SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1
A Blind Watermarking Algorithm
Yu-Wen Chang
Dept. of Electronic Communication Engineering, National Kaohsiung Marine University, Taiwan
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In this paper, a blind watermarking algorithm
is proposed to explore the influence of DCT coefficients in
watermarking mechanism. Each two DCT coeffieients are
selected and compared from the same DCT block. And, the
coefficient of the lower frequency region is used as the basis
for comparison. Then, the watermark bit will be embedded
and extracted with this relation of the coefficients in the
same block and the watermark rule. The characteristics of
the DCT coefficients in the lower frequency region are not
easily changed, thus the relation of the coefficients can be
more relatively stable. Moreover, the quality of the retrieved
watermark and the robustness of the watermaking will be
raised up. And, the proposed method is designed as blind,
which the host image and original watermark are not
needed in the extracting process.
Key Words: digital watermarking, blind, relation of the
coefficients.
1.INTRODUCTION
Digital watermarking technique was first proposed in
1989. The totem or logo used to be the representation of
the legal owner is embeded into the media in this scheme
based on the character of the digital media can be
distored. With such technology, the identity of the
legitimate owner of the multimedia can be claimed in
order to achieve the purpose of protecting intellectual
property rights.
Because the digital media can be easily downloaded,
transmitted or even copied without restriction via web
pages or the internet, the copyright and the intellectual
property rights are greatly threatened. Moreover, many
information security problems such as fake transactions,
theft, tampering ... and so on will be yielded. Therefore,
digital watermarking technology [1] is more and more
important and urgent.
Until now, many digital watermrking technologies have
been introduced and have more effective for different
applications. A robust lossless data hiding method using
the clustering and statistical quantity histogram is showed
in [2-3]. However, the retrieved data will be wrong under
the lossy compression and random noise. A watermarking
scheme using the codebook expansion based on the vector
quantization (VQ) is developed in [4-5]. Though these
technologies are designed as simple and effective; but the
embedded watermark is not robust. A sharing-based
watermarking mechanism is proposed to resist the attack
as cropping and collage [6]. However, the large scale
tampering of the watermarked image will not be detected.
In recent years, the algorithms using the soft computing
are derived to optimize the paprmeters intelligently for
trading off the qualities between the host image and the
retrieved watermark [7-8]. Nevertheless, these schemes
are not designed as blind. A hybrid watermark technique
using Genetic Algorithm (GA) and Particle Swarm
Optimization (PSO) is showed in [9]. Although two
complementary watermarks are hid simultaneously for
higher detection response, each watermark could against a
specific class of attacks. A watermark method using
Discrete Wavelet Transform (DWT) and Singular Value
Decomposition (SVD) is designed as robust for various
attacks [10]. But, the watermark is visual.
Until the correspondence between the communication and
the data hiding is introduced, the digital watermarking
method is regarded as a communication problem.
Therefore, the error correcting codes (ECC) are used to
enhance the robustness of the watermark [11-14].
Besides, some schemes are designed to protect the color
image [15-16]. These methods utilized the block-edge-
pattern or the error correcting coding. However, the
redundancy quantities would be increased after the ECC
technique.
For the robustness reason, most of watermarking
techniques [17-20], the watermark will be hid in the
frequency domain instead of the spatial domain. Each two
DCT coefficients are selected from the different DCT blocks
and modified using the embedding rule and the
information of the watermark.
In this paper, we would like to explore the results of that
each two DCT coefficients are selected and modified from
the same DCT block. The coefficient of the lower frequency
region is used as the basis for comparison. Since, the
characteristics of the DCT coefficients in the lower
frequency region are not easily changed, the relation of the
coefficients can be relatively stable. Thus, the proposed
algorithm can used to raise the quality of the retrieved
watermark and to enhance the robustness of the
watermaking.
The remainder of this paper is organized as follows. In
section 2, the concept of image is briefly presented. The
framework and details of the proposed technique are
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2
described in section 3. The section 4 is about the results
and the conclusion.
2. THE CONCEPT OF IMAGE
In most cases, the characteristics of the neighboring blocks
in the image are similar. Therefore, the values of each two
DCT coefficients which are selected from the same
position of the different blocks are also similar. The other
hand, the watermark is embedded into the frequency
domain for the robustness reason. According to the theory
of data hiding, the DCT coefficients will be used to
compare and modify in order to embed the watermark.
For the quality of the host image, the affect of the
modification of the DCT coefficients in the high-frequency
region is a little. However, the watermark would be erased
easily due to signal processing. Though the watermark is
hid in the low-frequency region can avoid attacks. But the
quality of the host image would be damaged seriously.
Consequently, the watermark had been chosen mostly to
embed into the medium-frequency region.
To preserve the quality of the host image, the modification
of DCT coefficient should be as small as possible. Thence,
the watermark bit will be give up sometimes. In other
word, if the difference of each two block is too large, the
watermark bit will be thorwing away to maintain a better
quality of the watermarked image. However, it will cause
the decrease in the quality of the retrieved watermark.
3. THE PROPOSED TECHNIQUE
The proposed watermarking scheme is used to improve
the question discussed above section. Each two DCT
coefficients are selected from the same block in order to
achieve the purpose for watermarking algorithm. The
process of the embedding the watermark into the host
image is shown in Fig. 1.
Replace
Domain Transform
(DCT)
Sieve Out
Domain Transform
(IDCT)
Host Image
Watermarked
Image
Watermark Scramble Modify
Fig -1: The process of the watermark embedding
Step 1: watermark scrambled
The pixel of the watermark w of size LL  is scrambled
with the chaos mapping function. Let kT denotes the
permutation matrix and pw means the permuted
watermark, respectively.
Step 2: DCT transformed
The host image f of size 256256 is performed block
transform by DCT. Let F denotes the block transform of
f is given by }255,0|),({  vuvuFF . And these block are
be sequentially labeled as lC , for 10230  l .
Step 3: coefficients selected and modified
The coefficients are selected from the lower-frequency
and the middle frequency regions. Then, to modify these
coefficients according the watermark information and rule
1 as follows.
Rule 1:
(a) If    )8(/)8()(/)(  jQjCroundjQjCround ll
and
1pw , then  )8()8( jCjC ll
(b) If    )8(/)8()(/)(  jQjCroundjQjCround ll
and
1pw ,
If     )8()8()(/)( jCjQjQjCround ll
,
then    )8()(/)()8( jQjQjCroundjC ll
else )8()8(  jCjC ll
(c) If    )8(/)8()(/)(  jQjCroundjQjCround ll
and
0pw ,
If      )8(1)(/)()8( jQjQjCroundjC ll
,
then     )8(1)(/)()8( jQjQjCroundjC ll
else )8()8(  jCjC ll
(d) If    )8(/)8()(/)(  jQjCroundjQjCround ll
and
0pw , then  )8()8( jCjC ll
for 102321 ,,,l  , 81,0 j
where )( jCl
(resp. )8( jCl
) denotes the lower frequency
(resp. the middle frequency) coefficient; pw denotes the
scrambled watermark bit will be embedded into the block
lC ; )( jQ and )8( jQ denote the quantifications of
corresponding to the quantization table in JPEG standard.
The  and  , indicate the control scaling parameters are
used to control the value of the DCT coefficient.
Step 4: replaced the coefficients
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3
The coefficients of the middle frequency is adjusted by
step 3 and is restored to the host image.
Step 5: IDCT transformed
Implement the IDCT to obtain a watermarking image g .
The watermarking technique is designed as oblivious.
Therefore, the original host image and watermark are all
not be needed in the extracting procedure which is given
in Fig. 2.
Domain Transform
(DCT)
Sieve Out
Watermarked
Image
Retrieved
Watermark
DeScramble Reconstruct
Fig -2: The process of the watermark extracting
Step 1: DCT transformed
Perform the block transform of the watermarked image g
of size 256256 using DCT.
Step 2: coefficients selected and reconstructed
Collect the middle frequency coefficients )( jBl
which are
the same as step 3 in the embedding method.
Step 3: permuted watermark recovered
Retrieve the permuted watermark according the rule 2.
Rule 2:
(a) If    )8(/)8()(/)(  jQjBroundjQjBround ll
then
1pw
(b) If    )8(/)8()(/)(  jQjBroundjQjBround ll
then
0pw
Step 4: watermark de-scrambled
Reverse the permutation operation using chaos map
function to obtain the retrieved watermark rw .
4. SIMULATIONAL RESULTS AND CONCLUSIONS
In this section, the proposed scheme descibed in section 3
will be demonstrate the robustness. The host images of
size 256256 are 8-bit gray level images and the
watermarks is a binary image. And, one watermark and
three host images (i.e., Pepper, Lena and F16) are used to
test.
In the experimental results, the peak signal noise rate
(PSNR) is applied to estimate the quality between the
original image and the watermarked image, which denote
as f and g , respectively. The formula of PSNR is defined
as
)/255(log10 2
10 MSEPSNR  (1)
where the mean square error (MSE) is described as
follows
   



1
0
1
0
22
/)),(),((N
x
N
y NyxgyxfMSE (2)
The similarity between the original watermark w and the
retrieved watermark w is measured using the bit error
rate (BER).
Table 1 (resp. Table 2) shows the quality of the
watermarked images and retrieved watermarks in which
different host images are used for the proposed
watermarking scheme (resp. the conventional
watermarking scheme). From the table 1, it can be found
that the qualities (PSNR) of the watermarked image with
respect to the host image are more than 32dB in average.
And the retrieved watermarks can be recovered.
Table -1: Quality of watermarked images and retrieved
watermark in which different host image are used in the
proposed algorithm
The proposed algorithm
Watermarked
image
MSE PSNR(dB) Retrieved
watermark
BER(%)
37.306 32.413 9.27
37.326 32.411 8.66
32.039 33.074 9.76
From the table 1 and 2, it is obviously that the qualities of
the watermarked images for the proposed algorithm are
better about 0.2 to 1.1dB than that of the conventional
watermarking algorithm based on the frequency domain.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 4
Further, the retrieved watermarks can be recognized in
lower BER.
Therefore, the results of the each two DCT coefficients
used to select and modify from the same DCT block are
presented in this proposed technique. And, the original
image and watermark are not necessitated in the
extracting process.
Table -2: Quality of watermarked images and retrieved
watermark in which different host image are used in the
conventional watermarking algorithm
The conventional watermarking algorithm
Watermarked
image
MSE PSNR(dB) Retrieved
watermark
BER(%)
42.324 31.864 9.67
39.108 32.208 9.5
41.912 31.907 10.63
REFERENCES
[1] I. J. Cox, M. L. Miller, and J. A. Bloom, Digital
Watermarking. Academic Press, A Harcourt Science
and Technology Company, 2002.
[2] L. An, X. Gao, Y. Yuan, and D. Tao, “Robust Lossless
Data Hiding using Clustering and Statistical Quantity
Histogram,” Neurocomputing, 2012, pp. 1-11.
[3] X. Gao, L. An, Y. Yuan, D. Tao, and X. Li, “Lossless Data
Embedding using Generalized Statistical Quantity
Histogram,” IEEE Trans. Circuits Syst. Video Technol.
21, 2011, pp. 1061-1070.
[4] H. C. Wu and C. C. Chang, “A Novel Digital Image
Watermarking Scheme Based on the Vector
Quantization Technique,” Computers and Security,
2005, pp. 460-471.
[5] Z. M. Lu, J. S. Pan, and S. H. Sun, “VQ-Based Digital
Image Watermarking Method,” IEE Electronic Letters,
2000, pp. 1201-1202.
[6] Y. J. Chang, R. Z. Wang, and J. C. Lin, “A Sharing-Based
Fragile Watermarking Method for Authentication and
Self-Recovery of Image Tampering,” EURASIP Journal
on Advances in Signal Processing, Article ID 846967,
2008.
[7] H. Harrak, T. D. Hien, Y. Nagata, and Z. Nakao, “DCT
Watermarking Optimization by Genetic
Programming,” Advances in Soft Computing, 2006,
pp. 347-351.
[8] A. Khan, S. F. Tahir, A. Mahid, and T. S. Choi, “Machine
Learning Based Adaptive Watermark Decoding in
View of Anticipated Attack,” The Journal of the
Pattern Recognition Society, 2008, pp. 2594-2610.
[9] Z. J. Lee, S. W. Lin, S. F. Su, and C. Y. Lin, “A hybrid
watermarking technique applied to digital images,”
Applied Soft Computing, 2008, pp. 798-808.
[10] N. Wang and C. H. Kim, “Tamper Detection a Self-
Recovery Algorithm of Color Image Based on Robust
Embedding of Dual Visual Watermarks using DWT-
SVD,” 9th International Symposium on
Communications and Information Technology, 2009,
pp. 157-162.
[11] L. Chen and Z. Yao, “A Novel Watermarking
Extraction Based on Error Correction Code and
Evidence Theory,” Fourth International Conference
on Natural Computation, 2008, pp. 613-617.
[12] J. Antonio, M. Noriega, B. M. Kurkoski, M. N. Miyatake,
and H. P. Meana, “Image Authentication and Recovery
using BCH Error-Correcting Codes,” International
Journal of Computers, Issue 1, Vol. 5, 2011.
[13] C. Qin, Q. Mao, and X. Zhang, “Image Watermarking
Scheme with Unequal Protection Capability Based on
Error Correcting Codes,” Journal of Multimedia, Vol.
5, No. 5, 2010, pp. 427-433.
[14] I. Usman and S. Khan, “BCH Coding and Intelligent
Watermark Embedding: Employing both Frequency
and Strength Selection,” Applied Soft Computing,
2010, pp. 332-343.
[15] C. H. Chen, Y. L. Tang, and W. S. Hsieh, “Color Image
Authentication and Recovery via Adaptive Encoding,”
2014 Intrnational Symposium on Computer,
Consumer and Control, 2014, pp. 272-275.
[16] K. C. Liu, “Color Image Watermarking for Tamper
Proofing and Pattern-Based Recovery,” IET Image
Process., Vol. 6, No. 5, 2012, pp. 445-454.
[17] C. C. Chang, P. Y. Lin, and J. S. Yeh, “Preserving
Robustness and Removability for Digital Watermarks
using Subsampling and Difference Correlation,”
Information Sciences, 2009, pp. 2283-2293.
[18] C. M. Kung, J. H. Jeng, and T. K. Troung, “Watermark
Technique using Frequency Domain,” Proc. of the
14th IEEE International Conference on Digital Signal
Processing, July 2002, pp. 729-731.
[19] C. M. Kung, J. H. Jeng, and C. H. Kung, “Watermarking
Based on Block Property,” 16th IPPR Conference on
Computer Vision, Graphics and Image Processing,
Aug. 2003, pp. 540-546.
[20] H. C. Chen, Y. W. Chang, and R. C. Hwang,
“Watermarking Technique for Multimedia
Communication,” 2014 3rd International Symposium
on Business and Social Sciences, July 2014, pp. 818-
826.

More Related Content

What's hot

Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithmeSAT Journals
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attackseSAT Publishing House
 
Design and Implementation of Multiplier using Advanced Booth Multiplier and R...
Design and Implementation of Multiplier using Advanced Booth Multiplier and R...Design and Implementation of Multiplier using Advanced Booth Multiplier and R...
Design and Implementation of Multiplier using Advanced Booth Multiplier and R...IRJET Journal
 
A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...
A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...
A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...VLSICS Design
 
Td ams processing for vlsi implementation of ldpc decoder
Td ams processing for vlsi implementation of ldpc decoderTd ams processing for vlsi implementation of ldpc decoder
Td ams processing for vlsi implementation of ldpc decodereSAT Publishing House
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
 
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...ijcsit
 
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...CSCJournals
 
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionAdvance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionIJERA Editor
 
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...ijiert bestjournal
 
Mutual Exclusion in Wireless Sensor and Actor Networks
Mutual Exclusion in Wireless Sensor and Actor NetworksMutual Exclusion in Wireless Sensor and Actor Networks
Mutual Exclusion in Wireless Sensor and Actor NetworksZhenyun Zhuang
 
Fpga sotcore architecture for lifting scheme revised
Fpga sotcore architecture for lifting scheme revisedFpga sotcore architecture for lifting scheme revised
Fpga sotcore architecture for lifting scheme revisedijcite
 
Highly Parallel Pipelined VLSI Implementation of Lifting Based 2D Discrete Wa...
Highly Parallel Pipelined VLSI Implementation of Lifting Based 2D Discrete Wa...Highly Parallel Pipelined VLSI Implementation of Lifting Based 2D Discrete Wa...
Highly Parallel Pipelined VLSI Implementation of Lifting Based 2D Discrete Wa...idescitation
 
Computer Network Performance evaluation based on Network scalability using OM...
Computer Network Performance evaluation based on Network scalability using OM...Computer Network Performance evaluation based on Network scalability using OM...
Computer Network Performance evaluation based on Network scalability using OM...Jaipal Dhobale
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkprjpublications
 

What's hot (17)

Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithm
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacks
 
Design and Implementation of Multiplier using Advanced Booth Multiplier and R...
Design and Implementation of Multiplier using Advanced Booth Multiplier and R...Design and Implementation of Multiplier using Advanced Booth Multiplier and R...
Design and Implementation of Multiplier using Advanced Booth Multiplier and R...
 
A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...
A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...
A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...
 
Gh2411361141
Gh2411361141Gh2411361141
Gh2411361141
 
Td ams processing for vlsi implementation of ldpc decoder
Td ams processing for vlsi implementation of ldpc decoderTd ams processing for vlsi implementation of ldpc decoder
Td ams processing for vlsi implementation of ldpc decoder
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domains
 
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
 
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
 
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionAdvance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
 
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
 
Mutual Exclusion in Wireless Sensor and Actor Networks
Mutual Exclusion in Wireless Sensor and Actor NetworksMutual Exclusion in Wireless Sensor and Actor Networks
Mutual Exclusion in Wireless Sensor and Actor Networks
 
Fpga sotcore architecture for lifting scheme revised
Fpga sotcore architecture for lifting scheme revisedFpga sotcore architecture for lifting scheme revised
Fpga sotcore architecture for lifting scheme revised
 
Highly Parallel Pipelined VLSI Implementation of Lifting Based 2D Discrete Wa...
Highly Parallel Pipelined VLSI Implementation of Lifting Based 2D Discrete Wa...Highly Parallel Pipelined VLSI Implementation of Lifting Based 2D Discrete Wa...
Highly Parallel Pipelined VLSI Implementation of Lifting Based 2D Discrete Wa...
 
Ppt
PptPpt
Ppt
 
Computer Network Performance evaluation based on Network scalability using OM...
Computer Network Performance evaluation based on Network scalability using OM...Computer Network Performance evaluation based on Network scalability using OM...
Computer Network Performance evaluation based on Network scalability using OM...
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor network
 

Viewers also liked

фотоотчет по поездке в москву
фотоотчет по поездке в москвуфотоотчет по поездке в москву
фотоотчет по поездке в москвушкола
 
фотоотчёт посвяш. в старшеклассники
фотоотчёт посвяш. в старшеклассникифотоотчёт посвяш. в старшеклассники
фотоотчёт посвяш. в старшеклассникишкола
 
Metsätieto ja sähköiset palvelut hankekokonaisuus - Niina Riissanen
Metsätieto ja sähköiset palvelut hankekokonaisuus - Niina RiissanenMetsätieto ja sähköiset palvelut hankekokonaisuus - Niina Riissanen
Metsätieto ja sähköiset palvelut hankekokonaisuus - Niina RiissanenMaa- ja metsätalousministeriö
 
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- 	  Assessment of Environmental Impacts during Operational Phase of a T...IRJET- 	  Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...IRJET Journal
 
IRJET- Review of Vapour Absorption System and Vapour Compression System.
IRJET- 	  Review of Vapour Absorption System and Vapour Compression System.IRJET- 	  Review of Vapour Absorption System and Vapour Compression System.
IRJET- Review of Vapour Absorption System and Vapour Compression System.IRJET Journal
 
IRJET-Accessing Information about Programs and Services through a Voice Site ...
IRJET-Accessing Information about Programs and Services through a Voice Site ...IRJET-Accessing Information about Programs and Services through a Voice Site ...
IRJET-Accessing Information about Programs and Services through a Voice Site ...IRJET Journal
 
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...IRJET Journal
 
IRJET-Evaluation of the Back Propagation Neural Network for Gravity Mapping
IRJET-Evaluation of the Back Propagation Neural Network for Gravity Mapping IRJET-Evaluation of the Back Propagation Neural Network for Gravity Mapping
IRJET-Evaluation of the Back Propagation Neural Network for Gravity Mapping IRJET Journal
 
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET Journal
 
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
 
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET Journal
 
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...IRJET Journal
 
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET- 	  Missing Value Evaluation in SQL Queries: A SurveyIRJET- 	  Missing Value Evaluation in SQL Queries: A Survey
IRJET- Missing Value Evaluation in SQL Queries: A SurveyIRJET Journal
 
IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...
IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...
IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...IRJET Journal
 
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET-Power Flow & Voltage Stability Analysis using MATLAB IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET-Power Flow & Voltage Stability Analysis using MATLAB IRJET Journal
 

Viewers also liked (19)

Sapi iss-32-14
Sapi iss-32-14Sapi iss-32-14
Sapi iss-32-14
 
Spiritual Retreat
Spiritual RetreatSpiritual Retreat
Spiritual Retreat
 
Tata ace
Tata aceTata ace
Tata ace
 
фотоотчет по поездке в москву
фотоотчет по поездке в москвуфотоотчет по поездке в москву
фотоотчет по поездке в москву
 
фотоотчёт посвяш. в старшеклассники
фотоотчёт посвяш. в старшеклассникифотоотчёт посвяш. в старшеклассники
фотоотчёт посвяш. в старшеклассники
 
Metsätieto ja sähköiset palvelut hankekokonaisuus - Niina Riissanen
Metsätieto ja sähköiset palvelut hankekokonaisuus - Niina RiissanenMetsätieto ja sähköiset palvelut hankekokonaisuus - Niina Riissanen
Metsätieto ja sähköiset palvelut hankekokonaisuus - Niina Riissanen
 
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- 	  Assessment of Environmental Impacts during Operational Phase of a T...IRJET- 	  Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
 
IRJET- Review of Vapour Absorption System and Vapour Compression System.
IRJET- 	  Review of Vapour Absorption System and Vapour Compression System.IRJET- 	  Review of Vapour Absorption System and Vapour Compression System.
IRJET- Review of Vapour Absorption System and Vapour Compression System.
 
IRJET-Accessing Information about Programs and Services through a Voice Site ...
IRJET-Accessing Information about Programs and Services through a Voice Site ...IRJET-Accessing Information about Programs and Services through a Voice Site ...
IRJET-Accessing Information about Programs and Services through a Voice Site ...
 
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
 
IRJET-Evaluation of the Back Propagation Neural Network for Gravity Mapping
IRJET-Evaluation of the Back Propagation Neural Network for Gravity Mapping IRJET-Evaluation of the Back Propagation Neural Network for Gravity Mapping
IRJET-Evaluation of the Back Propagation Neural Network for Gravity Mapping
 
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
 
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
 
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
 
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET- 	  Missing Value Evaluation in SQL Queries: A SurveyIRJET- 	  Missing Value Evaluation in SQL Queries: A Survey
IRJET- Missing Value Evaluation in SQL Queries: A Survey
 
IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...
IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...
IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...
 
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET-Power Flow & Voltage Stability Analysis using MATLAB IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
 

Similar to IRJET-A Blind Watermarking Algorithm

Comparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingComparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET Journal
 
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
 
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESijiert bestjournal
 
Digital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingDigital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingIRJET Journal
 
Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...IJECEIAES
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessIRJET Journal
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Paper id 25201467
Paper id 25201467Paper id 25201467
Paper id 25201467IJRAT
 
Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...nooriasukmaningtyas
 
Digital video watermarking using modified lsb and dct technique
Digital video watermarking using modified lsb and dct techniqueDigital video watermarking using modified lsb and dct technique
Digital video watermarking using modified lsb and dct techniqueeSAT Publishing House
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
 
Kassem2009
Kassem2009Kassem2009
Kassem2009lazchi
 

Similar to IRJET-A Blind Watermarking Algorithm (20)

Comparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingComparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for Watermarking
 
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
 
1820 1824
1820 18241820 1824
1820 1824
 
1820 1824
1820 18241820 1824
1820 1824
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
 
Digital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingDigital Image Security using Digital Watermarking
Digital Image Security using Digital Watermarking
 
Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Paper id 25201467
Paper id 25201467Paper id 25201467
Paper id 25201467
 
Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...
 
Digital video watermarking using modified lsb and dct technique
Digital video watermarking using modified lsb and dct techniqueDigital video watermarking using modified lsb and dct technique
Digital video watermarking using modified lsb and dct technique
 
G0523444
G0523444G0523444
G0523444
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics
 
Kassem2009
Kassem2009Kassem2009
Kassem2009
 

Recently uploaded

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 

Recently uploaded (20)

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 

IRJET-A Blind Watermarking Algorithm

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1 A Blind Watermarking Algorithm Yu-Wen Chang Dept. of Electronic Communication Engineering, National Kaohsiung Marine University, Taiwan ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In this paper, a blind watermarking algorithm is proposed to explore the influence of DCT coefficients in watermarking mechanism. Each two DCT coeffieients are selected and compared from the same DCT block. And, the coefficient of the lower frequency region is used as the basis for comparison. Then, the watermark bit will be embedded and extracted with this relation of the coefficients in the same block and the watermark rule. The characteristics of the DCT coefficients in the lower frequency region are not easily changed, thus the relation of the coefficients can be more relatively stable. Moreover, the quality of the retrieved watermark and the robustness of the watermaking will be raised up. And, the proposed method is designed as blind, which the host image and original watermark are not needed in the extracting process. Key Words: digital watermarking, blind, relation of the coefficients. 1.INTRODUCTION Digital watermarking technique was first proposed in 1989. The totem or logo used to be the representation of the legal owner is embeded into the media in this scheme based on the character of the digital media can be distored. With such technology, the identity of the legitimate owner of the multimedia can be claimed in order to achieve the purpose of protecting intellectual property rights. Because the digital media can be easily downloaded, transmitted or even copied without restriction via web pages or the internet, the copyright and the intellectual property rights are greatly threatened. Moreover, many information security problems such as fake transactions, theft, tampering ... and so on will be yielded. Therefore, digital watermarking technology [1] is more and more important and urgent. Until now, many digital watermrking technologies have been introduced and have more effective for different applications. A robust lossless data hiding method using the clustering and statistical quantity histogram is showed in [2-3]. However, the retrieved data will be wrong under the lossy compression and random noise. A watermarking scheme using the codebook expansion based on the vector quantization (VQ) is developed in [4-5]. Though these technologies are designed as simple and effective; but the embedded watermark is not robust. A sharing-based watermarking mechanism is proposed to resist the attack as cropping and collage [6]. However, the large scale tampering of the watermarked image will not be detected. In recent years, the algorithms using the soft computing are derived to optimize the paprmeters intelligently for trading off the qualities between the host image and the retrieved watermark [7-8]. Nevertheless, these schemes are not designed as blind. A hybrid watermark technique using Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) is showed in [9]. Although two complementary watermarks are hid simultaneously for higher detection response, each watermark could against a specific class of attacks. A watermark method using Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) is designed as robust for various attacks [10]. But, the watermark is visual. Until the correspondence between the communication and the data hiding is introduced, the digital watermarking method is regarded as a communication problem. Therefore, the error correcting codes (ECC) are used to enhance the robustness of the watermark [11-14]. Besides, some schemes are designed to protect the color image [15-16]. These methods utilized the block-edge- pattern or the error correcting coding. However, the redundancy quantities would be increased after the ECC technique. For the robustness reason, most of watermarking techniques [17-20], the watermark will be hid in the frequency domain instead of the spatial domain. Each two DCT coefficients are selected from the different DCT blocks and modified using the embedding rule and the information of the watermark. In this paper, we would like to explore the results of that each two DCT coefficients are selected and modified from the same DCT block. The coefficient of the lower frequency region is used as the basis for comparison. Since, the characteristics of the DCT coefficients in the lower frequency region are not easily changed, the relation of the coefficients can be relatively stable. Thus, the proposed algorithm can used to raise the quality of the retrieved watermark and to enhance the robustness of the watermaking. The remainder of this paper is organized as follows. In section 2, the concept of image is briefly presented. The framework and details of the proposed technique are
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2 described in section 3. The section 4 is about the results and the conclusion. 2. THE CONCEPT OF IMAGE In most cases, the characteristics of the neighboring blocks in the image are similar. Therefore, the values of each two DCT coefficients which are selected from the same position of the different blocks are also similar. The other hand, the watermark is embedded into the frequency domain for the robustness reason. According to the theory of data hiding, the DCT coefficients will be used to compare and modify in order to embed the watermark. For the quality of the host image, the affect of the modification of the DCT coefficients in the high-frequency region is a little. However, the watermark would be erased easily due to signal processing. Though the watermark is hid in the low-frequency region can avoid attacks. But the quality of the host image would be damaged seriously. Consequently, the watermark had been chosen mostly to embed into the medium-frequency region. To preserve the quality of the host image, the modification of DCT coefficient should be as small as possible. Thence, the watermark bit will be give up sometimes. In other word, if the difference of each two block is too large, the watermark bit will be thorwing away to maintain a better quality of the watermarked image. However, it will cause the decrease in the quality of the retrieved watermark. 3. THE PROPOSED TECHNIQUE The proposed watermarking scheme is used to improve the question discussed above section. Each two DCT coefficients are selected from the same block in order to achieve the purpose for watermarking algorithm. The process of the embedding the watermark into the host image is shown in Fig. 1. Replace Domain Transform (DCT) Sieve Out Domain Transform (IDCT) Host Image Watermarked Image Watermark Scramble Modify Fig -1: The process of the watermark embedding Step 1: watermark scrambled The pixel of the watermark w of size LL  is scrambled with the chaos mapping function. Let kT denotes the permutation matrix and pw means the permuted watermark, respectively. Step 2: DCT transformed The host image f of size 256256 is performed block transform by DCT. Let F denotes the block transform of f is given by }255,0|),({  vuvuFF . And these block are be sequentially labeled as lC , for 10230  l . Step 3: coefficients selected and modified The coefficients are selected from the lower-frequency and the middle frequency regions. Then, to modify these coefficients according the watermark information and rule 1 as follows. Rule 1: (a) If    )8(/)8()(/)(  jQjCroundjQjCround ll and 1pw , then  )8()8( jCjC ll (b) If    )8(/)8()(/)(  jQjCroundjQjCround ll and 1pw , If     )8()8()(/)( jCjQjQjCround ll , then    )8()(/)()8( jQjQjCroundjC ll else )8()8(  jCjC ll (c) If    )8(/)8()(/)(  jQjCroundjQjCround ll and 0pw , If      )8(1)(/)()8( jQjQjCroundjC ll , then     )8(1)(/)()8( jQjQjCroundjC ll else )8()8(  jCjC ll (d) If    )8(/)8()(/)(  jQjCroundjQjCround ll and 0pw , then  )8()8( jCjC ll for 102321 ,,,l  , 81,0 j where )( jCl (resp. )8( jCl ) denotes the lower frequency (resp. the middle frequency) coefficient; pw denotes the scrambled watermark bit will be embedded into the block lC ; )( jQ and )8( jQ denote the quantifications of corresponding to the quantization table in JPEG standard. The  and  , indicate the control scaling parameters are used to control the value of the DCT coefficient. Step 4: replaced the coefficients
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3 The coefficients of the middle frequency is adjusted by step 3 and is restored to the host image. Step 5: IDCT transformed Implement the IDCT to obtain a watermarking image g . The watermarking technique is designed as oblivious. Therefore, the original host image and watermark are all not be needed in the extracting procedure which is given in Fig. 2. Domain Transform (DCT) Sieve Out Watermarked Image Retrieved Watermark DeScramble Reconstruct Fig -2: The process of the watermark extracting Step 1: DCT transformed Perform the block transform of the watermarked image g of size 256256 using DCT. Step 2: coefficients selected and reconstructed Collect the middle frequency coefficients )( jBl which are the same as step 3 in the embedding method. Step 3: permuted watermark recovered Retrieve the permuted watermark according the rule 2. Rule 2: (a) If    )8(/)8()(/)(  jQjBroundjQjBround ll then 1pw (b) If    )8(/)8()(/)(  jQjBroundjQjBround ll then 0pw Step 4: watermark de-scrambled Reverse the permutation operation using chaos map function to obtain the retrieved watermark rw . 4. SIMULATIONAL RESULTS AND CONCLUSIONS In this section, the proposed scheme descibed in section 3 will be demonstrate the robustness. The host images of size 256256 are 8-bit gray level images and the watermarks is a binary image. And, one watermark and three host images (i.e., Pepper, Lena and F16) are used to test. In the experimental results, the peak signal noise rate (PSNR) is applied to estimate the quality between the original image and the watermarked image, which denote as f and g , respectively. The formula of PSNR is defined as )/255(log10 2 10 MSEPSNR  (1) where the mean square error (MSE) is described as follows        1 0 1 0 22 /)),(),((N x N y NyxgyxfMSE (2) The similarity between the original watermark w and the retrieved watermark w is measured using the bit error rate (BER). Table 1 (resp. Table 2) shows the quality of the watermarked images and retrieved watermarks in which different host images are used for the proposed watermarking scheme (resp. the conventional watermarking scheme). From the table 1, it can be found that the qualities (PSNR) of the watermarked image with respect to the host image are more than 32dB in average. And the retrieved watermarks can be recovered. Table -1: Quality of watermarked images and retrieved watermark in which different host image are used in the proposed algorithm The proposed algorithm Watermarked image MSE PSNR(dB) Retrieved watermark BER(%) 37.306 32.413 9.27 37.326 32.411 8.66 32.039 33.074 9.76 From the table 1 and 2, it is obviously that the qualities of the watermarked images for the proposed algorithm are better about 0.2 to 1.1dB than that of the conventional watermarking algorithm based on the frequency domain.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 4 Further, the retrieved watermarks can be recognized in lower BER. Therefore, the results of the each two DCT coefficients used to select and modify from the same DCT block are presented in this proposed technique. And, the original image and watermark are not necessitated in the extracting process. Table -2: Quality of watermarked images and retrieved watermark in which different host image are used in the conventional watermarking algorithm The conventional watermarking algorithm Watermarked image MSE PSNR(dB) Retrieved watermark BER(%) 42.324 31.864 9.67 39.108 32.208 9.5 41.912 31.907 10.63 REFERENCES [1] I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking. Academic Press, A Harcourt Science and Technology Company, 2002. [2] L. An, X. Gao, Y. Yuan, and D. Tao, “Robust Lossless Data Hiding using Clustering and Statistical Quantity Histogram,” Neurocomputing, 2012, pp. 1-11. [3] X. Gao, L. An, Y. Yuan, D. Tao, and X. Li, “Lossless Data Embedding using Generalized Statistical Quantity Histogram,” IEEE Trans. Circuits Syst. Video Technol. 21, 2011, pp. 1061-1070. [4] H. C. Wu and C. C. Chang, “A Novel Digital Image Watermarking Scheme Based on the Vector Quantization Technique,” Computers and Security, 2005, pp. 460-471. [5] Z. M. Lu, J. S. Pan, and S. H. Sun, “VQ-Based Digital Image Watermarking Method,” IEE Electronic Letters, 2000, pp. 1201-1202. [6] Y. J. Chang, R. Z. Wang, and J. C. Lin, “A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering,” EURASIP Journal on Advances in Signal Processing, Article ID 846967, 2008. [7] H. Harrak, T. D. Hien, Y. Nagata, and Z. Nakao, “DCT Watermarking Optimization by Genetic Programming,” Advances in Soft Computing, 2006, pp. 347-351. [8] A. Khan, S. F. Tahir, A. Mahid, and T. S. Choi, “Machine Learning Based Adaptive Watermark Decoding in View of Anticipated Attack,” The Journal of the Pattern Recognition Society, 2008, pp. 2594-2610. [9] Z. J. Lee, S. W. Lin, S. F. Su, and C. Y. Lin, “A hybrid watermarking technique applied to digital images,” Applied Soft Computing, 2008, pp. 798-808. [10] N. Wang and C. H. Kim, “Tamper Detection a Self- Recovery Algorithm of Color Image Based on Robust Embedding of Dual Visual Watermarks using DWT- SVD,” 9th International Symposium on Communications and Information Technology, 2009, pp. 157-162. [11] L. Chen and Z. Yao, “A Novel Watermarking Extraction Based on Error Correction Code and Evidence Theory,” Fourth International Conference on Natural Computation, 2008, pp. 613-617. [12] J. Antonio, M. Noriega, B. M. Kurkoski, M. N. Miyatake, and H. P. Meana, “Image Authentication and Recovery using BCH Error-Correcting Codes,” International Journal of Computers, Issue 1, Vol. 5, 2011. [13] C. Qin, Q. Mao, and X. Zhang, “Image Watermarking Scheme with Unequal Protection Capability Based on Error Correcting Codes,” Journal of Multimedia, Vol. 5, No. 5, 2010, pp. 427-433. [14] I. Usman and S. Khan, “BCH Coding and Intelligent Watermark Embedding: Employing both Frequency and Strength Selection,” Applied Soft Computing, 2010, pp. 332-343. [15] C. H. Chen, Y. L. Tang, and W. S. Hsieh, “Color Image Authentication and Recovery via Adaptive Encoding,” 2014 Intrnational Symposium on Computer, Consumer and Control, 2014, pp. 272-275. [16] K. C. Liu, “Color Image Watermarking for Tamper Proofing and Pattern-Based Recovery,” IET Image Process., Vol. 6, No. 5, 2012, pp. 445-454. [17] C. C. Chang, P. Y. Lin, and J. S. Yeh, “Preserving Robustness and Removability for Digital Watermarks using Subsampling and Difference Correlation,” Information Sciences, 2009, pp. 2283-2293. [18] C. M. Kung, J. H. Jeng, and T. K. Troung, “Watermark Technique using Frequency Domain,” Proc. of the 14th IEEE International Conference on Digital Signal Processing, July 2002, pp. 729-731. [19] C. M. Kung, J. H. Jeng, and C. H. Kung, “Watermarking Based on Block Property,” 16th IPPR Conference on Computer Vision, Graphics and Image Processing, Aug. 2003, pp. 540-546. [20] H. C. Chen, Y. W. Chang, and R. C. Hwang, “Watermarking Technique for Multimedia Communication,” 2014 3rd International Symposium on Business and Social Sciences, July 2014, pp. 818- 826.