Professional Documents
Culture Documents
[Address line 1]
[Address line 2]
[State, ZIP Code]
Sample Letter #3: Cancel a membership or subscription
[Letter Date]
[Recipients Name]
[Address line 1]
[Address line 2]
[State, ZIP Code]
[Subject: Normally bold, summarizes the intention of the letter] -OptionalDear [Recipients Name],
Kindly process the cancellation of my subscription to Woman Talk. I feel that your magazine has lately
been focusing on superficial issues and less on matters that truly affect women in the real world. I
understand from the warranty that you will reimburse the whole subscription amount. You can send the
confirmation and reimbursement to the same address that I have previously indicated.
Sincerely, International Journal of Computer Application and Technology (IJCAT) Volume 1 Issue
I. INTRODUCTION
Watermarking is a concept which is used to save the document from the copyright issue. Watermark comes behind the original
document and it is suppose not to harm the original content. Many software companies are using the concept of watermark for
their documents. The best example is Microsofts word. To protect the digital data we need full security at a good level to
embed the text such as major websites contents are like paper, legal document, letter, SMS etc. Digital watermarking is a
process in which information can hide in form of image, audio, video etc. Hidden information extracted at the receiving end
known as decryption process. So to protect the data from outside world for illegal accessing of information watermarking is
used. To protect data from illegal authorities we have many techniques like cryptography, watermarking, steganography.
Encryption and decryption process of data comes under steganography. In case of encryption data is encrypted and outside
world or third parties cannot access it. Then on receiver side after decrypting there is no any provision to protect data from
replications. So encryption exists on sender side and decryption exists on receiver side. Text watermarking technique have been
developed in past to protect the data from illegal copies, any forgery with data or prevent copyright. This technique is proposed
for English language text either in use textual or image watermark. There are many ways to forgery with data as like insertion,
deletion or recorded a copy of data. The existing text watermarking algorithms are not robust against random tampering attacks
(insertion, deletion or reordering of words). Watermarks composed of both image and text make the text secure and has better
robustness [1].Text document watermarking is shown in fig 1.
Fig1. Text is hidden in image In this figure we add text in image that is not possible to find out data. Attacker confuse at this point, Is
this only image or image with text? International Journal of Computer Application and Technology
(IJCAT) Volume 1 Issue 1 (April 2014) ISSN: 2349-1841 17 www.technopublications.com
There are two types of digital watermarking: visible (perceptible) and invisible (imperceptible). Invisible watermarking,
watermarks are embedded in such a way that they are visible when the content is viewed. Invisible watermarks cannot be seen
but recovering of watermark is possible with an appropriate decoding algorithm.
II. RELATED WORK
Kumar et al (2012) proposed a unique technique which combines and uses DCT DWT & SVD algorithm for the watermarking
technique. They have used the base image for the content storage and the text for the merging part. The approach is quite
appreciable and its algorithm is explained is quite clearly explained in the paper. The only drawback in this paper is that it has
not been used for the medical image which has been provided as the future scope of this paper [1]. Surya Pratap Singh (2012)
introduces a combinational algorithm for the color and gray scale image watermarking. This paper focuses on time based
watermarking. The time based watermarking indicates the significance of how effectively the content has been encrypted and
merged into the base content. They describe that if the time of retrieval is more, the performance is good. The work is
appreciable and can be useful for the future research works [2]. Sharma et al (2012) presents a new proposal for hiding a logobased watermark in color still image. This dodge is based on averaging of central frequency coefficients of block Discrete
Cosine Transform (DCT) coefficients of an image. It is unique from earlier dodge based on middle frequency coefficient by
mean of high redundancy, to nurture malicious attacks. Here we propose algorithm of aliquot watermarking technique based on
DCT (Discrete Cosine Transformation) using mid band for robustness. Through adjusting the block DCT coefficient of the
image the watermarks are numbered [3].
Fezollari et al (2012) concludes that some of these algorithms are robust against some attacks but not against some others.SVD
based algorithms are new and demand continuous improvements. In their approach they provided some SVD based algorithms
and furthermore suggested an idea of a DCT SVD based algorithm. The modified method is applicable for some attacks
compare with Sverdlov Method. Moreover a digital watermarking scheme was implemented in the Xilinx Virtex II Pro
platform in which the alternation of the watermarking algorithm from encoder to decoder is sufficient for the scheme to be
dynamic [4]. Priyanka Sharma (2012) discusses about the quality management while the operation performance of
watermarking. She studied that there are a lot of algorithms which can be useful for the watermarking but it is important to
maintain the quality of the base content. She has used the term entropy to find the quality of the base image. Basically it is the
disorder which occur when so ever we perform the operation [5]. Qing-Cheng Li (2012) presents a novel text watermarking
technique but for the Chinese text only. In his approach he has discussed the bit stream pattern of the text on the basis of which
the merging can be done .His approach also describes the pictographic approach of the text and the visual ability of the user.
The approach is although has an effective thinking but the problem is as the Chinese language is so sophisticated, it fits there
but not with every language. His algorithm has been designed especially for Chinese characters and hence this algorithm
cannot be used for global language [6]. Aziz Shahid et al (2010) presented a zero text watermarking scheme in the international
conference of 2010. According to them, Existing text watermarking algorithms are not robust against random insertion and
deletion attacks on text. With the increasing volume of attack, the survival of watermark in text becomes challenging and hence
they developed a novel text watermarking algorithm that can be used for copyright protection of textual contents. They
compared their results with other existing algorithm of the same contrast and their results are found to be effective enough to
get proceeded for modification [7]. Makarand L. Mali (2012) presented a watermarking scheme on the basis of Natural
Language Processing. It was a fantastic idea to introduce Neural Networks into the contrast of encryption. The Neural Network
generates weight for each and every input provided to it rather than taking everything as an input stream. The pattern changing
of neural network is quite similar to SVM as it also converts the entire input according its simplification and then proceeds.
Hence his method is quite effective and can be considered for future development process [8].
Nidhi Divecha (2012) presented a watermarking scheme based on the wavelet quantization method which is again an
appreciable effort in this filed. DWT stands for Discrete Wavelet Transformation and it converts the entire data scenario into
waves. Proceeding International Journal of Computer Application and Technology (IJCAT) Volume 1
Issue 1 (April 2014) ISSN: 2349-1841 18 www.technopublications.com
the texts as wave is a unique method in this type of implementation. The effort done by Nidihi had only one drawback , she did
not mention the type of wavelet transformation she is using as there are a lot of wavelet transformation like Dabuchi, Symlet
and others and hence her method can be tried with the above mentioned wavelet family members [9]. Fahim Irfan Alam (2012)
introduced the concept of signature in his scheme of watermarking. The signature system is bit similar to the private and public
key concept in which the public key is visible to all but it requires a private key to get unlocked. If this method is tried under
invisible watermarking concept, it is fine but if it is used as a visible watermarking concept, the motive of hiding of data
remains untouched as the user would be able to identify easily that some data is hidden behind the encrypted text [10].
III. TEXT WATERMARKING BASED ON DCT
DCTs are used to convert data into the summation of a series of cosine waves oscillating at different frequencies. They are
widely used in image and audio compression. They are very similar to Fourier Transforms, but DCT involves the use of just
Cosine functions and real coefficients, whereas Fourier Transformations make use of both Sins and Cosines and require the use
of complex numbers. DCTs are simpler to calculate. Both Fourier and DCT convert data from a spatial-domain into a
frequency-domain and their respective inverse functions convert things back the other way. The JPEG (Joint Photographic
Experts Group) format uses DCT to compress images. Frequency components of DCT block should be high frequency, because
of the heavy quantization of coefficients during JPEG compression. Hence it is better to embed the watermark in mid or high
frequency DCT components. If the embedding factor M is chosen small, embedding the watermark in lowest frequency
components will be more desirable, because these components are the ones that are least likely to be quantized in JPEG
compression. The flow chart of the algorithm is shown in figure 2.
Fig. 2: The DCT algorithm flow chart
International Journal of
Computer Application and Technology (IJCAT)
Volume 1 Issue 1 (April 2014) ISSN: 2349-1841
Fig. 4 Encoding of watermark bits
20 www.technopublications.com
is evolution of results
on the basis of three images as shown in GUI. Table I show
results for imperceptibility.
So with graph presentation comparison between both
techniques can be discussed very well.
Fig .6 PSNR value of DCT with Cropping & Resizing
Fig 7 PSNR value of DWT with Cropping & Resizing Fig
6 and fig 7
shows the results of DCT and DWT to find PSNR value of the
basis of cropping and resizing.
VII. CONCLUSION
VIII. REFERENCES [1] Jaseena K.U., Anita John, Text Watermarking using Combined Image and Text for Authentication and
Protection, International Journal of Computer Applications (0975 8887) Volume 20 No.4, April 2011. [2] Wen Yuan Chen and Shih Yuan
Huang, Digital Watermarking Using DCT Transformation, Digital Watermarking Using DCT Transformation. [3] Chunlin Song,
SudSudirman, MadjidMerabti, Recent Advances and Classification of Watermarking Techniques in Digital Images, ISBN: 978-1-90256022-9 2009 PGNet [4] M. MohamedSathik, S. S. Sujatha,A Novel DWT Based Invisible Watermarking Technique for Digital Images,
International Arab Journal of e-Technology, Vol 2, no. 3, pp. 167-173, January 2012. [5] Manjunath. M, Prof. Siddappaji, A New Robust Semi
blind Watermarking Using Block DCT and SVD, IEEE International Conference on Advanced Communication Control and Computing
Technologies (ICACCCT), pp. 193-197, 2012. [6] L. Demanet Curvelets, wave atoms, and wave equations, Ph.D. thesis, Caltech, 2006. [7]
Kumar Robust Digital Watermarking using DWT-DCT-SVD, International Journal of Engineering Research and Applications (IJERA)
ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 3, May-Jun 2012, pp.991-997. [8] Surya Pratap Singh, A Robust Watermarking Approach
using DCT-DWT, International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459,
Volume 2, Issue 8, August (2012).
[9] Sharma, Analysis of robust watermarking technique using mid band DCT, International Journal of
Scientific and Research Publications, Volume 2, Issue 3, March 2012 1 ISSN 2250-3153. [10] Albian Fezollari,
Implementation of Robust Digital Watermarking Algorithms using SVD and DCT Techniques, ICT
Innovations 2012 Web Proceedings - Poster Session ISSN 1857-7288. [11] Priyanka Sharma, Quality
Enhancement of Watermarking System Using Discrete Cosine Transform, International Journal of Scientific
& Engineering Research Volume 3, Issue 4, April-2012 ISSN 2229-5518. [12] Mohammad Ibrahim Khan,
Implementation of robust watermarking using SVD, International Journal of Computer Applications, vol. 62,
issue 13, January 2013, pp. 29-36. [13] Kamaljeet Kaur, Image Watermarking Using LSB, International Journal
of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 4, April 2013 ISSN: 2277
128X. [14] Swati Patel, Comparative Analysis between DCT & DWT Techniques of Image Compression,
Journal of Information Engineering and Applications Volume 1, No.2, 2011 ISSN 2224-5758 (print) ISSN 2224-896X.
[Senders Name]
[Senders Title] -Optional- See more at: http://www.samplelettersworld.com/sample-letters/cancellation-letters/2010cancel-a-membership-or-subscription-sample-letter-3#sthash.5vMOxR7R.dpuf