Lossless Watermarking for Image Ratification: An Implementation based on 12th Root of Exponential Function
Prajwalasimha S N1, Aishwarya V Kumar2, Arpitha C R, Swathi S3, Spoorthi B4

1Prajwalasimha S N*, Department of Electronics & Communication Engineering, ATME Research Centre, Mysuru, India.
2Aishwarya V Kumar, Department of Electronics & Communication Engineering, ATME College of Engineering, Mysuru, India.
3Arpitha C R, Department of Electronics & Communication Engineering, ATME College of Enginnering, Mysuru, India.
4Swathi S, Department of Electronics & Communication Engineering, ATME College of Engineering, Mysuru, India.
5Spoorthi B, Department of Electronics & Communication Engineering, ATME College of Enginnering, Mysuru, India.

Manuscript received on October 12, 2019. | Revised Manuscript received on 22 October, 2019. | Manuscript published on November 10, 2019. | PP: 4631-4636 | Volume-9 Issue-1, November 2019. | Retrieval Number: A4623119119/2019©BEIESP | DOI: 10.35940/ijitee.A4623.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In this article, an exponential transformation based digital image watermarking scheme has been described. The method is employed with 12th root of exponential function for embedding watermark into the cover image. Due to bulk data capacity of the image, many watermarking techniques uses more time for data insertion and separation processes. Algorithm is designed in such a way to embed a watermark of 1/16th size of host. The retrieved watermark is examined under various security analysis. Many standard test images are subjected for watermarking process under proposed scheme resulted with better scale and utilizes less computational time compared to other techniques.
Keywords: Watermarking, Exponential, Computational time, Bulk Data and Security Analysis.
Scope of the Article: Data Mining