© 2015 IJSRET 116 International Journal of Scientific Research & Engineering Trends Volume 1, Issue 6, Nov.-2015, ISSN (Online): 2395-566X BCH Encoded DWT Based Watermarking Scheme Based on Singular Value Decomposition for Higher PSNR Ratio Pravesh Chaubey, Ashish Singhadia Vedica Institute of Technology, Bhopal MP, India Email: erpravesh9113@gmail.com Abstract In this era of digital media, digital information suffers from copyright and integrity violations. In case of any dispute like rights violation and ownership of content creator, digital watermark play a vital role to protect the property rights of the original owner of digital information. Numerous of watermarking has been proposed recently but image quality ie imperceptibility and robustness of host image at receiving is need to be improved. Where the PSNR value indicate the visual quality of the image where higher PSNR value lead better image quality. So main research gap need to developed a watermarking scheme which prevent authentication of digital information with maintain higher PSNR ratio also. The embedding algorithm is robust against common image processing operations. It is concluded that the embedding and extraction of the proposed algorithm is well optimized, robust and show an improvement over other similar reported methods..Towards higher degree of robustness, transparency and blindness this paper proposed encoded hybrid digital watermarking Scheme (EHDWS) which is based discrete wavelet transform (DWT) and singular value decomposition (SVD). In EHDWS watermark singular bits are encoded by BCH code followed by DWT and SVD. In proposed hybrid digital image watermarking using of BCH based Singular Value Decomposition and Discrete wavelet Transformation algorithm is best .by using of this hybrid digital watermarking possible to harmless our image from many type of attack and higher PSNR value. Keywords Digital Watermark, DWT, Haar Transform, SVD , BCH Code I. INTRODUCTION The rapid development of digital technologies has improved access to information resources. These new technologies allow us to store, transfer and manage digital content with less time, less complexity and efficiency. However, the analysis also brings disadvantages, such as illegal copying and distribution of digital content. Internet plays an important role in the movement of unauthorized and illegal digital content. [1] This increases the risk of violating the owner of the copyright and prevent the authenticity of digital content. One way to protect digital content from illegal copying and distribution is to include additional information called watermark on it. Digital watermarking is injected to prevent the digital authentication information. Digital watermarking is integrated permanently in the care sector as an identification code or image that is visible or invisible and tends to discourage unauthorized copying. [2] If an intrusion attempt to harm or temper the water marked numerical data, Watermark help capture the action taken by the intruders based on the protection of copyright. Watermark with many features such as invisibility, transparency, security and robust protection of copyright servers, video authentication and fingerprint and copy control [3]. Tattoo work scenario can be divided in the spatial domain or frequency based on the human perception watermark can be visible or invisible. Watermark should be applied to the source and destination application. Watermark joins change the coefficient frequency image host using a common method such as the discrete Fourier transform (DFT), discrete cosine transform (DCT), Discrete Wavelet Transform (DWT), etc. [1]. In this paper the proposed technique will use the DWT transformation scheme for the digital watermarking. Which decomposes the input image in four components, namely, LL, HL, LH and HH, where the first letter corresponds with frequency offset of the row either low or high and second latter refer to filter applied to the columns. The lowest resolution level LL refer to approximate part of the host image [4] whereas rest three refer to detail parts and give the vertical high (LH), horizontal high (HL) and high (HH) frequencies. In the proposed algorithm, watermark is embedded into the host image by modifying the high frequency coefficients band i.e. HH sub band . The method of error correction coding used in this article is the BCH (Bose Chaudhuri Hocquenghem-) code (Lin and Costello, 1983). The algorithm is commonly applied to CCIR 584-1. This is a type of cyclic code that is capable of correcting random errors. BCH codes method used in this document each of the four data bits of a data flow of 7 bits. Therefore, we can call BCH (7, 4). It is assumed that the authentication data using encoding a BCH C (7, 4). When c is 1 error little can be converted back to an original. When AC 2-bit error can not be restored but can detect the existence of error. This method provides a method that is not only capable of authentication, but can also restore the authentication data manipulated to its original form. A cyclic code has good mathematical structure that includes a mechanism for automatic synchronization. This mechanism is provided by a shift register with linear feedback. If the data is not