SlideShare a Scribd company logo
1 of 8
Download to read offline
Natarajan Meghanathan et al. (Eds) : ITCSE, ICDIP, ICAIT - 2013
pp. 109–116, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3911
A DIGITAL COLOR IMAGE
WATERMARKING SYSTEM USING BLIND
SOURCE SEPARATION
Dr.Sangeeta D. Jadhav
Prof. and HOD(IT), Army Institute of Technology,Pune,INDIA
djsangeeta@rediffmail.com
ABSTRACT
An attempt is made to implement a digital color image-adaptive watermarking scheme in
spatial domain and hybrid domain i.e host image in wavelet domain and watermark in spatial
domain. Blind Source Separation (BSS) is used to extract the watermark The novelty of the
presented scheme lies in determining the mixing matrix for BSS model using BFGS (Broyden–
Fletcher–Goldfarb–Shanno) optimization technique. This method is based on the smooth and
textured portions of the image. Texture analysis is carried based on energy content of the
image (using GLCM) which makes the method image adaptive to embed color watermark.
The performance evaluation is carried for hybrid domain of various color spaces like YIQ, HSI
and YCbCr and the feasibility of optimization algorithm for finding mixing matrix is also
checked for these color spaces. Three ICA (Independent Component Analysis)/BSS algorithms
are used in extraction procedure ,through which the watermark can be retrieved efficiently . An
effort is taken to find out the best suited color space to embed the watermark which satisfies the
condition of imperceptibility and robustness against various attacks.
INDEX TERMS — ICA,GLCM,BSS,BFGS
1. INTRODUCTION
One of the more interesting applications is in field of image data security/authentication where
digital watermarking is proposed. Watermarking is a promising technique to help protect data
security and intellectual property rights.[1-3]
There are numerous techniques for embedding a digital image watermark like additive spread
spectrum ,multiplicative spread spectrum DC-QIM etc.
The separation of mixed images is a very exciting area of research, especially when no a priori
information is available about the mixed images. In such a case, blind signal separation (BSS)
technique is needed to recover independent sources given only sensor observations, which are
assumed to be unknown linear mixtures of unknown independent images. [4,5]. The watermarked
image is viewed as linear mixture of sources i.e. original image and watermarks. Independent
Component Analysis (ICA) is probably the most powerful and widely used method for
performing BSS [6-9].
110 Computer Science & Information Technology (CS & IT)
2. SYSTEM DESCRIPTION
The basic principle of digital image watermarking technique is based on BSS model to embed the
watermark in the host image. Watermark embedding is carried out in spatial domain and hybrid
domain. These embedding techniques are explained in following sections w. r. t. blue channel of
RGB space covertext image.
2.1. Embedding in Hybrid Domain
Step-1 Take the host and watermark color images, respectively of size (MxM) and (NxN) with
M>>N. Select their blue channels.
Step-2 Select textured region block based on energy of the sub-image . Take one level DWT
and use LL1 for further processing in single level of DWT . Similarly LL2 and LL3 a in case of
two level DWT and three level DWT. Spatial domain watermark is used for embedding.
Step-3 Obtain the mixing matrix using Quasi-Newton (BFGS) algorithm [14] in order to keep
spatial domain watermark hidden in textured sub-image to form the watermarked mixtures. The
inverse wavelet transform of watermarked mixtures is taken.
Step-4 One of the compound sub-images (watermarked sub-image) is encrusted into the
corresponding blocks of the earlier chosen region of high energy in the original image. The other
secret watermarked mixture in blue channels must be kept for a prospective use in the watermark
extraction process.
Above steps are explained with Figure 1 trough Figure 5 during embedding process.
(a) (b)
Figure 1: Original Image (a) Watermark (b).
Figure 2: Smooth and Textured Portions of Original Image
Computer Science & Information Technology (CS & IT) 111
Figure 3: DWT of Textured Sub-image in Level1
Figure 4: Watermarked Mixture Sub-images after IDWT
(a) (b)
Figure 5: Original Host Image (a) Watermarked Image (b)
2.2. Extraction Procedure
Step-1 Extract the marked block from the tampered watermarked image by using the first part
of the key which is the position key.
Step- 2 Obtain the blue channels of the extracted blocks.
Step -3 The key watermarked mixture and extracted watermarked mixture are used as the inputs
for BSS/ICA algorithms .
Step-4 BSS/ICA algorithms namely Eigen Value Decomposition ,SOBI and JADE are used to
recover both host sub-image and watermark.
112 Computer Science & Information Technology (CS & IT)
3. METHODOLOGY AND ANALYSIS
3.1. BSS Model
Suppose that there exist N mutually independent source signals S1, S2, ……….. SN and M
observed mixtures X1, X2, ……….. Xm of the source signals (usually M ≥ N). Assuming that
these mixtures are linear, instantaneous and noiseless, the model of BSS can be represented as
X = A.s (1)
were S = [S1, S2, ……….. SN ]T and X = [X1, X2, ……….. Xm ]T represents source signals
vector and observed vector respectively, and A is M X N scalar mixing matrix of full rank which
is composed of the mixing coefficients.
We use (1) as the mixture model, and a random 2 X 2
Matrix A= 1 1
2 2
a b
a b
 
 
 
Where ‘ A’ should be a full rank matrix, and the elements of it, which corresponds to the
embedding watermark, should be smaller than other elements relating to the host signal to achieve
the robustness and inperceptibility.
X= A. s =
1 1 1
2 2 2
a s b w
a s b w
+ 
 + 
=
1
2
sw
sw
 
 
 
Where sw1 and sw2 are two observed signals with length L. sw1 is as the watermarked signal,
and sw2 is kept as the secret key k2.
3.2. Algorithm for Generating Mixing Matrix
Likelihood function (Likelihood Vs Iterations) is used for the estimation of Mixing Matrix
generation which is shown below in Figure 6.
Figure 6: Likelihood surface
Computer Science & Information Technology (CS & IT) 113
i) Number of iterations are selected in terms of sample points. In proposed method 1000 sample
points are considered.
ii) At each time sample the energy difference (gradient) is calculated between latent mixture
model and original image. Two energy gradient vectors are formed corresponding to two mixtures
.
iii) Mixing Matrix is
1 ( , )
1 ( , )
t i j
t i j
 
 − 
Where i and j are the sample points on likelihood surface at which the gradient is minimum.
iv) Thus the time varying mixing matrix is used to form watermarked mixtures adaptively.
3.3. Performance Parameters
A series of attacks are tested to verify the robustness of three algorithms include Gaussian low
pass fiter,median filter, adding salt and pepper noise ,adding Gaussian noise ,JPEG compression
etc. The performance analysis parameter viz. Mean Square Error (MSE), PSNR (Peak signal to
Noise Ratio) and NC (Normalized Cross-Correlation) are used to estimate the quality of extracted
watermark.
The equations used are given in Part-I are repeated below-
MSE = [ ]2
,
'
1
WW
MN nm
−∑
(2)
=PSNR 10 log10




MSE
2
255 (3)
=NC
∑∑∑∑
∑∑
= == =
= =
×
1 1
2'
1 1
2
1 1
'*
m nm n
m n
WW
WW
(4)
Where W is original watermark image and W’ is recovered watermark image.
Above parameters are also used to find the retrieval performance with attack compared to the
performance without attack for watermark image. In that case W is treated as recovered
watermark without attack.
4. RESULTS
The Digital Watermarking Method tested for various color spaces viz RGB,YIQ ,YCbCr and HSI
in hybrid domain (DWT for Host and Spatial for Watermark) is compared for mentioned color
spaces.
Figure 7 and Figure 8 shows the sample RGB results for correlation coefficient and PSNR
respectively.
114 Computer Science & Information Technology (CS & IT)
Figure 7: RGB color space correlation coefficient
comparison
Figure 8: RGB color space correlation coefficient
comparison
It is observed that during the recovery of watermark in hybrid domain using three algorithms
for BSS/ICA ,viz. EVD,SOBI JADE , the watermark is recovered in 4 color channels all the
time .These color channels are Blue in RGB,Y inYIQ,Y in YCbCr and S from HIS. Figure 9 and
10 shows the comparison for above mentioned color spaces in hybrid domain for correlation
coefficient (NC) and PSNR for recovered watermark respectively.
Figure 11 describes NC Comparison for Extracted Watermark in Y Channel for spatial and
hybrid domain.
Figure 9: Hybrid Model PSNR Comparison for 4 color Spaces
Computer Science & Information Technology (CS & IT) 115
Figure 10 : Hybrid Model NC Comparison for 4 color Spaces
Figure 11:NC Comparison for Extracted Watermark in Y Channel
5. CONCLUSIONS
An image adaptive watermarking system is presented which satisfies imperceptibility and
robustness conditions of watermarking. The novelty of the presented scheme lies in determining
the mixing matrix for BSS model using BFGS optimization technique. This method is based on
the smooth and textured portions of the image. Texture analysis is carried based on energy
content of the image (using GLCM) which makes the method image adaptive to embed color
watermark. The performance evaluation is carried for spatial domain and hybrid domain of
various color spaces like YIQ, HSI and YCbCr. The feasibility of optimization algorithm for
finding mixing matrix is also checked for these color spaces. Y-Channel of YIQ space has
produced motivating results in hybrid domain.
REFERENCES
[1] A.Cichoki, Shun-ichi Amari,“Adaptive Blind Signal and Image Processing –Learning Algorithms and
Applications”, ISBN: 978-0-471-60791-5,Yr 2002, pp. 1-175.
[2] Sun Jonahing, Li Jun sheng and Li Zhiyong, “An Improved Algorithm of Digital Watermarking
Based on Wavelet Transform”, IEEE proceedings of 2009 world congress science and information
Engg. , Yr. 2009, pp.280-284.
[3] Moilim Amir, Abdellah Adib and Driss Aboutajdine, “Color Images Watermarking by Means of
Independent Component Analysis”, in IEEE transaction , Yr 2007, pp. 347-350.
[4] Chip-Hong Chang et al., “Fuzzy –Art Based Adaptive digital Watermarking Scheme”, IEEE
transactions on circuits and Systems for Video Technology, Vol-15, No-1, Jan-2005, pp. 65-81.
[5] David Knezevic, “Blind Source Separation for Signal Processing Applications” Thesis Yr.
2004.Google:-citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.118.3898&rep=rep1&type=pdf
[6] Toshiyuki Tanaka,Yasuyuki Tagami, “ Automatic MIDI Data Making from Music Wave Data
Performed by 2Instruments Using Blind Signal Separation” , Proceedings in SICE-02, Yr-2002, pp.
451-456.
[7] A. Mansour,N.Benchekroun and C Gervaise,“ Blind Separation of Underwater Acoustic Signals”, in
ICA’06,Yr2006,pp.181-188.
116 Computer Science & Information Technology (CS & IT)
[8] Bisiaux A., Lemur D., Bertel L., “Source Separation With Collocated Antennas:Application to Digital
Communications in HF”, IEE Conference Publication No-480,Vol. 1,Yr 2001, pp. 311-314.
[9] Minfen Shen,Xinjung Zhang,Lisha Sun,P.J. Beadle,FHY Chan, “A Method For digital Image
Watermarking Using ICA” 4th International symposium on ICA and BSS (ICA 2003), Yr 2003, pp.
209-214.
AUTHOR
Dr. Sangeeta Jadhav has received B.E.(Electronics) in 1992 from University of Pune ,
ME ( Electronics and Telecommunication) in 1999 from Govt.College of Engg. ,
Pune and PhD in Electronics in Yr 2012 from BAMU,Aurangabad. She is currently
Professor at Army Institute of Technology Engg college affiliated to University of
Pune,India. She is fellow member of IETE and life member of Indian Society for
Technical Education (ISTE). She has 12 publications to her credit published at various
international ,national conferences and journals. Her research interests are Image
processing, Blind source separation and Independent Component Analysis.

More Related Content

What's hot

spkumar-503report-approved
spkumar-503report-approvedspkumar-503report-approved
spkumar-503report-approved
Prasanna Kumar
 
Iaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing inIaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing in
Iaetsd Iaetsd
 

What's hot (18)

I3602061067
I3602061067I3602061067
I3602061067
 
Non standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletsNon standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded wavelets
 
Multi Resolution features of Content Based Image Retrieval
Multi Resolution features of Content Based Image RetrievalMulti Resolution features of Content Based Image Retrieval
Multi Resolution features of Content Based Image Retrieval
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
 
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniques
 
Adaptive lifting based image compression scheme using interactive artificial ...
Adaptive lifting based image compression scheme using interactive artificial ...Adaptive lifting based image compression scheme using interactive artificial ...
Adaptive lifting based image compression scheme using interactive artificial ...
 
D046022629
D046022629D046022629
D046022629
 
spkumar-503report-approved
spkumar-503report-approvedspkumar-503report-approved
spkumar-503report-approved
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacks
 
Iaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing inIaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing in
 
[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...
[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...
[論文紹介] BlendedMVS: A Large-scale Dataset for Generalized Multi-view Stereo Ne...
 
Fractal Image Compression of Satellite Color Imageries Using Variable Size of...
Fractal Image Compression of Satellite Color Imageries Using Variable Size of...Fractal Image Compression of Satellite Color Imageries Using Variable Size of...
Fractal Image Compression of Satellite Color Imageries Using Variable Size of...
 
Parallel implementation of geodesic distance transform with application in su...
Parallel implementation of geodesic distance transform with application in su...Parallel implementation of geodesic distance transform with application in su...
Parallel implementation of geodesic distance transform with application in su...
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption
 
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESEFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
 
IRJET- Crowd Density Estimation using Novel Feature Descriptor
IRJET- Crowd Density Estimation using Novel Feature DescriptorIRJET- Crowd Density Estimation using Novel Feature Descriptor
IRJET- Crowd Density Estimation using Novel Feature Descriptor
 
2006 ssiai
2006 ssiai2006 ssiai
2006 ssiai
 

Similar to A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION

A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUESA STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
cscpconf
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 

Similar to A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION (20)

H3602056060
H3602056060H3602056060
H3602056060
 
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color ImagesRobust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
 
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
 
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUESA STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacks
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKINGAPPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
 
Gx3612421246
Gx3612421246Gx3612421246
Gx3612421246
 
crowd counting.pptx
crowd counting.pptxcrowd counting.pptx
crowd counting.pptx
 
Semi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svdSemi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svd
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics
 
Enhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackEnhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attack
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
 
16 9252 eeem gis based satellite image denoising (edit ari)
16 9252 eeem gis based satellite image denoising (edit ari)16 9252 eeem gis based satellite image denoising (edit ari)
16 9252 eeem gis based satellite image denoising (edit ari)
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
 
I010135760
I010135760I010135760
I010135760
 
IRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGA
IRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGAIRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGA
IRJET-Underwater Image Enhancement by Wavelet Decomposition using FPGA
 

More from cscpconf

MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
cscpconf
 

More from cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION

  • 1. Natarajan Meghanathan et al. (Eds) : ITCSE, ICDIP, ICAIT - 2013 pp. 109–116, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3911 A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION Dr.Sangeeta D. Jadhav Prof. and HOD(IT), Army Institute of Technology,Pune,INDIA djsangeeta@rediffmail.com ABSTRACT An attempt is made to implement a digital color image-adaptive watermarking scheme in spatial domain and hybrid domain i.e host image in wavelet domain and watermark in spatial domain. Blind Source Separation (BSS) is used to extract the watermark The novelty of the presented scheme lies in determining the mixing matrix for BSS model using BFGS (Broyden– Fletcher–Goldfarb–Shanno) optimization technique. This method is based on the smooth and textured portions of the image. Texture analysis is carried based on energy content of the image (using GLCM) which makes the method image adaptive to embed color watermark. The performance evaluation is carried for hybrid domain of various color spaces like YIQ, HSI and YCbCr and the feasibility of optimization algorithm for finding mixing matrix is also checked for these color spaces. Three ICA (Independent Component Analysis)/BSS algorithms are used in extraction procedure ,through which the watermark can be retrieved efficiently . An effort is taken to find out the best suited color space to embed the watermark which satisfies the condition of imperceptibility and robustness against various attacks. INDEX TERMS — ICA,GLCM,BSS,BFGS 1. INTRODUCTION One of the more interesting applications is in field of image data security/authentication where digital watermarking is proposed. Watermarking is a promising technique to help protect data security and intellectual property rights.[1-3] There are numerous techniques for embedding a digital image watermark like additive spread spectrum ,multiplicative spread spectrum DC-QIM etc. The separation of mixed images is a very exciting area of research, especially when no a priori information is available about the mixed images. In such a case, blind signal separation (BSS) technique is needed to recover independent sources given only sensor observations, which are assumed to be unknown linear mixtures of unknown independent images. [4,5]. The watermarked image is viewed as linear mixture of sources i.e. original image and watermarks. Independent Component Analysis (ICA) is probably the most powerful and widely used method for performing BSS [6-9].
  • 2. 110 Computer Science & Information Technology (CS & IT) 2. SYSTEM DESCRIPTION The basic principle of digital image watermarking technique is based on BSS model to embed the watermark in the host image. Watermark embedding is carried out in spatial domain and hybrid domain. These embedding techniques are explained in following sections w. r. t. blue channel of RGB space covertext image. 2.1. Embedding in Hybrid Domain Step-1 Take the host and watermark color images, respectively of size (MxM) and (NxN) with M>>N. Select their blue channels. Step-2 Select textured region block based on energy of the sub-image . Take one level DWT and use LL1 for further processing in single level of DWT . Similarly LL2 and LL3 a in case of two level DWT and three level DWT. Spatial domain watermark is used for embedding. Step-3 Obtain the mixing matrix using Quasi-Newton (BFGS) algorithm [14] in order to keep spatial domain watermark hidden in textured sub-image to form the watermarked mixtures. The inverse wavelet transform of watermarked mixtures is taken. Step-4 One of the compound sub-images (watermarked sub-image) is encrusted into the corresponding blocks of the earlier chosen region of high energy in the original image. The other secret watermarked mixture in blue channels must be kept for a prospective use in the watermark extraction process. Above steps are explained with Figure 1 trough Figure 5 during embedding process. (a) (b) Figure 1: Original Image (a) Watermark (b). Figure 2: Smooth and Textured Portions of Original Image
  • 3. Computer Science & Information Technology (CS & IT) 111 Figure 3: DWT of Textured Sub-image in Level1 Figure 4: Watermarked Mixture Sub-images after IDWT (a) (b) Figure 5: Original Host Image (a) Watermarked Image (b) 2.2. Extraction Procedure Step-1 Extract the marked block from the tampered watermarked image by using the first part of the key which is the position key. Step- 2 Obtain the blue channels of the extracted blocks. Step -3 The key watermarked mixture and extracted watermarked mixture are used as the inputs for BSS/ICA algorithms . Step-4 BSS/ICA algorithms namely Eigen Value Decomposition ,SOBI and JADE are used to recover both host sub-image and watermark.
  • 4. 112 Computer Science & Information Technology (CS & IT) 3. METHODOLOGY AND ANALYSIS 3.1. BSS Model Suppose that there exist N mutually independent source signals S1, S2, ……….. SN and M observed mixtures X1, X2, ……….. Xm of the source signals (usually M ≥ N). Assuming that these mixtures are linear, instantaneous and noiseless, the model of BSS can be represented as X = A.s (1) were S = [S1, S2, ……….. SN ]T and X = [X1, X2, ……….. Xm ]T represents source signals vector and observed vector respectively, and A is M X N scalar mixing matrix of full rank which is composed of the mixing coefficients. We use (1) as the mixture model, and a random 2 X 2 Matrix A= 1 1 2 2 a b a b       Where ‘ A’ should be a full rank matrix, and the elements of it, which corresponds to the embedding watermark, should be smaller than other elements relating to the host signal to achieve the robustness and inperceptibility. X= A. s = 1 1 1 2 2 2 a s b w a s b w +   +  = 1 2 sw sw       Where sw1 and sw2 are two observed signals with length L. sw1 is as the watermarked signal, and sw2 is kept as the secret key k2. 3.2. Algorithm for Generating Mixing Matrix Likelihood function (Likelihood Vs Iterations) is used for the estimation of Mixing Matrix generation which is shown below in Figure 6. Figure 6: Likelihood surface
  • 5. Computer Science & Information Technology (CS & IT) 113 i) Number of iterations are selected in terms of sample points. In proposed method 1000 sample points are considered. ii) At each time sample the energy difference (gradient) is calculated between latent mixture model and original image. Two energy gradient vectors are formed corresponding to two mixtures . iii) Mixing Matrix is 1 ( , ) 1 ( , ) t i j t i j    −  Where i and j are the sample points on likelihood surface at which the gradient is minimum. iv) Thus the time varying mixing matrix is used to form watermarked mixtures adaptively. 3.3. Performance Parameters A series of attacks are tested to verify the robustness of three algorithms include Gaussian low pass fiter,median filter, adding salt and pepper noise ,adding Gaussian noise ,JPEG compression etc. The performance analysis parameter viz. Mean Square Error (MSE), PSNR (Peak signal to Noise Ratio) and NC (Normalized Cross-Correlation) are used to estimate the quality of extracted watermark. The equations used are given in Part-I are repeated below- MSE = [ ]2 , ' 1 WW MN nm −∑ (2) =PSNR 10 log10     MSE 2 255 (3) =NC ∑∑∑∑ ∑∑ = == = = = × 1 1 2' 1 1 2 1 1 '* m nm n m n WW WW (4) Where W is original watermark image and W’ is recovered watermark image. Above parameters are also used to find the retrieval performance with attack compared to the performance without attack for watermark image. In that case W is treated as recovered watermark without attack. 4. RESULTS The Digital Watermarking Method tested for various color spaces viz RGB,YIQ ,YCbCr and HSI in hybrid domain (DWT for Host and Spatial for Watermark) is compared for mentioned color spaces. Figure 7 and Figure 8 shows the sample RGB results for correlation coefficient and PSNR respectively.
  • 6. 114 Computer Science & Information Technology (CS & IT) Figure 7: RGB color space correlation coefficient comparison Figure 8: RGB color space correlation coefficient comparison It is observed that during the recovery of watermark in hybrid domain using three algorithms for BSS/ICA ,viz. EVD,SOBI JADE , the watermark is recovered in 4 color channels all the time .These color channels are Blue in RGB,Y inYIQ,Y in YCbCr and S from HIS. Figure 9 and 10 shows the comparison for above mentioned color spaces in hybrid domain for correlation coefficient (NC) and PSNR for recovered watermark respectively. Figure 11 describes NC Comparison for Extracted Watermark in Y Channel for spatial and hybrid domain. Figure 9: Hybrid Model PSNR Comparison for 4 color Spaces
  • 7. Computer Science & Information Technology (CS & IT) 115 Figure 10 : Hybrid Model NC Comparison for 4 color Spaces Figure 11:NC Comparison for Extracted Watermark in Y Channel 5. CONCLUSIONS An image adaptive watermarking system is presented which satisfies imperceptibility and robustness conditions of watermarking. The novelty of the presented scheme lies in determining the mixing matrix for BSS model using BFGS optimization technique. This method is based on the smooth and textured portions of the image. Texture analysis is carried based on energy content of the image (using GLCM) which makes the method image adaptive to embed color watermark. The performance evaluation is carried for spatial domain and hybrid domain of various color spaces like YIQ, HSI and YCbCr. The feasibility of optimization algorithm for finding mixing matrix is also checked for these color spaces. Y-Channel of YIQ space has produced motivating results in hybrid domain. REFERENCES [1] A.Cichoki, Shun-ichi Amari,“Adaptive Blind Signal and Image Processing –Learning Algorithms and Applications”, ISBN: 978-0-471-60791-5,Yr 2002, pp. 1-175. [2] Sun Jonahing, Li Jun sheng and Li Zhiyong, “An Improved Algorithm of Digital Watermarking Based on Wavelet Transform”, IEEE proceedings of 2009 world congress science and information Engg. , Yr. 2009, pp.280-284. [3] Moilim Amir, Abdellah Adib and Driss Aboutajdine, “Color Images Watermarking by Means of Independent Component Analysis”, in IEEE transaction , Yr 2007, pp. 347-350. [4] Chip-Hong Chang et al., “Fuzzy –Art Based Adaptive digital Watermarking Scheme”, IEEE transactions on circuits and Systems for Video Technology, Vol-15, No-1, Jan-2005, pp. 65-81. [5] David Knezevic, “Blind Source Separation for Signal Processing Applications” Thesis Yr. 2004.Google:-citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.118.3898&rep=rep1&type=pdf [6] Toshiyuki Tanaka,Yasuyuki Tagami, “ Automatic MIDI Data Making from Music Wave Data Performed by 2Instruments Using Blind Signal Separation” , Proceedings in SICE-02, Yr-2002, pp. 451-456. [7] A. Mansour,N.Benchekroun and C Gervaise,“ Blind Separation of Underwater Acoustic Signals”, in ICA’06,Yr2006,pp.181-188.
  • 8. 116 Computer Science & Information Technology (CS & IT) [8] Bisiaux A., Lemur D., Bertel L., “Source Separation With Collocated Antennas:Application to Digital Communications in HF”, IEE Conference Publication No-480,Vol. 1,Yr 2001, pp. 311-314. [9] Minfen Shen,Xinjung Zhang,Lisha Sun,P.J. Beadle,FHY Chan, “A Method For digital Image Watermarking Using ICA” 4th International symposium on ICA and BSS (ICA 2003), Yr 2003, pp. 209-214. AUTHOR Dr. Sangeeta Jadhav has received B.E.(Electronics) in 1992 from University of Pune , ME ( Electronics and Telecommunication) in 1999 from Govt.College of Engg. , Pune and PhD in Electronics in Yr 2012 from BAMU,Aurangabad. She is currently Professor at Army Institute of Technology Engg college affiliated to University of Pune,India. She is fellow member of IETE and life member of Indian Society for Technical Education (ISTE). She has 12 publications to her credit published at various international ,national conferences and journals. Her research interests are Image processing, Blind source separation and Independent Component Analysis.