International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 1, Jan - Feb 2016 ISSN: 2347-8578 www.ijcstjournal.org Page 151 RESEARCH ARTICLE OPEN ACCESS Watermark Extraction and Validation in Images Using Hybrid Techniques Chhaya Verma, Dr. Sandhya Tarar School of Information and Communication Technology Gautam Buddha University, Greater Noida - 201308 Uttar Pradesh India ABSTRACT A hybrid watermarking technique for the purpose of protection of multimedia data from copyright and integrity violation. The content providers are more concerned for proper creation and distribution. Different watermarking algorithms are used in various applications, they are mainly used for authentication. Mainly watermarks are digital signals, patterns inserted in digital images. For the protection of Intellectual Property Rights and authentication digital watermarking schemes are used like Integer wavelet transform and singular value decomposition. LWT authenticate the image and SVD for the watermark image. The pixels which are compressed based on the pseudorandom are distributed in wavelet domain. It is done by embedding watermark on singular values of (LL) sub band. Discrete Wavelet Transform is not that efficient so Integer Wavelet Transform is implemented. Now the original image is extracted by separating watermark image from watermarked. Then watermark validation is done for validating the extracted watermark. Keywords:- Integer wavelet transform, singular values, lifting scheme, watermarks. I. INTRODUCTION In order to maintain the authenticity and data integrity of image, watermarking schemes are used. The main goal for embedding watermarks is to solve the problem of unauthorized copying and tampering. It depends upon the application and the needs of the user. Some embedding algorithm and a pseudo noise pattern are used for inserting watermarks as a plain-bit sample or a digital signal into the source data. The low-value bits of picture pixels hides the embedded information. Other value domains are inked inseparably with the source of the data structure. Watermarking can be classified as-one done spatially and the other in the transform domain. There are mainly two transforms which are used for the carrier image, and for the watermark to be embedded in the carrier. Figure 1: Diagram representing digital watermarking system II. RELATED WORKS S. Kurshid Jinna [1], in their research work they had use location map free watermarking. The location of data embedded in the image is detected using location map, as it indicates the pixel positions of data. But in this