SlideShare a Scribd company logo
1 of 9
Download to read offline
Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016
DOI:10.5121/acij.2016.7202 9
DIGITAL IMAGE WATERMARKING USING DFT
ALGORITHM
N. Senthilkumaran and S. Abinaya
1
Department of Computer Science and Applications, Gandhigram Rural Institute -
Deemed University, Gandhigram
ABSTRACT
Image security is a relatively very young and fast growing. Security of data or information is very
important now a day in this world. Information security is most important for the business industries.
Embedding information so that it cannot be visually perceived. Embedding information in digital data so
that it cannot be visually or audibly perceived. In this paper we review some of the digital image
watermarking and techniques and then DFT algorithm is also proposed. In this paper we review the
robustness and metrics.
KEYWORDS
Watermarking, DFT, Embedding, Robustness
1. INTRODUCTION
Discrete Fourier Transform (DFT) for a finite duration sequence. DFT is a sequence rather than a
function of a continuous variable. DFT corresponds to sample, equally spaced in frequency, of
the Fourier transform of the signal. The relationship between periodic sequence and finite-length
sequences. The Fourier series representation of the periodic sequence corresponds to the DFT of
the finite-length sequence. Any function that periodically repeats itself can be expressed as the
sum of sines and/or cosines of different frequencies, each multiplied by a different coefficient
(Fourier series). Even functions that are not periodic (but whose area under the curve is finite) can
be expressed as the integral of sines and/or cosines multiplied by a weighting function (Fourier
transform). The frequency domain refers to the plane of the two dimensional discrete Fourier
transform of an image. Watermark is a secret message that is embedded into a cover message.
Digital watermark is a visible or perfectly invisible. Watermarking process consists two major
steps one is location and processing. Location is where to embed watermark. And the process is
how to modify the original data to embed watermark. There are two major domain types, spatial
and transform domains. Clearly the DFT is only an approximation since it provides only for a
finite set of frequencies. But how correct are these discrete values themselves? There are two
main types of DFT errors: aliasing and “leakage”: This is another manifestation of the
phenomenon which we have now encountered several times. If the initial samples are not
sufficiently closely spaced to represent high-frequency components present in the underlying
function, then the DFT values will be corrupted by aliasing. As before, the solution is either to
increase the sampling rate (if possible) or to pre-filter the signal in order to minimize its high
frequency spectral content. Recall that the continuous Fourier transform of a periodic waveform
requires the integration to be performed over the interval-∞P to +∞P or over an integer number of
cycles of the waveform. If we attempt to complete the DFT over a non-integer number of cycles
of the input signal, then we might expect the transform to be corrupted in some way.
Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016
10
2. WATERMARKING TECHNIQUES
Watermarking is an embedding process, and it’s secured the data. In this watermarking
techniques mostly used to business industries. In this techniques are visible, invisible, robust and
fragile watermarking. The term watermark” was probably originated from the German term
“Wassermarke”. Since water is of no important in the creation of the mark, the name is
probably given because the marks resemble the effects of the water on paper. Watermarking
process is,
Fig 2.1 Process of watermarking
2.1 Visible Watermark
A visible watermark is immediately perceptible and clearly identifies the cover objects as
copyright-protected material, much like the copyright symbols. Logo or seal of the organization
which holds the rights to the primary image, it allows the primary image to be viewed, but still
visible it clearly as the property of the owning organization. Overlay the watermark in such a way
that makes it difficult to remove, if the goal of indicating property rights is to be achieve
Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016
11
2.2. Invisible Watermark
Invisible watermark a copy should be indistinguishable from the original, i.e., the embedding of
the watermark should not introduce perceptual distortion of the media object. Since the invisible
watermark cannot be detected by the human eye we need some type of extraction algorithm to be
able to read the watermark. Invisible watermark do not change the signal to a perceptually great
extent, i.e., there are only minor variations in the output signal. The example in the figure shows
the invisibly watermarked image [1]
Fig: 2.2 Invisible watermark image
2.3. Robust watermark
A robust watermark must be invariant to possible attacks and remains detectable after attacks are
applied. However, it is probably impossible, up to now, for a watermark to
Fig: 2.3 Robust watermark image
Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016
12
resist all kinds of attacks in addition it is unnecessary and extreme [1]. Robust watermark
is difficult to remove the original information with embedding information.
2.4. Fragile watermark
A watermark is said to be fragile if the watermark is hidden within the host signal is destroyed as
soon as the watermark signal undergoes any manipulation. When fragile watermark is present in a
signal, we can infer, with the high probability, that the signal has not been altered [2]. Fragile
watermarking authentication has an interesting variety of functionalities including tampering
localization and discrimination between malicious and non- malicious manipulations. As to the
fragile watermarks for authentication and proof of integrity, the attacker is no longer interested in
making the watermarks unreadable. This type of watermark is easy because of its fragility. This
host media forgery can be reached by either making undetectable modifications on the
Watermarked signal or interesting a fake watermark into a desirable signal[2].
Fig: 2. 4 Fragile watermark image
3. WATERMARKING METRICS
A robust watermarking scheme is often evaluated in four different aspects: payload, distortion,
robustness and security [3]. Payload Metrics: The payload metrics is the number of bits of the
hidden message conveyed by the watermark. The data hiding capacity of a cover image is
calculated as the maximum amount of information that can be embedded and recovered with the
low error probability. It is expressed in terms of number of message bits that can be embedded
imperceptibility into each pixel of the specific cover image.
C=12݈‫)2ܫߪ2ݓߪ+1(2݃݋‬ bits/pixel(bpp) (1)
Where, ߪ‫2ݓ‬ is the variance of watermark which denotes average energy per pixel allowed for the
message. ߪ‫2ܫ‬ is the equivalent Gaussian variance of the image noise [3].
Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016
13
Watermarkedimage
Watermarkedimage
Watermarkedimage
Watermarkedimage
4. RESULT AND DISCUSSION
Fig: 4.1 Resulting images using watermarking techniques
Images
Invisible Visible Robust Fragile
Image1 Watermarked image
Image2
Watermarked image
Image3
Watermarked image
Image4
Watermarked image
Image5
Watermarkedimage Watermarked image
Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016
14
Images PSNR Value MSE Value
29.9611043 66.13
31.0595575 51.35
30.5248057 58.08
28.9627853 83.21
Fig: 4.2 Watermarking image using PSNR and MSE value
5. DISCRETE FOURIER TRANSFORM
The discrete Fourier transform or DFT is the transform that deals with a _nite discrete-time signal
and a _nite or discrete number of frequencies.
Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016
15
For a signal that is time-limited to 0, 1, …, L- 1, the above N ≥ L frequencies contain all the
information in the signal. However, it is also useful to see what happens if we throw away all but
those N frequencies even for general periodic signals[6].
Discrete-time Fourier transform (DTFT) review
Recall that for a general aperiodic signal x[n], the DTFT and its inverse is,Ref: [5]
Discrete-time Fourier series (DTFS) review
Recall that for a N-periodic signal x[n] Ref: [5]
Frequency (time) domain: the domain (values of u) over which the values of F(u) range; because
u determines the frequency of the components of the transform. Frequency (time) component:
each of the M terms of F(u). Any function that periodically repeats itself can be expressed as the
sum of sines and/or cosines of different frequencies, each multiplied by a different coefficient
(Fourier series). Even functions that are not periodic (but whose area under the curve is finite) can
be expressed as the integral of sines and/or cosines multiplied by a weighting function (Fourier
transform). The frequency domain refers to the plane of the two dimensional discrete Fourier
transform of an image. The purpose of the Fourier transform is to represent a signal as a linear
combination of sinusoidal signals of various frequencies[7].
5.1 The One-Dimensional Fourier Transform Some Examples
The transform of an infinite train of delta functions spaced by T is an infinite train of delta
functions spaced by 1/T.
Fig: 5.1.1 One dimensional fourier transform
The transform of a cosine function is a positive delta at the appropriate positive and
negative frequency [7].
Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016
16
The transform of a sin function is a negative complex delta function at the appropriate
positive frequency and a negative complex delta at the appropriate negative frequency[7].
The transform of a square pulse is a sinc function.
The Discrete Fourier Transform (DFT) is the equivalent of the continuous Fourier
Transform for signals known only at N instants separated by sample times T _(i.e. a finite
sequence of data). Most of the properties of the DTFT have analogous relationships for the DFT.
However, our previous definitions of signal properties and operations like symmetries, time-
reversal, time-shifts, etc. do not quite work directly for time-limited signals over 0,…, N-1.
Time-limited signals are never symmetric in the sense used previously [8].
Fig: 5.1.1 DFT Watermarking Image
Most sequences of real data are much more complicated than the sinusoidal sequences
that we have so far considered and so it will not be possible to avoid introducing discontinuities
when using a finite number of points from the sequence in order to calculate the DFT. The time
taken to evaluate a DFT on a digital computer depends principally on the number of
multiplications involved, since these are the slowest operations. With the DFT, this number is
directly related to V(matrix multiplication of a vector), where is the length of the transform.
For most problems, is chosen to beat least 256 in order to get a reasonable approximation for
the spectrum of the sequence under consideration – hence computational speed becomes a major
consideration. Highly efficient computer algorithms for estimating Discrete Fourier Transforms
have been developed since the mid-60. These are known as Fast Fourier Transform (FFT)
algorithms and they rely on the fact that the standard DFT involves a lot of redundant
calculations:
Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016
17
it is easy to realise that the same values are calculated many times as the computation
proceeds. Firstly, the integer product nk __repeats for different combinations of k and n
values [8].
6. CONCLUSIONS
In this paper proposed to the image watermarking and techniques. In this proposed method is
successfully completed the result. In this metrics result is successfully implemented.
ACKNOWLEDGEMENTS
This work was supported by the Gandhigram Rural Institute Deemed University. I thankful to all
the personalities for the motivation and encouragements to make this paper work as successful
one.
REFERENCES
[1] Yusuf Perwaj, Firoj Perwaj and Asif Perwaj, “An adaptive watermarking techniques for the copyright
of digital images and digital image protection”, International journal of multimedia & it’s
applications, Vol-4, 2012.
[2] Mahmoud El-Gayyer, “Watermarking Techniques spatial domain rights seminar”
[3] Dae – Jea Cho, “A Study on performance evaluation - Metrics for digital watermarking algorithms”,
Advanced Science and Technology letters, Vol-78.
[4] Walid Alakk, Hussain Al-Ahmad and Alavi Kunhu “ A New algorithm for scanned grey PDF files
using DWT and hash function”, IEEE journal, 2014.
[5] Anu Bajaj “ Robust and Reversible digital image watermarking technique based on RDWT-DCT-
SVD”, IEEE journal, 2014.
[6] J. Fessler, May 27, 2004, 13:14(Student Version)
[7] R. C Gonzalez and R.E Woods,” Digital Image Processing”,2nd Ed, 2002.
[8] Discrete Fourier Transform, www.robots.ox.ac.uk
Authors
S. Abinaya was born in Dindigul-Tamil Nadu at1993. She received her B.Sc. from
Madurai Kamaraj University at 2013, dindigul, Tamil Nadu. She received from M.Sc.
degree from Mother Teresa Womens University at 2015. Now doing Research in M.Phil
Computer Science and Applications in Gandhigram Rural Institute Deemed University,
Dindigul, Tamil Nadu .

More Related Content

What's hot

Good denoising using wavelets
Good denoising using waveletsGood denoising using wavelets
Good denoising using waveletsbeenamohan
 
Thresholding eqns for wavelet
Thresholding eqns for waveletThresholding eqns for wavelet
Thresholding eqns for waveletajayhakkumar
 
Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...eSAT Publishing House
 
discrete wavelet transform
discrete wavelet transformdiscrete wavelet transform
discrete wavelet transformpiyush_11
 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital mediaijctet
 
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...CSCJournals
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkeSAT Publishing House
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Lifting Scheme Cores for Wavelet Transform
Lifting Scheme Cores for Wavelet TransformLifting Scheme Cores for Wavelet Transform
Lifting Scheme Cores for Wavelet TransformDavid Bařina
 
ROBUST IMAGE WATERMARKING METHOD USING WAVELET TRANSFORM
ROBUST IMAGE WATERMARKING METHOD USING WAVELET TRANSFORMROBUST IMAGE WATERMARKING METHOD USING WAVELET TRANSFORM
ROBUST IMAGE WATERMARKING METHOD USING WAVELET TRANSFORMsipij
 
Wavelet video processing tecnology
Wavelet video processing tecnologyWavelet video processing tecnology
Wavelet video processing tecnologyPrashant Madnavat
 
A Robust DWT Digital Image Watermarking Technique Basis On Scaling Factor
A Robust DWT Digital Image Watermarking Technique Basis On Scaling FactorA Robust DWT Digital Image Watermarking Technique Basis On Scaling Factor
A Robust DWT Digital Image Watermarking Technique Basis On Scaling FactorIJCSEA Journal
 
Introduction to wavelet transform
Introduction to wavelet transformIntroduction to wavelet transform
Introduction to wavelet transformRaj Endiran
 
PPT Image Analysis(IRDE, DRDO)
PPT Image Analysis(IRDE, DRDO)PPT Image Analysis(IRDE, DRDO)
PPT Image Analysis(IRDE, DRDO)Nidhi Gopal
 
Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—aAgnianbu Wrong
 

What's hot (19)

Ppt
PptPpt
Ppt
 
Good denoising using wavelets
Good denoising using waveletsGood denoising using wavelets
Good denoising using wavelets
 
Thresholding eqns for wavelet
Thresholding eqns for waveletThresholding eqns for wavelet
Thresholding eqns for wavelet
 
Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...
 
discrete wavelet transform
discrete wavelet transformdiscrete wavelet transform
discrete wavelet transform
 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital media
 
wavelet packets
wavelet packetswavelet packets
wavelet packets
 
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
145 153
145 153145 153
145 153
 
Lifting Scheme Cores for Wavelet Transform
Lifting Scheme Cores for Wavelet TransformLifting Scheme Cores for Wavelet Transform
Lifting Scheme Cores for Wavelet Transform
 
ROBUST IMAGE WATERMARKING METHOD USING WAVELET TRANSFORM
ROBUST IMAGE WATERMARKING METHOD USING WAVELET TRANSFORMROBUST IMAGE WATERMARKING METHOD USING WAVELET TRANSFORM
ROBUST IMAGE WATERMARKING METHOD USING WAVELET TRANSFORM
 
Wavelet video processing tecnology
Wavelet video processing tecnologyWavelet video processing tecnology
Wavelet video processing tecnology
 
A Robust DWT Digital Image Watermarking Technique Basis On Scaling Factor
A Robust DWT Digital Image Watermarking Technique Basis On Scaling FactorA Robust DWT Digital Image Watermarking Technique Basis On Scaling Factor
A Robust DWT Digital Image Watermarking Technique Basis On Scaling Factor
 
K31074076
K31074076K31074076
K31074076
 
Introduction to wavelet transform
Introduction to wavelet transformIntroduction to wavelet transform
Introduction to wavelet transform
 
PPT Image Analysis(IRDE, DRDO)
PPT Image Analysis(IRDE, DRDO)PPT Image Analysis(IRDE, DRDO)
PPT Image Analysis(IRDE, DRDO)
 
Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—a
 

Similar to DIGITAL IMAGE WATERMARKING USING DFT ALGORITHM

Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image WatermarkingIJERA Editor
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform ijfcstjournal
 
International Journal for Research in Applied Science & Engineering
International Journal for Research in Applied Science & EngineeringInternational Journal for Research in Applied Science & Engineering
International Journal for Research in Applied Science & Engineeringpriyanka singh
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology vijay rastogi
 
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarkingijsrd.com
 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesEditor IJMTER
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...P singh
 
Paper id 24201422
Paper id 24201422Paper id 24201422
Paper id 24201422IJRAT
 

Similar to DIGITAL IMAGE WATERMARKING USING DFT ALGORITHM (20)

Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image Watermarking
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
 
1674 1677
1674 16771674 1677
1674 1677
 
1674 1677
1674 16771674 1677
1674 1677
 
E04122330
E04122330E04122330
E04122330
 
International Journal for Research in Applied Science & Engineering
International Journal for Research in Applied Science & EngineeringInternational Journal for Research in Applied Science & Engineering
International Journal for Research in Applied Science & Engineering
 
M0262076085
M0262076085M0262076085
M0262076085
 
M0262076085
M0262076085M0262076085
M0262076085
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
 
G0352039045
G0352039045G0352039045
G0352039045
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniques
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
 
Paper id 24201422
Paper id 24201422Paper id 24201422
Paper id 24201422
 
50120140506015
5012014050601550120140506015
50120140506015
 

More from acijjournal

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfacijjournal
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfacijjournal
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfacijjournal
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdfacijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Developmentacijjournal
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodologyacijjournal
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) acijjournal
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principlesacijjournal
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...acijjournal
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...acijjournal
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...acijjournal
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...acijjournal
 

More from acijjournal (20)

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdf
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdf
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdf
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodology
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ)
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

DIGITAL IMAGE WATERMARKING USING DFT ALGORITHM

  • 1. Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016 DOI:10.5121/acij.2016.7202 9 DIGITAL IMAGE WATERMARKING USING DFT ALGORITHM N. Senthilkumaran and S. Abinaya 1 Department of Computer Science and Applications, Gandhigram Rural Institute - Deemed University, Gandhigram ABSTRACT Image security is a relatively very young and fast growing. Security of data or information is very important now a day in this world. Information security is most important for the business industries. Embedding information so that it cannot be visually perceived. Embedding information in digital data so that it cannot be visually or audibly perceived. In this paper we review some of the digital image watermarking and techniques and then DFT algorithm is also proposed. In this paper we review the robustness and metrics. KEYWORDS Watermarking, DFT, Embedding, Robustness 1. INTRODUCTION Discrete Fourier Transform (DFT) for a finite duration sequence. DFT is a sequence rather than a function of a continuous variable. DFT corresponds to sample, equally spaced in frequency, of the Fourier transform of the signal. The relationship between periodic sequence and finite-length sequences. The Fourier series representation of the periodic sequence corresponds to the DFT of the finite-length sequence. Any function that periodically repeats itself can be expressed as the sum of sines and/or cosines of different frequencies, each multiplied by a different coefficient (Fourier series). Even functions that are not periodic (but whose area under the curve is finite) can be expressed as the integral of sines and/or cosines multiplied by a weighting function (Fourier transform). The frequency domain refers to the plane of the two dimensional discrete Fourier transform of an image. Watermark is a secret message that is embedded into a cover message. Digital watermark is a visible or perfectly invisible. Watermarking process consists two major steps one is location and processing. Location is where to embed watermark. And the process is how to modify the original data to embed watermark. There are two major domain types, spatial and transform domains. Clearly the DFT is only an approximation since it provides only for a finite set of frequencies. But how correct are these discrete values themselves? There are two main types of DFT errors: aliasing and “leakage”: This is another manifestation of the phenomenon which we have now encountered several times. If the initial samples are not sufficiently closely spaced to represent high-frequency components present in the underlying function, then the DFT values will be corrupted by aliasing. As before, the solution is either to increase the sampling rate (if possible) or to pre-filter the signal in order to minimize its high frequency spectral content. Recall that the continuous Fourier transform of a periodic waveform requires the integration to be performed over the interval-∞P to +∞P or over an integer number of cycles of the waveform. If we attempt to complete the DFT over a non-integer number of cycles of the input signal, then we might expect the transform to be corrupted in some way.
  • 2. Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016 10 2. WATERMARKING TECHNIQUES Watermarking is an embedding process, and it’s secured the data. In this watermarking techniques mostly used to business industries. In this techniques are visible, invisible, robust and fragile watermarking. The term watermark” was probably originated from the German term “Wassermarke”. Since water is of no important in the creation of the mark, the name is probably given because the marks resemble the effects of the water on paper. Watermarking process is, Fig 2.1 Process of watermarking 2.1 Visible Watermark A visible watermark is immediately perceptible and clearly identifies the cover objects as copyright-protected material, much like the copyright symbols. Logo or seal of the organization which holds the rights to the primary image, it allows the primary image to be viewed, but still visible it clearly as the property of the owning organization. Overlay the watermark in such a way that makes it difficult to remove, if the goal of indicating property rights is to be achieve
  • 3. Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016 11 2.2. Invisible Watermark Invisible watermark a copy should be indistinguishable from the original, i.e., the embedding of the watermark should not introduce perceptual distortion of the media object. Since the invisible watermark cannot be detected by the human eye we need some type of extraction algorithm to be able to read the watermark. Invisible watermark do not change the signal to a perceptually great extent, i.e., there are only minor variations in the output signal. The example in the figure shows the invisibly watermarked image [1] Fig: 2.2 Invisible watermark image 2.3. Robust watermark A robust watermark must be invariant to possible attacks and remains detectable after attacks are applied. However, it is probably impossible, up to now, for a watermark to Fig: 2.3 Robust watermark image
  • 4. Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016 12 resist all kinds of attacks in addition it is unnecessary and extreme [1]. Robust watermark is difficult to remove the original information with embedding information. 2.4. Fragile watermark A watermark is said to be fragile if the watermark is hidden within the host signal is destroyed as soon as the watermark signal undergoes any manipulation. When fragile watermark is present in a signal, we can infer, with the high probability, that the signal has not been altered [2]. Fragile watermarking authentication has an interesting variety of functionalities including tampering localization and discrimination between malicious and non- malicious manipulations. As to the fragile watermarks for authentication and proof of integrity, the attacker is no longer interested in making the watermarks unreadable. This type of watermark is easy because of its fragility. This host media forgery can be reached by either making undetectable modifications on the Watermarked signal or interesting a fake watermark into a desirable signal[2]. Fig: 2. 4 Fragile watermark image 3. WATERMARKING METRICS A robust watermarking scheme is often evaluated in four different aspects: payload, distortion, robustness and security [3]. Payload Metrics: The payload metrics is the number of bits of the hidden message conveyed by the watermark. The data hiding capacity of a cover image is calculated as the maximum amount of information that can be embedded and recovered with the low error probability. It is expressed in terms of number of message bits that can be embedded imperceptibility into each pixel of the specific cover image. C=12݈‫)2ܫߪ2ݓߪ+1(2݃݋‬ bits/pixel(bpp) (1) Where, ߪ‫2ݓ‬ is the variance of watermark which denotes average energy per pixel allowed for the message. ߪ‫2ܫ‬ is the equivalent Gaussian variance of the image noise [3].
  • 5. Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016 13 Watermarkedimage Watermarkedimage Watermarkedimage Watermarkedimage 4. RESULT AND DISCUSSION Fig: 4.1 Resulting images using watermarking techniques Images Invisible Visible Robust Fragile Image1 Watermarked image Image2 Watermarked image Image3 Watermarked image Image4 Watermarked image Image5 Watermarkedimage Watermarked image
  • 6. Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016 14 Images PSNR Value MSE Value 29.9611043 66.13 31.0595575 51.35 30.5248057 58.08 28.9627853 83.21 Fig: 4.2 Watermarking image using PSNR and MSE value 5. DISCRETE FOURIER TRANSFORM The discrete Fourier transform or DFT is the transform that deals with a _nite discrete-time signal and a _nite or discrete number of frequencies.
  • 7. Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016 15 For a signal that is time-limited to 0, 1, …, L- 1, the above N ≥ L frequencies contain all the information in the signal. However, it is also useful to see what happens if we throw away all but those N frequencies even for general periodic signals[6]. Discrete-time Fourier transform (DTFT) review Recall that for a general aperiodic signal x[n], the DTFT and its inverse is,Ref: [5] Discrete-time Fourier series (DTFS) review Recall that for a N-periodic signal x[n] Ref: [5] Frequency (time) domain: the domain (values of u) over which the values of F(u) range; because u determines the frequency of the components of the transform. Frequency (time) component: each of the M terms of F(u). Any function that periodically repeats itself can be expressed as the sum of sines and/or cosines of different frequencies, each multiplied by a different coefficient (Fourier series). Even functions that are not periodic (but whose area under the curve is finite) can be expressed as the integral of sines and/or cosines multiplied by a weighting function (Fourier transform). The frequency domain refers to the plane of the two dimensional discrete Fourier transform of an image. The purpose of the Fourier transform is to represent a signal as a linear combination of sinusoidal signals of various frequencies[7]. 5.1 The One-Dimensional Fourier Transform Some Examples The transform of an infinite train of delta functions spaced by T is an infinite train of delta functions spaced by 1/T. Fig: 5.1.1 One dimensional fourier transform The transform of a cosine function is a positive delta at the appropriate positive and negative frequency [7].
  • 8. Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016 16 The transform of a sin function is a negative complex delta function at the appropriate positive frequency and a negative complex delta at the appropriate negative frequency[7]. The transform of a square pulse is a sinc function. The Discrete Fourier Transform (DFT) is the equivalent of the continuous Fourier Transform for signals known only at N instants separated by sample times T _(i.e. a finite sequence of data). Most of the properties of the DTFT have analogous relationships for the DFT. However, our previous definitions of signal properties and operations like symmetries, time- reversal, time-shifts, etc. do not quite work directly for time-limited signals over 0,…, N-1. Time-limited signals are never symmetric in the sense used previously [8]. Fig: 5.1.1 DFT Watermarking Image Most sequences of real data are much more complicated than the sinusoidal sequences that we have so far considered and so it will not be possible to avoid introducing discontinuities when using a finite number of points from the sequence in order to calculate the DFT. The time taken to evaluate a DFT on a digital computer depends principally on the number of multiplications involved, since these are the slowest operations. With the DFT, this number is directly related to V(matrix multiplication of a vector), where is the length of the transform. For most problems, is chosen to beat least 256 in order to get a reasonable approximation for the spectrum of the sequence under consideration – hence computational speed becomes a major consideration. Highly efficient computer algorithms for estimating Discrete Fourier Transforms have been developed since the mid-60. These are known as Fast Fourier Transform (FFT) algorithms and they rely on the fact that the standard DFT involves a lot of redundant calculations:
  • 9. Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016 17 it is easy to realise that the same values are calculated many times as the computation proceeds. Firstly, the integer product nk __repeats for different combinations of k and n values [8]. 6. CONCLUSIONS In this paper proposed to the image watermarking and techniques. In this proposed method is successfully completed the result. In this metrics result is successfully implemented. ACKNOWLEDGEMENTS This work was supported by the Gandhigram Rural Institute Deemed University. I thankful to all the personalities for the motivation and encouragements to make this paper work as successful one. REFERENCES [1] Yusuf Perwaj, Firoj Perwaj and Asif Perwaj, “An adaptive watermarking techniques for the copyright of digital images and digital image protection”, International journal of multimedia & it’s applications, Vol-4, 2012. [2] Mahmoud El-Gayyer, “Watermarking Techniques spatial domain rights seminar” [3] Dae – Jea Cho, “A Study on performance evaluation - Metrics for digital watermarking algorithms”, Advanced Science and Technology letters, Vol-78. [4] Walid Alakk, Hussain Al-Ahmad and Alavi Kunhu “ A New algorithm for scanned grey PDF files using DWT and hash function”, IEEE journal, 2014. [5] Anu Bajaj “ Robust and Reversible digital image watermarking technique based on RDWT-DCT- SVD”, IEEE journal, 2014. [6] J. Fessler, May 27, 2004, 13:14(Student Version) [7] R. C Gonzalez and R.E Woods,” Digital Image Processing”,2nd Ed, 2002. [8] Discrete Fourier Transform, www.robots.ox.ac.uk Authors S. Abinaya was born in Dindigul-Tamil Nadu at1993. She received her B.Sc. from Madurai Kamaraj University at 2013, dindigul, Tamil Nadu. She received from M.Sc. degree from Mother Teresa Womens University at 2015. Now doing Research in M.Phil Computer Science and Applications in Gandhigram Rural Institute Deemed University, Dindigul, Tamil Nadu .