SlideShare a Scribd company logo
1 of 5
Download to read offline
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
www.ijarcet.org
1820

Abstract— Digital Watermarking is one of the data hiding
technique, has been popular in today for providing copyright
protection. Fundamentally, to implement a digital
watermarking, there are two approaches, pixel modification
based and frequency domain based. In frequency domain based
watermarking techniques, DCT and DWT are commonly used
and popular today. The purpose of this paper is to compare and
represent watermarking performance with the same technique,
the two techniques; DCT and DWT are presented with new
approach. At first, the new approach watermarking technique is
discussed and proposed. In the technique, on-line handwritten
signature is acquired from G-Pen F350 tablet, which is used as
watermark. Watermark is embedded in mid-band DCT domain.
On the other hand, LH band of DWT is used as embedded
media.Finally with the help of experimental results, several
performance analyses over the robustness of watermark against
various attacks of each technique are compared to determine
which technique is better.
Index Terms— Digital watermarking, Discrete Cosine
Transform (DCT) domain, Discrete Wavelet Transform (DWT)
domain.
I. INTRODUCTION
At present, our digital era provides many economic
opportunities such as cheap distribution and also faces serious
risks in distribution of illegal copies. More precisely,
thousands of digital media such as audio, video, images, and
other multimedia documents, are being distributed over the
communication networks. Because of digital media can be
copied easily, many illegal digital media products are also
being distributed at the same time. Copyright and ownership
mechanism can stop distributing illegal copies. In order to
provide these mechanisms, the use of digital watermarking is
becoming popular. Actually, digital watermarking is a
technique in which secret information called watermark is
embedded to a particular digital media. Here, the watermark
may be a logo or an image or etc which can be proved who is
right owner.
In digital image watermarking technique, there are two
domains for a embedding a watermark, namely frequency
domain and spatial domain [1] and [2]. In the frequency
domain, a watermark is embedded to coefficients of the
transformed image, while in spatial domain; it is directly
embedded in host image pixels. In the past, there are many
Manuscript received May, 2013.
Mya Thidar Kyaw, Information and Communication Technology,
University of Technology(Yatanarpon Cyber City) PyinOoLwin, Myanmar,
Dr. Kyi Soe, Registrar of Univeristy of Technology (Yatanarpon Cyber
City) PyinOoLwin Myanmar,
previous works in digital watermarking based on the both
domains have been proposed.
In the frequency domain based approach, one of the first
algorithms presented by Cox et al. (1997) used global DCT
approach to embed a robust watermark in the perceptually
significant portion of the Human Visual System (HVS) [3].
The next work of DCT is block based method and published
in 2000 by Huang, J, Shi, YQ and Shi [4]. In this work, an
image to be embedded is divided into non-overlap blocks and
then they are transformed. In each block, transform
coefficients which have large perceptual capacity are selected
as DC components to be embedded. Another next publication
is “Digital Watermarking based DCT and JPEG model” by
M. A. Suhail and M. S. Obaidat in 2003 [5]. The work
proposed digital watermarking algorithm based on discrete
cosine transformed (DCT) coefficients and image
segmentation.
In the other side, the watermarking process in the spatial
domain based approach can simply be performed by
modifying image pixels directly. In 1998, Kutter et al. [6]
proposed embedding watermark bit into the blue channel of a
color image by modifying the image pixels. Later, T.
Amornraksa et al. [7] proposed three different techniques to
improve the watermark retrieval performance of [6]. The next
improvement of the watermark retrieval performance was
proposed by Z. L. Aung et al. [8] by using non-linear filtering.
The authors considered the watermark signal as a noise and
attempted to reduce its effect by removing the noisiest pixel in
the original pixel prediction process. Later, N.N.Hlaing et al.
[9] proposed an improved version based on majority voting to
fix all the weaknesses of previous works.
In this paper, the transformed based digital watermarking
using DCT and DWT are analyzed and compared. This paper
is structured as follows. Background theory of digital
watermarking in spatial domain and frequency domain are
studied in the next section. In section 3, our proposed systems
of DCT and DWT are briefly described. In section 4,
experimental results of DCT and DWT are presented by
comparing between their performances depended on various
attacks. Finally, some conclusion and further work are drawn
in section 6.
II. THEORETICAL ISSUE
There are mainly two parts in every digital watermarking
technique. These two parts are embedding in which
watermark is inserted and watermark extraction in which
watermark is recovered.
The spatial domain approached digital watermarking
techniques are not too much complex. In the watermark
embedding, watermark energy is directly added or subtracted
The Comparative Study of DCT and DWT
in Blind Detection Based Digital Watermarking
Mya Thidar Kyaw, Dr. Kyi Soe
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1821
www.ijarcet.org
to the corresponding host or cover image pixel. In the other
word, the watermark embedding process can be seen as the
addition of watermark and host image and the output is
watermarked image. The embedding process can be
demonstrated as follow [8].
Fig.1Watermark Embedding Process in spatial domain
On another side, in the watermark recovery process,
original host image can be predicted and estimated from
watermarked image by removing modified watermarked
pixels and replacing with the best neighbor pixels. This
process is called original image prediction and the result
image of the process is predicted original image, not original
image. By this way, embedded watermark can be recovered
by subtraction of predicted original image from watermarked
image. The processes can be illustrated as followed [9].
Fig. 2 Watermark Extraction Process in spatial domain
In the extraction process, several different extraction
methods are used according to embedded algorithm.
Commonly, averaging and correlation are used in most of the
method to extract watermark bit because they are simple and
efficient. The following figures describe the embedding and
extraction processes in the frequency domain based
watermarking.
Fig.3 Watermark Embedding Process in frequency domain
Fig.4 Watermark Extraction Process in frequency domain
The frequency domain transform based algorithms are slow
compared with spatial domain based. Although frequency
domain approaches methods are robust against compression
and filtering attacks but weak in geometrical attacks [10].
However, they can give better perceptual transparency.
III. PROPOSED SYSTEM
In this section, the two frequency domain based
watermarking technique are presented and proposed.
A. DCT Watermarking Technique
The transform (DCT) represent an image from spatial
domain to frequency domain representation as a sum of
sinusoids of varying magnitudes and frequencies. It is also a
reversible transformation technique. The following equations
are for the two dimensional DCT transformation [11].
   
N
qm
M
pmN
m
N
n
mn
A
qppq
B
2
12
cos
2
121
0
cos
1
0




  


   
N
qm
M
pmN
p
N
q
mn
B
qpmn
A
2
12
cos
2
121
0
cos
1
0




  










11,2
0,
1
)(
Np
N
p
Np








11,2
0,
1
)(
Nq
N
q
Nq
Where, A is input image and B is output, transformed
image. The equation 1 is transformed equation and 2 is
inverse transformed. The input image is used the same
number of rows and column. M is number of rows and N is
number of column. The value of m, n, p and q are varies from
0 to N-1.
Watermark embedding in DCT
DCT domain watermarking can be classified into Global
DCT watermarking and Block based DCT watermarking [3].
Now, the proposed technique is one of the Block based DCT.
Embedding procedures are as followed.
1. Input image is divided into 8x8 sub images.
Selected
sub-band for
embedding
process
Original
image
Transform
Watermark
Permutation
Signal strength
tuning process
Watermarked
image
Inverse
transform
(1)
(2)
(3)
(4)
Image
Encryption
Watermark
Host Image Watermarked
Image
Original
Image
Prediction
Watermark
Watermarked
Image
Predicted
Original
Image
Image
Decryptio
n
Watermark
extraction
process
Watermarked
image
Transform Watermark
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
www.ijarcet.org
1822
2. Each sub image is transformed with DCT.
3. Select minimum high frequency component in the
transformed image and it is used as watermark
energy.
4. Watermark image is permutated with a key and
convert as one dimension arrays and then the array is
divided into 8 elements sub arrays.
5. Watermark energy (minimum high frequency
component) is inserted in the mid- band frequency of
each sub image. One 8 elements watermark sub array
is used for each sub image. In the mid-band frequency
components of a sub image, the watermark energy is
replaced whenever the watermark array element is 0.
If the watermark array element is 1, there is no change
in mid-band.
6. After inserting watermark energy in the mid-band of a
sub image, it is inverse transformed to spatial domain.
7. All retransformed sub images are recombined to
produce watermarked image.
Fig.5 Watermark Embedding Process of DCT
BHjiwjiBMjiBM *),(),(),(  (5)
Where, ),( jiBM  is watermarked mid-band frequency
component, ),( jiBM is mid-band frequency component and
w(i,j) is watermark bit at the location of (i,j). HB is minimum
high frequency component, used as watermark energy.
Watermark Extraction in DCT
In the extraction process, watermarked image is divided
into 8x8 sub image and each sub images is transformed with
DCT. In each sub image, minimum high frequency
component is searched. If the high frequency component is
found, 0 is placed in the respective order of recovery
watermark array obeying the rule used in embedding process.
If there is no found the frequency component, 1 is replaced in
the recovery array. By this way, recovery watermark can be
retrieved by recombining these sub arrays of each sub image.
0 if minimum high
frequency is found
Recovery watermark bit is
1 if minimum high
frequency is not found
B. DWT Watermarking Technique
The DWT watermarking method is not different too much
with DCT watermarking as discussed. As the same as
previous DCT embedding algorithm, original image is
divided into 8x8 sub images. Each sub image is DWT
decomposed into four frequency districts, LL, LH, HL and
HH. Watermark image is also converted into one dimensional
array and it is divided 8 elements sub arrays. LH band is used
to embed watermark. Here, not all LH band components are
used, only diagonal components of the LH band are used to
embed watermark. In the LH band, minimum frequency
component is selected and used as watermark energy. The
watermark energy is embedded on diagonal components of
the LH channel whenever watermark bit is 0. After all
watermark arrays have been embedded, the sub blocks are
recombined and the embedded image is returned to spatial
domain by performing invert-transformation. The
invert-transformed image is output watermarked image.
In the watermark extraction process, the watermarked
image is firstly divided into 8x8 sub images. Each sub image
is also transformed with DWT and decomposed into four
frequency districts, LL, LH, HL and HH. Then, the minimum
component (watermark energy) is searched in the LH band. If
it is found (not found), put 0 (1) to the sub watermark array
element according to the pre-define order used in embedded
process. Then, after all sub watermark arrays have been
recovered, they are recombined and reshaped into recovery
watermark image.
By presenting similar watermarking technique of DCT and
DWT as above discussion, performances of DCT and DWT
in watermarking are analyzed. The detail performance
analyses can be seen in the next section.
IV. EXPERIMENTAL SETTING & RESULTS
In this section, the detail performance analyses and the
robustness against various attacks of the two transformed
techniques are presented.
A. Experimental Setting
In the experiments, we used eight standard color images
that are different characteristics, „Airplane‟, „Baboon‟, „Bird‟,
„Fish‟, „House‟, „Lena‟, Pepper‟, and „Tower‟ as the original
host images. A two colors black & white image containing a
sign was used as a watermark signal and shown in the
following Figure.
(a) ‘Airplane’ (b) ‘Baboon’ (c) ‘Bird’
(d) „Fish’ (e) „House’ (f) ‘Lena’
(g) ‘Pepper’ (h) ‘Tower’ (i) ‘sign’
Fig.6 Testing images and watermark
To measure the quality of the watermarked image the
quality of the retrieved watermark, Peak Signal to Noise Ratio
(PSNR) and Normal Correlation (NC) are evaluated and
determined by equation (5) and (6).
8x8 sub image
Selection of
watermark energy, HB
Watermark
bit, w(i,j)
Mid-band
frequency
component
MB(i,j)
watermarked
Mid-band
component
MB‟(i,j)
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1823
www.ijarcet.org













M
i
N
j
jiw
M
i
N
j
jiw
M
i
N
j
jiwjiw
NC
1 1
2),('
1 1
2),(
1 1
),('),(
From these equations, M and N are the numbers of row and
column of the images; w(i,j) and w‟(i,j) are the original
watermark bit and the retrieved watermark bit at coordinate
(i,j). Note that higher NC value, the retrieved watermark will
be more correctly.
B. Performance Comparisons
To measure the retrieval performance of the proposed
methods based on DCT and DWT, average NC values are
evaluated from various images with nearly the same PSNR.
The evaluation results are described as the following table.
Table I. Performance comparison between DCT and DWT at
different images.
Images DCT DWT
PSNR NC PSNR NC
Lena 30.09381 0.995883 30.19880 0.997469
Baboon 30.32194 0.998418 30.61585 0.993681
Bird 30.19951 0.984608 30.10601 0.996229
House 30.23003 0.996041 30.54534 0.995421
Pepper 30.11686 0.996993 30.27857 0.997157
Tower 30.66638 0.976817 30.02741 0.994140
Fish 28.74961 0.947583 28.58604 0.939526
Average 30.27142 0.991460 30.29533 0.995683
According to the table 1, the DWT transformed based
technique is not better too much on DCT. The following
figure shows the output result of both techniques at PSNR
value of 40.
(a)
(b)
(c)
(d)
Fig.7 (a),(b)watermarked image and recovery watermark of
DCT, and (c), (d) of DWT
We will continue analyze and compare the performance
against image processing attacks such as JPEG compression,
blurring, contrasting and sharpening, noises such as Gaussian
noise and salt and pepper noise, and finally evaluate
performance on geometrical attacks, image cropping and
resizing. In all experiments against on the above attacks, the
values of performance are estimated in PSNR value of 40 ±
0.01 dB. The performance comparisons are expressed as
following table.
Table II. Average NC values obtained from various attacks at
a given signal strength.
No Type of attack Strength NC of
DCT
NC of
DWT
1 JPEG 90% 0.85635 0.6294
2 Blurring 20% of image
pixel
0.93486 0.75471
3 Contrast 200% 0.93037 0.9031
4 Brightness 100% 0.96340 0.9514
5 Sharpening 90% 0.95670 0.9561
6 Gaussian noise 0.01 variance 0.86155 0.7474
7 Salt & Pepper 0.06 density 0.92603 0.9265
8 Cropping 40% 0.86719 0.7733
9 Resizing 50% 0.68540 0.5516
According to the above robustness performance
comparisons, DCT of the proposed method is better than






M
i
N
j
jiBjiB
MN
PSNR
1 1
2)),(),('(
3255
10log20(dB) (6)
(7)
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
www.ijarcet.org
1824
DWT in most of the attacks. The result recovery watermark
images against the above attacks are as followed.
Attack
Recovery Image
DCT DWT
Salt&Pepper
0.03 density
Cropping
50%
Resizing 0.75 of
original image
JPEG 100%
Blurring 20% of image
pixel
Brightness 30%
Fig.8 Recovery watermark of DCT and DWT in various
attacks
According to the figure 8, the proposed method is so weak
in JPEG attack on both DCT and DWT. However, the
proposed method can robust against most of attacks. By the
proposed method, DCT watermarking is slightly better than
DWT in both recovery performance and robustness against
various attacks.
V. CONCLUSION
In this paper, we have presented block based watermarking
techniques of DCT and DWT with blind detection by
comparing their performances. The same technique, our
proposed algorithm have been used for both DCT and DWT
watermarking to measure their performances. The
experimental results clearly point out which technique is
better. Although frequency domain based digital
watermarking techniques are usually better in perceptibility
but weak in against geometrical attacks, the proposed
techniques can rather against the geometrical attacks. Hence,
it can be concluded that it is one of the better techniques in
frequency domain based digital watermarking.
Watermark technology is so wide and rich of various
techniques. As it is one of the interesting technological roads,
we will continue our researches on the road, especially on
neutral net based watermarking in future.
REFERENCES
[1] S.J. Lee, S.H. Jung, “A servey of watermarking
techniques applied to multimedia,” Proc. of ISIE 2001,
Pusan, South Korea, vol. 1, pp. 272-277, June 2001.
[2] I.J. Cox, M.L. Miller, and J.A. Bloom, “Digital
wateramrking and Steganography,” Morgan Kaufmann
Publishers, 2002.
[3] I.J Cox, J. Kilian, F.T. Leighton, and T. Shamoon,
“Secure spread spectrum watermarking for multimedia”
in IEEE Transactions on Image Processing, vol. 6, no.
12, pp:1673 -1687, Dec.1997.
[4] Huang, J, Shi, YQ & Shi, “Embedding Image
Watermarks in DC Components”, IEEE Transactions on
Circuits and System for Video Technology, vol. 10, no.
6, pp. 974-979, 2000.
[5] M. A. Suhail and M. S. Obaidat, “Digital Watermarking
based DCT and JPEG model,” IEEE Trans.
instrumentation and measurement, vol. 52, no. 5,
pp.1640-1647, October 2003.
[6] M. Kutter, F. Jordan, and F. Bossen, “Digital Signature
of Color Images using Amplitude Modulation,” Journal
of Electronic Imaging, vol. 7, no. 2, pp. 326-332, 1998.
[7] T. Amornraksa and K. Janthawongwilai, “Enhanced
Image Watermarking based on Amplitude Modulation,”
Image and Vision Computing, vol. 24, no. 2, pp.
111-119, 2006.
[8] Z. L. Aung and T. Amornraksa, “Improved Watermark
Extraction Method based on Non-linear Filtering,” Proc.
of the 13th
NCSEC, Bangkok, Thailand, pp. 314-319,
November 2009.
[9] N. N. Hlaing and T. Amornraksa, “Reducing Prediction
Error in Watermarking Recovery Process by Using
Majority Voting,” accepted at ISPACS 2011, Chaingmai,
Thailand.
[10] Darshana Mistry ,“Comparison of Digital Water Marking
methods”, Darshana Mistry / (IJCSE) International
Journal on Computer Science and Engineering, Vol. 02,
No. 09, 2010.
[11] Mona M. El-Ghoneimy, “Comparison Between Two
Watermarking Algorithms Using DCT Coefficient and
LSB Replacement”, Journal of Theoretical and Applied
Information Technology.
[12] Baisa L. Gunjal and R.R. Manthalkar, “An Overview of
Transform Domain Robust Digital Image Watermarking
Algorithms”, Journal of Emerging Trends in Computing
and Information Sciences, vol.2, no.1.
Mya Thidar Kyaw
I have received M.Sc.degree in Computer Science from University of
Computer Studies, Yangon, Myanmar and pursuing Ph.D degree in
Information Technology from University of Technology(Yatanarpon
Cyber City), Pyin Oo Lwin, Myanmar.
Dr.Kyi Soe
Registrar, University of Technology (Yatanarpon Cyber City)
Pyin Oo Lwin, Myanmar.

More Related Content

What's hot

Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithmeSAT Publishing House
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...IRJET Journal
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
 
Semi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svdSemi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svdsipij
 
Robust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueRobust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueCSCJournals
 
Paper id 36201508
Paper id 36201508Paper id 36201508
Paper id 36201508IJRAT
 
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...gerogepatton
 
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDWatermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDIRJET Journal
 
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...csandit
 
Video Compression Algorithm Based on Frame Difference Approaches
Video Compression Algorithm Based on Frame Difference Approaches Video Compression Algorithm Based on Frame Difference Approaches
Video Compression Algorithm Based on Frame Difference Approaches ijsc
 
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder TheoremRobust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder TheoremjournalBEEI
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH acijjournal
 
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...IJERA Editor
 

What's hot (19)

Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithm
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
Semi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svdSemi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svd
 
Robust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueRobust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet Technique
 
Paper id 36201508
Paper id 36201508Paper id 36201508
Paper id 36201508
 
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
 
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDWatermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
 
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
 
A0360105
A0360105A0360105
A0360105
 
H3602056060
H3602056060H3602056060
H3602056060
 
Video Compression Algorithm Based on Frame Difference Approaches
Video Compression Algorithm Based on Frame Difference Approaches Video Compression Algorithm Based on Frame Difference Approaches
Video Compression Algorithm Based on Frame Difference Approaches
 
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
 
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder TheoremRobust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
 
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
 

Similar to 1820 1824

A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
 
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
 
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...CSCJournals
 
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarkingijsrd.com
 
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmIRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmLalith Kumar
 
A Blind Watermarking Algorithm
A Blind Watermarking AlgorithmA Blind Watermarking Algorithm
A Blind Watermarking AlgorithmIRJET Journal
 
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmIRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmIRJET Journal
 
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESijiert bestjournal
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
 
Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofDigital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofIAEME Publication
 

Similar to 1820 1824 (20)

A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
 
G0523444
G0523444G0523444
G0523444
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
 
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
 
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
 
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image WatermarkingComparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarking
 
1674 1677
1674 16771674 1677
1674 1677
 
1674 1677
1674 16771674 1677
1674 1677
 
50120140506015
5012014050601550120140506015
50120140506015
 
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmIRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking Algorithm
 
A Blind Watermarking Algorithm
A Blind Watermarking AlgorithmA Blind Watermarking Algorithm
A Blind Watermarking Algorithm
 
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmIRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking Algorithm
 
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofDigital image watermarking using dct with high security of
Digital image watermarking using dct with high security of
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

1820 1824

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 www.ijarcet.org 1820  Abstract— Digital Watermarking is one of the data hiding technique, has been popular in today for providing copyright protection. Fundamentally, to implement a digital watermarking, there are two approaches, pixel modification based and frequency domain based. In frequency domain based watermarking techniques, DCT and DWT are commonly used and popular today. The purpose of this paper is to compare and represent watermarking performance with the same technique, the two techniques; DCT and DWT are presented with new approach. At first, the new approach watermarking technique is discussed and proposed. In the technique, on-line handwritten signature is acquired from G-Pen F350 tablet, which is used as watermark. Watermark is embedded in mid-band DCT domain. On the other hand, LH band of DWT is used as embedded media.Finally with the help of experimental results, several performance analyses over the robustness of watermark against various attacks of each technique are compared to determine which technique is better. Index Terms— Digital watermarking, Discrete Cosine Transform (DCT) domain, Discrete Wavelet Transform (DWT) domain. I. INTRODUCTION At present, our digital era provides many economic opportunities such as cheap distribution and also faces serious risks in distribution of illegal copies. More precisely, thousands of digital media such as audio, video, images, and other multimedia documents, are being distributed over the communication networks. Because of digital media can be copied easily, many illegal digital media products are also being distributed at the same time. Copyright and ownership mechanism can stop distributing illegal copies. In order to provide these mechanisms, the use of digital watermarking is becoming popular. Actually, digital watermarking is a technique in which secret information called watermark is embedded to a particular digital media. Here, the watermark may be a logo or an image or etc which can be proved who is right owner. In digital image watermarking technique, there are two domains for a embedding a watermark, namely frequency domain and spatial domain [1] and [2]. In the frequency domain, a watermark is embedded to coefficients of the transformed image, while in spatial domain; it is directly embedded in host image pixels. In the past, there are many Manuscript received May, 2013. Mya Thidar Kyaw, Information and Communication Technology, University of Technology(Yatanarpon Cyber City) PyinOoLwin, Myanmar, Dr. Kyi Soe, Registrar of Univeristy of Technology (Yatanarpon Cyber City) PyinOoLwin Myanmar, previous works in digital watermarking based on the both domains have been proposed. In the frequency domain based approach, one of the first algorithms presented by Cox et al. (1997) used global DCT approach to embed a robust watermark in the perceptually significant portion of the Human Visual System (HVS) [3]. The next work of DCT is block based method and published in 2000 by Huang, J, Shi, YQ and Shi [4]. In this work, an image to be embedded is divided into non-overlap blocks and then they are transformed. In each block, transform coefficients which have large perceptual capacity are selected as DC components to be embedded. Another next publication is “Digital Watermarking based DCT and JPEG model” by M. A. Suhail and M. S. Obaidat in 2003 [5]. The work proposed digital watermarking algorithm based on discrete cosine transformed (DCT) coefficients and image segmentation. In the other side, the watermarking process in the spatial domain based approach can simply be performed by modifying image pixels directly. In 1998, Kutter et al. [6] proposed embedding watermark bit into the blue channel of a color image by modifying the image pixels. Later, T. Amornraksa et al. [7] proposed three different techniques to improve the watermark retrieval performance of [6]. The next improvement of the watermark retrieval performance was proposed by Z. L. Aung et al. [8] by using non-linear filtering. The authors considered the watermark signal as a noise and attempted to reduce its effect by removing the noisiest pixel in the original pixel prediction process. Later, N.N.Hlaing et al. [9] proposed an improved version based on majority voting to fix all the weaknesses of previous works. In this paper, the transformed based digital watermarking using DCT and DWT are analyzed and compared. This paper is structured as follows. Background theory of digital watermarking in spatial domain and frequency domain are studied in the next section. In section 3, our proposed systems of DCT and DWT are briefly described. In section 4, experimental results of DCT and DWT are presented by comparing between their performances depended on various attacks. Finally, some conclusion and further work are drawn in section 6. II. THEORETICAL ISSUE There are mainly two parts in every digital watermarking technique. These two parts are embedding in which watermark is inserted and watermark extraction in which watermark is recovered. The spatial domain approached digital watermarking techniques are not too much complex. In the watermark embedding, watermark energy is directly added or subtracted The Comparative Study of DCT and DWT in Blind Detection Based Digital Watermarking Mya Thidar Kyaw, Dr. Kyi Soe
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1821 www.ijarcet.org to the corresponding host or cover image pixel. In the other word, the watermark embedding process can be seen as the addition of watermark and host image and the output is watermarked image. The embedding process can be demonstrated as follow [8]. Fig.1Watermark Embedding Process in spatial domain On another side, in the watermark recovery process, original host image can be predicted and estimated from watermarked image by removing modified watermarked pixels and replacing with the best neighbor pixels. This process is called original image prediction and the result image of the process is predicted original image, not original image. By this way, embedded watermark can be recovered by subtraction of predicted original image from watermarked image. The processes can be illustrated as followed [9]. Fig. 2 Watermark Extraction Process in spatial domain In the extraction process, several different extraction methods are used according to embedded algorithm. Commonly, averaging and correlation are used in most of the method to extract watermark bit because they are simple and efficient. The following figures describe the embedding and extraction processes in the frequency domain based watermarking. Fig.3 Watermark Embedding Process in frequency domain Fig.4 Watermark Extraction Process in frequency domain The frequency domain transform based algorithms are slow compared with spatial domain based. Although frequency domain approaches methods are robust against compression and filtering attacks but weak in geometrical attacks [10]. However, they can give better perceptual transparency. III. PROPOSED SYSTEM In this section, the two frequency domain based watermarking technique are presented and proposed. A. DCT Watermarking Technique The transform (DCT) represent an image from spatial domain to frequency domain representation as a sum of sinusoids of varying magnitudes and frequencies. It is also a reversible transformation technique. The following equations are for the two dimensional DCT transformation [11].     N qm M pmN m N n mn A qppq B 2 12 cos 2 121 0 cos 1 0              N qm M pmN p N q mn B qpmn A 2 12 cos 2 121 0 cos 1 0                  11,2 0, 1 )( Np N p Np         11,2 0, 1 )( Nq N q Nq Where, A is input image and B is output, transformed image. The equation 1 is transformed equation and 2 is inverse transformed. The input image is used the same number of rows and column. M is number of rows and N is number of column. The value of m, n, p and q are varies from 0 to N-1. Watermark embedding in DCT DCT domain watermarking can be classified into Global DCT watermarking and Block based DCT watermarking [3]. Now, the proposed technique is one of the Block based DCT. Embedding procedures are as followed. 1. Input image is divided into 8x8 sub images. Selected sub-band for embedding process Original image Transform Watermark Permutation Signal strength tuning process Watermarked image Inverse transform (1) (2) (3) (4) Image Encryption Watermark Host Image Watermarked Image Original Image Prediction Watermark Watermarked Image Predicted Original Image Image Decryptio n Watermark extraction process Watermarked image Transform Watermark
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 www.ijarcet.org 1822 2. Each sub image is transformed with DCT. 3. Select minimum high frequency component in the transformed image and it is used as watermark energy. 4. Watermark image is permutated with a key and convert as one dimension arrays and then the array is divided into 8 elements sub arrays. 5. Watermark energy (minimum high frequency component) is inserted in the mid- band frequency of each sub image. One 8 elements watermark sub array is used for each sub image. In the mid-band frequency components of a sub image, the watermark energy is replaced whenever the watermark array element is 0. If the watermark array element is 1, there is no change in mid-band. 6. After inserting watermark energy in the mid-band of a sub image, it is inverse transformed to spatial domain. 7. All retransformed sub images are recombined to produce watermarked image. Fig.5 Watermark Embedding Process of DCT BHjiwjiBMjiBM *),(),(),(  (5) Where, ),( jiBM  is watermarked mid-band frequency component, ),( jiBM is mid-band frequency component and w(i,j) is watermark bit at the location of (i,j). HB is minimum high frequency component, used as watermark energy. Watermark Extraction in DCT In the extraction process, watermarked image is divided into 8x8 sub image and each sub images is transformed with DCT. In each sub image, minimum high frequency component is searched. If the high frequency component is found, 0 is placed in the respective order of recovery watermark array obeying the rule used in embedding process. If there is no found the frequency component, 1 is replaced in the recovery array. By this way, recovery watermark can be retrieved by recombining these sub arrays of each sub image. 0 if minimum high frequency is found Recovery watermark bit is 1 if minimum high frequency is not found B. DWT Watermarking Technique The DWT watermarking method is not different too much with DCT watermarking as discussed. As the same as previous DCT embedding algorithm, original image is divided into 8x8 sub images. Each sub image is DWT decomposed into four frequency districts, LL, LH, HL and HH. Watermark image is also converted into one dimensional array and it is divided 8 elements sub arrays. LH band is used to embed watermark. Here, not all LH band components are used, only diagonal components of the LH band are used to embed watermark. In the LH band, minimum frequency component is selected and used as watermark energy. The watermark energy is embedded on diagonal components of the LH channel whenever watermark bit is 0. After all watermark arrays have been embedded, the sub blocks are recombined and the embedded image is returned to spatial domain by performing invert-transformation. The invert-transformed image is output watermarked image. In the watermark extraction process, the watermarked image is firstly divided into 8x8 sub images. Each sub image is also transformed with DWT and decomposed into four frequency districts, LL, LH, HL and HH. Then, the minimum component (watermark energy) is searched in the LH band. If it is found (not found), put 0 (1) to the sub watermark array element according to the pre-define order used in embedded process. Then, after all sub watermark arrays have been recovered, they are recombined and reshaped into recovery watermark image. By presenting similar watermarking technique of DCT and DWT as above discussion, performances of DCT and DWT in watermarking are analyzed. The detail performance analyses can be seen in the next section. IV. EXPERIMENTAL SETTING & RESULTS In this section, the detail performance analyses and the robustness against various attacks of the two transformed techniques are presented. A. Experimental Setting In the experiments, we used eight standard color images that are different characteristics, „Airplane‟, „Baboon‟, „Bird‟, „Fish‟, „House‟, „Lena‟, Pepper‟, and „Tower‟ as the original host images. A two colors black & white image containing a sign was used as a watermark signal and shown in the following Figure. (a) ‘Airplane’ (b) ‘Baboon’ (c) ‘Bird’ (d) „Fish’ (e) „House’ (f) ‘Lena’ (g) ‘Pepper’ (h) ‘Tower’ (i) ‘sign’ Fig.6 Testing images and watermark To measure the quality of the watermarked image the quality of the retrieved watermark, Peak Signal to Noise Ratio (PSNR) and Normal Correlation (NC) are evaluated and determined by equation (5) and (6). 8x8 sub image Selection of watermark energy, HB Watermark bit, w(i,j) Mid-band frequency component MB(i,j) watermarked Mid-band component MB‟(i,j)
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1823 www.ijarcet.org              M i N j jiw M i N j jiw M i N j jiwjiw NC 1 1 2),(' 1 1 2),( 1 1 ),('),( From these equations, M and N are the numbers of row and column of the images; w(i,j) and w‟(i,j) are the original watermark bit and the retrieved watermark bit at coordinate (i,j). Note that higher NC value, the retrieved watermark will be more correctly. B. Performance Comparisons To measure the retrieval performance of the proposed methods based on DCT and DWT, average NC values are evaluated from various images with nearly the same PSNR. The evaluation results are described as the following table. Table I. Performance comparison between DCT and DWT at different images. Images DCT DWT PSNR NC PSNR NC Lena 30.09381 0.995883 30.19880 0.997469 Baboon 30.32194 0.998418 30.61585 0.993681 Bird 30.19951 0.984608 30.10601 0.996229 House 30.23003 0.996041 30.54534 0.995421 Pepper 30.11686 0.996993 30.27857 0.997157 Tower 30.66638 0.976817 30.02741 0.994140 Fish 28.74961 0.947583 28.58604 0.939526 Average 30.27142 0.991460 30.29533 0.995683 According to the table 1, the DWT transformed based technique is not better too much on DCT. The following figure shows the output result of both techniques at PSNR value of 40. (a) (b) (c) (d) Fig.7 (a),(b)watermarked image and recovery watermark of DCT, and (c), (d) of DWT We will continue analyze and compare the performance against image processing attacks such as JPEG compression, blurring, contrasting and sharpening, noises such as Gaussian noise and salt and pepper noise, and finally evaluate performance on geometrical attacks, image cropping and resizing. In all experiments against on the above attacks, the values of performance are estimated in PSNR value of 40 ± 0.01 dB. The performance comparisons are expressed as following table. Table II. Average NC values obtained from various attacks at a given signal strength. No Type of attack Strength NC of DCT NC of DWT 1 JPEG 90% 0.85635 0.6294 2 Blurring 20% of image pixel 0.93486 0.75471 3 Contrast 200% 0.93037 0.9031 4 Brightness 100% 0.96340 0.9514 5 Sharpening 90% 0.95670 0.9561 6 Gaussian noise 0.01 variance 0.86155 0.7474 7 Salt & Pepper 0.06 density 0.92603 0.9265 8 Cropping 40% 0.86719 0.7733 9 Resizing 50% 0.68540 0.5516 According to the above robustness performance comparisons, DCT of the proposed method is better than       M i N j jiBjiB MN PSNR 1 1 2)),(),('( 3255 10log20(dB) (6) (7)
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 www.ijarcet.org 1824 DWT in most of the attacks. The result recovery watermark images against the above attacks are as followed. Attack Recovery Image DCT DWT Salt&Pepper 0.03 density Cropping 50% Resizing 0.75 of original image JPEG 100% Blurring 20% of image pixel Brightness 30% Fig.8 Recovery watermark of DCT and DWT in various attacks According to the figure 8, the proposed method is so weak in JPEG attack on both DCT and DWT. However, the proposed method can robust against most of attacks. By the proposed method, DCT watermarking is slightly better than DWT in both recovery performance and robustness against various attacks. V. CONCLUSION In this paper, we have presented block based watermarking techniques of DCT and DWT with blind detection by comparing their performances. The same technique, our proposed algorithm have been used for both DCT and DWT watermarking to measure their performances. The experimental results clearly point out which technique is better. Although frequency domain based digital watermarking techniques are usually better in perceptibility but weak in against geometrical attacks, the proposed techniques can rather against the geometrical attacks. Hence, it can be concluded that it is one of the better techniques in frequency domain based digital watermarking. Watermark technology is so wide and rich of various techniques. As it is one of the interesting technological roads, we will continue our researches on the road, especially on neutral net based watermarking in future. REFERENCES [1] S.J. Lee, S.H. Jung, “A servey of watermarking techniques applied to multimedia,” Proc. of ISIE 2001, Pusan, South Korea, vol. 1, pp. 272-277, June 2001. [2] I.J. Cox, M.L. Miller, and J.A. Bloom, “Digital wateramrking and Steganography,” Morgan Kaufmann Publishers, 2002. [3] I.J Cox, J. Kilian, F.T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia” in IEEE Transactions on Image Processing, vol. 6, no. 12, pp:1673 -1687, Dec.1997. [4] Huang, J, Shi, YQ & Shi, “Embedding Image Watermarks in DC Components”, IEEE Transactions on Circuits and System for Video Technology, vol. 10, no. 6, pp. 974-979, 2000. [5] M. A. Suhail and M. S. Obaidat, “Digital Watermarking based DCT and JPEG model,” IEEE Trans. instrumentation and measurement, vol. 52, no. 5, pp.1640-1647, October 2003. [6] M. Kutter, F. Jordan, and F. Bossen, “Digital Signature of Color Images using Amplitude Modulation,” Journal of Electronic Imaging, vol. 7, no. 2, pp. 326-332, 1998. [7] T. Amornraksa and K. Janthawongwilai, “Enhanced Image Watermarking based on Amplitude Modulation,” Image and Vision Computing, vol. 24, no. 2, pp. 111-119, 2006. [8] Z. L. Aung and T. Amornraksa, “Improved Watermark Extraction Method based on Non-linear Filtering,” Proc. of the 13th NCSEC, Bangkok, Thailand, pp. 314-319, November 2009. [9] N. N. Hlaing and T. Amornraksa, “Reducing Prediction Error in Watermarking Recovery Process by Using Majority Voting,” accepted at ISPACS 2011, Chaingmai, Thailand. [10] Darshana Mistry ,“Comparison of Digital Water Marking methods”, Darshana Mistry / (IJCSE) International Journal on Computer Science and Engineering, Vol. 02, No. 09, 2010. [11] Mona M. El-Ghoneimy, “Comparison Between Two Watermarking Algorithms Using DCT Coefficient and LSB Replacement”, Journal of Theoretical and Applied Information Technology. [12] Baisa L. Gunjal and R.R. Manthalkar, “An Overview of Transform Domain Robust Digital Image Watermarking Algorithms”, Journal of Emerging Trends in Computing and Information Sciences, vol.2, no.1. Mya Thidar Kyaw I have received M.Sc.degree in Computer Science from University of Computer Studies, Yangon, Myanmar and pursuing Ph.D degree in Information Technology from University of Technology(Yatanarpon Cyber City), Pyin Oo Lwin, Myanmar. Dr.Kyi Soe Registrar, University of Technology (Yatanarpon Cyber City) Pyin Oo Lwin, Myanmar.