SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 02 Issue: 01 | Apr-2015 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET.NET- All Rights Reserved Page 377
Security Based Data Transfer and Privacy Storage through Watermark
Detection
Gowtham.T1 Pradeep Kumar.G2
1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India.
2Assistant Professor, Department of ECE, Nandha Engineering College, Anna University, Erode, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract—Digital watermarking has been proposed
as a technology to ensure copyright protection by
embedding an imperceptible, yet detectable signal in
visual multimedia content such as images or video. In
every field key aspect is the security—Privacy is a
critical issue when the data owners outsource data
storage or processing to a third party computing
service. Several attempts has been made for increasing
the security related works and avoidance of data loss.
Existing system had attain its solution up to its level
where it can be further able to attain the parameter
refinement. In this paper improvising factor been made
on the successive compressive sensing reconstruction
part and Peak Signal-to-Noise Ratio (PSNR).Another
consideration factor is to increase (CS) rate through de-
emphasize the effect of predictive variables that
become uncorrelated with the measurement data which
eliminates the need of (CS) reconstruction.
Keywords— Compressive sensing, Peak Signal To Noise
Ratio, secure computing service, privacy preserving.
1. INTRODUCTION
Rapid growth of the Internet and social networks, made
very easy for a user to collect a large amount of
multimedia data from different sources without knowing
the copyright information of those data. Data theft is the
major issue for data owners when their data been
outsourced in the public or private network. It increased
in the field of photography and defensive system. For this
as a greater result embedding process is carried out.
Embedding a hidden stream of bits in a file is called Digital
Watermarking. The file could be an image, audio, video or
text.
The specifications used for validating watermarking
system are: Robustness (Against intentional attacks or
unintentional ones such as compression), Imperceptibility,
Noise ratio and Capacity[3,6,10]. An effective digital
watermark should be perceptually invisible to prevent
obstruction of the original image.Digital watermark should
be statistically invisible to prevent detection from the
illegal users and it should also be robust to many image
manipulations, such as filtering,additive noise, and
compression.
Techniques have been proposed for a variety of
applications, including ownership protection,
authentication and access control. The cloud computing
technologies are growing, and it is more economical for
the data holders to shift data storage or signal processing
computations to the cloud instead of purchasing hardware
and software by themselves. Ideally the cloud will store
the data and perform signal processing or data-mining in
an encrypted domain in order to preserve the data
privacy[2,5]. Majorly two types of approaches are
determined for secure watermark detection: asymmetric
watermarking [2] and zero-knowledge watermark
detection [5,7,11].
Watermarked copy are publicly available for the usage
were the focus to be done only on the watermark pattern,
while the privacy of the target media on which watermark
detection is performed has received little attention.
Performing privacy preserving storage and secure
watermark detection can be done using the existing secure
watermark detection technologies such as zero-knowledge
proof protocols [5,7] that transform the multimedia data
to a public key encryption domain.
2. RELATED WORKS
[1] In this paper, author represents various types of
attacks in watermarking and solutions for qualifying the
watermarking method are described.
Pros and cons:
In this paper implementation of basic digital
watermarking methods in MATLAB , Fundamental
methods in spatial, spectral, and hybrid domains are
described. It also deals with various attack in
watermarking but its just a initial stage.
[2] In this paper author explains about data privacy in the
networks through Secure Multi-Party Computation (SMC)
allows parties with similar background to compute results
upon their private data, minimizing the threat of
disclosure.
Pros and cons:
This paper introduces encryption and decryption in
embedding watermark through the key access. Quite a few
protocols already exist where it has its way on TTP for
several layers network in order to ensure privacy.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 02 Issue: 01 | Apr-2015 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET.NET- All Rights Reserved Page 378
[3] In this paper, author presents a general framework for
robust nonlinear regression that leverages concepts from
the field of compressive sensing to simultaneously detect
outliers and determine optimally sparse representations
of noisy data from arbitrary sets of basis functions.
Pros and cons:
In this paper, author replaces usage of Least Square
(LS)regression which is not robust to violations. More
techniques were introduced robust compressive sensing
but all of the techniques does not have residual reduction
except few of them.
[4]In this paper author demonstrated that it is possible to
substantially decrease noise measurements(M) without
sacrificing robustness by leveraging more realistic signal
models that go beyond simple sparsity and compressibility
by including dependencies between values and locations
of the signal coefficients.
Pros and cons:
In this paper author have only considered the recovery
of signals from models that can be geometrically described
as a union of subspaces; and not for more complex
geometries (for example, high-dimensional polytopes,
nonlinear manifolds.)
[5] In this paper, author presented watermarking scheme
using Genetic Algorithm(GA).Genetic algorithms are a part
of evolutionary computing, which is a rapidly growing
area of artificial intelligence.Pros and cons:
In this paper GA has been applied to clusters of the
image instead of the complete image so the processing
speed is higher.This paper has poor response for data
hiding capacity, using Multiple Optimization GA.
3. PROCEDURAL FLOW OF THE SYSTEM
The proposed framework has several subtasks where
each has its specific operation, they are given below
 Watermark insertion and generation
 Embedding Process
 Watermark Extraction
 Decoding Process
3.1 Watermark insertion and generation
In the initial stage select the file which been going to
watermarked and also the data that to be embedded in it.
Later DWT of an image and the watermark pattern to be
calculated which resembles like picture matrix.
Watermark insertion involves watermark generation
and encoding process. Watermark Generation: Each owner
has a unique watermark or an owner can also put different
watermarks in different objects, the marking algorithm
incorporates the watermark into the object. The
verification algorithm authenticates the object
determining both the owner and the integrity of the object.
The watermark can be a logo picture, sometimes a binary
picture, sometimes a ternary picture; it can be a bit stream
or also an encrypted bit stream etc. The encryption may be
in the form of a hash function or encryption using a secret
key.
The watermark generation process varies with the
owner. In the encoding process both the original data and
the watermark data are passed through the encoding
function. The payload signal and the original host signal
now together occupy space, which was previously
occupied only by the host signal. For this purpose either
the original data is compressed or redundancy in digital
content is explored to make space for the payload.
3.2Embedding Process
It provides the action of mixer where it has various
algorithms for embedding process. These are commonly
divided into three categories (1)
 Watermarking in Spatial Domain
 Watermarking in Spectral Domain
 Watermarking in Hybrid Domain
There are several transforms that brings an image into
frequency domain. Among most common of those, we can
mention are: Discrete Cosines Transform (DCT) and Fast
Fourier Transform (FFT). In frequency domain,
coefficients are slightly modified. This will make some
unnoticeable changes in the whole image and makes it
more robust to attack compared to what we have in spatial
methods. Coefficients are modified according to the
stream bits of the message using to the equation
CAW = CA(1 +α⋅ (Wi) )
In which CAW is the watermarked coefficient, CA is the
original one, α represents watermarking strength (e.g.
0.3), and Wi is the corresponding bit of the message data.
Embedding can be done to obtain higher PSNR values
(higher fidelity) and higher NCC values (better robustness
to attacks)[10].
3.3 Watermark Extraction
Extraction is achieved in twosteps[1]. First the watermark
is extracted in the decoding process and then the
authenticity is established in the comparing process. After
the embedding process through key providence now the
extraction of the image takes place. Inverse action of
image scan been done and obtain IDCT of an image. The
decoding process can be itself performed in two different
ways. In one process the presence of the original
unwatermarked data is required and other where blind
decoding is possible. A decoder function takes the test
data (the test data can be a watermarked or un-
watermarked and possibly corrupted) whose ownership is
to be determined and recovers the payload.
3.4Data Admin(Holder)
DH (e.g., media agencies), when it collects a large volume
of multimedia data from the Internet and stores their
encrypted versions in the CLD, it wants to make sure those
multimedia can be edited and republished legally.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 02 Issue: 01 | Apr-2015 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET.NET- All Rights Reserved Page 379
3.5 Watermark Owner Module
Watermark owners (WOs) are also the content providers
who distribute their watermarked content (the watermark
embedding is performed by WO before the contents are
published). WOs always want to know if their contents are
legally used and republished.
4 Compressive Sensing
The compressive sensing theory asserts that when a signal
can be represented by small number of nonzero
coefficients, it can be perfectly recovered after being
transformed by a limited number of incoherent, non-
adaptive linear measurements. Most of the literature of
compressive sensing has focused on improving the speed
and accuracy of compressive sensing reconstruction take
some initial steps towards a more general framework
called compressive signal processing (CSP), which shows
fundamental signal processing problems such as detection,
classification, estimation, and filtering can be solved in the
compressive sensing domain.
Figure.1Architecture of the proposed framework
DCT of the image been obtained using the formula
FDCT





 





 
 



 2N
1)l(2n
cos
2N
1)k(2m
cosn)u(m,(l)(k)l)v(k,
1N
0m
1N
0n


where k, l  0, 1, ... N-1.
IDCT
u(m,n) (k) (l) v(k,l) cos
(2m 1)k
2N
cos
(2n 1)l
2Nl=0
N 1
k=0
N 1
   













  
 
where m, n  0, ... N-1
Figure.2(a)Original image; (b)Image in 8×8 DCT
domain; (c)DCT coefficient after CS transformation;
(d)Image reconstruction with the wrong CS matrix. (CS
rate 1.0 is chosen here, similar effects are observed
under other CS rates).
In existing system DCT coefficient of each piece of the
image will form a vector and be transformed to a CS
domain with the same CS rate but using different CS
matrices[11].
For privacy preserving storage, since the DCT
coefficients are not perfectly sparse, the CS
reconstruction will introduce distortion to there
constructed image, especially when CS rate is low. In
order to have a good quality image after the CS
reconstruction, the CS rate needs to be high. In the
existing system experimental result shows that the
PSNR(Peak Signal-to-Noise Ratio) is around 65 after
the CS transformation/reconstruction process when
the CS rate is 0.8. Even when the CS rate is set to 1.0,
the CS reconstruction algorithm (Orthogonal Matching
Pursuit) still introduces distortion as we can see the
PSNR is around 45. However, it should be noted that
when the CS rate equals1.0,theoriginal DCT coefficient
can be recovered perfectly given the inverse of the CS
matrix, in which case CS reconstruction is not
necessary.
Figure.3CS reconstruction distortion when AC
coefficients are transformed to the CS domain.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 02 Issue: 01 | Apr-2015 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET.NET- All Rights Reserved Page 380
Figure. 4Calculation of PSNR and MSE value through
simulation
5.EXPERIMENTAL RESULTS
PARAMETERS VALUES
Protocol
Multi Party Computation(MPC)
Algorithm DWT
Image Size 1024 x 1024
Character Length Upto 100
Key Public or Private
TABLE 1:Simulation Parameters
In proposing system instead of using DCT we would like to
develop system with the usage of DWT for the image
coefficients were it been segregated into various image
blocks.
Figure. 5Energy segments of the processed image
Figure. 6a).Original image b).Secret image c).Gray scale of
original image d.)Bit plane slicing of secret image
In the above image work been carried out with DWT
process through spatial domain and frequency domain.
Fig(6.b)shows the gray scale of the original image in that
color of the image been transformed to gray value and
Fig(6.d)shows the bit plane slicing of secret image.(In this
figure shown is 6-bit plane slicing).
Figure. 7a).DWT of original image(3 bit plane) b).DWT of secret
image(3 bit plane) c).Watermarked image d).Extracted
watermark image
6.CONCLUSION
The main aim of the project is to improve the security of
the data where user prefers to obtain it. Further analysis
being carried out to increase CS rate through DWT
process. Increase in CS rate reduces the reconstruction of
the image where image would be recovered perfectly with
the image coefficients.
In this paper considering existing system parameters as
the guideline, work been takes place for improving the
HH
(High
High)
LH
(Low
High)
HL
( High
Low)
LL
(Low
Low)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 02 Issue: 01 | Apr-2015 www.irjet.net p-ISSN: 2395-0072
© 2015, IRJET.NET- All Rights Reserved Page 381
performance of the system with the available methods and
algorithms.
ACKNOWLEDGEMENT
The authors would like to thank the anonymous reviewers
for their constructive comments that greatly improved the
quality of this paper.
REFERENCES
1. “Digital Watermarking Using MATLAB” ,Pooya
Monshizadeh Naini University of Tehran, Iran,2009.
2. “A Secure Multi-Party Computation Protocol for
Malicious Computation Prevention for preserving
privacy during Data Mining”,Dr. Durgesh Kumar
Mishra,International Journal of Computer Science and
Information Security, Vol. 3, 2009
3. “A General Framework for Robust Compressive
Sensing Based Nonlinear Regression”,Brian Moore,
Manhattan, Kansas 66506, USA,2009.
4. “Model-Based Compressive Sensing”,Richard G.
Baraniuk,Rice university,2009.
5. “Secure Multiparty Computation and Secret Sharing
An Information Theoretic Approach”,Ronald
Cramer,May 11, 2013.
6. “Study and Implementation of Watermarking
Algorithms”,Alekhika Mohanty,Rourkela, India .April
2006.
7. “Watermark Detection Schemes with High Security”
,Liu Yongliang,Institute of Computing Technology,
China,(ITCC’05).
8. “Steganography And Digital Watermarking”, Jonathan
Cummins, The University of Birmingham,2004.
9. “Digital Watermark Detection in Visual Multimedia
Content”,Peter Meerwald, University of
Salzburg,2010.
10. ”Practical challenges for digital watermarking
applications”, Ravi.K.Sharma,USA,2002.
11. “A Compressive Sensing based Secure Watermark
Detection and Privacy Preserving Storage
Framework”, Qia Wang, Wenjun Zeng,ieee
transactions on image processing, vol. 23, no. 3,
march 2014.

More Related Content

What's hot

A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
sipij
 

What's hot (18)

Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
Steganography
Steganography Steganography
Steganography
 
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELAN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast Enhancement
 
1674 1677
1674 16771674 1677
1674 1677
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
Ja2415771582
Ja2415771582Ja2415771582
Ja2415771582
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
 
Ha3312361238
Ha3312361238Ha3312361238
Ha3312361238
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks using
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
 

Viewers also liked

IRJET-Study of Strength Parameter of Concrete by Replacing Cement by Flyash ...
IRJET-Study of Strength Parameter of Concrete by Replacing Cement by Flyash  ...IRJET-Study of Strength Parameter of Concrete by Replacing Cement by Flyash  ...
IRJET-Study of Strength Parameter of Concrete by Replacing Cement by Flyash ...
IRJET Journal
 
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET Journal
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET Journal
 
IRJET-Towards Conservation of World Famous Dal Lake – A Need of Hour
IRJET-Towards Conservation of World Famous Dal Lake – A Need of HourIRJET-Towards Conservation of World Famous Dal Lake – A Need of Hour
IRJET-Towards Conservation of World Famous Dal Lake – A Need of Hour
IRJET Journal
 
IRJET-A System for Recognition of Indian Sign Language for Deaf People using ...
IRJET-A System for Recognition of Indian Sign Language for Deaf People using ...IRJET-A System for Recognition of Indian Sign Language for Deaf People using ...
IRJET-A System for Recognition of Indian Sign Language for Deaf People using ...
IRJET Journal
 
IRJET-Experimental Investigation of Natural Fiber Reinforced Concrete in Cons...
IRJET-Experimental Investigation of Natural Fiber Reinforced Concrete in Cons...IRJET-Experimental Investigation of Natural Fiber Reinforced Concrete in Cons...
IRJET-Experimental Investigation of Natural Fiber Reinforced Concrete in Cons...
IRJET Journal
 
IRJET-Review on Power Quality Enhancement in weak Power Grids by Integration ...
IRJET-Review on Power Quality Enhancement in weak Power Grids by Integration ...IRJET-Review on Power Quality Enhancement in weak Power Grids by Integration ...
IRJET-Review on Power Quality Enhancement in weak Power Grids by Integration ...
IRJET Journal
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
IRJET Journal
 
IRJET-Arduino based Voice Controlled Robot
IRJET-Arduino based Voice Controlled RobotIRJET-Arduino based Voice Controlled Robot
IRJET-Arduino based Voice Controlled Robot
IRJET Journal
 
IRJET-Experimental Study on the Behavior of R.C.Beams and Columns with Treat...
IRJET-Experimental Study on the Behavior of R.C.Beams and Columns with  Treat...IRJET-Experimental Study on the Behavior of R.C.Beams and Columns with  Treat...
IRJET-Experimental Study on the Behavior of R.C.Beams and Columns with Treat...
IRJET Journal
 

Viewers also liked (14)

IRJET-Study of Strength Parameter of Concrete by Replacing Cement by Flyash ...
IRJET-Study of Strength Parameter of Concrete by Replacing Cement by Flyash  ...IRJET-Study of Strength Parameter of Concrete by Replacing Cement by Flyash  ...
IRJET-Study of Strength Parameter of Concrete by Replacing Cement by Flyash ...
 
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
 
IRJET-Towards Conservation of World Famous Dal Lake – A Need of Hour
IRJET-Towards Conservation of World Famous Dal Lake – A Need of HourIRJET-Towards Conservation of World Famous Dal Lake – A Need of Hour
IRJET-Towards Conservation of World Famous Dal Lake – A Need of Hour
 
IRJET-A System for Recognition of Indian Sign Language for Deaf People using ...
IRJET-A System for Recognition of Indian Sign Language for Deaf People using ...IRJET-A System for Recognition of Indian Sign Language for Deaf People using ...
IRJET-A System for Recognition of Indian Sign Language for Deaf People using ...
 
IRJET-Management of power factor and harmonic
IRJET-Management of power factor and harmonicIRJET-Management of power factor and harmonic
IRJET-Management of power factor and harmonic
 
IRJET-Experimental Investigation of Natural Fiber Reinforced Concrete in Cons...
IRJET-Experimental Investigation of Natural Fiber Reinforced Concrete in Cons...IRJET-Experimental Investigation of Natural Fiber Reinforced Concrete in Cons...
IRJET-Experimental Investigation of Natural Fiber Reinforced Concrete in Cons...
 
IRJET-A study of video watermarking techniques based on energy model
IRJET-A study of video watermarking techniques based on energy modelIRJET-A study of video watermarking techniques based on energy model
IRJET-A study of video watermarking techniques based on energy model
 
IRJET-Review on Power Quality Enhancement in weak Power Grids by Integration ...
IRJET-Review on Power Quality Enhancement in weak Power Grids by Integration ...IRJET-Review on Power Quality Enhancement in weak Power Grids by Integration ...
IRJET-Review on Power Quality Enhancement in weak Power Grids by Integration ...
 
IRJET-Concurrency Control Model for Distributed Database
IRJET-Concurrency Control Model for Distributed DatabaseIRJET-Concurrency Control Model for Distributed Database
IRJET-Concurrency Control Model for Distributed Database
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
 
IRJET-Arduino based Voice Controlled Robot
IRJET-Arduino based Voice Controlled RobotIRJET-Arduino based Voice Controlled Robot
IRJET-Arduino based Voice Controlled Robot
 
IRJET-Experimental Study on the Behavior of R.C.Beams and Columns with Treat...
IRJET-Experimental Study on the Behavior of R.C.Beams and Columns with  Treat...IRJET-Experimental Study on the Behavior of R.C.Beams and Columns with  Treat...
IRJET-Experimental Study on the Behavior of R.C.Beams and Columns with Treat...
 

Similar to IRJET-Security Based Data Transfer and Privacy Storage through Watermark Detection

A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
prjpublications
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
Iaetsd Iaetsd
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarking
ijsrd.com
 

Similar to IRJET-Security Based Data Transfer and Privacy Storage through Watermark Detection (20)

Digital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingDigital Image Security using Digital Watermarking
Digital Image Security using Digital Watermarking
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
 
Comparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingComparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for Watermarking
 
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
 
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
 
IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...
IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...
IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...
 
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud Computing
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarking
 
50120140506015
5012014050601550120140506015
50120140506015
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET-  	  A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...IRJET-  	  A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
 
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
Kamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
AbrahamGadissa
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 

Recently uploaded (20)

fluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answerfluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answer
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
 
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES  INTRODUCTION UNIT-IENERGY STORAGE DEVICES  INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
 
shape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptxshape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptx
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 

IRJET-Security Based Data Transfer and Privacy Storage through Watermark Detection

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 02 Issue: 01 | Apr-2015 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET.NET- All Rights Reserved Page 377 Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T1 Pradeep Kumar.G2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant Professor, Department of ECE, Nandha Engineering College, Anna University, Erode, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract—Digital watermarking has been proposed as a technology to ensure copyright protection by embedding an imperceptible, yet detectable signal in visual multimedia content such as images or video. In every field key aspect is the security—Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service. Several attempts has been made for increasing the security related works and avoidance of data loss. Existing system had attain its solution up to its level where it can be further able to attain the parameter refinement. In this paper improvising factor been made on the successive compressive sensing reconstruction part and Peak Signal-to-Noise Ratio (PSNR).Another consideration factor is to increase (CS) rate through de- emphasize the effect of predictive variables that become uncorrelated with the measurement data which eliminates the need of (CS) reconstruction. Keywords— Compressive sensing, Peak Signal To Noise Ratio, secure computing service, privacy preserving. 1. INTRODUCTION Rapid growth of the Internet and social networks, made very easy for a user to collect a large amount of multimedia data from different sources without knowing the copyright information of those data. Data theft is the major issue for data owners when their data been outsourced in the public or private network. It increased in the field of photography and defensive system. For this as a greater result embedding process is carried out. Embedding a hidden stream of bits in a file is called Digital Watermarking. The file could be an image, audio, video or text. The specifications used for validating watermarking system are: Robustness (Against intentional attacks or unintentional ones such as compression), Imperceptibility, Noise ratio and Capacity[3,6,10]. An effective digital watermark should be perceptually invisible to prevent obstruction of the original image.Digital watermark should be statistically invisible to prevent detection from the illegal users and it should also be robust to many image manipulations, such as filtering,additive noise, and compression. Techniques have been proposed for a variety of applications, including ownership protection, authentication and access control. The cloud computing technologies are growing, and it is more economical for the data holders to shift data storage or signal processing computations to the cloud instead of purchasing hardware and software by themselves. Ideally the cloud will store the data and perform signal processing or data-mining in an encrypted domain in order to preserve the data privacy[2,5]. Majorly two types of approaches are determined for secure watermark detection: asymmetric watermarking [2] and zero-knowledge watermark detection [5,7,11]. Watermarked copy are publicly available for the usage were the focus to be done only on the watermark pattern, while the privacy of the target media on which watermark detection is performed has received little attention. Performing privacy preserving storage and secure watermark detection can be done using the existing secure watermark detection technologies such as zero-knowledge proof protocols [5,7] that transform the multimedia data to a public key encryption domain. 2. RELATED WORKS [1] In this paper, author represents various types of attacks in watermarking and solutions for qualifying the watermarking method are described. Pros and cons: In this paper implementation of basic digital watermarking methods in MATLAB , Fundamental methods in spatial, spectral, and hybrid domains are described. It also deals with various attack in watermarking but its just a initial stage. [2] In this paper author explains about data privacy in the networks through Secure Multi-Party Computation (SMC) allows parties with similar background to compute results upon their private data, minimizing the threat of disclosure. Pros and cons: This paper introduces encryption and decryption in embedding watermark through the key access. Quite a few protocols already exist where it has its way on TTP for several layers network in order to ensure privacy.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 02 Issue: 01 | Apr-2015 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET.NET- All Rights Reserved Page 378 [3] In this paper, author presents a general framework for robust nonlinear regression that leverages concepts from the field of compressive sensing to simultaneously detect outliers and determine optimally sparse representations of noisy data from arbitrary sets of basis functions. Pros and cons: In this paper, author replaces usage of Least Square (LS)regression which is not robust to violations. More techniques were introduced robust compressive sensing but all of the techniques does not have residual reduction except few of them. [4]In this paper author demonstrated that it is possible to substantially decrease noise measurements(M) without sacrificing robustness by leveraging more realistic signal models that go beyond simple sparsity and compressibility by including dependencies between values and locations of the signal coefficients. Pros and cons: In this paper author have only considered the recovery of signals from models that can be geometrically described as a union of subspaces; and not for more complex geometries (for example, high-dimensional polytopes, nonlinear manifolds.) [5] In this paper, author presented watermarking scheme using Genetic Algorithm(GA).Genetic algorithms are a part of evolutionary computing, which is a rapidly growing area of artificial intelligence.Pros and cons: In this paper GA has been applied to clusters of the image instead of the complete image so the processing speed is higher.This paper has poor response for data hiding capacity, using Multiple Optimization GA. 3. PROCEDURAL FLOW OF THE SYSTEM The proposed framework has several subtasks where each has its specific operation, they are given below  Watermark insertion and generation  Embedding Process  Watermark Extraction  Decoding Process 3.1 Watermark insertion and generation In the initial stage select the file which been going to watermarked and also the data that to be embedded in it. Later DWT of an image and the watermark pattern to be calculated which resembles like picture matrix. Watermark insertion involves watermark generation and encoding process. Watermark Generation: Each owner has a unique watermark or an owner can also put different watermarks in different objects, the marking algorithm incorporates the watermark into the object. The verification algorithm authenticates the object determining both the owner and the integrity of the object. The watermark can be a logo picture, sometimes a binary picture, sometimes a ternary picture; it can be a bit stream or also an encrypted bit stream etc. The encryption may be in the form of a hash function or encryption using a secret key. The watermark generation process varies with the owner. In the encoding process both the original data and the watermark data are passed through the encoding function. The payload signal and the original host signal now together occupy space, which was previously occupied only by the host signal. For this purpose either the original data is compressed or redundancy in digital content is explored to make space for the payload. 3.2Embedding Process It provides the action of mixer where it has various algorithms for embedding process. These are commonly divided into three categories (1)  Watermarking in Spatial Domain  Watermarking in Spectral Domain  Watermarking in Hybrid Domain There are several transforms that brings an image into frequency domain. Among most common of those, we can mention are: Discrete Cosines Transform (DCT) and Fast Fourier Transform (FFT). In frequency domain, coefficients are slightly modified. This will make some unnoticeable changes in the whole image and makes it more robust to attack compared to what we have in spatial methods. Coefficients are modified according to the stream bits of the message using to the equation CAW = CA(1 +α⋅ (Wi) ) In which CAW is the watermarked coefficient, CA is the original one, α represents watermarking strength (e.g. 0.3), and Wi is the corresponding bit of the message data. Embedding can be done to obtain higher PSNR values (higher fidelity) and higher NCC values (better robustness to attacks)[10]. 3.3 Watermark Extraction Extraction is achieved in twosteps[1]. First the watermark is extracted in the decoding process and then the authenticity is established in the comparing process. After the embedding process through key providence now the extraction of the image takes place. Inverse action of image scan been done and obtain IDCT of an image. The decoding process can be itself performed in two different ways. In one process the presence of the original unwatermarked data is required and other where blind decoding is possible. A decoder function takes the test data (the test data can be a watermarked or un- watermarked and possibly corrupted) whose ownership is to be determined and recovers the payload. 3.4Data Admin(Holder) DH (e.g., media agencies), when it collects a large volume of multimedia data from the Internet and stores their encrypted versions in the CLD, it wants to make sure those multimedia can be edited and republished legally.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 02 Issue: 01 | Apr-2015 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET.NET- All Rights Reserved Page 379 3.5 Watermark Owner Module Watermark owners (WOs) are also the content providers who distribute their watermarked content (the watermark embedding is performed by WO before the contents are published). WOs always want to know if their contents are legally used and republished. 4 Compressive Sensing The compressive sensing theory asserts that when a signal can be represented by small number of nonzero coefficients, it can be perfectly recovered after being transformed by a limited number of incoherent, non- adaptive linear measurements. Most of the literature of compressive sensing has focused on improving the speed and accuracy of compressive sensing reconstruction take some initial steps towards a more general framework called compressive signal processing (CSP), which shows fundamental signal processing problems such as detection, classification, estimation, and filtering can be solved in the compressive sensing domain. Figure.1Architecture of the proposed framework DCT of the image been obtained using the formula FDCT                     2N 1)l(2n cos 2N 1)k(2m cosn)u(m,(l)(k)l)v(k, 1N 0m 1N 0n   where k, l  0, 1, ... N-1. IDCT u(m,n) (k) (l) v(k,l) cos (2m 1)k 2N cos (2n 1)l 2Nl=0 N 1 k=0 N 1                       where m, n  0, ... N-1 Figure.2(a)Original image; (b)Image in 8×8 DCT domain; (c)DCT coefficient after CS transformation; (d)Image reconstruction with the wrong CS matrix. (CS rate 1.0 is chosen here, similar effects are observed under other CS rates). In existing system DCT coefficient of each piece of the image will form a vector and be transformed to a CS domain with the same CS rate but using different CS matrices[11]. For privacy preserving storage, since the DCT coefficients are not perfectly sparse, the CS reconstruction will introduce distortion to there constructed image, especially when CS rate is low. In order to have a good quality image after the CS reconstruction, the CS rate needs to be high. In the existing system experimental result shows that the PSNR(Peak Signal-to-Noise Ratio) is around 65 after the CS transformation/reconstruction process when the CS rate is 0.8. Even when the CS rate is set to 1.0, the CS reconstruction algorithm (Orthogonal Matching Pursuit) still introduces distortion as we can see the PSNR is around 45. However, it should be noted that when the CS rate equals1.0,theoriginal DCT coefficient can be recovered perfectly given the inverse of the CS matrix, in which case CS reconstruction is not necessary. Figure.3CS reconstruction distortion when AC coefficients are transformed to the CS domain.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 02 Issue: 01 | Apr-2015 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET.NET- All Rights Reserved Page 380 Figure. 4Calculation of PSNR and MSE value through simulation 5.EXPERIMENTAL RESULTS PARAMETERS VALUES Protocol Multi Party Computation(MPC) Algorithm DWT Image Size 1024 x 1024 Character Length Upto 100 Key Public or Private TABLE 1:Simulation Parameters In proposing system instead of using DCT we would like to develop system with the usage of DWT for the image coefficients were it been segregated into various image blocks. Figure. 5Energy segments of the processed image Figure. 6a).Original image b).Secret image c).Gray scale of original image d.)Bit plane slicing of secret image In the above image work been carried out with DWT process through spatial domain and frequency domain. Fig(6.b)shows the gray scale of the original image in that color of the image been transformed to gray value and Fig(6.d)shows the bit plane slicing of secret image.(In this figure shown is 6-bit plane slicing). Figure. 7a).DWT of original image(3 bit plane) b).DWT of secret image(3 bit plane) c).Watermarked image d).Extracted watermark image 6.CONCLUSION The main aim of the project is to improve the security of the data where user prefers to obtain it. Further analysis being carried out to increase CS rate through DWT process. Increase in CS rate reduces the reconstruction of the image where image would be recovered perfectly with the image coefficients. In this paper considering existing system parameters as the guideline, work been takes place for improving the HH (High High) LH (Low High) HL ( High Low) LL (Low Low)
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 02 Issue: 01 | Apr-2015 www.irjet.net p-ISSN: 2395-0072 © 2015, IRJET.NET- All Rights Reserved Page 381 performance of the system with the available methods and algorithms. ACKNOWLEDGEMENT The authors would like to thank the anonymous reviewers for their constructive comments that greatly improved the quality of this paper. REFERENCES 1. “Digital Watermarking Using MATLAB” ,Pooya Monshizadeh Naini University of Tehran, Iran,2009. 2. “A Secure Multi-Party Computation Protocol for Malicious Computation Prevention for preserving privacy during Data Mining”,Dr. Durgesh Kumar Mishra,International Journal of Computer Science and Information Security, Vol. 3, 2009 3. “A General Framework for Robust Compressive Sensing Based Nonlinear Regression”,Brian Moore, Manhattan, Kansas 66506, USA,2009. 4. “Model-Based Compressive Sensing”,Richard G. Baraniuk,Rice university,2009. 5. “Secure Multiparty Computation and Secret Sharing An Information Theoretic Approach”,Ronald Cramer,May 11, 2013. 6. “Study and Implementation of Watermarking Algorithms”,Alekhika Mohanty,Rourkela, India .April 2006. 7. “Watermark Detection Schemes with High Security” ,Liu Yongliang,Institute of Computing Technology, China,(ITCC’05). 8. “Steganography And Digital Watermarking”, Jonathan Cummins, The University of Birmingham,2004. 9. “Digital Watermark Detection in Visual Multimedia Content”,Peter Meerwald, University of Salzburg,2010. 10. ”Practical challenges for digital watermarking applications”, Ravi.K.Sharma,USA,2002. 11. “A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework”, Qia Wang, Wenjun Zeng,ieee transactions on image processing, vol. 23, no. 3, march 2014.