SlideShare a Scribd company logo
1 of 8
Download to read offline
Indo-Iranian Journal of Scientific Research (IIJSR)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 79-86, Oct-Dec 2018
79 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
Analysis of Digital Image Watermarking and its Application
A.Umapriya1
, P.Nagarajan2
1
PG Scholar, Department of ECE, Vivekanandha College of Engineering for Women, Namakkal, India.
2
Assistant Professor, Department of ECE, Vivekanandha College of Engineering for Women, Namakkal, India.
Article Received: 29 May 2018 Article Accepted: 22 September 2018 Article Published: 06 October 2018
1. INTRODUCTION
Digital image watermarking is truly derive from Steganography, a method within which digital content is hide with
the opposite content for secure transmission of Digital data especially conditions steganography and watermarking
at terribly similar once the info to be secure is hidden in method of transmission over some carrier. The main
distinction between these two processes is in steganography the hidden information is on highest priority for sender
and receiver however in watermarking larva supply image and hidden image, signature or information is on highest
priority.
2. WATERMARK PROCESS
The process of watermark contains three processes which are as follows
๏ƒผ Watermark insertion
๏ƒผ Watermark extraction
๏ƒผ Watermark detection
ABSTRACT
This paper surveys recent advances in watermarking techniques in digital pictures. The aim of digital watermarking is to incorporate imperceptible
info in multimedia info to confirm an international intelligence agency or just a labeling application. It might be then attainable to recover the
embedded message at any time, albeit the knowledge was altered by one or additional non-destructive attacks, whether malicious or not. Its business
applications vary from copyright protection to digital right management. This paper then classifies the various watermarking techniques into several
classes relying upon the domain within which the hidden information is inserted; the scale of the hidden information and therefore the requirement of
that the hidden information is to be extracted. This paper aims to produce an in depth survey of all watermarking techniques specially focuses on
image watermarking varieties and its applications.
Keywords: Watermarking, Copyright Protection.
Indo-Iranian Journal of Scientific Research (IIJSR)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 79-86, Oct-Dec 2018
80 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
2.1 Watermark Insertion
The watermark insertion process is done by using algorithms. And also we have the secret key for extracting the
hidden data from the image [1-11]. Fig.1 shows the watermark insertion process.
2.2 Watermark Extraction
Watermark extraction is the process which is reverse for the insertion algorithm. By using the secret key we can
extract the required data [12-25]. Fig.2 shows the watermark extraction process.
2.3 Watermark Detection
Detection is an algorithm which is applied to the attacked signal to attempt to extract the watermark from it. If the
signal was unmodified during transmission, the watermark still is present and it may be extracted.Fig.3 shows the
watermark detection.
3. TYPES OF WATERMARKING SCHEMES
Watermarking scheme contains three types which are as follows
1. Private watermarking
2. Semi-private watermarking
3. Public watermarking
3.1 Private Watermarking
Private watermarking systems use the original cover data to extract the watermark from stego-data and use original
cover-data to determine where is the watermark.
Indo-Iranian Journal of Scientific Research (IIJSR)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 79-86, Oct-Dec 2018
81 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
3.2 Semi-private Watermarking
Semi-private watermarking doesnโ€™t use the original cover data for detection, but tries to answer the same question.
3.3 Public Watermarking
Public watermarking neither cover data nor insertion watermarks are required for extraction-this is the most
challenging problem.
4. TECHNIQUES FOR IMAGE WATERMARKING
Digital watermarking is very much popular now a days because it is easily available and it protects our data from
illegal use. It has two major areas i.e.
1. Spatial domain watermarking
2. Frequency domain watermarking
In the spatial domain techniques, we embed the watermark by modifying the pixel values. On the other hand, in
transform domain watermarking, the watermark is embedded into the coefficients of transform domain. Various
types of transform domain techniques are DCT, DWT and DFT. From robustness and imperceptibility point of
view, transform domain techniques are better than spatial domain techniques.
4.1 Spatial Domain Watermarking
In Spatial domain, digital watermarking algorithms directly load the raw data into the original image. There should
be minor changes in the pixel value intensity. The significant portion of the low-frequency component of images
should be modified in order to insert the watermark data in a reliable and robust way. Even if the Spatial domain
watermarking is less robust against attacks, its computing speed is higher than transform domain. The spatial
domain algorithm are specifically divided into two parts
a. Correlation based Techniques
b. Least Significant Bit
4.1.1 Correlation based Techniques
In this technique, the watermark W(x,y) is added to the original content O(x,y) according to the equation.
Ow(x,y) = O(x,y)+ kW(x,y)
where k is a gain factor and Ow is the watermarked content. As we increase the value of k, it will expense the
quality of watermarked contents.
Indo-Iranian Journal of Scientific Research (IIJSR)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 79-86, Oct-Dec 2018
82 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
Advantages
Increases the robustness of watermark by increasing the gain factor.
Disadvantages
Due to very high increment in gain factor, image quality may decrease.
4.1.2 Least Significant Bit
It is an important technique to embed a watermark in the least significant bits of the cover image which are
randomly selected pixels. There are two LSB techniques are available. In the first method, the LSB of the image
was replaced with a pseudo-noise (PN) sequence. While in the second, a PN sequence was added to the LSB.
Advantages
1. Low degradation of image quality
2. Easy to implement and understand
3. High perceptual transparency
Disadvantages
1. Very sensitive to noise
2. Vulnerable to cropping, scaling attacks
3. Very less robust against attacks
4.2 Frequency Domain Watermarking
The main aim of the frequency domain algorithm is to embed the watermarks in the spectral coefficients of the
image. The most commonly used transforms are
๏ƒผ Discrete Cosine Transform (DCT),
๏ƒผ Discrete Fourier Transform (DFT),
๏ƒผ Discrete Wavelet Transform (DFT),
๏ƒผ Singular Value Decomposition (SVD).
4.2.1 Discrete Cosine Transform
It is generally used for the signal processing. In this we transform the image into the frequency domain. It is applied
in many areas like pattern recognition, data compression, and image processing. This technique is more robust than
spatial domain watermarking techniques. The main steps used in DCT are: Firstly, take the image and divide it into
non-overlapping 8*8 blocks. Calculate forward DCT of each of the non-overlapping blocks. Use HVS blocks
selection criteria. Now use highest coefficient selection criteria. Then embed watermark in the selected coefficient.
Now take inverse DCT transform of each block.
Indo-Iranian Journal of Scientific Research (IIJSR)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 79-86, Oct-Dec 2018
83 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
4.2.2 Discrete Fourier Transform
Discrete Fourier Transform (DFT) offers more robustness against geometric attacks like scaling, cropping,
translation, rotation, etc. It decomposes an image in sine and cosine form. In this, embedding may be done in two
ways: direct embedding and the template based embedding. In the direct embedding technique we modifying DFT
magnitude and phase coefficients and then the watermark is embedded. The template based embedding technique
introduces the concept of templates. In DFT domain, during embedding process, we embed the template, which is
used to find the transformation factor. When the image is transformed, firstly this template is searched and it is then
used to resynchronize the image. After this, detector is used to extract the embedded spread spectrum watermark.
4.2.3 Discrete Wavelet Transform
Signal can be analyzed both in time and frequency at the same time by using Wavelet transforms. These wavelets
can be termed as non-linear bases of the input signal which can be selected based on the function being
approximated. Generally wavelets represents the given signal in terms of the dynamic set of bases functions than
static bases families, because dynamic basis represents the signal in efficient way than static bases families.
Discrete wavelet transform efficiently identifies the frequency regions of the audio signal where watermark can be
embedded effectively. So many watermarking methods use DWT. DWT produces two signals from the input
signal, whose length is half of the original input signal, one signal is called as approximate coefficients and other is
called as detail coefficients. Where approximate coefficients represent the low frequency part of the input signal,
and on other hand details coefficients represent the high frequency coefficient of the signal. The Fig.4 represents
the simple one level wavelet decomposition and reconstruction.
Depending on the application and length of the signal, either low frequency or high frequency coefficients can be
further decomposed into multiple levels. This application uses four-level DWT and approximate coefficients are
used as input for further levels.
4.2.4 Singular Value Decomposition
Singular value decomposition decomposes the input data into three sub matrices.
U*S*VT
=SVD(I);
Where I is input signal and input signal will be decomposed into left singular vector matrix U, right singular vector
matrix V, and the diagonal matrix S, and S has eigen values of the input signal as diagonal elements. These eigen
Indo-Iranian Journal of Scientific Research (IIJSR)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 79-86, Oct-Dec 2018
84 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
values (singular values) represents the energy of the signal. SVD has so many properties like translation, scaling
properties so that it can be used in watermarking applications.
5. ATTACKS
When the watermarked media is transmitted, several attacks take place on that watermarked media. These attacks
may be given as:
Removal Attack
In this, the unauthorized user tries to remove the watermark i.e. secret information from the watermarked data.
Interference Attack
In these types of attacks, the noise is inserted to the watermarked media. Some examples of this category are
averaging, quantization, compression etc.
Geometric Attack
These types of attacks can change the geometry of the image. The examples of this category are cropping, rotation
etc.
Low Pass Filtering Attack
This type of attack takes place when we pass the watermarked data from a low pass filter.
Active Attack
It is the most important attack. Here the unauthorized user tries to extract the watermark or simply makes the
watermark such that it cannot be detected by any operation.
Passive Attacks
In this type of attack, unauthorized user simply tries to find out that the particular data contain the watermark or not.
Image Degradation
In these types of attacks, the parts of the image are removed, resulting in damage of robust watermarks. Examples
of these attacks are partial cropping, row removal and column removal, insertion of Gaussian noise.
6. APPLICATIONS
Copyright protection
Digital watermarking can be used to identify and protect copyright ownership. Digital content can be embedded
with watermarks depicting metadata identifying the copyright owners.
Indo-Iranian Journal of Scientific Research (IIJSR)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 79-86, Oct-Dec 2018
85 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
Content archiving
Watermarking can be used to insert digital object identifier or serial number to help archive digital contents like
audio, video. Basically digital contents are recognized by their file names; however this is a very fragile technique
as file name can be easily changed. So by embedding the object identifier within the object itself, we can reduce the
possibility of tampering and hence can be effectively used in archiving systems.
Image and content authentication
With the help of image authentication applications, we can solve the purpose of detecting modification to the data.
The characteristic of an image such as its edges are embedded and compared with the current images for
differences. This problem can be solved by cryptography, where digital signature has been studied as a message
authentication method. One of such technology being used for image authentication is the trustworthy digital
camera.
Medical application
We can use digital watermarking for printing name of patient on X-ray reports and MRI scans. This plays an
important role in treatment offered to the patient because if there is a mix up in the reports of two patients, this could
lead to a disaster.
Tamper detection
By embedding fragile watermarking, digital data can be detected for tampering. If the fragile watermarking got
degraded, it indicates the presence of tampering and hence the digital content cannot be trusted. Such type of
watermarking can be used to authenticate the content. It is also useful in court of law where digital images could be
used as a forensic tool to prove whether the image is tampered or not.
Digital finger printing
Fingerprints are unique to the owner of digital content. It is the characteristic of an object that tend to distinguish it
from other small objects. Hence a single digital object can have different fingerprints because they belong to
different users. As in the applications of copyright protection, the watermark for finger printing is used to trace
authorized users who violate the license agreement and distribute the copyrighted material illegally.
7. CONCLUSION
In this paper, we tend to surveyed the varied aspects for digital watermarking techniques and its applications. A
quick and comparative analysis of watermarking technique is additionally given which may facilitate within the
new researches in connected areas. We tend to also classified the watermarking algorithms based on spatial and
transform domain. Because of area limitation we tend to could not cover enough technical details however we have
tried to be as possible.
Indo-Iranian Journal of Scientific Research (IIJSR)
(Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 79-86, Oct-Dec 2018
86 | P a g e ISSN: 2581-4362 Website: www.iijsr.com
REFERENCES
[1] Jiang Xuehua,-Digital Watermarking and Its Application in Image Copyright Protection, 2010 International Conference
on Intelligent Computation Technology and Automation.
[2] S. S. Gonge and J. W. Bakal, โ€œRobust Digital Watermarking Techniques by Using DCT and Spread Spectrumโ€,
International Journal of Electrical, Electronics and Data Communication, ISSN: 2320-2084, vol. 1, no. 2, (2013).
[3] N. Chandrakar and J. Baggaa,"Performance Comparison of Digital Image Watermarking Techniques: A Survey",
International Journal of computer Application Technology and Research, vol. 2, no. 2, (2013), pp. 126-130.
[4] Singh, Surya Pratap, Paresh Rawat, and Sudhir Agrawal "A robust watermarking approach using DCT-DWT."
International Journal of Emerging Technology and Advanced Engineering (ISSN 2250-2459, Volume 2, Issue 8 (2012).
[5] Anil Lamba, "Uses Of Cluster Computing Techniques To Perform Big Data Analytics For Smart Grid Automation
System", International Journal for Technological Research in Engineering, Volume 1 Issue 7, pp.5804-5808, 2014.
[6] Anil Lamba, โ€œUses Of Different Cyber Security Service To Prevent Attack On Smart Home Infrastructure", International
Journal for Technological Research in Engineering, Volume 1, Issue 11, pp.5809-5813, 2014.
[7] Anil Lamba, "A Role Of Data Mining Analysis To Identify Suspicious Activity Alert Systemโ€, International Journal for
Technological Research in Engineering, Volume 2 Issue 3, pp.5814-5825, 2014.
[8] Anil Lamba, "To Classify Cyber-Security Threats In Automotive Doming Using Different Assessment Methodologiesโ€,
International Journal for Technological Research in Engineering, Volume 3, Issue 3, pp.5831-5836, 2015.
[9] Anil Lamba, โ€œA Study Paper On Security Related Issue Before Adopting Cloud Computing Service Modelโ€, International
Journal for Technological Research in Engineering, Volume 3, Issue 4, pp.5837-5840, 2015.
[10] Anil Lamba, "Uses Of Artificial Intelligent Techniques To Build Accurate Models For Intrusion Detection Systemโ€,
International Journal for Technological Research in Engineering, Volume 2, Issue 12, pp.5826-5830, 2015.
[11] Reddy, R., M. V. N. Prasad, and D. S. Rao. "Robust Digital Watermarking of Images using Wavelets." International
Journal of Computer and Electrical Engineering, vol.1, no.2, pp.1793-8163, 2009.
[12] Mei Jiansheng, Li Sukang, โ€œA Digital Watermarking Algorithm Based On DCT and DWTโ€, Proceedings of the 2009
International Symposium on Web Information Systems and Applications (WISAโ€™09) Nanchang, P. R. China, May 22-24,
2009, pp. 104-107.
[13] Sang, Jun, and Mohammad S. Alam. "Fragility and robustness of binary-phase-only-filter-based fragile/semifragile
digital image watermarking." Instrumentation and Measurement, IEEE Transactions , vol. 57, no.3, pp. 595-606, 2008.
[14] Li, Q., and Cox, I.J, โ€œUsing perceptual models to improve fidelity and provide resistance to valumetric scaling for
quantization index modulation watermarkingโ€, IEEE Transaction on Information Forensics and Security, Vol.2, no.2,2007,
pp.127โ€“139.
[15] Anil Lamba, "Mitigating Zero-Day Attacks In IOT Using A Strategic Framework", International Journal for
Technological Research in Engineering, Volume 4, Issue 1, pp.5711-5714, 2016.
[16] Anil Lamba, "Identifying & Mitigating Cyber Security Threats In Vehicular Technologies", International Journal for
Technological Research in Engineering, Volume 3, Issue 7, pp.5703-5706, 2016.
[17] Anil Lamba, "S4: A Novel & Secure Method For Enforcing Privacy In Cloud Data Warehouses", International Journal for
Technological Research in Engineering, Volume 3, Issue 8, pp.5707-5710, 2016.
[18] Anil Lamba, โ€œCyber Attack Prevention Using VAPT Tools (Vulnerability Assessment & Penetration Testing)โ€, Cikitusi
Journal for Multidisciplinary Research, Volume 1, Issue 2, July - December, pp.64-71, 2014.
[19] Anil Lamba, โ€œA Through Analysis on Protecting Cyber Threats and Attacks on CPS Embedded Subsystemsโ€,
International Journal of Current Engineering and Scientific Research (IJCESR), Volume-1, Issue-3, pp.48-55, 2014.
[20] Anil Lamba, โ€œAnalysing Sanitization Technique of Reverse Proxy Framework for Enhancing Database-Securityโ€,
International Journal of Information and Computing Science, Volume 1, Issue 1, pp.30-44, 2014.
[21] Anil Lamba, โ€œEnhancing Awareness of Cyber-Security and Cloud Computing using Principles of Game Theoryโ€,
International Journal of Advanced in Management, Technology and Engineering Sciences, Volume III, Issue I, pp.71-82,
2013.
[22] Anil Lamba, โ€œResolve Security Policies Conflicts Through Semantics Matching Alignmentโ€, International Journal of
Scientific Research and Review, Volume 2, Issue 2, pp.43-58, 2013.
[23] Anil Lamba, โ€œA Detailed Analysis of Data Security in a cloud Environmentโ€, SURAJ PUNJ Journal for Multidisciplinary
Research, Volume 3, Issue 2, pp.43-51, 2013.
[24] Ganic, E and Eskicioglu, AM, โ€œRobust DWT-SVD domain image watermarking: embedding data in all frequenciesโ€, In
Proceedings of the ACM Multimedia and Security Workshop, 2004, pp. 166-174.
[25] Suhail, M.A.,and Obaidat, M. S., โ€œDigital watermarking-based DCT and JPEG modelโ€, IEEE Transaction on
Instrumentation and Measurement, Vol.52, no.5, 2003, pp.1640โ€“1647.

More Related Content

What's hot

Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarkingijsrd.com
ย 
International Journal for Research in Applied Science & Engineering
International Journal for Research in Applied Science & EngineeringInternational Journal for Research in Applied Science & Engineering
International Journal for Research in Applied Science & Engineeringpriyanka singh
ย 
IRJET - Object Detection and Translation for Blind People using Deep Learning
IRJET - Object Detection and Translation for Blind People using Deep LearningIRJET - Object Detection and Translation for Blind People using Deep Learning
IRJET - Object Detection and Translation for Blind People using Deep LearningIRJET Journal
ย 
Hybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaHybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaIAEME Publication
ย 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...prjpublications
ย 
IRJET- A Review on Blind Watermarking Technique for Copyright Protection of I...
IRJET- A Review on Blind Watermarking Technique for Copyright Protection of I...IRJET- A Review on Blind Watermarking Technique for Copyright Protection of I...
IRJET- A Review on Blind Watermarking Technique for Copyright Protection of I...IRJET Journal
ย 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
ย 
Protection of Multispectral Images using Watermarking and Encryption
Protection of Multispectral Images using Watermarking and EncryptionProtection of Multispectral Images using Watermarking and Encryption
Protection of Multispectral Images using Watermarking and EncryptionIRJET Journal
ย 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESijma
ย 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
ย 
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...ijiert bestjournal
ย 
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...IJERA Editor
ย 

What's hot (16)

[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
ย 
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
ย 
International Journal for Research in Applied Science & Engineering
International Journal for Research in Applied Science & EngineeringInternational Journal for Research in Applied Science & Engineering
International Journal for Research in Applied Science & Engineering
ย 
1918 1923
1918 19231918 1923
1918 1923
ย 
IRJET - Object Detection and Translation for Blind People using Deep Learning
IRJET - Object Detection and Translation for Blind People using Deep LearningIRJET - Object Detection and Translation for Blind People using Deep Learning
IRJET - Object Detection and Translation for Blind People using Deep Learning
ย 
Hybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaHybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pca
ย 
1674 1677
1674 16771674 1677
1674 1677
ย 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
ย 
IRJET- A Review on Blind Watermarking Technique for Copyright Protection of I...
IRJET- A Review on Blind Watermarking Technique for Copyright Protection of I...IRJET- A Review on Blind Watermarking Technique for Copyright Protection of I...
IRJET- A Review on Blind Watermarking Technique for Copyright Protection of I...
ย 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
ย 
Protection of Multispectral Images using Watermarking and Encryption
Protection of Multispectral Images using Watermarking and EncryptionProtection of Multispectral Images using Watermarking and Encryption
Protection of Multispectral Images using Watermarking and Encryption
ย 
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
ย 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
ย 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
ย 
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
ย 
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
ย 

Similar to Analysis of Digital Image Watermarking and its Application

Comparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingComparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET Journal
ย 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital mediaijctet
ย 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesEditor IJMTER
ย 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET Journal
ย 
Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...eSAT Publishing House
ย 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
ย 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
ย 
Digital Image Watermarking using Discrete Wavelet Transform
Digital Image Watermarking using Discrete Wavelet TransformDigital Image Watermarking using Discrete Wavelet Transform
Digital Image Watermarking using Discrete Wavelet TransformIRJET Journal
ย 
Dz31840846
Dz31840846Dz31840846
Dz31840846IJERA Editor
ย 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
ย 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
ย 
Ki2417591763
Ki2417591763Ki2417591763
Ki2417591763IJERA Editor
ย 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessIRJET Journal
ย 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))IAESIJEECS
ย 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingEditor IJMTER
ย 

Similar to Analysis of Digital Image Watermarking and its Application (20)

Comparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingComparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for Watermarking
ย 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital media
ย 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniques
ย 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud Computing
ย 
Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...
ย 
1674 1677
1674 16771674 1677
1674 1677
ย 
G0523444
G0523444G0523444
G0523444
ย 
50120140506015
5012014050601550120140506015
50120140506015
ย 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
ย 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
ย 
Digital Image Watermarking using Discrete Wavelet Transform
Digital Image Watermarking using Discrete Wavelet TransformDigital Image Watermarking using Discrete Wavelet Transform
Digital Image Watermarking using Discrete Wavelet Transform
ย 
Dz31840846
Dz31840846Dz31840846
Dz31840846
ย 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
ย 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
ย 
Ki2417591763
Ki2417591763Ki2417591763
Ki2417591763
ย 
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
ย 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
ย 
B280916
B280916B280916
B280916
ย 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))
ย 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking
ย 

More from Associate Professor in VSB Coimbatore

Usmonkhoja Polatkhojaโ€™s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhojaโ€™s Son and His Role in National Liberation Movements of ...Usmonkhoja Polatkhojaโ€™s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhojaโ€™s Son and His Role in National Liberation Movements of ...Associate Professor in VSB Coimbatore
ย 
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...Associate Professor in VSB Coimbatore
ย 
Improvement in Taif Rosesโ€™ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Rosesโ€™ Perfume Manufacturing Process by Using Work Study ...Improvement in Taif Rosesโ€™ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Rosesโ€™ Perfume Manufacturing Process by Using Work Study ...Associate Professor in VSB Coimbatore
ย 
A Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee RetentionA Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee RetentionAssociate Professor in VSB Coimbatore
ย 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Associate Professor in VSB Coimbatore
ย 
Determine the Importance Level of Criteria in Creating Cultural Resourcesโ€™ At...
Determine the Importance Level of Criteria in Creating Cultural Resourcesโ€™ At...Determine the Importance Level of Criteria in Creating Cultural Resourcesโ€™ At...
Determine the Importance Level of Criteria in Creating Cultural Resourcesโ€™ At...Associate Professor in VSB Coimbatore
ย 
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...Associate Professor in VSB Coimbatore
ย 
A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...Associate Professor in VSB Coimbatore
ย 
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture Associate Professor in VSB Coimbatore
ย 
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...Associate Professor in VSB Coimbatore
ย 
Ecological Footprint of Food Consumption in Ijebu Ode, Nigeria
Ecological Footprint of Food Consumption in Ijebu Ode, NigeriaEcological Footprint of Food Consumption in Ijebu Ode, Nigeria
Ecological Footprint of Food Consumption in Ijebu Ode, NigeriaAssociate Professor in VSB Coimbatore
ย 
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...Associate Professor in VSB Coimbatore
ย 
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...Associate Professor in VSB Coimbatore
ย 
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...Associate Professor in VSB Coimbatore
ย 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal Associate Professor in VSB Coimbatore
ย 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal Associate Professor in VSB Coimbatore
ย 
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...Associate Professor in VSB Coimbatore
ย 
Hepatitis and its Transmission Through Needlestick Injuries
Hepatitis and its Transmission Through Needlestick Injuries Hepatitis and its Transmission Through Needlestick Injuries
Hepatitis and its Transmission Through Needlestick Injuries Associate Professor in VSB Coimbatore
ย 

More from Associate Professor in VSB Coimbatore (20)

Usmonkhoja Polatkhojaโ€™s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhojaโ€™s Son and His Role in National Liberation Movements of ...Usmonkhoja Polatkhojaโ€™s Son and His Role in National Liberation Movements of ...
Usmonkhoja Polatkhojaโ€™s Son and His Role in National Liberation Movements of ...
ย 
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
Flood Vulnerability Mapping using Geospatial Techniques: Case Study of Lagos ...
ย 
Improvement in Taif Rosesโ€™ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Rosesโ€™ Perfume Manufacturing Process by Using Work Study ...Improvement in Taif Rosesโ€™ Perfume Manufacturing Process by Using Work Study ...
Improvement in Taif Rosesโ€™ Perfume Manufacturing Process by Using Work Study ...
ย 
A Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee RetentionA Systematic Review on Various Factors Influencing Employee Retention
A Systematic Review on Various Factors Influencing Employee Retention
ย 
Digital Planting Pot for Smart Irrigation
Digital Planting Pot for Smart Irrigation  Digital Planting Pot for Smart Irrigation
Digital Planting Pot for Smart Irrigation
ย 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
ย 
Determine the Importance Level of Criteria in Creating Cultural Resourcesโ€™ At...
Determine the Importance Level of Criteria in Creating Cultural Resourcesโ€™ At...Determine the Importance Level of Criteria in Creating Cultural Resourcesโ€™ At...
Determine the Importance Level of Criteria in Creating Cultural Resourcesโ€™ At...
ย 
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...
ย 
A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...A Review on the Distribution, Nutritional Status and Biological Activity of V...
A Review on the Distribution, Nutritional Status and Biological Activity of V...
ย 
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
Psoralen Promotes Myogenic Differentiation of Muscle Cells to Repair Fracture
ย 
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
Saliva: An Economic and Reliable Alternative for the Detection of SARS-CoV-2 ...
ย 
Ecological Footprint of Food Consumption in Ijebu Ode, Nigeria
Ecological Footprint of Food Consumption in Ijebu Ode, NigeriaEcological Footprint of Food Consumption in Ijebu Ode, Nigeria
Ecological Footprint of Food Consumption in Ijebu Ode, Nigeria
ย 
Mass & Quark Symmetry
Mass & Quark SymmetryMass & Quark Symmetry
Mass & Quark Symmetry
ย 
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
Biocompatible Molybdenum Complexes Based on Terephthalic Acid and Derived fro...
ย 
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
Influence of Low Intensity Aerobic Exercise Training on the Vo2 Max in 11 to ...
ย 
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
Effects of Planting Ratio and Planting Distance on Kadaria 1 Hybrid Rice Seed...
ย 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal
ย 
Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal  Study of the Cassava Production System in the Department of Tivaouane, Senegal
Study of the Cassava Production System in the Department of Tivaouane, Senegal
ย 
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
Burnout of Nurses in Nursing Homes: To What Extent Age, Education, Length of ...
ย 
Hepatitis and its Transmission Through Needlestick Injuries
Hepatitis and its Transmission Through Needlestick Injuries Hepatitis and its Transmission Through Needlestick Injuries
Hepatitis and its Transmission Through Needlestick Injuries
ย 

Recently uploaded

Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
ย 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
ย 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
ย 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
ย 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
ย 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
ย 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
ย 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf203318pmpc
ย 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixNeometrix_Engineering_Pvt_Ltd
ย 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
ย 

Recently uploaded (20)

(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
ย 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
ย 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
ย 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
ย 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
ย 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
ย 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
ย 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
ย 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
ย 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
ย 

Analysis of Digital Image Watermarking and its Application

  • 1. Indo-Iranian Journal of Scientific Research (IIJSR) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 79-86, Oct-Dec 2018 79 | P a g e ISSN: 2581-4362 Website: www.iijsr.com Analysis of Digital Image Watermarking and its Application A.Umapriya1 , P.Nagarajan2 1 PG Scholar, Department of ECE, Vivekanandha College of Engineering for Women, Namakkal, India. 2 Assistant Professor, Department of ECE, Vivekanandha College of Engineering for Women, Namakkal, India. Article Received: 29 May 2018 Article Accepted: 22 September 2018 Article Published: 06 October 2018 1. INTRODUCTION Digital image watermarking is truly derive from Steganography, a method within which digital content is hide with the opposite content for secure transmission of Digital data especially conditions steganography and watermarking at terribly similar once the info to be secure is hidden in method of transmission over some carrier. The main distinction between these two processes is in steganography the hidden information is on highest priority for sender and receiver however in watermarking larva supply image and hidden image, signature or information is on highest priority. 2. WATERMARK PROCESS The process of watermark contains three processes which are as follows ๏ƒผ Watermark insertion ๏ƒผ Watermark extraction ๏ƒผ Watermark detection ABSTRACT This paper surveys recent advances in watermarking techniques in digital pictures. The aim of digital watermarking is to incorporate imperceptible info in multimedia info to confirm an international intelligence agency or just a labeling application. It might be then attainable to recover the embedded message at any time, albeit the knowledge was altered by one or additional non-destructive attacks, whether malicious or not. Its business applications vary from copyright protection to digital right management. This paper then classifies the various watermarking techniques into several classes relying upon the domain within which the hidden information is inserted; the scale of the hidden information and therefore the requirement of that the hidden information is to be extracted. This paper aims to produce an in depth survey of all watermarking techniques specially focuses on image watermarking varieties and its applications. Keywords: Watermarking, Copyright Protection.
  • 2. Indo-Iranian Journal of Scientific Research (IIJSR) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 79-86, Oct-Dec 2018 80 | P a g e ISSN: 2581-4362 Website: www.iijsr.com 2.1 Watermark Insertion The watermark insertion process is done by using algorithms. And also we have the secret key for extracting the hidden data from the image [1-11]. Fig.1 shows the watermark insertion process. 2.2 Watermark Extraction Watermark extraction is the process which is reverse for the insertion algorithm. By using the secret key we can extract the required data [12-25]. Fig.2 shows the watermark extraction process. 2.3 Watermark Detection Detection is an algorithm which is applied to the attacked signal to attempt to extract the watermark from it. If the signal was unmodified during transmission, the watermark still is present and it may be extracted.Fig.3 shows the watermark detection. 3. TYPES OF WATERMARKING SCHEMES Watermarking scheme contains three types which are as follows 1. Private watermarking 2. Semi-private watermarking 3. Public watermarking 3.1 Private Watermarking Private watermarking systems use the original cover data to extract the watermark from stego-data and use original cover-data to determine where is the watermark.
  • 3. Indo-Iranian Journal of Scientific Research (IIJSR) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 79-86, Oct-Dec 2018 81 | P a g e ISSN: 2581-4362 Website: www.iijsr.com 3.2 Semi-private Watermarking Semi-private watermarking doesnโ€™t use the original cover data for detection, but tries to answer the same question. 3.3 Public Watermarking Public watermarking neither cover data nor insertion watermarks are required for extraction-this is the most challenging problem. 4. TECHNIQUES FOR IMAGE WATERMARKING Digital watermarking is very much popular now a days because it is easily available and it protects our data from illegal use. It has two major areas i.e. 1. Spatial domain watermarking 2. Frequency domain watermarking In the spatial domain techniques, we embed the watermark by modifying the pixel values. On the other hand, in transform domain watermarking, the watermark is embedded into the coefficients of transform domain. Various types of transform domain techniques are DCT, DWT and DFT. From robustness and imperceptibility point of view, transform domain techniques are better than spatial domain techniques. 4.1 Spatial Domain Watermarking In Spatial domain, digital watermarking algorithms directly load the raw data into the original image. There should be minor changes in the pixel value intensity. The significant portion of the low-frequency component of images should be modified in order to insert the watermark data in a reliable and robust way. Even if the Spatial domain watermarking is less robust against attacks, its computing speed is higher than transform domain. The spatial domain algorithm are specifically divided into two parts a. Correlation based Techniques b. Least Significant Bit 4.1.1 Correlation based Techniques In this technique, the watermark W(x,y) is added to the original content O(x,y) according to the equation. Ow(x,y) = O(x,y)+ kW(x,y) where k is a gain factor and Ow is the watermarked content. As we increase the value of k, it will expense the quality of watermarked contents.
  • 4. Indo-Iranian Journal of Scientific Research (IIJSR) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 79-86, Oct-Dec 2018 82 | P a g e ISSN: 2581-4362 Website: www.iijsr.com Advantages Increases the robustness of watermark by increasing the gain factor. Disadvantages Due to very high increment in gain factor, image quality may decrease. 4.1.2 Least Significant Bit It is an important technique to embed a watermark in the least significant bits of the cover image which are randomly selected pixels. There are two LSB techniques are available. In the first method, the LSB of the image was replaced with a pseudo-noise (PN) sequence. While in the second, a PN sequence was added to the LSB. Advantages 1. Low degradation of image quality 2. Easy to implement and understand 3. High perceptual transparency Disadvantages 1. Very sensitive to noise 2. Vulnerable to cropping, scaling attacks 3. Very less robust against attacks 4.2 Frequency Domain Watermarking The main aim of the frequency domain algorithm is to embed the watermarks in the spectral coefficients of the image. The most commonly used transforms are ๏ƒผ Discrete Cosine Transform (DCT), ๏ƒผ Discrete Fourier Transform (DFT), ๏ƒผ Discrete Wavelet Transform (DFT), ๏ƒผ Singular Value Decomposition (SVD). 4.2.1 Discrete Cosine Transform It is generally used for the signal processing. In this we transform the image into the frequency domain. It is applied in many areas like pattern recognition, data compression, and image processing. This technique is more robust than spatial domain watermarking techniques. The main steps used in DCT are: Firstly, take the image and divide it into non-overlapping 8*8 blocks. Calculate forward DCT of each of the non-overlapping blocks. Use HVS blocks selection criteria. Now use highest coefficient selection criteria. Then embed watermark in the selected coefficient. Now take inverse DCT transform of each block.
  • 5. Indo-Iranian Journal of Scientific Research (IIJSR) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 79-86, Oct-Dec 2018 83 | P a g e ISSN: 2581-4362 Website: www.iijsr.com 4.2.2 Discrete Fourier Transform Discrete Fourier Transform (DFT) offers more robustness against geometric attacks like scaling, cropping, translation, rotation, etc. It decomposes an image in sine and cosine form. In this, embedding may be done in two ways: direct embedding and the template based embedding. In the direct embedding technique we modifying DFT magnitude and phase coefficients and then the watermark is embedded. The template based embedding technique introduces the concept of templates. In DFT domain, during embedding process, we embed the template, which is used to find the transformation factor. When the image is transformed, firstly this template is searched and it is then used to resynchronize the image. After this, detector is used to extract the embedded spread spectrum watermark. 4.2.3 Discrete Wavelet Transform Signal can be analyzed both in time and frequency at the same time by using Wavelet transforms. These wavelets can be termed as non-linear bases of the input signal which can be selected based on the function being approximated. Generally wavelets represents the given signal in terms of the dynamic set of bases functions than static bases families, because dynamic basis represents the signal in efficient way than static bases families. Discrete wavelet transform efficiently identifies the frequency regions of the audio signal where watermark can be embedded effectively. So many watermarking methods use DWT. DWT produces two signals from the input signal, whose length is half of the original input signal, one signal is called as approximate coefficients and other is called as detail coefficients. Where approximate coefficients represent the low frequency part of the input signal, and on other hand details coefficients represent the high frequency coefficient of the signal. The Fig.4 represents the simple one level wavelet decomposition and reconstruction. Depending on the application and length of the signal, either low frequency or high frequency coefficients can be further decomposed into multiple levels. This application uses four-level DWT and approximate coefficients are used as input for further levels. 4.2.4 Singular Value Decomposition Singular value decomposition decomposes the input data into three sub matrices. U*S*VT =SVD(I); Where I is input signal and input signal will be decomposed into left singular vector matrix U, right singular vector matrix V, and the diagonal matrix S, and S has eigen values of the input signal as diagonal elements. These eigen
  • 6. Indo-Iranian Journal of Scientific Research (IIJSR) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 79-86, Oct-Dec 2018 84 | P a g e ISSN: 2581-4362 Website: www.iijsr.com values (singular values) represents the energy of the signal. SVD has so many properties like translation, scaling properties so that it can be used in watermarking applications. 5. ATTACKS When the watermarked media is transmitted, several attacks take place on that watermarked media. These attacks may be given as: Removal Attack In this, the unauthorized user tries to remove the watermark i.e. secret information from the watermarked data. Interference Attack In these types of attacks, the noise is inserted to the watermarked media. Some examples of this category are averaging, quantization, compression etc. Geometric Attack These types of attacks can change the geometry of the image. The examples of this category are cropping, rotation etc. Low Pass Filtering Attack This type of attack takes place when we pass the watermarked data from a low pass filter. Active Attack It is the most important attack. Here the unauthorized user tries to extract the watermark or simply makes the watermark such that it cannot be detected by any operation. Passive Attacks In this type of attack, unauthorized user simply tries to find out that the particular data contain the watermark or not. Image Degradation In these types of attacks, the parts of the image are removed, resulting in damage of robust watermarks. Examples of these attacks are partial cropping, row removal and column removal, insertion of Gaussian noise. 6. APPLICATIONS Copyright protection Digital watermarking can be used to identify and protect copyright ownership. Digital content can be embedded with watermarks depicting metadata identifying the copyright owners.
  • 7. Indo-Iranian Journal of Scientific Research (IIJSR) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 79-86, Oct-Dec 2018 85 | P a g e ISSN: 2581-4362 Website: www.iijsr.com Content archiving Watermarking can be used to insert digital object identifier or serial number to help archive digital contents like audio, video. Basically digital contents are recognized by their file names; however this is a very fragile technique as file name can be easily changed. So by embedding the object identifier within the object itself, we can reduce the possibility of tampering and hence can be effectively used in archiving systems. Image and content authentication With the help of image authentication applications, we can solve the purpose of detecting modification to the data. The characteristic of an image such as its edges are embedded and compared with the current images for differences. This problem can be solved by cryptography, where digital signature has been studied as a message authentication method. One of such technology being used for image authentication is the trustworthy digital camera. Medical application We can use digital watermarking for printing name of patient on X-ray reports and MRI scans. This plays an important role in treatment offered to the patient because if there is a mix up in the reports of two patients, this could lead to a disaster. Tamper detection By embedding fragile watermarking, digital data can be detected for tampering. If the fragile watermarking got degraded, it indicates the presence of tampering and hence the digital content cannot be trusted. Such type of watermarking can be used to authenticate the content. It is also useful in court of law where digital images could be used as a forensic tool to prove whether the image is tampered or not. Digital finger printing Fingerprints are unique to the owner of digital content. It is the characteristic of an object that tend to distinguish it from other small objects. Hence a single digital object can have different fingerprints because they belong to different users. As in the applications of copyright protection, the watermark for finger printing is used to trace authorized users who violate the license agreement and distribute the copyrighted material illegally. 7. CONCLUSION In this paper, we tend to surveyed the varied aspects for digital watermarking techniques and its applications. A quick and comparative analysis of watermarking technique is additionally given which may facilitate within the new researches in connected areas. We tend to also classified the watermarking algorithms based on spatial and transform domain. Because of area limitation we tend to could not cover enough technical details however we have tried to be as possible.
  • 8. Indo-Iranian Journal of Scientific Research (IIJSR) (Peer Reviewed Quarterly International Journal) Volume 2, Issue 4, Pages 79-86, Oct-Dec 2018 86 | P a g e ISSN: 2581-4362 Website: www.iijsr.com REFERENCES [1] Jiang Xuehua,-Digital Watermarking and Its Application in Image Copyright Protection, 2010 International Conference on Intelligent Computation Technology and Automation. [2] S. S. Gonge and J. W. Bakal, โ€œRobust Digital Watermarking Techniques by Using DCT and Spread Spectrumโ€, International Journal of Electrical, Electronics and Data Communication, ISSN: 2320-2084, vol. 1, no. 2, (2013). [3] N. Chandrakar and J. Baggaa,"Performance Comparison of Digital Image Watermarking Techniques: A Survey", International Journal of computer Application Technology and Research, vol. 2, no. 2, (2013), pp. 126-130. [4] Singh, Surya Pratap, Paresh Rawat, and Sudhir Agrawal "A robust watermarking approach using DCT-DWT." International Journal of Emerging Technology and Advanced Engineering (ISSN 2250-2459, Volume 2, Issue 8 (2012). [5] Anil Lamba, "Uses Of Cluster Computing Techniques To Perform Big Data Analytics For Smart Grid Automation System", International Journal for Technological Research in Engineering, Volume 1 Issue 7, pp.5804-5808, 2014. [6] Anil Lamba, โ€œUses Of Different Cyber Security Service To Prevent Attack On Smart Home Infrastructure", International Journal for Technological Research in Engineering, Volume 1, Issue 11, pp.5809-5813, 2014. [7] Anil Lamba, "A Role Of Data Mining Analysis To Identify Suspicious Activity Alert Systemโ€, International Journal for Technological Research in Engineering, Volume 2 Issue 3, pp.5814-5825, 2014. [8] Anil Lamba, "To Classify Cyber-Security Threats In Automotive Doming Using Different Assessment Methodologiesโ€, International Journal for Technological Research in Engineering, Volume 3, Issue 3, pp.5831-5836, 2015. [9] Anil Lamba, โ€œA Study Paper On Security Related Issue Before Adopting Cloud Computing Service Modelโ€, International Journal for Technological Research in Engineering, Volume 3, Issue 4, pp.5837-5840, 2015. [10] Anil Lamba, "Uses Of Artificial Intelligent Techniques To Build Accurate Models For Intrusion Detection Systemโ€, International Journal for Technological Research in Engineering, Volume 2, Issue 12, pp.5826-5830, 2015. [11] Reddy, R., M. V. N. Prasad, and D. S. Rao. "Robust Digital Watermarking of Images using Wavelets." International Journal of Computer and Electrical Engineering, vol.1, no.2, pp.1793-8163, 2009. [12] Mei Jiansheng, Li Sukang, โ€œA Digital Watermarking Algorithm Based On DCT and DWTโ€, Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISAโ€™09) Nanchang, P. R. China, May 22-24, 2009, pp. 104-107. [13] Sang, Jun, and Mohammad S. Alam. "Fragility and robustness of binary-phase-only-filter-based fragile/semifragile digital image watermarking." Instrumentation and Measurement, IEEE Transactions , vol. 57, no.3, pp. 595-606, 2008. [14] Li, Q., and Cox, I.J, โ€œUsing perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarkingโ€, IEEE Transaction on Information Forensics and Security, Vol.2, no.2,2007, pp.127โ€“139. [15] Anil Lamba, "Mitigating Zero-Day Attacks In IOT Using A Strategic Framework", International Journal for Technological Research in Engineering, Volume 4, Issue 1, pp.5711-5714, 2016. [16] Anil Lamba, "Identifying & Mitigating Cyber Security Threats In Vehicular Technologies", International Journal for Technological Research in Engineering, Volume 3, Issue 7, pp.5703-5706, 2016. [17] Anil Lamba, "S4: A Novel & Secure Method For Enforcing Privacy In Cloud Data Warehouses", International Journal for Technological Research in Engineering, Volume 3, Issue 8, pp.5707-5710, 2016. [18] Anil Lamba, โ€œCyber Attack Prevention Using VAPT Tools (Vulnerability Assessment & Penetration Testing)โ€, Cikitusi Journal for Multidisciplinary Research, Volume 1, Issue 2, July - December, pp.64-71, 2014. [19] Anil Lamba, โ€œA Through Analysis on Protecting Cyber Threats and Attacks on CPS Embedded Subsystemsโ€, International Journal of Current Engineering and Scientific Research (IJCESR), Volume-1, Issue-3, pp.48-55, 2014. [20] Anil Lamba, โ€œAnalysing Sanitization Technique of Reverse Proxy Framework for Enhancing Database-Securityโ€, International Journal of Information and Computing Science, Volume 1, Issue 1, pp.30-44, 2014. [21] Anil Lamba, โ€œEnhancing Awareness of Cyber-Security and Cloud Computing using Principles of Game Theoryโ€, International Journal of Advanced in Management, Technology and Engineering Sciences, Volume III, Issue I, pp.71-82, 2013. [22] Anil Lamba, โ€œResolve Security Policies Conflicts Through Semantics Matching Alignmentโ€, International Journal of Scientific Research and Review, Volume 2, Issue 2, pp.43-58, 2013. [23] Anil Lamba, โ€œA Detailed Analysis of Data Security in a cloud Environmentโ€, SURAJ PUNJ Journal for Multidisciplinary Research, Volume 3, Issue 2, pp.43-51, 2013. [24] Ganic, E and Eskicioglu, AM, โ€œRobust DWT-SVD domain image watermarking: embedding data in all frequenciesโ€, In Proceedings of the ACM Multimedia and Security Workshop, 2004, pp. 166-174. [25] Suhail, M.A.,and Obaidat, M. S., โ€œDigital watermarking-based DCT and JPEG modelโ€, IEEE Transaction on Instrumentation and Measurement, Vol.52, no.5, 2003, pp.1640โ€“1647.