SlideShare a Scribd company logo
1 of 5
Download to read offline
ISSN: 2278 – 1323
      International Journal of Advanced Research in Computer Engineering & Technology
                                                           Volume 1, Issue 5, July 2012


     A New Fragile Approach for Optimization in
       Invisible Image Watermarking by Using
             Symmetric Key Algorithms
                                                Vandana Tehlani
Abstract- In the information technology and                    This approach consists of following terminologies:
communication, the most important factor has                  1. Plaintext: The original data that has to be
been the security of information and one of the               communicated to the recipient.
methods is watermarking. The Watermarking                     2. Cover Image: An Image which is acts as a cover
aims to validate the host and the undeniable                  in which the secret message is to be concealed.
identity of the legal owner. In this paper, we will           3. Embedding Process: The process of embedding
concentrate on hidden watermarks. At one time,                or inserting the secret text into the cover image
it deals with two different images in BMP to                  with the help of any suitable algorithm.
hide information. The message will be dividing                4. Watermark Image: The image resulted after the
evenly in both images to maximize the security                completion of embedding process which looks as
of image watermarking. It utilizes the LSB                    exactly as the cover image without any suspicion of
manipulation method and the images addresses                  the presence of secret text inside it.
used as key are also encrypted for performance                5. Extraction Process: The process of extracting or
improvement with existing Symmetric key                       revealing the original message from a received
algorithms. There are two options to choose                   watermark image by using the same algorithm that
either DES or AES algorithm to get optimized                  the sender has chosen.
output. We are using spatial domain for hiding                6. Optimization: It is a collection of methods and
actual information inside images.                             techniques to design and make use of engineering
                                                              systems as perfectly as possible with respect to
This paper gives a brief idea about the new                   specific parameters. [1]
image watermarking approach that make use of
LSB algorithm for embedding the data into the                 II.      TYPES OF WATERMARKING
bit map images (.bmp) which is implemented
through the Microsoft .NET framework.                                  Digital watermarking is the process of
                                                              Embedding information into a digital signal
                                                              which may be used to verify its authenticity or
Keyword: DES, AES, LBS method, Invisible                      the identity of its owners. There are two types of
Image Watermarking.                                           digital watermarking as follows-

I.       INTRODUCTION                                               1) Visible Watermarking
                                                                    2) Invisible Watermarking
The information can be encrypted in several forms.
There are many different methods have been                       In visible digital watermarking, the information
developed to encrypt and decrypt data in order to             is visible in the picture or video. Typically, the
keep the message secret. For securing the secrecy             information is text or a logo, which identifies the
one of the advanced method is Watermarking.                   owner of the media. The image on the right has a
                                                              visible watermark. When a television broadcaster
             Watermarking is the art of hiding and            adds its logo to the corner of transmitted video, this
transmitting data through apparently innocuous                also is a visible watermark.
carriers in an effort to conceal the existence of data.
In this method the data which is to be sent is                    In invisible digital watermarking, information is
concealed in any multimedia file like image, video            added as digital data to audio, picture, or video, but
or an audio file.                                             it cannot be perceived as such (although it may be
                                                              possible to detect that some amount of information
We are going to deal with Image Watermarking                  is hidden in the signal). The watermark may be
and hence hereafter if we refer Watermarking it               intended for widespread use and thus, is made easy
actually keeps points to image Watermarking.                  to retrieve or, it may be a form of watermarking,


                                         All Rights Reserved © 2012 IJARCET
                                                                                                               167
ISSN: 2278 – 1323
           International Journal of Advanced Research in Computer Engineering & Technology
                                                                Volume 1, Issue 5, July 2012

where a party communicates a secret message                    and use the RGB colour model, also known as true
embedded in the digital signal. In either case, as in          colour. When using a 24-bit image, a bit of each of
visible watermarking, the objective is to attach               the red, green and blue colour components can be
ownership or other descriptive information to the              used, since they are each represented by a byte. In
signal in a way that is difficult to remove. It also is        other words, one can store 3 bits in each pixel. An
possible to use hidden embedded information as a               800 × 600 pixel image, can thus store a total
means of covert communication between                          amount of 1,440,000 bits or 180,000 bytes of
individuals.                                                   embedded data.[4] [12]

Watermarking techniques are used to decide the
domain, there are two types of techniques for
images, and they are-

       1) Frequency Domain Watermarking
       2) Spatial Domain Watermarking

       •    Frequency Domain Watermarking: First
            convert the image to the frequency domain
            and then apply the watermark in the low
            frequency regions.

       •    Spatial Domain Watermarking:          Just
            change some of the values of the pixels in
            the lower bit plane; e.g., Change some of
            the bits from 1 to 0 or 0 to 1. [13] The
            Spatial     Domain       Watermarking   is         Fig- Least Significant Bit manipulation
            classified in different classes.
                                                               It's best that we work with a true color image. This
     In this paper, we are using Spatial Domain
                                                               way, we can manipulate the LSB of a pixel-color
Watermarking with the invisible watermarking
                                                               without the human eye understanding the
Images with the best known watermarking method
                                                               difference. Specifically, the blue color of pixels is
that works in the spatial domain is the LSB (Least
                                                               chosen because it's the most unnoticed for the
Significant Bit), which replaces the least significant
                                                               human eye. This method is very fragile. It will fail
bits of pixels selected to hide the information. The
                                                               holding the watermark even with the slightest
"LSB watermark" options save the final images in
                                                               manipulation of the image. This is why this method
BMP format as it is a format with no compression.
                                                               can be used for image authenticity and maximizes
                                                               the robustness of the hidden data.
III.        LSB  MANIPULATION                       IN
            IMAGES                                             This paper will focus on hiding information in
                                                               images by LSB manipulation. At the time of
     In the digital representation, images are the             encryption, the message will be hiding in two
most popular cover objects for watermarking.                   different images evenly. Inverse of same process
Applied in the spatial domain, this method of                  follows at decryption, LSB manipulated first image
watermarking is very effective method for hiding               gives half message and another half message will
actual information inside images. In this                      be given by second image. We can use more than
manipulation, the information to be watermarked                two images to hide information further. These
(simple text in this case) is converted to 'bits' [0-1].       images information will be optimally secured by
Then "random" chosen pixels are ANDed with the                 using symmetric key algorithm such as DES and
number 254 ["00000001"] so the LSB is turned to                AES.
0. Finally, the information is inserted by adding the
watermark info bits to the luminance value of the
                                                               IV.        WORKING ALGORITHM
chosen pixels.

The least significant bit (in other words, the 8th bit)              A. Data Encryption Standard
of some or all of the bytes inside an image is
changed to a bit of the secret message. Digital                DES is an algorithm that takes a fixed-length string
colour images are typically stored in 24-bit files             of plaintext bits and transforms it through a series
                                                               of complicated operations into another ciphertext


                                          All Rights Reserved © 2012 IJARCET
                                                                                                               168
ISSN: 2278 – 1323
       International Journal of Advanced Research in Computer Engineering & Technology
                                                            Volume 1, Issue 5, July 2012

bitstring of the same length. In the case of DES, the        AES operates on a 4×4 column-major order matrix
block size is 64 bits. DES also uses a key to                of bytes, termed the state (versions of Rijndael with
customize the transformation, so that decryption             a larger block size have additional columns in the
can supposedly only be performed by those who                state). Most AES calculations are done in a special
know the particular key used to encrypt. The key             finite field.
ostensibly consists of 64 bits; however, only 56 of
these are actually used by the algorithm. Eight bits         The AES cipher is specified as a number of
are used solely for checking parity, and are                 repetitions of transformation rounds that convert
thereafter discarded. Hence the effective key length         the input plaintext into the final output of
is 56 bits, and it is never quoted as such. Every 8th        ciphertext. The numbers of cycles of repetition are
bit of the selected key is discarded, that is,               as follows:
positions 8, 16, 24, 32, 40, 48, 56, 64 are removed
from the 64 bit key leaving behind only the 56 bit            10 cycles of repetition for 128 bit keys.
key.                                                          12 cycles of repetition for 192 bit keys.
The algorithm's overall structure is shown in                 14 cycles of repetition for 256 bit keys.
Figure: there are 16 identical stages of processing,
termed rounds. There is also an initial and final            Each round consists of several processing steps,
permutation, termed IP and FP, which are inverses.           including one that depends on the encryption key.
Before the main rounds, the block is divided into            A set of reverse rounds are applied to transform
two 32-bit halves and processed alternately; this            ciphertext back into the original plaintext using the
criss-crossing is known as the Feistel scheme.               same encryption key.




                                                             V.       PROPOSED   WORK                          &
Figure: The process of DES algorithm                                  METHODOLGY

     B. Advanced Encryption                                    We effectively using LSB method and DES and
                                                             AES algorithm and derived a watermarked model.
        Standard                                             There are only two functions, one for embedding
                                                             and one for detecting the watermark. This approach
AES Originally called Rijndael.It is based on a
                                                             will surely enhance the performance and security
design principle known as a substitution-
                                                             and the steps are to be taken place in the following
permutation network. It is fast in both software and
                                                             order,
hardware. Unlike its predecessor, DES, AES does
not use a Feistel network.
                                                              1.   Getting the images are loaded from the user.
AES has a fixed block size of 128 bits and a key
                                                              2.   Now filling the information for encrypting
size of 128, 192, or 256 bits, whereas Rijndael is
                                                                   message accompanied that will be encrypted
specified with block and key sizes in any multiple
                                                                   in two images which are divided evenly.
of 32 bits, both with a minimum of 128 and a
maximum of 256 bits.
                                                              3.   These will be manipulating the LSB of a




                                        All Rights Reserved © 2012 IJARCET
                                                                                                             169
ISSN: 2278 – 1323
       International Journal of Advanced Research in Computer Engineering & Technology
                                                            Volume 1, Issue 5, July 2012

      pixel-colour without the human eye                        watermarking techniques. The main objectives of
      understanding the difference by using true                the project are
      colours.
                                                                       Using of different symmetric key
 4.   The encrypted images data location is treated                     algorithms and more than one image for
      as key that will be again encrypted by either                     hiding them in means of security and
      DES or AES algorithm.                                             quality of hiding.
 5.    After insertion process complete, the new                       Increasing the efficiency and accuracy of
      images are saved as a bitmap format (.bmp).                       hiding the data through algorithms using
                                                                        Microsoft .NET framework.
 6.   Now the images are ready to be watermarked.

 7.   The detection process is exactly opposite to              The proposed method will help to secure the
      get the output.                                           content with in the images and encryption of image
                                                                files address with help of symmetric key algorithm
      Now, User needs to run the application. The               to make the document much securer because even
user has two tab options in dot net framework. If               though if the unauthorized person succeeds in
user selects Encoding, application gives the screen             being able to hack the image, the person will not
to select image files, information for adoption to              able to read the message as well as acquire the
save in the image file and one symmetric key                    whole information which is hidden in two images.
algorithm to choose. If user selects Decoding,                  Hence, unauthorized will not make any type of
application gives the screen to select only image               changes.
file and ask same chosen symmetric key algorithm
to display the secrete information.                             VI.       APPLICATIONS

     This project has two methods – Encrypt and                 There are various watermarking applications for
Decrypt. The model for encryption and decryption                images, as follows-
of images are designed with the objectives to file.             1. Copyright protection is probably the most
In encryption the secrete information is hiding in              common use of watermarks today. Copyright
BMP images only to save without any compression                 owner information is embedded in the image in
in image files. Decryption is getting the secret                order to prevent others from alleging ownership of
information have confidentiality and security in                the image.
transmission of the image based data as well as                 2. The fingerprint embeds information about the
storage, with the help of suitable symmetric key                legal receiver in the image. This involves
algorithms.                                                     embedding a different watermark into each
                                                                distributed image and allows the owner to locate
                                                                and monitor pirated images that are illegally
                                                                obtained.
                                                                3. Prevention of unauthorized copying is
                                                                accomplished by embedding information about
                                                                how often an image can be legally copied.
                                                                4. In an image authentication application the intent
                                                                is to detect modifications to the data.
                                                                5. Medical applications Names of the patients can
                                                                be printed on the X-ray reports and MRI scans
                                                                using        techniques      of       visible/invisible
                                                                Watermarking.[5]

                                                                VII.     EXPERIMENTAL RESULT
                                                                This paper has an aim to prevent the information by
Figure4: Block Diagram of Image Watermarking                    hiding in images from intruders and people who
                                                                don't have the permission. We apply the LSB
                                                                insertion by encrypting into two images for hiding
I primarily concentrated on the data security issues            one secret message whose half data encrypt in one
when sending the data over the network using                    image and next half data encrypt in second image.
                                                                Symmetric key (DES or AES) algorithm as choice


                                           All Rights Reserved © 2012 IJARCET
                                                                                                                  170
ISSN: 2278 – 1323
        International Journal of Advanced Research in Computer Engineering & Technology
                                                             Volume 1, Issue 5, July 2012

for image address encryption to get optimization.                     this optimized method can be used for image
The experiment will show, encrypted images can                        authenticity.
not show real view until these images are decrypted
by user key. Finally, these decrypted images can be                   Watermarking, like cryptography, will play an
identified by secret message on the images.                           increasing role in the future of secure
                                                                      communication in the “digital world”. This
To be able to compare the performance of this                         approach of secure communication will be
improvement on the LSB method, the images on                          enhancing by using both types, visible and invisible
Figures will be used as cover with BMP (Bit                           watermarking which is known as dual
Mapped Picture) format and watermarked images                         watermarking.
named as stego-image. These are so similar that no
one would ever think to examine the contents of the                   IX.        REFERENCES
file.
                                                                      [1] G. Manikandan, M. Kamarasan, P. Rajendiran, R.
                                                                      ManikandanA Hybrid Approach for Security Enhancement by
                                                                      Modified Crypto-Stegno Scheme,EuroJournals Publishing, Inc.
                                                                      2011
                                                                      [2] Digital watermarking of images, SGN-1650/1656 Signal
                                                                      ProcessingLaboratory,http://www.cs.tut.fi/~selinumm/watermar
                                                                      king/watermarking.pdf
                                                                      [3] [4] Russell K. Meyers and Ahmed H. Desoky, An
                                                                      Implementation of the Cryptosystem Signal Processing and
                                                                      Information Technology, IEEE International Symposium, Dec.
                                                                      2008
                                                                      [4] T. Morkel 1, J.H.P. Eloff 2, M.S. Olivier 3 An Overview of
                                                                      Image Stenography,(ICSA) Research Group Department of
                                                                      Computer Science, University of Pretoria, 0002, Pretoria, South
                                                                      Africa July 2005
Fig: Blue hills and sunset bitmap images before and after data        [5] Keshav S Rawat, Dheerendra S Members, IEEE,
hiding.                                                               Digital Watermarking Schemes for Authorization Against
                                                                      Copying or Privacy of Color Images, Indian Journal of
                                                                      Computer Science and Engineering.
                                                                      [6] Diaa Salama Abdul. Elminaam, H M Abdul Kader and M M
                                                                      Hadhoud3, Performance Evaluation of Symmetric Encryption
                                                                      Algorithms, in IJCSNS I, vol.8, Dec 2008.
                                                                      [7] Nadeem, A. and Javed, M.Y., A Permance Comparison of
                                                                      Data Encryption Alhorithms, IEEE Information and
                                                                      Communication Technologies,05,First International Conference,
                                                                      February,2006, pp.84-89
                                                                       [8] Tingyuan Nie Chuanwang Song and Xulong Zhi
                                                                      Performance Evaluation of DES,(ICBECS), 2010 International
                                                                      Conference, IEEE, Apr. 2010
                                                                      [9]       “Digital      watermarking”       definition     from
                                                                      http://en.wikipedia.org/wiki/ Digital_ watermarking
                                                                      [10 ] R.Chandramouli and Nasir Memon,Analysis of LSB Based
                                                                      Image Stegnography Techniques, IEEE 2001
Fig: Water lilies and winter bitmap images before and after data      [11] Yamuna Govindarajan, Yamuna Govindarajan. Quality -
hiding.                                                               Security uncompromised and Plausible Watermarking for Patent
VIII.       CONCLUSION                                                Infringement. International Journal of Image Processing
                                                                      [12] Ms.Soniya Vijayakumar, Image Stegnography Based On
                                                                      Polynomial Function JGRCS, march 2011
In this work, we have taken a rigorous approach                       [13] Ravi Sharma, Digital Watermarking Article, paper
that arriving at the watermarking is an effective                     presentation,      http://www.slideshare.net/ravi33s/watermark-
way to obscure data and hide sensitive information.                   12641562 april 2012.
We have explored the limits of watermarking
                                                                      Author:
theory and practices with less security. We printed
out the enhancement of the image watermarking
system using LSB approach to provide a means of
secure communication. Applied in the spatial
domain, this method of watermarking based on
Microsoft .Net framework is the optimized method                                 Vandana Tehlani,
for hiding actual information inside two images                       Engineer, M.Tech Student (CSE) from TIT, RGPV
with two algorithms i.e., DES and AES for                             University, Bhopal.
increasing security. This method is very fragile. It
will fail holding the watermark even with the
slightest manipulation of the images. This is why


                                                 All Rights Reserved © 2012 IJARCET
                                                                                                                               171

More Related Content

What's hot

Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...IJRES Journal
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...
A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...
A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...IDES Editor
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Journals
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Publishing House
 
Digital water marking
Digital water markingDigital water marking
Digital water markingMd Aktar
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Uncompressed Image Steganography using BPCS: Survey and Analysis
Uncompressed Image Steganography using BPCS: Survey and AnalysisUncompressed Image Steganography using BPCS: Survey and Analysis
Uncompressed Image Steganography using BPCS: Survey and AnalysisIOSR Journals
 
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...CSCJournals
 
A Novel Document Image Binarization For Optical Character Recognition
A Novel Document Image Binarization For Optical Character RecognitionA Novel Document Image Binarization For Optical Character Recognition
A Novel Document Image Binarization For Optical Character RecognitionEditor IJCATR
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESijma
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeIJERA Editor
 

What's hot (18)

42 128-1-pb
42 128-1-pb42 128-1-pb
42 128-1-pb
 
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...
A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...
A Simple Robust Digital Image Watermarking against Salt and Pepper Noise usin...
 
G0523444
G0523444G0523444
G0523444
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
 
H3602056060
H3602056060H3602056060
H3602056060
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
K42016368
K42016368K42016368
K42016368
 
Hg2513121314
Hg2513121314Hg2513121314
Hg2513121314
 
Uncompressed Image Steganography using BPCS: Survey and Analysis
Uncompressed Image Steganography using BPCS: Survey and AnalysisUncompressed Image Steganography using BPCS: Survey and Analysis
Uncompressed Image Steganography using BPCS: Survey and Analysis
 
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
 
A Novel Document Image Binarization For Optical Character Recognition
A Novel Document Image Binarization For Optical Character RecognitionA Novel Document Image Binarization For Optical Character Recognition
A Novel Document Image Binarization For Optical Character Recognition
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic Scheme
 

Viewers also liked

Green Hectares Rural Tech Workshop – Webinars
Green Hectares Rural Tech Workshop – WebinarsGreen Hectares Rural Tech Workshop – Webinars
Green Hectares Rural Tech Workshop – WebinarsGreen Hectares
 
Acids And Bases
Acids And BasesAcids And Bases
Acids And Basesjlevs295
 
Ciclo De Debates
Ciclo De DebatesCiclo De Debates
Ciclo De DebatesMarco Bahe
 
Better Living Through 140 Characters
Better Living Through 140 CharactersBetter Living Through 140 Characters
Better Living Through 140 CharactersRichard Eriksson
 
Past Simple and Continuous Chart 1º Bachillerato
Past Simple and Continuous Chart 1º BachilleratoPast Simple and Continuous Chart 1º Bachillerato
Past Simple and Continuous Chart 1º Bachilleratoguest5faf31
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionBrain Young
 
NAREIT 1.9.2014 US Benchmarking laws, Green building, Property Value and Gree...
NAREIT 1.9.2014 US Benchmarking laws, Green building, Property Value and Gree...NAREIT 1.9.2014 US Benchmarking laws, Green building, Property Value and Gree...
NAREIT 1.9.2014 US Benchmarking laws, Green building, Property Value and Gree...Cliff Majersik
 
Green Hectares Presents to Association of Canadian Custom Harvesters 2013 AGM
Green Hectares Presents to Association of Canadian Custom Harvesters 2013 AGMGreen Hectares Presents to Association of Canadian Custom Harvesters 2013 AGM
Green Hectares Presents to Association of Canadian Custom Harvesters 2013 AGMGreen Hectares
 
East TN Environmental Conference WAP
East TN Environmental Conference WAPEast TN Environmental Conference WAP
East TN Environmental Conference WAPWilliam Paddock
 

Viewers also liked (9)

Green Hectares Rural Tech Workshop – Webinars
Green Hectares Rural Tech Workshop – WebinarsGreen Hectares Rural Tech Workshop – Webinars
Green Hectares Rural Tech Workshop – Webinars
 
Acids And Bases
Acids And BasesAcids And Bases
Acids And Bases
 
Ciclo De Debates
Ciclo De DebatesCiclo De Debates
Ciclo De Debates
 
Better Living Through 140 Characters
Better Living Through 140 CharactersBetter Living Through 140 Characters
Better Living Through 140 Characters
 
Past Simple and Continuous Chart 1º Bachillerato
Past Simple and Continuous Chart 1º BachilleratoPast Simple and Continuous Chart 1º Bachillerato
Past Simple and Continuous Chart 1º Bachillerato
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
NAREIT 1.9.2014 US Benchmarking laws, Green building, Property Value and Gree...
NAREIT 1.9.2014 US Benchmarking laws, Green building, Property Value and Gree...NAREIT 1.9.2014 US Benchmarking laws, Green building, Property Value and Gree...
NAREIT 1.9.2014 US Benchmarking laws, Green building, Property Value and Gree...
 
Green Hectares Presents to Association of Canadian Custom Harvesters 2013 AGM
Green Hectares Presents to Association of Canadian Custom Harvesters 2013 AGMGreen Hectares Presents to Association of Canadian Custom Harvesters 2013 AGM
Green Hectares Presents to Association of Canadian Custom Harvesters 2013 AGM
 
East TN Environmental Conference WAP
East TN Environmental Conference WAPEast TN Environmental Conference WAP
East TN Environmental Conference WAP
 

Similar to New Fragile Approach for Optimization in Invisible Image Watermarking

ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
 
Data encryption using LSB matching algorithm and Reserving Room before Encryp...
Data encryption using LSB matching algorithm and Reserving Room before Encryp...Data encryption using LSB matching algorithm and Reserving Room before Encryp...
Data encryption using LSB matching algorithm and Reserving Room before Encryp...IJERA Editor
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniquesRashmi Tank
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...IRJET Journal
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project ReportVijayMaheshwari12
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
 

Similar to New Fragile Approach for Optimization in Invisible Image Watermarking (20)

ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
 
It3116411644
It3116411644It3116411644
It3116411644
 
review.pptx
review.pptxreview.pptx
review.pptx
 
Data encryption using LSB matching algorithm and Reserving Room before Encryp...
Data encryption using LSB matching algorithm and Reserving Room before Encryp...Data encryption using LSB matching algorithm and Reserving Room before Encryp...
Data encryption using LSB matching algorithm and Reserving Room before Encryp...
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
60 312-318
60 312-31860 312-318
60 312-318
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
F1803063236
F1803063236F1803063236
F1803063236
 
G0210032039
G0210032039G0210032039
G0210032039
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Report
ReportReport
Report
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

New Fragile Approach for Optimization in Invisible Image Watermarking

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 A New Fragile Approach for Optimization in Invisible Image Watermarking by Using Symmetric Key Algorithms Vandana Tehlani Abstract- In the information technology and This approach consists of following terminologies: communication, the most important factor has 1. Plaintext: The original data that has to be been the security of information and one of the communicated to the recipient. methods is watermarking. The Watermarking 2. Cover Image: An Image which is acts as a cover aims to validate the host and the undeniable in which the secret message is to be concealed. identity of the legal owner. In this paper, we will 3. Embedding Process: The process of embedding concentrate on hidden watermarks. At one time, or inserting the secret text into the cover image it deals with two different images in BMP to with the help of any suitable algorithm. hide information. The message will be dividing 4. Watermark Image: The image resulted after the evenly in both images to maximize the security completion of embedding process which looks as of image watermarking. It utilizes the LSB exactly as the cover image without any suspicion of manipulation method and the images addresses the presence of secret text inside it. used as key are also encrypted for performance 5. Extraction Process: The process of extracting or improvement with existing Symmetric key revealing the original message from a received algorithms. There are two options to choose watermark image by using the same algorithm that either DES or AES algorithm to get optimized the sender has chosen. output. We are using spatial domain for hiding 6. Optimization: It is a collection of methods and actual information inside images. techniques to design and make use of engineering systems as perfectly as possible with respect to This paper gives a brief idea about the new specific parameters. [1] image watermarking approach that make use of LSB algorithm for embedding the data into the II. TYPES OF WATERMARKING bit map images (.bmp) which is implemented through the Microsoft .NET framework. Digital watermarking is the process of Embedding information into a digital signal which may be used to verify its authenticity or Keyword: DES, AES, LBS method, Invisible the identity of its owners. There are two types of Image Watermarking. digital watermarking as follows- I. INTRODUCTION 1) Visible Watermarking 2) Invisible Watermarking The information can be encrypted in several forms. There are many different methods have been In visible digital watermarking, the information developed to encrypt and decrypt data in order to is visible in the picture or video. Typically, the keep the message secret. For securing the secrecy information is text or a logo, which identifies the one of the advanced method is Watermarking. owner of the media. The image on the right has a visible watermark. When a television broadcaster Watermarking is the art of hiding and adds its logo to the corner of transmitted video, this transmitting data through apparently innocuous also is a visible watermark. carriers in an effort to conceal the existence of data. In this method the data which is to be sent is In invisible digital watermarking, information is concealed in any multimedia file like image, video added as digital data to audio, picture, or video, but or an audio file. it cannot be perceived as such (although it may be possible to detect that some amount of information We are going to deal with Image Watermarking is hidden in the signal). The watermark may be and hence hereafter if we refer Watermarking it intended for widespread use and thus, is made easy actually keeps points to image Watermarking. to retrieve or, it may be a form of watermarking, All Rights Reserved © 2012 IJARCET 167
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 where a party communicates a secret message and use the RGB colour model, also known as true embedded in the digital signal. In either case, as in colour. When using a 24-bit image, a bit of each of visible watermarking, the objective is to attach the red, green and blue colour components can be ownership or other descriptive information to the used, since they are each represented by a byte. In signal in a way that is difficult to remove. It also is other words, one can store 3 bits in each pixel. An possible to use hidden embedded information as a 800 × 600 pixel image, can thus store a total means of covert communication between amount of 1,440,000 bits or 180,000 bytes of individuals. embedded data.[4] [12] Watermarking techniques are used to decide the domain, there are two types of techniques for images, and they are- 1) Frequency Domain Watermarking 2) Spatial Domain Watermarking • Frequency Domain Watermarking: First convert the image to the frequency domain and then apply the watermark in the low frequency regions. • Spatial Domain Watermarking: Just change some of the values of the pixels in the lower bit plane; e.g., Change some of the bits from 1 to 0 or 0 to 1. [13] The Spatial Domain Watermarking is Fig- Least Significant Bit manipulation classified in different classes. It's best that we work with a true color image. This In this paper, we are using Spatial Domain way, we can manipulate the LSB of a pixel-color Watermarking with the invisible watermarking without the human eye understanding the Images with the best known watermarking method difference. Specifically, the blue color of pixels is that works in the spatial domain is the LSB (Least chosen because it's the most unnoticed for the Significant Bit), which replaces the least significant human eye. This method is very fragile. It will fail bits of pixels selected to hide the information. The holding the watermark even with the slightest "LSB watermark" options save the final images in manipulation of the image. This is why this method BMP format as it is a format with no compression. can be used for image authenticity and maximizes the robustness of the hidden data. III. LSB MANIPULATION IN IMAGES This paper will focus on hiding information in images by LSB manipulation. At the time of In the digital representation, images are the encryption, the message will be hiding in two most popular cover objects for watermarking. different images evenly. Inverse of same process Applied in the spatial domain, this method of follows at decryption, LSB manipulated first image watermarking is very effective method for hiding gives half message and another half message will actual information inside images. In this be given by second image. We can use more than manipulation, the information to be watermarked two images to hide information further. These (simple text in this case) is converted to 'bits' [0-1]. images information will be optimally secured by Then "random" chosen pixels are ANDed with the using symmetric key algorithm such as DES and number 254 ["00000001"] so the LSB is turned to AES. 0. Finally, the information is inserted by adding the watermark info bits to the luminance value of the IV. WORKING ALGORITHM chosen pixels. The least significant bit (in other words, the 8th bit) A. Data Encryption Standard of some or all of the bytes inside an image is changed to a bit of the secret message. Digital DES is an algorithm that takes a fixed-length string colour images are typically stored in 24-bit files of plaintext bits and transforms it through a series of complicated operations into another ciphertext All Rights Reserved © 2012 IJARCET 168
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 bitstring of the same length. In the case of DES, the AES operates on a 4×4 column-major order matrix block size is 64 bits. DES also uses a key to of bytes, termed the state (versions of Rijndael with customize the transformation, so that decryption a larger block size have additional columns in the can supposedly only be performed by those who state). Most AES calculations are done in a special know the particular key used to encrypt. The key finite field. ostensibly consists of 64 bits; however, only 56 of these are actually used by the algorithm. Eight bits The AES cipher is specified as a number of are used solely for checking parity, and are repetitions of transformation rounds that convert thereafter discarded. Hence the effective key length the input plaintext into the final output of is 56 bits, and it is never quoted as such. Every 8th ciphertext. The numbers of cycles of repetition are bit of the selected key is discarded, that is, as follows: positions 8, 16, 24, 32, 40, 48, 56, 64 are removed from the 64 bit key leaving behind only the 56 bit 10 cycles of repetition for 128 bit keys. key. 12 cycles of repetition for 192 bit keys. The algorithm's overall structure is shown in 14 cycles of repetition for 256 bit keys. Figure: there are 16 identical stages of processing, termed rounds. There is also an initial and final Each round consists of several processing steps, permutation, termed IP and FP, which are inverses. including one that depends on the encryption key. Before the main rounds, the block is divided into A set of reverse rounds are applied to transform two 32-bit halves and processed alternately; this ciphertext back into the original plaintext using the criss-crossing is known as the Feistel scheme. same encryption key. V. PROPOSED WORK & Figure: The process of DES algorithm METHODOLGY B. Advanced Encryption We effectively using LSB method and DES and AES algorithm and derived a watermarked model. Standard There are only two functions, one for embedding and one for detecting the watermark. This approach AES Originally called Rijndael.It is based on a will surely enhance the performance and security design principle known as a substitution- and the steps are to be taken place in the following permutation network. It is fast in both software and order, hardware. Unlike its predecessor, DES, AES does not use a Feistel network. 1. Getting the images are loaded from the user. AES has a fixed block size of 128 bits and a key 2. Now filling the information for encrypting size of 128, 192, or 256 bits, whereas Rijndael is message accompanied that will be encrypted specified with block and key sizes in any multiple in two images which are divided evenly. of 32 bits, both with a minimum of 128 and a maximum of 256 bits. 3. These will be manipulating the LSB of a All Rights Reserved © 2012 IJARCET 169
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 pixel-colour without the human eye watermarking techniques. The main objectives of understanding the difference by using true the project are colours.  Using of different symmetric key 4. The encrypted images data location is treated algorithms and more than one image for as key that will be again encrypted by either hiding them in means of security and DES or AES algorithm. quality of hiding. 5. After insertion process complete, the new  Increasing the efficiency and accuracy of images are saved as a bitmap format (.bmp). hiding the data through algorithms using Microsoft .NET framework. 6. Now the images are ready to be watermarked. 7. The detection process is exactly opposite to The proposed method will help to secure the get the output. content with in the images and encryption of image files address with help of symmetric key algorithm Now, User needs to run the application. The to make the document much securer because even user has two tab options in dot net framework. If though if the unauthorized person succeeds in user selects Encoding, application gives the screen being able to hack the image, the person will not to select image files, information for adoption to able to read the message as well as acquire the save in the image file and one symmetric key whole information which is hidden in two images. algorithm to choose. If user selects Decoding, Hence, unauthorized will not make any type of application gives the screen to select only image changes. file and ask same chosen symmetric key algorithm to display the secrete information. VI. APPLICATIONS This project has two methods – Encrypt and There are various watermarking applications for Decrypt. The model for encryption and decryption images, as follows- of images are designed with the objectives to file. 1. Copyright protection is probably the most In encryption the secrete information is hiding in common use of watermarks today. Copyright BMP images only to save without any compression owner information is embedded in the image in in image files. Decryption is getting the secret order to prevent others from alleging ownership of information have confidentiality and security in the image. transmission of the image based data as well as 2. The fingerprint embeds information about the storage, with the help of suitable symmetric key legal receiver in the image. This involves algorithms. embedding a different watermark into each distributed image and allows the owner to locate and monitor pirated images that are illegally obtained. 3. Prevention of unauthorized copying is accomplished by embedding information about how often an image can be legally copied. 4. In an image authentication application the intent is to detect modifications to the data. 5. Medical applications Names of the patients can be printed on the X-ray reports and MRI scans using techniques of visible/invisible Watermarking.[5] VII. EXPERIMENTAL RESULT This paper has an aim to prevent the information by Figure4: Block Diagram of Image Watermarking hiding in images from intruders and people who don't have the permission. We apply the LSB insertion by encrypting into two images for hiding I primarily concentrated on the data security issues one secret message whose half data encrypt in one when sending the data over the network using image and next half data encrypt in second image. Symmetric key (DES or AES) algorithm as choice All Rights Reserved © 2012 IJARCET 170
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 for image address encryption to get optimization. this optimized method can be used for image The experiment will show, encrypted images can authenticity. not show real view until these images are decrypted by user key. Finally, these decrypted images can be Watermarking, like cryptography, will play an identified by secret message on the images. increasing role in the future of secure communication in the “digital world”. This To be able to compare the performance of this approach of secure communication will be improvement on the LSB method, the images on enhancing by using both types, visible and invisible Figures will be used as cover with BMP (Bit watermarking which is known as dual Mapped Picture) format and watermarked images watermarking. named as stego-image. These are so similar that no one would ever think to examine the contents of the IX. REFERENCES file. [1] G. Manikandan, M. Kamarasan, P. Rajendiran, R. ManikandanA Hybrid Approach for Security Enhancement by Modified Crypto-Stegno Scheme,EuroJournals Publishing, Inc. 2011 [2] Digital watermarking of images, SGN-1650/1656 Signal ProcessingLaboratory,http://www.cs.tut.fi/~selinumm/watermar king/watermarking.pdf [3] [4] Russell K. Meyers and Ahmed H. Desoky, An Implementation of the Cryptosystem Signal Processing and Information Technology, IEEE International Symposium, Dec. 2008 [4] T. Morkel 1, J.H.P. Eloff 2, M.S. Olivier 3 An Overview of Image Stenography,(ICSA) Research Group Department of Computer Science, University of Pretoria, 0002, Pretoria, South Africa July 2005 Fig: Blue hills and sunset bitmap images before and after data [5] Keshav S Rawat, Dheerendra S Members, IEEE, hiding. Digital Watermarking Schemes for Authorization Against Copying or Privacy of Color Images, Indian Journal of Computer Science and Engineering. [6] Diaa Salama Abdul. Elminaam, H M Abdul Kader and M M Hadhoud3, Performance Evaluation of Symmetric Encryption Algorithms, in IJCSNS I, vol.8, Dec 2008. [7] Nadeem, A. and Javed, M.Y., A Permance Comparison of Data Encryption Alhorithms, IEEE Information and Communication Technologies,05,First International Conference, February,2006, pp.84-89 [8] Tingyuan Nie Chuanwang Song and Xulong Zhi Performance Evaluation of DES,(ICBECS), 2010 International Conference, IEEE, Apr. 2010 [9] “Digital watermarking” definition from http://en.wikipedia.org/wiki/ Digital_ watermarking [10 ] R.Chandramouli and Nasir Memon,Analysis of LSB Based Image Stegnography Techniques, IEEE 2001 Fig: Water lilies and winter bitmap images before and after data [11] Yamuna Govindarajan, Yamuna Govindarajan. Quality - hiding. Security uncompromised and Plausible Watermarking for Patent VIII. CONCLUSION Infringement. International Journal of Image Processing [12] Ms.Soniya Vijayakumar, Image Stegnography Based On Polynomial Function JGRCS, march 2011 In this work, we have taken a rigorous approach [13] Ravi Sharma, Digital Watermarking Article, paper that arriving at the watermarking is an effective presentation, http://www.slideshare.net/ravi33s/watermark- way to obscure data and hide sensitive information. 12641562 april 2012. We have explored the limits of watermarking Author: theory and practices with less security. We printed out the enhancement of the image watermarking system using LSB approach to provide a means of secure communication. Applied in the spatial domain, this method of watermarking based on Microsoft .Net framework is the optimized method Vandana Tehlani, for hiding actual information inside two images Engineer, M.Tech Student (CSE) from TIT, RGPV with two algorithms i.e., DES and AES for University, Bhopal. increasing security. This method is very fragile. It will fail holding the watermark even with the slightest manipulation of the images. This is why All Rights Reserved © 2012 IJARCET 171