IJSRSET1624161| Received : 16 August 2016 | Accepted : 08 Sep 2016 | September-October-2016 [(2)5: 27-31]
© 2016 IJSRSET | Volume 2 | Issue 5 | Print ISSN: 2395-1990 | Online ISSN : 2394-4099
Themed Section: Engineering and Technology
27
A Survey on various Image Water marking Techniques and
Features in Digital Image Processing
Aditi Kurapa
1*
, Mahendra Sahare
2
1
M. Tech Student of Computer Science
2
Assistant Professor, Computer Science Department, NIIST College, Bhopal, Madhya Pradesh, India
ABSTRACT
As the digital world is growing with various kinds of data like text file, image, video. Out of those image plays
an important role in different field such as remote sensing, social media, etc. So maintain the image quality is
done by Digital image processing on various issues. This paper gives a brief survey of image watermarking
techniques of embedding and extraction for various environmental scenes. Image analysis features are describe
in this paper with there requirements like DCT, LSB. As hiding, data is watermarking but it goes under some
kind of attacks, which are also cover in this paper as they are the best measure for comparing different
techniques of watermarking.
Keywords: Digital Image Processing, Embedding, Extraction, DCT, LSB.
I. INTRODUCTION
Digital water marking is a kind of information or data
hiding process by this digital data authentication is
provide. This can be understand as the ease of transfer
of the data from one place to another is so fast and
flexible that manipulation of the original content might
possible, so it might get difficult for the user or the
end party that the content it using is original or not. In
order to provide some procedure for checking the
originality of the digital content this technique of
digital watermarking has been developed. Now some
important parameters, which should be taken care, is
to balance the hiding content into the original one.
This can be understand as if the original content is
overload by the hiding content then chance of the
original content loss is more.
So watermarking techniques has to care a lot for the
complete authentication of the originality as well as
without affecting the data. Whole process of
authentication is done in two steps
First is embedding Algorithm here the watermark is
embedded on the original content which may be image,
video, etc and watermark is any data or image,
sometime key is required for embedding.
Figure 1. Embedding of watermark
Other step is the Extraction of watermark from the
received data, now if the receiver extracts watermark
and that is same as the original one then received data
is authentic otherwise it is unauthentic.