Beruflich Dokumente
Kultur Dokumente
ABSTRACT: - By the gradual support & enhancement in methodologies for that secure the digitized information which
usage of internet, several issues are faced with respect to comprises encryption & decryption, steganography,
security. A safe & secure technique is needed to transmit the cryptography & digitized watermarking. This methodology of
data. Digital watermarking is the method that ensures digital watermarking is explained in this document.
hiding of information & security. Watermarking is the
method that hides the content or either detects the Digital watermarking is a method used for hiding the data.
information in a digitized multimedia. Main focus of this Several numbers of methodologies are used for hiding of
discussion is on the watermarking of digitized audio, video information in digitized formats like video, audio, pictures,
& documents that are watermarked on a routine. This audios & texts. In general, digital watermarking is that
methodology has gained attention, particularly for indulging methodology that helps to invade the information secretly &
unidentifiable marks like copyright information about an some extra information in a cover picture that can be either
author. This process includes a signal in a media that extracted & used for the purpose of authentication,
downgrades the visual ability of media. In this document, a identification, protection of copyright & contents. At various
watermarking method based on DWT is presumed to levels, the factor of scaling if implied for invading a watermark
secures the data of an image & enhance the quality also. in cover picture. This digital watermarking technique is mainly
implemented to produce the digitized data & protection of
Keywords:- Digital watermarking, Spatial domain, Least information from some hackers & gives the right of ownership
Significant Bit (LSB), Frequency domain, Discrete Cosine for digitized information. Other characteristics of this method
Transform (DCT), Discrete Wavelet Transform (DWT), Discrete are termed as robustness. It also possesses imperceptibility
Fourier Transform (DFT). confronting various types of attacks or manipulation of picture
like filtering, cropping, compression, rotation & scaling. The
robustness watermark that is included computes the
I. INTRODUCTION effectiveness of the implemented algorithm of digital
watermarking. The methodology of digital watermarking is
Digital image processing is a rapid increasing section with implemented for improvisation in ownership of picture which
several implementing applications in the branch of computer that is done by invasion of signals that are of low level into the
science engineering. It is one of the major research subject as picture. This method can also be employed for protecting the
well as this methodology can be implemented in different kinds picture from tampering & validation [2].
of fields such as medical research, human & computer interface,
enforcement of law, enhancement & restoration of picture & Digital watermarking is a highly emerging technology that is
digitization watermarking for the purpose of security. Digital implemented to attain various kinds of applications with
image processing possesses several advantageous assets over success. Digital watermarking is been implemented in various
processing of analog pictures. Digital image processing also kinds of methodologies that are used for image processing.
supports several operations of computers for the purposes like Main target of the application is to provide appropriate security
improvising the quality of picture & removal of noise from paths to digitized form data. The applications of digital
pictures. The digitized picture [1] is presented by the 2-D watermarking are comprised of Broadcast Monitoring [3],
pictures such as a finite group of digital figures which are Digitized Fingerprint [4], Transaction Tracking [5], Protection
defined as pixels. So, processing of a picture of digital format by of Copyright [6], Detection of Tempering [7], Hiding of
a computer is termed as digital image processing. Information [8] & Authentication of Content [9] & many more.
The digital technology used for the purpose of communication Every methodology of digital watermarking is comprised of two
like internet deals that has various kinds of problem associated algorithms: one of them is detecting algorithm while other is the
to security & privacy of content. Some security measures are embedding algorithm. These algorithm processes are executed
needed to prevent the access of information illegally without in a same fashion for every method of watermarking. The figure
acknowledgement any 3rd party. So there is a high need to save 1 presents the embedding process of watermark where
the information in this internet world. There are several
B. Distortion/Attack Stage The steps opted to invade a watermark in real picture through
LSB is [13]:
At this level the information gets spread into complete network.
And it also indulges some noise in watermarked pictures or the
References