SlideShare a Scribd company logo
1 of 18
REVERSIBLE COLOR IMAGE
WATERMARKING
NADARAJAN A
MARIAN COLLEGE,KUTTIKKANAM
CONTENTS
• Introduction
• Reversible watermarking
• Watermark Embedding
• Watermark Extraction
• Example
• Conclusion
• References 2
DIGITAL WATERMARKING
• Digital information (watermark) embedded within any
multimedia object that can be later detected and
extracted for object assertion purposes
3
Host image watermarked
image
DIGITAL WATERMARKING PROCESS
4
Embedding unit
Watermarked
object
Attack
cover
object
Extraction unit watermark
watermark
REVERSIBLE WATERMARKING
• Watermarking schemes which can
recover the original image from the
watermark extracted image
5
REVERSIBLE COLOR IMAGE
WATERMARKING USING TRIGONOMETRIC
FUNCTIONS
 Embeds secret bits into the gray planes of the
color image
 Using interpolation method and trigonometric
functions
6
WATERMARKING PROCESS
7
Cover l image
Extended cover image
Modified image
Watermarked image
Embedded
values
Bit stream
recovered
Recovered
watermark
interpolation
Watermark Trignometrical
function
REVERSIBLE COLOR IMAGE WATERMARKING
USING TRIGONOMETRIC FUNCTIONS
Embedding process
Step 1: Original image is read and divided into multiple 2x2 blocks
Step 2: Each 2x2 blocks converted into 3x3 blocks using interpolation
Step 3: The values of newly inserted elements are changed using the
trigonometric functions
Step 4: Logarithmic values of these new elements are taken and stored
in a variable
Step 5: Bit stream chosen according to log values
Step 6: Decimal values of those bit streams are embedded in the new
elements of 3×3 blocks
8
REVERSIBLE COLOR IMAGE WATERMARKING USING
TRIGONOMETRIC FUNCTIONS
Extraction process
Step 1: Watermarked image is divided into 3×3 blocks
Step 2: Embedded values are extracted from the watermarked image
Step 3: Embedded bit stream is recovered using trigonometric functions
9
REVERSIBLE COLOR IMAGE WATERMARKING USING
TRIGONOMETRIC FUNCTIONS
I - original image (cover image)
C - interpolated image
Each 2×2 block in I is converted into 3×3 block using the following
formulas:
C(1,1) = I(1,1)
C(1,3) = I(1,2)
C(3,1) = I(2,1)
C(3,3) = I(2,2)
10
INTERPOLATION
11
   
   
   
   
   
2
)3,3()1,3(
)2,3(
2
)3,3()3,1(
)3,2(
2
)2,3()2,1(
)2,2(
2
)1,3()1,1(
)1,2(
2
)3,1()1,1(
)2,1(
22
22
22
22
22
CC
C
CC
C
CC
C
CC
C
CC
C










TRIGONOMETRIC FUNCTIONS
12
 
 
2
)1,3()1,1(
cos2)1,2()1,2(
2
)3,1()1,1(
cos2)2,1()2,1(
CC
CC
CC
CC




15 0
220 255
15 10 0
155 167 180
220 238 255
15 11 0
155 168 180
220 240 255
15 12 0
155 168 180
220 243 255
interpolation
Trigonometric
function
watermark
embedding
10011
Watermark embedding
13
14
Cover image Watermarked image
Watermarked Lena Image
image Image format Image size PSNR between original
image(blue plane) vs.
watermarked image
PSNR between original
image(green plane)
vs.watermarked image
Lena
.jpg
100 x100 56.3520 49.7664
128 x128 46.6024 47.8984
150 x150 49.3358 49.0207
200 x200 49.1947 41.1604
220 x220 46.0073 37.5348
.png
100 x100 54.4270 50.8743
128 x128 50.9845 43.9930
150 x150 37.8703 42.2780
200 x200 42.5420 44.6707
220 x220 37.2588 36.2885
Baboon
.jpg
100 x100 49.7004 40.4878
128 x128 47.0068 41.3162
150 x150 43.8514 35.7607
200 x200 47.2930 35.1920
220 x220 48.1503 35.0314
.png
100 x100 47.1021 38.6549
128 x128 48.0422 37.6236
150 x150 45.1130 36.9323
200 x200 47.6768 38.3077
Experimental Results
15
CONCLUSION
Fragile watermarking scheme
Very good PSNR values > 35 dB
Watermarks can be successfully
embedded and extracted
16
REFERENCES
 N. Dey. P. Das ,”Session based Blind watermarking
technique with in NROI of ratinal Funds image for
Authentication Using DWT, spread spectrum
 A.K Pal, P.Das,N.dey “Odd-Even Embedding
Scheme based Modified Reversible Watermarking
Technique using Blueprint”
17
18
THANK YOU

More Related Content

What's hot

RC2-filterDesign_s
RC2-filterDesign_sRC2-filterDesign_s
RC2-filterDesign_s
henry kang
 
Paper id 35201575
Paper id 35201575Paper id 35201575
Paper id 35201575
IJRAT
 

What's hot (20)

Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
 
Numerical analysis m2 l4slides
Numerical analysis  m2 l4slidesNumerical analysis  m2 l4slides
Numerical analysis m2 l4slides
 
Justification of Montgomery Modular Reduction
Justification of Montgomery Modular ReductionJustification of Montgomery Modular Reduction
Justification of Montgomery Modular Reduction
 
Qcce quality constrained co saliency estimation for common object detection
Qcce quality constrained co saliency estimation for common object detectionQcce quality constrained co saliency estimation for common object detection
Qcce quality constrained co saliency estimation for common object detection
 
An Analysis of Energy Efficient Gaussian Filter Architectures
An Analysis of Energy Efficient Gaussian Filter ArchitecturesAn Analysis of Energy Efficient Gaussian Filter Architectures
An Analysis of Energy Efficient Gaussian Filter Architectures
 
A study on mhd boundary layer flow over a nonlinear
A study on mhd boundary layer flow over a nonlinearA study on mhd boundary layer flow over a nonlinear
A study on mhd boundary layer flow over a nonlinear
 
Computer vision 3 4
Computer vision 3 4Computer vision 3 4
Computer vision 3 4
 
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...
 
Steven Duplij, Raimund Vogl, "Polyadic braid operators and higher braiding ga...
Steven Duplij, Raimund Vogl, "Polyadic braid operators and higher braiding ga...Steven Duplij, Raimund Vogl, "Polyadic braid operators and higher braiding ga...
Steven Duplij, Raimund Vogl, "Polyadic braid operators and higher braiding ga...
 
RC2-filterDesign_s
RC2-filterDesign_sRC2-filterDesign_s
RC2-filterDesign_s
 
Math behind the kernels
Math behind the kernelsMath behind the kernels
Math behind the kernels
 
Image Acquisition and Representation
Image Acquisition and RepresentationImage Acquisition and Representation
Image Acquisition and Representation
 
Civil engineering mock test
Civil engineering mock testCivil engineering mock test
Civil engineering mock test
 
Paper id 35201575
Paper id 35201575Paper id 35201575
Paper id 35201575
 
Lect 02 second portion
Lect 02  second portionLect 02  second portion
Lect 02 second portion
 
Gr3112821287
Gr3112821287Gr3112821287
Gr3112821287
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A Hybrid SVD Method Using Interpolation Algorithms for Image Compression
A Hybrid SVD Method Using Interpolation Algorithms for Image CompressionA Hybrid SVD Method Using Interpolation Algorithms for Image Compression
A Hybrid SVD Method Using Interpolation Algorithms for Image Compression
 
Chapter 7: Matrix Multiplication
Chapter 7: Matrix MultiplicationChapter 7: Matrix Multiplication
Chapter 7: Matrix Multiplication
 
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
 

Similar to Reversible color Image Watermarking

Aw2419401943
Aw2419401943Aw2419401943
Aw2419401943
IJMER
 
Paper id 25201490
Paper id 25201490Paper id 25201490
Paper id 25201490
IJRAT
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
2.[9 17]comparative analysis between dct & dwt techniques of image compression
2.[9 17]comparative analysis between dct & dwt techniques of image compression2.[9 17]comparative analysis between dct & dwt techniques of image compression
2.[9 17]comparative analysis between dct & dwt techniques of image compression
Alexander Decker
 
Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &
Iaetsd Iaetsd
 

Similar to Reversible color Image Watermarking (20)

Watershed image ansam hadi
Watershed image ansam hadiWatershed image ansam hadi
Watershed image ansam hadi
 
Aw2419401943
Aw2419401943Aw2419401943
Aw2419401943
 
Semi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svdSemi blind rgb color image watermarking using dct and two level svd
Semi blind rgb color image watermarking using dct and two level svd
 
Paper id 25201490
Paper id 25201490Paper id 25201490
Paper id 25201490
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
 
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
 
2.[9 17]comparative analysis between dct & dwt techniques of image compression
2.[9 17]comparative analysis between dct & dwt techniques of image compression2.[9 17]comparative analysis between dct & dwt techniques of image compression
2.[9 17]comparative analysis between dct & dwt techniques of image compression
 
2.[9 17]comparative analysis between dct & dwt techniques of image compression
2.[9 17]comparative analysis between dct & dwt techniques of image compression2.[9 17]comparative analysis between dct & dwt techniques of image compression
2.[9 17]comparative analysis between dct & dwt techniques of image compression
 
Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &
 
gp2_2.pptx
gp2_2.pptxgp2_2.pptx
gp2_2.pptx
 
Novel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital imagesNovel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital images
 
Gray Image Watermarking using slant transform - digital image processing
Gray Image Watermarking using slant transform - digital image processingGray Image Watermarking using slant transform - digital image processing
Gray Image Watermarking using slant transform - digital image processing
 
Kt3618371840
Kt3618371840Kt3618371840
Kt3618371840
 
A0360105
A0360105A0360105
A0360105
 
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATIONA DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
 
GRUPO 2 : convolution separable
GRUPO 2 :  convolution separableGRUPO 2 :  convolution separable
GRUPO 2 : convolution separable
 
Secure High Capacity Data Hiding in Images using EDBTC
Secure High Capacity Data Hiding in Images using EDBTCSecure High Capacity Data Hiding in Images using EDBTC
Secure High Capacity Data Hiding in Images using EDBTC
 
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
 
Lectures 1 3 final (4)
Lectures 1 3 final (4)Lectures 1 3 final (4)
Lectures 1 3 final (4)
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Reversible color Image Watermarking

  • 1. REVERSIBLE COLOR IMAGE WATERMARKING NADARAJAN A MARIAN COLLEGE,KUTTIKKANAM
  • 2. CONTENTS • Introduction • Reversible watermarking • Watermark Embedding • Watermark Extraction • Example • Conclusion • References 2
  • 3. DIGITAL WATERMARKING • Digital information (watermark) embedded within any multimedia object that can be later detected and extracted for object assertion purposes 3 Host image watermarked image
  • 4. DIGITAL WATERMARKING PROCESS 4 Embedding unit Watermarked object Attack cover object Extraction unit watermark watermark
  • 5. REVERSIBLE WATERMARKING • Watermarking schemes which can recover the original image from the watermark extracted image 5
  • 6. REVERSIBLE COLOR IMAGE WATERMARKING USING TRIGONOMETRIC FUNCTIONS  Embeds secret bits into the gray planes of the color image  Using interpolation method and trigonometric functions 6
  • 7. WATERMARKING PROCESS 7 Cover l image Extended cover image Modified image Watermarked image Embedded values Bit stream recovered Recovered watermark interpolation Watermark Trignometrical function
  • 8. REVERSIBLE COLOR IMAGE WATERMARKING USING TRIGONOMETRIC FUNCTIONS Embedding process Step 1: Original image is read and divided into multiple 2x2 blocks Step 2: Each 2x2 blocks converted into 3x3 blocks using interpolation Step 3: The values of newly inserted elements are changed using the trigonometric functions Step 4: Logarithmic values of these new elements are taken and stored in a variable Step 5: Bit stream chosen according to log values Step 6: Decimal values of those bit streams are embedded in the new elements of 3×3 blocks 8
  • 9. REVERSIBLE COLOR IMAGE WATERMARKING USING TRIGONOMETRIC FUNCTIONS Extraction process Step 1: Watermarked image is divided into 3×3 blocks Step 2: Embedded values are extracted from the watermarked image Step 3: Embedded bit stream is recovered using trigonometric functions 9
  • 10. REVERSIBLE COLOR IMAGE WATERMARKING USING TRIGONOMETRIC FUNCTIONS I - original image (cover image) C - interpolated image Each 2×2 block in I is converted into 3×3 block using the following formulas: C(1,1) = I(1,1) C(1,3) = I(1,2) C(3,1) = I(2,1) C(3,3) = I(2,2) 10
  • 11. INTERPOLATION 11                     2 )3,3()1,3( )2,3( 2 )3,3()3,1( )3,2( 2 )2,3()2,1( )2,2( 2 )1,3()1,1( )1,2( 2 )3,1()1,1( )2,1( 22 22 22 22 22 CC C CC C CC C CC C CC C          
  • 12. TRIGONOMETRIC FUNCTIONS 12     2 )1,3()1,1( cos2)1,2()1,2( 2 )3,1()1,1( cos2)2,1()2,1( CC CC CC CC    
  • 13. 15 0 220 255 15 10 0 155 167 180 220 238 255 15 11 0 155 168 180 220 240 255 15 12 0 155 168 180 220 243 255 interpolation Trigonometric function watermark embedding 10011 Watermark embedding 13
  • 14. 14 Cover image Watermarked image Watermarked Lena Image
  • 15. image Image format Image size PSNR between original image(blue plane) vs. watermarked image PSNR between original image(green plane) vs.watermarked image Lena .jpg 100 x100 56.3520 49.7664 128 x128 46.6024 47.8984 150 x150 49.3358 49.0207 200 x200 49.1947 41.1604 220 x220 46.0073 37.5348 .png 100 x100 54.4270 50.8743 128 x128 50.9845 43.9930 150 x150 37.8703 42.2780 200 x200 42.5420 44.6707 220 x220 37.2588 36.2885 Baboon .jpg 100 x100 49.7004 40.4878 128 x128 47.0068 41.3162 150 x150 43.8514 35.7607 200 x200 47.2930 35.1920 220 x220 48.1503 35.0314 .png 100 x100 47.1021 38.6549 128 x128 48.0422 37.6236 150 x150 45.1130 36.9323 200 x200 47.6768 38.3077 Experimental Results 15
  • 16. CONCLUSION Fragile watermarking scheme Very good PSNR values > 35 dB Watermarks can be successfully embedded and extracted 16
  • 17. REFERENCES  N. Dey. P. Das ,”Session based Blind watermarking technique with in NROI of ratinal Funds image for Authentication Using DWT, spread spectrum  A.K Pal, P.Das,N.dey “Odd-Even Embedding Scheme based Modified Reversible Watermarking Technique using Blueprint” 17