SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1709
www.ijarcet.org

Abstract— In today’s digital world, exchange of information
is been held electronically. Therefore there arises the great need
for secure transmission of the concerned data. Various practices
like cryptography, watermarking, compression etc. are common
since past few years. All these techniques were proved to be
excellent in their respective work regarding security. In this
paper a new approach has been presented to provide security at
enhanced level. Here the two techniques namely watermarking
and compression are combined together to enhance the level of
security for data transmission purpose. Here the watermarking
using DCT technique is been combined with image compression
technique using improved adaptive Huffman encoding. The
improved adaptive Huffman coding technique is been based on
Huffman algorithm. This new compression algorithm not only
reduces the number of pass required to encode the data but at
the same time reduces the storage space in comparison to
adaptive Huffman and static Huffman respectively.
Index Terms—Digital watermarking, Image Compression,
Improved adaptive Huffman, Spatial domain
I. INTRODUCTION
Watermarking is one of the most important aspect related
with information hiding. It is a process that is been used to
embed some kind of information inside a guest content: the
guest file can be a multimedia content such as picture, audio
or video. It is basically used for the purpose of copyright
protection and owner authentication. Digital Watermarking
technique gets its name from watermarking, which is very
common since past several years. Digital watermarking is a
technique that provides solution to the many longstanding
problems related with copyright of digital data that can be
detected or extracted later to make out some statement about
the data. This information can be textual data about the
author, its copyright, etc; or it can be an image itself. The
information that needs to be hidden is embedded by
manipulating the contents of the digital data, allowing
someone to identify the original owner, or in the case of illicit
duplication of purchased material, the buyer involved. These
digital watermarks remain inviolate under the conditions
related with transmission/ transformation, allowing one to
protect the ownership rights in digital form. Digital
watermarking has become an active and important area of
research, and development and commercialization of
Manuscript received May, 2013.
Dr. Ajit Singh, Department of Computer science and Engineering,
School of Engineering and sciences, BPSMV, Khanpur Kalan, Sonepat,
India
Meenakshi Gahlawat, Department of Computer science and
Engineering, School of Engineering and sciences, BPSMV, Khanpur Kalan,
Sonepat, India
watermarking techniques is being deemed essential to help
address some of the challenges faced by the rapid
proliferation of digital content. Digital watermarking came to
be in great demand when sharing information on the Internet
became a usual practice. [1], [3]
A. Classifications of Watermarking
1) Visible Watermarks
Visible watermarks are those watermarks which can be
easily perceived by the viewer, and clearly identify the owner.
The visible watermarks are viewable to the normal eye such as
bills, company logos and television channel logos etc. This
type of watermarks can be easily viewed without the
requirement of any mathematical calculation but at the same
time these embedded watermarks can be destroyed easily. [3]
2) Invisible Watermarks
Invisible watermarks are those watermarks that cannot be
perceived by human eyes. This type of watermark is not
visible in the watermarked image without degradation of
image or data. Invisible watermark may be any logo or any
signature. Most research currently focuses on invisible
watermarks, which are imperceptible under normal viewing
conditions. [3]
B. Requirements of Watermarks
The major requirements of digital watermarking are:
1) Transparency:
The watermark that is been embedded should not degrade
the original image quality. And in rare case if any distortions
are visible in the image it tends to degrade the commercial
value of the image. [1]
2) Robustness:
Robustness is simply the notion of how much can be done to
the watermarked image in the form of attacks (deliberate and
otherwise), such that the watermark can still successfully be
extracted from that altered image. In general, a more robust
watermark is preferred to one that is less so. [1]
3) Capacity or Data Load:
This quantity describes the maximum amount of data that
can be embedded into the image to ensure correct removal of
watermark during extraction. [1]
Secure Data Transmission using Watermarking
and Image Compression
Dr. Ajit Singh, Meenakshi Gahlawat
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
www.ijarcet.org
1710
C. GENERAL WATERMARKING SYSTEM
The digital watermarking system essentially consists of a
watermark embedder and a watermark detector. The
watermark embedder inserts a watermark onto the cover
signal and the watermark detector detects the presence of
watermark signal. An entity called watermark key is used
during the process of embedding and detecting watermarks.
The watermark key has a one-to-one correspondence with
watermark signal (i.e., a unique watermark key exists for
every watermark signal).The watermark key is private and
known to only authorized parties and it ensures that only
authorized parties can detect the watermark. Further, the
communication channel can be noisy and hostile (i.e., prone
to security attacks) and hence the digital watermarking
techniques should be resilient to both noise and security
attacks. [3]
Fig1: Digital Watermarking Systems
D. TECNIQUES OF DIGITAL WATERMARKING
1) Spatial Domain Method
Spatial-domain method is been used for embedding the
watermarks into a particular text, image by directly changing
the pixel values of original host images. Some common
spatial-domain algorithms include Least Significant Bit
(LSB) Modification, Patchwork, Texture Block Coding, etc.
The most serious drawback of spatial-domain technologies is
that it tends to provides limited robustness. It is complex for
spatial-domain watermarks to subsist under attacks such as
lossy compression and low-pass filtering. Also the amount of
information that can be embedded in spatial domain is also
very limited. [5]
2) Frequency-Domain Technologies
In comparison to spatial-domain watermark, watermarks in
frequency domain are more robust and much more compatible
to popular image compression standards. Thus
frequency-domain watermarking technique is more widely
used and obtains more attention in comparision to spatial
domain method. To embed a watermark, a frequency
transformation needs to be applied to the host data. Then,
modifications are made to the transform coefficients. Possible
frequency image transformations include the Discrete Fourier
Transform (DFT), Discrete Cosine Transform (DCT) and
others. In recent years they are becoming generally
desolated. [5]
E. APPLICATION OF WATERMARKING
1) Copyright Protection
This is one of the most prominent application of
watermarks. Due to huge exchange of images over insecure
networks, copyright protection becomes a very important
issue. Watermarking an image will prevent its redistribution.
2) Authentication
In some cases there arises the need to identify the
ownership of the contents. All this can be done by embedding
a watermark and providing the owner with a private key that
gives him an access to the message. ID cards, ATM cards,
credit cards are all examples of documents that require
authentication.
3) Broadcast Monitoring
From the name it is clear that broadcast monitoring is been
used to verify the programs that are broadcasted on TV or
radio. It especially helps the advertising companies to see if
their advertisements appeared for the right duration or not.
4) Content Labeling
Watermarks can be used for providing more information
about the cover object. This process is named content
labeling.
5) Tamper Detection
Fragile watermarks can be used to detect tampering in an
image. If the fragile watermark is degraded in any way then
we can say that the image or document in question has been
tampered.
6) Digital Fingerprinting
This is a process that is been used for detecting the owner of
the content. This is so because every fingerprint is the unique
characteristics of the owner.
7) Content protection
In this process the content stamped with a visible watermark
that is very difficult to remove so that it can be publicly and
freely distributed. [1]
II. IMAGE COMPRESSION
It is defined as the reduction of amount of data used to
represent an image by reducing redundant data, so that the
image can be stored or transferred more efficiently. Image
compression is minimizing the size in bytes of a graphics file
without degrading the quality of the image to an unacceptable
level. The reduction in file size allows more images to be
stored in a given amount of disk or memory space. It also
reduces the time required for images to be sent over the
Internet or downloaded from Web pages. [9]
Compression is achieved by the removal of one or more of the
three basic data redundancies:
1. Coding Redundancy
2. Interpixel Redundancy
3. Psychovisual Redundancy
Coding redundancy is present when less than optimal code
words are used. Interpixel redundancy is due to correlations
between the pixels of an image. Psychovisual redundancy
occurs when the data is neglected by the human visual system
(i.e. visually non essential information). Image compression
techniques reduce the number of bits required to represent an
image by taking advantage of these redundancies. An inverse
process called decompression (decoding) is applied to the
compressed data to get the reconstructed image. The
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1711
www.ijarcet.org
objective of compression is to reduce the number of bits as
much as possible, while keeping the resolution and the visual
quality of the reconstructed image as close to the original
image as possible. [10]
A. Benefits of Compression
1) Storage Space
Storage space, such as that provided by computer hard
drives, comes at a price. Compression of the data files allows
to store more files in the storage space that is been available.
Lossless compression, used in zip file technology, will
typically reduce a file to 50 percent of its original size.
However, no difference is seen in the file size if zip files are
already in a compressed format, such as MP3 audio files or
PDF (Portable Document Format) text-only files. [6]
2) Bandwidth and Transfer Speed
The download process uses network bandwidth whenever
we download a file, such as an MP3 audio file, from a server
on to the Internet. Bandwidth is the speed at which the
network transfers data and is measured in terms of Mbps
(megabits per second). Compressed files contain fewer "bits"
of data than uncompressed files, and, as a consequence, use
less bandwidth when we download them. This means that the
transfer speed, that is to say the time taken by the file to be
downloaded, is faster. It will take 10 seconds to download a
file if we have bandwidth of 1Mbps available, and we are
downloading a file that is 10Mb (megabits) in size. It will only
take 5 seconds to download the file if the file is compressed to
5Mb. [6]
3) Cost
The costs of storing the large amount of data are reduced by
compressing our files for storage because by doing so we can
store more files in the available storage space when they are
compressed. We need to buy a second 250MB drive if we
have 500MB (megabytes) of uncompressed data and a
250MB hard drive on which to store it. We will not need to
buy the extra hard drive if we compress the data files to 50
percent of their uncompressed size. This saving can be
applied to the costs of maintaining an Internet connection.
Many contracts with Internet Service Providers (ISP) include
charges for the amount of data that you download. Download
compressed files, and by doing so, one will be downloading
much less data than one would do so when uncompressed files
are been downloaded. The Internet download charges will be
less as a consequence of this. [6]
4) Accuracy
It also reduces the chance of occurrence of transmission
errors since fewer bits are transferred. [10]
5) Security
It also provides a level of security against illegal
monitoring. [10]
B. IMAGE COMPRESSION TECHNIQUES
The image compression techniques are broadly classified
into two categories depending whether or not an exact repro
of the original image could be reconstructed using the
compressed image.
These are:
1. Lossless technique
2. Lossy technique
1) Lossless compression
It is a compression technique that does not lose any data in
the compression process. Lossless compression "packs data"
into a smaller file size by using a kind of internal shorthand to
signify redundant data. If an original file is 1.5MB
(megabytes), lossless compression can reduce it to about half
of that size, depending on the type of file that is being
compressed. This makes lossless compression convenient for
transferring files across the Internet, as smaller files transfer
faster. Lossless compression is also handy for storing files as
they take up less room. The zip convention, used in programs
like WinZip, uses lossless compression. For this reason zip
software is popular for compressing program and data files.
That's because when these files are decompressed, all bytes
must be present to ensure their integrity. If bytes are missing
from a program, it won't run. If bytes are missing from a data
file, it will be incomplete and falsified. GIF image files also
use lossless compression.
Lossless compression has advantages as well as
disadvantages. The advantage is that the compressed file will
decompress to an exact duplicate of the original file,
mirroring its quality. The disadvantage is that the
compression ratio is not all that high, precisely because no
data is lost. [7]
Following techniques are included in lossless compression:
1. Run length encoding
2. Huffman encoding
3. LZW coding
4. Area coding
2) Lossy Compression
It is a compression technique that does not decompress data
back to 100% of the original. Lossy methods provide high
degrees of compression and result in very small compressed
files, but there is a certain amount of loss when they are
restored.
Audio, video and some imaging applications can tolerate
loss, and in many cases, it may not be noticeable to the human
ear or eye. In other cases, it may be noticeable, but not that
critical to the application. The more tolerance for loss, the
smaller the file can be compressed, and the faster the file can
be transmitted over a network. Examples of lossy file formats
are MP3, AAC, MPEG and JPEG.
Lossy compression is never used for business data and text,
which demand a perfect "lossless" restoration. [8]
Lossy schemes tend to provide much higher compression
ratios than lossless schemes. Lossy schemes are widely used
since the quality of the reconstructed images is adequate for
most applications. By this scheme, the decompressed image is
not identical to the original image, but reasonably close to it.
[10]
Lossy compression techniques includes following schemes:
1. Transformation coding
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
www.ijarcet.org
1712
2. Vector quantization
3. Fractal coding
4. Block Truncation Coding
5. Sub band coding
III. PROPOSED SYSTEM
Neither watermarking nor compression can alone make the
data transmission completely secure. Hence the new
technique is been proposed in order to achieve secure
transmission of data by making combine use of image
watermarking using DCT technique and then applying image
compression technique using improved adaptive Huffman
algorithm to it.
Fig. 2 “Flowchart showing the proposed technique”
A. Image Watermarking Using DCT
The DCT allows an image to be split up into the different
frequency bands, making it convient for embedding the
watermarking information into the middle frequency bands of
an image. The middle frequency bands are chosen such that
they have minimized they avoid the most visual important
parts of the image (low frequency) without over-exposing
themselves to removal through compression and noise
attacks. [2]
1) Steps of DCT watermarking
Fig. 3 “DCT Watermarking”
1.Transform the RGB color of the original image into
the formation of Gray color.
2.Then the image is divided into 8 × 8 blocks by
applying JPEG standard as below.
3.Transform the original 8 x 8 block into a
cosine-frequency domain
 C(h) = if (h == 0) then 1/sqrt(2) else 1.0--C(h) is a
auxiliary function been used in main function
F(u,v)
 F(u,v) = ¼ x C(u) x C(v) Σx=0..7 Σy=0..7 Dxy x
cos(π(2u + 1)u/16) x cos(π(2y + 1)v/16)
-Gives encoded pixel at row u, column v
-Dxy is original pixel value at row x, column y
-F(u,v) is new matrix value after DCT apply. [2]
2) Extracting Watermarked Image
Perform DCT transformation on watermarked image and
the original host image. After doing so, subtract original host
image from watermarked image. And finally do
multiplication of extracted watermark by scaling factor to
display. [2]
3) Advantages
1. DCT domain watermarking is comparatively much
beneficial than the spatial domain encoding since
DCT domain watermarking is able to survive against
the attacks such as noising, compression,
sharpening, and filtering.
2. It uses JPEG compression method to apply DCT
watermarking as a parameter. One is able to use
different kinds of parameters related to image
processing and these parameters might provide
equal or even stronger validity against various
attacks based on image processing.
3. In Discrete cosine transform (DCT), pseudorandom
sequences, such as M sequences, are been added at
the middle frequencies of the DCT as signatures. [2]
After image has been watermarked it is been compressed
using a compression algorithm that is based on Huffman
coding. Huffman coding is one of the lossless compression
techniques. Huffman algorithms have two ranges static as
well as adaptive. Static Huffman algorithm is a technique that
encodes the data in two passes. In first pass the frequency of
each symbol is been calculated and in second pass a Huffman
tree needs to be constructed. Adaptive Huffman algorithm is
extended on the basis of Huffman algorithm that constructs
the Huffman tree in one pass but take more space in
comparison to Static Huffman algorithm. The algorithm that
is used not only reduces the number of pass but also reduce
the storage space needed in comparison to adaptive Huffman
algorithm and comparable to static.
4) Static Huffman algorithm
The Static Huffman algorithm was developed by David
Huffman in (1952) is used to generate the encoded data in two
passes that are as follows:
1. The frequency of each of the different symbol present in the
source data is been calculated. After calculating frequencies
the table of all frequencies is been constructed in decreasing
order by sorting each of the different symbol in decreasing
order.
Image
Watermarking using DCT
Watermarked Image
Compression using
Improved Adaptive
Huffman algorithm
Compressed Watermarked
Image
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1713
www.ijarcet.org
2. Then the Huffman tree is generated by combining the least
two symbols into one composite symbol.
But in this method some time the source data available is so
lengthy that it takes so much time to construct a table which in
turns waste a lot of time as well as space required to store the
table. [4]
5) Adaptive Huffman Algorithm
Expanding the static Huffman algorithm, Faller and
Gallagher [Faller 1973; Gallagher 1978], and later Knuth
[Knuth 1985] and Vitter [Vitter 1987], developed a way to
perform Static Huffman algorithm by using one pass method
that is as follows:
Initially Adaptive Huffman algorithm generates a Huffman
tree with all different symbols with frequency count to one
and then it takes the code for first symbol in the source data.
For the second symbol it generates the second Huffman tree
and takes the code for second symbol and so on till last bit
(byte) of source data. [4]
Concept
The basic concept behind an adaptive compression
algorithm is very simple:
1. At the beginning the model is to be initialized
2. Repetition is done for each character
3. {
4. Then encoding is done for the character
5. Finally the model is updated
6. }
Decompression also works in the same way. As long as both
sides have the same initialize and update model algorithms,
they will have the same information. [4]
In Adaptive Huffman algorithm, at the time of encoding of
symbols, we need to update the tree after each symbol is
encoded. Same thing is also been performed in decoding the
code. That means there is processing overburden that is
involved in the process. The encoded data by Adaptive
Huffman algorithm requires more space than Static Huffman
encoded data. The other major drawback of the Adaptive
Huffman algorithm for encoding the data is that it requires in
advance the amount of different symbols that are present in
the source data. So it first needs to scan all the source data to
determine that how many different symbols are present in the
source data. Besides all this some other major drawbacks of
adaptive Huffman algorithm are as follows:
 It is very time consuming, as it first constructs the tree
and then take the code for the symbol, for the next
symbol it adopt the same procedure and same is
repeated ( up to the last symbol).
 In adaptive Huffman algorithm many different
symbols have same code in the encoded data that
creates a lot of confusion while decompressing the
data.
 In adaptive Huffman same symbol that occurs
frequently has different code which can create a lot
of confusion while decompressing the data.
 Finally while decompressing the data we need all
trees, for smaller data it is ok but for large data it
demands a huge storage space.
Thus to overcome all these shortcomings we have new
compression algorithm named Improved adaptive Huffman.
Improved Adaptive Huffman algorithm is based on existing
Huffman algorithm. [4]
B. Improved Adaptive Huffman
It have one pass in comparison to the existing static
Huffman algorithm and at the same times requires less space
for storing the encoded data as compared to adaptive Huffman
algorithm. The proposed method with this algorithm is as
follows:
At initial step Improved adaptive Huffman algorithm will
generate a strictly binary tree by reading first symbol from the
source data, then for the next symbol it generates a tree and so
on up to last symbol of source data. On reading the last
symbol it makes the final Huffman tree. [4]
1) Advantages
Advantages of Improved Adaptive Huffman over Adaptive
Huffman are:
 Improved adaptive Huffman utilizes less space to
store the compressed data.
 It saves the time because here, there is no need to scan
the whole string for constructing the first tree. It also
saves the time while constructing trees e.g. it needs
only one symbol for constructing the first tree unlike
in adaptive Huffman that requires all different
symbols to construct the tree.
 In Improved adaptive Huffman even if one symbol
occurs frequently will tend to have same code.
 In improved adaptive Huffman, while constructing the
next tree there is no need to remember the previous
tree.
 Finally during the process of decompressing the only
final tree is needed.
2) Algorithm
1. Scan the first Symbol and initialize its frequency to 1
2. Then next symbol is been scanned from the source data
If any previous symbol = next symbol then
the frequency of that previous symbol needs to be
incremented
If any previous symbol frequency < recently incremented
symbol frequency
then
Both nodes needs to be interchanged
Else
Initialize their frequency to 1
3. Create strictly binary tree with left and right node (Left or
Right node can be NULL). The root is the composite Symbols
of left and right nodes. Assign value 0 to Right node and 1to
Left node.
4. Step 2 to 4 needs to be repeated till End of Source data is
been reached. [4]
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
www.ijarcet.org
1714
By the use of this algorithm the storage space will be
reduced and time is also been saved. Thus the combination of
the two processes watermarking and compression will results
in providing high security level to the data to be transmitted.
IV. IMPLEMENTATION AND RESULT
The above described work is implemented in JAVA. Firstly
visible watermarking using DCT technique is used to watermark
an image. After that improved adaptive Huffman algorithm is
used to compress the watermarked image to further enchance
security needs of the system.
Fig. 4 Visible Watermarking using DCT
Fig. 5 Compression using adaptive Huffman algorithm
Fig. 6 Compression using improved adaptive Huffman algorithm
Fig. 7 Comparison graph for adaptive Huffman and improved
adaptive Huffman
Fig. 8 PSNR value of watermarked image
V. CONCLUSION
Firstly watermarking is been discussed, its types,
requirements, its various applications, techniques. Secondly
the image compression is been discussed with its techniques.
And finally the new technique watermarking using DCT
combined with image compression using improved adaptive
Huffman algorithm is been presented to enhance the level of
security for the data to be transmitted.
ACKNOWLEDGMENT
I would like to give my sincere gratitude to my guide Dr.
Ajit Singh who guided me throughout, to complete this topic.
REFERENCES
[1] http://www.google.com/#hl=en&sclient=psy-ab&q=Abrar+Ahmed+S
yed_Digital+Watermarking.pdf&oq=Abrar+Ahmed+Syed_Digital+
Watermarking.pdf&gs_l=hp.3...15306.18741.1.19731.5.5.0.0.0.1.21
00.4803.2-1j6-1j0j1j1.4.0...0.0...1c.1.12.psy-ab.412g3Zw_g5g&pbx=
1&bav=on.2,or.r_qf.&bvm=bv.46226182,d.bmk&fp=4fb3eea262101
52c&biw=1366&bih=634J. U. Duncombe, “Infrared navigation—Part
I: An assessment of feasibility,” IEEE Trans. Electron Devices, vol.
ED-11, pp. 34-39, Jan. 1959.
[2] Darshana Mistry / (IJCSE) International Journal on Computer Science
and Engineering Vol. 02, No. 09, 2010, 2905-2909C. Y. Lin, M. Wu,
J. A. Bloom, I. J. Cox, and M. Miller, “Rotation, scale, and translation
resilient public watermarking for images,” IEEE Trans. Image
Process., vol. 10, no. 5, pp. 767-782, May 2001
[3] Watermark Attacks And Applications in Watermarking in National
Workshop-Cum-Conference on Recent Trends in Mathematics and
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1715
www.ijarcet.org
Computing (RTMC) 2011 Proceedings published in International
Journal of Computer Applications® (IJCA)
[4] Improved Adaptive Huffman Compression Algorithm in International
Journal of Computers & Technology Volume 1 No.1 Dec. 2011
[5] A Survey of Digital Watermarking Technologies
www.ee.sunysb.edu/~cvl/ese558/.../Lin%20Liu/ese558report_LinLi
u.pdf‎
[6] www.ehow.comInterne
[7] twww.wisegeek.com/what-is-lossless-compression.htm
[8] www.pcmag.com/encyclopedia/term/46335/lossy-compression
[9] searchcio-midmarket.techtarget.com/definition/image-compressio
[10] www.rimtengg.com/coit2007/proceedings/pdfs/43.pdf “A STUDY OF
VARIOUS IMAGE COMPRESSION TECHNIQUES
Dr. Ajit Singh is presently working as Chairperson of School of
Engineering & Sciences in BPSMV, Khanpur Kalan (Sonepat). He is also
having the additional charge as a Director of University Computer Center
(UGC). He posses qualifications of B.Tech, M.Tech, Ph.D. He is a member
of BOG (Board of Governors) of Haryana State Counselling Society,
Panchkula and also member of academic council in the University. He
published approximate 20 papers in National/ International journals and
conferences and holds a teaching experience of approximate 10 years. He
holds the membership of Internal Quality Assurance cell, UG-BOS
&PG-BOS and the NSS advisory committee. He is also an associate member
of CSI & IETE. His research interests are in Network Security, Computer
Architecture and Data Structure.
Ms. Meenakshi Gahlawat has completed her
B.Tech degree in Computer Science from Maharishi Dayanand University,
Rohtak in year 2011. She is pursuing M.Tech in Computer Science from
BPSMV, Khanpur Kalan from July 2011. Her research interests are in
Network Security and Computer Networks.

Contenu connexe

Tendances

Digital Image Watermarking Using Different Levels of Intermediate Significant...
Digital Image Watermarking Using Different Levels of Intermediate Significant...Digital Image Watermarking Using Different Levels of Intermediate Significant...
Digital Image Watermarking Using Different Levels of Intermediate Significant...CSCJournals
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Publishing House
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Journals
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyAlexander Decker
 
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...CSCJournals
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniquestheijes
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology vijay rastogi
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Samarth Godara
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
 
Digital water marking
Digital water markingDigital water marking
Digital water markingMd Aktar
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 

Tendances (19)

Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
Digital Image Watermarking Using Different Levels of Intermediate Significant...
Digital Image Watermarking Using Different Levels of Intermediate Significant...Digital Image Watermarking Using Different Levels of Intermediate Significant...
Digital Image Watermarking Using Different Levels of Intermediate Significant...
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
Ppt nc
Ppt ncPpt nc
Ppt nc
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 

En vedette

Ijarcet vol-2-issue-2-323-329
Ijarcet vol-2-issue-2-323-329Ijarcet vol-2-issue-2-323-329
Ijarcet vol-2-issue-2-323-329Editor IJARCET
 
La familia feliz
La familia felizLa familia feliz
La familia felizjunior2232
 
Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932Editor IJARCET
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
¿Qué hacer cuando cambias de casa?
¿Qué hacer cuando cambias de casa?¿Qué hacer cuando cambias de casa?
¿Qué hacer cuando cambias de casa?LimpiezasExpress
 
CertifUCP
CertifUCPCertifUCP
CertifUCPAcncc
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
resume . doc rev 6mb aug 16 ) - no adress
resume . doc rev 6mb aug 16 ) - no adressresume . doc rev 6mb aug 16 ) - no adress
resume . doc rev 6mb aug 16 ) - no adressMichael Bartlett
 

En vedette (10)

1841 1843
1841 18431841 1843
1841 1843
 
Ijarcet vol-2-issue-2-323-329
Ijarcet vol-2-issue-2-323-329Ijarcet vol-2-issue-2-323-329
Ijarcet vol-2-issue-2-323-329
 
La familia feliz
La familia felizLa familia feliz
La familia feliz
 
Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
¿Qué hacer cuando cambias de casa?
¿Qué hacer cuando cambias de casa?¿Qué hacer cuando cambias de casa?
¿Qué hacer cuando cambias de casa?
 
CertifUCP
CertifUCPCertifUCP
CertifUCP
 
IOSH
IOSHIOSH
IOSH
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
resume . doc rev 6mb aug 16 ) - no adress
resume . doc rev 6mb aug 16 ) - no adressresume . doc rev 6mb aug 16 ) - no adress
resume . doc rev 6mb aug 16 ) - no adress
 

Similaire à 1709 1715

A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarkingijsrd.com
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))IAESIJEECS
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageIOSR Journals
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET Journal
 
A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...Editor IJCATR
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...ijsrd.com
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET Journal
 
A Robust Watermarking Technique Based On Dwt on Digital Images
A Robust Watermarking Technique Based On Dwt on Digital  ImagesA Robust Watermarking Technique Based On Dwt on Digital  Images
A Robust Watermarking Technique Based On Dwt on Digital ImagesIJMER
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewEditor IJCATR
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingEditor IJMTER
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000authority12
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueIRJET Journal
 

Similaire à 1709 1715 (20)

A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarking
 
B011110614
B011110614B011110614
B011110614
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud Computing
 
B010510613
B010510613B010510613
B010510613
 
A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
A Robust Watermarking Technique Based On Dwt on Digital Images
A Robust Watermarking Technique Based On Dwt on Digital  ImagesA Robust Watermarking Technique Based On Dwt on Digital  Images
A Robust Watermarking Technique Based On Dwt on Digital Images
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
 
Dz31840846
Dz31840846Dz31840846
Dz31840846
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
 

Plus de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Editor IJARCET
 

Plus de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
 

Dernier

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Dernier (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

1709 1715

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1709 www.ijarcet.org  Abstract— In today’s digital world, exchange of information is been held electronically. Therefore there arises the great need for secure transmission of the concerned data. Various practices like cryptography, watermarking, compression etc. are common since past few years. All these techniques were proved to be excellent in their respective work regarding security. In this paper a new approach has been presented to provide security at enhanced level. Here the two techniques namely watermarking and compression are combined together to enhance the level of security for data transmission purpose. Here the watermarking using DCT technique is been combined with image compression technique using improved adaptive Huffman encoding. The improved adaptive Huffman coding technique is been based on Huffman algorithm. This new compression algorithm not only reduces the number of pass required to encode the data but at the same time reduces the storage space in comparison to adaptive Huffman and static Huffman respectively. Index Terms—Digital watermarking, Image Compression, Improved adaptive Huffman, Spatial domain I. INTRODUCTION Watermarking is one of the most important aspect related with information hiding. It is a process that is been used to embed some kind of information inside a guest content: the guest file can be a multimedia content such as picture, audio or video. It is basically used for the purpose of copyright protection and owner authentication. Digital Watermarking technique gets its name from watermarking, which is very common since past several years. Digital watermarking is a technique that provides solution to the many longstanding problems related with copyright of digital data that can be detected or extracted later to make out some statement about the data. This information can be textual data about the author, its copyright, etc; or it can be an image itself. The information that needs to be hidden is embedded by manipulating the contents of the digital data, allowing someone to identify the original owner, or in the case of illicit duplication of purchased material, the buyer involved. These digital watermarks remain inviolate under the conditions related with transmission/ transformation, allowing one to protect the ownership rights in digital form. Digital watermarking has become an active and important area of research, and development and commercialization of Manuscript received May, 2013. Dr. Ajit Singh, Department of Computer science and Engineering, School of Engineering and sciences, BPSMV, Khanpur Kalan, Sonepat, India Meenakshi Gahlawat, Department of Computer science and Engineering, School of Engineering and sciences, BPSMV, Khanpur Kalan, Sonepat, India watermarking techniques is being deemed essential to help address some of the challenges faced by the rapid proliferation of digital content. Digital watermarking came to be in great demand when sharing information on the Internet became a usual practice. [1], [3] A. Classifications of Watermarking 1) Visible Watermarks Visible watermarks are those watermarks which can be easily perceived by the viewer, and clearly identify the owner. The visible watermarks are viewable to the normal eye such as bills, company logos and television channel logos etc. This type of watermarks can be easily viewed without the requirement of any mathematical calculation but at the same time these embedded watermarks can be destroyed easily. [3] 2) Invisible Watermarks Invisible watermarks are those watermarks that cannot be perceived by human eyes. This type of watermark is not visible in the watermarked image without degradation of image or data. Invisible watermark may be any logo or any signature. Most research currently focuses on invisible watermarks, which are imperceptible under normal viewing conditions. [3] B. Requirements of Watermarks The major requirements of digital watermarking are: 1) Transparency: The watermark that is been embedded should not degrade the original image quality. And in rare case if any distortions are visible in the image it tends to degrade the commercial value of the image. [1] 2) Robustness: Robustness is simply the notion of how much can be done to the watermarked image in the form of attacks (deliberate and otherwise), such that the watermark can still successfully be extracted from that altered image. In general, a more robust watermark is preferred to one that is less so. [1] 3) Capacity or Data Load: This quantity describes the maximum amount of data that can be embedded into the image to ensure correct removal of watermark during extraction. [1] Secure Data Transmission using Watermarking and Image Compression Dr. Ajit Singh, Meenakshi Gahlawat
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 www.ijarcet.org 1710 C. GENERAL WATERMARKING SYSTEM The digital watermarking system essentially consists of a watermark embedder and a watermark detector. The watermark embedder inserts a watermark onto the cover signal and the watermark detector detects the presence of watermark signal. An entity called watermark key is used during the process of embedding and detecting watermarks. The watermark key has a one-to-one correspondence with watermark signal (i.e., a unique watermark key exists for every watermark signal).The watermark key is private and known to only authorized parties and it ensures that only authorized parties can detect the watermark. Further, the communication channel can be noisy and hostile (i.e., prone to security attacks) and hence the digital watermarking techniques should be resilient to both noise and security attacks. [3] Fig1: Digital Watermarking Systems D. TECNIQUES OF DIGITAL WATERMARKING 1) Spatial Domain Method Spatial-domain method is been used for embedding the watermarks into a particular text, image by directly changing the pixel values of original host images. Some common spatial-domain algorithms include Least Significant Bit (LSB) Modification, Patchwork, Texture Block Coding, etc. The most serious drawback of spatial-domain technologies is that it tends to provides limited robustness. It is complex for spatial-domain watermarks to subsist under attacks such as lossy compression and low-pass filtering. Also the amount of information that can be embedded in spatial domain is also very limited. [5] 2) Frequency-Domain Technologies In comparison to spatial-domain watermark, watermarks in frequency domain are more robust and much more compatible to popular image compression standards. Thus frequency-domain watermarking technique is more widely used and obtains more attention in comparision to spatial domain method. To embed a watermark, a frequency transformation needs to be applied to the host data. Then, modifications are made to the transform coefficients. Possible frequency image transformations include the Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT) and others. In recent years they are becoming generally desolated. [5] E. APPLICATION OF WATERMARKING 1) Copyright Protection This is one of the most prominent application of watermarks. Due to huge exchange of images over insecure networks, copyright protection becomes a very important issue. Watermarking an image will prevent its redistribution. 2) Authentication In some cases there arises the need to identify the ownership of the contents. All this can be done by embedding a watermark and providing the owner with a private key that gives him an access to the message. ID cards, ATM cards, credit cards are all examples of documents that require authentication. 3) Broadcast Monitoring From the name it is clear that broadcast monitoring is been used to verify the programs that are broadcasted on TV or radio. It especially helps the advertising companies to see if their advertisements appeared for the right duration or not. 4) Content Labeling Watermarks can be used for providing more information about the cover object. This process is named content labeling. 5) Tamper Detection Fragile watermarks can be used to detect tampering in an image. If the fragile watermark is degraded in any way then we can say that the image or document in question has been tampered. 6) Digital Fingerprinting This is a process that is been used for detecting the owner of the content. This is so because every fingerprint is the unique characteristics of the owner. 7) Content protection In this process the content stamped with a visible watermark that is very difficult to remove so that it can be publicly and freely distributed. [1] II. IMAGE COMPRESSION It is defined as the reduction of amount of data used to represent an image by reducing redundant data, so that the image can be stored or transferred more efficiently. Image compression is minimizing the size in bytes of a graphics file without degrading the quality of the image to an unacceptable level. The reduction in file size allows more images to be stored in a given amount of disk or memory space. It also reduces the time required for images to be sent over the Internet or downloaded from Web pages. [9] Compression is achieved by the removal of one or more of the three basic data redundancies: 1. Coding Redundancy 2. Interpixel Redundancy 3. Psychovisual Redundancy Coding redundancy is present when less than optimal code words are used. Interpixel redundancy is due to correlations between the pixels of an image. Psychovisual redundancy occurs when the data is neglected by the human visual system (i.e. visually non essential information). Image compression techniques reduce the number of bits required to represent an image by taking advantage of these redundancies. An inverse process called decompression (decoding) is applied to the compressed data to get the reconstructed image. The
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1711 www.ijarcet.org objective of compression is to reduce the number of bits as much as possible, while keeping the resolution and the visual quality of the reconstructed image as close to the original image as possible. [10] A. Benefits of Compression 1) Storage Space Storage space, such as that provided by computer hard drives, comes at a price. Compression of the data files allows to store more files in the storage space that is been available. Lossless compression, used in zip file technology, will typically reduce a file to 50 percent of its original size. However, no difference is seen in the file size if zip files are already in a compressed format, such as MP3 audio files or PDF (Portable Document Format) text-only files. [6] 2) Bandwidth and Transfer Speed The download process uses network bandwidth whenever we download a file, such as an MP3 audio file, from a server on to the Internet. Bandwidth is the speed at which the network transfers data and is measured in terms of Mbps (megabits per second). Compressed files contain fewer "bits" of data than uncompressed files, and, as a consequence, use less bandwidth when we download them. This means that the transfer speed, that is to say the time taken by the file to be downloaded, is faster. It will take 10 seconds to download a file if we have bandwidth of 1Mbps available, and we are downloading a file that is 10Mb (megabits) in size. It will only take 5 seconds to download the file if the file is compressed to 5Mb. [6] 3) Cost The costs of storing the large amount of data are reduced by compressing our files for storage because by doing so we can store more files in the available storage space when they are compressed. We need to buy a second 250MB drive if we have 500MB (megabytes) of uncompressed data and a 250MB hard drive on which to store it. We will not need to buy the extra hard drive if we compress the data files to 50 percent of their uncompressed size. This saving can be applied to the costs of maintaining an Internet connection. Many contracts with Internet Service Providers (ISP) include charges for the amount of data that you download. Download compressed files, and by doing so, one will be downloading much less data than one would do so when uncompressed files are been downloaded. The Internet download charges will be less as a consequence of this. [6] 4) Accuracy It also reduces the chance of occurrence of transmission errors since fewer bits are transferred. [10] 5) Security It also provides a level of security against illegal monitoring. [10] B. IMAGE COMPRESSION TECHNIQUES The image compression techniques are broadly classified into two categories depending whether or not an exact repro of the original image could be reconstructed using the compressed image. These are: 1. Lossless technique 2. Lossy technique 1) Lossless compression It is a compression technique that does not lose any data in the compression process. Lossless compression "packs data" into a smaller file size by using a kind of internal shorthand to signify redundant data. If an original file is 1.5MB (megabytes), lossless compression can reduce it to about half of that size, depending on the type of file that is being compressed. This makes lossless compression convenient for transferring files across the Internet, as smaller files transfer faster. Lossless compression is also handy for storing files as they take up less room. The zip convention, used in programs like WinZip, uses lossless compression. For this reason zip software is popular for compressing program and data files. That's because when these files are decompressed, all bytes must be present to ensure their integrity. If bytes are missing from a program, it won't run. If bytes are missing from a data file, it will be incomplete and falsified. GIF image files also use lossless compression. Lossless compression has advantages as well as disadvantages. The advantage is that the compressed file will decompress to an exact duplicate of the original file, mirroring its quality. The disadvantage is that the compression ratio is not all that high, precisely because no data is lost. [7] Following techniques are included in lossless compression: 1. Run length encoding 2. Huffman encoding 3. LZW coding 4. Area coding 2) Lossy Compression It is a compression technique that does not decompress data back to 100% of the original. Lossy methods provide high degrees of compression and result in very small compressed files, but there is a certain amount of loss when they are restored. Audio, video and some imaging applications can tolerate loss, and in many cases, it may not be noticeable to the human ear or eye. In other cases, it may be noticeable, but not that critical to the application. The more tolerance for loss, the smaller the file can be compressed, and the faster the file can be transmitted over a network. Examples of lossy file formats are MP3, AAC, MPEG and JPEG. Lossy compression is never used for business data and text, which demand a perfect "lossless" restoration. [8] Lossy schemes tend to provide much higher compression ratios than lossless schemes. Lossy schemes are widely used since the quality of the reconstructed images is adequate for most applications. By this scheme, the decompressed image is not identical to the original image, but reasonably close to it. [10] Lossy compression techniques includes following schemes: 1. Transformation coding
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 www.ijarcet.org 1712 2. Vector quantization 3. Fractal coding 4. Block Truncation Coding 5. Sub band coding III. PROPOSED SYSTEM Neither watermarking nor compression can alone make the data transmission completely secure. Hence the new technique is been proposed in order to achieve secure transmission of data by making combine use of image watermarking using DCT technique and then applying image compression technique using improved adaptive Huffman algorithm to it. Fig. 2 “Flowchart showing the proposed technique” A. Image Watermarking Using DCT The DCT allows an image to be split up into the different frequency bands, making it convient for embedding the watermarking information into the middle frequency bands of an image. The middle frequency bands are chosen such that they have minimized they avoid the most visual important parts of the image (low frequency) without over-exposing themselves to removal through compression and noise attacks. [2] 1) Steps of DCT watermarking Fig. 3 “DCT Watermarking” 1.Transform the RGB color of the original image into the formation of Gray color. 2.Then the image is divided into 8 × 8 blocks by applying JPEG standard as below. 3.Transform the original 8 x 8 block into a cosine-frequency domain  C(h) = if (h == 0) then 1/sqrt(2) else 1.0--C(h) is a auxiliary function been used in main function F(u,v)  F(u,v) = ¼ x C(u) x C(v) Σx=0..7 Σy=0..7 Dxy x cos(π(2u + 1)u/16) x cos(π(2y + 1)v/16) -Gives encoded pixel at row u, column v -Dxy is original pixel value at row x, column y -F(u,v) is new matrix value after DCT apply. [2] 2) Extracting Watermarked Image Perform DCT transformation on watermarked image and the original host image. After doing so, subtract original host image from watermarked image. And finally do multiplication of extracted watermark by scaling factor to display. [2] 3) Advantages 1. DCT domain watermarking is comparatively much beneficial than the spatial domain encoding since DCT domain watermarking is able to survive against the attacks such as noising, compression, sharpening, and filtering. 2. It uses JPEG compression method to apply DCT watermarking as a parameter. One is able to use different kinds of parameters related to image processing and these parameters might provide equal or even stronger validity against various attacks based on image processing. 3. In Discrete cosine transform (DCT), pseudorandom sequences, such as M sequences, are been added at the middle frequencies of the DCT as signatures. [2] After image has been watermarked it is been compressed using a compression algorithm that is based on Huffman coding. Huffman coding is one of the lossless compression techniques. Huffman algorithms have two ranges static as well as adaptive. Static Huffman algorithm is a technique that encodes the data in two passes. In first pass the frequency of each symbol is been calculated and in second pass a Huffman tree needs to be constructed. Adaptive Huffman algorithm is extended on the basis of Huffman algorithm that constructs the Huffman tree in one pass but take more space in comparison to Static Huffman algorithm. The algorithm that is used not only reduces the number of pass but also reduce the storage space needed in comparison to adaptive Huffman algorithm and comparable to static. 4) Static Huffman algorithm The Static Huffman algorithm was developed by David Huffman in (1952) is used to generate the encoded data in two passes that are as follows: 1. The frequency of each of the different symbol present in the source data is been calculated. After calculating frequencies the table of all frequencies is been constructed in decreasing order by sorting each of the different symbol in decreasing order. Image Watermarking using DCT Watermarked Image Compression using Improved Adaptive Huffman algorithm Compressed Watermarked Image
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1713 www.ijarcet.org 2. Then the Huffman tree is generated by combining the least two symbols into one composite symbol. But in this method some time the source data available is so lengthy that it takes so much time to construct a table which in turns waste a lot of time as well as space required to store the table. [4] 5) Adaptive Huffman Algorithm Expanding the static Huffman algorithm, Faller and Gallagher [Faller 1973; Gallagher 1978], and later Knuth [Knuth 1985] and Vitter [Vitter 1987], developed a way to perform Static Huffman algorithm by using one pass method that is as follows: Initially Adaptive Huffman algorithm generates a Huffman tree with all different symbols with frequency count to one and then it takes the code for first symbol in the source data. For the second symbol it generates the second Huffman tree and takes the code for second symbol and so on till last bit (byte) of source data. [4] Concept The basic concept behind an adaptive compression algorithm is very simple: 1. At the beginning the model is to be initialized 2. Repetition is done for each character 3. { 4. Then encoding is done for the character 5. Finally the model is updated 6. } Decompression also works in the same way. As long as both sides have the same initialize and update model algorithms, they will have the same information. [4] In Adaptive Huffman algorithm, at the time of encoding of symbols, we need to update the tree after each symbol is encoded. Same thing is also been performed in decoding the code. That means there is processing overburden that is involved in the process. The encoded data by Adaptive Huffman algorithm requires more space than Static Huffman encoded data. The other major drawback of the Adaptive Huffman algorithm for encoding the data is that it requires in advance the amount of different symbols that are present in the source data. So it first needs to scan all the source data to determine that how many different symbols are present in the source data. Besides all this some other major drawbacks of adaptive Huffman algorithm are as follows:  It is very time consuming, as it first constructs the tree and then take the code for the symbol, for the next symbol it adopt the same procedure and same is repeated ( up to the last symbol).  In adaptive Huffman algorithm many different symbols have same code in the encoded data that creates a lot of confusion while decompressing the data.  In adaptive Huffman same symbol that occurs frequently has different code which can create a lot of confusion while decompressing the data.  Finally while decompressing the data we need all trees, for smaller data it is ok but for large data it demands a huge storage space. Thus to overcome all these shortcomings we have new compression algorithm named Improved adaptive Huffman. Improved Adaptive Huffman algorithm is based on existing Huffman algorithm. [4] B. Improved Adaptive Huffman It have one pass in comparison to the existing static Huffman algorithm and at the same times requires less space for storing the encoded data as compared to adaptive Huffman algorithm. The proposed method with this algorithm is as follows: At initial step Improved adaptive Huffman algorithm will generate a strictly binary tree by reading first symbol from the source data, then for the next symbol it generates a tree and so on up to last symbol of source data. On reading the last symbol it makes the final Huffman tree. [4] 1) Advantages Advantages of Improved Adaptive Huffman over Adaptive Huffman are:  Improved adaptive Huffman utilizes less space to store the compressed data.  It saves the time because here, there is no need to scan the whole string for constructing the first tree. It also saves the time while constructing trees e.g. it needs only one symbol for constructing the first tree unlike in adaptive Huffman that requires all different symbols to construct the tree.  In Improved adaptive Huffman even if one symbol occurs frequently will tend to have same code.  In improved adaptive Huffman, while constructing the next tree there is no need to remember the previous tree.  Finally during the process of decompressing the only final tree is needed. 2) Algorithm 1. Scan the first Symbol and initialize its frequency to 1 2. Then next symbol is been scanned from the source data If any previous symbol = next symbol then the frequency of that previous symbol needs to be incremented If any previous symbol frequency < recently incremented symbol frequency then Both nodes needs to be interchanged Else Initialize their frequency to 1 3. Create strictly binary tree with left and right node (Left or Right node can be NULL). The root is the composite Symbols of left and right nodes. Assign value 0 to Right node and 1to Left node. 4. Step 2 to 4 needs to be repeated till End of Source data is been reached. [4]
  • 6. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 www.ijarcet.org 1714 By the use of this algorithm the storage space will be reduced and time is also been saved. Thus the combination of the two processes watermarking and compression will results in providing high security level to the data to be transmitted. IV. IMPLEMENTATION AND RESULT The above described work is implemented in JAVA. Firstly visible watermarking using DCT technique is used to watermark an image. After that improved adaptive Huffman algorithm is used to compress the watermarked image to further enchance security needs of the system. Fig. 4 Visible Watermarking using DCT Fig. 5 Compression using adaptive Huffman algorithm Fig. 6 Compression using improved adaptive Huffman algorithm Fig. 7 Comparison graph for adaptive Huffman and improved adaptive Huffman Fig. 8 PSNR value of watermarked image V. CONCLUSION Firstly watermarking is been discussed, its types, requirements, its various applications, techniques. Secondly the image compression is been discussed with its techniques. And finally the new technique watermarking using DCT combined with image compression using improved adaptive Huffman algorithm is been presented to enhance the level of security for the data to be transmitted. ACKNOWLEDGMENT I would like to give my sincere gratitude to my guide Dr. Ajit Singh who guided me throughout, to complete this topic. REFERENCES [1] http://www.google.com/#hl=en&sclient=psy-ab&q=Abrar+Ahmed+S yed_Digital+Watermarking.pdf&oq=Abrar+Ahmed+Syed_Digital+ Watermarking.pdf&gs_l=hp.3...15306.18741.1.19731.5.5.0.0.0.1.21 00.4803.2-1j6-1j0j1j1.4.0...0.0...1c.1.12.psy-ab.412g3Zw_g5g&pbx= 1&bav=on.2,or.r_qf.&bvm=bv.46226182,d.bmk&fp=4fb3eea262101 52c&biw=1366&bih=634J. U. Duncombe, “Infrared navigation—Part I: An assessment of feasibility,” IEEE Trans. Electron Devices, vol. ED-11, pp. 34-39, Jan. 1959. [2] Darshana Mistry / (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 09, 2010, 2905-2909C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, and M. Miller, “Rotation, scale, and translation resilient public watermarking for images,” IEEE Trans. Image Process., vol. 10, no. 5, pp. 767-782, May 2001 [3] Watermark Attacks And Applications in Watermarking in National Workshop-Cum-Conference on Recent Trends in Mathematics and
  • 7. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1715 www.ijarcet.org Computing (RTMC) 2011 Proceedings published in International Journal of Computer Applications® (IJCA) [4] Improved Adaptive Huffman Compression Algorithm in International Journal of Computers & Technology Volume 1 No.1 Dec. 2011 [5] A Survey of Digital Watermarking Technologies www.ee.sunysb.edu/~cvl/ese558/.../Lin%20Liu/ese558report_LinLi u.pdf‎ [6] www.ehow.comInterne [7] twww.wisegeek.com/what-is-lossless-compression.htm [8] www.pcmag.com/encyclopedia/term/46335/lossy-compression [9] searchcio-midmarket.techtarget.com/definition/image-compressio [10] www.rimtengg.com/coit2007/proceedings/pdfs/43.pdf “A STUDY OF VARIOUS IMAGE COMPRESSION TECHNIQUES Dr. Ajit Singh is presently working as Chairperson of School of Engineering & Sciences in BPSMV, Khanpur Kalan (Sonepat). He is also having the additional charge as a Director of University Computer Center (UGC). He posses qualifications of B.Tech, M.Tech, Ph.D. He is a member of BOG (Board of Governors) of Haryana State Counselling Society, Panchkula and also member of academic council in the University. He published approximate 20 papers in National/ International journals and conferences and holds a teaching experience of approximate 10 years. He holds the membership of Internal Quality Assurance cell, UG-BOS &PG-BOS and the NSS advisory committee. He is also an associate member of CSI & IETE. His research interests are in Network Security, Computer Architecture and Data Structure. Ms. Meenakshi Gahlawat has completed her B.Tech degree in Computer Science from Maharishi Dayanand University, Rohtak in year 2011. She is pursuing M.Tech in Computer Science from BPSMV, Khanpur Kalan from July 2011. Her research interests are in Network Security and Computer Networks.