SlideShare a Scribd company logo
1 of 9
Download to read offline
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
DOI : 10.5121/acij.2012.3507 63
DIRECTIONAL BASED WATERMARKING
SCHEME USING A NOVEL DATA
EMBEDDING APPROACH
1
Y. RaghavenderRao, 2
Dr.E.Nagabhooshanam, 3
P. Nikhil
1
Associate Professor, Department of ECE, JNTUH College of Engineering,
Karimnagar, A.P, India,
Email Id: raghavendery_rao@rediffmail.com
2
Prof., Department of ECE, Muffakhamjah College of Engg, Hyderabad, A.P. India,
Email Id:enb1234@rediffmail.com
Abstract:
Image watermarking has come to wide use in the recent past. It is by the authentication problems and
limitation means that the setting accuracy of the image watermarking operation is minimized. Different
types of integration schemes have been proposed in the past to improve efficiency and makes the
embedding resistant against various attacks .Although transformation, spatial domain approaches have
been developed PSNR improvements in image artifacts due to the fringes are still to be observed. To
improvise the embedding, image artifacts in this paper a forward – based image embedding scheme is
proposed.
Keywords:
Watermarking, Wavelet Transform, Directional filter, Attacks.
I. Introduction
With the advent of internet, copying and distribution of digital data has become effortless. This
led to raise an issue for the copyright protection of digital data. Digital Watermarking for
images, video and other kinds of digital data is the new tool for protection of data from
copyright infringement.Here, an imperceptible signal “mark” is embedded into the original
image, which signifies the ownership of the latter.After the watermark is embedded, it should be
robust and should not be removable by any other person, either intentionally or
unintentionally.Different watermarking techniques have already been proposed and are being
applied successfully. Overview of watermarking techniques can be seen in [3].
Watermarking techniques are broadly classified into two categories: Spatial domain methods
[4],[5] and Transform domain methods [6],[7].Spatial domain methods have less complexity
because we do not use any transform, but these are not robust in nature against
attacks.Transform domain techniques of watermarking are highly robust than spatial domain
watermarking techniques.This happens because the watermarked image is inverse wavelet
transformed, watermark is irregularly over the image and it becomes difficult for the attacker to
read or modify the image.When transform domain techniques are considered, DWT based
techniques are more popular as DWT is advantageous over some other types of transform like as
progressive and low bit-rate transmission, quality scalability and region-of-interest (ROI) coding
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
64
demand more efficient and versatile image coding that can be exploited for both, image
compression and watermarking applications.The compression standard JPEG2000 is based on
the discrete wavelet transform (DWT) to meet the requirements.Therefore, it is imperative to
use the wavelet transform domain for most of the applications where watermarking is
required.Wavelets are applied successfully to most of the image processing tasks like low bit-
rate compression and also De-noising [8].But they lack the important feature of directionality.
So they are inefficient in retaining textures and other details of importance in those applications
[3] [4].Several efforts have been made towards developing geometrical image transforms.
Wavelet transforms [1], complex wavelets [6], curve lets [2] and contour-lets [3] are a few
examples.Watermarking finds it difficult to use such redundant information as the embedding
process needs to be error free so as to achieve accuracy. It is observed that image watermarking
is very effective in image embedding at edge regions, which leads to visual artifacts. To avoid
the distortion observed in the image, the embedding process based on directional oriented image
embedding is proposed. The rest of the paper is defined in 6 sections. Section 2 briefs the
approach in watermarking schemes, the approach of directional filter operation and its
embedding process is defined in section 3 and 4 respectively. The observation for the developed
approach is outlined in section 5. A conclusion is presented in section 6.
II. Image Watermarking
The past decade has seen an explosion in the use and distribution of digital multimedia data.
PCs with Internet connections have made the distribution of digital data and applications much
easier and faster. However, this has also had a serious effect on copyright encroachment,
thereby creating a new demand for copyright protection of digital data [8,9]. To
provide copyright protection for digital data, two complementary techniques have been
developed: encryption and watermarking. Encryption can be used to protect digital data during
the transmission process from the sender to the receiver. However, after the receiver has
received and decrypted the data, it becomes identical to the original data and is no longer
protected. Watermarking can complement encryption by embedding a secret imperceptible
signal, a watermark, into the original data in such a way that it always remains
present. Generally digital image watermarking has certain requirements, the most important
being robustness and invisibility. Robustness means that the embedded watermarks cannot be
removed by intentional or unintentional digital data changing called attacks.
Although robustness can be obtained based on significant modifications to the host data, such
modifications are noticeable and thus do not satisfy the requirement of invisibility. As such, a
tradeoff is needed between the different requirements so that an optimal watermarking can be
developed for each type of application. Watermarking is novel method of hiding data and
identifying information present in digital multimedia.Watermarking of digital images is our area
of interest. Even digital audio, video and documents can also be watermarked, image
watermarking has more importance.Digital watermarking has more fame when it comes to the
point of adding undetectable marks which involve author or copyright information.So when
taken into consideration of all the applications, watermarking techniques are evaluated based on
the criterion like invisibility, recoverability and also robustness.In applying watermarks to
images, our focus would be on invisibility, recoverability, and robustness of the watermark. All
of these are complicatedly linked.The less the image is affected by attacks, the easier it is to
confiscate the watermark; recoverability is reliant on robustness, because the watermark must
still be existing even after morphological attacks and other external attacks.Attacks may be
accidental or they may be intentional, but all the watermarked images are prone to
attack.Attacks also may be the attempts to change the image in order to wipe out the watermark
and to preserve the imageSince watermarks may be hidden copyrights, these type of attacks are
extremely undesirable and unwanted. To overcome these limitations a robust watermarking
scheme is required. The attacks observed and the artifacts introduced results in lowering
embedding efficiency. To achieve better embedding, wavelet based image coding is been
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
65
developed. Though Transform based coding approach is developed to minimize visual artifacts
the edge preserving requirements are need to be developed.
III. Wavelet based watermarking scheme
Among various wavelet based coding approach Dote’s [9] based coding approach is observed to
have lower complexity in coding and embed the watermark in lower bands. The watermarking
scheme based on this approach works on a multilevel wavelet transformation technique. The
original image and the watermarked image are transformed into wavelet domain.This approach
selects 5th level transformation for host image and 1st level for watermark.The original image
and the watermarked image are transformed into wavelet domain. The developed technique in
[7] is depicted in the Fig.1.
Fig. 1 Dote’scoding approach using multilevel image fusion.
For the extraction, the watermark is retrieved by applying inverse procedure at each resolution
level using the same secret key. Estimated the watermark by averaging the extracted
watermarks and the extracted ones are normalized for binary values. In order to find out
similarity between embedded and extracted watermarks the host and the marked images are
observed perceptually. The correlation coefficients between the extracted watermark images at
different signal to noise ratios (SNR) values were calculated.The correlation coefficient’s’ is
used for similarity measurement, and the SNR is evaluated.
Where N is the number of pixels present in the watermark, w and w are the original and
extracted watermarks, respectively.The related measure of PSNR (in db) between host and
marked image is computed using
PSNR = 20log10 [255/RMSE]
Where
for the 8-bit gray level image.
The coding approach based on Dotes’s method using wavelet transform embed the information
in complete lower band but this approach may loss image information as they are embed at a
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
66
very lower level, also the image bounding sensitive regions may get more effective as the
embedding is done in non-measured manner. To preserve the image quality of embedded and
embedding image the regions for embedding need to be decided and solution need to be
developed. In this paper a directional based filter coding is presented.
IV. Directional Watermarking scheme
To provide orientation based coding approach for image bounding regions a directional based
filtration approach to the conventional wavelet based watermarking is proposed. Directional
filter banks (DFB) [11] decompose the frequency space into wedge-shaped partitions as shown
in Fig. 2.
Fig.2. Directional filter bank frequency partitioning using 8 directions
Eight directions were used, where directional sub-bands of 1, 2, 3, and 4 represent horizontal
directions (directions between -45° and +45°) and for the vertical directions (directions between
45° and135°). The DFB approach is realized using iterated quincunx filter banks as illustrated in
Fig. 3. defined by
Figure.3. Quincunx filter bank. H0and H1
At the first level of the filter bank, a quincunx filter bank (QFB) is applied. The quincunx
sampling matrix is
The image is further decomposed by using two other QFBs at the outputs y0and y1. Hence four
outputs corresponding to the four directions of the filter bands are achieved. At higher level
QFBs are employed in conjunction with resembling matrices. The resampling coefficients used
per direction is as presented below,
Applying these resampling operations to the outputs of the QFB, a normalized oriented image is
derived. For the obtained directional bands a normalized magnitude values are computed
defined by,
N = ||yi||2
The band density have higher pixel density in such directions are kept unmodified and band
have lower normalized values are embedded with the watermark coefficients. This embedding is
made on the directional band density hence the image are least effected on the directional
variations. Coefficients satisfying the thresholdingbased criterion
N = ||yi||2
>th
is used where the threshold (th), is defined by
th = 1/3[ሺ∑ .௠
௜ୀଵ ∑ .௡
௝ୀଵ ‫ݔ‬௜,௝)/mxn ]
The proposed approach of watermarking is as illustrated below,
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
67
(a)
(b)
Figure4: (a) Proposed Orientational embedding encoding unit (b) Decoding unit
For the regeneration of the embedded watermark a reverse process of embedding is used. The
watermarked image is processed with the DFB and the normalized magnitude value is
computed. The bands having lower than the normalized magnitude value is taken as the
watermark coefficients. To evaluate the operational performance of proposed approach a
simulative analysis is carried out on Matlab®
tool and the obtained results are as presented.
V. Result observation
In our investigation, the performance evaluation is based on three performance metrics; these
are imperceptibility, execution time, and robustness against common signal processing
operations. Each of these metrics is described in the forthcoming sections.An important way of
evaluating watermarking algorithms is to compare the amount of distortion introduced into the
original image by introducing a watermarking algorithm. In order to measure the quality of the
image at the output of the decoder, mean square error (MSE) and peak to signal to noise ratio
(PSNR) ratio measurement which measures the maximum signal to noise ratio found on an
image has been used as an objective measure for the distortions introduced by the watermarking
system are often used.
Distortion Measures:
1. Mean squared error
The Mean squared error (MSE) of an estimator is one of the way to quantify the amount by
which an estimator differs from the true value of the quantity being estimated. Mean Squared
Error is also called squared error loss.MSE measures the average of the square of the "error."
The error is the amount by which the estimator differs from the quantity to be estimated.
2. Signal to noise ratio
Signal-to-noise ratio compares the level of a desired signal (such as Image) to the level of
background noise. The higher the ratio, the less noticeable the background noise is. Signal to
noise ratio (SNR) effectively measures the quality of the watermarked image as compared to the
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
68
original image. This difference is represented as an error function that shows how close the
watermarked image is to the original image and it is written as:
The larger the value of e (x, y) the greater is the distortion caused by the watermark and the
attacks.
Which represents the size of the error relative to the input signal, alternatively on the
logarithmic scale,
3. Peak signal to noise ratio
Peak signal-to-noise ratio, often abbreviated PSNR, is an engineering term for the ratio between
the maximum possible power of a signal and the power of corrupting noise that affects the
fidelity of its representation. Because many signals have a very wide dynamic range, PSNR is
usually expressed in terms of the logarithmic decibel scale. The PSNR is most commonly used
as a measure of quality of reconstructed image.
Where Ipeakis the peak values of the input signal (usually 255 the maximum value of luminance
level).
We use peak signal to noise ratio to evaluate the quality of image after embedding the
watermark. In general a processed image is acceptable to human eye if its PSNR is greater than
30 db and greater the PSNR greater the image quality.
4. Similarity Factor
The similarity factor determines the similarity of pixel intensities between the original image
and the watermarked image and also between the original watermark and the extracted
watermark. An objective measure of similarity between the original image/watermark and the
extracted watermark/watermarked image in the following way:
The similarity factor is approximately nearer to 1 for better
imperceptible image quality
5. Payload
Capacity is an important property because it has a direct negative impact on watermark
robustness. Higher capacity (the amount of information being embedded) causes lower
watermark robustness. Capacity can be assessed by calculating the ratio of capacity to
reliability. This can be done empirically by fixing one parameter (e.g. payload size) and
determining the other parameter (e.g. error rate). Those results can then be used to estimate the
theoretical maximum capacity of the watermarking system under consideration
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
69
6. Robustness
Robustness property can be evaluated by applying various kinds of “normal” signal distortions
and attacks that are relevant for the target application. The robustness can be assessed by
measuring detection probability of the watermark after signal distortion.
7. Bit Correct Rate (CR)
A quality estimation parameter to check the robustness of the extracted watermark, named the
Correct Rate (CR) is computed as an index to the objective quality of the image. The bit correct
ratio (BCR) is defined as the ratio of correct extracted bits to the total number of embedded bits
and can be expresses using the formula
The Bit correct rate should be equal to 1.
8. Execution Time
Another tool for evaluation of algorithm is measurement of the amount of time required to
embed a watermark into the original image, and then extract it afterwards.In our analysis, actual
time in CPU cycles will be treated as a measure of execution time. This experiment is designed
to determine the computational cost of each watermarking algorithm.
Original Image
50 100 150 200 250
50
100
150
200
250
300
Binary BEP map
Watermarked Image
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
70
Samples Without DF With DF
PSNR SSIM PSNR SSIM
1 37.2 0.7 40.2 0.9
2 35.5 0.6 43.5 1
3 36.2 0.5 45.2 0.8
4 32.7 0.4 39.7 0.7
VI. Conclusion
This paper present an orientation based watermarking scheme in wavelet domain. The visual
artifacts due to embedding at edge regions are minimized by the application of directional filters
in processing. The embedding approach for watermark embedding is developed based on
normalized directional band density and embedded watermarking based on directional density
for sub bands. By the proposed approach it is observed that the PSNR under various attacks are
minimized.
References
[1] Langelaar, G.C., Setyawan, I., Lagendijik, R.I., 2000. Watermarking digital image and video data.
IEEE signal Process. Magazine (September), 20-46.
[2] A. G. Bors and I. Pitas., “ Image watermarking using DCT domain constraints”, Proc. of IEEE Int.
Conf. on Image Processing, vol. 3, pp. 231-234 (1996)
[3] R.G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital watermark”, Proc. of Int. Conf. in
Image Processing, vol. 2, pp. 86-90, (1994).
[4] J. Ohnishi and K. Matsui, “Embedding a seal into a picture under orthogonal wavelet transformation,”
Proc. of Int. Conf. on Multimedia Comp. and Systems, pp. 514-521(1996-6).
[5] D. Kunder and D. Hatzinakos, “ A robust digital image watermarking method using wavelet-based
fusion”, Proc. of IEEE Int. Conf. on Acoustics, Speech and Sig. Proc., vol. 5, pp. 544-547 Seattle,
Washington (1997-5).
[6] D. Kunder and D. Hatzinakos.”Digital watermarking using multiresolution wavelet decomposition. In
Proceedings of IEEE ICAPSSP ’98, volume 5, pages 2969 – 2972, Seattle, WA, USA, May 1998.
[7] SanghyunJoo, YounghoSuh, Jaeho Shin, and Hisakazu Kikuchi, “A New Robust Watermarking
Embedding into Wavelet DC Components”, ETRI Journal, Volume 24, No. 5, October 2002.
0 100 200 300 400 500 600 700 800 900 1000
32
34
36
38
40
42
44
46
48
50
52
Detector Response plot
Detector Response
Watermarks
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
71
[8] Yasuhiko Dote, and Muhammad ShafiqueShaikh “A Robust Watermarking Method for Copyright
Prot. of Digital Images using Wavelet Trans.” Trans. of the Institute of Electrical Engineering of Japan,
vol. 122, No.2, Jan. 2003.
[9] T. T. Nguyen and S. Oraintara, “A multi-resolution directional filter bank for image applications,” in
proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. III, pp. 37-40,
2004.
[10] S. Park, M. J. T. Smith, and R. M. Mersereau, “Improved structures ofmaximally decimated
directional filter banks for spatial image analysis,”IEEE Trans. Image Processing, vol. 13, no. 11, pp.
1424-1431, Nov.2004.

More Related Content

What's hot

Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMijfcstjournal
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...prjpublications
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageIOSR Journals
 
Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colo...
Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colo...Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colo...
Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colo...IDES Editor
 
A Hybrid Digital Watermarking Approach Using Wavelets and LSB
A Hybrid Digital Watermarking Approach Using Wavelets and LSB A Hybrid Digital Watermarking Approach Using Wavelets and LSB
A Hybrid Digital Watermarking Approach Using Wavelets and LSB IJECEIAES
 
Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd Iaetsd
 
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMA SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMijfcstjournal
 
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...IJERA Editor
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...CSCJournals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET Journal
 
Robust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS BasedRobust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS BasedCSCJournals
 

What's hot (17)

F010413438
F010413438F010413438
F010413438
 
I43014752
I43014752I43014752
I43014752
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colo...
Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colo...Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colo...
Rotation Scale Invariant Semi Blind Biometric Watermarking Technique for Colo...
 
A Hybrid Digital Watermarking Approach Using Wavelets and LSB
A Hybrid Digital Watermarking Approach Using Wavelets and LSB A Hybrid Digital Watermarking Approach Using Wavelets and LSB
A Hybrid Digital Watermarking Approach Using Wavelets and LSB
 
Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &
 
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMA SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
 
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
 
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
 
Robust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS BasedRobust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS Based
 

Similar to DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH

A Review of Digital Watermarking Technique for the Copyright Protection of Di...
A Review of Digital Watermarking Technique for the Copyright Protection of Di...A Review of Digital Watermarking Technique for the Copyright Protection of Di...
A Review of Digital Watermarking Technique for the Copyright Protection of Di...IRJET Journal
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessIRJET Journal
 
A130104
A130104A130104
A130104irjes
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET Journal
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET Journal
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...IOSRJVSP
 
Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...nooriasukmaningtyas
 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesEditor IJMTER
 
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMA SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMijfcstjournal
 
Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...IJECEIAES
 

Similar to DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH (20)

A Review of Digital Watermarking Technique for the Copyright Protection of Di...
A Review of Digital Watermarking Technique for the Copyright Protection of Di...A Review of Digital Watermarking Technique for the Copyright Protection of Di...
A Review of Digital Watermarking Technique for the Copyright Protection of Di...
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
A130104
A130104A130104
A130104
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
 
dwm
dwmdwm
dwm
 
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency DomainsMultiple Binary Images Watermarking in Spatial and Frequency Domains
Multiple Binary Images Watermarking in Spatial and Frequency Domains
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud Computing
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
B011110614
B011110614B011110614
B011110614
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
 
Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...
 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniques
 
50120140506015
5012014050601550120140506015
50120140506015
 
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMA SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
 
Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...
 

More from acijjournal

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfacijjournal
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfacijjournal
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfacijjournal
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdfacijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Developmentacijjournal
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodologyacijjournal
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) acijjournal
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principlesacijjournal
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...acijjournal
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...acijjournal
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...acijjournal
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...acijjournal
 

More from acijjournal (20)

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdf
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdf
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdf
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodology
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ)
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
 

Recently uploaded

Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)ChandrakantDivate1
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxNANDHAKUMARA10
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257subhasishdas79
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxMustafa Ahmed
 

Recently uploaded (20)

Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 

DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH

  • 1. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012 DOI : 10.5121/acij.2012.3507 63 DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH 1 Y. RaghavenderRao, 2 Dr.E.Nagabhooshanam, 3 P. Nikhil 1 Associate Professor, Department of ECE, JNTUH College of Engineering, Karimnagar, A.P, India, Email Id: raghavendery_rao@rediffmail.com 2 Prof., Department of ECE, Muffakhamjah College of Engg, Hyderabad, A.P. India, Email Id:enb1234@rediffmail.com Abstract: Image watermarking has come to wide use in the recent past. It is by the authentication problems and limitation means that the setting accuracy of the image watermarking operation is minimized. Different types of integration schemes have been proposed in the past to improve efficiency and makes the embedding resistant against various attacks .Although transformation, spatial domain approaches have been developed PSNR improvements in image artifacts due to the fringes are still to be observed. To improvise the embedding, image artifacts in this paper a forward – based image embedding scheme is proposed. Keywords: Watermarking, Wavelet Transform, Directional filter, Attacks. I. Introduction With the advent of internet, copying and distribution of digital data has become effortless. This led to raise an issue for the copyright protection of digital data. Digital Watermarking for images, video and other kinds of digital data is the new tool for protection of data from copyright infringement.Here, an imperceptible signal “mark” is embedded into the original image, which signifies the ownership of the latter.After the watermark is embedded, it should be robust and should not be removable by any other person, either intentionally or unintentionally.Different watermarking techniques have already been proposed and are being applied successfully. Overview of watermarking techniques can be seen in [3]. Watermarking techniques are broadly classified into two categories: Spatial domain methods [4],[5] and Transform domain methods [6],[7].Spatial domain methods have less complexity because we do not use any transform, but these are not robust in nature against attacks.Transform domain techniques of watermarking are highly robust than spatial domain watermarking techniques.This happens because the watermarked image is inverse wavelet transformed, watermark is irregularly over the image and it becomes difficult for the attacker to read or modify the image.When transform domain techniques are considered, DWT based techniques are more popular as DWT is advantageous over some other types of transform like as progressive and low bit-rate transmission, quality scalability and region-of-interest (ROI) coding
  • 2. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012 64 demand more efficient and versatile image coding that can be exploited for both, image compression and watermarking applications.The compression standard JPEG2000 is based on the discrete wavelet transform (DWT) to meet the requirements.Therefore, it is imperative to use the wavelet transform domain for most of the applications where watermarking is required.Wavelets are applied successfully to most of the image processing tasks like low bit- rate compression and also De-noising [8].But they lack the important feature of directionality. So they are inefficient in retaining textures and other details of importance in those applications [3] [4].Several efforts have been made towards developing geometrical image transforms. Wavelet transforms [1], complex wavelets [6], curve lets [2] and contour-lets [3] are a few examples.Watermarking finds it difficult to use such redundant information as the embedding process needs to be error free so as to achieve accuracy. It is observed that image watermarking is very effective in image embedding at edge regions, which leads to visual artifacts. To avoid the distortion observed in the image, the embedding process based on directional oriented image embedding is proposed. The rest of the paper is defined in 6 sections. Section 2 briefs the approach in watermarking schemes, the approach of directional filter operation and its embedding process is defined in section 3 and 4 respectively. The observation for the developed approach is outlined in section 5. A conclusion is presented in section 6. II. Image Watermarking The past decade has seen an explosion in the use and distribution of digital multimedia data. PCs with Internet connections have made the distribution of digital data and applications much easier and faster. However, this has also had a serious effect on copyright encroachment, thereby creating a new demand for copyright protection of digital data [8,9]. To provide copyright protection for digital data, two complementary techniques have been developed: encryption and watermarking. Encryption can be used to protect digital data during the transmission process from the sender to the receiver. However, after the receiver has received and decrypted the data, it becomes identical to the original data and is no longer protected. Watermarking can complement encryption by embedding a secret imperceptible signal, a watermark, into the original data in such a way that it always remains present. Generally digital image watermarking has certain requirements, the most important being robustness and invisibility. Robustness means that the embedded watermarks cannot be removed by intentional or unintentional digital data changing called attacks. Although robustness can be obtained based on significant modifications to the host data, such modifications are noticeable and thus do not satisfy the requirement of invisibility. As such, a tradeoff is needed between the different requirements so that an optimal watermarking can be developed for each type of application. Watermarking is novel method of hiding data and identifying information present in digital multimedia.Watermarking of digital images is our area of interest. Even digital audio, video and documents can also be watermarked, image watermarking has more importance.Digital watermarking has more fame when it comes to the point of adding undetectable marks which involve author or copyright information.So when taken into consideration of all the applications, watermarking techniques are evaluated based on the criterion like invisibility, recoverability and also robustness.In applying watermarks to images, our focus would be on invisibility, recoverability, and robustness of the watermark. All of these are complicatedly linked.The less the image is affected by attacks, the easier it is to confiscate the watermark; recoverability is reliant on robustness, because the watermark must still be existing even after morphological attacks and other external attacks.Attacks may be accidental or they may be intentional, but all the watermarked images are prone to attack.Attacks also may be the attempts to change the image in order to wipe out the watermark and to preserve the imageSince watermarks may be hidden copyrights, these type of attacks are extremely undesirable and unwanted. To overcome these limitations a robust watermarking scheme is required. The attacks observed and the artifacts introduced results in lowering embedding efficiency. To achieve better embedding, wavelet based image coding is been
  • 3. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012 65 developed. Though Transform based coding approach is developed to minimize visual artifacts the edge preserving requirements are need to be developed. III. Wavelet based watermarking scheme Among various wavelet based coding approach Dote’s [9] based coding approach is observed to have lower complexity in coding and embed the watermark in lower bands. The watermarking scheme based on this approach works on a multilevel wavelet transformation technique. The original image and the watermarked image are transformed into wavelet domain.This approach selects 5th level transformation for host image and 1st level for watermark.The original image and the watermarked image are transformed into wavelet domain. The developed technique in [7] is depicted in the Fig.1. Fig. 1 Dote’scoding approach using multilevel image fusion. For the extraction, the watermark is retrieved by applying inverse procedure at each resolution level using the same secret key. Estimated the watermark by averaging the extracted watermarks and the extracted ones are normalized for binary values. In order to find out similarity between embedded and extracted watermarks the host and the marked images are observed perceptually. The correlation coefficients between the extracted watermark images at different signal to noise ratios (SNR) values were calculated.The correlation coefficient’s’ is used for similarity measurement, and the SNR is evaluated. Where N is the number of pixels present in the watermark, w and w are the original and extracted watermarks, respectively.The related measure of PSNR (in db) between host and marked image is computed using PSNR = 20log10 [255/RMSE] Where for the 8-bit gray level image. The coding approach based on Dotes’s method using wavelet transform embed the information in complete lower band but this approach may loss image information as they are embed at a
  • 4. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012 66 very lower level, also the image bounding sensitive regions may get more effective as the embedding is done in non-measured manner. To preserve the image quality of embedded and embedding image the regions for embedding need to be decided and solution need to be developed. In this paper a directional based filter coding is presented. IV. Directional Watermarking scheme To provide orientation based coding approach for image bounding regions a directional based filtration approach to the conventional wavelet based watermarking is proposed. Directional filter banks (DFB) [11] decompose the frequency space into wedge-shaped partitions as shown in Fig. 2. Fig.2. Directional filter bank frequency partitioning using 8 directions Eight directions were used, where directional sub-bands of 1, 2, 3, and 4 represent horizontal directions (directions between -45° and +45°) and for the vertical directions (directions between 45° and135°). The DFB approach is realized using iterated quincunx filter banks as illustrated in Fig. 3. defined by Figure.3. Quincunx filter bank. H0and H1 At the first level of the filter bank, a quincunx filter bank (QFB) is applied. The quincunx sampling matrix is The image is further decomposed by using two other QFBs at the outputs y0and y1. Hence four outputs corresponding to the four directions of the filter bands are achieved. At higher level QFBs are employed in conjunction with resembling matrices. The resampling coefficients used per direction is as presented below, Applying these resampling operations to the outputs of the QFB, a normalized oriented image is derived. For the obtained directional bands a normalized magnitude values are computed defined by, N = ||yi||2 The band density have higher pixel density in such directions are kept unmodified and band have lower normalized values are embedded with the watermark coefficients. This embedding is made on the directional band density hence the image are least effected on the directional variations. Coefficients satisfying the thresholdingbased criterion N = ||yi||2 >th is used where the threshold (th), is defined by th = 1/3[ሺ∑ .௠ ௜ୀଵ ∑ .௡ ௝ୀଵ ‫ݔ‬௜,௝)/mxn ] The proposed approach of watermarking is as illustrated below,
  • 5. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012 67 (a) (b) Figure4: (a) Proposed Orientational embedding encoding unit (b) Decoding unit For the regeneration of the embedded watermark a reverse process of embedding is used. The watermarked image is processed with the DFB and the normalized magnitude value is computed. The bands having lower than the normalized magnitude value is taken as the watermark coefficients. To evaluate the operational performance of proposed approach a simulative analysis is carried out on Matlab® tool and the obtained results are as presented. V. Result observation In our investigation, the performance evaluation is based on three performance metrics; these are imperceptibility, execution time, and robustness against common signal processing operations. Each of these metrics is described in the forthcoming sections.An important way of evaluating watermarking algorithms is to compare the amount of distortion introduced into the original image by introducing a watermarking algorithm. In order to measure the quality of the image at the output of the decoder, mean square error (MSE) and peak to signal to noise ratio (PSNR) ratio measurement which measures the maximum signal to noise ratio found on an image has been used as an objective measure for the distortions introduced by the watermarking system are often used. Distortion Measures: 1. Mean squared error The Mean squared error (MSE) of an estimator is one of the way to quantify the amount by which an estimator differs from the true value of the quantity being estimated. Mean Squared Error is also called squared error loss.MSE measures the average of the square of the "error." The error is the amount by which the estimator differs from the quantity to be estimated. 2. Signal to noise ratio Signal-to-noise ratio compares the level of a desired signal (such as Image) to the level of background noise. The higher the ratio, the less noticeable the background noise is. Signal to noise ratio (SNR) effectively measures the quality of the watermarked image as compared to the
  • 6. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012 68 original image. This difference is represented as an error function that shows how close the watermarked image is to the original image and it is written as: The larger the value of e (x, y) the greater is the distortion caused by the watermark and the attacks. Which represents the size of the error relative to the input signal, alternatively on the logarithmic scale, 3. Peak signal to noise ratio Peak signal-to-noise ratio, often abbreviated PSNR, is an engineering term for the ratio between the maximum possible power of a signal and the power of corrupting noise that affects the fidelity of its representation. Because many signals have a very wide dynamic range, PSNR is usually expressed in terms of the logarithmic decibel scale. The PSNR is most commonly used as a measure of quality of reconstructed image. Where Ipeakis the peak values of the input signal (usually 255 the maximum value of luminance level). We use peak signal to noise ratio to evaluate the quality of image after embedding the watermark. In general a processed image is acceptable to human eye if its PSNR is greater than 30 db and greater the PSNR greater the image quality. 4. Similarity Factor The similarity factor determines the similarity of pixel intensities between the original image and the watermarked image and also between the original watermark and the extracted watermark. An objective measure of similarity between the original image/watermark and the extracted watermark/watermarked image in the following way: The similarity factor is approximately nearer to 1 for better imperceptible image quality 5. Payload Capacity is an important property because it has a direct negative impact on watermark robustness. Higher capacity (the amount of information being embedded) causes lower watermark robustness. Capacity can be assessed by calculating the ratio of capacity to reliability. This can be done empirically by fixing one parameter (e.g. payload size) and determining the other parameter (e.g. error rate). Those results can then be used to estimate the theoretical maximum capacity of the watermarking system under consideration
  • 7. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012 69 6. Robustness Robustness property can be evaluated by applying various kinds of “normal” signal distortions and attacks that are relevant for the target application. The robustness can be assessed by measuring detection probability of the watermark after signal distortion. 7. Bit Correct Rate (CR) A quality estimation parameter to check the robustness of the extracted watermark, named the Correct Rate (CR) is computed as an index to the objective quality of the image. The bit correct ratio (BCR) is defined as the ratio of correct extracted bits to the total number of embedded bits and can be expresses using the formula The Bit correct rate should be equal to 1. 8. Execution Time Another tool for evaluation of algorithm is measurement of the amount of time required to embed a watermark into the original image, and then extract it afterwards.In our analysis, actual time in CPU cycles will be treated as a measure of execution time. This experiment is designed to determine the computational cost of each watermarking algorithm. Original Image 50 100 150 200 250 50 100 150 200 250 300 Binary BEP map Watermarked Image
  • 8. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012 70 Samples Without DF With DF PSNR SSIM PSNR SSIM 1 37.2 0.7 40.2 0.9 2 35.5 0.6 43.5 1 3 36.2 0.5 45.2 0.8 4 32.7 0.4 39.7 0.7 VI. Conclusion This paper present an orientation based watermarking scheme in wavelet domain. The visual artifacts due to embedding at edge regions are minimized by the application of directional filters in processing. The embedding approach for watermark embedding is developed based on normalized directional band density and embedded watermarking based on directional density for sub bands. By the proposed approach it is observed that the PSNR under various attacks are minimized. References [1] Langelaar, G.C., Setyawan, I., Lagendijik, R.I., 2000. Watermarking digital image and video data. IEEE signal Process. Magazine (September), 20-46. [2] A. G. Bors and I. Pitas., “ Image watermarking using DCT domain constraints”, Proc. of IEEE Int. Conf. on Image Processing, vol. 3, pp. 231-234 (1996) [3] R.G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital watermark”, Proc. of Int. Conf. in Image Processing, vol. 2, pp. 86-90, (1994). [4] J. Ohnishi and K. Matsui, “Embedding a seal into a picture under orthogonal wavelet transformation,” Proc. of Int. Conf. on Multimedia Comp. and Systems, pp. 514-521(1996-6). [5] D. Kunder and D. Hatzinakos, “ A robust digital image watermarking method using wavelet-based fusion”, Proc. of IEEE Int. Conf. on Acoustics, Speech and Sig. Proc., vol. 5, pp. 544-547 Seattle, Washington (1997-5). [6] D. Kunder and D. Hatzinakos.”Digital watermarking using multiresolution wavelet decomposition. In Proceedings of IEEE ICAPSSP ’98, volume 5, pages 2969 – 2972, Seattle, WA, USA, May 1998. [7] SanghyunJoo, YounghoSuh, Jaeho Shin, and Hisakazu Kikuchi, “A New Robust Watermarking Embedding into Wavelet DC Components”, ETRI Journal, Volume 24, No. 5, October 2002. 0 100 200 300 400 500 600 700 800 900 1000 32 34 36 38 40 42 44 46 48 50 52 Detector Response plot Detector Response Watermarks
  • 9. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012 71 [8] Yasuhiko Dote, and Muhammad ShafiqueShaikh “A Robust Watermarking Method for Copyright Prot. of Digital Images using Wavelet Trans.” Trans. of the Institute of Electrical Engineering of Japan, vol. 122, No.2, Jan. 2003. [9] T. T. Nguyen and S. Oraintara, “A multi-resolution directional filter bank for image applications,” in proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. III, pp. 37-40, 2004. [10] S. Park, M. J. T. Smith, and R. M. Mersereau, “Improved structures ofmaximally decimated directional filter banks for spatial image analysis,”IEEE Trans. Image Processing, vol. 13, no. 11, pp. 1424-1431, Nov.2004.