Frequency Domain Based Robust Digital Image Watermarking Resilient to Desynchronization Attacks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 120 | Weekly Hits: ⮙4 | Monthly Hits: ⮙14

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015

Frequency Domain Based Robust Digital Image Watermarking Resilient to Desynchronization Attacks

Mahesh R. Shimpi, S. V. Gumaste

New opportunities have been explored in social, business, entertainment and scientific fields due to the development of high speed computer networks and that of, internet in particular. Absurdly, the cause for the development is apprehensive because of the use of digital formatted data. Digital media has several advantages over analog media such as easy editing high fidelity copying and high quality. Software products which hide information within digital audio, images and video files have been introduced to address these growing concerns. Digital watermarking is one of the data hiding techniques. The watermarking is the process of embedding a signal in to other signal robustly and invisibly at the same time, the embedded signal is called watermark and the other signal is called cover or host signal. In this paper we are presents a brief overview of digital image watermarking techniques in time and transform domain, advantages of transform (frequency) domain over time domain techniques and proposed a watermarking algorithm in transform domain by using the discrete wavelet transform.

Keywords: Digital Image Watermarking, Steganography, Discrete Wavelet Transform, Haar Wavelet Transform, Single Valued Decomposition, Discrete Cosine transform, Binary Image

Edition: Volume 4 Issue 6, June 2015

Pages: 647 - 651

Share this Article

How to Cite this Article?

Mahesh R. Shimpi, S. V. Gumaste, "Frequency Domain Based Robust Digital Image Watermarking Resilient to Desynchronization Attacks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155030, Volume 4 Issue 6, June 2015, 647 - 651

Enter Your Registered Email Address





Similar Articles with Keyword 'Digital Image Watermarking'

Downloads: 120 | Weekly Hits: ⮙4 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 647 - 651

Frequency Domain Based Robust Digital Image Watermarking Resilient to Desynchronization Attacks

Mahesh R. Shimpi, S. V. Gumaste

Share this Article

Downloads: 120

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1546 - 1550

An Optimal Digital Image Watermarking based on SVD and Genetic Algorithm

Shreya Tayal, SPS Chauhan

Share this Article

Downloads: 127 | Weekly Hits: ⮙4 | Monthly Hits: ⮙15

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1593 - 1599

A Survey of Digital Image Watermarking Optimization Algorithms Inspired by Nature

Komal Sinsinwar, SPS Chauhan

Share this Article

Similar Articles with Keyword 'Steganography'

Downloads: 101 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Downloads: 102 | Weekly Hits: ⮙5 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this Article

Downloads: 104 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article

Similar Articles with Keyword 'Discrete Wavelet Transform'

Downloads: 104 | Weekly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1587 - 1589

A Survey on Comparison between DCT and DWT Techniques of Image Compression

Pooja Rani, Apoorva Arora

Share this Article

Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1338 - 1343

Implementation of Adaptive Video Compression using Hybridized Wavelet Transform

Anurag Srivastava, Puneet Sharma

Share this Article

Downloads: 109 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 829 - 833

Comparison of Video Shot Detection and Video Summarization Techniques

Vijay Kumar D, Santhosh Kumar K.L, Jharna Majumdar

Share this Article

Downloads: 109 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1563 - 1567

Image Denoising Using Hybrid Thresholding, MFHT and Hybrid Post Filtering

Taranjot Kaur, Manish Mittal

Share this Article

Downloads: 109 | Weekly Hits: ⮙4 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2577 - 2580

Clothing Pattern Recognition for Blind using SURF and combined GLCM, Wavelet

Manisha Dhongade

Share this Article

Similar Articles with Keyword 'Haar Wavelet Transform'

Downloads: 106 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Downloads: 111 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1516 - 1519

A Survey: An Efficient Approach towards Thunderstorm Detection Using Saliency Map

Rasika Gawande, Prof. Namrata Ghuse

Share this Article

Downloads: 120 | Weekly Hits: ⮙4 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 647 - 651

Frequency Domain Based Robust Digital Image Watermarking Resilient to Desynchronization Attacks

Mahesh R. Shimpi, S. V. Gumaste

Share this Article

Downloads: 131 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 840 - 844

Optimized Thunderstorm and Lightning Detection System

Rasika Kalbende, Nitin Shelke

Share this Article

Similar Articles with Keyword 'Discrete Cosine transform'

Downloads: 82 | Monthly Hits: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 165 - 167

Statistical Analysis of DCT Coefficients for Ascertaining Ears Biometrics

Nisha, Jatinder Kansal, JPS Raina

Share this Article

Downloads: 102 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1984 - 1986

Discrete Cosine Transform based Image Inpainting

Bansi B. Thanki

Share this Article

Downloads: 102 | Weekly Hits: ⮙5 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Downloads: 103 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Downloads: 104 | Weekly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1587 - 1589

A Survey on Comparison between DCT and DWT Techniques of Image Compression

Pooja Rani, Apoorva Arora

Share this Article

Similar Articles with Keyword 'Binary Image'

Downloads: 106 | Weekly Hits: ⮙2 | Monthly Hits: ⮙7

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 101 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2357 - 2361

An Efficient Coin Recognition Technique using Rotational Invariance Approach

Nikita N Shelgikar, Prof. L. M. R. J Lobo

Share this Article

Downloads: 103 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Downloads: 112 | Weekly Hits: ⮙4 | Monthly Hits: ⮙14

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1079 - 1082

Information Leak Detection and Prevention

Deepika. S. Patil, Dr. Sujata Terdal

Share this Article

Downloads: 120 | Weekly Hits: ⮙4 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 647 - 651

Frequency Domain Based Robust Digital Image Watermarking Resilient to Desynchronization Attacks

Mahesh R. Shimpi, S. V. Gumaste

Share this Article



Top