This document discusses a proposed technique for secure data transmission that combines digital image watermarking and image compression. It begins with background information on digital watermarking, including its classifications, requirements, general system, and techniques such as spatial domain and frequency domain methods. It then provides an overview of image compression, including its benefits, techniques such as lossless and lossy compression, and common compression methods. The proposed technique embeds a watermark into an image using discrete cosine transform (DCT) based watermarking in the frequency domain. It then applies lossy image compression to the watermarked image using an improved adaptive Huffman coding algorithm. The goal is to achieve higher security for data transmission by combining these two techniques compared to
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
Copyright protection has become a need in today’s world. To achieve a secure copyright protection we embedded some information in images and videos and that image or video is called copyright protected. The embedded information can’t be detected by human eye but some attacks and operations can tamper that information to breach protection. So in order to find a secure technique of copyright protection, we have analyzed image processing techniques i.e. Spatial Domain (Least Significant Bit (LSB)), Transform Domain (Discrete Cosine Transform (DCT)), Discrete Wavelet Transform (DWT) and there are numerous algorithm for watermarking using them. After having a good understanding of the same we have proposed a novel algorithm named as Stage Staffing Algorithm that generates results with high effectiveness, additionally we can use self extracted-watermark technique to increase the security and automate the process of watermark image. The proposed algorithm provides protection in three stages. We have implemented the algorithm and results of the simulations are shown. The various factors affecting spatial domain watermarking are also discussed.
Digital watermarking knowledge is a leading edge research field and it mainly focuses on the
intellectual property rights, hides data and embedded inside an image to show authenticity or proof
of ownership, discovery and authentication of the digital media to protect the important documents.
Digital watermarking can help to verify ownership, to recognize a misappropriate person and find the
marked documents. One of the significant technological actions of the last two decades was the
attack of digital media in a complete range of everyday life aspects.
Digital data can be stored efficiently with a very high quality and it can be manipulated very
easily using computers. In addition digital data can be transmitted in a fast and inexpensive way
through data communication networks without losing quality. According to the necessary study of
digital image watermarking, the digital watermarking model consists of two modules, which are
watermark embedding module and watermark extraction and detection module.
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
Watermarking technique be employ instance & for a second time for
validation and protection of digital data (images, video and audio
files, digital repositories and libraries, web publishing). It is helpful
to copyright protection and illegal copying of digital data like video
frames and making digital data more robust and imperceptible. With
the advent of internet, creation and delivery of digital data has grown
many fold. In that Scenario has to need a technique for transferring
digital data securely without changing their originality and
robustness. In this paper proposed a plan of latest watermarking
method which involves inserting and adding two or more digital data
or pictures in a single video frame for the principle of protection and
replicate the similar procedure for N no video frames for
authentication of entire digital video. After that digital video is
encrypted and decrypted by using motion vector bit-xor encryption
and decryption technique.
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image,
which is overlaid on the host image, and provides a means of protecting the image. In order to provide high quality watermarked
image, the watermarked image should be imperceptible. This paper presents different techniques of digital image watermarking based
on spatial & frequency domain, which shows that spatial domain technique provides security & successful recovery of watermark
image and higher PSNR value compared to frequency domain.
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
Copyright protection has become a need in today’s world. To achieve a secure copyright protection we embedded some information in images and videos and that image or video is called copyright protected. The embedded information can’t be detected by human eye but some attacks and operations can tamper that information to breach protection. So in order to find a secure technique of copyright protection, we have analyzed image processing techniques i.e. Spatial Domain (Least Significant Bit (LSB)), Transform Domain (Discrete Cosine Transform (DCT)), Discrete Wavelet Transform (DWT) and there are numerous algorithm for watermarking using them. After having a good understanding of the same we have proposed a novel algorithm named as Stage Staffing Algorithm that generates results with high effectiveness, additionally we can use self extracted-watermark technique to increase the security and automate the process of watermark image. The proposed algorithm provides protection in three stages. We have implemented the algorithm and results of the simulations are shown. The various factors affecting spatial domain watermarking are also discussed.
Digital watermarking knowledge is a leading edge research field and it mainly focuses on the
intellectual property rights, hides data and embedded inside an image to show authenticity or proof
of ownership, discovery and authentication of the digital media to protect the important documents.
Digital watermarking can help to verify ownership, to recognize a misappropriate person and find the
marked documents. One of the significant technological actions of the last two decades was the
attack of digital media in a complete range of everyday life aspects.
Digital data can be stored efficiently with a very high quality and it can be manipulated very
easily using computers. In addition digital data can be transmitted in a fast and inexpensive way
through data communication networks without losing quality. According to the necessary study of
digital image watermarking, the digital watermarking model consists of two modules, which are
watermark embedding module and watermark extraction and detection module.
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
Watermarking technique be employ instance & for a second time for
validation and protection of digital data (images, video and audio
files, digital repositories and libraries, web publishing). It is helpful
to copyright protection and illegal copying of digital data like video
frames and making digital data more robust and imperceptible. With
the advent of internet, creation and delivery of digital data has grown
many fold. In that Scenario has to need a technique for transferring
digital data securely without changing their originality and
robustness. In this paper proposed a plan of latest watermarking
method which involves inserting and adding two or more digital data
or pictures in a single video frame for the principle of protection and
replicate the similar procedure for N no video frames for
authentication of entire digital video. After that digital video is
encrypted and decrypted by using motion vector bit-xor encryption
and decryption technique.
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image,
which is overlaid on the host image, and provides a means of protecting the image. In order to provide high quality watermarked
image, the watermarked image should be imperceptible. This paper presents different techniques of digital image watermarking based
on spatial & frequency domain, which shows that spatial domain technique provides security & successful recovery of watermark
image and higher PSNR value compared to frequency domain.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Digital Image Watermarking Using Different Levels of Intermediate Significant...CSCJournals
The rapid growths of computer technologies have been increased over the last half century in terms of amount and complexity of data. Broadcasting of digital contents on the networks (especially Internet) has become more important and access to the data also has become much easier than before. Digital watermarking techniques are used to protect the copyrights of multimedia data by embedding secret information inside them. For example, embedding watermark in images, audios, and videos. Digital Image watermarking also has been using to detect original images against forged images by embedding an evidence of the owner of the digital image. Imperceptibility, on the other hand, is one of the problems in digital image watermarking which a repeated method in different bit planes of cover image has been presented to improve the imperceptibility of watermarking in both embedding and extracting processes. Moreover, embedding process aims to embed watermark in different bit planes by using a nonsequential method to improve security of image rather than simple sequential embedding.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Lsb hiding using random approach for image watermarkingeSAT Journals
Abstract A digital image watermarking is the process of embedding an image with a secondary parameter called watermark, without deterioration in the quality of image to provide copyright protection means to provide protection for intellectual property from illegal copying. In this paper the method of nested digital image watermarking is used that means a watermark inside another watermark embedded into the cover image that is the main image. Here the Randomized LSB hiding algorithm is used for embedding one image into another as it has lesser complexity and the approach is more robust to the variations in the type of image. The blowfish algorithm is used to encrypt the watermark image before embedding into the cover image. The concept of encryption of watermark image before get embedded into the main image is used here to increase the security of the watermark image. This is because the research work is mainly focus on to get the more secured watermark by improving and enhancing the embedding capacity. Key Words: Digital image Watermarking, Randomized LSB, Blowfish, Copyright Protection
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...CSCJournals
The most quoted applications for digital watermarking is in the context of copyright-protection of digital (multi-)media. In this paper we offer a new digital watermarking technique, which pledges both Security and Quality for the image for the Patent protection. This methodology uses tale techniques like Shuffling, Composition & Decomposition, and Encryption & Decryption to record the information of a protected primary image and the allied watermarks. The quadtree can aid the processing of watermark and AES provides added security to information. Besides that, we intend a novel architecture for Patent Protection that holds promise for a better compromise between practicality and security for emerging digital rights management application. Security solutions must seize a suspicious version of the application-dependent restrictions and competing objectives.
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
The rapid advancement of internet has made it easier to send the data/image accurate and faster to the destination. But thisadvantage is also accompanied with the disadvantage of modifying and misusing the valuable information through intercepting or hacking.So In order to transfer the data/image to the intended user at destination without anyalterations or modifications, there are many approaches like Cryptography, Watermarking and Steganography. This paper presents the general overview of image watermarking and different security issues. In this paper, Image Watermarking using Least Significant Bit (LSB) algorithm has been used for embedding the message/logo into the image. This work has been implemented through MATLAB.
A Brief Survey on Robust Video Watermarking Techniquestheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Report on Digital Watermarking Technology vijay rastogi
Digital watermarking is the process of embedding information into digital multimedia content such that the information (which we call the watermark) can later be extracted or detected for a variety of purposes including copy prevention and control.
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
Over the past decades, research in security has concentrated on the development of algorithms and protocols for authentication, encryption and integrity of data. Despite tremendous advances, several security problems still afflict system’s. In this android app watermarking and encryption is being applied on images and data. Because of the human visual system’s low sensitivity to small changes and the high flexibility of digital media, anyone can easily make small changes in digital data with low perceptibility. Here watermarking and encryption are being performed in wavelet domain. Here in watermarking, the coefficients of watermarks are being embedded with the coefficients of the original image. Encryption is being done in wavelet domain so that the probability of an intruder trying to access the contents is very much minimized. Thus, this model provides a high level of security.
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
Multimedia security is very important issue for the today's internet technology because of duplication, distribution and exchanging if multimedia data. Digital watermarking is the method of shielding digital data in multimedia.Multimedia consist of image, audio, video, text, etc. In watermarking the secret information are implanted into the original data for protecting the ownership rights of the multimedia data. Basically watermarking has three domains.1) Spatial domain 2) Transform domain 3) Wavelet domain. This paper consist Discrete Cosine Transform which is the frequency domain works on the transform coefficient of the image. Three different keys are generated using Triple DES algorithm.
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
The field of Signal Processing has witnessed the strong emergence of a new technique, the Blind
Signal Processing (BSP) which is based on sound theoretical foundation. An offshoot of the BSP is known as
Blind Source Separation (BSS). This digital signal processing techniques have a wide and varied potential
applications. The term blind is indicative of the fact that both the source signal and the mixing procedures are
unknown. One of the more interesting applications of BSS is in field of image data security/authentication where
digital watermarking is proposed. Watermarking is a promising technique to help protect data security and
intellectual property rights. The plethora digital image watermarking methods are surveyed and discussed here
with their features and limitations. Thus literature survey is presented in two major categories-Digital image
watermarking methods and BSS based techniques in digital image watermarking and extraction
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Digital Image Watermarking Using Different Levels of Intermediate Significant...CSCJournals
The rapid growths of computer technologies have been increased over the last half century in terms of amount and complexity of data. Broadcasting of digital contents on the networks (especially Internet) has become more important and access to the data also has become much easier than before. Digital watermarking techniques are used to protect the copyrights of multimedia data by embedding secret information inside them. For example, embedding watermark in images, audios, and videos. Digital Image watermarking also has been using to detect original images against forged images by embedding an evidence of the owner of the digital image. Imperceptibility, on the other hand, is one of the problems in digital image watermarking which a repeated method in different bit planes of cover image has been presented to improve the imperceptibility of watermarking in both embedding and extracting processes. Moreover, embedding process aims to embed watermark in different bit planes by using a nonsequential method to improve security of image rather than simple sequential embedding.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Lsb hiding using random approach for image watermarkingeSAT Journals
Abstract A digital image watermarking is the process of embedding an image with a secondary parameter called watermark, without deterioration in the quality of image to provide copyright protection means to provide protection for intellectual property from illegal copying. In this paper the method of nested digital image watermarking is used that means a watermark inside another watermark embedded into the cover image that is the main image. Here the Randomized LSB hiding algorithm is used for embedding one image into another as it has lesser complexity and the approach is more robust to the variations in the type of image. The blowfish algorithm is used to encrypt the watermark image before embedding into the cover image. The concept of encryption of watermark image before get embedded into the main image is used here to increase the security of the watermark image. This is because the research work is mainly focus on to get the more secured watermark by improving and enhancing the embedding capacity. Key Words: Digital image Watermarking, Randomized LSB, Blowfish, Copyright Protection
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...CSCJournals
The most quoted applications for digital watermarking is in the context of copyright-protection of digital (multi-)media. In this paper we offer a new digital watermarking technique, which pledges both Security and Quality for the image for the Patent protection. This methodology uses tale techniques like Shuffling, Composition & Decomposition, and Encryption & Decryption to record the information of a protected primary image and the allied watermarks. The quadtree can aid the processing of watermark and AES provides added security to information. Besides that, we intend a novel architecture for Patent Protection that holds promise for a better compromise between practicality and security for emerging digital rights management application. Security solutions must seize a suspicious version of the application-dependent restrictions and competing objectives.
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
The rapid advancement of internet has made it easier to send the data/image accurate and faster to the destination. But thisadvantage is also accompanied with the disadvantage of modifying and misusing the valuable information through intercepting or hacking.So In order to transfer the data/image to the intended user at destination without anyalterations or modifications, there are many approaches like Cryptography, Watermarking and Steganography. This paper presents the general overview of image watermarking and different security issues. In this paper, Image Watermarking using Least Significant Bit (LSB) algorithm has been used for embedding the message/logo into the image. This work has been implemented through MATLAB.
A Brief Survey on Robust Video Watermarking Techniquestheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Report on Digital Watermarking Technology vijay rastogi
Digital watermarking is the process of embedding information into digital multimedia content such that the information (which we call the watermark) can later be extracted or detected for a variety of purposes including copy prevention and control.
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
Over the past decades, research in security has concentrated on the development of algorithms and protocols for authentication, encryption and integrity of data. Despite tremendous advances, several security problems still afflict system’s. In this android app watermarking and encryption is being applied on images and data. Because of the human visual system’s low sensitivity to small changes and the high flexibility of digital media, anyone can easily make small changes in digital data with low perceptibility. Here watermarking and encryption are being performed in wavelet domain. Here in watermarking, the coefficients of watermarks are being embedded with the coefficients of the original image. Encryption is being done in wavelet domain so that the probability of an intruder trying to access the contents is very much minimized. Thus, this model provides a high level of security.
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
Multimedia security is very important issue for the today's internet technology because of duplication, distribution and exchanging if multimedia data. Digital watermarking is the method of shielding digital data in multimedia.Multimedia consist of image, audio, video, text, etc. In watermarking the secret information are implanted into the original data for protecting the ownership rights of the multimedia data. Basically watermarking has three domains.1) Spatial domain 2) Transform domain 3) Wavelet domain. This paper consist Discrete Cosine Transform which is the frequency domain works on the transform coefficient of the image. Three different keys are generated using Triple DES algorithm.
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
The field of Signal Processing has witnessed the strong emergence of a new technique, the Blind
Signal Processing (BSP) which is based on sound theoretical foundation. An offshoot of the BSP is known as
Blind Source Separation (BSS). This digital signal processing techniques have a wide and varied potential
applications. The term blind is indicative of the fact that both the source signal and the mixing procedures are
unknown. One of the more interesting applications of BSS is in field of image data security/authentication where
digital watermarking is proposed. Watermarking is a promising technique to help protect data security and
intellectual property rights. The plethora digital image watermarking methods are surveyed and discussed here
with their features and limitations. Thus literature survey is presented in two major categories-Digital image
watermarking methods and BSS based techniques in digital image watermarking and extraction
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Para muchos la mudanza supone un agobio pero con estos sencillos trucos verás tu mudanza con otros ojos porque mudarse puede ser sencillo si sabes como hacerlo.
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
Digital Watermarking is the process of embedding data called watermark or signature or label or tag into a multimedia object (image or audio or video) so that the watermark can be extracted for ownership verification or authentication. A visible watermark is a secondary translucent image overlaid into the primary image and appears visible to a viewer on a careful inspection. The invisible watermark is embedded in such a way that the modification made to the pixel value is perceptually not noticed and it can be recovered only with an appropriate decoding mechanism. Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital watermark inside the information so that ownership of the information cannot be claimed by third party.
A Quick Glance over the Digital Watermarkingijsrd.com
Digital watermarking is a process for modifying physical or electronic media to embed a machine-readable code into the media. The media may be modified such that the embedded code is imperceptible or nearly imperceptible to the user, yet may be detected through an automated detection process. Watermarking is the art of imperceptibly embedding a message into a work. More than 700 years ago in Fabriano (Italy), paper watermarks appeared in handmade paper, in order to identify its provenance, format, and quality. In this context, the watermark is a kind of invisible signature that allows identifying the creator or the owner of a document, and to detect possible copyright violations, and especially non-authorized copying [1]. More recently, different watermarking techniques and strategies have been proposed in order to solve a number of problems, ranging from the detection of content manipulations, to information hiding (steganography), to document usage tracing. In particular, the insertion of multiple watermarks to trace a document during its lifecycle is a very interesting and challenging application [1]. The main property of the proposed method is that it allows the insertion of multiple watermarks by different users, who sequentially come into play one after the other and do not need any extra information besides the public keys. This characteristic makes the present approach more attractive than previously available solutions.
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
The rapid advancement of internet has made it easier to send the data/image accurate and faster to the destination. But thisadvantage is also accompanied with the disadvantage of modifying and misusing the valuable information through intercepting or hacking.So In order to transfer the data/image to the intended user at destination without anyalterations or modifications, there are many approaches like Cryptography, Watermarking and Steganography. This paper presents the general overview of image watermarking and different security issues. In this paper, Image Watermarking using Least Significant Bit (LSB) algorithm has been used for embedding the message/logo into the image. This work has been implemented through MATLAB.
27 5 jun17 28apr 15859 ammar final (edti ari baru))IAESIJEECS
The transition from analog technologies to digital technologies has increased the ever-growing concern for protection and authentication of digital content and data. Owners of digital content of any type are seeking and exploring new technologies for the protection of copyrighted multimedia content. Multimedia protection has become an issue in recent years, and to deal with this issue, researchers are continuously searching for and exploring new effective and efficient technologies. This thesis study has been prepared in order to increase the invisibility and durability of invisible watermarking by using the multilayer Discrete Wavelet Transform (DWT) in the frequency plane and embedding two marks into an image for the purpose of authentication and copyright when digital content travels through an unsecured channel. A novel watermarking algorithm has been proposed based on five active positions and on using two marks. In addition to the extraction process, watermarking images will be subjected to a set of attack tests. The evaluation criteria have been the bases of assessing the value of SNR, PNSR, MAE and RMSE for both the watermarking images and the watermarking images after attacks, followed by the invisibility of the watermarking being measured before and after the attacks. Our lab results show high robustness and high quality images obtaining value for both SNR and PNSR.
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
Abstract :The field of Signal Processing has witnessed the strong emergence of a new technique, the Blind Signal Processing (BSP) which is based on sound theoretical foundation. An offshoot of the BSP is known as Blind Source Separation (BSS). This digital signal processing techniques have a wide and varied potential applications. The term blind is indicative of the fact that both the source signal and the mixing procedures are unknown. One of the more interesting applications of BSS is in field of image data security/authentication where digital watermarking is proposed. Watermarking is a promising technique to help protect data security and intellectual property rights. The plethora digital image watermarking methods are surveyed and discussed here with their features and limitations. Thus literature survey is presented in two major categories-Digital image watermarking methods and BSS based techniques in digital image watermarking and extraction. Keywords – BSP, BSS, Mixing Coefficient, Digital Image Watermarking, Watermark Extraction.
A Survey on Video Watermarking Technologies based on Copyright Protection and...Editor IJCATR
Digital Watermark is class of marker or symbol secretly embedded in a multimedia signal such as Audio, Image or Video. It
is used to identify the ownership of the multimedia signal. Video watermarking is an emerging area for various applications like copy
control broadcast monitoring, video authentication, copyright protection and enhanced video coding. The main objective of this paper
is to present survey and comparisons of various available techniques on video watermarking based on copyright protection and
identification. Comparative study of various technologies gives the significant information about the PSNR, payload, quality factor
and also the various attacks used in video watermarking techniques. The best techniques in various scenarios are discussed in this
paper which will help the research scholars in field of video watermarking.
Study, analysis and formulation of a new method for integrity protection of d...ijsrd.com
Digital watermarking provides authentication, validation and copyright protection for multimedia contents over the internet. Text is the most widely used means of communication in addition to image, audio and video. So it needs to be protected. Text watermarking techniques that have been developed in past protects the text from illegal copying, imitation, and prevents copyright violations. In this paper, we have proposed an algorithm that ensures the integrity and confidentiality of the document. In this technique watermark is created based on the contents of the document and embeds it without changing the contents of the document and also encrypts the text to provide confidentiality. To authenticate and prove the integrity of the document the watermark can be easily extracted and verified for tampering.
Digital Watermarking Applications and Techniques: A Brief ReviewEditor IJCATR
The frequent availability of digital data such as audio, images and videos became possible to the public through the expansion
of the internet. Digital watermarking technology is being adopted to ensure and facilitate data authentication, security and copyright
protection of digital media. It is considered as the most important technology in today’s world, to prevent illegal copying of data. Digital
watermarking can be applied to audio, video, text or images. This paper includes the detail study of watermarking definition and various
watermarking applications and techniques used to enhance data security.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A Survey on Features Combination for Image WatermarkingEditor IJMTER
As the internet users are increasing day by day it is easy to transfer digital data. By this new
problem of data piracy is increasing. For this different methods of watermarking are developed for
protecting the digital data like video, audio, image, etc. Out of these many researcher are working on
image watermarking field from last few decades. This paper focus on the image watermarking features
combination with various techniques which are broadly categorized into spatial and frequency domain.
Many features are studied with their different requirement and functionality. It has been observed that
most of the researcher combines many features for achieving the prior goal of the watermark that is to
embed watermark and extract from the carrier image in presence of different attack.
Electrically small antennas: The art of miniaturizationEditor IJARCET
We are living in the technological era, were we preferred to have the portable devices rather than unmovable devices. We are isolating our self rom the wires and we are becoming the habitual of wireless world what makes the device portable? I guess physical dimensions (mechanical) of that particular device, but along with this the electrical dimension is of the device is also of great importance. Reducing the physical dimension of the antenna would result in the small antenna but not electrically small antenna. We have different definition for the electrically small antenna but the one which is most appropriate is, where k is the wave number and is equal to and a is the radius of the imaginary sphere circumscribing the maximum dimension of the antenna. As the present day electronic devices progress to diminish in size, technocrats have become increasingly concentrated on electrically small antenna (ESA) designs to reduce the size of the antenna in the overall electronics system. Researchers in many fields, including RF and Microwave, biomedical technology and national intelligence, can benefit from electrically small antennas as long as the performance of the designed ESA meets the system requirement.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
1709 1715
1. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1709
www.ijarcet.org
Abstract— In today’s digital world, exchange of information
is been held electronically. Therefore there arises the great need
for secure transmission of the concerned data. Various practices
like cryptography, watermarking, compression etc. are common
since past few years. All these techniques were proved to be
excellent in their respective work regarding security. In this
paper a new approach has been presented to provide security at
enhanced level. Here the two techniques namely watermarking
and compression are combined together to enhance the level of
security for data transmission purpose. Here the watermarking
using DCT technique is been combined with image compression
technique using improved adaptive Huffman encoding. The
improved adaptive Huffman coding technique is been based on
Huffman algorithm. This new compression algorithm not only
reduces the number of pass required to encode the data but at
the same time reduces the storage space in comparison to
adaptive Huffman and static Huffman respectively.
Index Terms—Digital watermarking, Image Compression,
Improved adaptive Huffman, Spatial domain
I. INTRODUCTION
Watermarking is one of the most important aspect related
with information hiding. It is a process that is been used to
embed some kind of information inside a guest content: the
guest file can be a multimedia content such as picture, audio
or video. It is basically used for the purpose of copyright
protection and owner authentication. Digital Watermarking
technique gets its name from watermarking, which is very
common since past several years. Digital watermarking is a
technique that provides solution to the many longstanding
problems related with copyright of digital data that can be
detected or extracted later to make out some statement about
the data. This information can be textual data about the
author, its copyright, etc; or it can be an image itself. The
information that needs to be hidden is embedded by
manipulating the contents of the digital data, allowing
someone to identify the original owner, or in the case of illicit
duplication of purchased material, the buyer involved. These
digital watermarks remain inviolate under the conditions
related with transmission/ transformation, allowing one to
protect the ownership rights in digital form. Digital
watermarking has become an active and important area of
research, and development and commercialization of
Manuscript received May, 2013.
Dr. Ajit Singh, Department of Computer science and Engineering,
School of Engineering and sciences, BPSMV, Khanpur Kalan, Sonepat,
India
Meenakshi Gahlawat, Department of Computer science and
Engineering, School of Engineering and sciences, BPSMV, Khanpur Kalan,
Sonepat, India
watermarking techniques is being deemed essential to help
address some of the challenges faced by the rapid
proliferation of digital content. Digital watermarking came to
be in great demand when sharing information on the Internet
became a usual practice. [1], [3]
A. Classifications of Watermarking
1) Visible Watermarks
Visible watermarks are those watermarks which can be
easily perceived by the viewer, and clearly identify the owner.
The visible watermarks are viewable to the normal eye such as
bills, company logos and television channel logos etc. This
type of watermarks can be easily viewed without the
requirement of any mathematical calculation but at the same
time these embedded watermarks can be destroyed easily. [3]
2) Invisible Watermarks
Invisible watermarks are those watermarks that cannot be
perceived by human eyes. This type of watermark is not
visible in the watermarked image without degradation of
image or data. Invisible watermark may be any logo or any
signature. Most research currently focuses on invisible
watermarks, which are imperceptible under normal viewing
conditions. [3]
B. Requirements of Watermarks
The major requirements of digital watermarking are:
1) Transparency:
The watermark that is been embedded should not degrade
the original image quality. And in rare case if any distortions
are visible in the image it tends to degrade the commercial
value of the image. [1]
2) Robustness:
Robustness is simply the notion of how much can be done to
the watermarked image in the form of attacks (deliberate and
otherwise), such that the watermark can still successfully be
extracted from that altered image. In general, a more robust
watermark is preferred to one that is less so. [1]
3) Capacity or Data Load:
This quantity describes the maximum amount of data that
can be embedded into the image to ensure correct removal of
watermark during extraction. [1]
Secure Data Transmission using Watermarking
and Image Compression
Dr. Ajit Singh, Meenakshi Gahlawat
2. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
www.ijarcet.org
1710
C. GENERAL WATERMARKING SYSTEM
The digital watermarking system essentially consists of a
watermark embedder and a watermark detector. The
watermark embedder inserts a watermark onto the cover
signal and the watermark detector detects the presence of
watermark signal. An entity called watermark key is used
during the process of embedding and detecting watermarks.
The watermark key has a one-to-one correspondence with
watermark signal (i.e., a unique watermark key exists for
every watermark signal).The watermark key is private and
known to only authorized parties and it ensures that only
authorized parties can detect the watermark. Further, the
communication channel can be noisy and hostile (i.e., prone
to security attacks) and hence the digital watermarking
techniques should be resilient to both noise and security
attacks. [3]
Fig1: Digital Watermarking Systems
D. TECNIQUES OF DIGITAL WATERMARKING
1) Spatial Domain Method
Spatial-domain method is been used for embedding the
watermarks into a particular text, image by directly changing
the pixel values of original host images. Some common
spatial-domain algorithms include Least Significant Bit
(LSB) Modification, Patchwork, Texture Block Coding, etc.
The most serious drawback of spatial-domain technologies is
that it tends to provides limited robustness. It is complex for
spatial-domain watermarks to subsist under attacks such as
lossy compression and low-pass filtering. Also the amount of
information that can be embedded in spatial domain is also
very limited. [5]
2) Frequency-Domain Technologies
In comparison to spatial-domain watermark, watermarks in
frequency domain are more robust and much more compatible
to popular image compression standards. Thus
frequency-domain watermarking technique is more widely
used and obtains more attention in comparision to spatial
domain method. To embed a watermark, a frequency
transformation needs to be applied to the host data. Then,
modifications are made to the transform coefficients. Possible
frequency image transformations include the Discrete Fourier
Transform (DFT), Discrete Cosine Transform (DCT) and
others. In recent years they are becoming generally
desolated. [5]
E. APPLICATION OF WATERMARKING
1) Copyright Protection
This is one of the most prominent application of
watermarks. Due to huge exchange of images over insecure
networks, copyright protection becomes a very important
issue. Watermarking an image will prevent its redistribution.
2) Authentication
In some cases there arises the need to identify the
ownership of the contents. All this can be done by embedding
a watermark and providing the owner with a private key that
gives him an access to the message. ID cards, ATM cards,
credit cards are all examples of documents that require
authentication.
3) Broadcast Monitoring
From the name it is clear that broadcast monitoring is been
used to verify the programs that are broadcasted on TV or
radio. It especially helps the advertising companies to see if
their advertisements appeared for the right duration or not.
4) Content Labeling
Watermarks can be used for providing more information
about the cover object. This process is named content
labeling.
5) Tamper Detection
Fragile watermarks can be used to detect tampering in an
image. If the fragile watermark is degraded in any way then
we can say that the image or document in question has been
tampered.
6) Digital Fingerprinting
This is a process that is been used for detecting the owner of
the content. This is so because every fingerprint is the unique
characteristics of the owner.
7) Content protection
In this process the content stamped with a visible watermark
that is very difficult to remove so that it can be publicly and
freely distributed. [1]
II. IMAGE COMPRESSION
It is defined as the reduction of amount of data used to
represent an image by reducing redundant data, so that the
image can be stored or transferred more efficiently. Image
compression is minimizing the size in bytes of a graphics file
without degrading the quality of the image to an unacceptable
level. The reduction in file size allows more images to be
stored in a given amount of disk or memory space. It also
reduces the time required for images to be sent over the
Internet or downloaded from Web pages. [9]
Compression is achieved by the removal of one or more of the
three basic data redundancies:
1. Coding Redundancy
2. Interpixel Redundancy
3. Psychovisual Redundancy
Coding redundancy is present when less than optimal code
words are used. Interpixel redundancy is due to correlations
between the pixels of an image. Psychovisual redundancy
occurs when the data is neglected by the human visual system
(i.e. visually non essential information). Image compression
techniques reduce the number of bits required to represent an
image by taking advantage of these redundancies. An inverse
process called decompression (decoding) is applied to the
compressed data to get the reconstructed image. The
3. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1711
www.ijarcet.org
objective of compression is to reduce the number of bits as
much as possible, while keeping the resolution and the visual
quality of the reconstructed image as close to the original
image as possible. [10]
A. Benefits of Compression
1) Storage Space
Storage space, such as that provided by computer hard
drives, comes at a price. Compression of the data files allows
to store more files in the storage space that is been available.
Lossless compression, used in zip file technology, will
typically reduce a file to 50 percent of its original size.
However, no difference is seen in the file size if zip files are
already in a compressed format, such as MP3 audio files or
PDF (Portable Document Format) text-only files. [6]
2) Bandwidth and Transfer Speed
The download process uses network bandwidth whenever
we download a file, such as an MP3 audio file, from a server
on to the Internet. Bandwidth is the speed at which the
network transfers data and is measured in terms of Mbps
(megabits per second). Compressed files contain fewer "bits"
of data than uncompressed files, and, as a consequence, use
less bandwidth when we download them. This means that the
transfer speed, that is to say the time taken by the file to be
downloaded, is faster. It will take 10 seconds to download a
file if we have bandwidth of 1Mbps available, and we are
downloading a file that is 10Mb (megabits) in size. It will only
take 5 seconds to download the file if the file is compressed to
5Mb. [6]
3) Cost
The costs of storing the large amount of data are reduced by
compressing our files for storage because by doing so we can
store more files in the available storage space when they are
compressed. We need to buy a second 250MB drive if we
have 500MB (megabytes) of uncompressed data and a
250MB hard drive on which to store it. We will not need to
buy the extra hard drive if we compress the data files to 50
percent of their uncompressed size. This saving can be
applied to the costs of maintaining an Internet connection.
Many contracts with Internet Service Providers (ISP) include
charges for the amount of data that you download. Download
compressed files, and by doing so, one will be downloading
much less data than one would do so when uncompressed files
are been downloaded. The Internet download charges will be
less as a consequence of this. [6]
4) Accuracy
It also reduces the chance of occurrence of transmission
errors since fewer bits are transferred. [10]
5) Security
It also provides a level of security against illegal
monitoring. [10]
B. IMAGE COMPRESSION TECHNIQUES
The image compression techniques are broadly classified
into two categories depending whether or not an exact repro
of the original image could be reconstructed using the
compressed image.
These are:
1. Lossless technique
2. Lossy technique
1) Lossless compression
It is a compression technique that does not lose any data in
the compression process. Lossless compression "packs data"
into a smaller file size by using a kind of internal shorthand to
signify redundant data. If an original file is 1.5MB
(megabytes), lossless compression can reduce it to about half
of that size, depending on the type of file that is being
compressed. This makes lossless compression convenient for
transferring files across the Internet, as smaller files transfer
faster. Lossless compression is also handy for storing files as
they take up less room. The zip convention, used in programs
like WinZip, uses lossless compression. For this reason zip
software is popular for compressing program and data files.
That's because when these files are decompressed, all bytes
must be present to ensure their integrity. If bytes are missing
from a program, it won't run. If bytes are missing from a data
file, it will be incomplete and falsified. GIF image files also
use lossless compression.
Lossless compression has advantages as well as
disadvantages. The advantage is that the compressed file will
decompress to an exact duplicate of the original file,
mirroring its quality. The disadvantage is that the
compression ratio is not all that high, precisely because no
data is lost. [7]
Following techniques are included in lossless compression:
1. Run length encoding
2. Huffman encoding
3. LZW coding
4. Area coding
2) Lossy Compression
It is a compression technique that does not decompress data
back to 100% of the original. Lossy methods provide high
degrees of compression and result in very small compressed
files, but there is a certain amount of loss when they are
restored.
Audio, video and some imaging applications can tolerate
loss, and in many cases, it may not be noticeable to the human
ear or eye. In other cases, it may be noticeable, but not that
critical to the application. The more tolerance for loss, the
smaller the file can be compressed, and the faster the file can
be transmitted over a network. Examples of lossy file formats
are MP3, AAC, MPEG and JPEG.
Lossy compression is never used for business data and text,
which demand a perfect "lossless" restoration. [8]
Lossy schemes tend to provide much higher compression
ratios than lossless schemes. Lossy schemes are widely used
since the quality of the reconstructed images is adequate for
most applications. By this scheme, the decompressed image is
not identical to the original image, but reasonably close to it.
[10]
Lossy compression techniques includes following schemes:
1. Transformation coding
4. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
www.ijarcet.org
1712
2. Vector quantization
3. Fractal coding
4. Block Truncation Coding
5. Sub band coding
III. PROPOSED SYSTEM
Neither watermarking nor compression can alone make the
data transmission completely secure. Hence the new
technique is been proposed in order to achieve secure
transmission of data by making combine use of image
watermarking using DCT technique and then applying image
compression technique using improved adaptive Huffman
algorithm to it.
Fig. 2 “Flowchart showing the proposed technique”
A. Image Watermarking Using DCT
The DCT allows an image to be split up into the different
frequency bands, making it convient for embedding the
watermarking information into the middle frequency bands of
an image. The middle frequency bands are chosen such that
they have minimized they avoid the most visual important
parts of the image (low frequency) without over-exposing
themselves to removal through compression and noise
attacks. [2]
1) Steps of DCT watermarking
Fig. 3 “DCT Watermarking”
1.Transform the RGB color of the original image into
the formation of Gray color.
2.Then the image is divided into 8 × 8 blocks by
applying JPEG standard as below.
3.Transform the original 8 x 8 block into a
cosine-frequency domain
C(h) = if (h == 0) then 1/sqrt(2) else 1.0--C(h) is a
auxiliary function been used in main function
F(u,v)
F(u,v) = ¼ x C(u) x C(v) Σx=0..7 Σy=0..7 Dxy x
cos(π(2u + 1)u/16) x cos(π(2y + 1)v/16)
-Gives encoded pixel at row u, column v
-Dxy is original pixel value at row x, column y
-F(u,v) is new matrix value after DCT apply. [2]
2) Extracting Watermarked Image
Perform DCT transformation on watermarked image and
the original host image. After doing so, subtract original host
image from watermarked image. And finally do
multiplication of extracted watermark by scaling factor to
display. [2]
3) Advantages
1. DCT domain watermarking is comparatively much
beneficial than the spatial domain encoding since
DCT domain watermarking is able to survive against
the attacks such as noising, compression,
sharpening, and filtering.
2. It uses JPEG compression method to apply DCT
watermarking as a parameter. One is able to use
different kinds of parameters related to image
processing and these parameters might provide
equal or even stronger validity against various
attacks based on image processing.
3. In Discrete cosine transform (DCT), pseudorandom
sequences, such as M sequences, are been added at
the middle frequencies of the DCT as signatures. [2]
After image has been watermarked it is been compressed
using a compression algorithm that is based on Huffman
coding. Huffman coding is one of the lossless compression
techniques. Huffman algorithms have two ranges static as
well as adaptive. Static Huffman algorithm is a technique that
encodes the data in two passes. In first pass the frequency of
each symbol is been calculated and in second pass a Huffman
tree needs to be constructed. Adaptive Huffman algorithm is
extended on the basis of Huffman algorithm that constructs
the Huffman tree in one pass but take more space in
comparison to Static Huffman algorithm. The algorithm that
is used not only reduces the number of pass but also reduce
the storage space needed in comparison to adaptive Huffman
algorithm and comparable to static.
4) Static Huffman algorithm
The Static Huffman algorithm was developed by David
Huffman in (1952) is used to generate the encoded data in two
passes that are as follows:
1. The frequency of each of the different symbol present in the
source data is been calculated. After calculating frequencies
the table of all frequencies is been constructed in decreasing
order by sorting each of the different symbol in decreasing
order.
Image
Watermarking using DCT
Watermarked Image
Compression using
Improved Adaptive
Huffman algorithm
Compressed Watermarked
Image
5. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1713
www.ijarcet.org
2. Then the Huffman tree is generated by combining the least
two symbols into one composite symbol.
But in this method some time the source data available is so
lengthy that it takes so much time to construct a table which in
turns waste a lot of time as well as space required to store the
table. [4]
5) Adaptive Huffman Algorithm
Expanding the static Huffman algorithm, Faller and
Gallagher [Faller 1973; Gallagher 1978], and later Knuth
[Knuth 1985] and Vitter [Vitter 1987], developed a way to
perform Static Huffman algorithm by using one pass method
that is as follows:
Initially Adaptive Huffman algorithm generates a Huffman
tree with all different symbols with frequency count to one
and then it takes the code for first symbol in the source data.
For the second symbol it generates the second Huffman tree
and takes the code for second symbol and so on till last bit
(byte) of source data. [4]
Concept
The basic concept behind an adaptive compression
algorithm is very simple:
1. At the beginning the model is to be initialized
2. Repetition is done for each character
3. {
4. Then encoding is done for the character
5. Finally the model is updated
6. }
Decompression also works in the same way. As long as both
sides have the same initialize and update model algorithms,
they will have the same information. [4]
In Adaptive Huffman algorithm, at the time of encoding of
symbols, we need to update the tree after each symbol is
encoded. Same thing is also been performed in decoding the
code. That means there is processing overburden that is
involved in the process. The encoded data by Adaptive
Huffman algorithm requires more space than Static Huffman
encoded data. The other major drawback of the Adaptive
Huffman algorithm for encoding the data is that it requires in
advance the amount of different symbols that are present in
the source data. So it first needs to scan all the source data to
determine that how many different symbols are present in the
source data. Besides all this some other major drawbacks of
adaptive Huffman algorithm are as follows:
It is very time consuming, as it first constructs the tree
and then take the code for the symbol, for the next
symbol it adopt the same procedure and same is
repeated ( up to the last symbol).
In adaptive Huffman algorithm many different
symbols have same code in the encoded data that
creates a lot of confusion while decompressing the
data.
In adaptive Huffman same symbol that occurs
frequently has different code which can create a lot
of confusion while decompressing the data.
Finally while decompressing the data we need all
trees, for smaller data it is ok but for large data it
demands a huge storage space.
Thus to overcome all these shortcomings we have new
compression algorithm named Improved adaptive Huffman.
Improved Adaptive Huffman algorithm is based on existing
Huffman algorithm. [4]
B. Improved Adaptive Huffman
It have one pass in comparison to the existing static
Huffman algorithm and at the same times requires less space
for storing the encoded data as compared to adaptive Huffman
algorithm. The proposed method with this algorithm is as
follows:
At initial step Improved adaptive Huffman algorithm will
generate a strictly binary tree by reading first symbol from the
source data, then for the next symbol it generates a tree and so
on up to last symbol of source data. On reading the last
symbol it makes the final Huffman tree. [4]
1) Advantages
Advantages of Improved Adaptive Huffman over Adaptive
Huffman are:
Improved adaptive Huffman utilizes less space to
store the compressed data.
It saves the time because here, there is no need to scan
the whole string for constructing the first tree. It also
saves the time while constructing trees e.g. it needs
only one symbol for constructing the first tree unlike
in adaptive Huffman that requires all different
symbols to construct the tree.
In Improved adaptive Huffman even if one symbol
occurs frequently will tend to have same code.
In improved adaptive Huffman, while constructing the
next tree there is no need to remember the previous
tree.
Finally during the process of decompressing the only
final tree is needed.
2) Algorithm
1. Scan the first Symbol and initialize its frequency to 1
2. Then next symbol is been scanned from the source data
If any previous symbol = next symbol then
the frequency of that previous symbol needs to be
incremented
If any previous symbol frequency < recently incremented
symbol frequency
then
Both nodes needs to be interchanged
Else
Initialize their frequency to 1
3. Create strictly binary tree with left and right node (Left or
Right node can be NULL). The root is the composite Symbols
of left and right nodes. Assign value 0 to Right node and 1to
Left node.
4. Step 2 to 4 needs to be repeated till End of Source data is
been reached. [4]
6. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
www.ijarcet.org
1714
By the use of this algorithm the storage space will be
reduced and time is also been saved. Thus the combination of
the two processes watermarking and compression will results
in providing high security level to the data to be transmitted.
IV. IMPLEMENTATION AND RESULT
The above described work is implemented in JAVA. Firstly
visible watermarking using DCT technique is used to watermark
an image. After that improved adaptive Huffman algorithm is
used to compress the watermarked image to further enchance
security needs of the system.
Fig. 4 Visible Watermarking using DCT
Fig. 5 Compression using adaptive Huffman algorithm
Fig. 6 Compression using improved adaptive Huffman algorithm
Fig. 7 Comparison graph for adaptive Huffman and improved
adaptive Huffman
Fig. 8 PSNR value of watermarked image
V. CONCLUSION
Firstly watermarking is been discussed, its types,
requirements, its various applications, techniques. Secondly
the image compression is been discussed with its techniques.
And finally the new technique watermarking using DCT
combined with image compression using improved adaptive
Huffman algorithm is been presented to enhance the level of
security for the data to be transmitted.
ACKNOWLEDGMENT
I would like to give my sincere gratitude to my guide Dr.
Ajit Singh who guided me throughout, to complete this topic.
REFERENCES
[1] http://www.google.com/#hl=en&sclient=psy-ab&q=Abrar+Ahmed+S
yed_Digital+Watermarking.pdf&oq=Abrar+Ahmed+Syed_Digital+
Watermarking.pdf&gs_l=hp.3...15306.18741.1.19731.5.5.0.0.0.1.21
00.4803.2-1j6-1j0j1j1.4.0...0.0...1c.1.12.psy-ab.412g3Zw_g5g&pbx=
1&bav=on.2,or.r_qf.&bvm=bv.46226182,d.bmk&fp=4fb3eea262101
52c&biw=1366&bih=634J. U. Duncombe, “Infrared navigation—Part
I: An assessment of feasibility,” IEEE Trans. Electron Devices, vol.
ED-11, pp. 34-39, Jan. 1959.
[2] Darshana Mistry / (IJCSE) International Journal on Computer Science
and Engineering Vol. 02, No. 09, 2010, 2905-2909C. Y. Lin, M. Wu,
J. A. Bloom, I. J. Cox, and M. Miller, “Rotation, scale, and translation
resilient public watermarking for images,” IEEE Trans. Image
Process., vol. 10, no. 5, pp. 767-782, May 2001
[3] Watermark Attacks And Applications in Watermarking in National
Workshop-Cum-Conference on Recent Trends in Mathematics and
7. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1715
www.ijarcet.org
Computing (RTMC) 2011 Proceedings published in International
Journal of Computer Applications® (IJCA)
[4] Improved Adaptive Huffman Compression Algorithm in International
Journal of Computers & Technology Volume 1 No.1 Dec. 2011
[5] A Survey of Digital Watermarking Technologies
www.ee.sunysb.edu/~cvl/ese558/.../Lin%20Liu/ese558report_LinLi
u.pdf
[6] www.ehow.comInterne
[7] twww.wisegeek.com/what-is-lossless-compression.htm
[8] www.pcmag.com/encyclopedia/term/46335/lossy-compression
[9] searchcio-midmarket.techtarget.com/definition/image-compressio
[10] www.rimtengg.com/coit2007/proceedings/pdfs/43.pdf “A STUDY OF
VARIOUS IMAGE COMPRESSION TECHNIQUES
Dr. Ajit Singh is presently working as Chairperson of School of
Engineering & Sciences in BPSMV, Khanpur Kalan (Sonepat). He is also
having the additional charge as a Director of University Computer Center
(UGC). He posses qualifications of B.Tech, M.Tech, Ph.D. He is a member
of BOG (Board of Governors) of Haryana State Counselling Society,
Panchkula and also member of academic council in the University. He
published approximate 20 papers in National/ International journals and
conferences and holds a teaching experience of approximate 10 years. He
holds the membership of Internal Quality Assurance cell, UG-BOS
&PG-BOS and the NSS advisory committee. He is also an associate member
of CSI & IETE. His research interests are in Network Security, Computer
Architecture and Data Structure.
Ms. Meenakshi Gahlawat has completed her
B.Tech degree in Computer Science from Maharishi Dayanand University,
Rohtak in year 2011. She is pursuing M.Tech in Computer Science from
BPSMV, Khanpur Kalan from July 2011. Her research interests are in
Network Security and Computer Networks.