SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 3 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 498
REVIEW ON QUANTUM WATERMARKING TECHNIQUES
Taniya Panjiyar1, Neha Sharma2
1Student, Department of Electronics and Communication Engineering,
Regional College for Education Research and Technology, Jaipur, Rajasthan, India
2Assistant Professor, Department of Electronics and Communication Engineering,
Regional College for Education Research and Technology, Jaipur, Rajasthan, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In today’s Era, communication broadcasts over
the internet have shield difficulties of the digital information.
Hence, safety of undisclosed messages through transmission
develops a hard issue. Digital watermarking has given that
safety of digital information or finding information in
contradiction of illegal misuses and sharing. Watermarkingis
a technology that assures and marks likely data certification,
safety and copyright protection of the info. The purpose of
watermarking is to contain secreted data in multimedia info
to guarantee safety examination. It would be then possible to
develop the enclosed info, even if the info was inaccurate by
one or extra non-dangerous spasms. In this paper, we present
the numerous kinds ofwatermarking methodsandapplication
section where watermarking method is compulsory.
Furthermore a study on the somedifferenteffortispreparedin
image watermarking area.
Key Words: Quantum watermarking, Pseudo Random
sequence, DCT-DWT and DWT-DCT Algorithm
1. INTRODUCTION
Security of digital info has become a widespread matter due
to the rapid growth of the universal multimedia technology.
Copyright safety of digital info has developed an important
problem over growing usage of internet. Digital
watermarking is that tools that delivers safety, data
authentication and copyright safety ofthedigital info.Digital
watermarking is the procedure of inserting secret digital
info, signal hooked on the digital media such asimage,video,
acoustic and text. Later the implanted info is identified and
removed out to disclose the actual identity of the digital
media. Watermarking is usedforEvidenceofRights,Copying
Hang-up, data verification, Data Hiding and Recording
Monitoring. Digital Image Watermarking technology has
numerous uses for safety of digital info, warranty, supply of
the digital media and label of the user info. Watermarking of
data has developed a very significantarea ininfohiding.This
paper explores the key technologies of Digital Image
Watermarking and explores its applicationsandapproaches
for the safety sides.
1.1 WATERMARKING BASICS
The simple model of Digital Image Watermarking contains
two parts:
1. Watermark embedding
2. Watermark extraction
The first technique is Watermark Embedding that is
obtainable in Figure 1 and the second technique is the
Watermark Removal that is obtainable in Figure 2.
Fig -1: Watermarking Introducing approach
Fig -2: Watermarking Removal Procedure
Watermark Embedding is the method of implanting
watermark into the unique image. The yield is the
Watermarked image. This procedure is passed out at
source’s side. Watermark Removal is the Procedure of
identifying watermark from the Watermarked image.
1.2 PROPERTIES OF WATERMARKING
The basic necessities of the digital watermarking can be
treated as qualities, properties. Different uses require
singular propertiesofwatermarking.Thedifferentattributes
of the watermarking yield different place in application
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 3 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 499
design. The basic attributes/properties ofwatermarking are
as follow:
A. Robustness Strength refers to that the watermark
inserted in data has the ability of perceiving watermark
afterward a range of processingproceduresandspasms.The
watermark should not eliminated by simple treatment
methods. Hence watermark should be robust against some
spasm. Robust watermarks are intended to fight normal
processing.
B. Fidelity
Reliability or Imperceptibility is the most significant
condition in watermarking scheme. Watermark cannot be
notice by human eyes or ear, only be noticed through
different processing of watermark indicator. It can be
noticed by an official person only. Suchwatermarksareused
for content or writer authentication and for noticing illegal
copies of the data. In other way reliability can be measured
as an amount of perceptual ease.
C. Data Payload Data payload states that thequantityof bits
implanted into the original image. Itistheutmostquantityof
info that can be hidden lacking corrupting image quality. It
can be calculated by the quantity of secreted information in
the original data. This propertyshowshowmuchinfoshould
be embedded as a watermark so that it can be efficiently
detected throughout extraction procedure.
D. Security A watermark system is said to be safe, if the
unofficial person cannot eliminate the watermark without
having packed consciousness of embedding algorithm,
detector and arrangement of watermark. The safety is most
significant feature of watermarking system. Only the official
person can notice watermark. Thus, the copyrights security
can attain in watermarking scheme.
E. Computational Complexity Calculation complexity is
well-defined as the quantity of time occupied by the
watermarking algorithm for embedding and removal
procedure. More computational trouble is required for the
robust security and validity of the watermark. On the other
hand, real-time applications include equally speed and
proficiency.
F. Inevitability well-defined as the probability to produce
the original data throughout the watermark removal. The
optimization of the constraints is equally competitive and
cannot be simply done all together. A rational compromiseis
continuously a requirement. Otherwise, if toughness to
strong warp is a subject, the message that can be often
secreted need not be excessively long.
1.3 CLASSIFICATION OF WATERMARKING
In this part the digital watermarks, features, their methods
and application are categorized and segmented into
numerous classes.
1) According to human observation
A. Detectable watermarking
In this kind of watermarking methods the watermark is
observable to the casual watcher. Watermark is an image or
a data that is noticeable on primary image the watermark
seems is a secondary glowing covered into the primary
images.
Fig-3: (a) the original Lena copy (b) the symbol to be
watermarked (c) observable watermarked image and (d)
unseen watermarked image [10]
B. Undetectable watermarking
Undetectable watermark is buried in the original content. It
can be noticed by a certified person only. Watermark is
implanting in such a way that interchanges madetothepixel
content are perceptually not observed and it can be
recovered only with suitable decoding process.
1.4 WATERMARKING APPLICATIONS
Applications are listed as:
A. Copyright protection one of the most significant
application of watermarking iscopyrightprotectionfromthe
illegal person. Ownership of digital media can be recognized
in the case of a copyright clash by means of the implanted
data as evidence.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 3 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 500
B. Broadcast Monitoring This applicationisusedtodisplay
illegal broadcast station. It can authenticate whether the
content is truly spread or not.
C. Tamper Detection Delicate watermarks are usedforloss
detection. If the watermark is despoiled or smashed, it
displays presence of interfering and hence digital data
cannot be trusted.
D. Authentication and Integrity Verification The
watermark is implanted to notice if the image has custom-
made or not, this process can be used for verification.
Reliability verification can be accomplished by means of
delicate or semi fragilewatermark whichhaslittletoughness
to amendment in an image.
E. Fingerprinting
The main aim of fingerprinting is to shield clients. If
somebody got an authorized copy of a product, but
reallocated criminally, fingerprinting can stop this. This can
be accomplished by finding the whole transaction by
implanting single strong watermark for each receiver.
F. Content Description This watermark cancomprisesome
complete info of the host image for example classification
and captioning. The volume of watermark for this kind of
application should be comparatively large and there is no
harsh requirement of toughness.
G. Medical Applications In medical area the watermarking
is important for the purpose of defending the hospital’s info
from illegal people such as patient’s record etc. Security and
proof of such data are now becoming very important in
medical field where the digital data are effortlessly
distributed.
2. PREVIOUS METHEDOLOGY
In 2000, Chen et al.’s [1]projectedanadaptivewatermarking
structure. This system inserts a binary image as watermark
in DCT method. The watermarked image is not visible by
human visual scheme. It customs a feature based technique
to trace the watermark places throughout embedding and
extracting. The feature-based technique customs the sobel
edge-detector to acquire the gradient magnitude and this
outcome is proportional to thequantityofwatermark bits.In
2008, Wang H. et al. [2] suggested a chaotic watermarking
scheme for authentication of JPEG pictures. The quantized
DCT coefficients afterward entropy decoding are plotted to
the primary values of the chaotic scheme, and then the
produced watermark data by chaotic repetition is inserted
into JPEG compressed domain. Re-quantizationprocessdoes
not invalidate interfere recognitionduetodirectamendment
of DCT coefficient after quantization. Removal isalsodonein
the compression area. Extraction is quick and complexity of
technique is demanded to underneath.In2009,Cheneta,[3]
suggested a spatial area watermarking method based onthe
notion of including block-wise dependency info in
watermarking process for thwarting VQ spasmwithout doa
deal on localization abilities of the system. The block-wise
dependence bond among the chunks of the image is
confirmed using fuzzy bunching standards; a fuzzy C-means
procedure is used for this method. This technique lets one
part of data to belong to two or extra clusters dissimilar
other traditional tough clustering systems Like k means
algorithm that give data points to a precise cluster. The
system consists of validation of message inserting process
and tamper recognition process. In 2011, Bhattacharya et al.
[4] suggested a new method which creates usage of equally
delicate and tough watermarking approaches. The
embedded delicate watermark is used to assess the ruin
undergone by the transferred images. Strong imagefeatures
are used to construct the reference watermark from the
established image, for judging the amount of ruin of the
delicate watermark. In 2011, Yan et al. [5]offereda unseeing
watermarking scheme to protect vector geo-spatial data
from unlawful use. The presented method is rarely affected
by info format alteration, accidental noise, likeness
transformation of the data, and info editing. In 2012,Chen et
al. [6] proposed a watermarking waybasedonthefrequency
area. An enhanced procedure is offered to get the mistake of
the JPEG quantification so as to reduce the bit error rate
(BER) of the recovered watermark picture. In Addition, two
aspects called adjusting factors are used to amendthe worth
of the DCT coefficient in order to trade-off the potentials
amongst the watermarked images and regain watermark.
Furthermore, the suggested algorithm is design as a blind
mechanism. Hence, the primary image and watermark are
not necessary for eliminating watermark. In 2012,
Kannammal et al. [7] calculated a digital watermarking
framework in which the Electrocardiograph (ECG) and
Patients demographic script IDperformasdual watermarks.
By this technique the medical info of the patient is secured
and mismatching of investigative information is prevented.
Alter domain techniques are in greater use now a days in
place of spatial field methods as much is known about the
properties of these changes to attain better watermark
features. In 2012, Chitla Arathi [8] presented a semi-fragile
watermarking method based on block based SVD (singular
value decomposition).Semi-fragile watermark is delicate to
malicious alterations while strong to incidental
manipulations .The method can remove the watermark
without the original image. SVD alteration conserves both
one way and non-symmetric types that are not accessible in
DCT and DFT alterations. This scheme can too notice
obstruct made on the picture.
3. CONCLUSION
From the above studied papers regarding the watermark
techniques and its types and processes, it can be deduced
that there are lot of ways by which the target can be
achieved or by which the data can be covered behind an
image. There has been lot of work which talk about the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 3 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 501
watermarking techniques which only talks about the image
decomposition techniquesandsignificantlyneglectsthe data
hiding, however the data hiding is kept in the midst of the
algorithm but not with greater priority.
Quantum watermarking can be the future if developed with
the intent of developing the capacity of the existing
techniques, however in this paper we have lot many
techniques which deals with the intentofincreasingthedata
capacity but only up to a certain limit.
4. REFRENCES
1. Chen, D.-Y., Ouhyoung, M., and Wu, J.-L., “A Shift Resisting
Public Watermark System for Protecting Image Processing
Software”, Proceedings of IEEE Transactions on Consumer
Electronics, Vol. 46, No.3,pp.404-414, 2000.
2. Manpreet kaur, Sonia Jindal, Sunny behal, “ A Study of
Digital image watermarking” ,ProceedingsofVolume2,Issue
2, Feb 2012.
3. W.-C. Chen,M.-S. Wang,“A Fuzzyc-MeansClusteringbased
Fragile Watermarking Scheme for Image Authentication”,
Proceedings of Expert Systems with Applications, 2009,
Volume 36, Issue 2, Part 1, pp. 1300-1307.
4. Ankan Bhattacharya, Sarbani Palit, Nivedita Chatterjee,
and Gourav Roy “Blind assessment of image quality
employing fragile watermarking”, Proceedings of 7th
International Sym. on Image and Signal Processing and
Analysis Dubrovnik, Croatia, 2011, pp. 431- 436
5. Haowen Yan, Jonathan Li, Hong Wen, “A key points
basesBlind watermarking approach for vector geospatial
data”, Proceedings of Elsevier Journal of Computers,
Environment and Urban Systems, 2012, Volume 35, Issue 6,
pp. 485–492.
6. Huang-Chi Chen, Yu-Wen Chang, Rey-Chue Hwang “A
Watermarking Technique based on the Frequency Domain”,
Proceedings of Journal of Multimedia, 2012,Vol. 7, No. 1, pp.
82-89.
7. A. Kannammal, K. Pavithra, S. Subha Rani, “Double
Watermarking of Dicom Medical Images using Wavelet
DecompositionTechnique”,ProceedingsofEuropeanJournal
of Scientific Research, 2012, Vol. 70, No. 1, pp. 46-55.
8. Chitla Arathi,’’ A Semi Fragile Image Watermarking
Technique Using Block Based SVD”, Proceedings of
International Journal of Computer Science and Information
Technologies, Vol. 3 (2), 2012, 3644-3647.
9. Deng Kai, Wang ke, Lu Changde. “Research of color design
method based on 3Dsemanticspace”,ComputerEngineering
and Applications, Vol. 44 (7), pp. 106-108, 2008.
10. Shraddha S.Katariya,2012.Digital Watermarking:Review
in International Journal of Engineering and Innovative
Technology

More Related Content

What's hot

IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET Journal
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for securityIJERA Editor
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition SystemIRJET Journal
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1ehab_madda
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learningSwatiNarkhede1
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methodsRupinder Saini
 
Iris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAEIris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAEArab Federation for Digital Economy
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authenticationKumar Goud
 
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
 
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Bhargav Amin
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identificationdswazalwar
 
Video Liveness Verification
Video Liveness VerificationVideo Liveness Verification
Video Liveness Verificationijtsrd
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET Journal
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET Journal
 
IRJET- Face Recognition based Attendance System using Raspberry Pi
IRJET- Face Recognition based Attendance System using Raspberry PiIRJET- Face Recognition based Attendance System using Raspberry Pi
IRJET- Face Recognition based Attendance System using Raspberry PiIRJET Journal
 

What's hot (19)

IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image Processing
 
Graphical Password by Watermarking for security
Graphical Password by Watermarking for securityGraphical Password by Watermarking for security
Graphical Password by Watermarking for security
 
50120130406045
5012013040604550120130406045
50120130406045
 
Nemex
NemexNemex
Nemex
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition System
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learning
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
 
Iris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAEIris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAE
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
 
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
 
Access Control
Access ControlAccess Control
Access Control
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identification
 
Video Liveness Verification
Video Liveness VerificationVideo Liveness Verification
Video Liveness Verification
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
 
IRJET- Face Recognition based Attendance System using Raspberry Pi
IRJET- Face Recognition based Attendance System using Raspberry PiIRJET- Face Recognition based Attendance System using Raspberry Pi
IRJET- Face Recognition based Attendance System using Raspberry Pi
 

Similar to Review on Quantum Watermarking Techniques

IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET Journal
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterkingeSAT Journals
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYIRJET Journal
 
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET Journal
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000authority12
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET Journal
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...IOSR Journals
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...ijsrd.com
 
Digital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingDigital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingIRJET Journal
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewEditor IJCATR
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applicationsKannekanti Utthej
 
Image processing research proposal
Image processing research proposalImage processing research proposal
Image processing research proposalIftikhar Ahmad
 

Similar to Review on Quantum Watermarking Techniques (20)

IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
 
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication Methods
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...
 
Dz31840846
Dz31840846Dz31840846
Dz31840846
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...
 
B010510613
B010510613B010510613
B010510613
 
Ki2417591763
Ki2417591763Ki2417591763
Ki2417591763
 
Digital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingDigital Image Security using Digital Watermarking
Digital Image Security using Digital Watermarking
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Image processing research proposal
Image processing research proposalImage processing research proposal
Image processing research proposal
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxNANDHAKUMARA10
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...gragchanchal546
 

Recently uploaded (20)

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
 

Review on Quantum Watermarking Techniques

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 3 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 498 REVIEW ON QUANTUM WATERMARKING TECHNIQUES Taniya Panjiyar1, Neha Sharma2 1Student, Department of Electronics and Communication Engineering, Regional College for Education Research and Technology, Jaipur, Rajasthan, India 2Assistant Professor, Department of Electronics and Communication Engineering, Regional College for Education Research and Technology, Jaipur, Rajasthan, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In today’s Era, communication broadcasts over the internet have shield difficulties of the digital information. Hence, safety of undisclosed messages through transmission develops a hard issue. Digital watermarking has given that safety of digital information or finding information in contradiction of illegal misuses and sharing. Watermarkingis a technology that assures and marks likely data certification, safety and copyright protection of the info. The purpose of watermarking is to contain secreted data in multimedia info to guarantee safety examination. It would be then possible to develop the enclosed info, even if the info was inaccurate by one or extra non-dangerous spasms. In this paper, we present the numerous kinds ofwatermarking methodsandapplication section where watermarking method is compulsory. Furthermore a study on the somedifferenteffortispreparedin image watermarking area. Key Words: Quantum watermarking, Pseudo Random sequence, DCT-DWT and DWT-DCT Algorithm 1. INTRODUCTION Security of digital info has become a widespread matter due to the rapid growth of the universal multimedia technology. Copyright safety of digital info has developed an important problem over growing usage of internet. Digital watermarking is that tools that delivers safety, data authentication and copyright safety ofthedigital info.Digital watermarking is the procedure of inserting secret digital info, signal hooked on the digital media such asimage,video, acoustic and text. Later the implanted info is identified and removed out to disclose the actual identity of the digital media. Watermarking is usedforEvidenceofRights,Copying Hang-up, data verification, Data Hiding and Recording Monitoring. Digital Image Watermarking technology has numerous uses for safety of digital info, warranty, supply of the digital media and label of the user info. Watermarking of data has developed a very significantarea ininfohiding.This paper explores the key technologies of Digital Image Watermarking and explores its applicationsandapproaches for the safety sides. 1.1 WATERMARKING BASICS The simple model of Digital Image Watermarking contains two parts: 1. Watermark embedding 2. Watermark extraction The first technique is Watermark Embedding that is obtainable in Figure 1 and the second technique is the Watermark Removal that is obtainable in Figure 2. Fig -1: Watermarking Introducing approach Fig -2: Watermarking Removal Procedure Watermark Embedding is the method of implanting watermark into the unique image. The yield is the Watermarked image. This procedure is passed out at source’s side. Watermark Removal is the Procedure of identifying watermark from the Watermarked image. 1.2 PROPERTIES OF WATERMARKING The basic necessities of the digital watermarking can be treated as qualities, properties. Different uses require singular propertiesofwatermarking.Thedifferentattributes of the watermarking yield different place in application
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 3 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 499 design. The basic attributes/properties ofwatermarking are as follow: A. Robustness Strength refers to that the watermark inserted in data has the ability of perceiving watermark afterward a range of processingproceduresandspasms.The watermark should not eliminated by simple treatment methods. Hence watermark should be robust against some spasm. Robust watermarks are intended to fight normal processing. B. Fidelity Reliability or Imperceptibility is the most significant condition in watermarking scheme. Watermark cannot be notice by human eyes or ear, only be noticed through different processing of watermark indicator. It can be noticed by an official person only. Suchwatermarksareused for content or writer authentication and for noticing illegal copies of the data. In other way reliability can be measured as an amount of perceptual ease. C. Data Payload Data payload states that thequantityof bits implanted into the original image. Itistheutmostquantityof info that can be hidden lacking corrupting image quality. It can be calculated by the quantity of secreted information in the original data. This propertyshowshowmuchinfoshould be embedded as a watermark so that it can be efficiently detected throughout extraction procedure. D. Security A watermark system is said to be safe, if the unofficial person cannot eliminate the watermark without having packed consciousness of embedding algorithm, detector and arrangement of watermark. The safety is most significant feature of watermarking system. Only the official person can notice watermark. Thus, the copyrights security can attain in watermarking scheme. E. Computational Complexity Calculation complexity is well-defined as the quantity of time occupied by the watermarking algorithm for embedding and removal procedure. More computational trouble is required for the robust security and validity of the watermark. On the other hand, real-time applications include equally speed and proficiency. F. Inevitability well-defined as the probability to produce the original data throughout the watermark removal. The optimization of the constraints is equally competitive and cannot be simply done all together. A rational compromiseis continuously a requirement. Otherwise, if toughness to strong warp is a subject, the message that can be often secreted need not be excessively long. 1.3 CLASSIFICATION OF WATERMARKING In this part the digital watermarks, features, their methods and application are categorized and segmented into numerous classes. 1) According to human observation A. Detectable watermarking In this kind of watermarking methods the watermark is observable to the casual watcher. Watermark is an image or a data that is noticeable on primary image the watermark seems is a secondary glowing covered into the primary images. Fig-3: (a) the original Lena copy (b) the symbol to be watermarked (c) observable watermarked image and (d) unseen watermarked image [10] B. Undetectable watermarking Undetectable watermark is buried in the original content. It can be noticed by a certified person only. Watermark is implanting in such a way that interchanges madetothepixel content are perceptually not observed and it can be recovered only with suitable decoding process. 1.4 WATERMARKING APPLICATIONS Applications are listed as: A. Copyright protection one of the most significant application of watermarking iscopyrightprotectionfromthe illegal person. Ownership of digital media can be recognized in the case of a copyright clash by means of the implanted data as evidence.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 3 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 500 B. Broadcast Monitoring This applicationisusedtodisplay illegal broadcast station. It can authenticate whether the content is truly spread or not. C. Tamper Detection Delicate watermarks are usedforloss detection. If the watermark is despoiled or smashed, it displays presence of interfering and hence digital data cannot be trusted. D. Authentication and Integrity Verification The watermark is implanted to notice if the image has custom- made or not, this process can be used for verification. Reliability verification can be accomplished by means of delicate or semi fragilewatermark whichhaslittletoughness to amendment in an image. E. Fingerprinting The main aim of fingerprinting is to shield clients. If somebody got an authorized copy of a product, but reallocated criminally, fingerprinting can stop this. This can be accomplished by finding the whole transaction by implanting single strong watermark for each receiver. F. Content Description This watermark cancomprisesome complete info of the host image for example classification and captioning. The volume of watermark for this kind of application should be comparatively large and there is no harsh requirement of toughness. G. Medical Applications In medical area the watermarking is important for the purpose of defending the hospital’s info from illegal people such as patient’s record etc. Security and proof of such data are now becoming very important in medical field where the digital data are effortlessly distributed. 2. PREVIOUS METHEDOLOGY In 2000, Chen et al.’s [1]projectedanadaptivewatermarking structure. This system inserts a binary image as watermark in DCT method. The watermarked image is not visible by human visual scheme. It customs a feature based technique to trace the watermark places throughout embedding and extracting. The feature-based technique customs the sobel edge-detector to acquire the gradient magnitude and this outcome is proportional to thequantityofwatermark bits.In 2008, Wang H. et al. [2] suggested a chaotic watermarking scheme for authentication of JPEG pictures. The quantized DCT coefficients afterward entropy decoding are plotted to the primary values of the chaotic scheme, and then the produced watermark data by chaotic repetition is inserted into JPEG compressed domain. Re-quantizationprocessdoes not invalidate interfere recognitionduetodirectamendment of DCT coefficient after quantization. Removal isalsodonein the compression area. Extraction is quick and complexity of technique is demanded to underneath.In2009,Cheneta,[3] suggested a spatial area watermarking method based onthe notion of including block-wise dependency info in watermarking process for thwarting VQ spasmwithout doa deal on localization abilities of the system. The block-wise dependence bond among the chunks of the image is confirmed using fuzzy bunching standards; a fuzzy C-means procedure is used for this method. This technique lets one part of data to belong to two or extra clusters dissimilar other traditional tough clustering systems Like k means algorithm that give data points to a precise cluster. The system consists of validation of message inserting process and tamper recognition process. In 2011, Bhattacharya et al. [4] suggested a new method which creates usage of equally delicate and tough watermarking approaches. The embedded delicate watermark is used to assess the ruin undergone by the transferred images. Strong imagefeatures are used to construct the reference watermark from the established image, for judging the amount of ruin of the delicate watermark. In 2011, Yan et al. [5]offereda unseeing watermarking scheme to protect vector geo-spatial data from unlawful use. The presented method is rarely affected by info format alteration, accidental noise, likeness transformation of the data, and info editing. In 2012,Chen et al. [6] proposed a watermarking waybasedonthefrequency area. An enhanced procedure is offered to get the mistake of the JPEG quantification so as to reduce the bit error rate (BER) of the recovered watermark picture. In Addition, two aspects called adjusting factors are used to amendthe worth of the DCT coefficient in order to trade-off the potentials amongst the watermarked images and regain watermark. Furthermore, the suggested algorithm is design as a blind mechanism. Hence, the primary image and watermark are not necessary for eliminating watermark. In 2012, Kannammal et al. [7] calculated a digital watermarking framework in which the Electrocardiograph (ECG) and Patients demographic script IDperformasdual watermarks. By this technique the medical info of the patient is secured and mismatching of investigative information is prevented. Alter domain techniques are in greater use now a days in place of spatial field methods as much is known about the properties of these changes to attain better watermark features. In 2012, Chitla Arathi [8] presented a semi-fragile watermarking method based on block based SVD (singular value decomposition).Semi-fragile watermark is delicate to malicious alterations while strong to incidental manipulations .The method can remove the watermark without the original image. SVD alteration conserves both one way and non-symmetric types that are not accessible in DCT and DFT alterations. This scheme can too notice obstruct made on the picture. 3. CONCLUSION From the above studied papers regarding the watermark techniques and its types and processes, it can be deduced that there are lot of ways by which the target can be achieved or by which the data can be covered behind an image. There has been lot of work which talk about the
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 3 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 501 watermarking techniques which only talks about the image decomposition techniquesandsignificantlyneglectsthe data hiding, however the data hiding is kept in the midst of the algorithm but not with greater priority. Quantum watermarking can be the future if developed with the intent of developing the capacity of the existing techniques, however in this paper we have lot many techniques which deals with the intentofincreasingthedata capacity but only up to a certain limit. 4. REFRENCES 1. Chen, D.-Y., Ouhyoung, M., and Wu, J.-L., “A Shift Resisting Public Watermark System for Protecting Image Processing Software”, Proceedings of IEEE Transactions on Consumer Electronics, Vol. 46, No.3,pp.404-414, 2000. 2. Manpreet kaur, Sonia Jindal, Sunny behal, “ A Study of Digital image watermarking” ,ProceedingsofVolume2,Issue 2, Feb 2012. 3. W.-C. Chen,M.-S. Wang,“A Fuzzyc-MeansClusteringbased Fragile Watermarking Scheme for Image Authentication”, Proceedings of Expert Systems with Applications, 2009, Volume 36, Issue 2, Part 1, pp. 1300-1307. 4. Ankan Bhattacharya, Sarbani Palit, Nivedita Chatterjee, and Gourav Roy “Blind assessment of image quality employing fragile watermarking”, Proceedings of 7th International Sym. on Image and Signal Processing and Analysis Dubrovnik, Croatia, 2011, pp. 431- 436 5. Haowen Yan, Jonathan Li, Hong Wen, “A key points basesBlind watermarking approach for vector geospatial data”, Proceedings of Elsevier Journal of Computers, Environment and Urban Systems, 2012, Volume 35, Issue 6, pp. 485–492. 6. Huang-Chi Chen, Yu-Wen Chang, Rey-Chue Hwang “A Watermarking Technique based on the Frequency Domain”, Proceedings of Journal of Multimedia, 2012,Vol. 7, No. 1, pp. 82-89. 7. A. Kannammal, K. Pavithra, S. Subha Rani, “Double Watermarking of Dicom Medical Images using Wavelet DecompositionTechnique”,ProceedingsofEuropeanJournal of Scientific Research, 2012, Vol. 70, No. 1, pp. 46-55. 8. Chitla Arathi,’’ A Semi Fragile Image Watermarking Technique Using Block Based SVD”, Proceedings of International Journal of Computer Science and Information Technologies, Vol. 3 (2), 2012, 3644-3647. 9. Deng Kai, Wang ke, Lu Changde. “Research of color design method based on 3Dsemanticspace”,ComputerEngineering and Applications, Vol. 44 (7), pp. 106-108, 2008. 10. Shraddha S.Katariya,2012.Digital Watermarking:Review in International Journal of Engineering and Innovative Technology