SlideShare a Scribd company logo
1 of 4
Download to read offline
International Refereed Journal of Engineering and Science (IRJES)
ISSN (Online) 2319-183X, (Print) 2319-1821
Volume 1, Issue 3(November 2012), PP.01-04
www.irjes.com
                         Lossless Reversible Visible Watermark
                     1
                         Ms.Devayani Attarde , 2 Prof. Shriniwas Gadage
                                    1
                                     (Computer, G.H.R.C.E.M/Pune, India)
                                    2
                                     (Computer, G.H.R.C.E.M./ Pune, India)

ABSTRACT : Digital watermarking is on high demand for the contained protection which is the efficient way
to protect the digital properties recently. This paper review several techniques about digital
watermarking(visible as well as invisible) and a new approach of lossless reversible watermarking techniques
with robust security is explained. It consists of mathematical model. It is a process of embedding information in
digital signal in a such way that anyone unable easily to remove it. However, most of the scheme do not support
for removing visible watermark. Experimental expected result shows a good result than other methods
mathematically.
Keywords - Watermarking, Lossless visible Watermark, Mathematical model, Extraction of watermark,
visible.
                                          I     INTRODUCTION
          Watermarking alters the original data I with the watermark data W such that the original image and the
watermark can be recovered later. Some factors related to watermarking are robustness, security, transparency,
complexity and capacity and some of these parameters are mutually exclusive tradeoffs. Robustness is related to
the reliability of watermark detection after it has been processed through various signal-processing operations.
Security deals with the difficulty of removing the watermark. A scheme is considered secure if the knowledge of
the embedding algorithm does not help in detecting the hidden data bits. Capacity relates to the amount of
information that can be embedded in a given cover object. It is important for the watermarked image to be
resistant to common image operations to ensure that the hidden information is still retrievable after such
alterations. Methods of the second type, on the other hand, yield visible watermarks which are generally clearly
visible after common image operations are applied.
In addition, visible watermarks convey ownership information directly on the media and can deter attempts of
copyright violations. Embedding of watermarks, either visible or invisible, degrade the quality of the host media
in general. A group of techniques, named reversible watermarking, allow legitimate users to remove the
embedded watermark and restore the original content as needed. However, not all reversible watermarking
techniques guarantee lossless image recovery, which means that the recovered image is identical to the original,
pixel by pixel. Lossless recovery is important in many applications where serious concerns about image quality
arise. Some examples include forensics, medical image analysis, historical art imaging, or military applications.
Compared with their invisible counterparts, there are relatively few mentions of lossless visible watermarking in
the literature.

                                     II       LITERATURE REVIEW
         Several lossless invisible watermarking techniques have been proposed in the past. In circular
interpretation of bijective transformations . The histograms of groups of pixels are mapped to a circle. The
transform is chosen so as to provoke the rotation of the histograms around the circle. The relative orientation of
the histograms of two groups of pixels conveys one bit of information. The retrieval of the embedded
information and, consequently, the reversibility process are not altered by wrapped around pixels. Additionally,
the visual quality of the watermarked images does not suffer from the classic “salt-and-pepper” artifact. Finally,
the extraction of the complete embedded message is still possible after alteration of the watermarked image.
This robustness permits conveying embedded information from lossless to lossy environments.[6].For
difference-expansion (DE)-based reversible data hiding, the embedded bit-stream mainly consists of two parts:
one part that conveys the secret message and the other part that contains embedding information, including the
2-D binary (overflow) location map and the header file. The first part is the payload while the second part is the
auxiliary information package for blind detection. To increase embedding capacity, we have to make the size of
the second part as small as possible. However, the compressibility of the overflow location map is still
undesirable in some image types they focus on improving the overflow location map. They design a new
embedding scheme that helps them to construct an efficient payload-dependent overflow location map. Such an
overflow location map has good compressibility. Their accurate capacity control capability also reduces
unnecessary alteration to the image. Under the same image quality, the algorithm often has larger embedding


                                                    www.irjes.com                                        1 | Page
Lossless Reversible Visible Watermarking

capacity. It performs well in different types of images, including those where other algorithms often have
difficulty in acquiring good embedding capacity and high image quality[7].

           Mohanty et al. [2] proposed a visible watermarking technique in the discrete cosine transform (DCT)
 domain. Their scheme modifies each DCT coefficient by C_ = αC + βW, where C and W are the DCT
 coefficients of original image and watermark, respectively. The parameters α and β are determined by
 exploiting the texture sensitivity of human visual model (HVS). Huang [5] proposed a visible watermarking
 scheme with discrete wavelet transform (DWT). The intensity of the watermark in different regions of the
 image are varied depending on the underlying content of the image and humans’ sensitivity to the spatial
 frequency. However, these two schemes are not reversible. Hu et al. [4 proposed a removable visible
 watermarking. The scheme uses a key to determine the unchanged coefficients, and the pixel-wise varying
 parameters of the embedder are calculated from those unchanged coefficients. Thus, the user with the correct
 key in the receiver end can recalculate the parameters to remove the visible watermark from the watermarked
 image. However, the scheme cannot perfectly recover the original image due to rounding error caused by
 wavelet transform. In this paper Novel reversible visible watermarking scheme which meets the three major
 requirements of visibility, transparency and robustness for visible Watermarking . It additionally provides the
 capability that only the user with correct key can lossless restores the original image from the visible
 watermarked image. The variance of the key compromises between the transparency of visible Watermarked
 image and robustness . Users with the wrong key cannot successfully remove the visible watermark.[3]

         A next approach is to manipulate a group of pixels as a unit to embed a bit of information .Although
 one may use lossless invisible techniques to embed removable visible watermarks, the low embedding
 capacities of these techniques hinder the possibility of implanting large-sized visible watermarks into host
 media. As to lossless visible watermarking, the most common approach is to embed a monochrome watermark
 using deterministic and reversible mappings of pixel values or DCT coefficients in the watermark region.
 Another approach is to rotate consecutive watermark pixels to embed a visible watermark. One advantage of
 these approaches is that watermarks of arbitrary sizes can be embedded into any host image. However, only
 binary visible watermarks can be embedded using these approaches, which is too restrictive since most
 company logos are colorful. In this paper, a new method for lossless visible watermarking is proposed by using
 appropriate compound mappings that allow mapped values to be controllable. The mappings are proved to be
 reversible for lossless recovery of the original image. The approach is generic, leading to the possibility of
 embedding different types of visible watermarks into cover images. Two applications of the proposed method
 are demonstrated, where opaque monochrome watermarks and no uniformly translucent full-color ones are
 respectively embedded into color images. More specific compound mappings are also created and proved to be
 able to yield visually more distinctive visible watermarks in the watermarked image.

                                 III     SYSTEM ARCHITECTURE




                                 IV      MATHEMATICAL MODEL
          Irrespective of the strict system and security requirements, we start with a basic watermarking model
having three basic functions: Watermark Generation(G), Watermark Embedding(E), and Extraction(X). To
denote different data within this context, plain letters indicate the original version, and respective single bar
letter and tilde letter indicates their watermarked and estimated version accordingly, where applicable. These
basic functions do the following in digital image watermarking: Watermarking Generation(G) takes a original
image data(i) and Other image data(j) (e.g., logo) as input and yield a watermark(w), Watermark Embedding
(E) takes a original image-data(i), embedding key(e) and yields a watermarked image ( ) as output.
Watermark Extraction (X) takes a watermarked image-data ( ) and Extraction key and yields the original


                                                   www.irjes.com                                        2 | Page
Lossless Reversible Visible Watermarking

image-data ( ) and other image data( ) as outputs . Thus, a basic watermarking scheme for digital images, in
general, can be defined as a 5-tuple ( ,G,W,E,X ) such that:

 (1) , the image-data space, is a set of Z+ and its each element is a function of co-ordinates such that f(x,y) for
   2D-space, where x Є Z+, y Є Z+, z ЄZ+. Here, Z+ is the set of positive integer, Z+ = {|a| >= 0 : a Є Z}. An
   element of image data space is called an image of a*b size for 2D-space, where, a Є Z+ b ЄZ+, and x = {
   1,2,3,…. a}, y = {1,2,3……b}, I ,J, and are subset of , where

         a)I is the set of original unwatermarked image-data, i.e I

         b)J is the set of other image-data used for watermark        generation, i.e., (J     : J ∩ I = Ø)

         c)   is the set of watermarked image-data, i.e

         d)   is the set of estimated original image-data, i.e.,

         e) is the set of estimated other image-data, i.e (        )

(2)G is a function G: I * J -> W that is used for watermark generation.

(3)E is a function E:I * W ->    that is used for watermark embedding.

(4)X is a function X:      * i -> *         {┴) that is used for watermark Extraction, indicates a failure. A
  watermark(W) is valid if and only if it is obtained from valid inputs,(I,J) and valid watermark generation
  function such that, G : I * J -> W. Similarly, a watermarked image ( ) is valid if and only if is obtained from
  valid inputs,(I,W) and valid watermark embedding function (E) such that E : I * W -> . (More formally, we
  can define a digital image watermarking system to be complete, if the following is true: (I ,j) Є I * J ( , )
  Є *     |   ≈i,    ≈j : X(E(i,(G(i, j ))) = ( , ).Here,      ≈ i implies that       is perceptually similar to i. The
  same applies to ≈ j.

                                        V      IMPLEMENTATION
         A. Project Methods
         Watermarking Generation(G) takes a original image data(i) and Other image data(j) (e.g., logo) as
input and yield a watermark(w), Watermark Embedding (E) takes a original image-data(i), embedding key(e)
and yields a watermarked image ( ) as output. Watermark Extraction (X) takes a watermarked image-data ( )
and Extraction key and yields the original image-data ( ) and other image data ( ) as outputs. In watermark
generation original image data is set P= {p1,p2,….pn) and Watermark image data set is mapped as Q
=(q1,q2,…..qn)


                               (1)The compound mapping described by (1) is indeed reversible, can be derived
exactly from using the following formula:


                                (2)




                                                     www.irjes.com                                            3 | Page
Lossless Reversible Visible Watermarking




 B. Test cases(Evaluation Parameters)
 1) Visibility A watermarking system is called visible (or perceptible), if the embedding function(E) embeds a
 given watermark (w Є W) in an image (i ЄI) such that the watermark (w Є W ) at least noticeably appears on
 the watermarked image,(           Є ). That is:      (i, w) Є I * W:| Ee (I,w) – i|=    |   ≈w.

 2) Blindness A watermarking system is called blind (or oblivious) if the extraction (X) function takes the
 original image (I) and watermark (W) whichever applies as input. Contrariwise, the watermarking system is
 called non-blind (or non-oblivious or informed) if functions X, take I and W, where appropriate as input.
 Otherwise, the watermarking system is called semi-blind. Thus, for non-blind watermarking system, Xx: * I *
     - >    U {┴} and for blind watermarking system: Xx: *            - >    U {┴) Similarly, for semi-blind
 watermarking, Xx: * -> * U{┴} is true.

                                           VI       EXPERIMENTAL RESULT
          Implementation proposed that an provably allow mapped values to always be close to the desired
 watermark if color estimates are accurate. Also described are pseudo randomization techniques ,which can
 prevent illicit recoveries of original images without correct input keys.




                                  Original                        Recovered

                                                  VII       CONCLUSION
           In this paper a new method for reversible visible Water marking with lossless image recovery
 capability has been proposed. The method uses one-to-one compound mappings that can map image pixel
 values to those of the desired visible watermarks .mathematically prove the reversibility of the compound
 mappings for lossless reversible visible watermarking .The compound mappings allow different types of visible
 watermarks to be embedded.
                                                         REFERENCES
 Journal Papers:
[1.]    A Contrast-Sensitive Reversible Visible Image        Watermarking Technique Ying Yang, Xingming Sun, Senior Member, IEEE,
        Hengfu Yang, Chang-Tsun Li, and Rong Xiao
[2.]    A Sequential Quantization Strategy for Data Embedding and Integrity Verification Yiu-ming Cheung, Senior Member, IEEE, and
        Hao-tian Wu, Student Member, IEEE
[3.]    DE-Based Reversible Data Hiding With Improved Overflow Location Map Yongjian Hu, Heung-Kyu Lee, and Jianwei Li
[4.]    A Reversible Visible Watermarking Scheme for Compressed Images Reuben A. Farrugia
[5.]    A High Secure Reversible Visible Watermarking Scheme han-Min Tsai, Long-Wen Chang
[6.]    Reversible Visible Watermarking With Lossless Data Embedding Based On difference Value Shift Xinpeng Zhang, Shuozhong Wang
        And Guorui Feng
[7.]    Lossless Visible Watermarking Shu-Kei Yip, Oscar C. Au, Chi-Wang Ho, Hoi-Ming Wong
[8.]   On Secure Digital Image Watermarking Techniques Manjit Thapa1, Sandeep Kumar Sood.
             Books:
[1.]    Digital Image Processing Dr.Rong Zhang.

                                                             www.irjes.com                                              4 | Page

More Related Content

What's hot

Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDWatermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDIRJET Journal
 
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...gerogepatton
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...ijistjournal
 
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &IAEME Publication
 
7 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-857 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-85Alexander Decker
 
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarkingijsrd.com
 
Semi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svdSemi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svdsipij
 
3 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-343 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-34Alexander Decker
 
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN ijcseit
 
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...IDES Editor
 
Aw2419401943
Aw2419401943Aw2419401943
Aw2419401943IJMER
 
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...P singh
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageIOSR Journals
 

What's hot (17)

Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDWatermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
 
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
 
1820 1824
1820 18241820 1824
1820 1824
 
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
 
A0360105
A0360105A0360105
A0360105
 
Kt3618371840
Kt3618371840Kt3618371840
Kt3618371840
 
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &
 
7 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-857 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-85
 
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
 
Semi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svdSemi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svd
 
3 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-343 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-34
 
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
 
1918 1923
1918 19231918 1923
1918 1923
 
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
 
Aw2419401943
Aw2419401943Aw2419401943
Aw2419401943
 
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 

Viewers also liked

International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
B130912
B130912B130912
B130912irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
B210917
B210917B210917
B210917irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 

Viewers also liked (9)

International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
B130912
B130912B130912
B130912
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
B210917
B210917B210917
B210917
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 

Similar to A130104

Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—aAgnianbu Wrong
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessIRJET Journal
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET Journal
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
 
A Review of Digital Watermarking Technique for the Copyright Protection of Di...
A Review of Digital Watermarking Technique for the Copyright Protection of Di...A Review of Digital Watermarking Technique for the Copyright Protection of Di...
A Review of Digital Watermarking Technique for the Copyright Protection of Di...IRJET Journal
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarkingijsrd.com
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingEditor IJMTER
 
Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...nooriasukmaningtyas
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
 
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET Journal
 
Reversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting TechniqueReversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET Journal
 
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...CSCJournals
 

Similar to A130104 (20)

Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—a
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Iw3615491554
Iw3615491554Iw3615491554
Iw3615491554
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
 
dwm
dwmdwm
dwm
 
B011110614
B011110614B011110614
B011110614
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
A Review of Digital Watermarking Technique for the Copyright Protection of Di...
A Review of Digital Watermarking Technique for the Copyright Protection of Di...A Review of Digital Watermarking Technique for the Copyright Protection of Di...
A Review of Digital Watermarking Technique for the Copyright Protection of Di...
 
1820 1824
1820 18241820 1824
1820 1824
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarking
 
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking
 
Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
 
Reversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting TechniqueReversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting Technique
 
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
 

More from irjes

Automatic Safety Door Lock System for Car
Automatic Safety Door Lock System for CarAutomatic Safety Door Lock System for Car
Automatic Safety Door Lock System for Carirjes
 
Squared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & OptimizationSquared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & Optimizationirjes
 
Analysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling ModelAnalysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling Modelirjes
 
Effects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface RoughnessEffects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface Roughnessirjes
 
Possible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constantsPossible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constantsirjes
 
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...irjes
 
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...irjes
 
Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model irjes
 
Energy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart CitiesEnergy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart Citiesirjes
 
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...irjes
 
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...irjes
 
An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...irjes
 
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...irjes
 
Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...irjes
 
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...irjes
 
The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...irjes
 
Understanding the Concept of Strategic Intent
Understanding the Concept of Strategic IntentUnderstanding the Concept of Strategic Intent
Understanding the Concept of Strategic Intentirjes
 
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...irjes
 
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of AgeRelation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Ageirjes
 
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block ArmorWave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armorirjes
 

More from irjes (20)

Automatic Safety Door Lock System for Car
Automatic Safety Door Lock System for CarAutomatic Safety Door Lock System for Car
Automatic Safety Door Lock System for Car
 
Squared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & OptimizationSquared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & Optimization
 
Analysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling ModelAnalysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling Model
 
Effects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface RoughnessEffects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface Roughness
 
Possible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constantsPossible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constants
 
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
 
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
 
Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model
 
Energy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart CitiesEnergy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart Cities
 
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
 
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
 
An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...
 
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
 
Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...
 
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
 
The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...
 
Understanding the Concept of Strategic Intent
Understanding the Concept of Strategic IntentUnderstanding the Concept of Strategic Intent
Understanding the Concept of Strategic Intent
 
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
 
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of AgeRelation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
 
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block ArmorWave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
 

A130104

  • 1. International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 1, Issue 3(November 2012), PP.01-04 www.irjes.com Lossless Reversible Visible Watermark 1 Ms.Devayani Attarde , 2 Prof. Shriniwas Gadage 1 (Computer, G.H.R.C.E.M/Pune, India) 2 (Computer, G.H.R.C.E.M./ Pune, India) ABSTRACT : Digital watermarking is on high demand for the contained protection which is the efficient way to protect the digital properties recently. This paper review several techniques about digital watermarking(visible as well as invisible) and a new approach of lossless reversible watermarking techniques with robust security is explained. It consists of mathematical model. It is a process of embedding information in digital signal in a such way that anyone unable easily to remove it. However, most of the scheme do not support for removing visible watermark. Experimental expected result shows a good result than other methods mathematically. Keywords - Watermarking, Lossless visible Watermark, Mathematical model, Extraction of watermark, visible. I INTRODUCTION Watermarking alters the original data I with the watermark data W such that the original image and the watermark can be recovered later. Some factors related to watermarking are robustness, security, transparency, complexity and capacity and some of these parameters are mutually exclusive tradeoffs. Robustness is related to the reliability of watermark detection after it has been processed through various signal-processing operations. Security deals with the difficulty of removing the watermark. A scheme is considered secure if the knowledge of the embedding algorithm does not help in detecting the hidden data bits. Capacity relates to the amount of information that can be embedded in a given cover object. It is important for the watermarked image to be resistant to common image operations to ensure that the hidden information is still retrievable after such alterations. Methods of the second type, on the other hand, yield visible watermarks which are generally clearly visible after common image operations are applied. In addition, visible watermarks convey ownership information directly on the media and can deter attempts of copyright violations. Embedding of watermarks, either visible or invisible, degrade the quality of the host media in general. A group of techniques, named reversible watermarking, allow legitimate users to remove the embedded watermark and restore the original content as needed. However, not all reversible watermarking techniques guarantee lossless image recovery, which means that the recovered image is identical to the original, pixel by pixel. Lossless recovery is important in many applications where serious concerns about image quality arise. Some examples include forensics, medical image analysis, historical art imaging, or military applications. Compared with their invisible counterparts, there are relatively few mentions of lossless visible watermarking in the literature. II LITERATURE REVIEW Several lossless invisible watermarking techniques have been proposed in the past. In circular interpretation of bijective transformations . The histograms of groups of pixels are mapped to a circle. The transform is chosen so as to provoke the rotation of the histograms around the circle. The relative orientation of the histograms of two groups of pixels conveys one bit of information. The retrieval of the embedded information and, consequently, the reversibility process are not altered by wrapped around pixels. Additionally, the visual quality of the watermarked images does not suffer from the classic “salt-and-pepper” artifact. Finally, the extraction of the complete embedded message is still possible after alteration of the watermarked image. This robustness permits conveying embedded information from lossless to lossy environments.[6].For difference-expansion (DE)-based reversible data hiding, the embedded bit-stream mainly consists of two parts: one part that conveys the secret message and the other part that contains embedding information, including the 2-D binary (overflow) location map and the header file. The first part is the payload while the second part is the auxiliary information package for blind detection. To increase embedding capacity, we have to make the size of the second part as small as possible. However, the compressibility of the overflow location map is still undesirable in some image types they focus on improving the overflow location map. They design a new embedding scheme that helps them to construct an efficient payload-dependent overflow location map. Such an overflow location map has good compressibility. Their accurate capacity control capability also reduces unnecessary alteration to the image. Under the same image quality, the algorithm often has larger embedding www.irjes.com 1 | Page
  • 2. Lossless Reversible Visible Watermarking capacity. It performs well in different types of images, including those where other algorithms often have difficulty in acquiring good embedding capacity and high image quality[7]. Mohanty et al. [2] proposed a visible watermarking technique in the discrete cosine transform (DCT) domain. Their scheme modifies each DCT coefficient by C_ = αC + βW, where C and W are the DCT coefficients of original image and watermark, respectively. The parameters α and β are determined by exploiting the texture sensitivity of human visual model (HVS). Huang [5] proposed a visible watermarking scheme with discrete wavelet transform (DWT). The intensity of the watermark in different regions of the image are varied depending on the underlying content of the image and humans’ sensitivity to the spatial frequency. However, these two schemes are not reversible. Hu et al. [4 proposed a removable visible watermarking. The scheme uses a key to determine the unchanged coefficients, and the pixel-wise varying parameters of the embedder are calculated from those unchanged coefficients. Thus, the user with the correct key in the receiver end can recalculate the parameters to remove the visible watermark from the watermarked image. However, the scheme cannot perfectly recover the original image due to rounding error caused by wavelet transform. In this paper Novel reversible visible watermarking scheme which meets the three major requirements of visibility, transparency and robustness for visible Watermarking . It additionally provides the capability that only the user with correct key can lossless restores the original image from the visible watermarked image. The variance of the key compromises between the transparency of visible Watermarked image and robustness . Users with the wrong key cannot successfully remove the visible watermark.[3] A next approach is to manipulate a group of pixels as a unit to embed a bit of information .Although one may use lossless invisible techniques to embed removable visible watermarks, the low embedding capacities of these techniques hinder the possibility of implanting large-sized visible watermarks into host media. As to lossless visible watermarking, the most common approach is to embed a monochrome watermark using deterministic and reversible mappings of pixel values or DCT coefficients in the watermark region. Another approach is to rotate consecutive watermark pixels to embed a visible watermark. One advantage of these approaches is that watermarks of arbitrary sizes can be embedded into any host image. However, only binary visible watermarks can be embedded using these approaches, which is too restrictive since most company logos are colorful. In this paper, a new method for lossless visible watermarking is proposed by using appropriate compound mappings that allow mapped values to be controllable. The mappings are proved to be reversible for lossless recovery of the original image. The approach is generic, leading to the possibility of embedding different types of visible watermarks into cover images. Two applications of the proposed method are demonstrated, where opaque monochrome watermarks and no uniformly translucent full-color ones are respectively embedded into color images. More specific compound mappings are also created and proved to be able to yield visually more distinctive visible watermarks in the watermarked image. III SYSTEM ARCHITECTURE IV MATHEMATICAL MODEL Irrespective of the strict system and security requirements, we start with a basic watermarking model having three basic functions: Watermark Generation(G), Watermark Embedding(E), and Extraction(X). To denote different data within this context, plain letters indicate the original version, and respective single bar letter and tilde letter indicates their watermarked and estimated version accordingly, where applicable. These basic functions do the following in digital image watermarking: Watermarking Generation(G) takes a original image data(i) and Other image data(j) (e.g., logo) as input and yield a watermark(w), Watermark Embedding (E) takes a original image-data(i), embedding key(e) and yields a watermarked image ( ) as output. Watermark Extraction (X) takes a watermarked image-data ( ) and Extraction key and yields the original www.irjes.com 2 | Page
  • 3. Lossless Reversible Visible Watermarking image-data ( ) and other image data( ) as outputs . Thus, a basic watermarking scheme for digital images, in general, can be defined as a 5-tuple ( ,G,W,E,X ) such that: (1) , the image-data space, is a set of Z+ and its each element is a function of co-ordinates such that f(x,y) for 2D-space, where x Є Z+, y Є Z+, z ЄZ+. Here, Z+ is the set of positive integer, Z+ = {|a| >= 0 : a Є Z}. An element of image data space is called an image of a*b size for 2D-space, where, a Є Z+ b ЄZ+, and x = { 1,2,3,…. a}, y = {1,2,3……b}, I ,J, and are subset of , where a)I is the set of original unwatermarked image-data, i.e I b)J is the set of other image-data used for watermark generation, i.e., (J : J ∩ I = Ø) c) is the set of watermarked image-data, i.e d) is the set of estimated original image-data, i.e., e) is the set of estimated other image-data, i.e ( ) (2)G is a function G: I * J -> W that is used for watermark generation. (3)E is a function E:I * W -> that is used for watermark embedding. (4)X is a function X: * i -> * {┴) that is used for watermark Extraction, indicates a failure. A watermark(W) is valid if and only if it is obtained from valid inputs,(I,J) and valid watermark generation function such that, G : I * J -> W. Similarly, a watermarked image ( ) is valid if and only if is obtained from valid inputs,(I,W) and valid watermark embedding function (E) such that E : I * W -> . (More formally, we can define a digital image watermarking system to be complete, if the following is true: (I ,j) Є I * J ( , ) Є * | ≈i, ≈j : X(E(i,(G(i, j ))) = ( , ).Here, ≈ i implies that is perceptually similar to i. The same applies to ≈ j. V IMPLEMENTATION A. Project Methods Watermarking Generation(G) takes a original image data(i) and Other image data(j) (e.g., logo) as input and yield a watermark(w), Watermark Embedding (E) takes a original image-data(i), embedding key(e) and yields a watermarked image ( ) as output. Watermark Extraction (X) takes a watermarked image-data ( ) and Extraction key and yields the original image-data ( ) and other image data ( ) as outputs. In watermark generation original image data is set P= {p1,p2,….pn) and Watermark image data set is mapped as Q =(q1,q2,…..qn) (1)The compound mapping described by (1) is indeed reversible, can be derived exactly from using the following formula: (2) www.irjes.com 3 | Page
  • 4. Lossless Reversible Visible Watermarking B. Test cases(Evaluation Parameters) 1) Visibility A watermarking system is called visible (or perceptible), if the embedding function(E) embeds a given watermark (w Є W) in an image (i ЄI) such that the watermark (w Є W ) at least noticeably appears on the watermarked image,( Є ). That is: (i, w) Є I * W:| Ee (I,w) – i|= | ≈w. 2) Blindness A watermarking system is called blind (or oblivious) if the extraction (X) function takes the original image (I) and watermark (W) whichever applies as input. Contrariwise, the watermarking system is called non-blind (or non-oblivious or informed) if functions X, take I and W, where appropriate as input. Otherwise, the watermarking system is called semi-blind. Thus, for non-blind watermarking system, Xx: * I * - > U {┴} and for blind watermarking system: Xx: * - > U {┴) Similarly, for semi-blind watermarking, Xx: * -> * U{┴} is true. VI EXPERIMENTAL RESULT Implementation proposed that an provably allow mapped values to always be close to the desired watermark if color estimates are accurate. Also described are pseudo randomization techniques ,which can prevent illicit recoveries of original images without correct input keys. Original Recovered VII CONCLUSION In this paper a new method for reversible visible Water marking with lossless image recovery capability has been proposed. The method uses one-to-one compound mappings that can map image pixel values to those of the desired visible watermarks .mathematically prove the reversibility of the compound mappings for lossless reversible visible watermarking .The compound mappings allow different types of visible watermarks to be embedded. REFERENCES Journal Papers: [1.] A Contrast-Sensitive Reversible Visible Image Watermarking Technique Ying Yang, Xingming Sun, Senior Member, IEEE, Hengfu Yang, Chang-Tsun Li, and Rong Xiao [2.] A Sequential Quantization Strategy for Data Embedding and Integrity Verification Yiu-ming Cheung, Senior Member, IEEE, and Hao-tian Wu, Student Member, IEEE [3.] DE-Based Reversible Data Hiding With Improved Overflow Location Map Yongjian Hu, Heung-Kyu Lee, and Jianwei Li [4.] A Reversible Visible Watermarking Scheme for Compressed Images Reuben A. Farrugia [5.] A High Secure Reversible Visible Watermarking Scheme han-Min Tsai, Long-Wen Chang [6.] Reversible Visible Watermarking With Lossless Data Embedding Based On difference Value Shift Xinpeng Zhang, Shuozhong Wang And Guorui Feng [7.] Lossless Visible Watermarking Shu-Kei Yip, Oscar C. Au, Chi-Wang Ho, Hoi-Ming Wong [8.] On Secure Digital Image Watermarking Techniques Manjit Thapa1, Sandeep Kumar Sood. Books: [1.] Digital Image Processing Dr.Rong Zhang. www.irjes.com 4 | Page