SlideShare a Scribd company logo
1 of 6
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 212
DIGITAL WATERMARKING WITH A NEW ALGORITHM
Afroja Akter1
, Muhammad Ahsan Ullah2
1, 2
Department of Electrical and Electronic Engineering, Chittagong University of Engineering and Technology,
Chittagong, Bangladesh
Abstract
Everyday millions of data need to transmit through a distinct channel for various purposes; as a result there is a certain chance of
third person interruption on that data. In this regards digital watermarking is one of the best solution. This paper proposes a new
embedding algorithm (NEA) of digital watermarking. The algorithm is performed for digital image as data. The performance is
compared for NEA and well established Cox's modified embedding algorithm. The watermarking is based on discrete wavelet
transforms (DWT) and discrete cosine transforms (DCT). The acceptance of the new algorithm is measured by the two requirements
of digital watermarking. One is imperceptibility of the watermarked image, measured by peak signal to noise ratio (PSNR) in dB;
another one is robustness of the mark image, measured by correlation of original mark image and recovering mark image. Here a
512×512 gray scale "Lena" and "Cameraman's" image is taken as host images, and a 128×128 gray scale image is taken as mark
image for 2 level of DWT. The simulation results for different attacking conditions such as salt and pepper attack, additive white
Gaussian noise (AWGN) attack, jpg compression attack, gamma attack, histogram attack, cropping attack, sharpening attack etc.
After different attacks the changing tendency PSNR for both algorithms are similar. But the mean square error (MSE) value of NEA is
always less than Cox’s modified algorithm, which means that after embedding the changes of the host image property lower for NEA
than Cox’s algorithm. From the simulation results it can be said that NEA will be a substitute of modified Cox’s algorithm with better
performance.
Keywords: Digital watermark, DWT, DCT, Cox’s modified algorithm, Lena image, Cameraman image, AWGN, JPG, salt
and pepper attack, PSNR, correlation, MSE.
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Digital watermarking is a scheme where a secret data, it may
an image, audio or video, embedded in a host data such a way
that it remains on it as long as the perceptible quality of the
content in an acceptable level [1]. From the last decade digital
watermarking is best choice for data security. Digital
watermarking may classified as (1) blind or (2) informed. This
paper only focused on informed digital watermarking, where
the mark signal extracted using the host data. Digital
watermarking procedure mainly classified into three steps [14]
 Embedding
 Distribution
 Extraction or Detection
Embedding is the process where a secret data i.e. either an
image or an audio or video is embedded into a host data which
may an image or an audio or video, using a key. Then this
embedded data is broadcast or distributed through a lossless or
lousy channel, which is known as distribution. The third step
is depending on author, when the existence of the mark signal
can be detected using the host data with known key is known
as detection. But when the mark data is recover from the
embedded data using the known host data and key is known as
extraction. The process is shown in figure 1.
Fig 1: Digital watermarking system.
Furthermore digital watermarking is based on two techniques
 Spatial domain based [2]
 Transform domain based
The most common spatial domain based technique is least
significant bit (LSB) [2-4, 13] method. The proposed
technique is based on transform domain. Again the transform
domain based digital watermarking can be classified into
discrete wavelet transforms (DWT) [5-10, 12, 14], discrete
Cosine transforms (DCT) [5, 7, 11, 15]. Multi resolution
properties is the most important characteristics of DWT based
digital watermarking, as for the specified region can be
selected for data embedding. Every image can be divided into
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 213
two specific regions: (1) low frequency region and (2) high
frequency region, and these regions can be sub-divided in case
of DWT based digital watermarking. DCT divide the image
in three regions: (1) low frequency region, (2) mid-frequency
region and (3) high frequency region. It is easy to select a
distinct region to embed a data in case of DCT based digital
watermarking. This paper based on both of these technique,
thus it can provide better performance.
A 512×512 gray scale image is taken as host image, and a
128×128 gray scale image is taken as mark image. After 2-
level of DWT of host image the mark is embedded on a
selected sub-band. This paper considers the sub-bands from a
high frequency region of DWT, and then selects the
comparative low frequency or high co-efficient sets for DCT.
At lower level of DWT based digital watermarking it is
challenging to embed the mark image into the host image
without hampering its perception level, thus here this situation
is tested.
Acceptance of the proposed algorithm is measured by two
most important requirements of the digital watermarking. One
of them is imperceptibility of the embedded data, measured by
peak signal to noise ratio (PSNR) in dB, and remaining one is
robustness of the recovering data, measured by the correlation
of original mark data and recover data. Greater PSNR is
desired, as it means the perception level of the host image is
little bit interrupted by the mark image. And a better
correlation (maximum 100%, i.e. 1) measured that the mark
image is not interrupted by the attacks in a broadcasting
channel. Another parameter known as mean square error
(MSE) also considering. As less MSE indicates that the mark
image interrupts the host image less. i.e. less MSE is
acceptable. This paper evaluate the technique considering
different attacks like salt and pepper attack, additive white
Gaussian noise (AWGN) attack, jpg compression attack,
gamma attack, histogram attack, cropping, sharpening attack,
rotational attack etc. From simulation results it can be decided
that the new algorithm is accepted with comparing Cox's
modified algorithm even at different attack condition.
This paper is arranged as following sections; in section two
different parameters for digital watermarking are discussed.
The hybrid technique of digital watermarking is discussed in
section three. Simulation results are presented in section four.
2. PERFORMANCE MEASURE
Digital watermarking has certain requirements. To measure
these requirements different image quality metrics are used.
This paper is using peak signal to noise ratio (PSNR) to
measure the amount of visual quality degradation between
original and watermarked image. This criterion is very well
known as imperceptibility of the embedded image [7]. This
paper also measures the robustness of the mark image.
Robustness is measured by correlation of original mark image
and recovered mark image.
2.1 Peak Signal-To-Noise Ratio (PSNR)
To measure the quality of reconstruction of lossy compression
PSNR is frequently used [7, 13]. And it is the ratio of the
maximum possible power of a host image to the power of
corrupting noise that affects the fidelity of its representation. It
can define by the following equation:
2.1
Where MAX represents the maximum possible pixel value in
the host image and MSE is shows the mean square error in
embedded image.
MSE is measured from the host image and noisy
approximation of it [13]. MSE can be defined by the equation
(2.2)
2.2
Where, ),( lkf is host image and ),(' lkf is
watermarked/embedded image.
2.2 Robustness
Robustness measure the tolerance of the technique after
experiencing different attacks, it is measured for the mark
image. I.e. distributing of the embedded image through a
loosy channel how much it experiences the degradation of
mark image is measured by robustness. The measuring tool of
it is correlation of the original mark image and recover mark
image. Correlation of two images can be found from
following equation.
2.3
where w (i,j) and w’(i,j)’ are the original and extracted/recover
watermark image respectively.
3. HYBRID TECHNIQUE
This paper discusses the digital watermarking technique based
on transform domain. Most popular transform domain
techniques included: discrete wavelet transforms (DWT) and
discrete cosine transforms (DCT), separately these techniques
having some merits and demerits, but combining both of these







MSE
MAX
PSNRdB 10log20
 
2
1 1
),('),(
1
 








m
k
n
l
lkflkf
nm
MSE





















i j
avg
i j
avg
i j
avgavg
jiwjiwjiwjiw
jiwjiwjiwjiw
)}),('),('{}),(),({
}),('),('{*)},(),({
Corr.
2
.
2
.
..
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 214
can provides better performance. In this regard this paper
evaluates the new algorithm based on hybrid technique. In this
paper this hybrid digital watermarking technique is discussed
in two steps:
 Digital watermarking embedding technique.
 Digital watermarking extracting technique.
Both steps are discussed as follows:
3.1 Digital Watermarking Embedding Technique:
Using DWT a 512×512 host image (here gray scale "Lena" or
"Cameraman") is sub-divided into 4-subbands. Figure 3
represents the 1st level of DWT decomposition of host image.
Where LL, HL, LH, HH are 4 sub-bands. Here LL represents
the high scale low frequency co-efficient set, HL represents
the horizontal details of low scale high frequency set, LH
represents the vertical details of low scale high frequency set,
HH represents the diagonal details low scale high frequency
set of the host image.
Fig 2: Flow chart of the embedding procedure.
Then using 2 dimensional of DWT on HL of the host image,
2nd level decompose image can be found as shown in figure
4.
After the 2nd level decomposition of the host image then the
comparative low frequency components denote as HLLL2 is
select for 2 dimensional DCT. It is common practice to select
the mid frequency region for embedding purposes during DCT
based digital watermarking for robustness, but having chance
to degrade the perceptibility of the host image. To trade of the
imperceptibility and robustness this paper focused on the low
frequency region after 2 dimensional DCT of the host image.
Then a 128×128 gray scale image as a mark is embedded on
the selected region after enrolled a key and DCT on it. With
scaling factor 0.9 the mark image is embedded into the host
image using the new hybrid algorithm and Cox's modified
algorithm as in equation 3.1 and equation 3.2 respectively
Fig 3: 1st level DWT decomposition of "Lena" image.
Fig 4: 2nd level DWT decomposition of "Lena" image.
Fig 5: DCT region of an image
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 215
.
22
)(),(
)(),(
),(),('
mfnmf
mfnmf
wnmfnmf
avg
avg


  3.1
wnmfnmf  ),(),(' 3.2
Where f(m,n) is the host image, favg.(m) is mean value of the
host image, w is original mark image.
Here from Cox's modified algorithm it has been shown that
the mark image totally independent on host image, thus the
imperceptibility is degraded sharply when embedded or
watermarked image is experienced different attacks from
without attack condition. But from the new algorithm it is
noticed that the mark image is multiplied with the absolute
deviation of host image. Thus here degradation rate is slow.
3.2 Digital Watermarking Extraction Technique:
The extraction technique is depicts in figure 6. To extract the
mark image from the embedded or watermarked image the
original 512×512 image is used, hence this is an informed
digital watermarking technique.
Fig 6: Flowchart of extracting procedure
First of all the watermarked image is decomposed into 2-level
of DWT, then the extraction location is selected. Then DCT is
done on the selected sub-bands. Similarly the host image is
first decomposing into 2-level DWT and then DCT on the
selected sub-band. Then the mark image is extracted using the
new algorithm and Cox's modified algorithm respectively as
bellows in equation 3.3 and equation 3. 4:
)](),([
)(),()],(),('[
'
22
mfnmf
mfnmfnmfnmf
w
avg
avg




3.3

),(),('
'
nmfnmf
w

 3.4
Where w’ is recover image. Then IDCT is done on the
extracted watermark and the recover mark image is found
enrolled the secret key.
4. RESULTS
To evaluate the performance of the new algorithm and
comparative result, here 512×512 Lena image and a 512×512
Cameraman image are used while a 128×128 gray scale image
is used as mark image. For simulation considering scaling
factor is 0.9.
Fig 7: Host Lena image
Fig 8: Host Cameraman image.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 216
Table 1: PSNR, MSE and Correlation Values for Lena image
Table 2: PSNR, MSE and Correlation Values for Cameraman image
New algorithm Cox's modified algorithm
Attack PSNR(dB) MSE Correlation PSNR(dB) MSE Correlation
No attack 28.13 99.97 1.00 28.03 102.15 1.00
Salt and pepper 29.01 81.5195 0.72 28.95 82.67 0.87
AWGN 28.77 86.21 0.58 28.72 87.19 0.80
Jpg compression 29.04 81.09 0.95 28.97 82.33 0.98
Gamma
Correction
25.11 200.06 0.55 25.07 202.16 0.66
Histogram 29.49 73.09 0.57 29.45 73.67 0.81
Cropping 29.08 80.21 0.89 29.02 99.56 0.97
Sharpening 32.92 34.92 0.69 35.89 16.73 0.89
Speckle Noise 28.25 97.28 0.18 28.22 97.89 0.31
Median filter 29.14 79.10 0.53 29.22 77.65 0.79
Scaling 29.17 78.65 0.10 29.94 65.80 0.14
Fig 9: Watermark image.
Figure 7 is Lena image and figure 8 is Cameraman image. In
this paper both of these image are consider as host image. And
figure 9 represents the watermark image. Table 1 shows
different results for both new algorithm and Cox's modified
algorithm for Lena image, whereas table 2 represents results for
Cameraman image. From both table it can be said that the
PSNR value of the watermarked image is slightly degraded
from the original image at different attacks whereas this is
sharply degraded for Cox's modified algorithm. Here salt and
pepper attack, additive white Gaussian noise (AWGN) attack,
jpg compression attack, gamma attack, histogram attack,
cropping attack, sharpening attacks are consider for
simulation. For salt and pepper attack the PSNR value for the
Cox's modified algorithm is increased. This phenomenon is
New algorithm Cox's modified algorithm
Attack PSNR(dB) MSE Correlation PSNR(dB) MSE Correlation
No attack 27.87 98.08 1.00 27.69 102.14 1.00
Salt and pepper 28.59 82.97 0.85 27.73 101.08 0.91
AWGN 28.12 92.47 0.77 27.65 103.11 0.85
Jpg compression 28.62 82.33 0.99 27.75 100.63 0.99
Gamma Correction 23.73 253.9 0.85 23.72 255.00 0.88
Histogram 27.62 103.64 0.86 27.60 104.10 0.88
Cropping 28.68 81.22 0.96 27.80 99.56 0.97
Sharpening 27.80 99.53 0.83 27.76 100.40 0.84
Speckle Noise 27.13 116.03 0.28 26.94 121.19 0.37
Median filter 29.41 68.81 0.81 28.41 86.41 0.85
Scaling 31.26 44.81 0.29 30.92 48.48 0.34
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 217
also noticed for the NEA. But MSE value of the Cox's modified
algorithm is greater than the NEA, which means that the host
image is less hampered for NEA than the Cox’s algorithm.
Similar criterion is noticed for other attacks like AWGN, Jpg
compression, cropping, median filter and scaling attacks. But in
all cases the PSNR of the new embedding algorithm (NEA) is
higher than the Cox’s modified algorithm. In case of
correlation the NEA and Cox’s modified algorithm having
almost similar value. Thus considering all conditions this paper
appreciates the new algorithm for digital watermarking.
5. CONCLUSIONS
An informed digital watermarking based on DWT-DCT
technique with a new algorithm is presents in this paper. This
paper also shows the comparative results of Cox's modified
algorithm and new algorithm for Lena and Cameraman image.
The PSNR changing criterion is similar for both new
embedding algorithm (NEA) and Cox’s modified algorithm.
Although in all cases PSNR of the NEA is higher than the
Cox’s algorithm. The MSE value indicates that the NEA can
embed the mark image into the host image with less
degradation than the Cox’s algorithm. From all simulation
results this paper appreciates the performance of new
embedding algorithm (NEA) and it can be said that the NEA
will be a substitute of modified Cox’s algorithm with better
performance.
REFERENCES
[1]. Jonathan K. Su, Frank Hartung, Bernd Girod,” Digital
Watermarking of Text, Image, and Video Documents”,
Telecommunications Laboratory University of Erlangen-
Nuremberg Erlangen, Germany.
[2]. Ibrahim Nasir, Ying Weng, Jianmin Jiang," A New Robust
Watermarking Scheme for Color Image in Spatial Domain",
School of Informatics, University of Bradford, UK
[3]. R.G.van Schyndel, A.Z.Tirkel, C.F.Osborne,”A DIGITAL
WATERMARK ” ,Department of Physics, Monash University,
Clayton, 3168, Australia. Scientific Technology, 21 Walstab St,
E. Brighton, 3187, Australia
[4]. Mr. Rohith.S1, Dr. K.N.hari bhat2,” A Simple Robust
Digital Image Watermarking against Salt and Pepper Noise
using Repetition Codes”,Nagarjuna College of Engineering and
Technology, Bengaluru, Karnataka, India.
[5]. Shital Gupta, Dr Sanjeev Jain, "A Robust Algorithm of
Digital Image Watermarking Based on Discrete Wavelet
Transform", Department of Computer Science and
Engineering, LNCT, Bhopal.
[6]. Nidhi Bisla, Prachi Chaudhary, "Comparative Study of
DWT and DWT-SVD Image Watermarking Techniques",
International Journal of Advanced Research in Computer
Science and Software Engineering", Volume 3, Issue 6, June
2013
[7]. M.A. Mohamed and A.M. El-Mohandes, "Hybrid DCT-
DWT Watermarking and IDEA Encryption of Internet
Contents", International Journal of Computer Science Issues,
Vol.9, Issue 1, No 2, January2012
[8]. Emir Ganic, Ahmet M. Eskicioglu,"Robust DWT-SVD
Domain Image Watermarking: Embedding Data in All
Frequencies".
[9]. Gaurav Bhatnagar, Balasubramanian Raman," A new
robust reference watermarking scheme based on DWT-SVD",
Department of Mathematics, Indian Institute of Technology
Roorkee, Roorkee - 247667, India
[10]. Praful Saxena, Shanon Garg and Arpita Srivastava,"
DWT-SVD Semi-Blind Image Watermarking Using High
Frequency Band", 2nd International Conference on Computer
Science and Information Technology (ICCSIT'2012) Singapore
April 28-29, 2012.
[11]. Mr.D.V.N.Koteswara Rao,Y.Madhuri, S.V.Rajendra
Kumar ,Y.V.Suresh Babu, " Robust Image Watermarking using
DCT & Wavelet Packet Denoising ", International Journal of
Scientific & Engineering Research Volume 3, Issue5, May-
2012.
[12]. Corina Nafornita and Alexandru Isar, "Application of
discrete wavelet transform in watermarking",, Politehnica”
University of Timisoara, Romania.
[13]. Koushik Pal, G. Ghosh1 and M. Bhattacharya, " A Novel
Digital Image Watermarking Scheme for Data Security Using
Bit Replacement and Majority Algorithm Technique", Institute
of Radio Physics and Electronics, University of Calcutta,
Kolkata Indian .
[14]. Ms. T Mita Kumari, ”Image Adaptive Watermarking
Using Wavelet Transform”, Department of Electrical
Engineering, National Institute of Technology, Rourkela
769008, 2007.
[15]. Abrar Ahmed Syed, "Digital Watermarking", The
University of Texas, Arlington.
BIOGRAPHIES
Afroja Akter, Graduated in Electrical and
Electronic Engineering, From Chittagong
University of Engineering and Technology,
Chittagong, Bangladesh in September 2013.
Her research interests are in image
processing, VLSI, and Renewable energy.
Muhammad Ahsan Ullah received B.Sc. in
Engineering degree in Electrical and
Electronic Engineering from Chittagong
University of Engineering and Technology,
Bangladesh in 2002, M.E. degree in
Electronic and Information Engineering
from Kyung Hee University, Republic of
Korea in 2007 and PhD degree in Electrical Engineering at
Nagaoka University of Technology at 2011. He is interested in
Signal processing, Coding Theory, threshold decoding, MC-
CDMA, OFDMA, MIMO, and Image Processing.

More Related Content

What's hot

Robust Image Watermarking Based on Dual Intermediate Significant Bit (DISB) I...
Robust Image Watermarking Based on Dual Intermediate Significant Bit (DISB) I...Robust Image Watermarking Based on Dual Intermediate Significant Bit (DISB) I...
Robust Image Watermarking Based on Dual Intermediate Significant Bit (DISB) I...paperpublications3
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attackseSAT Publishing House
 
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN ijcseit
 
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarkingijsrd.com
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attackseSAT Journals
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
 
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color ImagesRobust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color ImagesCSCJournals
 
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...gerogepatton
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...IRJET Journal
 
Modified DCT-based Audio Watermarking Optimization using Genetics Algorithm
Modified DCT-based Audio Watermarking Optimization using Genetics AlgorithmModified DCT-based Audio Watermarking Optimization using Genetics Algorithm
Modified DCT-based Audio Watermarking Optimization using Genetics AlgorithmTELKOMNIKA JOURNAL
 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital mediaijctet
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

What's hot (16)

1674 1677
1674 16771674 1677
1674 1677
 
Robust Image Watermarking Based on Dual Intermediate Significant Bit (DISB) I...
Robust Image Watermarking Based on Dual Intermediate Significant Bit (DISB) I...Robust Image Watermarking Based on Dual Intermediate Significant Bit (DISB) I...
Robust Image Watermarking Based on Dual Intermediate Significant Bit (DISB) I...
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacks
 
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
 
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domains
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
A novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacksA novel rrw framework to resist accidental attacks
A novel rrw framework to resist accidental attacks
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
 
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color ImagesRobust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
Robust Digital Watermarking Scheme of Anaglyphic 3D for RGB Color Images
 
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
 
Modified DCT-based Audio Watermarking Optimization using Genetics Algorithm
Modified DCT-based Audio Watermarking Optimization using Genetics AlgorithmModified DCT-based Audio Watermarking Optimization using Genetics Algorithm
Modified DCT-based Audio Watermarking Optimization using Genetics Algorithm
 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital media
 
H3602056060
H3602056060H3602056060
H3602056060
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

Viewers also liked

Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Publishing House
 
Implementation of linux based uart device driver
Implementation of linux based uart device driverImplementation of linux based uart device driver
Implementation of linux based uart device drivereSAT Publishing House
 
Sequences classification based on group technology
Sequences classification based on group technologySequences classification based on group technology
Sequences classification based on group technologyeSAT Publishing House
 
Optimization of shrinkage and surface roughness of
Optimization of shrinkage and surface roughness ofOptimization of shrinkage and surface roughness of
Optimization of shrinkage and surface roughness ofeSAT Publishing House
 
Investigation of stresses in the thin rimmed spur
Investigation of stresses in the thin rimmed spurInvestigation of stresses in the thin rimmed spur
Investigation of stresses in the thin rimmed spureSAT Publishing House
 
Forecasting trip attraction based on commercial land
Forecasting trip attraction based on commercial landForecasting trip attraction based on commercial land
Forecasting trip attraction based on commercial landeSAT Publishing House
 
Effect of skew angle on static behaviour of reinforced
Effect of skew angle on static behaviour of reinforcedEffect of skew angle on static behaviour of reinforced
Effect of skew angle on static behaviour of reinforcedeSAT Publishing House
 
A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...eSAT Publishing House
 
Multi tracking system for vehicle using gps and gsm
Multi tracking system for vehicle using gps and gsmMulti tracking system for vehicle using gps and gsm
Multi tracking system for vehicle using gps and gsmeSAT Publishing House
 
Emc model for modern power electronic systems for
Emc model for modern power electronic systems forEmc model for modern power electronic systems for
Emc model for modern power electronic systems foreSAT Publishing House
 
Investigations on material casualty of plates under
Investigations on material casualty of plates underInvestigations on material casualty of plates under
Investigations on material casualty of plates undereSAT Publishing House
 
Study of brass wire and cryogenic treated brass wire on titanium alloy using ...
Study of brass wire and cryogenic treated brass wire on titanium alloy using ...Study of brass wire and cryogenic treated brass wire on titanium alloy using ...
Study of brass wire and cryogenic treated brass wire on titanium alloy using ...eSAT Publishing House
 
Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengesAnalysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
 
Review and calculation of activity co efficient of tea
Review and calculation of activity co efficient of teaReview and calculation of activity co efficient of tea
Review and calculation of activity co efficient of teaeSAT Publishing House
 
Separation of mineral matter from indian coal by using
Separation of mineral matter from indian coal by usingSeparation of mineral matter from indian coal by using
Separation of mineral matter from indian coal by usingeSAT Publishing House
 
Simulation and experimental studies for lateral
Simulation and experimental studies for lateralSimulation and experimental studies for lateral
Simulation and experimental studies for lateraleSAT Publishing House
 
Optimizing the process parameters of friction stir welded joint of magnesium ...
Optimizing the process parameters of friction stir welded joint of magnesium ...Optimizing the process parameters of friction stir welded joint of magnesium ...
Optimizing the process parameters of friction stir welded joint of magnesium ...eSAT Publishing House
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectioneSAT Publishing House
 
The influence of tree induce suction on soil suction
The influence of tree induce suction on soil suctionThe influence of tree induce suction on soil suction
The influence of tree induce suction on soil suctioneSAT Publishing House
 
A novel tool for stereo matching of images
A novel tool for stereo matching of imagesA novel tool for stereo matching of images
A novel tool for stereo matching of imageseSAT Publishing House
 

Viewers also liked (20)

Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Implementation of linux based uart device driver
Implementation of linux based uart device driverImplementation of linux based uart device driver
Implementation of linux based uart device driver
 
Sequences classification based on group technology
Sequences classification based on group technologySequences classification based on group technology
Sequences classification based on group technology
 
Optimization of shrinkage and surface roughness of
Optimization of shrinkage and surface roughness ofOptimization of shrinkage and surface roughness of
Optimization of shrinkage and surface roughness of
 
Investigation of stresses in the thin rimmed spur
Investigation of stresses in the thin rimmed spurInvestigation of stresses in the thin rimmed spur
Investigation of stresses in the thin rimmed spur
 
Forecasting trip attraction based on commercial land
Forecasting trip attraction based on commercial landForecasting trip attraction based on commercial land
Forecasting trip attraction based on commercial land
 
Effect of skew angle on static behaviour of reinforced
Effect of skew angle on static behaviour of reinforcedEffect of skew angle on static behaviour of reinforced
Effect of skew angle on static behaviour of reinforced
 
A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...
 
Multi tracking system for vehicle using gps and gsm
Multi tracking system for vehicle using gps and gsmMulti tracking system for vehicle using gps and gsm
Multi tracking system for vehicle using gps and gsm
 
Emc model for modern power electronic systems for
Emc model for modern power electronic systems forEmc model for modern power electronic systems for
Emc model for modern power electronic systems for
 
Investigations on material casualty of plates under
Investigations on material casualty of plates underInvestigations on material casualty of plates under
Investigations on material casualty of plates under
 
Study of brass wire and cryogenic treated brass wire on titanium alloy using ...
Study of brass wire and cryogenic treated brass wire on titanium alloy using ...Study of brass wire and cryogenic treated brass wire on titanium alloy using ...
Study of brass wire and cryogenic treated brass wire on titanium alloy using ...
 
Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengesAnalysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challenges
 
Review and calculation of activity co efficient of tea
Review and calculation of activity co efficient of teaReview and calculation of activity co efficient of tea
Review and calculation of activity co efficient of tea
 
Separation of mineral matter from indian coal by using
Separation of mineral matter from indian coal by usingSeparation of mineral matter from indian coal by using
Separation of mineral matter from indian coal by using
 
Simulation and experimental studies for lateral
Simulation and experimental studies for lateralSimulation and experimental studies for lateral
Simulation and experimental studies for lateral
 
Optimizing the process parameters of friction stir welded joint of magnesium ...
Optimizing the process parameters of friction stir welded joint of magnesium ...Optimizing the process parameters of friction stir welded joint of magnesium ...
Optimizing the process parameters of friction stir welded joint of magnesium ...
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
 
The influence of tree induce suction on soil suction
The influence of tree induce suction on soil suctionThe influence of tree induce suction on soil suction
The influence of tree induce suction on soil suction
 
A novel tool for stereo matching of images
A novel tool for stereo matching of imagesA novel tool for stereo matching of images
A novel tool for stereo matching of images
 

Similar to Digital watermarking with a new algorithm

A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform ijfcstjournal
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...prjpublications
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
 
FPGA Implementation of 2-D DCT & DWT Engines for Vision Based Tracking of Dyn...
FPGA Implementation of 2-D DCT & DWT Engines for Vision Based Tracking of Dyn...FPGA Implementation of 2-D DCT & DWT Engines for Vision Based Tracking of Dyn...
FPGA Implementation of 2-D DCT & DWT Engines for Vision Based Tracking of Dyn...IJERA Editor
 
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESijiert bestjournal
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
 
Application of diversity techniques for multi user idma communication system
Application of diversity techniques for multi user idma communication systemApplication of diversity techniques for multi user idma communication system
Application of diversity techniques for multi user idma communication systemAlexander Decker
 
Post-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest CodingPost-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest Codingsipij
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
 
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey  Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey ijsc
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )ijsc
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkeSAT Journals
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkeSAT Publishing House
 
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmIRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmLalith Kumar
 

Similar to Digital watermarking with a new algorithm (20)

1820 1824
1820 18241820 1824
1820 1824
 
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
FPGA Implementation of 2-D DCT & DWT Engines for Vision Based Tracking of Dyn...
FPGA Implementation of 2-D DCT & DWT Engines for Vision Based Tracking of Dyn...FPGA Implementation of 2-D DCT & DWT Engines for Vision Based Tracking of Dyn...
FPGA Implementation of 2-D DCT & DWT Engines for Vision Based Tracking of Dyn...
 
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
Application of diversity techniques for multi user idma communication system
Application of diversity techniques for multi user idma communication systemApplication of diversity techniques for multi user idma communication system
Application of diversity techniques for multi user idma communication system
 
14 vikram kumar_150-159
14 vikram kumar_150-15914 vikram kumar_150-159
14 vikram kumar_150-159
 
G0523444
G0523444G0523444
G0523444
 
Post-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest CodingPost-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest Coding
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics
 
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey  Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
 
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmIRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking Algorithm
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 

Recently uploaded (20)

Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 

Digital watermarking with a new algorithm

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 212 DIGITAL WATERMARKING WITH A NEW ALGORITHM Afroja Akter1 , Muhammad Ahsan Ullah2 1, 2 Department of Electrical and Electronic Engineering, Chittagong University of Engineering and Technology, Chittagong, Bangladesh Abstract Everyday millions of data need to transmit through a distinct channel for various purposes; as a result there is a certain chance of third person interruption on that data. In this regards digital watermarking is one of the best solution. This paper proposes a new embedding algorithm (NEA) of digital watermarking. The algorithm is performed for digital image as data. The performance is compared for NEA and well established Cox's modified embedding algorithm. The watermarking is based on discrete wavelet transforms (DWT) and discrete cosine transforms (DCT). The acceptance of the new algorithm is measured by the two requirements of digital watermarking. One is imperceptibility of the watermarked image, measured by peak signal to noise ratio (PSNR) in dB; another one is robustness of the mark image, measured by correlation of original mark image and recovering mark image. Here a 512×512 gray scale "Lena" and "Cameraman's" image is taken as host images, and a 128×128 gray scale image is taken as mark image for 2 level of DWT. The simulation results for different attacking conditions such as salt and pepper attack, additive white Gaussian noise (AWGN) attack, jpg compression attack, gamma attack, histogram attack, cropping attack, sharpening attack etc. After different attacks the changing tendency PSNR for both algorithms are similar. But the mean square error (MSE) value of NEA is always less than Cox’s modified algorithm, which means that after embedding the changes of the host image property lower for NEA than Cox’s algorithm. From the simulation results it can be said that NEA will be a substitute of modified Cox’s algorithm with better performance. Keywords: Digital watermark, DWT, DCT, Cox’s modified algorithm, Lena image, Cameraman image, AWGN, JPG, salt and pepper attack, PSNR, correlation, MSE. ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION Digital watermarking is a scheme where a secret data, it may an image, audio or video, embedded in a host data such a way that it remains on it as long as the perceptible quality of the content in an acceptable level [1]. From the last decade digital watermarking is best choice for data security. Digital watermarking may classified as (1) blind or (2) informed. This paper only focused on informed digital watermarking, where the mark signal extracted using the host data. Digital watermarking procedure mainly classified into three steps [14]  Embedding  Distribution  Extraction or Detection Embedding is the process where a secret data i.e. either an image or an audio or video is embedded into a host data which may an image or an audio or video, using a key. Then this embedded data is broadcast or distributed through a lossless or lousy channel, which is known as distribution. The third step is depending on author, when the existence of the mark signal can be detected using the host data with known key is known as detection. But when the mark data is recover from the embedded data using the known host data and key is known as extraction. The process is shown in figure 1. Fig 1: Digital watermarking system. Furthermore digital watermarking is based on two techniques  Spatial domain based [2]  Transform domain based The most common spatial domain based technique is least significant bit (LSB) [2-4, 13] method. The proposed technique is based on transform domain. Again the transform domain based digital watermarking can be classified into discrete wavelet transforms (DWT) [5-10, 12, 14], discrete Cosine transforms (DCT) [5, 7, 11, 15]. Multi resolution properties is the most important characteristics of DWT based digital watermarking, as for the specified region can be selected for data embedding. Every image can be divided into
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 213 two specific regions: (1) low frequency region and (2) high frequency region, and these regions can be sub-divided in case of DWT based digital watermarking. DCT divide the image in three regions: (1) low frequency region, (2) mid-frequency region and (3) high frequency region. It is easy to select a distinct region to embed a data in case of DCT based digital watermarking. This paper based on both of these technique, thus it can provide better performance. A 512×512 gray scale image is taken as host image, and a 128×128 gray scale image is taken as mark image. After 2- level of DWT of host image the mark is embedded on a selected sub-band. This paper considers the sub-bands from a high frequency region of DWT, and then selects the comparative low frequency or high co-efficient sets for DCT. At lower level of DWT based digital watermarking it is challenging to embed the mark image into the host image without hampering its perception level, thus here this situation is tested. Acceptance of the proposed algorithm is measured by two most important requirements of the digital watermarking. One of them is imperceptibility of the embedded data, measured by peak signal to noise ratio (PSNR) in dB, and remaining one is robustness of the recovering data, measured by the correlation of original mark data and recover data. Greater PSNR is desired, as it means the perception level of the host image is little bit interrupted by the mark image. And a better correlation (maximum 100%, i.e. 1) measured that the mark image is not interrupted by the attacks in a broadcasting channel. Another parameter known as mean square error (MSE) also considering. As less MSE indicates that the mark image interrupts the host image less. i.e. less MSE is acceptable. This paper evaluate the technique considering different attacks like salt and pepper attack, additive white Gaussian noise (AWGN) attack, jpg compression attack, gamma attack, histogram attack, cropping, sharpening attack, rotational attack etc. From simulation results it can be decided that the new algorithm is accepted with comparing Cox's modified algorithm even at different attack condition. This paper is arranged as following sections; in section two different parameters for digital watermarking are discussed. The hybrid technique of digital watermarking is discussed in section three. Simulation results are presented in section four. 2. PERFORMANCE MEASURE Digital watermarking has certain requirements. To measure these requirements different image quality metrics are used. This paper is using peak signal to noise ratio (PSNR) to measure the amount of visual quality degradation between original and watermarked image. This criterion is very well known as imperceptibility of the embedded image [7]. This paper also measures the robustness of the mark image. Robustness is measured by correlation of original mark image and recovered mark image. 2.1 Peak Signal-To-Noise Ratio (PSNR) To measure the quality of reconstruction of lossy compression PSNR is frequently used [7, 13]. And it is the ratio of the maximum possible power of a host image to the power of corrupting noise that affects the fidelity of its representation. It can define by the following equation: 2.1 Where MAX represents the maximum possible pixel value in the host image and MSE is shows the mean square error in embedded image. MSE is measured from the host image and noisy approximation of it [13]. MSE can be defined by the equation (2.2) 2.2 Where, ),( lkf is host image and ),(' lkf is watermarked/embedded image. 2.2 Robustness Robustness measure the tolerance of the technique after experiencing different attacks, it is measured for the mark image. I.e. distributing of the embedded image through a loosy channel how much it experiences the degradation of mark image is measured by robustness. The measuring tool of it is correlation of the original mark image and recover mark image. Correlation of two images can be found from following equation. 2.3 where w (i,j) and w’(i,j)’ are the original and extracted/recover watermark image respectively. 3. HYBRID TECHNIQUE This paper discusses the digital watermarking technique based on transform domain. Most popular transform domain techniques included: discrete wavelet transforms (DWT) and discrete cosine transforms (DCT), separately these techniques having some merits and demerits, but combining both of these        MSE MAX PSNRdB 10log20   2 1 1 ),('),( 1           m k n l lkflkf nm MSE                      i j avg i j avg i j avgavg jiwjiwjiwjiw jiwjiwjiwjiw )}),('),('{}),(),({ }),('),('{*)},(),({ Corr. 2 . 2 . ..
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 214 can provides better performance. In this regard this paper evaluates the new algorithm based on hybrid technique. In this paper this hybrid digital watermarking technique is discussed in two steps:  Digital watermarking embedding technique.  Digital watermarking extracting technique. Both steps are discussed as follows: 3.1 Digital Watermarking Embedding Technique: Using DWT a 512×512 host image (here gray scale "Lena" or "Cameraman") is sub-divided into 4-subbands. Figure 3 represents the 1st level of DWT decomposition of host image. Where LL, HL, LH, HH are 4 sub-bands. Here LL represents the high scale low frequency co-efficient set, HL represents the horizontal details of low scale high frequency set, LH represents the vertical details of low scale high frequency set, HH represents the diagonal details low scale high frequency set of the host image. Fig 2: Flow chart of the embedding procedure. Then using 2 dimensional of DWT on HL of the host image, 2nd level decompose image can be found as shown in figure 4. After the 2nd level decomposition of the host image then the comparative low frequency components denote as HLLL2 is select for 2 dimensional DCT. It is common practice to select the mid frequency region for embedding purposes during DCT based digital watermarking for robustness, but having chance to degrade the perceptibility of the host image. To trade of the imperceptibility and robustness this paper focused on the low frequency region after 2 dimensional DCT of the host image. Then a 128×128 gray scale image as a mark is embedded on the selected region after enrolled a key and DCT on it. With scaling factor 0.9 the mark image is embedded into the host image using the new hybrid algorithm and Cox's modified algorithm as in equation 3.1 and equation 3.2 respectively Fig 3: 1st level DWT decomposition of "Lena" image. Fig 4: 2nd level DWT decomposition of "Lena" image. Fig 5: DCT region of an image
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 215 . 22 )(),( )(),( ),(),(' mfnmf mfnmf wnmfnmf avg avg     3.1 wnmfnmf  ),(),(' 3.2 Where f(m,n) is the host image, favg.(m) is mean value of the host image, w is original mark image. Here from Cox's modified algorithm it has been shown that the mark image totally independent on host image, thus the imperceptibility is degraded sharply when embedded or watermarked image is experienced different attacks from without attack condition. But from the new algorithm it is noticed that the mark image is multiplied with the absolute deviation of host image. Thus here degradation rate is slow. 3.2 Digital Watermarking Extraction Technique: The extraction technique is depicts in figure 6. To extract the mark image from the embedded or watermarked image the original 512×512 image is used, hence this is an informed digital watermarking technique. Fig 6: Flowchart of extracting procedure First of all the watermarked image is decomposed into 2-level of DWT, then the extraction location is selected. Then DCT is done on the selected sub-bands. Similarly the host image is first decomposing into 2-level DWT and then DCT on the selected sub-band. Then the mark image is extracted using the new algorithm and Cox's modified algorithm respectively as bellows in equation 3.3 and equation 3. 4: )](),([ )(),()],(),('[ ' 22 mfnmf mfnmfnmfnmf w avg avg     3.3  ),(),(' ' nmfnmf w   3.4 Where w’ is recover image. Then IDCT is done on the extracted watermark and the recover mark image is found enrolled the secret key. 4. RESULTS To evaluate the performance of the new algorithm and comparative result, here 512×512 Lena image and a 512×512 Cameraman image are used while a 128×128 gray scale image is used as mark image. For simulation considering scaling factor is 0.9. Fig 7: Host Lena image Fig 8: Host Cameraman image.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 216 Table 1: PSNR, MSE and Correlation Values for Lena image Table 2: PSNR, MSE and Correlation Values for Cameraman image New algorithm Cox's modified algorithm Attack PSNR(dB) MSE Correlation PSNR(dB) MSE Correlation No attack 28.13 99.97 1.00 28.03 102.15 1.00 Salt and pepper 29.01 81.5195 0.72 28.95 82.67 0.87 AWGN 28.77 86.21 0.58 28.72 87.19 0.80 Jpg compression 29.04 81.09 0.95 28.97 82.33 0.98 Gamma Correction 25.11 200.06 0.55 25.07 202.16 0.66 Histogram 29.49 73.09 0.57 29.45 73.67 0.81 Cropping 29.08 80.21 0.89 29.02 99.56 0.97 Sharpening 32.92 34.92 0.69 35.89 16.73 0.89 Speckle Noise 28.25 97.28 0.18 28.22 97.89 0.31 Median filter 29.14 79.10 0.53 29.22 77.65 0.79 Scaling 29.17 78.65 0.10 29.94 65.80 0.14 Fig 9: Watermark image. Figure 7 is Lena image and figure 8 is Cameraman image. In this paper both of these image are consider as host image. And figure 9 represents the watermark image. Table 1 shows different results for both new algorithm and Cox's modified algorithm for Lena image, whereas table 2 represents results for Cameraman image. From both table it can be said that the PSNR value of the watermarked image is slightly degraded from the original image at different attacks whereas this is sharply degraded for Cox's modified algorithm. Here salt and pepper attack, additive white Gaussian noise (AWGN) attack, jpg compression attack, gamma attack, histogram attack, cropping attack, sharpening attacks are consider for simulation. For salt and pepper attack the PSNR value for the Cox's modified algorithm is increased. This phenomenon is New algorithm Cox's modified algorithm Attack PSNR(dB) MSE Correlation PSNR(dB) MSE Correlation No attack 27.87 98.08 1.00 27.69 102.14 1.00 Salt and pepper 28.59 82.97 0.85 27.73 101.08 0.91 AWGN 28.12 92.47 0.77 27.65 103.11 0.85 Jpg compression 28.62 82.33 0.99 27.75 100.63 0.99 Gamma Correction 23.73 253.9 0.85 23.72 255.00 0.88 Histogram 27.62 103.64 0.86 27.60 104.10 0.88 Cropping 28.68 81.22 0.96 27.80 99.56 0.97 Sharpening 27.80 99.53 0.83 27.76 100.40 0.84 Speckle Noise 27.13 116.03 0.28 26.94 121.19 0.37 Median filter 29.41 68.81 0.81 28.41 86.41 0.85 Scaling 31.26 44.81 0.29 30.92 48.48 0.34
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 217 also noticed for the NEA. But MSE value of the Cox's modified algorithm is greater than the NEA, which means that the host image is less hampered for NEA than the Cox’s algorithm. Similar criterion is noticed for other attacks like AWGN, Jpg compression, cropping, median filter and scaling attacks. But in all cases the PSNR of the new embedding algorithm (NEA) is higher than the Cox’s modified algorithm. In case of correlation the NEA and Cox’s modified algorithm having almost similar value. Thus considering all conditions this paper appreciates the new algorithm for digital watermarking. 5. CONCLUSIONS An informed digital watermarking based on DWT-DCT technique with a new algorithm is presents in this paper. This paper also shows the comparative results of Cox's modified algorithm and new algorithm for Lena and Cameraman image. The PSNR changing criterion is similar for both new embedding algorithm (NEA) and Cox’s modified algorithm. Although in all cases PSNR of the NEA is higher than the Cox’s algorithm. The MSE value indicates that the NEA can embed the mark image into the host image with less degradation than the Cox’s algorithm. From all simulation results this paper appreciates the performance of new embedding algorithm (NEA) and it can be said that the NEA will be a substitute of modified Cox’s algorithm with better performance. REFERENCES [1]. Jonathan K. Su, Frank Hartung, Bernd Girod,” Digital Watermarking of Text, Image, and Video Documents”, Telecommunications Laboratory University of Erlangen- Nuremberg Erlangen, Germany. [2]. Ibrahim Nasir, Ying Weng, Jianmin Jiang," A New Robust Watermarking Scheme for Color Image in Spatial Domain", School of Informatics, University of Bradford, UK [3]. R.G.van Schyndel, A.Z.Tirkel, C.F.Osborne,”A DIGITAL WATERMARK ” ,Department of Physics, Monash University, Clayton, 3168, Australia. Scientific Technology, 21 Walstab St, E. Brighton, 3187, Australia [4]. Mr. Rohith.S1, Dr. K.N.hari bhat2,” A Simple Robust Digital Image Watermarking against Salt and Pepper Noise using Repetition Codes”,Nagarjuna College of Engineering and Technology, Bengaluru, Karnataka, India. [5]. Shital Gupta, Dr Sanjeev Jain, "A Robust Algorithm of Digital Image Watermarking Based on Discrete Wavelet Transform", Department of Computer Science and Engineering, LNCT, Bhopal. [6]. Nidhi Bisla, Prachi Chaudhary, "Comparative Study of DWT and DWT-SVD Image Watermarking Techniques", International Journal of Advanced Research in Computer Science and Software Engineering", Volume 3, Issue 6, June 2013 [7]. M.A. Mohamed and A.M. El-Mohandes, "Hybrid DCT- DWT Watermarking and IDEA Encryption of Internet Contents", International Journal of Computer Science Issues, Vol.9, Issue 1, No 2, January2012 [8]. Emir Ganic, Ahmet M. Eskicioglu,"Robust DWT-SVD Domain Image Watermarking: Embedding Data in All Frequencies". [9]. Gaurav Bhatnagar, Balasubramanian Raman," A new robust reference watermarking scheme based on DWT-SVD", Department of Mathematics, Indian Institute of Technology Roorkee, Roorkee - 247667, India [10]. Praful Saxena, Shanon Garg and Arpita Srivastava," DWT-SVD Semi-Blind Image Watermarking Using High Frequency Band", 2nd International Conference on Computer Science and Information Technology (ICCSIT'2012) Singapore April 28-29, 2012. [11]. Mr.D.V.N.Koteswara Rao,Y.Madhuri, S.V.Rajendra Kumar ,Y.V.Suresh Babu, " Robust Image Watermarking using DCT & Wavelet Packet Denoising ", International Journal of Scientific & Engineering Research Volume 3, Issue5, May- 2012. [12]. Corina Nafornita and Alexandru Isar, "Application of discrete wavelet transform in watermarking",, Politehnica” University of Timisoara, Romania. [13]. Koushik Pal, G. Ghosh1 and M. Bhattacharya, " A Novel Digital Image Watermarking Scheme for Data Security Using Bit Replacement and Majority Algorithm Technique", Institute of Radio Physics and Electronics, University of Calcutta, Kolkata Indian . [14]. Ms. T Mita Kumari, ”Image Adaptive Watermarking Using Wavelet Transform”, Department of Electrical Engineering, National Institute of Technology, Rourkela 769008, 2007. [15]. Abrar Ahmed Syed, "Digital Watermarking", The University of Texas, Arlington. BIOGRAPHIES Afroja Akter, Graduated in Electrical and Electronic Engineering, From Chittagong University of Engineering and Technology, Chittagong, Bangladesh in September 2013. Her research interests are in image processing, VLSI, and Renewable energy. Muhammad Ahsan Ullah received B.Sc. in Engineering degree in Electrical and Electronic Engineering from Chittagong University of Engineering and Technology, Bangladesh in 2002, M.E. degree in Electronic and Information Engineering from Kyung Hee University, Republic of Korea in 2007 and PhD degree in Electrical Engineering at Nagaoka University of Technology at 2011. He is interested in Signal processing, Coding Theory, threshold decoding, MC- CDMA, OFDMA, MIMO, and Image Processing.