Now-a-days watermarking plays a pivotal role in
most of the industries for providing security to their own as well
as hired or leased data. This paper its main aim is to study Spatial
and Fractal watermarking algorithms and also choosing the
effective and efficient one for improving the resistance in data
compression. In the Spatial domain method, there is no costly
transforms needed to be computed for watermark embedding.
The luminance values will be manipulated directly. The fractal
domain is to determine a set of contractive transformation to
approximate each block of the image with a larger block. The
composition of all these transformations has the image as its
fixed point. Starting with any image hence to apply the
composition of the transformations repeatedly and get an
approximation of the original image. For the implementation, we
have used minimum nine coordinate positions. The watermarking
algorithms to be taken for this study are Bruyn algorithm and
Langelaar algorithm. In all graph, we have plotted X axis as peak
signal to noise ratio (PSNR) and y axis as Correlation with
original watermark. The threshold value ? is set to 5. The result
is smaller than the threshold value then it is feasible, otherwise it
is not.
Dr. S. Thabasu Kannan : has been working as
Professor and Principal in Pannai College of Engineering and
Technology, Sivagangai and rendered his valuable services for
more than two decades in various executive positions. He has
published more than 100 research level papers in various refereed
International/National level journals/proceedings. He has authored
for 11 text/reference books on IT domain. He has received 11
awards in appreciation of his excellence in the field of
research/education. He has visited 6 countries to present his
research papers/articles in various foreign universities. He has
been acting as consultant for training activities for various
organizations in and around Madurai. His area of interest is Big
data applications for bioinformatics domain. Under his guidance 8
Ph.D scholars pursuing and more than 150 M.Phil scholars were
awarded. His several research papers have been cited in various
citations.
Mrs. S. Azhagu Senthil : has been working as a
Lecturer in Department of Computer Science in Raja Doraisingam
Govt Arts College, Sivagangai for last 11 years. Her area of
interest is Computer Security exclusively with Watermarking. She
is pursuing her Ph.D degree in Computer Science under the
guidance of Dr. S. Thabasu Kannan. She is handling various
subjects related to Computer Science for both UG and PG.
Watermarking
Luminance
Steganographic
Transformation
Domain
In this paper it is clearly understood that noise is unwanted
thing for both text and images. This paper clearly
identifies that comparatively the effective and efficient
watermarking algorithm. The result displays that Bruyn
watermarking algorithm is better than any other algorithm
compared with Langelaar watermarking algorithm. As
compared the Bruyn watermarking algorithm and
Kutterwatermarking algorithm, the former its efficiency is
better for some cases and the latter its effectiveness is
better for some cases. The main factor which influences to
get the efficiency is “environment”.
1) R.C.Gonzalez and R.E.Woods, "Digital Image
Processing", Addison-Wesley Publishing company, Inc.,
2008.
2) B.Pfitzmann, "Information Hiding Terminology", Proc. of
First Int. Workshop on Information Hiding, Cambridge,
UK, May30-June1, 2009, Lecture notes in Computer
Science, Vol.1174, Ross Anderson(Ed.), pp.347-350. 3) F.A.P.Petitcolas, et al., "Information Hiding - A Survey",
Proceedings of the IEEE, Vol.87, No.7, July 1999,
pp.1062-1078.
4) Hal Berghel, "Watermarking Cyberspace",
Communications of the ACM, Nov.2009, Vol.40, No.11,
pp.19-24.
5) F. Mintzer, et.al., "Effective and Ineffective Digital
Watermarks", IEEE Intl. Conference on Image Processing,
ICIP-97, Vol.3, pp.9-12.
6) J. M. Acken, "How Watermarking Value to Digital
Content?",Communications of the ACM, July 1998, Vol.41,
No.7, pp.75-77.
7) I. J. Cox and M. Miller, "A Review of Watermarking and
Importance of perceptual Modelling", Proc. SPIE Human
Vision and Imaging, SPIE-3016, Feb 2008.
8) R.Barnett, "Digital Watermarking: application, techniques,
and challengs", IEE Electronics and Communication
Engineering Journal, August 1999, pp.173-183.
9) R. G. Van Schyndel, et.al., "A Digital Watermark", Proc.
IEEE Intl. Conf. on Image Processing, ICIP-94, Vol.2,
pp.86-90.
10) W. Bendor, et. al., "Techniques for Data Hiding", IBM
Systems Journal, Vol.35, No.3 and 4, pp. 313-336, 1996.
11) E. Franz, et. al., "Computer Based Steganography", Proc.
First Intl. Workshop on Information Hiding, Cambridge,
UK, May 30 - June 1, 1996, Lecture notes in Computer
Science, Vol.1174, Ross Anderson(Ed.).
12) F.A.P.Petitcolas, et al., "Information Hiding - A Survey",
Proceedings of the IEEE, Vol.87, No.7, July 1999,
pp.1062-1078.
13) J. Cox and M. Miller, "A Review of Watermarking and
Importance of perceptual Modelling", Proc. SPIE Human
Vision and Imaging, SPIE-3016, Feb 1997.
14) F. Mintzer, et. al., "Opportunities for Watermarking
Standards", Communications of the ACM, July 1998,
Vol.41, No.7, pp.57-64.
15) G.Voyatzis and I.Pitas, "The Use of Watermarks in the
Protection of Digital Multimedia Products", Proceedings of
the IEEE, Vol.87, No.7, July 1999, pp.1197-1207.