C., Aug. 2003. [10]Y. Hu, S. Kwong, and J. Huang, “An algorithm for removable visible watermarking,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 1, pp. 129– 133, Jan.2006. [11]S. K. Yip, O. C. Au, C. W. Ho, and H. M. Wong, “Lossless visible watermarking,” in Proc. IEEE Int. Conf. Multimedia and Expo, Jul. 2006, pp. 853–856.” [12]Neminath Hubballi and Kanyakumari D P, “Novel DCT based watermarking scheme for digital images”, International Journal of Recent Trends in Engineering, Vol. 1, No. 1, pp. 430- 433, May 2009. [13]Mohammad Reza Soheili “A Robust Digital image Watermarking Scheme Based on DWT” Journal of Advances in Computer Research, m2(2010) 75-82.1. [14]R.AARTHI, V. JAGANYA, & S. POONKUNTRAN “Modified Lsb Watermarking For Image Authentication” International Journal of Computer & Communication Technology (IJCCT) ISSN (ONLINE): 2231 - 0371 ISSN (PRINT): 0975 – 7449 Vol-3, Iss-3, 2012. [15]Vaishali S. Jabade and Dr. Sachin R. Gengaje, “Literature Review of Wavelet Based Digital Image Watermarking Techniques”, International Journal of Computer Applications, Vol 31, No.1, pp. 28-35, October 2011. INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH, ICCTER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 184 ISBN: 378-26-138420-01