Frequency Domain Based Robust Digital Image Watermarking Resilient to Desynchronization Attacks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064


Amazon Sale


Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015

Frequency Domain Based Robust Digital Image Watermarking Resilient to Desynchronization Attacks

Mahesh R. Shimpi, S. V. Gumaste

New opportunities have been explored in social, business, entertainment and scientific fields due to the development of high speed computer networks and that of, internet in particular. Absurdly, the cause for the development is apprehensive because of the use of digital formatted data. Digital media has several advantages over analog media such as easy editing high fidelity copying and high quality. Software products which hide information within digital audio, images and video files have been introduced to address these growing concerns. Digital watermarking is one of the data hiding techniques. The watermarking is the process of embedding a signal in to other signal robustly and invisibly at the same time, the embedded signal is called watermark and the other signal is called cover or host signal. In this paper we are presents a brief overview of digital image watermarking techniques in time and transform domain, advantages of transform (frequency) domain over time domain techniques and proposed a watermarking algorithm in transform domain by using the discrete wavelet transform.

Keywords: Digital Image Watermarking, Steganography, Discrete Wavelet Transform, Haar Wavelet Transform, Single Valued Decomposition, Discrete Cosine transform, Binary Image

Edition: Volume 4 Issue 6, June 2015

Pages: 647 - 651

Share this Article

How to Cite this Article?

Mahesh R. Shimpi, S. V. Gumaste, "Frequency Domain Based Robust Digital Image Watermarking Resilient to Desynchronization Attacks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155030, Volume 4 Issue 6, June 2015, 647 - 651

68 PDF Views | 50 PDF Downloads

Download Article PDF


Amazon Sale


Similar Articles with Keyword 'Digital Image Watermarking'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 647 - 651

Frequency Domain Based Robust Digital Image Watermarking Resilient to Desynchronization Attacks

Mahesh R. Shimpi, S. V. Gumaste

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1546 - 1550

An Optimal Digital Image Watermarking based on SVD and Genetic Algorithm

Shreya Tayal, SPS Chauhan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1593 - 1599

A Survey of Digital Image Watermarking Optimization Algorithms Inspired by Nature

Komal Sinsinwar, SPS Chauhan

Share this Article

Similar Articles with Keyword 'Steganography'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article

Review Papers, Computer Science & Engineering, Jordan, Volume 7 Issue 6, June 2018

Pages: 1713 - 1715

Steganography and Watermarking: Review

Mohammed Salem Atoum

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 560 - 563

Survey of Cheating Prevention Techniques in Visual Cryptography

Smita Patil, Jyoti Rao

Share this Article

Similar Articles with Keyword 'Discrete Wavelet Transform'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1587 - 1589

A Survey on Comparison between DCT and DWT Techniques of Image Compression

Pooja Rani, Apoorva Arora

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1338 - 1343

Implementation of Adaptive Video Compression using Hybridized Wavelet Transform

Anurag Srivastava, Puneet Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 829 - 833

Comparison of Video Shot Detection and Video Summarization Techniques

Vijay Kumar D, Santhosh Kumar K.L, Jharna Majumdar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2427 - 2431

Multiscale Edge Based Approach for face Identification

Suvarna Joshi, Dr. Abhay Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 647 - 651

Frequency Domain Based Robust Digital Image Watermarking Resilient to Desynchronization Attacks

Mahesh R. Shimpi, S. V. Gumaste

Share this Article

Similar Articles with Keyword 'Haar Wavelet Transform'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 647 - 651

Frequency Domain Based Robust Digital Image Watermarking Resilient to Desynchronization Attacks

Mahesh R. Shimpi, S. V. Gumaste

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1516 - 1519

A Survey: An Efficient Approach towards Thunderstorm Detection Using Saliency Map

Rasika Gawande, Prof. Namrata Ghuse

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 840 - 844

Optimized Thunderstorm and Lightning Detection System

Rasika Kalbende, Nitin Shelke

Share this Article

Similar Articles with Keyword 'Discrete Cosine transform'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 165 - 167

Statistical Analysis of DCT Coefficients for Ascertaining Ear's Biometrics

Nisha, Jatinder Kansal, JPS Raina

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1587 - 1589

A Survey on Comparison between DCT and DWT Techniques of Image Compression

Pooja Rani, Apoorva Arora

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 647 - 651

Frequency Domain Based Robust Digital Image Watermarking Resilient to Desynchronization Attacks

Mahesh R. Shimpi, S. V. Gumaste

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1984 - 1986

Discrete Cosine Transform based Image Inpainting

Bansi B. Thanki

Share this Article

Similar Articles with Keyword 'Binary Image'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 647 - 651

Frequency Domain Based Robust Digital Image Watermarking Resilient to Desynchronization Attacks

Mahesh R. Shimpi, S. V. Gumaste

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2357 - 2361

An Efficient Coin Recognition Technique using Rotational Invariance Approach

Nikita N Shelgikar, Prof. L. M. R. J Lobo

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1453 - 1457

Mixture of Printed and Handwritten Kannada Numeral Recognition Using Normalized Chain Code and Wavelet Transform

Shashikala Parameshwarappa, B.V.Dhandra

Share this Article
Top