SlideShare a Scribd company logo
1 of 9
Download to read offline
Innovative Systems Design and Engineering                                                         www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 3




    Secured Overlapping Technique for Digital Watermarking
                                   Muhammad Sharif        (Corresponding author)
                Department of Computer Science, COMSATS Institute of Information Technology
                                        PO box 47040, Wah Cantt, Pakistan
                        Tel: +92303-5188998 E-mail: muhammadsharifmalik@yahoo.com


                                   Aisha Azeem, Waqas Haider, Mudassar Raza
                Department of Computer Science, COMSATS Institute of Information Technology
                                        PO box 47040, Wah Cantt, Pakistan
             E-mail: aishaazeem19@gmail.com,waqasbtn@gmail.com, mudassarkazmi@yahoo.com


Abstract
Information security is a mandatory issue in current information technology world. A secure overlapping
method is proposed in this paper whose key functionality is to distribute the key words at different places
inside an image. It requires the extraction of overlapping blocks of image of the size of 4x4 matrixes and
taking its transpose. Afterwards arranging the block to linear form row-by-row and applying watermark on it,
and finally converting the block back to its original form just like the first step. This technique results in the
distribution of hidden data within the block. This scattering of data is beneficial because attacker is unable to
find the precise localization of hidden data within the overlapped blocks.
Keywords: Watermarking, Copyrights, Information security.
1. Introduction
Copyright deals with an objects ownership. If the original work is not protected by copyright, then placing
digital contents like images or videos on Internet can put them at risk of theft or alterations. Digital
watermarking provides a way to handle such issues. The need to protect the work can be depicted from
following scenario: Suppose a designer has created an artwork possibly an image of some sort. He than
wants that image to displayed on website. But when that image appears somewhere else on the Internet the
designer needs to prove his ownership by demonstrating a difference between the copied and the original
image. This could be verified easily, if transparent signatures i.e. digital watermarks are embedded within
the digital files. These transparent signatures can be noise some random information or possibly sequence
of data, so that removal is not possible or is difficult (Vovatzis etc 1999, Chang etc 1999 and Chun 2011).
In this paper different watermarking techniques are reviewed and later a new technique is proposed, in
which after the extraction of blocks and applying transpose on it; it is watermarked. The process of taking
transpose is key reason of distributing the hidden data in the image. This results in confusing the attacker
about the sequence of data and size of block. The rest of the paper is organized as in Section 2 existing
techniques in the domain of water marking and features of water marking are reviewed. Section 3 expresses
the proposed method for water marking.
2. Classification and Existing techniques of water marking
There are two domains of digital watermarking spatial domain and frequency domain watermarking. The
frequency domain also called transform domain water marking. In spatial domain the watermark is directly
applied to the pixel values. This approach is simple to employ because the watermarking process is simple.
Innovative Systems Design and Engineering                                                      www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 3


To embed watermark in pixel values makes the changes minute (Liu etc 2011 ). On the other hand in
frequency or transform domain the watermark is applied to the transform domain components of an image.
It is more secure and provides shield against signal attacks. Some common transforms for watermarking are
Fourier transforms, discrete cosine transform and wavelet transforms (Xiaoli etc 2010, Chih etc 2010 ,
Xinge 2010 and Guerrini 2011). Now coming towards the main theme of the paper in which different
watermarking techniques are referred e.g. many digital watermarking techniques depend upon different
sequences which are embedded into the images spectral representation. The Correlation techniques are used
to recognize the watermarks (R.G Van 1994 and 1995). There are some watermarks, which improve the
image spatial domain directly using DCT coefficients in which only the user is aware of the sequence (J.F
Delaigle 1996). Another approach in which before marking, image is passed through a sub-band filter this
is done by spectrum based technique presented in (F.M Boland 1995). While there are other watermarking
techniques which rely on images content and hence increase the watermark leveling image . While, still
others make use of Human Visual System (Mitchell etc 1996). Another technique is Addition of
M-sequences which is presented in (Ray etc 1996) which makes use of linear feedback register to generate
binary sequences that has autocorrelation properties. The watermark generated by the linear feedback
register is arranged in suitable block, which is then, embedded in the image pixel values. The drawback
listed in this technique is that if consecutively bits are known then obviously an attacker can compute the
embedded watermark . Based on this, and studying other techniques in next section a new interleaving
technique for water marking is proposed.
3. Proposed Technique
The proposed technique tries to overcome an important problem mentioned earlier that arises because of the
consecutive placement of digital signature. So In order to avoid this trouble, an interleaving technique is
suggested, in which watermark in not kept in consecutive bits, rather it is distributed in different overlapped
blocks of    image. Whole process of extraction and marking are shown in the flowchart (see figure 1).
Innovative Systems Design and Engineering                                                     www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 3




                                     Figure 1. Flowchart of the process
Extraction of the block is the initial step of the proposed technique in which to mark an image, a block X of
size 4x4 matrix is extracted from original image as shown in Figure 2. Equation 1 is used to determine the
total number of blocks that will be formed in any particular image.
       N
BT   (r * c)T /(r  c)T ..........(1)
      T 1

Where B is the total number of blocks, T is the total number of blocks as 1…N, r and c are the rows and
columns respectively.




                                Figure 2: Extraction of block 0 from image
After extracting the block X it will undergo following operations.
The block is divided into row-by-row manner as shown below:
Innovative Systems Design and Engineering                                                        www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 3




Where M is the matrix, L1, L2, L3 and L4 are corresponding rows that are divided, and the elements of the
matrix are the pixel values of the block. Above-mentioned matrix can also be represented as:

M  [ Ai. j ]............(2)

Where i=1, 2, 3, 4 and j=1, 2, 3, 4 to address rows and columns. Second step of the marking phase is to take
the transpose of the matrix M as shown in figure 3 i.e.

M T  [ Ai. j ]............(3)




                                       Figure 3: Transpose of matrix M


After taking the transpose, arrange the image in linear form (i.e. 1-D) and apply watermark W in four
consecutive bits obtained from the marking according to equation 4 and figure 4 shows this step.
       n
           3      
WM    X bc  W .............(4)
     b 0  c 0   
Where WM is the water marking function, X is the original block and W is the watermark, b is the number
of block and c is the number of bits in a particular block which are extracted and first four bits will be marked
and so on the process will be continued up to nth block.




                                      Figure 4: Marking of first four bits
After taking the transpose and applying the watermark arrange the matrix back to its original form i.e. form
the matrix M again but this time it is watermarked as shown in figure 5.
Innovative Systems Design and Engineering                                                       www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 3




                                            Figure 5: Block 0 watermarked
These operations do not place the watermark bits consecutively; rather it’s distributed in different rows of the
block. Next time an overlapped block is obtained i.e. it overlaps on the last column (or row) of previous block
as shown in figure 6 and hence the process continues i.e. extracting blocks and applying above-mentioned
operations until whole image is covered.




                                     Figure 6: Image after watermarked
3.1 Example
Suppose “WATERMARKING” is the signature to be embedded in the image, for this apply the
above-mentioned operations. The step wise process is applied as shown in the following figures (7-10).




                                       Figure 7: Watermark on block 0
Innovative Systems Design and Engineering                                                       www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 3




                                       Figure 8: Watermark on block 1




                                       Figure 9: Watermark on block 2


After embedding the watermarked blocks in the image it will look like this (see figure 10):




                            Figure 10: Showing distribution of marked signatures
                                           within overlapped blocks
This procedure shows that for an attacker the view will be completely different as compared to the designer
because he is unaware of the marking process. In case of attacker if he were to extract the first block he would
take the sequence row by row and extract the watermark, in doing so he would also extract the overlapped
mark, which is not the proper way. This overlapping is done to make the attacker confuse about the block size
and order of sequence. His view about the mark will look something like this: “WARTMEIA ”. This is not
the case. Hence, attacker cannot extract the actual order of the embedded signature.
Innovative Systems Design and Engineering                                                       www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 3


3.2 Verification process
In order to verify that the sequence, which was incorporated in the image for marking, would remain same
after extraction, same process is applied as shown earlier in block diagram (see figure 1). Since the designer
is to show his claim, obviously he is aware of the whole marking process he would simply extract the first
block, take the transpose of it and then arrange it in linear form. This linear arrangement would give the bits
that have been marked, he would note it down and same process would continue until all the blocks are
verified, and sequence had been found. If exactly the same sequence is obtained then image is original, but if
for some block difference has occurred then one can clearly check that somebody other than the designer has
tried to change one’s image. Graphically the idea is depicted below; first block 0 is extracted from marked
image figure 10. Take transpose of it and arrange it in linear form, this linear arrangement will give the bits
that have been marked as shown below ( see figures 11-15). The same process is applied to all the blocks.




                                      Figure 11: Watermarked block 0




                                Figure 12: Transpose of watermarked block 0




                      Figure 13: Linear arrangement of block 0 after taking transpose




                               Figure 14: Linear arrangement of block 1 after
                                               taking transpose
Innovative Systems Design and Engineering                                                        www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 3




                       Figure 15: Linear arrangement of block 2 after taking transpose

All the operations were performed to randomly distribute the watermark within different blocks of the
original image. If it were not done then the attacker would have been able to obtain the signature embedded.
Since overlapping is applied; its basic idea was to confuse the attacker about the size of the block and also the
signature which is incorporated into the block. This overlapping results in embedding of signatures from
different blocks within each block. As a result attacker would take these as one whole sequence which is
distributed in the block, which is not the case.

4. Conclusion

Watermarked signatures are embedded in the overlapping blocks, in which the placement of these
signatures is interleaved. By interleaved it means that the embedded mark is not placed consecutively rather
it is distributed. Another important point is that the use of overlapped blocks plays a major role in the
scattering of signature. As far as the adversaries are concerned, it is not easy for them to find out about the
actual order of the embedded mark. The reason being is that, the overlapping blocks confuse the attacker
about the block size and secondly the distribution of the embedded signature. Hence, making the proposed
scheme secure which scatters the marked sequences in overlapping blocks to confuse the attacker about the
block size and the sequences which are incorporated within the blocks. It also provides precise localization
for image alterations. The idea’s   required goal is to   protecting   images from forgery.
References
Voyatzis, G.; Pitas, I, 1999.” Protecting digital image copyrights: a framework”. IEEE Journals Computer
Graphics and Applications, pp 18 – 24.
Chang-Hsing Lee; Yeuan-Kuen Lee, 1999.” An adaptive digital image watermarking technique for
copyright protection”. IEEE Journals Consumer Electronics. pp 1005 – 1015.
Ming Chen; Zhenyong Chen; Xiao Zeng; Zhang Xiong, 2010.“Model Order Selection in Reversible Image
Watermarking”. IEEE Journal of Selected Topics in Signal Processing. Page(s): 592 – 604
Chun-Hsien Chou; Kuo-Cheng Liu, 2010 .” A Perceptually Tuned Watermarking Scheme for Color
Images”. IEEE Transactions on Image Processing, pp 2966 – 2982
Liu, F.; Wu, C.-K, 2011. “Robust visual cryptography-based watermarking scheme for multiple cover
images and multiple owners”. IET Journals, pp 121 – 128
Xiaoli Li; Krishnan, S.; Ngok-Wah Ma, 2010.” A Wavelet-PCA-Based Fingerprinting Scheme for
Peer-to-Peer Video File Sharing”. IEEE Transactions on Information Forensics and Security, pp 365 – 373
Chih-Chin Lai; Cheng-Chih Tsai, 2010.” Digital Image Watermarking Using Discrete Wavelet Transform
and Singular Value Decomposition”. IEEE Transactions on. Instrumentation and Measurement. Page(s):
3060 – 3063.
Xinge You; Liang Du; Yiu-ming Cheung; Qiuhui Chen, 2010.” A Blind Watermarking Scheme Using New
Innovative Systems Design and Engineering                                                   www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 3


Nontensor Product Wavelet Filter Banks”. IEEE Transactions on Image Processing, pp 3271 – 3284.
Guerrini, F.; Okuda, M.; Adami, N.; Leonardi, R, 2011. “High Dynamic Range Image Watermarking
Robust Against Tone-Mapping Operators”. IEEE Transactions on Information Forensics and Security, pp
283 – 295
R. G. van Schyndel, A.Z.Tirkel, N.R.A Mee, C.F. Osborne, 1994 . “A digital watermark,” Proceedings of
the IEEE International Conference on Image Processing, Austin Texas, USA ,vol. 2, pp. 86-90
R. G. van Schyndel, A. Z. Tirkel, C. F. Osborne, 1995. “Towards a robust digital watermark,” Proceedings
of the ACCV Conference University, Singapore.
J.-F. Delaigle, C. De Vleeschouwer, B. Macq, 1996. “Digital watermarking” Proceedings of the IS&T/SPIE
Conference on Optical Security and Counterfeit Deterrence Techniques, San Jose, CA, USA .
F. M. Boland, J. J. K. Ó Ruanaidh and C. Dautzenberg, 1995,. “Watermarking digital images for copyright
protection,”   Proceedings   of   the   International   Conference   on   Image   Processing     and   its
Applications ,Edinburgh, Scotland, pp. 321-326.
Mitchell D. Swanson, Bin Zhu and Ahmed H. Tewfik, 1996 .“Transparent robust image watermarking,”
Proceedings of the Processing, Lausanne, Switzerland.
Ray Wolfgang and E. J. Delp, 1996."A Watermark for Digital Images," Proceedings of the IEEE
International Conference on Image Processing, Lausanne, Switzerland.

More Related Content

What's hot

New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionIJERA Editor
 
Optimized block size based video coding algorithm
Optimized block size based video coding algorithmOptimized block size based video coding algorithm
Optimized block size based video coding algorithmeSAT Publishing House
 
Review and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computingReview and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computingijfcstjournal
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsTELKOMNIKA JOURNAL
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Publishing House
 
Reversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A ReviewReversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A Reviewiosrjce
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
 
MODELLING AND SYNTHESIZING OF 3D SHAPE WITH STACKED GENERATIVE ADVERSARIAL NE...
MODELLING AND SYNTHESIZING OF 3D SHAPE WITH STACKED GENERATIVE ADVERSARIAL NE...MODELLING AND SYNTHESIZING OF 3D SHAPE WITH STACKED GENERATIVE ADVERSARIAL NE...
MODELLING AND SYNTHESIZING OF 3D SHAPE WITH STACKED GENERATIVE ADVERSARIAL NE...Sangeetha Mam
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...eSAT Publishing House
 
Watermarking
WatermarkingWatermarking
WatermarkingSri Kanth
 
WAVELET BASED AUTHENTICATION/SECRET TRANSMISSION THROUGH IMAGE RESIZING (WA...
WAVELET BASED AUTHENTICATION/SECRET  TRANSMISSION THROUGH IMAGE RESIZING  (WA...WAVELET BASED AUTHENTICATION/SECRET  TRANSMISSION THROUGH IMAGE RESIZING  (WA...
WAVELET BASED AUTHENTICATION/SECRET TRANSMISSION THROUGH IMAGE RESIZING (WA...sipij
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color imagesiaemedu
 
A Secured Approach to Visual Cryptographic Biometric Template
A Secured Approach to Visual Cryptographic Biometric TemplateA Secured Approach to Visual Cryptographic Biometric Template
A Secured Approach to Visual Cryptographic Biometric TemplateIDES Editor
 
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONSA (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONSIJNSA Journal
 
Chaotic Block Image Scheme using Large Key Space and Message Digest Algorithm
Chaotic Block Image Scheme using Large Key Space and Message Digest AlgorithmChaotic Block Image Scheme using Large Key Space and Message Digest Algorithm
Chaotic Block Image Scheme using Large Key Space and Message Digest AlgorithmCSCJournals
 
Intelligent Parallel Processing and Compound Image Compression
Intelligent Parallel Processing and Compound Image CompressionIntelligent Parallel Processing and Compound Image Compression
Intelligent Parallel Processing and Compound Image CompressionDR.P.S.JAGADEESH KUMAR
 
A COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCAT...
A COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCAT...A COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCAT...
A COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCAT...IJCI JOURNAL
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130IJRAT
 
Signature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiSignature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiDr. Vinayak Bharadi
 

What's hot (20)

New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral Recognition
 
Optimized block size based video coding algorithm
Optimized block size based video coding algorithmOptimized block size based video coding algorithm
Optimized block size based video coding algorithm
 
Review and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computingReview and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computing
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systems
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Reversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A ReviewReversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A Review
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
MODELLING AND SYNTHESIZING OF 3D SHAPE WITH STACKED GENERATIVE ADVERSARIAL NE...
MODELLING AND SYNTHESIZING OF 3D SHAPE WITH STACKED GENERATIVE ADVERSARIAL NE...MODELLING AND SYNTHESIZING OF 3D SHAPE WITH STACKED GENERATIVE ADVERSARIAL NE...
MODELLING AND SYNTHESIZING OF 3D SHAPE WITH STACKED GENERATIVE ADVERSARIAL NE...
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...
 
Watermarking
WatermarkingWatermarking
Watermarking
 
WAVELET BASED AUTHENTICATION/SECRET TRANSMISSION THROUGH IMAGE RESIZING (WA...
WAVELET BASED AUTHENTICATION/SECRET  TRANSMISSION THROUGH IMAGE RESIZING  (WA...WAVELET BASED AUTHENTICATION/SECRET  TRANSMISSION THROUGH IMAGE RESIZING  (WA...
WAVELET BASED AUTHENTICATION/SECRET TRANSMISSION THROUGH IMAGE RESIZING (WA...
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
 
A Secured Approach to Visual Cryptographic Biometric Template
A Secured Approach to Visual Cryptographic Biometric TemplateA Secured Approach to Visual Cryptographic Biometric Template
A Secured Approach to Visual Cryptographic Biometric Template
 
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONSA (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
 
Chaotic Block Image Scheme using Large Key Space and Message Digest Algorithm
Chaotic Block Image Scheme using Large Key Space and Message Digest AlgorithmChaotic Block Image Scheme using Large Key Space and Message Digest Algorithm
Chaotic Block Image Scheme using Large Key Space and Message Digest Algorithm
 
Mo2521632166
Mo2521632166Mo2521632166
Mo2521632166
 
Intelligent Parallel Processing and Compound Image Compression
Intelligent Parallel Processing and Compound Image CompressionIntelligent Parallel Processing and Compound Image Compression
Intelligent Parallel Processing and Compound Image Compression
 
A COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCAT...
A COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCAT...A COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCAT...
A COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCAT...
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130
 
Signature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiSignature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertati
 

Viewers also liked

E ball technology ppt by arun
E ball technology ppt by arunE ball technology ppt by arun
E ball technology ppt by arunArun Gowda
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar10e11a0545
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology vijay rastogi
 
64 bit computing
64 bit computing64 bit computing
64 bit computingAnkita Nema
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
E-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORTE-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORTVikas Kumar
 
5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt5 pen-pc-technology complete ppt
5 pen-pc-technology complete pptatinav242
 
Rainbow technology-ppt
Rainbow technology-pptRainbow technology-ppt
Rainbow technology-pptRajesh Roky
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics123seminarsonly
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 

Viewers also liked (18)

E ball technology ppt by arun
E ball technology ppt by arunE ball technology ppt by arun
E ball technology ppt by arun
 
60 312-318
60 312-31860 312-318
60 312-318
 
E-ball
E-ball E-ball
E-ball
 
E-Ball Technology
E-Ball TechnologyE-Ball Technology
E-Ball Technology
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
64 bit computing
64 bit computing64 bit computing
64 bit computing
 
HCI presentation
HCI presentationHCI presentation
HCI presentation
 
Smartwatch ppt
Smartwatch pptSmartwatch ppt
Smartwatch ppt
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
E-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORTE-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORT
 
5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt
 
Doc of 5 pen pc technology
Doc of 5 pen pc technologyDoc of 5 pen pc technology
Doc of 5 pen pc technology
 
Rainbow technology-ppt
Rainbow technology-pptRainbow technology-ppt
Rainbow technology-ppt
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
E ball technology
E ball technologyE ball technology
E ball technology
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 

Similar to 19 water marking 9

A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofDigital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofIAEME Publication
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine LearningIRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine LearningIRJET Journal
 
Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd Iaetsd
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
 
Crack Detection of Wall Using MATLAB
Crack Detection of Wall Using MATLABCrack Detection of Wall Using MATLAB
Crack Detection of Wall Using MATLABvivatechijri
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Effect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital ImagesEffect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital ImagesDr. Michael Agbaje
 
3-Phase Recognition Approach to Pseudo 3D Building Generation from 2D Floor P...
3-Phase Recognition Approach to Pseudo 3D Building Generation from 2D Floor P...3-Phase Recognition Approach to Pseudo 3D Building Generation from 2D Floor P...
3-Phase Recognition Approach to Pseudo 3D Building Generation from 2D Floor P...ijcga
 
Halftoning-based BTC image reconstruction using patch processing with border ...
Halftoning-based BTC image reconstruction using patch processing with border ...Halftoning-based BTC image reconstruction using patch processing with border ...
Halftoning-based BTC image reconstruction using patch processing with border ...TELKOMNIKA JOURNAL
 
A Wavelet - Based Object Watermarking System for MPEG4 Video
A Wavelet - Based Object Watermarking System for MPEG4 VideoA Wavelet - Based Object Watermarking System for MPEG4 Video
A Wavelet - Based Object Watermarking System for MPEG4 VideoCSCJournals
 
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELET
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELETEntropy based Digital Watermarking using 2-D Biorthogonal WAVELET
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELETpaperpublications3
 
Optical Character Recognition deep learning .pdf
Optical Character Recognition deep learning .pdfOptical Character Recognition deep learning .pdf
Optical Character Recognition deep learning .pdfnavenjeyamurugan
 

Similar to 19 water marking 9 (20)

LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofDigital image watermarking using dct with high security of
Digital image watermarking using dct with high security of
 
Bf36342346
Bf36342346Bf36342346
Bf36342346
 
20120140505013
2012014050501320120140505013
20120140505013
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
1820 1824
1820 18241820 1824
1820 1824
 
1820 1824
1820 18241820 1824
1820 1824
 
IRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine LearningIRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine Learning
 
Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
Crack Detection of Wall Using MATLAB
Crack Detection of Wall Using MATLABCrack Detection of Wall Using MATLAB
Crack Detection of Wall Using MATLAB
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Effect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital ImagesEffect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital Images
 
3-Phase Recognition Approach to Pseudo 3D Building Generation from 2D Floor P...
3-Phase Recognition Approach to Pseudo 3D Building Generation from 2D Floor P...3-Phase Recognition Approach to Pseudo 3D Building Generation from 2D Floor P...
3-Phase Recognition Approach to Pseudo 3D Building Generation from 2D Floor P...
 
Halftoning-based BTC image reconstruction using patch processing with border ...
Halftoning-based BTC image reconstruction using patch processing with border ...Halftoning-based BTC image reconstruction using patch processing with border ...
Halftoning-based BTC image reconstruction using patch processing with border ...
 
A Wavelet - Based Object Watermarking System for MPEG4 Video
A Wavelet - Based Object Watermarking System for MPEG4 VideoA Wavelet - Based Object Watermarking System for MPEG4 Video
A Wavelet - Based Object Watermarking System for MPEG4 Video
 
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELET
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELETEntropy based Digital Watermarking using 2-D Biorthogonal WAVELET
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELET
 
D0941824
D0941824D0941824
D0941824
 
Optical Character Recognition deep learning .pdf
Optical Character Recognition deep learning .pdfOptical Character Recognition deep learning .pdf
Optical Character Recognition deep learning .pdf
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

19 water marking 9

  • 1. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 3 Secured Overlapping Technique for Digital Watermarking Muhammad Sharif (Corresponding author) Department of Computer Science, COMSATS Institute of Information Technology PO box 47040, Wah Cantt, Pakistan Tel: +92303-5188998 E-mail: muhammadsharifmalik@yahoo.com Aisha Azeem, Waqas Haider, Mudassar Raza Department of Computer Science, COMSATS Institute of Information Technology PO box 47040, Wah Cantt, Pakistan E-mail: aishaazeem19@gmail.com,waqasbtn@gmail.com, mudassarkazmi@yahoo.com Abstract Information security is a mandatory issue in current information technology world. A secure overlapping method is proposed in this paper whose key functionality is to distribute the key words at different places inside an image. It requires the extraction of overlapping blocks of image of the size of 4x4 matrixes and taking its transpose. Afterwards arranging the block to linear form row-by-row and applying watermark on it, and finally converting the block back to its original form just like the first step. This technique results in the distribution of hidden data within the block. This scattering of data is beneficial because attacker is unable to find the precise localization of hidden data within the overlapped blocks. Keywords: Watermarking, Copyrights, Information security. 1. Introduction Copyright deals with an objects ownership. If the original work is not protected by copyright, then placing digital contents like images or videos on Internet can put them at risk of theft or alterations. Digital watermarking provides a way to handle such issues. The need to protect the work can be depicted from following scenario: Suppose a designer has created an artwork possibly an image of some sort. He than wants that image to displayed on website. But when that image appears somewhere else on the Internet the designer needs to prove his ownership by demonstrating a difference between the copied and the original image. This could be verified easily, if transparent signatures i.e. digital watermarks are embedded within the digital files. These transparent signatures can be noise some random information or possibly sequence of data, so that removal is not possible or is difficult (Vovatzis etc 1999, Chang etc 1999 and Chun 2011). In this paper different watermarking techniques are reviewed and later a new technique is proposed, in which after the extraction of blocks and applying transpose on it; it is watermarked. The process of taking transpose is key reason of distributing the hidden data in the image. This results in confusing the attacker about the sequence of data and size of block. The rest of the paper is organized as in Section 2 existing techniques in the domain of water marking and features of water marking are reviewed. Section 3 expresses the proposed method for water marking. 2. Classification and Existing techniques of water marking There are two domains of digital watermarking spatial domain and frequency domain watermarking. The frequency domain also called transform domain water marking. In spatial domain the watermark is directly applied to the pixel values. This approach is simple to employ because the watermarking process is simple.
  • 2. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 3 To embed watermark in pixel values makes the changes minute (Liu etc 2011 ). On the other hand in frequency or transform domain the watermark is applied to the transform domain components of an image. It is more secure and provides shield against signal attacks. Some common transforms for watermarking are Fourier transforms, discrete cosine transform and wavelet transforms (Xiaoli etc 2010, Chih etc 2010 , Xinge 2010 and Guerrini 2011). Now coming towards the main theme of the paper in which different watermarking techniques are referred e.g. many digital watermarking techniques depend upon different sequences which are embedded into the images spectral representation. The Correlation techniques are used to recognize the watermarks (R.G Van 1994 and 1995). There are some watermarks, which improve the image spatial domain directly using DCT coefficients in which only the user is aware of the sequence (J.F Delaigle 1996). Another approach in which before marking, image is passed through a sub-band filter this is done by spectrum based technique presented in (F.M Boland 1995). While there are other watermarking techniques which rely on images content and hence increase the watermark leveling image . While, still others make use of Human Visual System (Mitchell etc 1996). Another technique is Addition of M-sequences which is presented in (Ray etc 1996) which makes use of linear feedback register to generate binary sequences that has autocorrelation properties. The watermark generated by the linear feedback register is arranged in suitable block, which is then, embedded in the image pixel values. The drawback listed in this technique is that if consecutively bits are known then obviously an attacker can compute the embedded watermark . Based on this, and studying other techniques in next section a new interleaving technique for water marking is proposed. 3. Proposed Technique The proposed technique tries to overcome an important problem mentioned earlier that arises because of the consecutive placement of digital signature. So In order to avoid this trouble, an interleaving technique is suggested, in which watermark in not kept in consecutive bits, rather it is distributed in different overlapped blocks of image. Whole process of extraction and marking are shown in the flowchart (see figure 1).
  • 3. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 3 Figure 1. Flowchart of the process Extraction of the block is the initial step of the proposed technique in which to mark an image, a block X of size 4x4 matrix is extracted from original image as shown in Figure 2. Equation 1 is used to determine the total number of blocks that will be formed in any particular image. N BT   (r * c)T /(r  c)T ..........(1) T 1 Where B is the total number of blocks, T is the total number of blocks as 1…N, r and c are the rows and columns respectively. Figure 2: Extraction of block 0 from image After extracting the block X it will undergo following operations. The block is divided into row-by-row manner as shown below:
  • 4. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 3 Where M is the matrix, L1, L2, L3 and L4 are corresponding rows that are divided, and the elements of the matrix are the pixel values of the block. Above-mentioned matrix can also be represented as: M  [ Ai. j ]............(2) Where i=1, 2, 3, 4 and j=1, 2, 3, 4 to address rows and columns. Second step of the marking phase is to take the transpose of the matrix M as shown in figure 3 i.e. M T  [ Ai. j ]............(3) Figure 3: Transpose of matrix M After taking the transpose, arrange the image in linear form (i.e. 1-D) and apply watermark W in four consecutive bits obtained from the marking according to equation 4 and figure 4 shows this step. n  3  WM    X bc  W .............(4) b 0  c 0  Where WM is the water marking function, X is the original block and W is the watermark, b is the number of block and c is the number of bits in a particular block which are extracted and first four bits will be marked and so on the process will be continued up to nth block. Figure 4: Marking of first four bits After taking the transpose and applying the watermark arrange the matrix back to its original form i.e. form the matrix M again but this time it is watermarked as shown in figure 5.
  • 5. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 3 Figure 5: Block 0 watermarked These operations do not place the watermark bits consecutively; rather it’s distributed in different rows of the block. Next time an overlapped block is obtained i.e. it overlaps on the last column (or row) of previous block as shown in figure 6 and hence the process continues i.e. extracting blocks and applying above-mentioned operations until whole image is covered. Figure 6: Image after watermarked 3.1 Example Suppose “WATERMARKING” is the signature to be embedded in the image, for this apply the above-mentioned operations. The step wise process is applied as shown in the following figures (7-10). Figure 7: Watermark on block 0
  • 6. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 3 Figure 8: Watermark on block 1 Figure 9: Watermark on block 2 After embedding the watermarked blocks in the image it will look like this (see figure 10): Figure 10: Showing distribution of marked signatures within overlapped blocks This procedure shows that for an attacker the view will be completely different as compared to the designer because he is unaware of the marking process. In case of attacker if he were to extract the first block he would take the sequence row by row and extract the watermark, in doing so he would also extract the overlapped mark, which is not the proper way. This overlapping is done to make the attacker confuse about the block size and order of sequence. His view about the mark will look something like this: “WARTMEIA ”. This is not the case. Hence, attacker cannot extract the actual order of the embedded signature.
  • 7. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 3 3.2 Verification process In order to verify that the sequence, which was incorporated in the image for marking, would remain same after extraction, same process is applied as shown earlier in block diagram (see figure 1). Since the designer is to show his claim, obviously he is aware of the whole marking process he would simply extract the first block, take the transpose of it and then arrange it in linear form. This linear arrangement would give the bits that have been marked, he would note it down and same process would continue until all the blocks are verified, and sequence had been found. If exactly the same sequence is obtained then image is original, but if for some block difference has occurred then one can clearly check that somebody other than the designer has tried to change one’s image. Graphically the idea is depicted below; first block 0 is extracted from marked image figure 10. Take transpose of it and arrange it in linear form, this linear arrangement will give the bits that have been marked as shown below ( see figures 11-15). The same process is applied to all the blocks. Figure 11: Watermarked block 0 Figure 12: Transpose of watermarked block 0 Figure 13: Linear arrangement of block 0 after taking transpose Figure 14: Linear arrangement of block 1 after taking transpose
  • 8. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 3 Figure 15: Linear arrangement of block 2 after taking transpose All the operations were performed to randomly distribute the watermark within different blocks of the original image. If it were not done then the attacker would have been able to obtain the signature embedded. Since overlapping is applied; its basic idea was to confuse the attacker about the size of the block and also the signature which is incorporated into the block. This overlapping results in embedding of signatures from different blocks within each block. As a result attacker would take these as one whole sequence which is distributed in the block, which is not the case. 4. Conclusion Watermarked signatures are embedded in the overlapping blocks, in which the placement of these signatures is interleaved. By interleaved it means that the embedded mark is not placed consecutively rather it is distributed. Another important point is that the use of overlapped blocks plays a major role in the scattering of signature. As far as the adversaries are concerned, it is not easy for them to find out about the actual order of the embedded mark. The reason being is that, the overlapping blocks confuse the attacker about the block size and secondly the distribution of the embedded signature. Hence, making the proposed scheme secure which scatters the marked sequences in overlapping blocks to confuse the attacker about the block size and the sequences which are incorporated within the blocks. It also provides precise localization for image alterations. The idea’s required goal is to protecting images from forgery. References Voyatzis, G.; Pitas, I, 1999.” Protecting digital image copyrights: a framework”. IEEE Journals Computer Graphics and Applications, pp 18 – 24. Chang-Hsing Lee; Yeuan-Kuen Lee, 1999.” An adaptive digital image watermarking technique for copyright protection”. IEEE Journals Consumer Electronics. pp 1005 – 1015. Ming Chen; Zhenyong Chen; Xiao Zeng; Zhang Xiong, 2010.“Model Order Selection in Reversible Image Watermarking”. IEEE Journal of Selected Topics in Signal Processing. Page(s): 592 – 604 Chun-Hsien Chou; Kuo-Cheng Liu, 2010 .” A Perceptually Tuned Watermarking Scheme for Color Images”. IEEE Transactions on Image Processing, pp 2966 – 2982 Liu, F.; Wu, C.-K, 2011. “Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners”. IET Journals, pp 121 – 128 Xiaoli Li; Krishnan, S.; Ngok-Wah Ma, 2010.” A Wavelet-PCA-Based Fingerprinting Scheme for Peer-to-Peer Video File Sharing”. IEEE Transactions on Information Forensics and Security, pp 365 – 373 Chih-Chin Lai; Cheng-Chih Tsai, 2010.” Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition”. IEEE Transactions on. Instrumentation and Measurement. Page(s): 3060 – 3063. Xinge You; Liang Du; Yiu-ming Cheung; Qiuhui Chen, 2010.” A Blind Watermarking Scheme Using New
  • 9. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 3 Nontensor Product Wavelet Filter Banks”. IEEE Transactions on Image Processing, pp 3271 – 3284. Guerrini, F.; Okuda, M.; Adami, N.; Leonardi, R, 2011. “High Dynamic Range Image Watermarking Robust Against Tone-Mapping Operators”. IEEE Transactions on Information Forensics and Security, pp 283 – 295 R. G. van Schyndel, A.Z.Tirkel, N.R.A Mee, C.F. Osborne, 1994 . “A digital watermark,” Proceedings of the IEEE International Conference on Image Processing, Austin Texas, USA ,vol. 2, pp. 86-90 R. G. van Schyndel, A. Z. Tirkel, C. F. Osborne, 1995. “Towards a robust digital watermark,” Proceedings of the ACCV Conference University, Singapore. J.-F. Delaigle, C. De Vleeschouwer, B. Macq, 1996. “Digital watermarking” Proceedings of the IS&T/SPIE Conference on Optical Security and Counterfeit Deterrence Techniques, San Jose, CA, USA . F. M. Boland, J. J. K. Ó Ruanaidh and C. Dautzenberg, 1995,. “Watermarking digital images for copyright protection,” Proceedings of the International Conference on Image Processing and its Applications ,Edinburgh, Scotland, pp. 321-326. Mitchell D. Swanson, Bin Zhu and Ahmed H. Tewfik, 1996 .“Transparent robust image watermarking,” Proceedings of the Processing, Lausanne, Switzerland. Ray Wolfgang and E. J. Delp, 1996."A Watermark for Digital Images," Proceedings of the IEEE International Conference on Image Processing, Lausanne, Switzerland.