SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Electronics and Communication Engineering & Technology (IJECET),
INTERNATIONAL JOURNAL OF ELECTRONICS AND
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME

COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

ISSN 0976 – 6464(Print)
ISSN 0976 – 6472(Online)
Special Issue (November, 2013), pp. 202-209
© IAEME: www.iaeme.com/ijecet.asp
Journal Impact Factor (2013): 5.8896 (Calculated by GISI)
www.jifactor.com

IJECET
©IAEME

Digital Image Watermarking Using DCT with High Security of
Watermark using Image Fusion Technology of
Wavelet Toolbox of MATLAB
Sunil Kr. Sharma1, Divyanshu Varma2
M.Tech Scholar, Department of Electronics & Communication, Bhagwant University, Ajmer, India
1sunilsharma96@gmail.com, 2maildivyanshu@yahoo.com

ABSTRACT: A new area of research to prevent illegal piracy and duplication copying is digital
watermarking. Owing to personal computers being applied in many fields and Internet
becoming popular and easier to use, most information is transmitted with digital format.
Therefore, data copying and back up are more and easier in the World Wide Web and
multimedia. The copyright and authentication gradually lose their security [2]. How to protect
intellectual property becomes important in technical study and research. Recently, the
watermarking technique was proposed to solve the problem of protecting the intellectual
property [5]. The imperceptibility and robustness of watermarking can affect Watermarking
embedded in frequency domain using FFT or DWT or DCT. In this paper, a watermark
embedded in the host image by DCT transform has been proposed [3]. There are several
papers using the same manner to embed watermark into middle-band coefficients of DCT block
but here we proposed a new approach to provide high security as compared to other
developed watermarking tech. using image fusion of wavelet toolbox.

KEYWORDS: Digital image watermarking, discrete cosine transform (DCT), Image fusion,
Synthesized Image, Histograms.

I.

INTRODUCTION

The concept of hiding some data into an image, where data is itself an image is known as Digital
Image Watermarking. Usually watermarking technique embeds the watermarked data in the
main image and all this done by transformation, in which the main image is converted into
frequency domain & then merged with the data and the key usually a PN sequence code, text
code etc. using watermarking embedding system. As shown in following fig. 1 and fig. 2 shows
the reverse process for extraction of watermark using the watermark detection process. In
both figures, we require main image and key, So that we can recover the watermark at the
receiver end. Due to this process the transmission of main image & key with the watermarked
data will increases the complexity, insecurity, piracy etc. To reduce these problems, we
propose that the main image & watermarked image both should be combined and transmitted
International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

October 18-20, 2013
Page 202
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME

together so that the main image is not required at the receiver end and this increase the
security highly.

Fig. 1: Watermark embedding

Fig. 2: Watermark detection

II.

DCT BASED DIGITAL WATERMARKING

DCT is a general orthogonal transform for digital image processing and signal processing with
advantages such as high compression ratio, small bit error rate, good information integration
ability and good synthetic effect of calculation complexity. One dimensional DCT can be
described with the help of (1) and (2) [1], [4]:
(0) =
( )=

√
√
√

∑
∑

(1)

( )
( ) cos

(

)

(2)

Where F (u) is cosine transform coefficient, u is general frequency variable, u=1, 2, 3…., N-1; if
f(x) is M sequence of time domain, x= 1, 2, 3… N-1, one dimensional inverse discrete cosine
transform is defined as (3) [1], [4]:
( )=

√

( )+√ ∑

( ) cos

√

(

)

(3)

Two dimensional DCT can be defined analogously as (4) [1], [4]:
( , ) = ( ) α(v) ∑

∑

( , ) cos

(

)

cos

(

)

(4)

For u, v =0,1,2,…,N −1 and α(u) and α(v) are defined in (6). The 2D inverse discrete transform is
defined as (5) [1], [4]:
International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

October 18-20, 2013
Page 203
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME
( , )=∑

∑

(

( ) α(v) ( , ) cos

)

cos

(

)

(5)

In both equations (4) and (5) α(u) α(v) is defined as
( ), ( ) =

√

,
,

(6)

√

DCT allows an image to be broken up into different frequency bands namely the high, middle
and low frequency bands thus making it easier to choose the band in which the watermark is to
be inserted. The literature survey reveals that mostly the middle frequency bands are chosen
because embedding the watermark in a middle frequency band does not scatter the watermark
information to most visual important parts of the image i.e. the low frequencies and also it do
not overexpose them to removal through compression and noise attacks where high frequency
components are targeted [3]. Numerous watermarking techniques based on DCT are proposed.
Although some of the watermarking techniques embed the watermark in the DC component,
most techniques utilize the comparison of middle band DCT coefficients to embed a single bit
of watermark information into a DCT block. The middle-band frequencies (FM) of an 8*8 DCT
block can be shown below in fig. 3 [2].

Fig. 3: DCT Regions
DCT block consists of three frequency bands-Low frequency band (FL), High frequency band
(FH), mid frequency band (FM). We have chosen FM for embedding the watermark.
A. Basic Watermarking Process Algorithm (without key)
Common watermarking algorithms usually include two steps: watermark embedding and
watermark detection (extraction) [4]. Let f() denote the embedding function, I the original
watermark, W the watermark to be embedded, then the watermarked image I’ can be
expressed as(7) & shown in fig. 4:
= ( ,

)

(7)

Common approach is as follows: Extract a property sequence from original image V = v1, v2…
vn, corresponding watermark sequence is X = x1, x2… xn. Embed X into V according to certain
model to obtain the adjusted sequence V’ = V + X = v’1, v’2…v’n. Put V’ back and take the place
of V, then we get the watermarked image I’.
Let E( ) denote the detection function and I’ the image to be examined. Extract the watermark
from I’ & extraction shown in fig. 5. The recovered or extracted watermark is given by (8):
= ( , )
International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

(8)
October 18-20, 2013
Page 204
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME

Fig. 4: Watermarking Embedding Process DCT

Fig. 5: Watermark Extraction Process using DCT
International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

October 18-20, 2013
Page 205
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME

III.

PROPOSED TECHNIQUE

From above watermarking at the receiver that main image & watermarked image both are
required. To reduce such requirement only one image can be send by using image fusion of
both images and get the synthesized image using the image fusion technique of wavelet tool
box. Basically image fusion is not only a process to combine two images of same type and size
but also technique to extract required information from images and then combine them to
form a single composite image. The image fusion process can applied in many area of image
processing like remote sensing, military surveillance, medical image analysis etc. complete
process algorithm shown in following fig. 6 [7] and applied process on our image is shown in
fig. 7 using image fusion of MATLAB WAVELET TOOLBOX.

Fig. 6 Image fusion process

Fig. 7 Image fusion using Wavelet toolbox
International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

October 18-20, 2013
Page 206
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME

Fig. 8: Synthesized image
The competitive view of all three images is as shown in fig. 8. This shows the changes in
original image due to watermark and then due to fusion of real and watermarked image which
gives synthesized output image.

Fig. 9: competitive view of all images
Another competitive view can be shown on the basis of their histograms and cumulative
histograms as shown in following figures. The comparison result of all three histograms gives
that the histograms of all images are different with little similarity at different points. All
histograms made at equal bins (50). As shown in following three figures:

International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

October 18-20, 2013
Page 207
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME

Fig. 10: Histograms of main image

Fig. 11: Histograms of Watermarked image

Fig. 12: Histograms of Synthesized image

IV.

CONCLUSION

This paper introduces the image fusion for watermark security with embedding of watermark
with the help of DCT. In this paper we first insert the watermark into main image then this
watermarked image is fused with main image. This synthesized image contains three data main
image, watermark data and watermarked image. Due to this way the requirement of main
image at detection section will reduces with high security. Here we embed the watermark with
the help of DCT but to increase the robustness we may use here DWT also. In the last the
histogram shows a comparative look which makes this technique more different and
impressive and more expressive. The results of simulation shows this system not only security
but also high image quality. The strong capability of embedding signal and anti-attack makes
different this algorithm from all other.

REFERENCES
[1] Mei Jiansheng, Li Sukang1 and Tan Xiaomei, A Digital Watermarking Algorithm Based On
DCT and DWT, Proceedings of the 2009 International Symposium on Web Information Systems
and Applications (WISA’09), Nanchang, P. R. China, May 22-24, 2009, pp. 104-107.
International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

October 18-20, 2013
Page 208
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME

[2] Blossom Kaur, Amandeep Kaur, Jasdeep Singh, Steganographic Approach For Hiding Image
In DCT Domain, International Journal of Advances in Engineering & Technology, July 2011.
[3] Liu Ping Feng, Liang Bin Zheng, Peng Cao, A DWT-DCT Based Blind Watermarking
Algorithm for Copyright Protection, Beijing Institute of Graphic Communication, No. Ed0708.
[4] Abduljabbar Shaamala, Shahidan M. Abdullah and Azizah A. Manaf, Study of the effect DCT
and DWT domains on the imperceptibility and robustness of Genetic watermarking, IJCSI
International Journal of Computer Science Issues, Vol. 8, Issue 5, No 2, September 2011.
[5] Radhika v. Totla, K.S.Bapat, Comparative Analysis of Watermarking in Digital Images Using
DCT& DWT, International Journal of Scientific and Research Publications, Volume 3, Issue 2,
February 2013.
[6] Chin-Shiuh Shieh, Hsiang-Cheh Huang, Feng-Hsing Wang, Jeng-Shyang Pan, Genetic
watermarking based on transform-domain techniques, Pattern Recognition 37 (2004) 555 –
565.
[7] Gengming Zhu, and Nong Sang, Watermarking Algorithm Research and Implementation
Based on DCT Block, International Journal of Electrical and Computer Engineering 4:10 2009.
[8] Franc¸ois Cayre, Caroline Fontaine, and Teddy Furon, Watermarking Security: Theory and
Practice, IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL.XX, NO.Y, XYZ 2005.
[9] Chiou-Ting Hsu and Ja-Ling Wu, Hidden Digital Watermarks in Images, IEEE Transactions
On Image Processing, Vol. 8, No. 1, January 1999.

BIOGRAPHY
Sunil Kumar Sharma was born in Ajmer, Rajasthan, India in 1987. He starts
his technical career from Birla Technical Training Institute, Pilani by
Diploma in Electronics Engineering. He received the Bachelor of Engineering
degree in Electronics & Communication Engineering from M.B.M.
Engineering College, Jodhpur, India in 2011. He has been completed his P.G.
Diploma in Business Administration from SMU-DE, India in 2012. Presently
He is working as Guest Lecturer at Govt. Engineering College Ajmer, Ajmer,
India & pursuing his Master of Technology in Digital Communication from
Bhagwant University, Ajmer, India. His current research interests focus on Signals & Systems,
Signal Processing, Communication systems & Microprocessor.
Divyanshu Varma was born in Ajmer, Rajasthan, India in 1987. He starts
his technical career from Birla Technical Training Institute, Pilani by
Diploma in Electronics Engineering. He received the Bachelor of Technology
degree in Electronics & Communication Engineering from Jaipur National
University, Jaipur, India in 2011. He is pursuing his Master of Technology in
Digital Communication from Bhagwant University, Ajmer, India. His current
research interests focus on Micro-Electronics, Signal Processing and
Communication systems.

International Conference on Communication Systems (ICCS-2013)
B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India

October 18-20, 2013
Page 209

More Related Content

What's hot

Digital Image Watermarking
Digital Image WatermarkingDigital Image Watermarking
Digital Image WatermarkingPralin Pavithran
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesPrashant Singh
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingnafees321
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwtIAEME Publication
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessingQaisar Ayub
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingNawin Kumar Sharma
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detectionncct
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking TechniquesNazeera Sheth
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applicationsKannekanti Utthej
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Arif Ahmed
 
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...Shalu Singh
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 

What's hot (20)

Digital Image Watermarking
Digital Image WatermarkingDigital Image Watermarking
Digital Image Watermarking
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwt
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Vidhi's ppt
Vidhi's pptVidhi's ppt
Vidhi's ppt
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking Techniques
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....
 
Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
 
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 

Similar to Digital image watermarking using dct with high security of

Enhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackEnhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackijfcstjournal
 
Kassem2009
Kassem2009Kassem2009
Kassem2009lazchi
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...IJNSA Journal
 
Hybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaHybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaIAEME Publication
 
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey  Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey ijsc
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )ijsc
 
Evaluation of graphic effects embedded image compression
Evaluation of graphic effects embedded image compression Evaluation of graphic effects embedded image compression
Evaluation of graphic effects embedded image compression IJECEIAES
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
 

Similar to Digital image watermarking using dct with high security of (20)

50120140506015
5012014050601550120140506015
50120140506015
 
1820 1824
1820 18241820 1824
1820 1824
 
1820 1824
1820 18241820 1824
1820 1824
 
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
 
Enhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackEnhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attack
 
Kassem2009
Kassem2009Kassem2009
Kassem2009
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
 
Hybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaHybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pca
 
Kt3618371840
Kt3618371840Kt3618371840
Kt3618371840
 
20120140505013
2012014050501320120140505013
20120140505013
 
1674 1677
1674 16771674 1677
1674 1677
 
1674 1677
1674 16771674 1677
1674 1677
 
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey  Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )
 
Evaluation of graphic effects embedded image compression
Evaluation of graphic effects embedded image compression Evaluation of graphic effects embedded image compression
Evaluation of graphic effects embedded image compression
 
Z03301550160
Z03301550160Z03301550160
Z03301550160
 
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Digital image watermarking using dct with high security of

  • 1. International Journal of Electronics and Communication Engineering & Technology (IJECET), INTERNATIONAL JOURNAL OF ELECTRONICS AND ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Special Issue (November, 2013), pp. 202-209 © IAEME: www.iaeme.com/ijecet.asp Journal Impact Factor (2013): 5.8896 (Calculated by GISI) www.jifactor.com IJECET ©IAEME Digital Image Watermarking Using DCT with High Security of Watermark using Image Fusion Technology of Wavelet Toolbox of MATLAB Sunil Kr. Sharma1, Divyanshu Varma2 M.Tech Scholar, Department of Electronics & Communication, Bhagwant University, Ajmer, India 1sunilsharma96@gmail.com, 2maildivyanshu@yahoo.com ABSTRACT: A new area of research to prevent illegal piracy and duplication copying is digital watermarking. Owing to personal computers being applied in many fields and Internet becoming popular and easier to use, most information is transmitted with digital format. Therefore, data copying and back up are more and easier in the World Wide Web and multimedia. The copyright and authentication gradually lose their security [2]. How to protect intellectual property becomes important in technical study and research. Recently, the watermarking technique was proposed to solve the problem of protecting the intellectual property [5]. The imperceptibility and robustness of watermarking can affect Watermarking embedded in frequency domain using FFT or DWT or DCT. In this paper, a watermark embedded in the host image by DCT transform has been proposed [3]. There are several papers using the same manner to embed watermark into middle-band coefficients of DCT block but here we proposed a new approach to provide high security as compared to other developed watermarking tech. using image fusion of wavelet toolbox. KEYWORDS: Digital image watermarking, discrete cosine transform (DCT), Image fusion, Synthesized Image, Histograms. I. INTRODUCTION The concept of hiding some data into an image, where data is itself an image is known as Digital Image Watermarking. Usually watermarking technique embeds the watermarked data in the main image and all this done by transformation, in which the main image is converted into frequency domain & then merged with the data and the key usually a PN sequence code, text code etc. using watermarking embedding system. As shown in following fig. 1 and fig. 2 shows the reverse process for extraction of watermark using the watermark detection process. In both figures, we require main image and key, So that we can recover the watermark at the receiver end. Due to this process the transmission of main image & key with the watermarked data will increases the complexity, insecurity, piracy etc. To reduce these problems, we propose that the main image & watermarked image both should be combined and transmitted International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India October 18-20, 2013 Page 202
  • 2. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME together so that the main image is not required at the receiver end and this increase the security highly. Fig. 1: Watermark embedding Fig. 2: Watermark detection II. DCT BASED DIGITAL WATERMARKING DCT is a general orthogonal transform for digital image processing and signal processing with advantages such as high compression ratio, small bit error rate, good information integration ability and good synthetic effect of calculation complexity. One dimensional DCT can be described with the help of (1) and (2) [1], [4]: (0) = ( )= √ √ √ ∑ ∑ (1) ( ) ( ) cos ( ) (2) Where F (u) is cosine transform coefficient, u is general frequency variable, u=1, 2, 3…., N-1; if f(x) is M sequence of time domain, x= 1, 2, 3… N-1, one dimensional inverse discrete cosine transform is defined as (3) [1], [4]: ( )= √ ( )+√ ∑ ( ) cos √ ( ) (3) Two dimensional DCT can be defined analogously as (4) [1], [4]: ( , ) = ( ) α(v) ∑ ∑ ( , ) cos ( ) cos ( ) (4) For u, v =0,1,2,…,N −1 and α(u) and α(v) are defined in (6). The 2D inverse discrete transform is defined as (5) [1], [4]: International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India October 18-20, 2013 Page 203
  • 3. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME ( , )=∑ ∑ ( ( ) α(v) ( , ) cos ) cos ( ) (5) In both equations (4) and (5) α(u) α(v) is defined as ( ), ( ) = √ , , (6) √ DCT allows an image to be broken up into different frequency bands namely the high, middle and low frequency bands thus making it easier to choose the band in which the watermark is to be inserted. The literature survey reveals that mostly the middle frequency bands are chosen because embedding the watermark in a middle frequency band does not scatter the watermark information to most visual important parts of the image i.e. the low frequencies and also it do not overexpose them to removal through compression and noise attacks where high frequency components are targeted [3]. Numerous watermarking techniques based on DCT are proposed. Although some of the watermarking techniques embed the watermark in the DC component, most techniques utilize the comparison of middle band DCT coefficients to embed a single bit of watermark information into a DCT block. The middle-band frequencies (FM) of an 8*8 DCT block can be shown below in fig. 3 [2]. Fig. 3: DCT Regions DCT block consists of three frequency bands-Low frequency band (FL), High frequency band (FH), mid frequency band (FM). We have chosen FM for embedding the watermark. A. Basic Watermarking Process Algorithm (without key) Common watermarking algorithms usually include two steps: watermark embedding and watermark detection (extraction) [4]. Let f() denote the embedding function, I the original watermark, W the watermark to be embedded, then the watermarked image I’ can be expressed as(7) & shown in fig. 4: = ( , ) (7) Common approach is as follows: Extract a property sequence from original image V = v1, v2… vn, corresponding watermark sequence is X = x1, x2… xn. Embed X into V according to certain model to obtain the adjusted sequence V’ = V + X = v’1, v’2…v’n. Put V’ back and take the place of V, then we get the watermarked image I’. Let E( ) denote the detection function and I’ the image to be examined. Extract the watermark from I’ & extraction shown in fig. 5. The recovered or extracted watermark is given by (8): = ( , ) International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India (8) October 18-20, 2013 Page 204
  • 4. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME Fig. 4: Watermarking Embedding Process DCT Fig. 5: Watermark Extraction Process using DCT International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India October 18-20, 2013 Page 205
  • 5. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME III. PROPOSED TECHNIQUE From above watermarking at the receiver that main image & watermarked image both are required. To reduce such requirement only one image can be send by using image fusion of both images and get the synthesized image using the image fusion technique of wavelet tool box. Basically image fusion is not only a process to combine two images of same type and size but also technique to extract required information from images and then combine them to form a single composite image. The image fusion process can applied in many area of image processing like remote sensing, military surveillance, medical image analysis etc. complete process algorithm shown in following fig. 6 [7] and applied process on our image is shown in fig. 7 using image fusion of MATLAB WAVELET TOOLBOX. Fig. 6 Image fusion process Fig. 7 Image fusion using Wavelet toolbox International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India October 18-20, 2013 Page 206
  • 6. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME Fig. 8: Synthesized image The competitive view of all three images is as shown in fig. 8. This shows the changes in original image due to watermark and then due to fusion of real and watermarked image which gives synthesized output image. Fig. 9: competitive view of all images Another competitive view can be shown on the basis of their histograms and cumulative histograms as shown in following figures. The comparison result of all three histograms gives that the histograms of all images are different with little similarity at different points. All histograms made at equal bins (50). As shown in following three figures: International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India October 18-20, 2013 Page 207
  • 7. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME Fig. 10: Histograms of main image Fig. 11: Histograms of Watermarked image Fig. 12: Histograms of Synthesized image IV. CONCLUSION This paper introduces the image fusion for watermark security with embedding of watermark with the help of DCT. In this paper we first insert the watermark into main image then this watermarked image is fused with main image. This synthesized image contains three data main image, watermark data and watermarked image. Due to this way the requirement of main image at detection section will reduces with high security. Here we embed the watermark with the help of DCT but to increase the robustness we may use here DWT also. In the last the histogram shows a comparative look which makes this technique more different and impressive and more expressive. The results of simulation shows this system not only security but also high image quality. The strong capability of embedding signal and anti-attack makes different this algorithm from all other. REFERENCES [1] Mei Jiansheng, Li Sukang1 and Tan Xiaomei, A Digital Watermarking Algorithm Based On DCT and DWT, Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA’09), Nanchang, P. R. China, May 22-24, 2009, pp. 104-107. International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India October 18-20, 2013 Page 208
  • 8. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Special Issue (November, 2013), © IAEME [2] Blossom Kaur, Amandeep Kaur, Jasdeep Singh, Steganographic Approach For Hiding Image In DCT Domain, International Journal of Advances in Engineering & Technology, July 2011. [3] Liu Ping Feng, Liang Bin Zheng, Peng Cao, A DWT-DCT Based Blind Watermarking Algorithm for Copyright Protection, Beijing Institute of Graphic Communication, No. Ed0708. [4] Abduljabbar Shaamala, Shahidan M. Abdullah and Azizah A. Manaf, Study of the effect DCT and DWT domains on the imperceptibility and robustness of Genetic watermarking, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 2, September 2011. [5] Radhika v. Totla, K.S.Bapat, Comparative Analysis of Watermarking in Digital Images Using DCT& DWT, International Journal of Scientific and Research Publications, Volume 3, Issue 2, February 2013. [6] Chin-Shiuh Shieh, Hsiang-Cheh Huang, Feng-Hsing Wang, Jeng-Shyang Pan, Genetic watermarking based on transform-domain techniques, Pattern Recognition 37 (2004) 555 – 565. [7] Gengming Zhu, and Nong Sang, Watermarking Algorithm Research and Implementation Based on DCT Block, International Journal of Electrical and Computer Engineering 4:10 2009. [8] Franc¸ois Cayre, Caroline Fontaine, and Teddy Furon, Watermarking Security: Theory and Practice, IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL.XX, NO.Y, XYZ 2005. [9] Chiou-Ting Hsu and Ja-Ling Wu, Hidden Digital Watermarks in Images, IEEE Transactions On Image Processing, Vol. 8, No. 1, January 1999. BIOGRAPHY Sunil Kumar Sharma was born in Ajmer, Rajasthan, India in 1987. He starts his technical career from Birla Technical Training Institute, Pilani by Diploma in Electronics Engineering. He received the Bachelor of Engineering degree in Electronics & Communication Engineering from M.B.M. Engineering College, Jodhpur, India in 2011. He has been completed his P.G. Diploma in Business Administration from SMU-DE, India in 2012. Presently He is working as Guest Lecturer at Govt. Engineering College Ajmer, Ajmer, India & pursuing his Master of Technology in Digital Communication from Bhagwant University, Ajmer, India. His current research interests focus on Signals & Systems, Signal Processing, Communication systems & Microprocessor. Divyanshu Varma was born in Ajmer, Rajasthan, India in 1987. He starts his technical career from Birla Technical Training Institute, Pilani by Diploma in Electronics Engineering. He received the Bachelor of Technology degree in Electronics & Communication Engineering from Jaipur National University, Jaipur, India in 2011. He is pursuing his Master of Technology in Digital Communication from Bhagwant University, Ajmer, India. His current research interests focus on Micro-Electronics, Signal Processing and Communication systems. International Conference on Communication Systems (ICCS-2013) B K Birla Institute of Engineering & Technology (BKBIET), Pilani, India October 18-20, 2013 Page 209