SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 256
A NOVEL RRW FRAMEWORK TO RESIST ACCIDENTAL ATTACKS
Farooq Shaik Mohammad1
, M. Ramana Reddy2
1
Student, 2
Professor, Department of E.C.E, RGM Autonomous of college Engineering & Technology, Andhra Pradesh,
India
faaruk.smd@gmail.com, ramana_2k5@rediffmail.com
Abstract
Robust reversible watermarking (RRW) methods are popular in multimedia for protecting copyright, while preserving intactness of
host images and providing robustness against unintentional attacks. Robust reversible watermarking (RRW) is used to protect the
copyrights and providing robustness against unintentional attacks. The past histogram rotation-based methods suffer from extremely
poor invisibility for watermarked images and limited robustness in extracting watermarks from the watermarked images destroyed by
unintentional attacks. This paper proposes a wavelet-domain statistical quantity histogram shifting and clustering (WSQH-SC)
method and Enhanced pixel-wise masking (EPWM). This method embeds a new watermark image and extraction procedures by
histogram shifting and clustering, which are important for improving robustness and reducing run-time complexity. It is possible
reversibility and invisibility. By using WSQH-SC methods reversibility, invisibility of watermarks can be achieved. The experimental
results show the comprehensive performance in terms of reversibility, robustness, invisibility, capacity and run-time complexity widely
applicable to different kinds of images.
Keywords: — Integer wavelet transform, k-means clustering, masking, robust reversible watermarking (RRW)
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Reversible Watermarking (RW) methods [1] are used to
embed watermarks [2], e.g., secret information [3], into digital
media while preserving high intactness and good fidelity of
host media. It plays an important role in protecting copyright
and content of digital media for sensitive applications, e.g.,
medical and military images. The concept of reversible
watermark firstly appeared in the patent owned by Eastman
Kodak [4] Honsingex et al. [4] utilised a robust spatial
additive watermark combined with modulo additions to
achieve reversible data embedding. Goljan et al. [5] proposed
a two cycles flipping permutation to assign a watermarking bit
in each pixel group. Celik et al. [6] presented a high capacity,
reversible data-embedding algorithm with low distortion by
compressing quantization residues. Tian [7] presented a
reversible data embedding approach based on expanding the
pixel value difference between neighboring pixels, which will
not overflow or underflow after expansion. Thodi and
Rodrguez exploited the inherent correlation among the
neighboring pixels in an image region using a predictor. Xuan
et al. [8] embedded data into high-frequency coefficients of
integer wavelet transforms with the commanding technique,
and utilized histogram modification as a preprocessing step to
prevent overflow or underflow caused by the modification of
wavelet coefficients.
Reversible watermarking has found a huge surge of
experimentation in its domain in the past decade as the need of
recovering the original work image after extracting the
watermark arises in various applications such as the law
enforcement, medical and military image system, it is crucial
to restore the original image without any distortions [9]. In
traditional watermarking techniques, our main concern is to
embed and recover the watermark with minimum loss. The
quality of original work image we get after extraction is highly
degraded and not restorable. But in applications like law
enforcement, medical and military, in which superior quality
of image is needed, we cannot use these algorithms. In
medical images, some prerequisite information about the
patient is watermarked in it while transmitting and at reception
we need to have both, the original image and that information
is to be recovered loss without. This type of result is
achievable by making use of any reversible watermarking
algorithm out of a pool of algorithms [10].
2. PROPOSED METHOD
The following steps are used to embed the watermark into
image.
• Decompose image using 5/3 IWT and divide the sub-
band HL into n non overlapping blocks with the size
of h × w.
• Compute the mean of wavelet coefficients (MWC)
histogram of all of the blocks and obtain Sk.
• Perform EPWM to compute the watermark strength
• For k = 1to m do
• 7 Embed the kth watermark bit bk with Sw
• k = Sk + βλbk ;
• End for
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 257
• Reconstruct the watermarked image I with inverse
5/3 IWT.
The block diagram of proposed method as shown in fig.1
Fig.1. Block diagram of proposed method
2.1 Property Inspired Pixel Adjustment (PIPA)
In RRW, how to handle both overflow and underflow of pixels
is important for reversibility. Xuan et al. [11] proposed a pixel
adjustment strategy to tackle this problem. Unfortunately, it
cannot be directly applied to wavelet domain because the
adjustment scale related to wavelet transform is unknown. As
a consequence, we develop PIPA to handle this problem.
Firstly, PIPA deeply exploits the intrinsic relationship between
wavelet coefficient and pixel changes. In particular, given a t-
bit host image I with the size of 2M ×2N, the pixel adjustment
is performed by
where I (i, j ) is the grayscale value of the pixel at (i, j ) in the
image I , I (i, j ) is the adjusted one (1 ≤ i ≤ 2M, 1 ≤ j ≤ 2N),
and η > λ is the adjustment scale.
2.2 Integer Wavelet Transforms (IWT)
The wavelet transform transforms the image into a multi-scale
representation with both spatial and frequency characteristics
[12]. This allows for effective multi-scale image analysis with
lower computational cost. Using the IWT, the texture image is
decomposed into four sub images, as low-low, low-high, high-
low and high-high sub-bands.
Fig.2. Image decomposition after a two level scaling for IWT
2.3 Means of Wavelet Coefficients (MWC) Histogram
It is designed in high-pass sub-bands of wavelet
decomposition, to which HVS is less sensitive, leading to high
invisibility of watermarked images and it has almost a zero-
mean and Laplacian-like distribution based on the
experimental study of wavelet high-pass sub-bands from 300
test images.
Considering a given host image I , we first decompose I using
2 level IWT to obtain the sub-band and then divide HL into n
non overlapping blocks. Let S = (S1,..., Sk ,..., Sn ) be the
MWCs in the sub-band, then the MWC of the kth
block, Sk ,is
defined as
Where P (i, j) k represents the wavelet coefficient at (i, j ) in
the kth
block
2.4 Embedded Pixel Wise Masking (EPWM)
It has been well acknowledged that a balance between
invisibility and robustness is important for robust
watermarking methods. Although many efforts have been
made to design lossless embedding models, little progress has
been made in this trade-off. Therefore, we develop EPWM to
tackle this problem by utilizing the JND thresholds of wavelet
coefficients to optimize watermark strength. To computed the
watermark strength is as shown below
( )ji
j
NM i
JND ,
1
1
1
1
∑ ∑
= =
×
=
ω
ρ
α
λ
Where α is a global parameter and M × N is the sub-band size.
∑ ∑
−
=
−
=−−
=
2
2
2
2
),(
)2()2(
1
h
i
w
j
ji
P
wXh
S kk






<+
>
=
ηη
ηη
j)I(i,ifj)I(i,
-1-ˆt2j)I(i,if-j)I(i,
j)(i,I'
IJRET: International Journal of Research in Engineering and Technology
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @
2.5 Embedded Procedure
We use the obtained JND thresholds to control watermark
strength during the embedding process. To be specific, given
the MWC of the kth block of interest, i.e., Sk the watermark
embedding is given by
k = Sk + βλbk
Here k is the obtained MWC after the kth watermark bit bk
{0, 1} is embedded, β is a factor defined as


 −




 −
= ss
ss
k
k
abs
*
*
β
3. QUALITY MEASUREMENT
PSNR is most commonly used to measure the quality of
reconstruction of lossy compression codecs. PSNR is most
easily defined via the mean squared error (
noise-free m×n monochrome image I
approximation K, MSE is defined as:
( ) ([∑∑ −
−
=
−
=
=
1
0
1
0
,1
m
i
n
j
KjiImn
MSE
The PSNR is defined as:








=
MSE
MAX
PSNR I
2
10log.10








=
MSE
MAX I
log.20 10
( ) ( )MSEMAX I log10log.20 1010 −=
4. EXPERIMENTAL RESULTS
MSE = 174.2140
PSNR = 25.7200
Original Image
Fig 3 shows the original camera man image
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319
__________________________________________________________________________________________
2013, Available @ http://www.ijret.org
We use the obtained JND thresholds to control watermark
strength during the embedding process. To be specific, given
the MWC of the kth block of interest, i.e., Sk the watermark
ed MWC after the kth watermark bit bk ∈


*
PSNR is most commonly used to measure the quality of
reconstruction of lossy compression codecs. PSNR is most
defined via the mean squared error (MSE). Given a
I and its noisy
( )],
2
ji
shows the original camera man image
Decomposed Image
Fig 4 shows the decomposed camera man image
EPWM
Fig 5 shows EPWM camera man image
Watermarked Image
Fig 6 shows the watermarked image
CONCLUSIONS
In this paper, we have developed a novel yet pragmatic
framework for RRW. It includes carefully designed PIPA,
SQH shifting and clustering, and EPWM, each of which
handles a specific problem in RRW. PIPA preprocesses host
images by adjusting the pixels into a reliable range for
satisfactory reversibility. SQH shifting and clustering
constructs new watermark embedding and extraction
processes for good robustness and low run
EPWM precisely estimates the local sensitivity of HVS and
adaptively optimizes the watermark strength for a trade
eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
258
shows the decomposed camera man image
shows EPWM camera man image
shows the watermarked image
In this paper, we have developed a novel yet pragmatic
framework for RRW. It includes carefully designed PIPA,
SQH shifting and clustering, and EPWM, each of which
problem in RRW. PIPA preprocesses host
images by adjusting the pixels into a reliable range for
reversibility. SQH shifting and clustering
new watermark embedding and extraction
robustness and low run-time complexity.
estimates the local sensitivity of HVS and
the watermark strength for a trade-off
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 259
between robustness and invisibility. In future, we will
combine the proposed framework with the local feature to
further improve robustness.
REFERENCES
[1]. J. Fridrich, M. Goljan, and R. Du, “Lossless data
embedding-new paradigm in digital watermarking,”
EURASIP J. Appl. Signal Process., vol. 2002, no. 1, pp. 185–
196, Jan. 2002.
[2]. Z. Zhao, N. Yu, and X. Li, “A novel video watermarking
scheme in compression domain based on fast motion
estimation,” in Proc. Int. Conf. Commun. Technol., vol. 2.
2003, pp. 1878–1882.
[3]. X. Li, “Watermarking in secure image retrieval,” Pattern
Recog. Lett., vol. 24, no. 14, pp. 2431–2434, Oct. 2003.
[4]. Honsinger, C.W., Jones, P., Rabbani, M., and Stoffel, J.C.:
‗Lossless recovery of an original image containing embedded
data‘. US patent no. 6278791, 2001
[5]. Goljan, M., Fridrich, J., and Du, R.: ‗Distortion-free data
embedding for images‘. 4th Information Hiding Workshop,
LNCS, vol. 2137, (Springer-Verlag, New York, 2001, pp. 27–
41.
[6]. Celik, M.U., Sharma, G., Tekalp, A.M., and Saber, E.:
‗Reversible data hiding‘. Proc. ICIP, 2002, vol. 2, pp. 157–
160
[7]. T ian, J.: ‗Reversible data embedding using a difference
expansion‘, IEEE Trans. Circuits Syst. Video Technol., 2003,
13, (8), pp. 890–896.
[8]. Xuan, G.R., Yang, C.Y., Zhen, Y.Z., and Shi, Y.Q.:
‗Reversible data hiding using integer wavelet transform and
companding technique‘.Proc. IWDW, 2004.
[9]. J. T ian, ―Wavelet-based reversible watermarking for
authentication,‖ in Security and Watermarking of Multimedia
Contents IV—Proc. SPIE, E. J. Delp III and P. W. Wong,
Eds., Jan. 2002, vol. 4675, pp. 679–690.
[10]. B. Macq, ― Lossless multi resolution transform for
image authenticating watermarking,‖ in Proc. EUSIPCO, Sept.
2000, pp. 533–536.
[11]. G. Xuan, Y. Shi, P. Chai, X. Cui, Z. Ni, and X. Tong,
“Optimum histogram pair based image lossless data
embedding,” in Proc. Digit Watermark., 2008, pp. 264–278.
[12]. D. Zou, Y. Shi, Z. Ni, and W. Su, “A semi-fragile
lossless digital watermarking scheme based on integer wavelet
transform,” IEEE Trans. Circuits Syst. Video Technol., vol.
16, no. 10, pp. 1294–1300, Oct. 2006.
BIOGRAPHIES
FAROOQ SHAIK MOHAMMAD received B.
Tech degree from SAFA Engineering College,
B.Thandarpadu, Kurnool (dist), Andhra
Pradesh in the year 2011 and currently pursing
M. Tech in Digital Systems & Computer
Electronics at RGM College of Engineering
and Technology, Nandyal, Kurnool (dist),
Andhra Pradesh. His areas of interest are research work in
image processing.
Dr. M.RAMANAREDDY, presently working
as professor in RGM College of Engineering
and Technology (Autonomous), Nandyal,
Kurnool(dist), AP, India. He was awarded a
doctorate for his work in Signal Processing in
2010.He has 16 years of teaching experience
and 8 years of industrial experience. He has
Professional Memberships in MISTE, MIE, and FIETE. He
guided 10 projects at master level.

More Related Content

What's hot

Semi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svdSemi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svdsipij
 
RTL Implementation of image compression techniques in WSN
RTL Implementation of image compression techniques in WSNRTL Implementation of image compression techniques in WSN
RTL Implementation of image compression techniques in WSNIJECEIAES
 
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...ijcsit
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption cscpconf
 
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmIRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmLalith Kumar
 
Gray Image Watermarking using slant transform - digital image processing
Gray Image Watermarking using slant transform - digital image processingGray Image Watermarking using slant transform - digital image processing
Gray Image Watermarking using slant transform - digital image processingNITHIN KALLE PALLY
 
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...CSCJournals
 
Study and Performance Analysis of MOS Technology and Nanocomputing QCA
Study and Performance Analysis of MOS Technology and Nanocomputing QCAStudy and Performance Analysis of MOS Technology and Nanocomputing QCA
Study and Performance Analysis of MOS Technology and Nanocomputing QCAVIT-AP University
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMijfcstjournal
 
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA)
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA) LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA)
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA) cscpconf
 
Legendre transform based color image authentication (ltcia)
Legendre transform based color image authentication (ltcia)Legendre transform based color image authentication (ltcia)
Legendre transform based color image authentication (ltcia)csandit
 

What's hot (17)

Semi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svdSemi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svd
 
Jv2517361741
Jv2517361741Jv2517361741
Jv2517361741
 
RTL Implementation of image compression techniques in WSN
RTL Implementation of image compression techniques in WSNRTL Implementation of image compression techniques in WSN
RTL Implementation of image compression techniques in WSN
 
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption
 
A0360105
A0360105A0360105
A0360105
 
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmIRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking Algorithm
 
B04 07 0614
B04 07 0614B04 07 0614
B04 07 0614
 
Gray Image Watermarking using slant transform - digital image processing
Gray Image Watermarking using slant transform - digital image processingGray Image Watermarking using slant transform - digital image processing
Gray Image Watermarking using slant transform - digital image processing
 
Gx3612421246
Gx3612421246Gx3612421246
Gx3612421246
 
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...
 
Study and Performance Analysis of MOS Technology and Nanocomputing QCA
Study and Performance Analysis of MOS Technology and Nanocomputing QCAStudy and Performance Analysis of MOS Technology and Nanocomputing QCA
Study and Performance Analysis of MOS Technology and Nanocomputing QCA
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domains
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
 
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA)
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA) LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA)
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA)
 
Legendre transform based color image authentication (ltcia)
Legendre transform based color image authentication (ltcia)Legendre transform based color image authentication (ltcia)
Legendre transform based color image authentication (ltcia)
 
1820 1824
1820 18241820 1824
1820 1824
 

Viewers also liked

An enhanced adaptive scoring job scheduling algorithm with replication strate...
An enhanced adaptive scoring job scheduling algorithm with replication strate...An enhanced adaptive scoring job scheduling algorithm with replication strate...
An enhanced adaptive scoring job scheduling algorithm with replication strate...eSAT Publishing House
 
Factors affecting def and asr in the concrete dam at vrané nad vltavou
Factors affecting def and asr in the concrete dam at vrané nad vltavouFactors affecting def and asr in the concrete dam at vrané nad vltavou
Factors affecting def and asr in the concrete dam at vrané nad vltavoueSAT Publishing House
 
Parallel k nn on gpu architecture using opencl
Parallel k nn on gpu architecture using openclParallel k nn on gpu architecture using opencl
Parallel k nn on gpu architecture using opencleSAT Publishing House
 
An improved hdr image processing using fast global
An improved hdr image processing using fast globalAn improved hdr image processing using fast global
An improved hdr image processing using fast globaleSAT Publishing House
 
Effect of various process parameters on friction stir
Effect of various process parameters on friction stirEffect of various process parameters on friction stir
Effect of various process parameters on friction stireSAT Publishing House
 
Design and implementation of path planning algorithm for wheeled mobile robot...
Design and implementation of path planning algorithm for wheeled mobile robot...Design and implementation of path planning algorithm for wheeled mobile robot...
Design and implementation of path planning algorithm for wheeled mobile robot...eSAT Publishing House
 
Soft subgrade stabilization with quarry dust an industrial waste
Soft subgrade stabilization with quarry dust an industrial wasteSoft subgrade stabilization with quarry dust an industrial waste
Soft subgrade stabilization with quarry dust an industrial wasteeSAT Publishing House
 
Thermal, microstructure and dielectric behavior of la modified bismuth titana...
Thermal, microstructure and dielectric behavior of la modified bismuth titana...Thermal, microstructure and dielectric behavior of la modified bismuth titana...
Thermal, microstructure and dielectric behavior of la modified bismuth titana...eSAT Publishing House
 
Preliminary study of on cladding process on gray cast
Preliminary study of on cladding process on gray castPreliminary study of on cladding process on gray cast
Preliminary study of on cladding process on gray casteSAT Publishing House
 
Treatability study of cetp wastewater using physico chemical process-a case s...
Treatability study of cetp wastewater using physico chemical process-a case s...Treatability study of cetp wastewater using physico chemical process-a case s...
Treatability study of cetp wastewater using physico chemical process-a case s...eSAT Publishing House
 
A novel scheme for reliable multipath routing
A novel scheme for reliable multipath routingA novel scheme for reliable multipath routing
A novel scheme for reliable multipath routingeSAT Publishing House
 
Utilization of pulverized plastic in cement concrete as fine aggregate
Utilization of pulverized plastic in cement concrete as fine aggregateUtilization of pulverized plastic in cement concrete as fine aggregate
Utilization of pulverized plastic in cement concrete as fine aggregateeSAT Publishing House
 
Online backup and recovery using amazon s3
Online backup and recovery using amazon s3Online backup and recovery using amazon s3
Online backup and recovery using amazon s3eSAT Publishing House
 
Supervised machine learning based dynamic estimation
Supervised machine learning based dynamic estimationSupervised machine learning based dynamic estimation
Supervised machine learning based dynamic estimationeSAT Publishing House
 
Dead node detection in teen protocol survey
Dead node detection in teen protocol surveyDead node detection in teen protocol survey
Dead node detection in teen protocol surveyeSAT Publishing House
 
Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...eSAT Publishing House
 
Video inpainting using backgroung registration
Video inpainting using backgroung registrationVideo inpainting using backgroung registration
Video inpainting using backgroung registrationeSAT Publishing House
 
Limiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networksLimiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networkseSAT Publishing House
 

Viewers also liked (20)

An enhanced adaptive scoring job scheduling algorithm with replication strate...
An enhanced adaptive scoring job scheduling algorithm with replication strate...An enhanced adaptive scoring job scheduling algorithm with replication strate...
An enhanced adaptive scoring job scheduling algorithm with replication strate...
 
Factors affecting def and asr in the concrete dam at vrané nad vltavou
Factors affecting def and asr in the concrete dam at vrané nad vltavouFactors affecting def and asr in the concrete dam at vrané nad vltavou
Factors affecting def and asr in the concrete dam at vrané nad vltavou
 
Parallel k nn on gpu architecture using opencl
Parallel k nn on gpu architecture using openclParallel k nn on gpu architecture using opencl
Parallel k nn on gpu architecture using opencl
 
An improved hdr image processing using fast global
An improved hdr image processing using fast globalAn improved hdr image processing using fast global
An improved hdr image processing using fast global
 
Effect of various process parameters on friction stir
Effect of various process parameters on friction stirEffect of various process parameters on friction stir
Effect of various process parameters on friction stir
 
Design and implementation of path planning algorithm for wheeled mobile robot...
Design and implementation of path planning algorithm for wheeled mobile robot...Design and implementation of path planning algorithm for wheeled mobile robot...
Design and implementation of path planning algorithm for wheeled mobile robot...
 
Soft subgrade stabilization with quarry dust an industrial waste
Soft subgrade stabilization with quarry dust an industrial wasteSoft subgrade stabilization with quarry dust an industrial waste
Soft subgrade stabilization with quarry dust an industrial waste
 
Thermal, microstructure and dielectric behavior of la modified bismuth titana...
Thermal, microstructure and dielectric behavior of la modified bismuth titana...Thermal, microstructure and dielectric behavior of la modified bismuth titana...
Thermal, microstructure and dielectric behavior of la modified bismuth titana...
 
Preliminary study of on cladding process on gray cast
Preliminary study of on cladding process on gray castPreliminary study of on cladding process on gray cast
Preliminary study of on cladding process on gray cast
 
Treatability study of cetp wastewater using physico chemical process-a case s...
Treatability study of cetp wastewater using physico chemical process-a case s...Treatability study of cetp wastewater using physico chemical process-a case s...
Treatability study of cetp wastewater using physico chemical process-a case s...
 
A novel scheme for reliable multipath routing
A novel scheme for reliable multipath routingA novel scheme for reliable multipath routing
A novel scheme for reliable multipath routing
 
Utilization of pulverized plastic in cement concrete as fine aggregate
Utilization of pulverized plastic in cement concrete as fine aggregateUtilization of pulverized plastic in cement concrete as fine aggregate
Utilization of pulverized plastic in cement concrete as fine aggregate
 
Online backup and recovery using amazon s3
Online backup and recovery using amazon s3Online backup and recovery using amazon s3
Online backup and recovery using amazon s3
 
Supervised machine learning based dynamic estimation
Supervised machine learning based dynamic estimationSupervised machine learning based dynamic estimation
Supervised machine learning based dynamic estimation
 
Dead node detection in teen protocol survey
Dead node detection in teen protocol surveyDead node detection in teen protocol survey
Dead node detection in teen protocol survey
 
Next generation engine immobiliser
Next generation engine immobiliserNext generation engine immobiliser
Next generation engine immobiliser
 
Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...
 
Cost effective failover clustering
Cost effective failover clusteringCost effective failover clustering
Cost effective failover clustering
 
Video inpainting using backgroung registration
Video inpainting using backgroung registrationVideo inpainting using backgroung registration
Video inpainting using backgroung registration
 
Limiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networksLimiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networks
 

Similar to A novel rrw framework to resist accidental attacks

A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
 
A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...eSAT Publishing House
 
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder TheoremRobust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder TheoremjournalBEEI
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
 
Non standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletsNon standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletseSAT Publishing House
 
Non standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletsNon standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletseSAT Journals
 
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESijiert bestjournal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
An octo coding technique to reduce energy transition
An octo coding technique to reduce energy transitionAn octo coding technique to reduce energy transition
An octo coding technique to reduce energy transitioneSAT Publishing House
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...nooriasukmaningtyas
 
An octo coding technique to reduce energy transition in low power vlsi circuits
An octo coding technique to reduce energy transition in low power vlsi circuitsAn octo coding technique to reduce energy transition in low power vlsi circuits
An octo coding technique to reduce energy transition in low power vlsi circuitseSAT Journals
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform ijfcstjournal
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...IRJET Journal
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
 
Digital Image Watermarking using DWT and SVD
Digital Image Watermarking using DWT and SVDDigital Image Watermarking using DWT and SVD
Digital Image Watermarking using DWT and SVDVignesh Vetri Vel
 
Digital video watermarking using modified lsb and dct technique
Digital video watermarking using modified lsb and dct techniqueDigital video watermarking using modified lsb and dct technique
Digital video watermarking using modified lsb and dct techniqueeSAT Publishing House
 
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICESA BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICEScsandit
 

Similar to A novel rrw framework to resist accidental attacks (20)

A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image WatermarkingA Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarking
 
A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...
 
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder TheoremRobust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
 
Ba36317323
Ba36317323Ba36317323
Ba36317323
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
Non standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletsNon standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded wavelets
 
Non standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletsNon standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded wavelets
 
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
An octo coding technique to reduce energy transition
An octo coding technique to reduce energy transitionAn octo coding technique to reduce energy transition
An octo coding technique to reduce energy transition
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...
 
An octo coding technique to reduce energy transition in low power vlsi circuits
An octo coding technique to reduce energy transition in low power vlsi circuitsAn octo coding technique to reduce energy transition in low power vlsi circuits
An octo coding technique to reduce energy transition in low power vlsi circuits
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics
 
Digital Image Watermarking using DWT and SVD
Digital Image Watermarking using DWT and SVDDigital Image Watermarking using DWT and SVD
Digital Image Watermarking using DWT and SVD
 
Digital video watermarking using modified lsb and dct technique
Digital video watermarking using modified lsb and dct techniqueDigital video watermarking using modified lsb and dct technique
Digital video watermarking using modified lsb and dct technique
 
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICESA BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 

Recently uploaded (20)

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

A novel rrw framework to resist accidental attacks

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 256 A NOVEL RRW FRAMEWORK TO RESIST ACCIDENTAL ATTACKS Farooq Shaik Mohammad1 , M. Ramana Reddy2 1 Student, 2 Professor, Department of E.C.E, RGM Autonomous of college Engineering & Technology, Andhra Pradesh, India faaruk.smd@gmail.com, ramana_2k5@rediffmail.com Abstract Robust reversible watermarking (RRW) methods are popular in multimedia for protecting copyright, while preserving intactness of host images and providing robustness against unintentional attacks. Robust reversible watermarking (RRW) is used to protect the copyrights and providing robustness against unintentional attacks. The past histogram rotation-based methods suffer from extremely poor invisibility for watermarked images and limited robustness in extracting watermarks from the watermarked images destroyed by unintentional attacks. This paper proposes a wavelet-domain statistical quantity histogram shifting and clustering (WSQH-SC) method and Enhanced pixel-wise masking (EPWM). This method embeds a new watermark image and extraction procedures by histogram shifting and clustering, which are important for improving robustness and reducing run-time complexity. It is possible reversibility and invisibility. By using WSQH-SC methods reversibility, invisibility of watermarks can be achieved. The experimental results show the comprehensive performance in terms of reversibility, robustness, invisibility, capacity and run-time complexity widely applicable to different kinds of images. Keywords: — Integer wavelet transform, k-means clustering, masking, robust reversible watermarking (RRW) ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION Reversible Watermarking (RW) methods [1] are used to embed watermarks [2], e.g., secret information [3], into digital media while preserving high intactness and good fidelity of host media. It plays an important role in protecting copyright and content of digital media for sensitive applications, e.g., medical and military images. The concept of reversible watermark firstly appeared in the patent owned by Eastman Kodak [4] Honsingex et al. [4] utilised a robust spatial additive watermark combined with modulo additions to achieve reversible data embedding. Goljan et al. [5] proposed a two cycles flipping permutation to assign a watermarking bit in each pixel group. Celik et al. [6] presented a high capacity, reversible data-embedding algorithm with low distortion by compressing quantization residues. Tian [7] presented a reversible data embedding approach based on expanding the pixel value difference between neighboring pixels, which will not overflow or underflow after expansion. Thodi and Rodrguez exploited the inherent correlation among the neighboring pixels in an image region using a predictor. Xuan et al. [8] embedded data into high-frequency coefficients of integer wavelet transforms with the commanding technique, and utilized histogram modification as a preprocessing step to prevent overflow or underflow caused by the modification of wavelet coefficients. Reversible watermarking has found a huge surge of experimentation in its domain in the past decade as the need of recovering the original work image after extracting the watermark arises in various applications such as the law enforcement, medical and military image system, it is crucial to restore the original image without any distortions [9]. In traditional watermarking techniques, our main concern is to embed and recover the watermark with minimum loss. The quality of original work image we get after extraction is highly degraded and not restorable. But in applications like law enforcement, medical and military, in which superior quality of image is needed, we cannot use these algorithms. In medical images, some prerequisite information about the patient is watermarked in it while transmitting and at reception we need to have both, the original image and that information is to be recovered loss without. This type of result is achievable by making use of any reversible watermarking algorithm out of a pool of algorithms [10]. 2. PROPOSED METHOD The following steps are used to embed the watermark into image. • Decompose image using 5/3 IWT and divide the sub- band HL into n non overlapping blocks with the size of h × w. • Compute the mean of wavelet coefficients (MWC) histogram of all of the blocks and obtain Sk. • Perform EPWM to compute the watermark strength • For k = 1to m do • 7 Embed the kth watermark bit bk with Sw • k = Sk + βλbk ; • End for
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 257 • Reconstruct the watermarked image I with inverse 5/3 IWT. The block diagram of proposed method as shown in fig.1 Fig.1. Block diagram of proposed method 2.1 Property Inspired Pixel Adjustment (PIPA) In RRW, how to handle both overflow and underflow of pixels is important for reversibility. Xuan et al. [11] proposed a pixel adjustment strategy to tackle this problem. Unfortunately, it cannot be directly applied to wavelet domain because the adjustment scale related to wavelet transform is unknown. As a consequence, we develop PIPA to handle this problem. Firstly, PIPA deeply exploits the intrinsic relationship between wavelet coefficient and pixel changes. In particular, given a t- bit host image I with the size of 2M ×2N, the pixel adjustment is performed by where I (i, j ) is the grayscale value of the pixel at (i, j ) in the image I , I (i, j ) is the adjusted one (1 ≤ i ≤ 2M, 1 ≤ j ≤ 2N), and η > λ is the adjustment scale. 2.2 Integer Wavelet Transforms (IWT) The wavelet transform transforms the image into a multi-scale representation with both spatial and frequency characteristics [12]. This allows for effective multi-scale image analysis with lower computational cost. Using the IWT, the texture image is decomposed into four sub images, as low-low, low-high, high- low and high-high sub-bands. Fig.2. Image decomposition after a two level scaling for IWT 2.3 Means of Wavelet Coefficients (MWC) Histogram It is designed in high-pass sub-bands of wavelet decomposition, to which HVS is less sensitive, leading to high invisibility of watermarked images and it has almost a zero- mean and Laplacian-like distribution based on the experimental study of wavelet high-pass sub-bands from 300 test images. Considering a given host image I , we first decompose I using 2 level IWT to obtain the sub-band and then divide HL into n non overlapping blocks. Let S = (S1,..., Sk ,..., Sn ) be the MWCs in the sub-band, then the MWC of the kth block, Sk ,is defined as Where P (i, j) k represents the wavelet coefficient at (i, j ) in the kth block 2.4 Embedded Pixel Wise Masking (EPWM) It has been well acknowledged that a balance between invisibility and robustness is important for robust watermarking methods. Although many efforts have been made to design lossless embedding models, little progress has been made in this trade-off. Therefore, we develop EPWM to tackle this problem by utilizing the JND thresholds of wavelet coefficients to optimize watermark strength. To computed the watermark strength is as shown below ( )ji j NM i JND , 1 1 1 1 ∑ ∑ = = × = ω ρ α λ Where α is a global parameter and M × N is the sub-band size. ∑ ∑ − = − =−− = 2 2 2 2 ),( )2()2( 1 h i w j ji P wXh S kk       <+ > = ηη ηη j)I(i,ifj)I(i, -1-ˆt2j)I(i,if-j)I(i, j)(i,I'
  • 3. IJRET: International Journal of Research in Engineering and Technology __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ 2.5 Embedded Procedure We use the obtained JND thresholds to control watermark strength during the embedding process. To be specific, given the MWC of the kth block of interest, i.e., Sk the watermark embedding is given by k = Sk + βλbk Here k is the obtained MWC after the kth watermark bit bk {0, 1} is embedded, β is a factor defined as    −      − = ss ss k k abs * * β 3. QUALITY MEASUREMENT PSNR is most commonly used to measure the quality of reconstruction of lossy compression codecs. PSNR is most easily defined via the mean squared error ( noise-free m×n monochrome image I approximation K, MSE is defined as: ( ) ([∑∑ − − = − = = 1 0 1 0 ,1 m i n j KjiImn MSE The PSNR is defined as:         = MSE MAX PSNR I 2 10log.10         = MSE MAX I log.20 10 ( ) ( )MSEMAX I log10log.20 1010 −= 4. EXPERIMENTAL RESULTS MSE = 174.2140 PSNR = 25.7200 Original Image Fig 3 shows the original camera man image IJRET: International Journal of Research in Engineering and Technology eISSN: 2319 __________________________________________________________________________________________ 2013, Available @ http://www.ijret.org We use the obtained JND thresholds to control watermark strength during the embedding process. To be specific, given the MWC of the kth block of interest, i.e., Sk the watermark ed MWC after the kth watermark bit bk ∈   * PSNR is most commonly used to measure the quality of reconstruction of lossy compression codecs. PSNR is most defined via the mean squared error (MSE). Given a I and its noisy ( )], 2 ji shows the original camera man image Decomposed Image Fig 4 shows the decomposed camera man image EPWM Fig 5 shows EPWM camera man image Watermarked Image Fig 6 shows the watermarked image CONCLUSIONS In this paper, we have developed a novel yet pragmatic framework for RRW. It includes carefully designed PIPA, SQH shifting and clustering, and EPWM, each of which handles a specific problem in RRW. PIPA preprocesses host images by adjusting the pixels into a reliable range for satisfactory reversibility. SQH shifting and clustering constructs new watermark embedding and extraction processes for good robustness and low run EPWM precisely estimates the local sensitivity of HVS and adaptively optimizes the watermark strength for a trade eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ 258 shows the decomposed camera man image shows EPWM camera man image shows the watermarked image In this paper, we have developed a novel yet pragmatic framework for RRW. It includes carefully designed PIPA, SQH shifting and clustering, and EPWM, each of which problem in RRW. PIPA preprocesses host images by adjusting the pixels into a reliable range for reversibility. SQH shifting and clustering new watermark embedding and extraction robustness and low run-time complexity. estimates the local sensitivity of HVS and the watermark strength for a trade-off
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 259 between robustness and invisibility. In future, we will combine the proposed framework with the local feature to further improve robustness. REFERENCES [1]. J. Fridrich, M. Goljan, and R. Du, “Lossless data embedding-new paradigm in digital watermarking,” EURASIP J. Appl. Signal Process., vol. 2002, no. 1, pp. 185– 196, Jan. 2002. [2]. Z. Zhao, N. Yu, and X. Li, “A novel video watermarking scheme in compression domain based on fast motion estimation,” in Proc. Int. Conf. Commun. Technol., vol. 2. 2003, pp. 1878–1882. [3]. X. Li, “Watermarking in secure image retrieval,” Pattern Recog. Lett., vol. 24, no. 14, pp. 2431–2434, Oct. 2003. [4]. Honsinger, C.W., Jones, P., Rabbani, M., and Stoffel, J.C.: ‗Lossless recovery of an original image containing embedded data‘. US patent no. 6278791, 2001 [5]. Goljan, M., Fridrich, J., and Du, R.: ‗Distortion-free data embedding for images‘. 4th Information Hiding Workshop, LNCS, vol. 2137, (Springer-Verlag, New York, 2001, pp. 27– 41. [6]. Celik, M.U., Sharma, G., Tekalp, A.M., and Saber, E.: ‗Reversible data hiding‘. Proc. ICIP, 2002, vol. 2, pp. 157– 160 [7]. T ian, J.: ‗Reversible data embedding using a difference expansion‘, IEEE Trans. Circuits Syst. Video Technol., 2003, 13, (8), pp. 890–896. [8]. Xuan, G.R., Yang, C.Y., Zhen, Y.Z., and Shi, Y.Q.: ‗Reversible data hiding using integer wavelet transform and companding technique‘.Proc. IWDW, 2004. [9]. J. T ian, ―Wavelet-based reversible watermarking for authentication,‖ in Security and Watermarking of Multimedia Contents IV—Proc. SPIE, E. J. Delp III and P. W. Wong, Eds., Jan. 2002, vol. 4675, pp. 679–690. [10]. B. Macq, ― Lossless multi resolution transform for image authenticating watermarking,‖ in Proc. EUSIPCO, Sept. 2000, pp. 533–536. [11]. G. Xuan, Y. Shi, P. Chai, X. Cui, Z. Ni, and X. Tong, “Optimum histogram pair based image lossless data embedding,” in Proc. Digit Watermark., 2008, pp. 264–278. [12]. D. Zou, Y. Shi, Z. Ni, and W. Su, “A semi-fragile lossless digital watermarking scheme based on integer wavelet transform,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 10, pp. 1294–1300, Oct. 2006. BIOGRAPHIES FAROOQ SHAIK MOHAMMAD received B. Tech degree from SAFA Engineering College, B.Thandarpadu, Kurnool (dist), Andhra Pradesh in the year 2011 and currently pursing M. Tech in Digital Systems & Computer Electronics at RGM College of Engineering and Technology, Nandyal, Kurnool (dist), Andhra Pradesh. His areas of interest are research work in image processing. Dr. M.RAMANAREDDY, presently working as professor in RGM College of Engineering and Technology (Autonomous), Nandyal, Kurnool(dist), AP, India. He was awarded a doctorate for his work in Signal Processing in 2010.He has 16 years of teaching experience and 8 years of industrial experience. He has Professional Memberships in MISTE, MIE, and FIETE. He guided 10 projects at master level.