Professional Documents
Culture Documents
various companies important documents etc. transfer over internet link and convert into various
forms of media such as image, audio, or text with a minimum amount of perceivable degradation
to the host signal; so that embedded data should be invisible and inaudible to a human
observer, So that data can be prevent. Its goal is not to restrictor regulate access to the host
signal, but rather to ensure that embedded data remain inviolate and recoverable. Data hiding in
audio signals is especially challenging, because the human auditory system (HAS) operates over
a wide dynamic range. The HAS perceives over a range of power greater than one billion to one
and a range of frequencies greater than one thousand to one [5]. Based on the type of document
to be watermarked Text Watermarking: Line shift coding, word shift coding, feature codingand
internet technology. The rapid expansion of the Internet and digital technologies in the past years
has sharply increased the ease of the production and distribution of digital media[3]. The main
idea of steganography is the embedding of secret information into data under the assumption that
others cannot know the secret information in data.
The main idea of watermarks is to check the logo embedded in data or not [4]. In this, the
data hiding process is more important. Data hiding shows processes used to embed data, such as
copyright information, various companies important documents etc. transfer over internet link
and convert into various forms of media such as image, audio, or text with a minimum amount of
perceivable degradation to the host signal; so that embedded data should be invisible and
inaudible to a human observer, So that data can be prevent. Its goal is not to restrictor regulate
access to the host signal, but rather to ensure that embedded data remain inviolate and
recoverable and internet technology. The rapid expansion of the Internet and digital technologies
in the past years has sharply increased the ease of the production and distribution of digital
media[3]. The main idea of steganography is the embedding of secret information into data under
the assumption that others cannot know the secret information in data. The main idea of
watermarks is to check the logo embedded in data or not [4].
In this, the data hiding process is more important. Data hiding shows processes used to
embed data, such as copyright information, various companies important documents etc. transfer
over internet link and convert into various forms of media such as image, audio, or text with a
minimum amount of perceivable degradation to the host signal; so that embedded data should
be invisible and inaudible to a human observer, So that data can be prevent. Its goal is not to
restrictor regulate access to the host signal, but rather to ensure that embedded data remain
inviolate and recoverable. and internet technology. The rapid expansion of the Internet and
digital technologies in the past years has sharply increased the ease of the production and
distribution of digital media[3]. The main idea of steganography is the embedding of secret
information into data under the assumption that others cannot know the secret information in
data. The main idea of watermarks is to check the logo embedded in data or not [4]. In this, the
data hiding process is more important. Data hiding shows processes used to embed data, such as
copyright information, various companies important documents etc. transfer over internet link
and convert into various forms of media such as image, audio, or text with a minimum amount of
perceivable degradation to the host signal; so that embedded data should be invisible and
inaudible to a human observer, So that data can be prevent. Its goal is not to restrictor regulate
access to the host signal, but rather to ensure that embedded data remain inviolate and
recoverable. and internet technology. The rapid expansion of the Internet and digital technologies
in the past years has sharply increased the ease of the production and distribution of digital
media[3].
The main idea of steganography is the embedding of secret information into data under
the assumption that others cannot know the secret information in data. The main idea of
watermarks is to check the logo embedded in data or not [4]. In this, the data hiding process is
more important. Data hiding shows processes used to embed data, such as copyright information,
and internet technology. The rapid expansion of the Internet and digital technologies in the past
years has sharply increased the ease of the production and distribution of digital media[3]. The
main idea of steganography is the embedding of secret information into data under the
assumption that others cannot know the secret information in data. The main idea of watermarks
is to check the logo embedded in data or not [4]. In this, the data hiding process is more
important. Data hiding shows processes used to embed data, such as copyright information,
various companies important documents etc. transfer over internet link and convert into various
forms of media such as image, audio, or text with a minimum amount of perceivable degradation
to the host signal; so that embedded data should be invisible and inaudible to a human
observer, So that data can be prevent. Its goal is not to restrictor regulate access to the host
signal, but rather to ensure that embedded data remain inviolate and recoverable.
and internet technology. The rapid expansion of the Internet and digital technologies in the past
years has sharply increased the ease of the production and distribution of digital media[3]. The
main idea of steganography is the embedding of secret information into data under the
assumption that others cannot know the secret information in data. The main idea of watermarks
is to check the logo embedded in data or not [4]. In this, the data hiding process is more
important. Data hiding shows processes used to embed data, such as copyright information,
various companies important documents etc. transfer over internet link and convert into various
forms of media such as image, audio, or text with a minimum amount of perceivable degradation
to the host signal; so that embedded data should be invisible and inaudible to a human
observer, So that data can be prevent. Its goal is not to restrictor regulate access to the host
signal, but rather to ensure that embedded data remain inviolate and recoverable.
Data hiding in audio signals is especially challenging, because the human auditory
system (HAS) operates over a wide dynamic range. The HAS perceives over a range of power
greater than one billion to one and a range of frequencies greater than one thousand to one [5].
Based on the type of document to be watermarked Text Watermarking: Line shift coding, word
shift coding, feature coding. Visible Watermark: The information is visible in the picture or
video. Typically, the information is text or a logo which identifies the owner of the media.
Invisible Watermark: An invisible watermark is an overlaid image which cannot be se en, but
which can be detected algorithmically. Dual Watermarking: Dual watermark is a combination of
a visible and an invisible watermark. In this type of watermark, an invisible watermark is used as
a backup for the visible watermark [4]. Another classification of watermarking system is based
on the domain in which the watermark is embedded. If watermark is embedded by modifying the
intensity value of the pixels then it is called spatial domain watermarking, if the frequency
coefficients are changed then it is called transform domain watermarking system. Many
transformation techniques are used for transforming image from spatial to frequency domain
which includes Discrete Fourier Transform (DFT), discrete cosine Transform (DCT), Discrete
wavelets transform (DWT) and Discrete Hadamard Transformation (DHT) [7].QR Code is a type
of 2-D (two-dimensional) Symbology.
2. TYPES OF DIGITAL WATERMARKS:Watermarks and watermarking techniques can be divided into various categories in various
ways.
a large amount of information, perfectly securely with no visible degradation to the cover object.
Steganographic methods are in general not robust, that is the hidden information cannot be
recovered after data manipulation.
Watermarking is robust against attacks. If the existence of the hidden information is known it
is difficult, ideally impossible for an attacker to destroy the embedded watermark
.Imperceptibility, robustness, inseparability, security, are the features of digital watermarking.
The image watermarking techniques can be classified into two categories:
3.1 Spatial-domain techniques (spatial watermarks):-
The spatial-domain techniques directly modify the intensities or color values of some
selected pixels. No transforms are applied to the host signal during watermark embedding.
Spatial techniques are not very robust against attacks. The main strengths of pixel domain
methods are that they are conceptually simple and have very low computational complexities.
spatial domain technique, is less time consuming as compare to wavelet or frequency domain
techniques.
3.2 Least Significant Bit (LSB) Technique:The simplest spatial-domain image watermarking technique is to embed a watermark in
the least significant bits (LSBs) of some randomly selected pixels of the cover image.
Example of least significant bit watermarking Image:
10001010 01110100 00011011 01000001 ...
Watermark:
0 1 1 0 ...
Watermarked Image:
10001010 01110101 00011011 01000000 ...
with their features and results is shown in Table 1.
To provide the security & copyright protection for digital images, it is proposed to study of
security & copyright protection technique like Digital Watermarking .
Types of imags: Medical Image.
Indoor Image.
Outdoor Image.
Satellite Image
Objectives of Research
Combination of Multiple Techniques Used For Combined Encryption And Digital Watermarking
is to be studied.
To calculate the peak signal to noise ratio of watermarked image & compare it with covered
image.
To calculate the elapsed time during watermark for insertion and extraction process.
To calculate the imperceptibility and robustness of watermark image & compare with cover
image.
To calculate the robustness & good capacity of image again various attack such as cropping,
compression , rotation, etc.
After calculating the peak signal to noise ratio, impercepbility ,robustness & good capacity by
using various schemes of digital watermarking Techniques and comparing their results to see
which is the best scheme that can be used for security of digitaison
Comparative study:
Fctors
Robustness
Imprcptibility
Security
unambiguous
Simple watermarking
Less robust
Quality may not be restained
Less scure
More ambigious
Software Requirement.
1)The Software chosen for this research is Matlab (R2010a).
Multiple watermrking
More robust
Assurance of no loss
More secure
Less ambigu
Window-7.
Hardware Requirement
[2] A robust and secure watermarking scheme basedon singular values replacement byAKSHYA KUMAR GUPTA and MEHUL S RAVAL,Sadhana Vol. 37, Part 4, August 2012,
pp. 425440._c Indian Academy of Sciences.
[3] The Robust Digital Image Watermarking using Quantization and Fuzzy Logic Approach in
DWT Domain. by-Nallagarla Ramamurthy, Dr.S.Varadarajan, International Journal of Computer
Science and Network (IJCSN) Volume 1, Issue 5, June 2012 www.ijcsn.org ISSN 2277-5420.
[4] A Survey of Digital Watermarking Techniques for Multimedia Data.byFarooqHusain,MITMuradabad,India,MIT International Journal of Electronics and
Communication Engineering, Vol.2,No.1,Jan 2012,PP(37-43).
[5] Optimization of Digital Image Watermarking Scheme Using Artificial Intelligent
Technique.By-P.Kumsawat, K. Pasitwilitham, K. Attakitmongcol and A. Srikaew ,
INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTERS IN SIMULATION
Issue 1, Volume 6, 2012.
[11] Robust Secure SVD Based DCT DWT Oriented Watermarking Technique for Image
Authentication. S SBedi, Ashwani Kumar, and PiyushKapoor, International Conference on IT to
Celebrate S. Charmonman's 72nd Birthday, March 2009, Thailand.
[14] Watermarking Algorithm Research andImplementation Based on DCT Block. byGengming Zhu, and Nong Sang, World Academy of Science, Engineering and Technology 45,
2008.
[15]Rafael C. Gonzalez and Richard Eugene Woods, Digital image processing Prentice Hall,
2008.
[16] Combined DWT-DCT Digital Image Watermarking. by-Ali Al-Haj, Journal of Computer
Science 3 (9): 740-746, 2007 ISSN 1549-3636 2007 Science Publications.
[18]. Tsai, M. and H. Hung, 2005. "DCT and DWTbasedImage Watermarking Using
Subsampling,"in Proc. of the 2005 IEEE Fourth Int. Conf. onMachine Learning and Cybernetics,
pp: 5308-5313,China.
[19] Robust DWT-SVD Domain Image Watermarking:Embedding Data in All Frequencies. byEmir Ganic andAhmet M. Eskicioglu, MM&SEC'04, September 2021, 2004, Magdeburg,
Germany. Copyright 2004 ACM 1-58113-854-7/04/0009.
[22] Color Image Watermarking based on the DCT-Domain ofThree RGB ColorChannels.By-I.
El-Fegh, D. Mustafa, ZakariaSulimanZubi, Faraj A. El-Mouadib., Proceedings of the 10th
WSEAS International Conference on EVOLUTIONARY COMPUTING, ISSN: 1790-5109
ISBN: 978-960-474-067-3.