SlideShare a Scribd company logo
1 of 9
Download to read offline
Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 534
e-ISSN: 2349-9745
p-ISSN: 2393-8161
A Survey on Features Combination for Image Watermarking
Dhiraj Singh Kushwah1
, Pragyesh Kumar Agrawal2
1
Research Scholor, Atal Bihari Vajpayi Hindi Vishwavidyala, Bhopal
2
Professor of Physics, Sarojini Naidu Govt. Girls P.G. College, Bhopal
Abstract - As the internet users are increasing day by day it is easy to transfer digital data. By this new
problem of data piracy is increasing. For this different methods of watermarking are developed for
protecting the digital data like video, audio, image, etc. Out of these many researcher are working on
image watermarking field from last few decades. This paper focus on the image watermarking features
combination with various techniques which are broadly categorized into spatial and frequency domain.
Many features are studied with their different requirement and functionality. It has been observed that
most of the researcher combines many features for achieving the prior goal of the watermark that is to
embed watermark and extract from the carrier image in presence of different attack.
Keywords - Digital Watermarking, Frequency domain, DWT, LSB, Attack.
I. INTRODUCTION
With the increase in the digital electronics era most of the work get easy, one of them is transferring of
data. But this technology gives rise to new problem of piracy or in other words proprietary get easily
stolen. To overcome this problem different techniques are used for preserving the proprietary of the
owner, one of such digital approach is watermarking which is a subsection of hiding information that is
used to put some information in the original image which will specify the originality of the digital data
[1, 2]. One of the basic causes of the copyright issue is the ease available of the internet and some
software that can modify the content as per the user requirement.
Watermark is a kind of digital data in form of text or image which can be stored in the original signal.
This text or image acts as the owner signature in the data so that pirated and original data can be easily
classified. As the pirated data do not have the original watermark that may be in the form of text or
image. Now watermarking technique is broadly classified into two fields first is visible watermarking
while other is invisible watermarking. Example of visible watermarking in figure 1 and 2 is the digital
page containing logo, T.V. channel containing logo of their channel.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 535
Figure1. Example of visible watermark in digital page Figure 2. Example of visible watermark in video
Most of the watermarking techniques focus on the invisible watermarking [3, 4]. As embedding the
watermark into the digital data is quite tough and challenging, although it is done by different methods.
This paper focuses on the digital image invisible watermarking techniques. Watermarking process is
done in two steps, first is embedding and other is extraction. In case of embedding digital watermark is
hidden in the original data, such that visibility of the watermark by naked eyes is not possible. In case of
extraction watermark should be successfully retrieved from the received data without any loss of
information of the original data as well as watermark. Here as the network data get affected by different
type of attacks so algorithm should be robust enough against those attacks [11]. So the quality of
watermarking algorithm depends on the embedding and extraction of watermark in presence of different
attacks.
II. LITERATURE SURVEY
In [7] watermark information is hidden in the edge portion of the image, and for finding the exact edge
pixels in the image this paper adopts DAM and BCV technique. The Whole work is done for the binary
image only as the DAM is based on the binary image. So here in this method image has to be in binary
form and watermark information is also in binary format. With this limitation it is found that robustness
of the algorithm is quite good against different attacks of noise, filter.
In [8] the extension of the paper [7] is done where hiding is done at the edge region only using same
technique of DAM and BCV but here edge selecting region is increased by searching surrounding region
of the evaluating pixel. It has shown in the result that with this new approach robustness increases and
the watermark information can be increase in the original image.
In [10] new concept is developed by the paper which is termed as content reconstruction using self
embedding, here watermark image is embedded in the original image using a fountain coding algorithm,
where multiple packets are designed for the network. So if some of the packet gets corrupt by the attack
then rest of the packets are use for regenerating the original watermark. As this method cover different
attacks on the image and recover watermark in original condition up to few level of attack. One problem
is that after embedding image get transformed in fountain codes packet, but embedded image is not
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 536
available for the user to display and it get reconstruct into original only by decoding the fountain codes.
So this algorithm is beneficial for data transferring purpose only.
In [13] instead of embedding the external watermark image, the original image is so utilized in the
algorithm that it will generate its own watermark bits for the image. This paper focus on the image
expansion where spatial domain is used for embedding and supporting information is stored for the
image which is required during extraction. Robustness of the image is done against compression attack
and scaling is also covered. But to cover both intra-codeblock and inter-codeblock method is utilized.
In [16] during embedding the algorithm uses DWT technique and modulus method for the pixel position
selection. At the extraction end embedded image with some supporting information is supplied for
generating the original image and watermark bits. This recovery of original watermark is reversible
watermarking scheme.
In [14] carrier image is reverse into original matrix with the use of the Linear Prediction technique and
error threshold value where watermark is embedded in the carrier image in those pixel positions only
which have error in a fix range where other pixel are edited so that overall change in pixel values is
always out of threshold range. This addition of noise will increase the robustness of the image against
various attacks.
In [12] spatial common technique is used for the watermarking, here image is divide into Red, Green
and Blue matrix then whole embedding is done at the Blue matrix of the image where some of the
LSB’s are replaced by the watermark bits while rest of the MSB’s remain same. It has observed that
image quality has not affected by the embedding of watermark. This paper work is robust against
compression attack as it most affects the MSB’s while LSB’s remain unaffected during attack.
In [18] a new technique is introduced that is “visible watermark”. Here the proprietorship is identified
directly while image information remains same. It is robust enough such that any attempt of attack will
present the watermark in same condition and removing of watermark will change whole image. But here
image watermark can be easily copy and other can also use the same for their fake data.
In [22] introduction of the new technique that is image tagging, is done which enforce copyright,
counterfeit access and controlled access. While complete description of the work is not explained but
this concept gives dynamic direction for the image watermarking.
In [15] an electronic watermarking is done for the textual document, in form of word or line shifting.
Here a secret key is distributed among different users for the extraction of the embedded text data. This
can be applied on non-ascii text representation, and not to images.
In [20] a definition for the invisible watermarking is specified which are required for the embedding of
image. There should be a proper place for the watermark which can be replaced by the watermark
information. The embedding and extraction method is based on the secret key so that common method is
used by the different users. Such as DWT are the collection of a specific class of pixel value and depend
on the requirement particular class is utilized.
III. PROBLEM IDENTIFICATION
As the authentication of digital data is major problem and to resolve it watermarking technique is
evolved where different methods or algorithms are developed for the same. One of the major focuses of
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 537
the watermarking algorithm is retrieving of the watermark from the carrier image but the carrier image is
not recovered in the algorithms so this is the major problem this is solved by few of the researcher who
name it as a reversible watermark.
One more issue in the watermarking is the developing of the algorithm that will not only embed the
image but also maintain the originality or the quality of the carrier signal [13, 10]. So the embedding
method should be perfect enough that image will show the approx similarity as previous.
In [14] reversible watermarking scheme is developed, but the work focus only on the reversibility of the
watermark while that work is not robust against the various attack this is the major drawback of the
work. Although it has shown its superiority against various existing algorithms such as median edge
detector, gradient-adjusted predictor or the simple rhombus neighborhood. So the work need to be done
in this field that will regenerate the watermark as well as the carrier image with a minimum loss of the
signal under various attacks such as addition of noise in the embedded image, or passing image from the
different filter, or compression of the image, cropping of the image.
Few more flexibility for the system need to develop that is the amount of data to be inserted into the
image should be control by the algorithm as most of the work focus on the embedding and that is totally
depends on the type of image but, if the same image can be used for transferring the different amount of
data then it is not always possible. This is a kind of limitation of the field which should be removed.
IV. FEATURES FOR WATERMARKING
As Image is a collection or sequence of pixel and each pixel is treated as single value which is a kind of
cell in a matrix. In order to identify an object in that image some features need to be maintained as
different object have different feature to identify them which are explained as follows:
4.1. Color Feature: Image is a matrix of light intensity values, these intensity values represent different
kind of color. So to identify an object color is an important feature, one important property of this
feature is low computational cost. Different Image files available in different color formats like images
have different color format ranging from RGB which stands for red, green, and blue. This is a three
dimensional representation of a single image in which two dimensional matrix represents single color
and collection of those matrices tends to the third dimension. In order to make the intensity calculation
for each pixel gray format is used, which is a two dimension values range from 0 to 255. In case of
binary format which is a black and white color matrix, whose values are only 0 or 1. With the help of
this color feature face has been detected efficiently in [8, 19].
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 538
Figure 3. Represent the HSV (Hue, Saturation value) format of an image
4.2. Edge Feature: As image is a collection of intensity values, and with the sudden change in the
values of an image one important feature arises as the Edge as shown in figure 4. This feature is used
for different type of image object detection such as building on a scene, roads, etc [5, 6]. There are
many algorithms has been developed to effectively point out all the images of the image or frames,
which are Sobel, perwitt, canny, etc. out of these algorithm canny edge detection is one of the best
algorithm to find all possible boundaries of an image, this is shown in figure 4.
Figure 4. Represent the Edge feature of an image
4.3. Texture Feature: Texture is a degree of intensity difference of a surface which enumerates
properties such as regularity and smoothness. Compared to color space model, texture requires a
processing step. The texture features on the basis of color are less sensitive to illumination changes as
same as to edge features.
4.4. Corner Feature: In order to stabilize the video frames in case of moving camera it require the
difference between the two frames which are point out by the corner feature in the image or frame. So
by finding the corner position of the two frames, one can detect resize the window in original view [21].
This feature is also used to find the angles as well as the distance between the object of the two different
frames. As they represent points in the image so it is used to track the target object.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 539
Figure 5. Represent the corner feature of an image with green point
V. CONCLUSION
In order to provide invisible image watermarking this paper provides a detailed literature survey for the
different approaches follow by the various researchers. It has been observed that during extraction
watermark is the main focus of most of the researcher, but few of them work on original image as well,
but reverse process of both watermark and original image is not done by any. A Watermark is mainly
compared on the basis of the attack but most of the paper work on the spatial attack and show effective
results in various attacks with different levels. Concentration on the geometric attack is very less and not
done by most of the papers. So strength and weakness of the different papers, features, and techniques
are well discussed in the paper. A unique algorithm is still required, which focus on both watermark and
original image with high robustness against spatial as well as geometric attacks.
REFERENCES
[1] Hanieh Khalilian, Student Member, IEEE, and Ivan V. Bajic, “Video Watermarking with Empirical PCA-Based
Decoding”, IEEE Transactions On Image Processing, Vol. 22, No. 12, Dec 2013.
[2] Walter Godoy Jr., Charles Way Hun Fung, “A novel DWT-SVD Video Watermarking Scheme using Side View”,
IEEE Signal Processing and Communication Systems (ICSPCS), 5th International Conference, pp. 1-4, Dec 2011.
[3] Tamanna Tabassum, S.M. Mohidul Islam, “A Digital Image Watermarking Technique Based on Identical Frame
Extraction in 3-Level DWT”, Vol. 13, no. 7, pp. 560 –576, July 2003.
[4] Frank Hartung, Jonathan K. Su, and Bernd Girod, “Spread Spectrum Watermarking: Malicious Attacks and
Counterattacks”, International Journal of Research in Engineering and Technology, eISSN: 2319-1163 | pISSN: 2321-
7308, Jan 1999.
[5] CHAPTER 2, “Wavelet Transforms on Images”, sundoc.bibliothek.uni-halle.de/diss-online/02/03H033/t4.pdf.
[6] Priya Porwal, Tanvi Ghag, Nikita Poddar, Ankita Tawde, “Digital Video Watermarking using Modified LSB and DCT
Technique”, International Journal of Research in Engineering and Technology, Vol. 3, Issue 4, Apr 2014.
[7] Kazuki Yamato, Madoka Hasegawa, Yuichi Tanaka‡ and Shigeo Kato, “Digital Image Watermarking Method Using
Between-Class Variance”, IEEE Image Processing (ICIP), 19th IEEE International Conference, 2012.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 540
[8] Ashwary Rajpoot, Ranjana Batham, Navin Chourasia, “Spatial Domain base Image Watermarking by Edge Feature”,
IJCSEC- International Journal of Computer Science and Engineering Communications, Vol.2, Issue 5, Oct 2014.
[9] Mohan A Chimanna, S.R.Khot, “Digital Video Watermarking Techniques for Secure Multimedia Creation and
Delivery”, Vol. 3, Issue 2, pp.839-844, March-April 2013.
[10] Paweł Korus, Student Member, IEEE, and Andrzej Dziech, “Efficient Method for Content Reconstruction with Self-
Embedding”, IEEE Transactions On Image Processing, Vol. 22, No. 3, March 2013.
[11] J. Zhao and E. Koch, “Embedding Robust Labels into Images For Copyright Protection”, In: Proc. of the Int. Congress
on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Vienna, August 1995.
[12] L. M. Vargas and E. Vera, “An Implementation of Reversible Watermarking for Still Images”, IEEE Latin America
Transactions, Vol. 11, No. 1, Feb 2013.
[13] Angela Piper, Reihaneh Safavi-Naini, “Scalable Fragile Watermarking for Image Authentication”, IET Information
Security, Vol. 7, Issue 4, pp. 300–311, Dec 2013.
[14] Ioan-Catalin Dragoi, Member, IEEE, and Dinu Coltuc, “Local-Prediction-Based Difference Expansion Reversible
Watermarking”, IEE Transactions on Image Processing, Vol. 23, No. 4, April 2014.
[15] J. Brassil ans S. Low, N. Maxemchuck, and L. O’Gorman, “Electronic Marking and Identification Techniques to
Discourage Document Copying”, In IEEE INFOCOM’94 - Networking for global communications, 1994.
[16] F.M. Boland, J.J.K. O’ Ruanaidh, and C. Dautzenberg, “Watermarking Digital Images for Copyright Protection”,
Image Processing And Its Applications, pp. 326–330, July 1995.
[17] D. Boneh and J. Shaw, “Collusion-Secure Fingerprinting for Digital Data”, In D. Coppersmith, editor, CRYPTO 95,
number 963 in Lecture Notes in Computer Science, pages 452–564, Springer, 1995.
[18] G. W. Braudaway, K. A. Magerlein, and F. Mintzer, “Protecting Publicly-Available Images with a Visible Image
Watermark”, Technical Report RC 20336 (89918) 1/15/96, IBM Research Division, 1996.
[19] Bender, W., Gruhl, D., Morimoto, N. and Lu, A, “Techniques for Data Hiding”, IBM Systems Journal, Vol. 35, Issue
3.4, 1996.
[20] E. Koch and J. Zhao, “Towards Robust and Hidden Image Copyright Labeling”, In Proc. of 1995, IEEE Workshop on
Nonlinear Signal and Image Processing, 1995.
[21] B. Pfitzmann and M. Schunter, “Asymmetric Fingerprinting”, In U. Maurer, editor, EUROCRYPT 96, number 1070 in
Lecture Notes in Computer Science, pages 84–95. Springer, 1996.
[22] R.G. Van Schyndel, A.Z. Tirkel, and C.F. Osborne, “Towards a Robust Digital Watermark”, In S.Z. Li, D.P. Mital,
E.K. Teoh, and H.Wan, editors, ACCV’95, Second Asian Conference on Computer Vision, number 1035 in Lecture
Notes in Computer Science, pages 504–508. Springer, 1995.
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking

More Related Content

What's hot

A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...prjpublications
 
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...cscpconf
 
Realtime Energy Efficient Digital Image Watermarking on Mobile Devices using ...
Realtime Energy Efficient Digital Image Watermarking on Mobile Devices using ...Realtime Energy Efficient Digital Image Watermarking on Mobile Devices using ...
Realtime Energy Efficient Digital Image Watermarking on Mobile Devices using ...CSCJournals
 
Comparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator ApproachComparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator Approachijsrd.com
 
A130104
A130104A130104
A130104irjes
 
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET Journal
 
Copyright protection for images on android phones
Copyright protection for images on android phonesCopyright protection for images on android phones
Copyright protection for images on android phoneseSAT Publishing House
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarkingijceronline
 
Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image WatermarkingIJERA Editor
 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesEditor IJMTER
 
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...IJERA Editor
 
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &IAEME Publication
 
Towards Optimal Copyright Protection Using Neural Networks Based Digital Imag...
Towards Optimal Copyright Protection Using Neural Networks Based Digital Imag...Towards Optimal Copyright Protection Using Neural Networks Based Digital Imag...
Towards Optimal Copyright Protection Using Neural Networks Based Digital Imag...rahulmonikasharma
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
 
Digital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyDigital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyinventionjournals
 
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...P singh
 

What's hot (18)

A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
 
50120140506015
5012014050601550120140506015
50120140506015
 
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
 
Realtime Energy Efficient Digital Image Watermarking on Mobile Devices using ...
Realtime Energy Efficient Digital Image Watermarking on Mobile Devices using ...Realtime Energy Efficient Digital Image Watermarking on Mobile Devices using ...
Realtime Energy Efficient Digital Image Watermarking on Mobile Devices using ...
 
Comparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator ApproachComparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator Approach
 
A130104
A130104A130104
A130104
 
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
 
Copyright protection for images on android phones
Copyright protection for images on android phonesCopyright protection for images on android phones
Copyright protection for images on android phones
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarking
 
Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image Watermarking
 
1674 1677
1674 16771674 1677
1674 1677
 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniques
 
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
 
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &
 
Towards Optimal Copyright Protection Using Neural Networks Based Digital Imag...
Towards Optimal Copyright Protection Using Neural Networks Based Digital Imag...Towards Optimal Copyright Protection Using Neural Networks Based Digital Imag...
Towards Optimal Copyright Protection Using Neural Networks Based Digital Imag...
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
 
Digital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyDigital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptography
 
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
 

Similar to A Survey on Features Combination for Image Watermarking

IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET Journal
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessIRJET Journal
 
A Review of Digital Watermarking Technique for the Copyright Protection of Di...
A Review of Digital Watermarking Technique for the Copyright Protection of Di...A Review of Digital Watermarking Technique for the Copyright Protection of Di...
A Review of Digital Watermarking Technique for the Copyright Protection of Di...IRJET Journal
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarkingijsrd.com
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))IAESIJEECS
 
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...IRJET Journal
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...IRJET Journal
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
Digital Image Watermarking Using Different Levels of Intermediate Significant...
Digital Image Watermarking Using Different Levels of Intermediate Significant...Digital Image Watermarking Using Different Levels of Intermediate Significant...
Digital Image Watermarking Using Different Levels of Intermediate Significant...CSCJournals
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET Journal
 

Similar to A Survey on Features Combination for Image Watermarking (20)

IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
A Review of Digital Watermarking Technique for the Copyright Protection of Di...
A Review of Digital Watermarking Technique for the Copyright Protection of Di...A Review of Digital Watermarking Technique for the Copyright Protection of Di...
A Review of Digital Watermarking Technique for the Copyright Protection of Di...
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarking
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
50120130406038
5012013040603850120130406038
50120130406038
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
Digital Image Watermarking Using Different Levels of Intermediate Significant...
Digital Image Watermarking Using Different Levels of Intermediate Significant...Digital Image Watermarking Using Different Levels of Intermediate Significant...
Digital Image Watermarking Using Different Levels of Intermediate Significant...
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
 

More from Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetEditor IJMTER
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSEditor IJMTER
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
 

More from Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 

A Survey on Features Combination for Image Watermarking

  • 1. Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com @IJMTER-2014, All rights Reserved 534 e-ISSN: 2349-9745 p-ISSN: 2393-8161 A Survey on Features Combination for Image Watermarking Dhiraj Singh Kushwah1 , Pragyesh Kumar Agrawal2 1 Research Scholor, Atal Bihari Vajpayi Hindi Vishwavidyala, Bhopal 2 Professor of Physics, Sarojini Naidu Govt. Girls P.G. College, Bhopal Abstract - As the internet users are increasing day by day it is easy to transfer digital data. By this new problem of data piracy is increasing. For this different methods of watermarking are developed for protecting the digital data like video, audio, image, etc. Out of these many researcher are working on image watermarking field from last few decades. This paper focus on the image watermarking features combination with various techniques which are broadly categorized into spatial and frequency domain. Many features are studied with their different requirement and functionality. It has been observed that most of the researcher combines many features for achieving the prior goal of the watermark that is to embed watermark and extract from the carrier image in presence of different attack. Keywords - Digital Watermarking, Frequency domain, DWT, LSB, Attack. I. INTRODUCTION With the increase in the digital electronics era most of the work get easy, one of them is transferring of data. But this technology gives rise to new problem of piracy or in other words proprietary get easily stolen. To overcome this problem different techniques are used for preserving the proprietary of the owner, one of such digital approach is watermarking which is a subsection of hiding information that is used to put some information in the original image which will specify the originality of the digital data [1, 2]. One of the basic causes of the copyright issue is the ease available of the internet and some software that can modify the content as per the user requirement. Watermark is a kind of digital data in form of text or image which can be stored in the original signal. This text or image acts as the owner signature in the data so that pirated and original data can be easily classified. As the pirated data do not have the original watermark that may be in the form of text or image. Now watermarking technique is broadly classified into two fields first is visible watermarking while other is invisible watermarking. Example of visible watermarking in figure 1 and 2 is the digital page containing logo, T.V. channel containing logo of their channel.
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 535 Figure1. Example of visible watermark in digital page Figure 2. Example of visible watermark in video Most of the watermarking techniques focus on the invisible watermarking [3, 4]. As embedding the watermark into the digital data is quite tough and challenging, although it is done by different methods. This paper focuses on the digital image invisible watermarking techniques. Watermarking process is done in two steps, first is embedding and other is extraction. In case of embedding digital watermark is hidden in the original data, such that visibility of the watermark by naked eyes is not possible. In case of extraction watermark should be successfully retrieved from the received data without any loss of information of the original data as well as watermark. Here as the network data get affected by different type of attacks so algorithm should be robust enough against those attacks [11]. So the quality of watermarking algorithm depends on the embedding and extraction of watermark in presence of different attacks. II. LITERATURE SURVEY In [7] watermark information is hidden in the edge portion of the image, and for finding the exact edge pixels in the image this paper adopts DAM and BCV technique. The Whole work is done for the binary image only as the DAM is based on the binary image. So here in this method image has to be in binary form and watermark information is also in binary format. With this limitation it is found that robustness of the algorithm is quite good against different attacks of noise, filter. In [8] the extension of the paper [7] is done where hiding is done at the edge region only using same technique of DAM and BCV but here edge selecting region is increased by searching surrounding region of the evaluating pixel. It has shown in the result that with this new approach robustness increases and the watermark information can be increase in the original image. In [10] new concept is developed by the paper which is termed as content reconstruction using self embedding, here watermark image is embedded in the original image using a fountain coding algorithm, where multiple packets are designed for the network. So if some of the packet gets corrupt by the attack then rest of the packets are use for regenerating the original watermark. As this method cover different attacks on the image and recover watermark in original condition up to few level of attack. One problem is that after embedding image get transformed in fountain codes packet, but embedded image is not
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 536 available for the user to display and it get reconstruct into original only by decoding the fountain codes. So this algorithm is beneficial for data transferring purpose only. In [13] instead of embedding the external watermark image, the original image is so utilized in the algorithm that it will generate its own watermark bits for the image. This paper focus on the image expansion where spatial domain is used for embedding and supporting information is stored for the image which is required during extraction. Robustness of the image is done against compression attack and scaling is also covered. But to cover both intra-codeblock and inter-codeblock method is utilized. In [16] during embedding the algorithm uses DWT technique and modulus method for the pixel position selection. At the extraction end embedded image with some supporting information is supplied for generating the original image and watermark bits. This recovery of original watermark is reversible watermarking scheme. In [14] carrier image is reverse into original matrix with the use of the Linear Prediction technique and error threshold value where watermark is embedded in the carrier image in those pixel positions only which have error in a fix range where other pixel are edited so that overall change in pixel values is always out of threshold range. This addition of noise will increase the robustness of the image against various attacks. In [12] spatial common technique is used for the watermarking, here image is divide into Red, Green and Blue matrix then whole embedding is done at the Blue matrix of the image where some of the LSB’s are replaced by the watermark bits while rest of the MSB’s remain same. It has observed that image quality has not affected by the embedding of watermark. This paper work is robust against compression attack as it most affects the MSB’s while LSB’s remain unaffected during attack. In [18] a new technique is introduced that is “visible watermark”. Here the proprietorship is identified directly while image information remains same. It is robust enough such that any attempt of attack will present the watermark in same condition and removing of watermark will change whole image. But here image watermark can be easily copy and other can also use the same for their fake data. In [22] introduction of the new technique that is image tagging, is done which enforce copyright, counterfeit access and controlled access. While complete description of the work is not explained but this concept gives dynamic direction for the image watermarking. In [15] an electronic watermarking is done for the textual document, in form of word or line shifting. Here a secret key is distributed among different users for the extraction of the embedded text data. This can be applied on non-ascii text representation, and not to images. In [20] a definition for the invisible watermarking is specified which are required for the embedding of image. There should be a proper place for the watermark which can be replaced by the watermark information. The embedding and extraction method is based on the secret key so that common method is used by the different users. Such as DWT are the collection of a specific class of pixel value and depend on the requirement particular class is utilized. III. PROBLEM IDENTIFICATION As the authentication of digital data is major problem and to resolve it watermarking technique is evolved where different methods or algorithms are developed for the same. One of the major focuses of
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 537 the watermarking algorithm is retrieving of the watermark from the carrier image but the carrier image is not recovered in the algorithms so this is the major problem this is solved by few of the researcher who name it as a reversible watermark. One more issue in the watermarking is the developing of the algorithm that will not only embed the image but also maintain the originality or the quality of the carrier signal [13, 10]. So the embedding method should be perfect enough that image will show the approx similarity as previous. In [14] reversible watermarking scheme is developed, but the work focus only on the reversibility of the watermark while that work is not robust against the various attack this is the major drawback of the work. Although it has shown its superiority against various existing algorithms such as median edge detector, gradient-adjusted predictor or the simple rhombus neighborhood. So the work need to be done in this field that will regenerate the watermark as well as the carrier image with a minimum loss of the signal under various attacks such as addition of noise in the embedded image, or passing image from the different filter, or compression of the image, cropping of the image. Few more flexibility for the system need to develop that is the amount of data to be inserted into the image should be control by the algorithm as most of the work focus on the embedding and that is totally depends on the type of image but, if the same image can be used for transferring the different amount of data then it is not always possible. This is a kind of limitation of the field which should be removed. IV. FEATURES FOR WATERMARKING As Image is a collection or sequence of pixel and each pixel is treated as single value which is a kind of cell in a matrix. In order to identify an object in that image some features need to be maintained as different object have different feature to identify them which are explained as follows: 4.1. Color Feature: Image is a matrix of light intensity values, these intensity values represent different kind of color. So to identify an object color is an important feature, one important property of this feature is low computational cost. Different Image files available in different color formats like images have different color format ranging from RGB which stands for red, green, and blue. This is a three dimensional representation of a single image in which two dimensional matrix represents single color and collection of those matrices tends to the third dimension. In order to make the intensity calculation for each pixel gray format is used, which is a two dimension values range from 0 to 255. In case of binary format which is a black and white color matrix, whose values are only 0 or 1. With the help of this color feature face has been detected efficiently in [8, 19].
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 538 Figure 3. Represent the HSV (Hue, Saturation value) format of an image 4.2. Edge Feature: As image is a collection of intensity values, and with the sudden change in the values of an image one important feature arises as the Edge as shown in figure 4. This feature is used for different type of image object detection such as building on a scene, roads, etc [5, 6]. There are many algorithms has been developed to effectively point out all the images of the image or frames, which are Sobel, perwitt, canny, etc. out of these algorithm canny edge detection is one of the best algorithm to find all possible boundaries of an image, this is shown in figure 4. Figure 4. Represent the Edge feature of an image 4.3. Texture Feature: Texture is a degree of intensity difference of a surface which enumerates properties such as regularity and smoothness. Compared to color space model, texture requires a processing step. The texture features on the basis of color are less sensitive to illumination changes as same as to edge features. 4.4. Corner Feature: In order to stabilize the video frames in case of moving camera it require the difference between the two frames which are point out by the corner feature in the image or frame. So by finding the corner position of the two frames, one can detect resize the window in original view [21]. This feature is also used to find the angles as well as the distance between the object of the two different frames. As they represent points in the image so it is used to track the target object.
  • 6. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 539 Figure 5. Represent the corner feature of an image with green point V. CONCLUSION In order to provide invisible image watermarking this paper provides a detailed literature survey for the different approaches follow by the various researchers. It has been observed that during extraction watermark is the main focus of most of the researcher, but few of them work on original image as well, but reverse process of both watermark and original image is not done by any. A Watermark is mainly compared on the basis of the attack but most of the paper work on the spatial attack and show effective results in various attacks with different levels. Concentration on the geometric attack is very less and not done by most of the papers. So strength and weakness of the different papers, features, and techniques are well discussed in the paper. A unique algorithm is still required, which focus on both watermark and original image with high robustness against spatial as well as geometric attacks. REFERENCES [1] Hanieh Khalilian, Student Member, IEEE, and Ivan V. Bajic, “Video Watermarking with Empirical PCA-Based Decoding”, IEEE Transactions On Image Processing, Vol. 22, No. 12, Dec 2013. [2] Walter Godoy Jr., Charles Way Hun Fung, “A novel DWT-SVD Video Watermarking Scheme using Side View”, IEEE Signal Processing and Communication Systems (ICSPCS), 5th International Conference, pp. 1-4, Dec 2011. [3] Tamanna Tabassum, S.M. Mohidul Islam, “A Digital Image Watermarking Technique Based on Identical Frame Extraction in 3-Level DWT”, Vol. 13, no. 7, pp. 560 –576, July 2003. [4] Frank Hartung, Jonathan K. Su, and Bernd Girod, “Spread Spectrum Watermarking: Malicious Attacks and Counterattacks”, International Journal of Research in Engineering and Technology, eISSN: 2319-1163 | pISSN: 2321- 7308, Jan 1999. [5] CHAPTER 2, “Wavelet Transforms on Images”, sundoc.bibliothek.uni-halle.de/diss-online/02/03H033/t4.pdf. [6] Priya Porwal, Tanvi Ghag, Nikita Poddar, Ankita Tawde, “Digital Video Watermarking using Modified LSB and DCT Technique”, International Journal of Research in Engineering and Technology, Vol. 3, Issue 4, Apr 2014. [7] Kazuki Yamato, Madoka Hasegawa, Yuichi Tanaka‡ and Shigeo Kato, “Digital Image Watermarking Method Using Between-Class Variance”, IEEE Image Processing (ICIP), 19th IEEE International Conference, 2012.
  • 7. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 540 [8] Ashwary Rajpoot, Ranjana Batham, Navin Chourasia, “Spatial Domain base Image Watermarking by Edge Feature”, IJCSEC- International Journal of Computer Science and Engineering Communications, Vol.2, Issue 5, Oct 2014. [9] Mohan A Chimanna, S.R.Khot, “Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery”, Vol. 3, Issue 2, pp.839-844, March-April 2013. [10] Paweł Korus, Student Member, IEEE, and Andrzej Dziech, “Efficient Method for Content Reconstruction with Self- Embedding”, IEEE Transactions On Image Processing, Vol. 22, No. 3, March 2013. [11] J. Zhao and E. Koch, “Embedding Robust Labels into Images For Copyright Protection”, In: Proc. of the Int. Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Vienna, August 1995. [12] L. M. Vargas and E. Vera, “An Implementation of Reversible Watermarking for Still Images”, IEEE Latin America Transactions, Vol. 11, No. 1, Feb 2013. [13] Angela Piper, Reihaneh Safavi-Naini, “Scalable Fragile Watermarking for Image Authentication”, IET Information Security, Vol. 7, Issue 4, pp. 300–311, Dec 2013. [14] Ioan-Catalin Dragoi, Member, IEEE, and Dinu Coltuc, “Local-Prediction-Based Difference Expansion Reversible Watermarking”, IEE Transactions on Image Processing, Vol. 23, No. 4, April 2014. [15] J. Brassil ans S. Low, N. Maxemchuck, and L. O’Gorman, “Electronic Marking and Identification Techniques to Discourage Document Copying”, In IEEE INFOCOM’94 - Networking for global communications, 1994. [16] F.M. Boland, J.J.K. O’ Ruanaidh, and C. Dautzenberg, “Watermarking Digital Images for Copyright Protection”, Image Processing And Its Applications, pp. 326–330, July 1995. [17] D. Boneh and J. Shaw, “Collusion-Secure Fingerprinting for Digital Data”, In D. Coppersmith, editor, CRYPTO 95, number 963 in Lecture Notes in Computer Science, pages 452–564, Springer, 1995. [18] G. W. Braudaway, K. A. Magerlein, and F. Mintzer, “Protecting Publicly-Available Images with a Visible Image Watermark”, Technical Report RC 20336 (89918) 1/15/96, IBM Research Division, 1996. [19] Bender, W., Gruhl, D., Morimoto, N. and Lu, A, “Techniques for Data Hiding”, IBM Systems Journal, Vol. 35, Issue 3.4, 1996. [20] E. Koch and J. Zhao, “Towards Robust and Hidden Image Copyright Labeling”, In Proc. of 1995, IEEE Workshop on Nonlinear Signal and Image Processing, 1995. [21] B. Pfitzmann and M. Schunter, “Asymmetric Fingerprinting”, In U. Maurer, editor, EUROCRYPT 96, number 1070 in Lecture Notes in Computer Science, pages 84–95. Springer, 1996. [22] R.G. Van Schyndel, A.Z. Tirkel, and C.F. Osborne, “Towards a Robust Digital Watermark”, In S.Z. Li, D.P. Mital, E.K. Teoh, and H.Wan, editors, ACCV’95, Second Asian Conference on Computer Vision, number 1035 in Lecture Notes in Computer Science, pages 504–508. Springer, 1995.