CFP last date
20 May 2024
Reseach Article

Design and Analysis of Hybrid Model Using DELPHI Encoding for Visible and Invisible Image Watermarking

by Swati Dhiman, Onkar Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 147 - Number 3
Year of Publication: 2016
Authors: Swati Dhiman, Onkar Singh
10.5120/ijca2016911054

Swati Dhiman, Onkar Singh . Design and Analysis of Hybrid Model Using DELPHI Encoding for Visible and Invisible Image Watermarking. International Journal of Computer Applications. 147, 3 ( Aug 2016), 25-29. DOI=10.5120/ijca2016911054

@article{ 10.5120/ijca2016911054,
author = { Swati Dhiman, Onkar Singh },
title = { Design and Analysis of Hybrid Model Using DELPHI Encoding for Visible and Invisible Image Watermarking },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 147 },
number = { 3 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 25-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume147/number3/25635-2016911054/ },
doi = { 10.5120/ijca2016911054 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:50:56.326209+05:30
%A Swati Dhiman
%A Onkar Singh
%T Design and Analysis of Hybrid Model Using DELPHI Encoding for Visible and Invisible Image Watermarking
%J International Journal of Computer Applications
%@ 0975-8887
%V 147
%N 3
%P 25-29
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As the digital data is transferred over the internet which may harm the digital data like tampering of data etc. Therefore, the need of digital data protection has been increased with the advancement in the technology. Watermarking is a technique used to protect the digital data. Digital watermarking is a technique by using which user can get the copyright of its product which prevents the data from tampering. Many techniques are available for video watermarking like Discrete Wavelet Transform, Least Significant Bit Technique etc. [2].The properties of digital watermarking are For copy control, In fingerprinting, For identification of ownership, For Authentication, Monitoring of digital video broadcast, In video tagging etc. [1].

References
  1. Antonio Cedillo-Hernandez,” Transcoding resilient video watermarking scheme based on spatio-temporal HVS and DCT”, ELSEVIER, Vol 97, Pp 40-54, 2014
  2. Mahima Jacob, Saurabh Mitra,” Video Watermarking Techniques”, IJRTE, Vol 4, Pp 1-4,2015.
  3. Lalit Kumar Saini, Vishal Shrivastava,” A Survey of Digital Watermarking Techniques and its Applications”, IJCST, Vol 2, Pp 70-73,2014
  4. Rakesh Ahuja, S. S. Bedi,” All Aspects of Digital Video Watermarking Under an Umbrella”, Ijigsp, Vol 12, Pp 54-73, 2015
  5. Monika Patel,Priti Srinivas Sajja,” Analysis and Survey of Digital Watermarking Techniques”, ijarcsse, Vol 3, Pp 203-210, 2013
  6. Chandra, M.(2010), “Digital watermarking technique for protecting digital images” Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference  , Volume:7, Pp 226 – 233,
  7. Vinita Gupta M(2014), “A Review on Image Watermarking and Its Techniques” International Journal of Advanced Research in Computer Science and Software Engineering Volume 4, Issue 1,Pp 92- 97
  8. Manjit Thapa (2011)” Digital Image Watermarking Technique Based on Different Attacks”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No. 4,Pp 14 -19
  9. Radhika v(2013), “Comparative Analysis of Watermarking in Digital Images Using DCT & DWT” International Journal of Scientific and Research Publications, Volume 3, Issue 2,Pp 1-4
  10. Zhu Yuefeng (2015), “Digital image watermarking algorithms based on dual transform domain and self-recovery” international journal on smart sensing and intelligent systems vol. 8, no. 1,pp 199- 219
  11. Puneet Kr Sharma(2012), “Analysis of image watermarking using least significant bit algorithm “International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4,Pp 95 -101
  12. Md. Selim Reza(2012), “An Approach of Digital Image Copyright Protection by Using Watermarking Technology” IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 2,Pp 280 -286
  13. Shrusti Porwal(2013), “Data Compression Methodologies for Lossless Data and Comparison between Algorithms” International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 2,Pp 142- 147
  14. Debashis Chakraborty, “Efficient Lossless Color Image Compression Using Run Length Encoding and Special Character Replacement”
  15. M. Baritha Begum, December 2013, “A New Compression Scheme for Secure Transmission” International Journal of Automation and Computing 10(6), Pp 578-586
  16. Amrita Jyoti, February 2014, “An Advanced Comparison Approach with RLE for Image Compression” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 2,Pp 95- 99
  17. M.VidyaSagar,( 2013) , “Modified Run Length Encoding Scheme for High Data Compression Rate” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 12,Pp 3238- 3242P. M.Sandeep, March 2013, “FPGA Bit-stream Compression Using Run-length Encoding”
  18. J. Anitha(2010), “A Color Image Digital Watermarking Scheme Based on SOFM “IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 5,Pp 302-309
  19. Jobenjit Singh Chahal (2013)” A Review on Digital Image Watermarking “International Journal of Emerging Technology and Advanced Engineering Website Journal, Volume 3, Issue 12,Pp 482 -484
  20. Neil F. Johnson , “An Introduction to Watermark Recovery from Images “
  21. Amir Houmansadr , “A Digital Image Watermarking Scheme Based on Visual Cryptography “
  22. .
Index Terms

Computer Science
Information Sciences

Keywords

DCT DFT DWT LSB Watermarking Security.