You are on page 1of 7

[Senders Name]

[Address line 1]
[Address line 2]
[State, ZIP Code]
Sample Letter #3: Cancel a membership or subscription
[Letter Date]
[Recipients Name]
[Address line 1]
[Address line 2]
[State, ZIP Code]
[Subject: Normally bold, summarizes the intention of the letter] -OptionalDear [Recipients Name],

Kindly process the cancellation of my subscription to Woman Talk. I feel that your magazine has lately
been focusing on superficial issues and less on matters that truly affect women in the real world. I
understand from the warranty that you will reimburse the whole subscription amount. You can send the
confirmation and reimbursement to the same address that I have previously indicated.

Sincerely, International Journal of Computer Application and Technology (IJCAT) Volume 1 Issue

1 (April 2014) ISSN: 2349-1841 16 www.technopublications.com

TEXT WATER MARKING USING TECHNIQUES DCT AND


DWT: A REVIEW Harmandeep Kaur1, Er.Simarjeet Kaur2 1M.Tech (Computer Science), Sri Guru
Granth Sahib World University, India 2Assistant Professor (Computer Science), Sri Guru Granth Sahib World
University, India
ABSTRACT: - Digital watermarking is protection provider for multimedia content over Internet. Now a days very sensitive
information flows through the network, so the protection of information is necessary. To protect the multimedia applications
from copyright issues a digital watermarking technique is used. Digital watermarking is the general technique of embedding
the information in the original file, the information can be audio, video, images and text. Text can be hidden inside the image,
audio, video as a watermark. So using this way of encryption we can avoid any other person to access data. The main
advantage of text watermarking is that a user can send data over Internet with a faith that no one can forge or access its
personal text. Many techniques are available for text watermarking such as SVD and LSB. In this paper our focus is on text
watermarking concept and the results of watermarking techniques are compared. Keywords: - Text document watermarking,
DCT, DWT, SVD and LSB.

I. INTRODUCTION
Watermarking is a concept which is used to save the document from the copyright issue. Watermark comes behind the original
document and it is suppose not to harm the original content. Many software companies are using the concept of watermark for
their documents. The best example is Microsofts word. To protect the digital data we need full security at a good level to
embed the text such as major websites contents are like paper, legal document, letter, SMS etc. Digital watermarking is a
process in which information can hide in form of image, audio, video etc. Hidden information extracted at the receiving end
known as decryption process. So to protect the data from outside world for illegal accessing of information watermarking is
used. To protect data from illegal authorities we have many techniques like cryptography, watermarking, steganography.
Encryption and decryption process of data comes under steganography. In case of encryption data is encrypted and outside
world or third parties cannot access it. Then on receiver side after decrypting there is no any provision to protect data from

replications. So encryption exists on sender side and decryption exists on receiver side. Text watermarking technique have been
developed in past to protect the data from illegal copies, any forgery with data or prevent copyright. This technique is proposed
for English language text either in use textual or image watermark. There are many ways to forgery with data as like insertion,
deletion or recorded a copy of data. The existing text watermarking algorithms are not robust against random tampering attacks
(insertion, deletion or reordering of words). Watermarks composed of both image and text make the text secure and has better
robustness [1].Text document watermarking is shown in fig 1.
Fig1. Text is hidden in image In this figure we add text in image that is not possible to find out data. Attacker confuse at this point, Is
this only image or image with text? International Journal of Computer Application and Technology
(IJCAT) Volume 1 Issue 1 (April 2014) ISSN: 2349-1841 17 www.technopublications.com

There are two types of digital watermarking: visible (perceptible) and invisible (imperceptible). Invisible watermarking,
watermarks are embedded in such a way that they are visible when the content is viewed. Invisible watermarks cannot be seen
but recovering of watermark is possible with an appropriate decoding algorithm.
II. RELATED WORK
Kumar et al (2012) proposed a unique technique which combines and uses DCT DWT & SVD algorithm for the watermarking
technique. They have used the base image for the content storage and the text for the merging part. The approach is quite
appreciable and its algorithm is explained is quite clearly explained in the paper. The only drawback in this paper is that it has
not been used for the medical image which has been provided as the future scope of this paper [1]. Surya Pratap Singh (2012)
introduces a combinational algorithm for the color and gray scale image watermarking. This paper focuses on time based
watermarking. The time based watermarking indicates the significance of how effectively the content has been encrypted and
merged into the base content. They describe that if the time of retrieval is more, the performance is good. The work is
appreciable and can be useful for the future research works [2]. Sharma et al (2012) presents a new proposal for hiding a logobased watermark in color still image. This dodge is based on averaging of central frequency coefficients of block Discrete
Cosine Transform (DCT) coefficients of an image. It is unique from earlier dodge based on middle frequency coefficient by
mean of high redundancy, to nurture malicious attacks. Here we propose algorithm of aliquot watermarking technique based on
DCT (Discrete Cosine Transformation) using mid band for robustness. Through adjusting the block DCT coefficient of the
image the watermarks are numbered [3].
Fezollari et al (2012) concludes that some of these algorithms are robust against some attacks but not against some others.SVD
based algorithms are new and demand continuous improvements. In their approach they provided some SVD based algorithms
and furthermore suggested an idea of a DCT SVD based algorithm. The modified method is applicable for some attacks
compare with Sverdlov Method. Moreover a digital watermarking scheme was implemented in the Xilinx Virtex II Pro
platform in which the alternation of the watermarking algorithm from encoder to decoder is sufficient for the scheme to be
dynamic [4]. Priyanka Sharma (2012) discusses about the quality management while the operation performance of
watermarking. She studied that there are a lot of algorithms which can be useful for the watermarking but it is important to
maintain the quality of the base content. She has used the term entropy to find the quality of the base image. Basically it is the
disorder which occur when so ever we perform the operation [5]. Qing-Cheng Li (2012) presents a novel text watermarking
technique but for the Chinese text only. In his approach he has discussed the bit stream pattern of the text on the basis of which
the merging can be done .His approach also describes the pictographic approach of the text and the visual ability of the user.
The approach is although has an effective thinking but the problem is as the Chinese language is so sophisticated, it fits there
but not with every language. His algorithm has been designed especially for Chinese characters and hence this algorithm
cannot be used for global language [6]. Aziz Shahid et al (2010) presented a zero text watermarking scheme in the international
conference of 2010. According to them, Existing text watermarking algorithms are not robust against random insertion and
deletion attacks on text. With the increasing volume of attack, the survival of watermark in text becomes challenging and hence
they developed a novel text watermarking algorithm that can be used for copyright protection of textual contents. They
compared their results with other existing algorithm of the same contrast and their results are found to be effective enough to
get proceeded for modification [7]. Makarand L. Mali (2012) presented a watermarking scheme on the basis of Natural
Language Processing. It was a fantastic idea to introduce Neural Networks into the contrast of encryption. The Neural Network
generates weight for each and every input provided to it rather than taking everything as an input stream. The pattern changing
of neural network is quite similar to SVM as it also converts the entire input according its simplification and then proceeds.
Hence his method is quite effective and can be considered for future development process [8].
Nidhi Divecha (2012) presented a watermarking scheme based on the wavelet quantization method which is again an
appreciable effort in this filed. DWT stands for Discrete Wavelet Transformation and it converts the entire data scenario into
waves. Proceeding International Journal of Computer Application and Technology (IJCAT) Volume 1
Issue 1 (April 2014) ISSN: 2349-1841 18 www.technopublications.com

the texts as wave is a unique method in this type of implementation. The effort done by Nidihi had only one drawback , she did
not mention the type of wavelet transformation she is using as there are a lot of wavelet transformation like Dabuchi, Symlet
and others and hence her method can be tried with the above mentioned wavelet family members [9]. Fahim Irfan Alam (2012)
introduced the concept of signature in his scheme of watermarking. The signature system is bit similar to the private and public
key concept in which the public key is visible to all but it requires a private key to get unlocked. If this method is tried under
invisible watermarking concept, it is fine but if it is used as a visible watermarking concept, the motive of hiding of data
remains untouched as the user would be able to identify easily that some data is hidden behind the encrypted text [10].
III. TEXT WATERMARKING BASED ON DCT
DCTs are used to convert data into the summation of a series of cosine waves oscillating at different frequencies. They are
widely used in image and audio compression. They are very similar to Fourier Transforms, but DCT involves the use of just
Cosine functions and real coefficients, whereas Fourier Transformations make use of both Sins and Cosines and require the use
of complex numbers. DCTs are simpler to calculate. Both Fourier and DCT convert data from a spatial-domain into a
frequency-domain and their respective inverse functions convert things back the other way. The JPEG (Joint Photographic
Experts Group) format uses DCT to compress images. Frequency components of DCT block should be high frequency, because
of the heavy quantization of coefficients during JPEG compression. Hence it is better to embed the watermark in mid or high
frequency DCT components. If the embedding factor M is chosen small, embedding the watermark in lowest frequency
components will be more desirable, because these components are the ones that are least likely to be quantized in JPEG
compression. The flow chart of the algorithm is shown in figure 2.
Fig. 2: The DCT algorithm flow chart

IV. TEXT WATERMARKING BASED ON DWT


Wavelet domain is a promising domain for watermark embedding. Wavelet refers to small waves. Discrete Wavelet Transform
is based on small waves of limited duration and varying frequency [3]. This is a frequency domain technique in which firstly
cover image is transformed into frequency domain and then its frequency coefficients are modified in accordance with the
transformed coefficients of the watermark and watermarked image is obtained which is very much robust. DWT decomposes
image hierarchically, providing both spatial and frequency description of the image. Then the image is decomposing in three
directions i.e. vertical, horizontal and diagonal in results to separate different components name as LL, HL, LH, and HH. Here
letter L and H refers to applying either low pass frequency operation or high pass frequency operations to the rows and the
second letter refers to the International Journal of Computer Application and Technology (IJCAT)
Volume 1 Issue 1 (April 2014) ISSN: 2349-1841 19 www.technopublications.com

filter applied to the columns of the cover image [4]. As shown


in fig 3.
Fig.3 Two-level DWT Algorithm for carrying out DWT: Step1. By
using DWT, we decompose the original image in some subbands. Step2. In this step our work is to choose a Sub-band for
embedding watermark that should be most suitable. Step3. The
Wavelet coefficients of the selected sub-band are modified
according to the watermark image. Step4. After embedding
watermark, watermarked image is obtained.
V. OTHER TECHNIQUES
There are many other techniques excluding DCT and DWT for
watermarking which are as follows:
a) Singular Value Decomposition (SVD)
Singular Value Decomposition transform is a linear algebra
transform which is used for factorization of a real or complex
matrix with numerous applications in various fields of image
processing [5]. As a digital image can be represented in a
matrix form with its entries giving the intensity value of each
pixel in the image, SVD of an image M with dimensions m x m
is given by: M=USVT Where, U and V are orthogonal matrices
and S known as singular matrix is a diagonal matrix carrying
non-negative singular values of matrix M. There are two main
properties of SVD to employ in digital watermarking schemes
[6]:
1. Quality of image does not affect by Small variations in
singular values
2. Singular values of an image have high stability so; they do
not change after various attacks.
b) LEAST SIGNIFICANT BIT (LSB) This is invisible digital
watermarking technique, in which each 8-bit pixels least
significant bit is overwritten with a bit from the watermark. In a
digital image, information can be inserted directly into every bit
of image information or the more busy areas of an image can be
calculated so as to hide such messages in less perceptible parts
of an image. For example, assume the image uses a 24-bit RGB
color model (Figure 4). The first image pixel has a teal green
color (0x008080), while the first watermark byte is 0xDC.
First, the image pixel is divided into its constituent bytes of red,
green, and blue as shown in figure 4. 0x008080 => r: 0x00, g:
0x80, b: 0x80 Then the watermark byte is divided into pairs of
bits. Next embed each bit pair into bits 1 and 0 of each color
byte. So the red byte (0x00) becomes 0x03, the green byte
(0x80) becomes 0x81, and the blue byte (0x80) becomes
0x83. Then use these modified bytes to recolor the image
pixel. The new pixel color, however, seems to be the same teal
color (Figure 4).
Fig. 4 Example of LSB

International Journal of
Computer Application and Technology (IJCAT)
Volume 1 Issue 1 (April 2014) ISSN: 2349-1841
Fig. 4 Encoding of watermark bits

20 www.technopublications.com

VI. COMPARITIVE RESULT


Comparative result of DCT and DWT need GUI first of all. So
we develop DCT GUI and DWT GUI as shown in fig 5.1 and
fig 5.2:
Fig.5.1 GUI for DWT Based Watermarking
Fig.5.2 GUI for DCT Based Watermarking There

is evolution of results
on the basis of three images as shown in GUI. Table I show
results for imperceptibility.
So with graph presentation comparison between both
techniques can be discussed very well.
Fig .6 PSNR value of DCT with Cropping & Resizing
Fig 7 PSNR value of DWT with Cropping & Resizing Fig

6 and fig 7
shows the results of DCT and DWT to find PSNR value of the
basis of cropping and resizing.
VII. CONCLUSION

Many techniques are available for watermarking and


finally come to a conclusion that every technique provides
protection to digital data. Each one secures the information
in different way on different level. In this paper, we
described a combined DCT-DWT digital image
watermarking algorithm. We conclude DWT technique
provides better image quality than DCT technique,
especially at higher threshold values. For lower threshold
values, 8X8 DCT gives similar results as DWT but for
higher threshold, the quality of images compressed using
DWT slowly degrades while the quality of 8X8 DCT
compressed images deteriorates rapidly. At lower threshold
DCT should be used but at higher threshold, DCT cannot
be used because of poor image quality. International

Journal of Computer Application and


Technology (IJCAT) Volume 1 Issue 1 (April
2014) ISSN: 2349-1841 21
www.technopublications.com

VIII. REFERENCES [1] Jaseena K.U., Anita John, Text Watermarking using Combined Image and Text for Authentication and
Protection, International Journal of Computer Applications (0975 8887) Volume 20 No.4, April 2011. [2] Wen Yuan Chen and Shih Yuan
Huang, Digital Watermarking Using DCT Transformation, Digital Watermarking Using DCT Transformation. [3] Chunlin Song,
SudSudirman, MadjidMerabti, Recent Advances and Classification of Watermarking Techniques in Digital Images, ISBN: 978-1-90256022-9 2009 PGNet [4] M. MohamedSathik, S. S. Sujatha,A Novel DWT Based Invisible Watermarking Technique for Digital Images,
International Arab Journal of e-Technology, Vol 2, no. 3, pp. 167-173, January 2012. [5] Manjunath. M, Prof. Siddappaji, A New Robust Semi
blind Watermarking Using Block DCT and SVD, IEEE International Conference on Advanced Communication Control and Computing
Technologies (ICACCCT), pp. 193-197, 2012. [6] L. Demanet Curvelets, wave atoms, and wave equations, Ph.D. thesis, Caltech, 2006. [7]
Kumar Robust Digital Watermarking using DWT-DCT-SVD, International Journal of Engineering Research and Applications (IJERA)
ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 3, May-Jun 2012, pp.991-997. [8] Surya Pratap Singh, A Robust Watermarking Approach
using DCT-DWT, International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459,
Volume 2, Issue 8, August (2012).
[9] Sharma, Analysis of robust watermarking technique using mid band DCT, International Journal of
Scientific and Research Publications, Volume 2, Issue 3, March 2012 1 ISSN 2250-3153. [10] Albian Fezollari,
Implementation of Robust Digital Watermarking Algorithms using SVD and DCT Techniques, ICT
Innovations 2012 Web Proceedings - Poster Session ISSN 1857-7288. [11] Priyanka Sharma, Quality
Enhancement of Watermarking System Using Discrete Cosine Transform, International Journal of Scientific
& Engineering Research Volume 3, Issue 4, April-2012 ISSN 2229-5518. [12] Mohammad Ibrahim Khan,
Implementation of robust watermarking using SVD, International Journal of Computer Applications, vol. 62,
issue 13, January 2013, pp. 29-36. [13] Kamaljeet Kaur, Image Watermarking Using LSB, International Journal
of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 4, April 2013 ISSN: 2277
128X. [14] Swati Patel, Comparative Analysis between DCT & DWT Techniques of Image Compression,
Journal of Information Engineering and Applications Volume 1, No.2, 2011 ISSN 2224-5758 (print) ISSN 2224-896X.

[Senders Name]
[Senders Title] -Optional- See more at: http://www.samplelettersworld.com/sample-letters/cancellation-letters/2010cancel-a-membership-or-subscription-sample-letter-3#sthash.5vMOxR7R.dpuf

You might also like