SlideShare a Scribd company logo
1 of 5
Download to read offline
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 1 – MAY 2015 - ISSN: 2349 - 9303
1
Comparative Study on Watermarking & Image
Encryption for Secure Communication
Ajna Madanan1
1
AnnaUniversity, ECE,
ajna.madanan@gmail.com
Dr. S. Poornachandra2
2
Anna University, ECE
dean.iqac.snsce@gmail.com
Abstract—Over the past decades, research in security has concentrated on the development of algorithms and protocols for
authentication, encryption and integrity of data. Despite tremendous advances, several security problems still afflict system’s. In
this android app watermarking and encryption is being applied on images and data. Because of the human visual system’s low
sensitivity to small changes and the high flexibility of digital media, anyone can easily make small changes in digital data with
low perceptibility. Here watermarking and encryption are being performed in wavelet domain. Here in watermarking, the
coefficients of watermarks are being embedded with the coefficients of the original image. Encryption is being done in wavelet
domain so that the probability of an intruder trying to access the contents is very much minimized. Thus, this model provides a
high level of security.
Index Terms— Security, wavelets, watermarking, encryption, intruder.
——————————  ——————————
1 INTRODUCTION
xplosive growth in multimedia technology and its applications
has escalated the necessity to build secure methods for legal
distribution of the digital content. Presently need for protection
against unauthorized copying and distribution has increased. Thus,
there aroused apprehensions over copyright protection of digital
contents. The solution to this problem is digital watermarking, which
is the most common and possibly the strongest technique for
protecting digital data. Cryptography ensures that the messages are
secure from possible ―attacks‖, which are impersonation,
eavesdropping etc.
Watermarking is a method of data embedding and information
hiding. In digital watermarking, patterns of bits are inserted into a
digital image, video or audio file that helps in identifying the
copyright information, i.e. author, rights etc. It is a concept closely
related to steganography. Watermarking is considered as a special
technique of steganography where one message is embedded in
another and the two messages are related to each other in some way.
In digital watermarking a low energy signal is imperceptibly
embedded into another signal. The low-energy signal is known as
watermark. The main signal in which the watermark is embedded is
referred to as cover signal since it covers the watermark. The entity
known as watermark key is used for embedding and detecting
watermark signal.
In image watermarking, information is embedded into cover
media for proving ownership identification. Various watermarking
techniques have been proposed by many authors in the last several
years, which include spatial domain and transform domain
watermarking.
To provide security of the images in the multimedia environment,
encryption plays an important role. Image encryption ensures
confidential transmission and storage of image over internet. Image
encryption has applications in multimedia systems, internet
communication, telemedicine, medical imaging, and military
communication to name a few.
Steganography and cryptographic methods are used together with
wavelets to increase the security of the data while transmitting
through networks. A combination of both encryption with
steganography allows better private communication. The goal of
steganography is to avoid drawing suspicion to the transmission of
the secret message.
In this paper RSA algorithm is being used for encryption. The
RSA encryption technique is being named after the inventors Ron
Rivest, Adi Shamir, and Len Adleman in 1977. RSA is a public-key
cryptography system. This algorithm is based on the difficulty of
factorizing large numbers that have two and only two factors (prime
numbers). It works on a public key system. Everyone would know
the public key. Using public key a user can encrypt data, but cannot
decrypt it. The person who possesses the private key can only
decrypt it. Theoretically, it may be possible, but it is extremely
difficult to generate the private key from the public key; this makes
the RSA algorithm a very popular choice in data encryption.
E
————————————————
 Ajna Madanan is currently pursuing masters degree program in electronics
and communication engineering in Anna University, India, PH-
8220829679. E-mail: ajna.madanan@gmail.com
 V.J. Subashini is currently Associate Professor in Computer Applications in
AnnaUniversity, India, PH-9444057965. E-mail: vjsubashini@yahoo.com
 Dr.S. Poornachandra is currently the dean /IQAC in electronics and
communication engineering in Anna University, India, PH-8643844943. E-
mail: dean.iqac.snsce@gmail.com
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 1 – MAY 2015 - ISSN: 2349 - 9303
2
2 RELATED WORK
Wavelet based image watermarking is gaining more popularity
because of its resemblance to the human visual system. In the
wavelet-based perceptual watermark masking proposed by Khalil
Zebbiche and FouadKhelifi [1], the perceptual masking model takes
into consideration local brightness, band sensitivity and texture
masking to compute a weight for each DWT coefficient of the
fingerprint image. Thus, the perceptual model consists of a spatial
frequency sensitivity function and two masking components based
on local brightness and texture masking. The watermarking scheme
yields a better robustness (i.e. lower BER). The bit error ratio or bit
error rate (BER) is the number of bit errors divided by the total
number of transferring bits during a time interval.
M. Barni [2] have developed an improved wavelet-based
watermarking through pixel-wise masking. It is mainly based on
masking the watermark according to characteristics of Human Visual
System (HVS). The watermark is being adaptively added to the
largest detail bands. The watermark weighing function is calculated
as a simple product of data extracted from HVS model. The
watermark is being detected by correlation. Victor [3] have
developed an algorithm that relies upon adaptive image
watermarking in high resolution sub-bands of DWT.
N. Kaewkamnerd and K.R. Rao [4] developed a wavelet based
image adaptive watermarking scheme. Embedding is performed at
higher level sub-bands of wavelet transform, even though this may
clearly change the image fidelity. Bo Chen and Hang Shen [5] have
developed a new robust fragile double image watermarking
algorithm using improved pixel-wise masking model and a new bit
substitution based on pseudo-random sequence. The method embeds
robust and fragile watermark into the insensitive part and sensitive
part of wavelet coefficients making two watermarks non-interfering.
Peng Liu and Zhizhong Ding [6] proposed a blind image
watermarking scheme based on wavelet tree quantization. Here
largest two coefficients are selected as significant coefficients and
the difference between them is taken as significant difference.
Watermark bits are embedded by comparing the significant
difference with an average significant difference value and maximum
difference coefficients are quantized.
Mohammad. A. B. Younes [7] introduced a block-based
transformation algorithm based on the combination of image
transformation and a well-known encryption and decryption
algorithm called Blowfish. The original image is being divided into
blocks that are then rearranged into a transformed image using a
transformation algorithm, and then the transformed image is
encrypted using the Blowfish algorithm. The results show that the
correlation between image elements was significantly decreased by
using this technique. The results also showed that increasing the
number of blocks by using smaller block sizes resulted in a lower
correlation and higher entropy.
The researches and applications of applying digital watermarking
to Geo-information data are still very inadequate. Watermarking
techniques that are developed for multimedia data cannot be directly
applied to the satellite images because here the analytic integrity of
the data, rather than the perceptual quality, is of primary importance.
Also satellite images have higher requirements in content security. It
desires not only watermarking for copyright protection, but also
encryption during storage and transmission for preventing
information leakage. As the demand to protect the sensitive and
valuable data from satellites has increased, a new method for satellite
image security by combining DWT-DCT watermarking and AES
encryption has been implemented [8].
To improve performance, discrete wavelet transform (DWT) has
been combined with another equally powerful transform which is
discrete cosine transform (DCT). The combined DWT-DCT
watermarking algorithm’s imperceptibility was better than the
performance of the DWT approach. For watermarking, the preferred
color model must be HSV (Hue, Saturation and Value) rather than
RGB because it is the most closely related color model with Human
Visual System [9]. Salt and pepper noise of input color satellite
image can be removed by using Modified decision based
unsymmetrical trimmed median filter (MDBUTMF) algorithm.
Prashant Shinde and Chetan Mohol [10] have proposed
application for Android OS that permits to add an invisible or visible
watermarking into an image of the current designations.
3 PROPOSED SYSTEM
Here encryption is performed in wavelet domain so that the
probability of an intruder trying to access the contents is very much
minimized. Encryption is being provided after watermarking so that
security level can be increased.
3.1 Transmission Section
Fig. 1. Extracted watermark using Haar wavelet
Here the original image and watermark are being converted to
wavelet coefficients using Haar transform. The coefficients of the
watermark are added with the coefficients of the original image to
get the watermarked image. During the embedding process, the
watermark coefficients are being embedded into the highest value
wavelet coefficient of the original image. Here for the encryption,
RSA algorithm is being used. While encrypting, keys are also used
along with user-typed message which is being converted to wavelet
coefficients. After encryption they are being transmitted. This is
being shown in Fig. 1. Encryption is being provided after
watermarking so that security level can be increased.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 1 – MAY 2015 - ISSN: 2349 - 9303
3
3.2 Receiver Section
Fig. 2. Extracted watermark using Haar wavelet
After the reception, the user-typed message would be converted
to wavelet coefficients and then it would be used for decryption
along with the keys. By applying inverse DWT, the image and
watermark image would be returned. The watermark is removed at
the receiving end with the help of the key and the original image.
This process is called watermark extraction. In the present model,
only threshold is being considered. This is being shown in Fig. 2.
4 RESULT ANALYSIS
Performance metrics used here are Mean Square Error and Peak
Signal-to-Noise Ratio and visual comparison which are done through
correlation. Mean Square Error (MSE) allows comparing the ―true‖
pixel values of the original image to the degraded image. MSE
represents the average of the squares of the "errors" between actual
image and noisy image. Errors are the amount by which the values of
the original image differ from the degraded image. MSE can be
found using the equation:
(1)
The notations used are listed below.
𝑋 (𝑖, 𝑗): Original image,
𝑋′ (𝑖, 𝑗): Watermarked image, and
Nt : Size of image
Peak Signal-to-Noise Ratio(PSNR) is an expression for finding
the ratio between the maximum possible value (power) of a signal
and the power of distorting noise that affects the quality of its
representation. As many signals have a very wide dynamic range
(ratio between the largest and smallest possible values of a
changeable quantity), PSNR is frequently expressed in terms of the
logarithmic decibel scale. PSNR can be found using the equation:
(2)
Here Matlab is being used as the simulation software. On applying
different wavelets such as Haar, Daubechies, Coiflet, Symlet on Fig.
3, various values of MSE and PSNR are as follows:
TABLE I
MSE AND PSNR VALUES USING HAAR WAVELET
Haar Wavelet
MSE PSNR
124.2513 27.1878
Fig. 3. Extracted watermark using Haar wavelet
In Table I and II, it can be seen that Haar wavelet and db 1
(Daubechies wavelet) produces the same PSNR and MSE values.
From Fig. 3 and 4(a), it is seen that watermark extracted are as same
as the original one. In Daubechies daughter wavelets, i.e. from DB 2
to DB 10 in Fig. 4, it is seen that spots are being introduced in the
extracted watermark and also the left side is being distorted.
TABLE II
MSE AND PSNR VALUES USING DAUBECHIES WAVELET
Daubechies Wavelet
Daughter Wavelets MSE PSNR
DB 1 124.2513 27.1878
DB 2 123.0029 27.2316
DB 3 121.3821 27.2893
DB 4 119.5124 27.3567
DB 5 117.6615 27.4245
DB 6 116.3122 27.4745
DB 7 114.9985 27.5239
DB 8 113.5129 27.5803
DB 9 111.6682 27.6515
DB 10 110.1306 27.7117
(a) (b) (c) (d) (e)
(f) (g) (h) (i) (j)
Fig. 4. Extracted watermark using Daubechies daughter wavelet i.e. from
DB 1 to DB 10.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 1 – MAY 2015 - ISSN: 2349 - 9303
4
Table III
MSE and PSNR values using Symlet wavelet
Symlet Wavelet
Daughter Wavelets MSE PSNR
SYM 2 123.0029 27.2316
SYM 3 121.3821 27.2893
SYM 4 111.4139 27.6614
SYM 5 108.2783 27.7854
SYM 6 104.9880 27.9194
SYM 7 105.9100 27.8814
SYM 8 098.0600 28.2159
(a) (b) (c) (d) (e)
(f) (g)
Fig. 5. Extracted watermark using Symlet daughter wavelet i.e. from SYM
2 to SYM 8.
Similarly, in Symlet daughter wavelets, i.e. from SYM 2 to SYM
8, it is seen that spots are being introduced and its intensity increases
in the increasing order of Symlet daughter wavelets. Also the left
side is being distorted and it increases more while reaching SYM 8.
This can be seen in Fig. 5.
Table IV
MSE and PSNR values using Coiflet wavelet
Coiflet Wavelet
Daughter Wavelets MSE PSNR
COIF 1 117.6857 27.4236
COIF 2 109.5243 27.7357
COIF 3 102.0552 28.0425
COIF 4 095.2216 28.3434
COIF 5 087.2121 28.7250
(a) (b) (c) (d) (e)
Fig. 6. Extracted watermark using Coiflet daughter wavelet i.e. from COIF
1 to COIF 5
Similarly from Table III and IV it is seen that degradation of
image quality increases as one goes down. Degradation in Coiflet is
more when compared to Symlet wavelet as seen in Fig. 6. Therefore,
from the above analysis, it is being concluded that Haar wavelet and
DB 1 of Daubechies wavelet produces better results by comparing
extracted watermark with the original image.
5 CONCLUSION
This paper introduces a model that provides a high level of
security by using both watermarking and encryption in the wavelet
domain. Due to this the probability of an intruder’s access to the
contents is very much minimized.
Fig. 7. Images a) Original Image b) Watermark Image c) Watermarked
Image d) Extracted watermark
Here watermarking has been implemented using both grayscale
and color images and watermark was extracted successfully. Fig. 7
shows the original image, watermark, watermarked image and the
extracted watermark. By comparing the original watermark image
and the extracted watermark images, it is seen that Haar wavelet
produced better results.
ACKNOWLEDGMENT
I extend my heart-felt thanks to my Project Guide, Dr. S.
Poornachandra, Dean, IQAC, for his remarkable guidance,
encouragement, valuable suggestions and support for the completion
of this Project. I take immense pleasure in expressing my humble
note of gratitude to, Dr. Karthikeyan V.V., Head of Department for
giving the permission to carry my project in the department. I am
highly grateful to our PG Project Coordinator Dr. G.K.D.
PrasannaVenkatesan, for his valuable suggestions throughout the
course of this project. I record my indebtedness to our Principal Dr.
N. Gunasekaran, for his guidance and sustained encouragement for
the completion of the project. I also extend my thanks to Mrs. V.J.
Subashini, Senior Assistant Professor, Jerusalem College of
Engineering, Chennai, for her remarkable guidance, encouragement,
valuable suggestions and support for the completion of this Project. I
also extend my thanks to Faculty members, my parents, and friends
for providing their guidance and moral support in successfully
completing the Project.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 1 – MAY 2015 - ISSN: 2349 - 9303
5
REFERENCES
[1] Khalil Zebbiche and FouadKhelifi, ―Efficient wavelet-based
perceptual watermark masking for robust fingerprint image
watermarking‖, IET Image Process, Vol. 8, Iss. 1, pp. 23–32 doi:
10.1049/iet-ipr.2013.0055, 2014.
[2] Barni M, Bartolini F, Piva, ―An Improved Wavelet Based
Watermarking Through Pixelwise Masking‖, IEEE transactions on
image processing, Vol. 10, 2001 pp.783-791.
[3] Victor V., Guzman, Meana, ―Analysis of a Wavelet-based
Watermarking Algorithm‖, IEEE Proceedings of the International
Conference on Electronics, Communications and Computer, 2004,
pp. 283-287.
[4] N. Kaewkamnerd and K.R. Rao, ―Wavelet Based Image Adaptive
Watermarking Scheme‖, IEEE Electronic Letters, Vol. 36,Feb.
2000, pp.312-313.
[5] Bo Chen, Hong Shen, ―A New Robust-Fragile Double Image
Watermarking Algorithm‖, Third IEEE International Conference on
Multimedia and Ubiquitous Engineering,2009, pp. 153-157
[6] Peng Liu, Zhizhong Ding, ―A Blind Image Watermarking Scheme
Based on Wavelet tree Quantization‖, Second IEEE International
Symposium on Electronic Commerce and Security, 2009, pp. 218-
222.
[7] Mohammad Ali BaniYounes and AmanJantan, ―Image Encryption
Using Block-Based Transformation Algorithm‖, IAENG
International Journal of Computer Science, 35:1, IJCS_35_1_03,
2008.
[8] Naida.H.Nazmudeen, Farsana.F.J., ―A New Method for Satellite
Image Security Using DWT-DCT Watermarking and AES
Encryption‖, IJIRSET,Volume 3, Special Issue 5, July 2014
[9] Rawan I. Zaghloul, Enas F. Al-Rawashdeh, ―HSV Image
Watermarking Scheme Based on Visual Cryptography‖, World
Academy of Science, Engineering and Technology Vol:20 2008-08-
23
[10] Prashant Shinde and Chetan Mohol, ―Copyright Protection for
Images on Android Phones‖, IJRET, Volume: 02, Issue: 11, Nov-
2013

More Related Content

What's hot

IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Praneeta Dehare
 
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...idescitation
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...IRJET Journal
 
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and  secret map techniques Image steganography using least significant bit and  secret map techniques
Image steganography using least significant bit and secret map techniques IJECEIAES
 
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELAN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELijsptm
 
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelA RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelMohit Goel
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET Journal
 
A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes  A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes AmAl C
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualeSAT Publishing House
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyeSAT Journals
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET Journal
 
A Hybrid Digital Watermarking Approach Using Wavelets and LSB
A Hybrid Digital Watermarking Approach Using Wavelets and LSB A Hybrid Digital Watermarking Approach Using Wavelets and LSB
A Hybrid Digital Watermarking Approach Using Wavelets and LSB IJECEIAES
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
 
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...sipij
 

What's hot (19)

IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and  secret map techniques Image steganography using least significant bit and  secret map techniques
Image steganography using least significant bit and secret map techniques
 
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELAN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
 
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelA RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes  A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visual
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
A Hybrid Digital Watermarking Approach Using Wavelets and LSB
A Hybrid Digital Watermarking Approach Using Wavelets and LSB A Hybrid Digital Watermarking Approach Using Wavelets and LSB
A Hybrid Digital Watermarking Approach Using Wavelets and LSB
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Dz31840846
Dz31840846Dz31840846
Dz31840846
 
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
 

Viewers also liked

Jalandhar weight loss diet clinic
Jalandhar weight loss diet clinic Jalandhar weight loss diet clinic
Jalandhar weight loss diet clinic mksinghdiet
 
Media_Pack_Research_Media
Media_Pack_Research_MediaMedia_Pack_Research_Media
Media_Pack_Research_MediaRos Hewlett
 
Extra bit with git
Extra bit with gitExtra bit with git
Extra bit with gitgdgjss
 
Toronto VMUG - Pernixdata Presenation
Toronto VMUG - Pernixdata PresenationToronto VMUG - Pernixdata Presenation
Toronto VMUG - Pernixdata PresenationAngelo Luciani
 
La observacion en_el_campo_de_la_investigacion
La observacion en_el_campo_de_la_investigacionLa observacion en_el_campo_de_la_investigacion
La observacion en_el_campo_de_la_investigacionAlva R. Lomelí
 
Ch5: Threads (Operating System)
Ch5: Threads (Operating System)Ch5: Threads (Operating System)
Ch5: Threads (Operating System)Ahmar Hashmi
 

Viewers also liked (9)

Jalandhar weight loss diet clinic
Jalandhar weight loss diet clinic Jalandhar weight loss diet clinic
Jalandhar weight loss diet clinic
 
Curriculum Vitae of Sabata Ludidi
Curriculum Vitae of Sabata LudidiCurriculum Vitae of Sabata Ludidi
Curriculum Vitae of Sabata Ludidi
 
Media_Pack_Research_Media
Media_Pack_Research_MediaMedia_Pack_Research_Media
Media_Pack_Research_Media
 
Extra bit with git
Extra bit with gitExtra bit with git
Extra bit with git
 
Toronto VMUG - Pernixdata Presenation
Toronto VMUG - Pernixdata PresenationToronto VMUG - Pernixdata Presenation
Toronto VMUG - Pernixdata Presenation
 
Desarrollo cognitivo
Desarrollo cognitivoDesarrollo cognitivo
Desarrollo cognitivo
 
La observacion en_el_campo_de_la_investigacion
La observacion en_el_campo_de_la_investigacionLa observacion en_el_campo_de_la_investigacion
La observacion en_el_campo_de_la_investigacion
 
Python by Rj
Python by RjPython by Rj
Python by Rj
 
Ch5: Threads (Operating System)
Ch5: Threads (Operating System)Ch5: Threads (Operating System)
Ch5: Threads (Operating System)
 

Similar to Comparative Study on Watermarking & Image Encryption for Secure Communication

A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
 
Paper id 24201422
Paper id 24201422Paper id 24201422
Paper id 24201422IJRAT
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
An Effective Semantic Encrypted Relational Data Using K-Nn Model
An Effective Semantic Encrypted Relational Data Using K-Nn ModelAn Effective Semantic Encrypted Relational Data Using K-Nn Model
An Effective Semantic Encrypted Relational Data Using K-Nn ModelClaraZara1
 
A Literature Review on Image Steganography Using AES
A Literature Review on Image Steganography Using AESA Literature Review on Image Steganography Using AES
A Literature Review on Image Steganography Using AESIRJET Journal
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...prjpublications
 
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...CSCJournals
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd Iaetsd
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
A Robust Watermarking Technique Based On Dwt on Digital Images
A Robust Watermarking Technique Based On Dwt on Digital  ImagesA Robust Watermarking Technique Based On Dwt on Digital  Images
A Robust Watermarking Technique Based On Dwt on Digital ImagesIJMER
 
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...IJERA Editor
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarkingijceronline
 

Similar to Comparative Study on Watermarking & Image Encryption for Secure Communication (20)

B011110614
B011110614B011110614
B011110614
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
E04122330
E04122330E04122330
E04122330
 
Paper id 24201422
Paper id 24201422Paper id 24201422
Paper id 24201422
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
An Effective Semantic Encrypted Relational Data Using K-Nn Model
An Effective Semantic Encrypted Relational Data Using K-Nn ModelAn Effective Semantic Encrypted Relational Data Using K-Nn Model
An Effective Semantic Encrypted Relational Data Using K-Nn Model
 
A Literature Review on Image Steganography Using AES
A Literature Review on Image Steganography Using AESA Literature Review on Image Steganography Using AES
A Literature Review on Image Steganography Using AES
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
 
dwm
dwmdwm
dwm
 
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
 
P017329498
P017329498P017329498
P017329498
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure image
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
A Robust Watermarking Technique Based On Dwt on Digital Images
A Robust Watermarking Technique Based On Dwt on Digital  ImagesA Robust Watermarking Technique Based On Dwt on Digital  Images
A Robust Watermarking Technique Based On Dwt on Digital Images
 
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarking
 

More from IJTET Journal

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityIJTET Journal
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiIJTET Journal
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesIJTET Journal
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterIJTET Journal
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
 

More from IJTET Journal (20)

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For Security
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile Application
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query Services
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing Techniques
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting Structures
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC Converter
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
 

Recently uploaded

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 

Recently uploaded (20)

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 

Comparative Study on Watermarking & Image Encryption for Secure Communication

  • 1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 1 – MAY 2015 - ISSN: 2349 - 9303 1 Comparative Study on Watermarking & Image Encryption for Secure Communication Ajna Madanan1 1 AnnaUniversity, ECE, ajna.madanan@gmail.com Dr. S. Poornachandra2 2 Anna University, ECE dean.iqac.snsce@gmail.com Abstract—Over the past decades, research in security has concentrated on the development of algorithms and protocols for authentication, encryption and integrity of data. Despite tremendous advances, several security problems still afflict system’s. In this android app watermarking and encryption is being applied on images and data. Because of the human visual system’s low sensitivity to small changes and the high flexibility of digital media, anyone can easily make small changes in digital data with low perceptibility. Here watermarking and encryption are being performed in wavelet domain. Here in watermarking, the coefficients of watermarks are being embedded with the coefficients of the original image. Encryption is being done in wavelet domain so that the probability of an intruder trying to access the contents is very much minimized. Thus, this model provides a high level of security. Index Terms— Security, wavelets, watermarking, encryption, intruder. ——————————  —————————— 1 INTRODUCTION xplosive growth in multimedia technology and its applications has escalated the necessity to build secure methods for legal distribution of the digital content. Presently need for protection against unauthorized copying and distribution has increased. Thus, there aroused apprehensions over copyright protection of digital contents. The solution to this problem is digital watermarking, which is the most common and possibly the strongest technique for protecting digital data. Cryptography ensures that the messages are secure from possible ―attacks‖, which are impersonation, eavesdropping etc. Watermarking is a method of data embedding and information hiding. In digital watermarking, patterns of bits are inserted into a digital image, video or audio file that helps in identifying the copyright information, i.e. author, rights etc. It is a concept closely related to steganography. Watermarking is considered as a special technique of steganography where one message is embedded in another and the two messages are related to each other in some way. In digital watermarking a low energy signal is imperceptibly embedded into another signal. The low-energy signal is known as watermark. The main signal in which the watermark is embedded is referred to as cover signal since it covers the watermark. The entity known as watermark key is used for embedding and detecting watermark signal. In image watermarking, information is embedded into cover media for proving ownership identification. Various watermarking techniques have been proposed by many authors in the last several years, which include spatial domain and transform domain watermarking. To provide security of the images in the multimedia environment, encryption plays an important role. Image encryption ensures confidential transmission and storage of image over internet. Image encryption has applications in multimedia systems, internet communication, telemedicine, medical imaging, and military communication to name a few. Steganography and cryptographic methods are used together with wavelets to increase the security of the data while transmitting through networks. A combination of both encryption with steganography allows better private communication. The goal of steganography is to avoid drawing suspicion to the transmission of the secret message. In this paper RSA algorithm is being used for encryption. The RSA encryption technique is being named after the inventors Ron Rivest, Adi Shamir, and Len Adleman in 1977. RSA is a public-key cryptography system. This algorithm is based on the difficulty of factorizing large numbers that have two and only two factors (prime numbers). It works on a public key system. Everyone would know the public key. Using public key a user can encrypt data, but cannot decrypt it. The person who possesses the private key can only decrypt it. Theoretically, it may be possible, but it is extremely difficult to generate the private key from the public key; this makes the RSA algorithm a very popular choice in data encryption. E ————————————————  Ajna Madanan is currently pursuing masters degree program in electronics and communication engineering in Anna University, India, PH- 8220829679. E-mail: ajna.madanan@gmail.com  V.J. Subashini is currently Associate Professor in Computer Applications in AnnaUniversity, India, PH-9444057965. E-mail: vjsubashini@yahoo.com  Dr.S. Poornachandra is currently the dean /IQAC in electronics and communication engineering in Anna University, India, PH-8643844943. E- mail: dean.iqac.snsce@gmail.com
  • 2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 1 – MAY 2015 - ISSN: 2349 - 9303 2 2 RELATED WORK Wavelet based image watermarking is gaining more popularity because of its resemblance to the human visual system. In the wavelet-based perceptual watermark masking proposed by Khalil Zebbiche and FouadKhelifi [1], the perceptual masking model takes into consideration local brightness, band sensitivity and texture masking to compute a weight for each DWT coefficient of the fingerprint image. Thus, the perceptual model consists of a spatial frequency sensitivity function and two masking components based on local brightness and texture masking. The watermarking scheme yields a better robustness (i.e. lower BER). The bit error ratio or bit error rate (BER) is the number of bit errors divided by the total number of transferring bits during a time interval. M. Barni [2] have developed an improved wavelet-based watermarking through pixel-wise masking. It is mainly based on masking the watermark according to characteristics of Human Visual System (HVS). The watermark is being adaptively added to the largest detail bands. The watermark weighing function is calculated as a simple product of data extracted from HVS model. The watermark is being detected by correlation. Victor [3] have developed an algorithm that relies upon adaptive image watermarking in high resolution sub-bands of DWT. N. Kaewkamnerd and K.R. Rao [4] developed a wavelet based image adaptive watermarking scheme. Embedding is performed at higher level sub-bands of wavelet transform, even though this may clearly change the image fidelity. Bo Chen and Hang Shen [5] have developed a new robust fragile double image watermarking algorithm using improved pixel-wise masking model and a new bit substitution based on pseudo-random sequence. The method embeds robust and fragile watermark into the insensitive part and sensitive part of wavelet coefficients making two watermarks non-interfering. Peng Liu and Zhizhong Ding [6] proposed a blind image watermarking scheme based on wavelet tree quantization. Here largest two coefficients are selected as significant coefficients and the difference between them is taken as significant difference. Watermark bits are embedded by comparing the significant difference with an average significant difference value and maximum difference coefficients are quantized. Mohammad. A. B. Younes [7] introduced a block-based transformation algorithm based on the combination of image transformation and a well-known encryption and decryption algorithm called Blowfish. The original image is being divided into blocks that are then rearranged into a transformed image using a transformation algorithm, and then the transformed image is encrypted using the Blowfish algorithm. The results show that the correlation between image elements was significantly decreased by using this technique. The results also showed that increasing the number of blocks by using smaller block sizes resulted in a lower correlation and higher entropy. The researches and applications of applying digital watermarking to Geo-information data are still very inadequate. Watermarking techniques that are developed for multimedia data cannot be directly applied to the satellite images because here the analytic integrity of the data, rather than the perceptual quality, is of primary importance. Also satellite images have higher requirements in content security. It desires not only watermarking for copyright protection, but also encryption during storage and transmission for preventing information leakage. As the demand to protect the sensitive and valuable data from satellites has increased, a new method for satellite image security by combining DWT-DCT watermarking and AES encryption has been implemented [8]. To improve performance, discrete wavelet transform (DWT) has been combined with another equally powerful transform which is discrete cosine transform (DCT). The combined DWT-DCT watermarking algorithm’s imperceptibility was better than the performance of the DWT approach. For watermarking, the preferred color model must be HSV (Hue, Saturation and Value) rather than RGB because it is the most closely related color model with Human Visual System [9]. Salt and pepper noise of input color satellite image can be removed by using Modified decision based unsymmetrical trimmed median filter (MDBUTMF) algorithm. Prashant Shinde and Chetan Mohol [10] have proposed application for Android OS that permits to add an invisible or visible watermarking into an image of the current designations. 3 PROPOSED SYSTEM Here encryption is performed in wavelet domain so that the probability of an intruder trying to access the contents is very much minimized. Encryption is being provided after watermarking so that security level can be increased. 3.1 Transmission Section Fig. 1. Extracted watermark using Haar wavelet Here the original image and watermark are being converted to wavelet coefficients using Haar transform. The coefficients of the watermark are added with the coefficients of the original image to get the watermarked image. During the embedding process, the watermark coefficients are being embedded into the highest value wavelet coefficient of the original image. Here for the encryption, RSA algorithm is being used. While encrypting, keys are also used along with user-typed message which is being converted to wavelet coefficients. After encryption they are being transmitted. This is being shown in Fig. 1. Encryption is being provided after watermarking so that security level can be increased.
  • 3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 1 – MAY 2015 - ISSN: 2349 - 9303 3 3.2 Receiver Section Fig. 2. Extracted watermark using Haar wavelet After the reception, the user-typed message would be converted to wavelet coefficients and then it would be used for decryption along with the keys. By applying inverse DWT, the image and watermark image would be returned. The watermark is removed at the receiving end with the help of the key and the original image. This process is called watermark extraction. In the present model, only threshold is being considered. This is being shown in Fig. 2. 4 RESULT ANALYSIS Performance metrics used here are Mean Square Error and Peak Signal-to-Noise Ratio and visual comparison which are done through correlation. Mean Square Error (MSE) allows comparing the ―true‖ pixel values of the original image to the degraded image. MSE represents the average of the squares of the "errors" between actual image and noisy image. Errors are the amount by which the values of the original image differ from the degraded image. MSE can be found using the equation: (1) The notations used are listed below. 𝑋 (𝑖, 𝑗): Original image, 𝑋′ (𝑖, 𝑗): Watermarked image, and Nt : Size of image Peak Signal-to-Noise Ratio(PSNR) is an expression for finding the ratio between the maximum possible value (power) of a signal and the power of distorting noise that affects the quality of its representation. As many signals have a very wide dynamic range (ratio between the largest and smallest possible values of a changeable quantity), PSNR is frequently expressed in terms of the logarithmic decibel scale. PSNR can be found using the equation: (2) Here Matlab is being used as the simulation software. On applying different wavelets such as Haar, Daubechies, Coiflet, Symlet on Fig. 3, various values of MSE and PSNR are as follows: TABLE I MSE AND PSNR VALUES USING HAAR WAVELET Haar Wavelet MSE PSNR 124.2513 27.1878 Fig. 3. Extracted watermark using Haar wavelet In Table I and II, it can be seen that Haar wavelet and db 1 (Daubechies wavelet) produces the same PSNR and MSE values. From Fig. 3 and 4(a), it is seen that watermark extracted are as same as the original one. In Daubechies daughter wavelets, i.e. from DB 2 to DB 10 in Fig. 4, it is seen that spots are being introduced in the extracted watermark and also the left side is being distorted. TABLE II MSE AND PSNR VALUES USING DAUBECHIES WAVELET Daubechies Wavelet Daughter Wavelets MSE PSNR DB 1 124.2513 27.1878 DB 2 123.0029 27.2316 DB 3 121.3821 27.2893 DB 4 119.5124 27.3567 DB 5 117.6615 27.4245 DB 6 116.3122 27.4745 DB 7 114.9985 27.5239 DB 8 113.5129 27.5803 DB 9 111.6682 27.6515 DB 10 110.1306 27.7117 (a) (b) (c) (d) (e) (f) (g) (h) (i) (j) Fig. 4. Extracted watermark using Daubechies daughter wavelet i.e. from DB 1 to DB 10.
  • 4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 1 – MAY 2015 - ISSN: 2349 - 9303 4 Table III MSE and PSNR values using Symlet wavelet Symlet Wavelet Daughter Wavelets MSE PSNR SYM 2 123.0029 27.2316 SYM 3 121.3821 27.2893 SYM 4 111.4139 27.6614 SYM 5 108.2783 27.7854 SYM 6 104.9880 27.9194 SYM 7 105.9100 27.8814 SYM 8 098.0600 28.2159 (a) (b) (c) (d) (e) (f) (g) Fig. 5. Extracted watermark using Symlet daughter wavelet i.e. from SYM 2 to SYM 8. Similarly, in Symlet daughter wavelets, i.e. from SYM 2 to SYM 8, it is seen that spots are being introduced and its intensity increases in the increasing order of Symlet daughter wavelets. Also the left side is being distorted and it increases more while reaching SYM 8. This can be seen in Fig. 5. Table IV MSE and PSNR values using Coiflet wavelet Coiflet Wavelet Daughter Wavelets MSE PSNR COIF 1 117.6857 27.4236 COIF 2 109.5243 27.7357 COIF 3 102.0552 28.0425 COIF 4 095.2216 28.3434 COIF 5 087.2121 28.7250 (a) (b) (c) (d) (e) Fig. 6. Extracted watermark using Coiflet daughter wavelet i.e. from COIF 1 to COIF 5 Similarly from Table III and IV it is seen that degradation of image quality increases as one goes down. Degradation in Coiflet is more when compared to Symlet wavelet as seen in Fig. 6. Therefore, from the above analysis, it is being concluded that Haar wavelet and DB 1 of Daubechies wavelet produces better results by comparing extracted watermark with the original image. 5 CONCLUSION This paper introduces a model that provides a high level of security by using both watermarking and encryption in the wavelet domain. Due to this the probability of an intruder’s access to the contents is very much minimized. Fig. 7. Images a) Original Image b) Watermark Image c) Watermarked Image d) Extracted watermark Here watermarking has been implemented using both grayscale and color images and watermark was extracted successfully. Fig. 7 shows the original image, watermark, watermarked image and the extracted watermark. By comparing the original watermark image and the extracted watermark images, it is seen that Haar wavelet produced better results. ACKNOWLEDGMENT I extend my heart-felt thanks to my Project Guide, Dr. S. Poornachandra, Dean, IQAC, for his remarkable guidance, encouragement, valuable suggestions and support for the completion of this Project. I take immense pleasure in expressing my humble note of gratitude to, Dr. Karthikeyan V.V., Head of Department for giving the permission to carry my project in the department. I am highly grateful to our PG Project Coordinator Dr. G.K.D. PrasannaVenkatesan, for his valuable suggestions throughout the course of this project. I record my indebtedness to our Principal Dr. N. Gunasekaran, for his guidance and sustained encouragement for the completion of the project. I also extend my thanks to Mrs. V.J. Subashini, Senior Assistant Professor, Jerusalem College of Engineering, Chennai, for her remarkable guidance, encouragement, valuable suggestions and support for the completion of this Project. I also extend my thanks to Faculty members, my parents, and friends for providing their guidance and moral support in successfully completing the Project.
  • 5. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 1 – MAY 2015 - ISSN: 2349 - 9303 5 REFERENCES [1] Khalil Zebbiche and FouadKhelifi, ―Efficient wavelet-based perceptual watermark masking for robust fingerprint image watermarking‖, IET Image Process, Vol. 8, Iss. 1, pp. 23–32 doi: 10.1049/iet-ipr.2013.0055, 2014. [2] Barni M, Bartolini F, Piva, ―An Improved Wavelet Based Watermarking Through Pixelwise Masking‖, IEEE transactions on image processing, Vol. 10, 2001 pp.783-791. [3] Victor V., Guzman, Meana, ―Analysis of a Wavelet-based Watermarking Algorithm‖, IEEE Proceedings of the International Conference on Electronics, Communications and Computer, 2004, pp. 283-287. [4] N. Kaewkamnerd and K.R. Rao, ―Wavelet Based Image Adaptive Watermarking Scheme‖, IEEE Electronic Letters, Vol. 36,Feb. 2000, pp.312-313. [5] Bo Chen, Hong Shen, ―A New Robust-Fragile Double Image Watermarking Algorithm‖, Third IEEE International Conference on Multimedia and Ubiquitous Engineering,2009, pp. 153-157 [6] Peng Liu, Zhizhong Ding, ―A Blind Image Watermarking Scheme Based on Wavelet tree Quantization‖, Second IEEE International Symposium on Electronic Commerce and Security, 2009, pp. 218- 222. [7] Mohammad Ali BaniYounes and AmanJantan, ―Image Encryption Using Block-Based Transformation Algorithm‖, IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03, 2008. [8] Naida.H.Nazmudeen, Farsana.F.J., ―A New Method for Satellite Image Security Using DWT-DCT Watermarking and AES Encryption‖, IJIRSET,Volume 3, Special Issue 5, July 2014 [9] Rawan I. Zaghloul, Enas F. Al-Rawashdeh, ―HSV Image Watermarking Scheme Based on Visual Cryptography‖, World Academy of Science, Engineering and Technology Vol:20 2008-08- 23 [10] Prashant Shinde and Chetan Mohol, ―Copyright Protection for Images on Android Phones‖, IJRET, Volume: 02, Issue: 11, Nov- 2013