Submit Search
Upload
Review on Quantum Watermarking Techniques
•
0 likes
•
30 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i3/IRJET-V4I3140.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
IJNSA Journal
Information security by biometric waterking
Information security by biometric waterking
eSAT Publishing House
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
IRJET Journal
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET Journal
IRJET - Face Detection and Recognition System
IRJET - Face Detection and Recognition System
IRJET Journal
A Study of Iris Recognition
A Study of Iris Recognition
editor1knowledgecuddle
C6524029320
C6524029320
aissmsblogs
Recommended
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
IJNSA Journal
Information security by biometric waterking
Information security by biometric waterking
eSAT Publishing House
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
IRJET Journal
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET Journal
IRJET - Face Detection and Recognition System
IRJET - Face Detection and Recognition System
IRJET Journal
A Study of Iris Recognition
A Study of Iris Recognition
editor1knowledgecuddle
C6524029320
C6524029320
aissmsblogs
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET Journal
Graphical Password by Watermarking for security
Graphical Password by Watermarking for security
IJERA Editor
50120130406045
50120130406045
IAEME Publication
Nemex
Nemex
Philip Davies
Biometric Ear Recognition System
Biometric Ear Recognition System
IRJET Journal
Biometric and cyber security 1
Biometric and cyber security 1
ehab_madda
Biometric recognition using deep learning
Biometric recognition using deep learning
SwatiNarkhede1
Comparison of various Biometric methods
Comparison of various Biometric methods
Rupinder Saini
Iris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAE
Arab Federation for Digital Economy
hand vein structure authentication
hand vein structure authentication
Kumar Goud
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
idescitation
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
Bhargav Amin
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
iosrjce
Access Control
Access Control
Waseem Hamid Hussain
Iris based Human Identification
Iris based Human Identification
dswazalwar
Video Liveness Verification
Video Liveness Verification
ijtsrd
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET Journal
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET Journal
IRJET- Face Recognition based Attendance System using Raspberry Pi
IRJET- Face Recognition based Attendance System using Raspberry Pi
IRJET Journal
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET Journal
Information security by biometric waterking
Information security by biometric waterking
eSAT Journals
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
IRJET Journal
More Related Content
What's hot
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET Journal
Graphical Password by Watermarking for security
Graphical Password by Watermarking for security
IJERA Editor
50120130406045
50120130406045
IAEME Publication
Nemex
Nemex
Philip Davies
Biometric Ear Recognition System
Biometric Ear Recognition System
IRJET Journal
Biometric and cyber security 1
Biometric and cyber security 1
ehab_madda
Biometric recognition using deep learning
Biometric recognition using deep learning
SwatiNarkhede1
Comparison of various Biometric methods
Comparison of various Biometric methods
Rupinder Saini
Iris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAE
Arab Federation for Digital Economy
hand vein structure authentication
hand vein structure authentication
Kumar Goud
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
idescitation
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
Bhargav Amin
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
iosrjce
Access Control
Access Control
Waseem Hamid Hussain
Iris based Human Identification
Iris based Human Identification
dswazalwar
Video Liveness Verification
Video Liveness Verification
ijtsrd
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET Journal
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET Journal
IRJET- Face Recognition based Attendance System using Raspberry Pi
IRJET- Face Recognition based Attendance System using Raspberry Pi
IRJET Journal
What's hot
(19)
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image Processing
Graphical Password by Watermarking for security
Graphical Password by Watermarking for security
50120130406045
50120130406045
Nemex
Nemex
Biometric Ear Recognition System
Biometric Ear Recognition System
Biometric and cyber security 1
Biometric and cyber security 1
Biometric recognition using deep learning
Biometric recognition using deep learning
Comparison of various Biometric methods
Comparison of various Biometric methods
Iris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAE
hand vein structure authentication
hand vein structure authentication
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
Access Control
Access Control
Iris based Human Identification
Iris based Human Identification
Video Liveness Verification
Video Liveness Verification
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET- Face Recognition based Attendance System using Raspberry Pi
IRJET- Face Recognition based Attendance System using Raspberry Pi
Similar to Review on Quantum Watermarking Techniques
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET Journal
Information security by biometric waterking
Information security by biometric waterking
eSAT Journals
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
IRJET Journal
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication Methods
IRJET Journal
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
authority12
Ah04605234238
Ah04605234238
IJERA Editor
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET Journal
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
IJSRD
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...
IOSR Journals
Dz31840846
Dz31840846
IJERA Editor
Jq3417501753
Jq3417501753
IJERA Editor
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...
ijsrd.com
B010510613
B010510613
IOSR Journals
Ki2417591763
Ki2417591763
IJERA Editor
Digital Image Security using Digital Watermarking
Digital Image Security using Digital Watermarking
IRJET Journal
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
Editor IJCATR
1709 1715
1709 1715
Editor IJARCET
1709 1715
1709 1715
Editor IJARCET
Digital watermarking techniques for security applications
Digital watermarking techniques for security applications
Kannekanti Utthej
Image processing research proposal
Image processing research proposal
Iftikhar Ahmad
Similar to Review on Quantum Watermarking Techniques
(20)
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
Information security by biometric waterking
Information security by biometric waterking
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication Methods
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
Ah04605234238
Ah04605234238
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Dz31840846
Dz31840846
Jq3417501753
Jq3417501753
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...
B010510613
B010510613
Ki2417591763
Ki2417591763
Digital Image Security using Digital Watermarking
Digital Image Security using Digital Watermarking
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
1709 1715
1709 1715
1709 1715
1709 1715
Digital watermarking techniques for security applications
Digital watermarking techniques for security applications
Image processing research proposal
Image processing research proposal
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
sarkmank1
Computer Networks Basics of Network Devices
Computer Networks Basics of Network Devices
ChandrakantDivate1
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
sumitt6_25730773
Computer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
ChandrakantDivate1
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
NANDHAKUMARA10
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
ppkakm
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
Max. shear stress theory-Maximum Shear Stress Theory Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory Maximum Distortional ...
ronahami
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
Ramkumar k
Online electricity billing project report..pdf
Online electricity billing project report..pdf
Kamal Acharya
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Omar Fathy
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
Hospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Quintin Balsdon
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
Amil baba
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
RashidFaridChishti
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
gragchanchal546
Recently uploaded
(20)
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
Computer Networks Basics of Network Devices
Computer Networks Basics of Network Devices
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
Computer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Max. shear stress theory-Maximum Shear Stress Theory Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory Maximum Distortional ...
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
Online electricity billing project report..pdf
Online electricity billing project report..pdf
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Hospital management system project report.pdf
Hospital management system project report.pdf
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Review on Quantum Watermarking Techniques
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 3 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 498 REVIEW ON QUANTUM WATERMARKING TECHNIQUES Taniya Panjiyar1, Neha Sharma2 1Student, Department of Electronics and Communication Engineering, Regional College for Education Research and Technology, Jaipur, Rajasthan, India 2Assistant Professor, Department of Electronics and Communication Engineering, Regional College for Education Research and Technology, Jaipur, Rajasthan, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In today’s Era, communication broadcasts over the internet have shield difficulties of the digital information. Hence, safety of undisclosed messages through transmission develops a hard issue. Digital watermarking has given that safety of digital information or finding information in contradiction of illegal misuses and sharing. Watermarkingis a technology that assures and marks likely data certification, safety and copyright protection of the info. The purpose of watermarking is to contain secreted data in multimedia info to guarantee safety examination. It would be then possible to develop the enclosed info, even if the info was inaccurate by one or extra non-dangerous spasms. In this paper, we present the numerous kinds ofwatermarking methodsandapplication section where watermarking method is compulsory. Furthermore a study on the somedifferenteffortispreparedin image watermarking area. Key Words: Quantum watermarking, Pseudo Random sequence, DCT-DWT and DWT-DCT Algorithm 1. INTRODUCTION Security of digital info has become a widespread matter due to the rapid growth of the universal multimedia technology. Copyright safety of digital info has developed an important problem over growing usage of internet. Digital watermarking is that tools that delivers safety, data authentication and copyright safety ofthedigital info.Digital watermarking is the procedure of inserting secret digital info, signal hooked on the digital media such asimage,video, acoustic and text. Later the implanted info is identified and removed out to disclose the actual identity of the digital media. Watermarking is usedforEvidenceofRights,Copying Hang-up, data verification, Data Hiding and Recording Monitoring. Digital Image Watermarking technology has numerous uses for safety of digital info, warranty, supply of the digital media and label of the user info. Watermarking of data has developed a very significantarea ininfohiding.This paper explores the key technologies of Digital Image Watermarking and explores its applicationsandapproaches for the safety sides. 1.1 WATERMARKING BASICS The simple model of Digital Image Watermarking contains two parts: 1. Watermark embedding 2. Watermark extraction The first technique is Watermark Embedding that is obtainable in Figure 1 and the second technique is the Watermark Removal that is obtainable in Figure 2. Fig -1: Watermarking Introducing approach Fig -2: Watermarking Removal Procedure Watermark Embedding is the method of implanting watermark into the unique image. The yield is the Watermarked image. This procedure is passed out at source’s side. Watermark Removal is the Procedure of identifying watermark from the Watermarked image. 1.2 PROPERTIES OF WATERMARKING The basic necessities of the digital watermarking can be treated as qualities, properties. Different uses require singular propertiesofwatermarking.Thedifferentattributes of the watermarking yield different place in application
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 3 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 499 design. The basic attributes/properties ofwatermarking are as follow: A. Robustness Strength refers to that the watermark inserted in data has the ability of perceiving watermark afterward a range of processingproceduresandspasms.The watermark should not eliminated by simple treatment methods. Hence watermark should be robust against some spasm. Robust watermarks are intended to fight normal processing. B. Fidelity Reliability or Imperceptibility is the most significant condition in watermarking scheme. Watermark cannot be notice by human eyes or ear, only be noticed through different processing of watermark indicator. It can be noticed by an official person only. Suchwatermarksareused for content or writer authentication and for noticing illegal copies of the data. In other way reliability can be measured as an amount of perceptual ease. C. Data Payload Data payload states that thequantityof bits implanted into the original image. Itistheutmostquantityof info that can be hidden lacking corrupting image quality. It can be calculated by the quantity of secreted information in the original data. This propertyshowshowmuchinfoshould be embedded as a watermark so that it can be efficiently detected throughout extraction procedure. D. Security A watermark system is said to be safe, if the unofficial person cannot eliminate the watermark without having packed consciousness of embedding algorithm, detector and arrangement of watermark. The safety is most significant feature of watermarking system. Only the official person can notice watermark. Thus, the copyrights security can attain in watermarking scheme. E. Computational Complexity Calculation complexity is well-defined as the quantity of time occupied by the watermarking algorithm for embedding and removal procedure. More computational trouble is required for the robust security and validity of the watermark. On the other hand, real-time applications include equally speed and proficiency. F. Inevitability well-defined as the probability to produce the original data throughout the watermark removal. The optimization of the constraints is equally competitive and cannot be simply done all together. A rational compromiseis continuously a requirement. Otherwise, if toughness to strong warp is a subject, the message that can be often secreted need not be excessively long. 1.3 CLASSIFICATION OF WATERMARKING In this part the digital watermarks, features, their methods and application are categorized and segmented into numerous classes. 1) According to human observation A. Detectable watermarking In this kind of watermarking methods the watermark is observable to the casual watcher. Watermark is an image or a data that is noticeable on primary image the watermark seems is a secondary glowing covered into the primary images. Fig-3: (a) the original Lena copy (b) the symbol to be watermarked (c) observable watermarked image and (d) unseen watermarked image [10] B. Undetectable watermarking Undetectable watermark is buried in the original content. It can be noticed by a certified person only. Watermark is implanting in such a way that interchanges madetothepixel content are perceptually not observed and it can be recovered only with suitable decoding process. 1.4 WATERMARKING APPLICATIONS Applications are listed as: A. Copyright protection one of the most significant application of watermarking iscopyrightprotectionfromthe illegal person. Ownership of digital media can be recognized in the case of a copyright clash by means of the implanted data as evidence.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 3 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 500 B. Broadcast Monitoring This applicationisusedtodisplay illegal broadcast station. It can authenticate whether the content is truly spread or not. C. Tamper Detection Delicate watermarks are usedforloss detection. If the watermark is despoiled or smashed, it displays presence of interfering and hence digital data cannot be trusted. D. Authentication and Integrity Verification The watermark is implanted to notice if the image has custom- made or not, this process can be used for verification. Reliability verification can be accomplished by means of delicate or semi fragilewatermark whichhaslittletoughness to amendment in an image. E. Fingerprinting The main aim of fingerprinting is to shield clients. If somebody got an authorized copy of a product, but reallocated criminally, fingerprinting can stop this. This can be accomplished by finding the whole transaction by implanting single strong watermark for each receiver. F. Content Description This watermark cancomprisesome complete info of the host image for example classification and captioning. The volume of watermark for this kind of application should be comparatively large and there is no harsh requirement of toughness. G. Medical Applications In medical area the watermarking is important for the purpose of defending the hospital’s info from illegal people such as patient’s record etc. Security and proof of such data are now becoming very important in medical field where the digital data are effortlessly distributed. 2. PREVIOUS METHEDOLOGY In 2000, Chen et al.’s [1]projectedanadaptivewatermarking structure. This system inserts a binary image as watermark in DCT method. The watermarked image is not visible by human visual scheme. It customs a feature based technique to trace the watermark places throughout embedding and extracting. The feature-based technique customs the sobel edge-detector to acquire the gradient magnitude and this outcome is proportional to thequantityofwatermark bits.In 2008, Wang H. et al. [2] suggested a chaotic watermarking scheme for authentication of JPEG pictures. The quantized DCT coefficients afterward entropy decoding are plotted to the primary values of the chaotic scheme, and then the produced watermark data by chaotic repetition is inserted into JPEG compressed domain. Re-quantizationprocessdoes not invalidate interfere recognitionduetodirectamendment of DCT coefficient after quantization. Removal isalsodonein the compression area. Extraction is quick and complexity of technique is demanded to underneath.In2009,Cheneta,[3] suggested a spatial area watermarking method based onthe notion of including block-wise dependency info in watermarking process for thwarting VQ spasmwithout doa deal on localization abilities of the system. The block-wise dependence bond among the chunks of the image is confirmed using fuzzy bunching standards; a fuzzy C-means procedure is used for this method. This technique lets one part of data to belong to two or extra clusters dissimilar other traditional tough clustering systems Like k means algorithm that give data points to a precise cluster. The system consists of validation of message inserting process and tamper recognition process. In 2011, Bhattacharya et al. [4] suggested a new method which creates usage of equally delicate and tough watermarking approaches. The embedded delicate watermark is used to assess the ruin undergone by the transferred images. Strong imagefeatures are used to construct the reference watermark from the established image, for judging the amount of ruin of the delicate watermark. In 2011, Yan et al. [5]offereda unseeing watermarking scheme to protect vector geo-spatial data from unlawful use. The presented method is rarely affected by info format alteration, accidental noise, likeness transformation of the data, and info editing. In 2012,Chen et al. [6] proposed a watermarking waybasedonthefrequency area. An enhanced procedure is offered to get the mistake of the JPEG quantification so as to reduce the bit error rate (BER) of the recovered watermark picture. In Addition, two aspects called adjusting factors are used to amendthe worth of the DCT coefficient in order to trade-off the potentials amongst the watermarked images and regain watermark. Furthermore, the suggested algorithm is design as a blind mechanism. Hence, the primary image and watermark are not necessary for eliminating watermark. In 2012, Kannammal et al. [7] calculated a digital watermarking framework in which the Electrocardiograph (ECG) and Patients demographic script IDperformasdual watermarks. By this technique the medical info of the patient is secured and mismatching of investigative information is prevented. Alter domain techniques are in greater use now a days in place of spatial field methods as much is known about the properties of these changes to attain better watermark features. In 2012, Chitla Arathi [8] presented a semi-fragile watermarking method based on block based SVD (singular value decomposition).Semi-fragile watermark is delicate to malicious alterations while strong to incidental manipulations .The method can remove the watermark without the original image. SVD alteration conserves both one way and non-symmetric types that are not accessible in DCT and DFT alterations. This scheme can too notice obstruct made on the picture. 3. CONCLUSION From the above studied papers regarding the watermark techniques and its types and processes, it can be deduced that there are lot of ways by which the target can be achieved or by which the data can be covered behind an image. There has been lot of work which talk about the
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 3 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 501 watermarking techniques which only talks about the image decomposition techniquesandsignificantlyneglectsthe data hiding, however the data hiding is kept in the midst of the algorithm but not with greater priority. Quantum watermarking can be the future if developed with the intent of developing the capacity of the existing techniques, however in this paper we have lot many techniques which deals with the intentofincreasingthedata capacity but only up to a certain limit. 4. REFRENCES 1. Chen, D.-Y., Ouhyoung, M., and Wu, J.-L., “A Shift Resisting Public Watermark System for Protecting Image Processing Software”, Proceedings of IEEE Transactions on Consumer Electronics, Vol. 46, No.3,pp.404-414, 2000. 2. Manpreet kaur, Sonia Jindal, Sunny behal, “ A Study of Digital image watermarking” ,ProceedingsofVolume2,Issue 2, Feb 2012. 3. W.-C. Chen,M.-S. Wang,“A Fuzzyc-MeansClusteringbased Fragile Watermarking Scheme for Image Authentication”, Proceedings of Expert Systems with Applications, 2009, Volume 36, Issue 2, Part 1, pp. 1300-1307. 4. Ankan Bhattacharya, Sarbani Palit, Nivedita Chatterjee, and Gourav Roy “Blind assessment of image quality employing fragile watermarking”, Proceedings of 7th International Sym. on Image and Signal Processing and Analysis Dubrovnik, Croatia, 2011, pp. 431- 436 5. Haowen Yan, Jonathan Li, Hong Wen, “A key points basesBlind watermarking approach for vector geospatial data”, Proceedings of Elsevier Journal of Computers, Environment and Urban Systems, 2012, Volume 35, Issue 6, pp. 485–492. 6. Huang-Chi Chen, Yu-Wen Chang, Rey-Chue Hwang “A Watermarking Technique based on the Frequency Domain”, Proceedings of Journal of Multimedia, 2012,Vol. 7, No. 1, pp. 82-89. 7. A. Kannammal, K. Pavithra, S. Subha Rani, “Double Watermarking of Dicom Medical Images using Wavelet DecompositionTechnique”,ProceedingsofEuropeanJournal of Scientific Research, 2012, Vol. 70, No. 1, pp. 46-55. 8. Chitla Arathi,’’ A Semi Fragile Image Watermarking Technique Using Block Based SVD”, Proceedings of International Journal of Computer Science and Information Technologies, Vol. 3 (2), 2012, 3644-3647. 9. Deng Kai, Wang ke, Lu Changde. “Research of color design method based on 3Dsemanticspace”,ComputerEngineering and Applications, Vol. 44 (7), pp. 106-108, 2008. 10. Shraddha S.Katariya,2012.Digital Watermarking:Review in International Journal of Engineering and Innovative Technology
Download now