IJSRSET1624161| Received : 16 August 2016 | Accepted : 08 Sep 2016 | September-October-2016 [(2)5: 27-31] © 2016 IJSRSET | Volume 2 | Issue 5 | Print ISSN: 2395-1990 | Online ISSN : 2394-4099 Themed Section: Engineering and Technology 27 A Survey on various Image Water marking Techniques and Features in Digital Image Processing Aditi Kurapa 1* , Mahendra Sahare 2 1 M. Tech Student of Computer Science 2 Assistant Professor, Computer Science Department, NIIST College, Bhopal, Madhya Pradesh, India ABSTRACT As the digital world is growing with various kinds of data like text file, image, video. Out of those image plays an important role in different field such as remote sensing, social media, etc. So maintain the image quality is done by Digital image processing on various issues. This paper gives a brief survey of image watermarking techniques of embedding and extraction for various environmental scenes. Image analysis features are describe in this paper with there requirements like DCT, LSB. As hiding, data is watermarking but it goes under some kind of attacks, which are also cover in this paper as they are the best measure for comparing different techniques of watermarking. Keywords: Digital Image Processing, Embedding, Extraction, DCT, LSB. I. INTRODUCTION Digital water marking is a kind of information or data hiding process by this digital data authentication is provide. This can be understand as the ease of transfer of the data from one place to another is so fast and flexible that manipulation of the original content might possible, so it might get difficult for the user or the end party that the content it using is original or not. In order to provide some procedure for checking the originality of the digital content this technique of digital watermarking has been developed. Now some important parameters, which should be taken care, is to balance the hiding content into the original one. This can be understand as if the original content is overload by the hiding content then chance of the original content loss is more. So watermarking techniques has to care a lot for the complete authentication of the originality as well as without affecting the data. Whole process of authentication is done in two steps First is embedding Algorithm here the watermark is embedded on the original content which may be image, video, etc and watermark is any data or image, sometime key is required for embedding. Figure 1. Embedding of watermark Other step is the Extraction of watermark from the received data, now if the receiver extracts watermark and that is same as the original one then received data is authentic otherwise it is unauthentic.