SlideShare a Scribd company logo
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1 Issue 1 (March 2014)
____________________________________________________________________________________________________
ISSN: 2278-2311 IJIRAE | http://ijirae.com
© 2014, IJIRAE – All Rights Reserved Page - 68
PERFORMANCE EVALUATION OF SPATIAL AND
FRACTAL WATERMARKING ALGORITHM
R.Ganesh, Dr.S.Thabasukannan
Research Scholar/CS Principal, Pannai College of Engg & Tech,
N.M.S.S.VN College, Madurai-19 Sivagangai – 630 561, Tamilnadu, India
mrganesh76@gmail.com thabasukannan@gmail.com
ABSTRACT--Recent days watermarking plays a vital role in most of the industries for security purpose. In this paper, we
compare both spatial and fractal Watermarking algorithms. We have been improving the resistance in data compression.
The composition of all these transformations has the image as its fixed point. Starting with any image hence to apply the
composition of the transformations repeatedly and get an approximation of the original image.
1. INTRODUCTION
Digital watermarking is a method of embedding information in an image in such a manner that it cannot be removed. This
watermark can be used for ownership protection, copy control and authentication. A digital watermark is a secret message
that is embedded into a “cover message”. Only the knowledge of a secret key allows us to extract the watermark from the
cover message. A digital watermark can be visible or invisible. A digital watermarking is a method that uses a secret key to
select the locations where a watermark is embedded.
II. TYPES OF WATERMARKS
 Visible watermarks are designed to be easily perceived by the viewer, and clearly identify the owner; the
watermark must not detract from the image content itself.
 Fragile watermarks are designed to be distorted or "broken" under the slightest changes to the image. Semi-
fragile watermarks are designed to break under all changes that exceed a user-specified threshold. Robust
watermarks withstand moderate to severe signal processing attacks on an image.
 Spatial watermarks are constructed in the image spatial domain, and embedded directly into an image's pixel
data. Spectral (or transform-based) watermarks are incorporated into an image's transform coefficients. The
spatial domain techniques directly modify the intensities or color values of some selected pixels.
A. SPATIAL WATERMARKINGS
In the Spatial Domain algorithm, there is no costly transforms have to be computed for watermark embedding. There are
three algorithms belongs to the category of spatial watermarking we have taken for our study. They are Kutter algorithm,
Bruyndonckx Algorithm and Langelaar Algorithm. We have taken three algorithms in the category of fractal watermarking.
They are bas algorithm, Puate Algorithm and Davern.
A. KUTTER ALGORITHM
Here, the host image is not needed for extracting the watermark. The Watermark used here is a string of bits. Two leading
bits are added to the mark: 0 and 1 bit. These two bits form a mini-template that will be used in the extraction process. It
manipulates the values of the blue channel at single pixels. The pixels are visited in a zig-zag path to get a sequence.
Random site selection is used, but no qualitative site selection is done.
Fig 1 Watermark created by kutter
In the above figure, the strength of the watermark is dependent on the luminance of the host image.
B. BRUYNDONCKX ALGORITHM
The host image is not needed for extracting the watermark. It used a string of bits. It manipulates the luminance of zones of
pixies in pixel blocks of size n x m. To embed a bit into a certain block three steps are needed. They are
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1 Issue 1 (March 2014)
____________________________________________________________________________________________________
ISSN: 2278-2311 IJIRAE | http://ijirae.com
© 2014, IJIRAE – All Rights Reserved Page - 69
 Classification: The pixels in the block are to be divided into two zones of homogeneous luminance. The two
blocks are a) blocks with hard or progressive contrast and b) blocks with noise contrast.
 Subdivision: Grids are applied to the block to divide the pixels into categories. A different grid is used for
pixels in zone one and two. The grids have to remain secret, and are changed with every block.
 Manipulation: To divide the pixels in the block into 5 sets: some pixels have been discarded, the rest are either
in zone one or two, and either in category A or B. The pixels in zone one is less luminous than those in zone
two.
Fig 2 Watermark created by bruyndonckx
C. LANGELAAR ALGORITHM
In this algorithm, the host image is not needed for extracting the watermark. The Watermark used is a string of bits. This
algorithm manipulates the luminance of pixels in 8 x 8 blocks. Random site selection is used, but no qualitative site
selection is done.
Fig 3 Watermark created by Langelaar
B. FRACTAL DOMAIN ALGORITHMS
This type of algorithm is to determine a set of contractive transformation to approximate each block of the image with a
larger block. The composition of all the transformations has the image as its fixed point. Starting with any image hence to
apply the composition of the transformations repeatedly and get an approximation of the original image.
A. BAS ALGORITHM
Ideas from fractal coding are used in this algorithm, but it also be classified as a spatial domain algorithm. It also mentions a
wavelet domain method of embedding. To detect the host image is not needed to detect the watermark. The image is
manipulated to contain certain self-similarities. Using this algorithm several points-of-interest are selected. Each points
defines a 4 x 4 block centered around the point and 16 4 x 4 blocks, which form the domain pool. To embed the watermark,
for every point-of-interest the domain block with the same relative position to the point-of-interest is modified to be more
similar to the range block than any other domain block.
Fig 4 Blocks defined by the Points-of-Interest.
The number of matching blocks found is a measure of the probability that the watermark is in the image.
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1 Issue 1 (March 2014)
____________________________________________________________________________________________________
ISSN: 2278-2311 IJIRAE | http://ijirae.com
© 2014, IJIRAE – All Rights Reserved Page - 70
B. PUATE ALGORITHM
It is described as a steganographic algorithm. Here the watermark is encoded in the image format rather than the image data.
The host image is not needed to retrieve the watermark. If the image is converted to a different format (e.g. JPEG), the
watermark cannot be retrieved. The watermark is a string of bits. A bit is embedded in the choice of transformation for a
range block. The number of range blocks is an upper bound for the number of bits that can be embedded. The blocks are
selected in pseudo random order, the knowledge about this sequence forms a secret key.
Fig 5 Dividing the domain pool
To embed the watermark, the domain pool D is divided into two sets D0 and D1. To embed a bit into a selected range block
ri, a matching domain block is found in D0 to embed a 0-bit, in D1 to embed a 1-bit. By effectively shrinking the available
domain pool to get less optimal matches, which results in a loss of image quality.
C. DAVERN ALGORITHM
Here, there is no data to show whether the algorithm is robust against attacks. The host image is not needed to retrieve the
watermark. The watermark is a string of bits. The user manually selects two non-overlapping square regions of the image
which will be called domain region and range region. The exact position of these regions will constitute part of the secret
key needed to retrieve the watermark. Blocks in the range region are modified to embed a bit. These blocks may be of size 4
x 4, 8 x 8 or 16 x 16. The number of such blocks is an upper bound for the length of the watermark. The blocks are
selected in pseudo random order, this forms the second part of the secret key.
EXPERIMENTAL RESULTS
BRUYN ALGORITHM
The original curve After deleting the co-ordinate (45,0.99)
After deleting the co-ordinate (33,0.77) After extending the co-ordinate (60,0.6)
Fig 6 Bruyn watermarking algorithm
Bruyn watermarking algorithm
0.6
0.65
0.7
0.75
0.8
0.85
0.9
0.95
1
1.05
20 25 30 35 40 45 50 55 60 65
PSNR caused by watermark embedding
Correlationbetween
originalwatermark
Bruyn watermarking algorithm
0.6
0.65
0.7
0.75
0.8
0.85
0.9
0.95
1
1.05
20 25 30 35 40 45 50 55 60 65
PSNR caused by watermark embedding
Correlationbetweenoriginalwatermark
Bruyn watermarking algorithm
0.6
0.65
0.7
0.75
0.8
0.85
0.9
0.95
1
1.05
20 25 30 35 40 45 50 55 60 65
PSNR caused by watermark embedding
Correlationbetween
originalwatermark
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1 Issue 1 (March 2014)
____________________________________________________________________________________________________
ISSN: 2278-2311 IJIRAE | http://ijirae.com
© 2014, IJIRAE – All Rights Reserved Page - 71
In this algorithm, the original curve started in the lower left corner of the graph. It is clearly understood that from the 6th
co-
ordinate position, the curve started its peak at right angled style i.e 90o
position. The feature of the curve is slightly to a
vertical curve because the edges drawn in the straight lines without any bends. Hence the curve view is not like a smooth
normal distribution, because the tip portion is very sharp in the curve (45,0.99). To reduce the noise by making smoothening
the curve, First to delete the 7th
co-ordinate position i.e (45,0.99). Second to delete the 3rd
Coordinate position i.e (33, 0.77).
Then to extend the last coordinate to meet in the X axis. Now the Curve makes smoother and its resemblance looks like a
parabolic curve. In this stage the number of coordinates are Eight. The number of process finished for transformation
process is three. So it does not exceed the threshold value ά. It forms a smooth normal distribution curve within the
boundaries and within the three steps.
A. LANGELAAR ALGORITHM
In this algorithm, the original curve started from the upper left corner of the graph. It is clearly understood that the original
curve looks like the ½ of the normal distribution curve. First to delete the 5th
co-ordinate position i.e (46.5, 0.95). Now the
transformation process needs one Y-axis reflection i.e 1800
rotation, and the change in position of an object that has been
reflected about the line x = 0. If needed we can extend the two edge coordinate positions for getting smoother. Now the
Curve makes smoother and its resemblance looks like a parabolic curve. In this stage the number of coordinates are nine.
The number of process finished for transformation process is four. So it does not exceed the threshold value ά. It forms a
smooth normal distribution curve within the boundaries and within the three steps.
The original curve After deleting the co-ordinate (46.5,0.95)
After extending the co-ord (50,0.6) After reflecting the curve from right side to left side
using 180 degree rotation
After 6.5 value of the x-axis translation of the curve
L a n g e la a r w a te rm a rk in g a lg o rith m
0 . 6
0 .6 5
0 . 7
0 .7 5
0 . 8
0 .8 5
0 . 9
0 .9 5
1
1 .0 5
2 0 2 5 3 0 3 5 4 0 4 5 5 0 5 5 6 0 6 5
P S N R c a u s e d b y w a te rm a rk e m b e d d in g
Correlationbetweenoriginal
watermark
La n ge laa r w a term a rk ing
a lg orith m
0 .6
0 .6 5
0 .7
0 .7 5
0 .8
0 .8 5
0 .9
0 .9 5
1
1 .0 5
2 0 2 5 3 0 3 5 4 0 4 5 5 0 5 5 6 0 6 5
P S N R c a us e d b y w a te rm a rk
e m b e d d in g
Correlationbetween
originalwatermark
Langelaar watermarking
algorithm
0.6
0.65
0.7
0.75
0.8
0.85
0.9
0.95
1
1.05
20 25 30 35 40 45 50 55 60 65
PSNR caused by watermark
embedding
Correlation
between
original
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1 Issue 1 (March 2014)
____________________________________________________________________________________________________
ISSN: 2278-2311 IJIRAE | http://ijirae.com
© 2014, IJIRAE – All Rights Reserved Page - 72
COMPARISON BETWEEN BRUYN AND LANGELAAR
The Bruyn algorithm, the curves started from the lower left corner of the graph. But, in the Langelaar algorithm the curve
starts from the upper left corner of the graph. Here all the three curves are with in the fixed threshold value (ά). Using the
Bruyn algorithm, it is formed a smooth normal distribution curve within the boundaries. Its reliability supportive ratio is
40%. So it is highly accepted. Next to Bruyn algorithm, the Langelaar algorithm its performance is better.
Figure 8 Before modification of Bruyn and Figure 9. After modification of Bruyn
Langelaar watermarking algorithm & Langelaar watermarking algorithm
CONCLUSION
In this paper it is clearly understood that noise is unwanted thing for both text and images. This paper clearly identifies that
comparatively the effective and efficient watermarking algorithm. The result displays that Bruyn watermarking algorithm is
better than any other algorithm compared with Langelaar watermarking algorithm. As compared the Bruyn watermarking
algorithm and Kutter watermarking algorithm, the former its efficiency is better for some cases and the latter its
effectiveness is better for some cases. The main factor which influences to get the efficiency is “environment”.
REFERENCES
1) R.C.Gonzalez and R.E.Woods, "Digital Image Processing", Addison-Wesley Publishing company, Inc., 2008.
2) B.Pfitzmann, "Information Hiding Terminology", Proc. of First Int. Workshop on Information Hiding, Cambridge,
UK, May30-June1, 2009, Lecture notes in Computer Science, Vol.1174, Ross Anderson(Ed.), pp.347-350.
3) F.A.P.Petitcolas, et al., "Information Hiding - A Survey", Proceedings of the IEEE, Vol.87, No.7, July 1999, pp.1062-
1078.
4) Hal Berghel, "Watermarking Cyberspace", Communications of the ACM, Nov.2009, Vol.40, No.11, pp.19-24.
5) F. Mintzer, et.al., "Effective and Ineffective Digital Watermarks", IEEE Intl. Conference on Image Processing, ICIP-
97, Vol.3, pp.9-12.
6) J. M. Acken, "How Watermarking Value to Digital Content?", Communications of the ACM, July 1998, Vol.41, No.7,
pp.75-77.
7) I. J. Cox and M. Miller, "A Review of Watermarking and Importance of perceptual Modelling", Proc. SPIE Human
Vision and Imaging, SPIE-3016, Feb 2008.
8) R.Barnett, "Digital Watermarking: application, techniques, and challengs", IEE Electronics and Communication
Engineering Journal, August 1999, pp.173-183.
9) R. G. Van Schyndel, et.al., "A Digital Watermark", Proc. IEEE Intl. Conf. on Image Processing, ICIP-94, Vol.2,
pp.86-90.
10) W. Bendor, et. al., "Techniques for Data Hiding", IBM Systems Journal, Vol.35, No.3 and 4, pp. 313-336, 1996.
11) E. Franz, et. al., "Computer Based Steganography", Proc. First Intl. Workshop on Information Hiding, Cambridge,
UK, May 30 - June 1, 1996, Lecture notes in Computer Science, Vol.1174, Ross Anderson(Ed.).
12) F.A.P.Petitcolas, et al., "Information Hiding - A Survey", Proceedings of the IEEE, Vol.87, No.7, July 1999, pp.1062-
1078.
13) J. Cox and M. Miller, "A Review of Watermarking and Importance of perceptual Modelling", Proc. SPIE Human
Vision and Imaging, SPIE-3016, Feb 1997.
14) F. Mintzer, et. al., "Opportunities for Watermarking Standards", Communications of the ACM, July 1998, Vol.41,
No.7, pp.57-64.
15) G.Voyatzis and I.Pitas, "The Use of Watermarks in the Protection of Digital Multimedia Products", Proceedings of the
IEEE, Vol.87, No.7, July 1999, pp.1197-1207.

More Related Content

What's hot

Comparison of image segmentation
Comparison of image segmentationComparison of image segmentation
Comparison of image segmentation
Haitham Ahmed
 
Cj36511514
Cj36511514Cj36511514
Cj36511514
IJERA Editor
 
Denoising and Edge Detection Using Sobelmethod
Denoising and Edge Detection Using SobelmethodDenoising and Edge Detection Using Sobelmethod
Denoising and Edge Detection Using Sobelmethod
IJMER
 
Extended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy imagesExtended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy images
International Journal of Science and Research (IJSR)
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Image parts and segmentation
Image parts and segmentation Image parts and segmentation
Image parts and segmentation
Rappy Saha
 
Analysis of shading pattern of solar panels
Analysis of shading pattern of solar panels Analysis of shading pattern of solar panels
Analysis of shading pattern of solar panels
eSAT Journals
 
Analysis of shading pattern of solar panels
Analysis of shading pattern of solar panelsAnalysis of shading pattern of solar panels
Analysis of shading pattern of solar panels
eSAT Publishing House
 
Ijnsa050207
Ijnsa050207Ijnsa050207
Ijnsa050207
IJNSA Journal
 
IRJET- Spatial Clustering Method for Satellite Image Segmentation
IRJET-  	  Spatial Clustering Method for Satellite Image SegmentationIRJET-  	  Spatial Clustering Method for Satellite Image Segmentation
IRJET- Spatial Clustering Method for Satellite Image Segmentation
IRJET Journal
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
IOSR Journals
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
Rania H
 
Implementation and performance evaluation of
Implementation and performance evaluation ofImplementation and performance evaluation of
Implementation and performance evaluation of
ijcsa
 
Denoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsDenoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped Windows
CSCJournals
 
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGTYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
Kamana Tripathi
 
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGTYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
Kamana Tripathi
 
NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...
NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...
NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...
idescitation
 
An improved hdr image processing using fast global tone mapping
An improved hdr image processing using fast global tone mappingAn improved hdr image processing using fast global tone mapping
An improved hdr image processing using fast global tone mapping
eSAT Journals
 

What's hot (18)

Comparison of image segmentation
Comparison of image segmentationComparison of image segmentation
Comparison of image segmentation
 
Cj36511514
Cj36511514Cj36511514
Cj36511514
 
Denoising and Edge Detection Using Sobelmethod
Denoising and Edge Detection Using SobelmethodDenoising and Edge Detection Using Sobelmethod
Denoising and Edge Detection Using Sobelmethod
 
Extended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy imagesExtended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy images
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Image parts and segmentation
Image parts and segmentation Image parts and segmentation
Image parts and segmentation
 
Analysis of shading pattern of solar panels
Analysis of shading pattern of solar panels Analysis of shading pattern of solar panels
Analysis of shading pattern of solar panels
 
Analysis of shading pattern of solar panels
Analysis of shading pattern of solar panelsAnalysis of shading pattern of solar panels
Analysis of shading pattern of solar panels
 
Ijnsa050207
Ijnsa050207Ijnsa050207
Ijnsa050207
 
IRJET- Spatial Clustering Method for Satellite Image Segmentation
IRJET-  	  Spatial Clustering Method for Satellite Image SegmentationIRJET-  	  Spatial Clustering Method for Satellite Image Segmentation
IRJET- Spatial Clustering Method for Satellite Image Segmentation
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Implementation and performance evaluation of
Implementation and performance evaluation ofImplementation and performance evaluation of
Implementation and performance evaluation of
 
Denoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsDenoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped Windows
 
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGTYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
 
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGTYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
 
NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...
NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...
NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...
 
An improved hdr image processing using fast global tone mapping
An improved hdr image processing using fast global tone mappingAn improved hdr image processing using fast global tone mapping
An improved hdr image processing using fast global tone mapping
 

Viewers also liked

Cosmas Mutaiti Muia C V 2016
Cosmas Mutaiti Muia C V 2016Cosmas Mutaiti Muia C V 2016
Cosmas Mutaiti Muia C V 2016Mutaiti Muia
 
How Social Is your Media - about tactics and strategy for Switzerland Convent...
How Social Is your Media - about tactics and strategy for Switzerland Convent...How Social Is your Media - about tactics and strategy for Switzerland Convent...
How Social Is your Media - about tactics and strategy for Switzerland Convent...
Ruud Janssen, DES, CMM
 
Robot2L_IEEE00493506
Robot2L_IEEE00493506Robot2L_IEEE00493506
Robot2L_IEEE00493506Chih-Wu Jen
 
Anunciando un rebaja_de_precio
Anunciando un rebaja_de_precioAnunciando un rebaja_de_precio
Anunciando un rebaja_de_precio
MARIO RAMIREZ
 
7 ujibeda2mean
7 ujibeda2mean7 ujibeda2mean
7 ujibeda2mean
Agus Supriyanto
 
84 70-1-pb
84 70-1-pb84 70-1-pb
84 70-1-pb
Fabricio Sousa
 
5.3.2 Limitation Voltage
5.3.2 Limitation Voltage5.3.2 Limitation Voltage
5.3.2 Limitation VoltageTalia Carbis
 
85tpd steel frame wheat flour mill plant cbecl
85tpd steel frame wheat flour mill plant cbecl85tpd steel frame wheat flour mill plant cbecl
85tpd steel frame wheat flour mill plant cbecl
Lucky Meme
 
SBA 8(a) Certification for Veteran & Minority Businesses
SBA 8(a) Certification for Veteran & Minority BusinessesSBA 8(a) Certification for Veteran & Minority Businesses
SBA 8(a) Certification for Veteran & Minority Businesses
Maria Asuelimen, MBA
 
Bm grp4
Bm grp4Bm grp4
Bm grp4
Sameer Mathur
 
Smm competitive brief
Smm competitive briefSmm competitive brief
Smm competitive brief
nkmilner
 
Project 1 integration january 2015_revised
Project 1 integration january 2015_revisedProject 1 integration january 2015_revised
Project 1 integration january 2015_revised
chloeesim
 
الجوهرة في النحو الجزء الثاني
الجوهرة في النحو الجزء الثانيالجوهرة في النحو الجزء الثاني
الجوهرة في النحو الجزء الثاني
Abdallah Omar
 
AIT presentation
AIT presentationAIT presentation
AIT presentationShan .
 

Viewers also liked (16)

Cosmas Mutaiti Muia C V 2016
Cosmas Mutaiti Muia C V 2016Cosmas Mutaiti Muia C V 2016
Cosmas Mutaiti Muia C V 2016
 
How Social Is your Media - about tactics and strategy for Switzerland Convent...
How Social Is your Media - about tactics and strategy for Switzerland Convent...How Social Is your Media - about tactics and strategy for Switzerland Convent...
How Social Is your Media - about tactics and strategy for Switzerland Convent...
 
Robot2L_IEEE00493506
Robot2L_IEEE00493506Robot2L_IEEE00493506
Robot2L_IEEE00493506
 
Anunciando un rebaja_de_precio
Anunciando un rebaja_de_precioAnunciando un rebaja_de_precio
Anunciando un rebaja_de_precio
 
7 ujibeda2mean
7 ujibeda2mean7 ujibeda2mean
7 ujibeda2mean
 
84 70-1-pb
84 70-1-pb84 70-1-pb
84 70-1-pb
 
GraphEx-SGhosh
GraphEx-SGhoshGraphEx-SGhosh
GraphEx-SGhosh
 
5.3.2 Limitation Voltage
5.3.2 Limitation Voltage5.3.2 Limitation Voltage
5.3.2 Limitation Voltage
 
8.1.2table
8.1.2table8.1.2table
8.1.2table
 
85tpd steel frame wheat flour mill plant cbecl
85tpd steel frame wheat flour mill plant cbecl85tpd steel frame wheat flour mill plant cbecl
85tpd steel frame wheat flour mill plant cbecl
 
SBA 8(a) Certification for Veteran & Minority Businesses
SBA 8(a) Certification for Veteran & Minority BusinessesSBA 8(a) Certification for Veteran & Minority Businesses
SBA 8(a) Certification for Veteran & Minority Businesses
 
Bm grp4
Bm grp4Bm grp4
Bm grp4
 
Smm competitive brief
Smm competitive briefSmm competitive brief
Smm competitive brief
 
Project 1 integration january 2015_revised
Project 1 integration january 2015_revisedProject 1 integration january 2015_revised
Project 1 integration january 2015_revised
 
الجوهرة في النحو الجزء الثاني
الجوهرة في النحو الجزء الثانيالجوهرة في النحو الجزء الثاني
الجوهرة في النحو الجزء الثاني
 
AIT presentation
AIT presentationAIT presentation
AIT presentation
 

Similar to PERFORMANCE EVALUATION OF SPATIAL AND FRACTAL WATERMARKING ALGORITHM

Garbage Classification Using Deep Learning Techniques
Garbage Classification Using Deep Learning TechniquesGarbage Classification Using Deep Learning Techniques
Garbage Classification Using Deep Learning Techniques
IRJET Journal
 
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET Journal
 
A new approach for generalised unsharp masking alogorithm
A new approach for generalised unsharp masking alogorithmA new approach for generalised unsharp masking alogorithm
A new approach for generalised unsharp masking alogorithm
eSAT Journals
 
New approach for generalised unsharp masking alogorithm
New approach for generalised unsharp masking alogorithmNew approach for generalised unsharp masking alogorithm
New approach for generalised unsharp masking alogorithm
eSAT Publishing House
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET Journal
 
A survey on efficient no reference blur estimation
A survey on efficient no reference blur estimationA survey on efficient no reference blur estimation
A survey on efficient no reference blur estimation
eSAT Publishing House
 
A survey on efficient no reference blur estimation methods
A survey on efficient no reference blur estimation methodsA survey on efficient no reference blur estimation methods
A survey on efficient no reference blur estimation methods
eSAT Journals
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
eSAT Publishing House
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
eSAT Journals
 
Image Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmImage Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic Algorithm
AM Publications
 
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKINGA PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
IRJET Journal
 
Comparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator ApproachComparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator Approach
ijsrd.com
 
IMPROVEMENT IN IMAGE DENOISING OF HANDWRITTEN DIGITS USING AUTOENCODERS IN DE...
IMPROVEMENT IN IMAGE DENOISING OF HANDWRITTEN DIGITS USING AUTOENCODERS IN DE...IMPROVEMENT IN IMAGE DENOISING OF HANDWRITTEN DIGITS USING AUTOENCODERS IN DE...
IMPROVEMENT IN IMAGE DENOISING OF HANDWRITTEN DIGITS USING AUTOENCODERS IN DE...
IRJET Journal
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
ijctet
 
Video Stitching using Improved RANSAC and SIFT
Video Stitching using Improved RANSAC and SIFTVideo Stitching using Improved RANSAC and SIFT
Video Stitching using Improved RANSAC and SIFT
IRJET Journal
 
IRJET - Finger Vein Extraction and Authentication System for ATM
IRJET -  	  Finger Vein Extraction and Authentication System for ATMIRJET -  	  Finger Vein Extraction and Authentication System for ATM
IRJET - Finger Vein Extraction and Authentication System for ATM
IRJET Journal
 
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET Journal
 
Reversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting TechniqueReversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET Journal
 
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUESDIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
AM Publications
 
Ay33292297
Ay33292297Ay33292297
Ay33292297
IJERA Editor
 

Similar to PERFORMANCE EVALUATION OF SPATIAL AND FRACTAL WATERMARKING ALGORITHM (20)

Garbage Classification Using Deep Learning Techniques
Garbage Classification Using Deep Learning TechniquesGarbage Classification Using Deep Learning Techniques
Garbage Classification Using Deep Learning Techniques
 
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
 
A new approach for generalised unsharp masking alogorithm
A new approach for generalised unsharp masking alogorithmA new approach for generalised unsharp masking alogorithm
A new approach for generalised unsharp masking alogorithm
 
New approach for generalised unsharp masking alogorithm
New approach for generalised unsharp masking alogorithmNew approach for generalised unsharp masking alogorithm
New approach for generalised unsharp masking alogorithm
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
 
A survey on efficient no reference blur estimation
A survey on efficient no reference blur estimationA survey on efficient no reference blur estimation
A survey on efficient no reference blur estimation
 
A survey on efficient no reference blur estimation methods
A survey on efficient no reference blur estimation methodsA survey on efficient no reference blur estimation methods
A survey on efficient no reference blur estimation methods
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
 
Image Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmImage Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic Algorithm
 
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKINGA PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
 
Comparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator ApproachComparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator Approach
 
IMPROVEMENT IN IMAGE DENOISING OF HANDWRITTEN DIGITS USING AUTOENCODERS IN DE...
IMPROVEMENT IN IMAGE DENOISING OF HANDWRITTEN DIGITS USING AUTOENCODERS IN DE...IMPROVEMENT IN IMAGE DENOISING OF HANDWRITTEN DIGITS USING AUTOENCODERS IN DE...
IMPROVEMENT IN IMAGE DENOISING OF HANDWRITTEN DIGITS USING AUTOENCODERS IN DE...
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Video Stitching using Improved RANSAC and SIFT
Video Stitching using Improved RANSAC and SIFTVideo Stitching using Improved RANSAC and SIFT
Video Stitching using Improved RANSAC and SIFT
 
IRJET - Finger Vein Extraction and Authentication System for ATM
IRJET -  	  Finger Vein Extraction and Authentication System for ATMIRJET -  	  Finger Vein Extraction and Authentication System for ATM
IRJET - Finger Vein Extraction and Authentication System for ATM
 
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
 
Reversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting TechniqueReversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting Technique
 
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUESDIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
 
Ay33292297
Ay33292297Ay33292297
Ay33292297
 

More from AM Publications

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
AM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
AM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
AM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
AM Publications
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
AM Publications
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
AM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
AM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
AM Publications
 

More from AM Publications (20)

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 

Recently uploaded

weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 

Recently uploaded (20)

weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 

PERFORMANCE EVALUATION OF SPATIAL AND FRACTAL WATERMARKING ALGORITHM

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 1 Issue 1 (March 2014) ____________________________________________________________________________________________________ ISSN: 2278-2311 IJIRAE | http://ijirae.com © 2014, IJIRAE – All Rights Reserved Page - 68 PERFORMANCE EVALUATION OF SPATIAL AND FRACTAL WATERMARKING ALGORITHM R.Ganesh, Dr.S.Thabasukannan Research Scholar/CS Principal, Pannai College of Engg & Tech, N.M.S.S.VN College, Madurai-19 Sivagangai – 630 561, Tamilnadu, India mrganesh76@gmail.com thabasukannan@gmail.com ABSTRACT--Recent days watermarking plays a vital role in most of the industries for security purpose. In this paper, we compare both spatial and fractal Watermarking algorithms. We have been improving the resistance in data compression. The composition of all these transformations has the image as its fixed point. Starting with any image hence to apply the composition of the transformations repeatedly and get an approximation of the original image. 1. INTRODUCTION Digital watermarking is a method of embedding information in an image in such a manner that it cannot be removed. This watermark can be used for ownership protection, copy control and authentication. A digital watermark is a secret message that is embedded into a “cover message”. Only the knowledge of a secret key allows us to extract the watermark from the cover message. A digital watermark can be visible or invisible. A digital watermarking is a method that uses a secret key to select the locations where a watermark is embedded. II. TYPES OF WATERMARKS  Visible watermarks are designed to be easily perceived by the viewer, and clearly identify the owner; the watermark must not detract from the image content itself.  Fragile watermarks are designed to be distorted or "broken" under the slightest changes to the image. Semi- fragile watermarks are designed to break under all changes that exceed a user-specified threshold. Robust watermarks withstand moderate to severe signal processing attacks on an image.  Spatial watermarks are constructed in the image spatial domain, and embedded directly into an image's pixel data. Spectral (or transform-based) watermarks are incorporated into an image's transform coefficients. The spatial domain techniques directly modify the intensities or color values of some selected pixels. A. SPATIAL WATERMARKINGS In the Spatial Domain algorithm, there is no costly transforms have to be computed for watermark embedding. There are three algorithms belongs to the category of spatial watermarking we have taken for our study. They are Kutter algorithm, Bruyndonckx Algorithm and Langelaar Algorithm. We have taken three algorithms in the category of fractal watermarking. They are bas algorithm, Puate Algorithm and Davern. A. KUTTER ALGORITHM Here, the host image is not needed for extracting the watermark. The Watermark used here is a string of bits. Two leading bits are added to the mark: 0 and 1 bit. These two bits form a mini-template that will be used in the extraction process. It manipulates the values of the blue channel at single pixels. The pixels are visited in a zig-zag path to get a sequence. Random site selection is used, but no qualitative site selection is done. Fig 1 Watermark created by kutter In the above figure, the strength of the watermark is dependent on the luminance of the host image. B. BRUYNDONCKX ALGORITHM The host image is not needed for extracting the watermark. It used a string of bits. It manipulates the luminance of zones of pixies in pixel blocks of size n x m. To embed a bit into a certain block three steps are needed. They are
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 1 Issue 1 (March 2014) ____________________________________________________________________________________________________ ISSN: 2278-2311 IJIRAE | http://ijirae.com © 2014, IJIRAE – All Rights Reserved Page - 69  Classification: The pixels in the block are to be divided into two zones of homogeneous luminance. The two blocks are a) blocks with hard or progressive contrast and b) blocks with noise contrast.  Subdivision: Grids are applied to the block to divide the pixels into categories. A different grid is used for pixels in zone one and two. The grids have to remain secret, and are changed with every block.  Manipulation: To divide the pixels in the block into 5 sets: some pixels have been discarded, the rest are either in zone one or two, and either in category A or B. The pixels in zone one is less luminous than those in zone two. Fig 2 Watermark created by bruyndonckx C. LANGELAAR ALGORITHM In this algorithm, the host image is not needed for extracting the watermark. The Watermark used is a string of bits. This algorithm manipulates the luminance of pixels in 8 x 8 blocks. Random site selection is used, but no qualitative site selection is done. Fig 3 Watermark created by Langelaar B. FRACTAL DOMAIN ALGORITHMS This type of algorithm is to determine a set of contractive transformation to approximate each block of the image with a larger block. The composition of all the transformations has the image as its fixed point. Starting with any image hence to apply the composition of the transformations repeatedly and get an approximation of the original image. A. BAS ALGORITHM Ideas from fractal coding are used in this algorithm, but it also be classified as a spatial domain algorithm. It also mentions a wavelet domain method of embedding. To detect the host image is not needed to detect the watermark. The image is manipulated to contain certain self-similarities. Using this algorithm several points-of-interest are selected. Each points defines a 4 x 4 block centered around the point and 16 4 x 4 blocks, which form the domain pool. To embed the watermark, for every point-of-interest the domain block with the same relative position to the point-of-interest is modified to be more similar to the range block than any other domain block. Fig 4 Blocks defined by the Points-of-Interest. The number of matching blocks found is a measure of the probability that the watermark is in the image.
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 1 Issue 1 (March 2014) ____________________________________________________________________________________________________ ISSN: 2278-2311 IJIRAE | http://ijirae.com © 2014, IJIRAE – All Rights Reserved Page - 70 B. PUATE ALGORITHM It is described as a steganographic algorithm. Here the watermark is encoded in the image format rather than the image data. The host image is not needed to retrieve the watermark. If the image is converted to a different format (e.g. JPEG), the watermark cannot be retrieved. The watermark is a string of bits. A bit is embedded in the choice of transformation for a range block. The number of range blocks is an upper bound for the number of bits that can be embedded. The blocks are selected in pseudo random order, the knowledge about this sequence forms a secret key. Fig 5 Dividing the domain pool To embed the watermark, the domain pool D is divided into two sets D0 and D1. To embed a bit into a selected range block ri, a matching domain block is found in D0 to embed a 0-bit, in D1 to embed a 1-bit. By effectively shrinking the available domain pool to get less optimal matches, which results in a loss of image quality. C. DAVERN ALGORITHM Here, there is no data to show whether the algorithm is robust against attacks. The host image is not needed to retrieve the watermark. The watermark is a string of bits. The user manually selects two non-overlapping square regions of the image which will be called domain region and range region. The exact position of these regions will constitute part of the secret key needed to retrieve the watermark. Blocks in the range region are modified to embed a bit. These blocks may be of size 4 x 4, 8 x 8 or 16 x 16. The number of such blocks is an upper bound for the length of the watermark. The blocks are selected in pseudo random order, this forms the second part of the secret key. EXPERIMENTAL RESULTS BRUYN ALGORITHM The original curve After deleting the co-ordinate (45,0.99) After deleting the co-ordinate (33,0.77) After extending the co-ordinate (60,0.6) Fig 6 Bruyn watermarking algorithm Bruyn watermarking algorithm 0.6 0.65 0.7 0.75 0.8 0.85 0.9 0.95 1 1.05 20 25 30 35 40 45 50 55 60 65 PSNR caused by watermark embedding Correlationbetween originalwatermark Bruyn watermarking algorithm 0.6 0.65 0.7 0.75 0.8 0.85 0.9 0.95 1 1.05 20 25 30 35 40 45 50 55 60 65 PSNR caused by watermark embedding Correlationbetweenoriginalwatermark Bruyn watermarking algorithm 0.6 0.65 0.7 0.75 0.8 0.85 0.9 0.95 1 1.05 20 25 30 35 40 45 50 55 60 65 PSNR caused by watermark embedding Correlationbetween originalwatermark
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 1 Issue 1 (March 2014) ____________________________________________________________________________________________________ ISSN: 2278-2311 IJIRAE | http://ijirae.com © 2014, IJIRAE – All Rights Reserved Page - 71 In this algorithm, the original curve started in the lower left corner of the graph. It is clearly understood that from the 6th co- ordinate position, the curve started its peak at right angled style i.e 90o position. The feature of the curve is slightly to a vertical curve because the edges drawn in the straight lines without any bends. Hence the curve view is not like a smooth normal distribution, because the tip portion is very sharp in the curve (45,0.99). To reduce the noise by making smoothening the curve, First to delete the 7th co-ordinate position i.e (45,0.99). Second to delete the 3rd Coordinate position i.e (33, 0.77). Then to extend the last coordinate to meet in the X axis. Now the Curve makes smoother and its resemblance looks like a parabolic curve. In this stage the number of coordinates are Eight. The number of process finished for transformation process is three. So it does not exceed the threshold value ά. It forms a smooth normal distribution curve within the boundaries and within the three steps. A. LANGELAAR ALGORITHM In this algorithm, the original curve started from the upper left corner of the graph. It is clearly understood that the original curve looks like the ½ of the normal distribution curve. First to delete the 5th co-ordinate position i.e (46.5, 0.95). Now the transformation process needs one Y-axis reflection i.e 1800 rotation, and the change in position of an object that has been reflected about the line x = 0. If needed we can extend the two edge coordinate positions for getting smoother. Now the Curve makes smoother and its resemblance looks like a parabolic curve. In this stage the number of coordinates are nine. The number of process finished for transformation process is four. So it does not exceed the threshold value ά. It forms a smooth normal distribution curve within the boundaries and within the three steps. The original curve After deleting the co-ordinate (46.5,0.95) After extending the co-ord (50,0.6) After reflecting the curve from right side to left side using 180 degree rotation After 6.5 value of the x-axis translation of the curve L a n g e la a r w a te rm a rk in g a lg o rith m 0 . 6 0 .6 5 0 . 7 0 .7 5 0 . 8 0 .8 5 0 . 9 0 .9 5 1 1 .0 5 2 0 2 5 3 0 3 5 4 0 4 5 5 0 5 5 6 0 6 5 P S N R c a u s e d b y w a te rm a rk e m b e d d in g Correlationbetweenoriginal watermark La n ge laa r w a term a rk ing a lg orith m 0 .6 0 .6 5 0 .7 0 .7 5 0 .8 0 .8 5 0 .9 0 .9 5 1 1 .0 5 2 0 2 5 3 0 3 5 4 0 4 5 5 0 5 5 6 0 6 5 P S N R c a us e d b y w a te rm a rk e m b e d d in g Correlationbetween originalwatermark Langelaar watermarking algorithm 0.6 0.65 0.7 0.75 0.8 0.85 0.9 0.95 1 1.05 20 25 30 35 40 45 50 55 60 65 PSNR caused by watermark embedding Correlation between original
  • 5. International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 1 Issue 1 (March 2014) ____________________________________________________________________________________________________ ISSN: 2278-2311 IJIRAE | http://ijirae.com © 2014, IJIRAE – All Rights Reserved Page - 72 COMPARISON BETWEEN BRUYN AND LANGELAAR The Bruyn algorithm, the curves started from the lower left corner of the graph. But, in the Langelaar algorithm the curve starts from the upper left corner of the graph. Here all the three curves are with in the fixed threshold value (ά). Using the Bruyn algorithm, it is formed a smooth normal distribution curve within the boundaries. Its reliability supportive ratio is 40%. So it is highly accepted. Next to Bruyn algorithm, the Langelaar algorithm its performance is better. Figure 8 Before modification of Bruyn and Figure 9. After modification of Bruyn Langelaar watermarking algorithm & Langelaar watermarking algorithm CONCLUSION In this paper it is clearly understood that noise is unwanted thing for both text and images. This paper clearly identifies that comparatively the effective and efficient watermarking algorithm. The result displays that Bruyn watermarking algorithm is better than any other algorithm compared with Langelaar watermarking algorithm. As compared the Bruyn watermarking algorithm and Kutter watermarking algorithm, the former its efficiency is better for some cases and the latter its effectiveness is better for some cases. The main factor which influences to get the efficiency is “environment”. REFERENCES 1) R.C.Gonzalez and R.E.Woods, "Digital Image Processing", Addison-Wesley Publishing company, Inc., 2008. 2) B.Pfitzmann, "Information Hiding Terminology", Proc. of First Int. Workshop on Information Hiding, Cambridge, UK, May30-June1, 2009, Lecture notes in Computer Science, Vol.1174, Ross Anderson(Ed.), pp.347-350. 3) F.A.P.Petitcolas, et al., "Information Hiding - A Survey", Proceedings of the IEEE, Vol.87, No.7, July 1999, pp.1062- 1078. 4) Hal Berghel, "Watermarking Cyberspace", Communications of the ACM, Nov.2009, Vol.40, No.11, pp.19-24. 5) F. Mintzer, et.al., "Effective and Ineffective Digital Watermarks", IEEE Intl. Conference on Image Processing, ICIP- 97, Vol.3, pp.9-12. 6) J. M. Acken, "How Watermarking Value to Digital Content?", Communications of the ACM, July 1998, Vol.41, No.7, pp.75-77. 7) I. J. Cox and M. Miller, "A Review of Watermarking and Importance of perceptual Modelling", Proc. SPIE Human Vision and Imaging, SPIE-3016, Feb 2008. 8) R.Barnett, "Digital Watermarking: application, techniques, and challengs", IEE Electronics and Communication Engineering Journal, August 1999, pp.173-183. 9) R. G. Van Schyndel, et.al., "A Digital Watermark", Proc. IEEE Intl. Conf. on Image Processing, ICIP-94, Vol.2, pp.86-90. 10) W. Bendor, et. al., "Techniques for Data Hiding", IBM Systems Journal, Vol.35, No.3 and 4, pp. 313-336, 1996. 11) E. Franz, et. al., "Computer Based Steganography", Proc. First Intl. Workshop on Information Hiding, Cambridge, UK, May 30 - June 1, 1996, Lecture notes in Computer Science, Vol.1174, Ross Anderson(Ed.). 12) F.A.P.Petitcolas, et al., "Information Hiding - A Survey", Proceedings of the IEEE, Vol.87, No.7, July 1999, pp.1062- 1078. 13) J. Cox and M. Miller, "A Review of Watermarking and Importance of perceptual Modelling", Proc. SPIE Human Vision and Imaging, SPIE-3016, Feb 1997. 14) F. Mintzer, et. al., "Opportunities for Watermarking Standards", Communications of the ACM, July 1998, Vol.41, No.7, pp.57-64. 15) G.Voyatzis and I.Pitas, "The Use of Watermarks in the Protection of Digital Multimedia Products", Proceedings of the IEEE, Vol.87, No.7, July 1999, pp.1197-1207.