Embedding and Extracting Two Separate Images Signal in Salt & Pepper Noises in Digital Images based on Watermarking

Similar documents
Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt and Pepper Noise Attacks

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

PERFORMANCE ANALYSIS OF LINEAR AND NON LINEAR FILTERS FOR IMAGE DE NOISING

Keywords Secret data, Host data, DWT, LSB substitution.

An Adaptive Wavelet and Level Dependent Thresholding Using Median Filter for Medical Image Compression

A.P in Bhai Maha Singh College of Engineering, Shri Muktsar Sahib

Implementation of Block based Mean and Median Filter for Removal of Salt and Pepper Noise

Local prediction based reversible watermarking framework for digital videos

Fuzzy Logic Based Adaptive Image Denoising

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

An Enhanced Least Significant Bit Steganography Technique

Watermarking patient data in encrypted medical images

Journal of mathematics and computer science 11 (2014),

A New Image Steganography Depending On Reference & LSB

Digital Image Watermarking by Spread Spectrum method

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Colored Digital Image Watermarking using the Wavelet Technique

C. Efficient Removal Of Impulse Noise In [7], a method used to remove the impulse noise (ERIN) is based on simple fuzzy impulse detection technique.

An Efficient DTBDM in VLSI for the Removal of Salt-and-Pepper Noise in Images Using Median filter

An Optimal Pixel-level Self-repairing Authentication. Method for Grayscale Images under a Minimax. Criterion of Distortion Reduction*

FPGA implementation of DWT for Audio Watermarking Application

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

International Journal of Advance Research in Computer Science and Management Studies

ABSTRACT I. INTRODUCTION

FUZZY BASED MEDIAN FILTER FOR GRAY-SCALE IMAGES

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

A Fast Median Filter Using Decision Based Switching Filter & DCT Compression

I. INTRODUCTION II. EXISTING AND PROPOSED WORK

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

A Reversible Data Hiding Scheme Based on Prediction Difference

A Study On Preprocessing A Mammogram Image Using Adaptive Median Filter

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

Removal of High Density Salt and Pepper Noise through Modified Decision based Un Symmetric Trimmed Median Filter

Watermarking System Using LSB

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

Steganography using LSB bit Substitution for data hiding

Image Compression and Decompression Technique Based on Block Truncation Coding (BTC) And Perform Data Hiding Mechanism in Decompressed Image

Absolute Difference Based Progressive Switching Median Filter for Efficient Impulse Noise Removal

FPGA IMPLEMENTATION OF RSEPD TECHNIQUE BASED IMPULSE NOISE REMOVAL

GNE College, Ludhiana, Punjab, India

Neural Network with Median Filter for Image Noise Reduction

Impulse Noise Removal Based on Artificial Neural Network Classification with Weighted Median Filter

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform

Tampering Detection Algorithms: A Comparative Study

Analysis and Implementation of Mean, Maximum and Adaptive Median for Removing Gaussian Noise and Salt & Pepper Noise in Images

An Efficient Gaussian Noise Removal Image Enhancement Technique for Gray Scale Images V. Murugan, R. Balasubramanian

Noise Adaptive and Similarity Based Switching Median Filter for Salt & Pepper Noise

Visual Secret Sharing Based Digital Image Watermarking

Performance Analysis of Local Adaptive Real Oriented Dual Tree Wavelet Transform in Image Processing

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

FPGA implementation of LSB Steganography method

Image Steganography using Sudoku Puzzle for Secured Data Transmission

Decision Based Median Filter Algorithm Using Resource Optimized FPGA to Extract Impulse Noise

Lossless Image Watermarking for HDR Images Using Tone Mapping

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

DENOISING DIGITAL IMAGE USING WAVELET TRANSFORM AND MEAN FILTERING

A Modified Non Linear Median Filter for the Removal of Medium Density Random Valued Impulse Noise

Image Quality Estimation of Tree Based DWT Digital Watermarks

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

Robust and Blind Spatial Watermarking in Digital Image

Analysis of Secure Text Embedding using Steganography

A Novel Approach to Image Enhancement Based on Fuzzy Logic

An Implementation of LSB Steganography Using DWT Technique

Digital Watermarking Using Homogeneity in Image

Using MATLAB to Get the Best Performance with Different Type Median Filter on the Resolution Picture

New Spatial Filters for Image Enhancement and Noise Removal

Interpolation of CFA Color Images with Hybrid Image Denoising

Performance Comparison of Various Filters and Wavelet Transform for Image De-Noising

Color Image Denoising Using Decision Based Vector Median Filter

Pattern Recognition 41 (2008) Contents lists available at ScienceDirect. Pattern Recognition

Noise Detection and Noise Removal Techniques in Medical Images

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

Image Denoising using Filters with Varying Window Sizes: A Study

Contrast Enhancement Based Reversible Image Data Hiding

Lossless Huffman coding image compression implementation in spatial domain by using advanced enhancement techniques

AN ITERATIVE UNSYMMETRICAL TRIMMED MIDPOINT-MEDIAN FILTER FOR REMOVAL OF HIGH DENSITY SALT AND PEPPER NOISE

An Efficient Noise Removing Technique Using Mdbut Filter in Images

Keywords Fuzzy Logic, ANN, Histogram Equalization, Spatial Averaging, High Boost filtering, MSE, RMSE, SNR, PSNR.

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences

Implementation of Effective, Robust and BPCS Data Embedding using LSB innovative Steganography Method

Blind Image Fidelity Assessment Using the Histogram

Investigation of Various Image Steganography Techniques in Spatial Domain

An Automatic System for Detecting the Vehicle Registration Plate from Video in Foggy and Rainy Environments using Restoration Technique

Keywords-Image Enhancement, Image Negation, Histogram Equalization, DWT, BPHE.

International Journal of Advanced Research in Computer Science and Software Engineering

ANALYSIS OF GABOR FILTER AND HOMOMORPHIC FILTER FOR REMOVING NOISES IN ULTRASOUND KIDNEY IMAGES

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Image Denoising Using Statistical and Non Statistical Method

Reversible Watermarking on Histogram Pixel Based Image Features

Fragile Watermarking With Error-Free Restoration Capability Xinpeng Zhang and Shuozhong Wang

An Efficient Denoising Architecture for Impulse Noise Removal in Colour Image Using Combined Filter

Direction based Fuzzy filtering for Color Image Denoising

Implementation of Median Filter for CI Based on FPGA

An Improved Adaptive Median Filter for Image Denoising

An Adaptive Kernel-Growing Median Filter for High Noise Images. Jacob Laurel. Birmingham, AL, USA. Birmingham, AL, USA

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

Robust watermarking based on DWT SVD

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method

Transcription:

3rd International Conference on Pattern Recognition and Image Analysis (IPRIA 2017) April 19-20, 2017 Embedding and Extracting Two Separate Images Signal in Salt & Pepper Noises in Digital Images based on Watermarking Khalil Shekaramiz, M.S.c Student of Computer Architecture, Faculty of Computer Engineering, Digital Processing and Machine Vision Research center, Khalil_shekaramiz@yahoo.com Alireza Naghsh, Assistant Professor, Digital Processing and Machine Vision Research Center, Department of Electrical Engineering, naghsh.a@pel.iaun.ac.ir Abstract By the increasing exchange of information around the world and the use of computer networks, such as the Internet, having a secure environment for transmission is necessary. Watermarking means hiding the data, known as water marker in digital media, in which the information can be extracted and processed in a safe manner. Watermarking in the spatial domain is done at most in three Least Significant Bits (LSB) of an. In this paper, we introduce a method for watermarking the two separate digital signals in six bits of applied salt & pepper noises to a digital ; since the salt & pepper noises are placed randomly throughout the, the pixels information of the two separate s can be replaced into the salt & pepper noises peer to peer, and then this embedded information in noises is extracted in other applications, and noises from these three s will be removed. Keywords watermarking; embed and extract; salt & pepper noise; spatial domain. I. INTRODUCTION With the rapid growth of digital technology over the past decades, the speed of sending as well as embedding electronic media has increased, and copying of data without compromising the quality and with very little cost has become possible. Due to the rapid growth of technology, protection of digital media has become an important issue. Stability, security, and data integrity are the most important features that have been improved by the watermarking algorithms. Watermarking which means hiding data in digital media, is divided into two frequency and space areas. In order to integrate data in the spatial domain, pixel values are directly manipulated. These methods have less complexity, but are more fragile and not stable. But, in the frequency domain methods, the s conveyed to a frequency domain, and then watermarking is done by manipulating the values in the frequency domain, and at the end, the is returned into spatial domain. Compared with the spatial domain methods, it has been proven that methods in frequency domain for watermarking are more powerful and stable. Watermarking information may include, text, audio, and video that are divided into three categories, from various aspects of resistance to attacks: resistant watermarking systems, semi-fragile watermarking systems, and fragile watermarking systems. One of the problems in watermarking is that these systems are the target of many attacks. Watermarking attacks are divided into different categories: Removal attacks, cutting attacks, geometric attacks, compression attacks and conventional noises. Cutting attacks seek to undermine or completely eliminate watermarking information, so that the original data cannot be used after the attack. One of the most common attacks, is salt & pepper impulsive noise with different densities, which is a removal attack. In this study, an algorithm is proposed in which the information of two separate s is placed into noises in an. In each execution of the program in the algorithm, a pre-processing is done on the three input s and the salt & pepper noise is applied to the of a certain percentage. Then, the information of the first and the second s is placed in the pepper and the salt noises, respectively. The proposed method for data embedding of the two separate signals in salt & pepper noise can be seen in Fig. 1. In the second algorithm at the receiver side, primarily the containing the information of the two s (the output of the first algorithm) is received; then, pixel by pixel, the location of noises is checked and if the current pixel is noisy, the information within the pixel is extracted and the corresponding pixel is recovered, and finally three noisy 978-1-5090-6454-0/17/$31.00 IEEE 32

s are produced. In the next step, the operation of noise removal of the s is done and all three will be reconstructed and displayed. The proposed algorithm for data recovery of the two separate signals in salt & pepper noises is shown in Fig. 2 Start Receiving Watermarking Extraction of bit components of the Start Receiving three colorful s and make them same size Salt 11 Bits 1 and 8 Pepper 00 Second Bit Components Convert three pictures into gray scale Third Bit Components First Bit Components Recovering the second 6 bits on the Producing second noisy 10 01 Producing third noisy Recovering the first 6 bits on the Producing first noisy 6 most significant bits Change the numeric range 6 most significant bits Put padding with zero value Applying 66% noise Noise removal algorithm Producing third Producing second Producing first Salt 11 Current pixel Bit 1 & 8 Pepper 00 Displaying third Displaying second Displaying first Replacement in salt noise Replacement in pepper noise Reconstruction of noisy pixel in Producing the Watermarking Displaying the Watermarking Fig. 1. Embedding Watermarking flowchart Fig. 2. Extracting Watermarking s flowchart II. A REVIEW OF BACKGROUND In 2011, a new design for watermarking algorithm was proposed by Bamatral et al. that used the combination of Least Significant Bit (LSB) and the reverse bit [1]. In [2], Chopra and his colleagues in 2012, used the watermarking in digital s with the Least Significant Bit (LSB) for gray s. The purpose was to protect the data copyright against the modification and misuse of valuable information, with the help of replacing Least Significant Bit (LSB) by the most significant bit. In 2012 [3], Sharmal and colleagues investigated the digital watermarking using the Least Significant Bit (LSB) and watermarking methods and their attacks, and they evaluated the digital watermarking scheme based on Least Significant Bit (LSB) by replacing the different bits with most significant bit in the. By putting the data in the first bit, such as Least Significant Sign Bit (LSB), watermarking was produced without any interference. But, by embedding data in the second bit to the highest bit, it is blurred up. 33

In 2013, in [4] the improved watermarking scheme in Least Significant Bit (LSB) was used for authenticity and accuracy. In the Least Significant Bit (LSB), the embedded capacity is low, but only one bit per pixel is used which is irreversible, and therefore, cannot be used for sophisticated applications. In this scheme, a new strategy that compensates the bit reversibility and embedding capacity is improved with the help of two bits per pixel. Mousavi and his colleagues took advantage of medical s in watermarking in 2014. In this paper, the basic structure of a security system is expressed. Expanding and sharing the medical s among clinicians is done for much better and exact diagnosis, which is done for preventing manipulation by unauthorized persons and the security of medical s [5]. Sain and his colleagues examined watermarking in Least Significant Bit (LSB) with different noises in 2015. Information security, verification, validation, and authentication of documents and hidden data of Least Significant Bit (LSB) and noise impact were the main goals of this study. In that study, the collision of different noises on watermarking, practical analysis of noise collision and its impact on watermarking of Least Significant Bit (LSB) is explained and is simulated by the Matlab Software, and its results were investigated using the criteria of signal to noise ratio and slope coefficient [6]. In 2016, Mousavi and his colleagues offered a plan, in which the resistance of watermarking in medical against salt & pepper noise was used for magnetic brain s. It is likely that these transferred magnetic s of brain between specialists and hospitals are at risk of salt & pepper noise and the embedded watermarking within medical s is disappeared. The proposed watermarking methods are weak against salt & pepper noise, while this plan is resistant against the severity of salt & pepper noise of brain magnetic pictures. Quality of watermarking is evaluated using the signal to noise criteria, bit error rate and the structural similarity, and it indicates that bit-error rates is lower compared to current method and higher, compared to signal to noise [7]. In 2013, a 9 9 Sudoku was used for watermarking, which increases the cutting percentage for recovering a portion of the secret. The plan s limitation was that knowing the code for solving the Sudoku puzzle for detection of watermarking information was necessary [8]. In [9], the Sudoku key was used for strengthening the watermarking digital against the salt & pepper noise. This means that the watermarking is organized in a pattern that this information pattern can improve the watermarking detection considerably. In 2015, Saaneei et al., used Sudoku puzzle to strengthen the digital s against cutting and the salt & pepper noises. Because of the unique features of the scattered information in the Sudoku puzzle, acceptable results have been obtained in strengthening against attacks [10]. In 2012, a fuzzy-based median filter was introduced to remove salt & pepper noise, in which the median filter based on fuzzy logic effectively removed salt & pepper noise, while the details were retained under the high- and low-intensity noises. Experiments on different s showed that performance of the proposed filter is better than traditional median filters [11]. In 2013, in [12[ various filters were introduced such as duplex filter, median filter, small shock wave, fuzzy filters, which they caused a number of filters to develop a number of other filters [12]. These filters were used on a number of s and on a wide range of visual applications. Also, these filters were applied on medical s. Hsieh and his colleagues introduced a fast and efficient median filter using the previous data to restore normal pixels. This proposed median filter removes the salt & pepper noise in s up to 99%, which is satisfactory, such that it recognizes the lowest and highest value as the up and down noise directly, without leaving any noise in the extracted, creating a resistant filter [13]. Image noise reduction techniques were investigated in 2014. In fact, the aim was to examine a number of techniques that can be helpful in eliminating the noise. Therefore, some issues such as the type of noises, and the noise removal techniques and their different functions have been investigated [14]. III. PROPOSED METHOD In this article, the information of two separate digital s into the salt & pepper noise in the first algorithm was embedded using the watermarking method in spatial domain, and then this embedded information was extracted and the desired s was reconstructed and displayed by the second algorithm. A. Embeding information of two separate s in digital salt & pepper noises In the beginning, three s are received by the algorithm and the pre-processing is performed on them, including making them gray in the same size (Figs.1, 2 and 3). Then, an is selected as host and the range of its pixels changes from [0-255] to [1-254] (Fig. 5). This operation is done by reversing the eighth bit of each pixel and putting it in the place of the first pixel. Thus, the first and eighth bits of each pixel in matrix of host are not similar to each other. This similarity between the first and eighth bits, is the key for embedding and extracting in the next steps (Fig. 6). In the next step, 66% salt & pepper noise is applied into the (Fig. 7). And finally, in order to embed information, two s in the salt & pepper noise in host are sweeping from the beginning pixels in the by a function. If the current pixel contains the pepper noise, 6 bits (bits 3 to 8) of the current pixel in the first (Fig. 3) will be replaced in 6-bit pixel pepper noise (bits 2 to 7) in the host, and if the current pixel contains salt noise, 6 bits (bits 3 to 8) of the current pixel in the second (Fig. 4) will be replaced in the 6-bit pixel salt noise(bits 2 to 7) in the host ; and if that pixel contains information of host, the algorithm will continue until achieving the next noisy pixel in the host. In the end, an containing the watermarking information of the first and second s in 34

the salt & pepper noises of the third will be displayed (Fig. 8). Fig. 7. Noisy host Fig. 3. First Fig. 8. Watermarking Fig. 4. Second B. Recovering the data from two separate s of salt & pepper noises in digital In this algorithm, primarily the containing the information of two s in the salt & pepper noise (the watermarked ) that was produced in the previous section, is received. Two matrixes with the size identical with the received with zero pixel values are produced. Then, from the beginning of the matrix of the received, the two first and eighth bits of it is reviewed pixel by pixel by a function. This review includes three modes: Fig. 5. Third If the two bits are zero, it means that this pixel has already been a pepper noise; thus, the information in the (2-7) second to seventh bits of this pixel has been read, and after the decimal summation, this value is placed in the pixel location of the first matrix with the size identical with the watermarking. Then, the value of the number zero is placed in the pixel of the watermarked for reconstruction, and the first watermarking is obtained (Fig. 9). Fig. 6. Bit components of the host Fig. 9. First extracted 35

If two bits are one, it means that the pixel has already been a salt noise. When the information in the bits of (2-7) is read and after decimal summation, this value is placed in the pixel of second matrix with the same size of the watermarked. Then, the amount of 255 is placed in the pixel of watermarked in order to reconstruct the salt noise, and the second watermarked is obtained (fig. 10). Fig. 13. Second which the noise is removed Fig. 10. Second extracted If the two bits are different, it means that this pixel contains the original information of watermarked. Therefore, the next pixel is selected for review. Finally, the host containing the salt & pepper noise is produced (Fig. 11). Fig. 14. Third which the noise is removed IV. RESULTS OF SIMULATION BASED ON EVALUATING THE WATERMARKING IMAGES To review the proposed method and evaluate the watermarked, the evaluation criteria mentioned in the Table.1 have been used. TABLE 1. CRITERIA FOR EVALUATING WATERMARKING IMAGE Evaluation Criteria Mean Square Error (MSE) Fig. 11. Third extracted Peak-Signal-to-Noise Ratio(PSNR) C. Renoising from 3 separate s in digital In this step, using the 3*3 average window method and the use of zero padding around the extracted s, the salt & pepper noise is eliminated in three s and it would be displayed (Figs. 12, 13 and 14). Equation 1 MN N 1M 1 I i, j IW i, j 2 i 0 j 0 10 log 10 2 MAX I MSE In this equation, I(i,j) defines the main, and Iw is the watermarked, while the dimension is N M. Using the method described in Part III, the results of proposed method for the production of watermarking s of host and two other pictures are summarized in the table. 2. V. CONCLUSION In this study, a new design was proposed for extracting and embedding the information in two digital s in the Salt & Pepper noises of the digital s, separately. Using the characteristics of Salt & Pepper noises, such as random dispersion in the levels of pixels and their value of zero and 255 with respect to the original pixels of the host, as well as using the watermarking advantages in the area of location by LSB method, in the maximum 3 bits of every pixel of the, watermarking the information is possible, but Fig. 12. First which the noise is removed 36

this algorithm has a large volume for embedding the information, and the embedding capacity of the information in the pixels containing the Salt & Pepper noises inserted to the has increased to 6 bits, and this embedded information can be recovered in a safely manner. Also, using removal method of a strong Salt & Pepper noise, we can enhance the rate of PSNR criterion for the s recovered from the Salt & Pepper noise.this algorithm is not resistant against salt & pepper noise and attacks cutting attacks.after reviewing the algorithm in Matlab that was identified in part 3, the Watermarking obtained that is reviewed with the specified criteria in Table 1, and the results of this experiment is included in table 2. [12] G.Goyal, A.K.Bansal, M.Singhal, ''Review Paper on Various Filtering Techniques and Future Scope to Apply These on TEM Images '', International Journal of Scientific and Research Publications, Volume 3, Issue 1, 1 ISSN 2250-3153, January 2013. [13] M.H.Hsieh, F.C.Cheng,M.ChauShie,S.JangRuan,'' Fast and efficient median filter for removing 1 99% levels of salt-and-pepper noise in s'', Engineering Applications of Artificial Intelligence 26 1333 1338, 2013. [14] M.Raghav, S.Raheja, ''Image Denoising Techniques Literature Review, International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 May, Page No. 5637-5641, 2014. TABLE 2. EQUATION RESULT Evaluation criteria Equation result with size(400*600) Pic1 trees Pic2 onion Pic3 lena Mean Square Error (MSE) 56.7532 118.4607 15.8923 Peak-Signal-to- Noise Ratio(PSNR) 30.5909 27.3951 36.1189 REFERENCES [1] Bamatraf Abdullah, Ibrahim Rosziati and Mohd, Salleh Najib Mohd, A New Digital Watermarking Algorithm Using Combination of Least Significant Bit (LSB)and Inverse Bit journal of computing, volume 3, issue 4, april 2011. [2] D.Chopra1 Deepshikha, P.Gupta, G.Sanjay B.C, A.Gupta, Lsb Based Digital Image Watermarking For Gray Scale Image, IOSR Journal of Computer Engineering, volume 6, Issue 1, pp 36-41, sep-oct 2012. [3] P.Kr Sharma1 and Rajni, Analysis of Image Watermarking Using Least Significant bit Algorithm, International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4, July 2012. [4] R.Aarthi, V.Jaganya and S.Poonkuntran, Digital Watermarking Method Using Replacement of Second Least Significant Bit(LSB) With Inverse of LSB,International Journal of Emerging Technology and Advanced Engineering,Volume 3, Issue 2, 2013. [5] M.Mousavi, A.Naghsh, S.A.R.Abu-Bakar, Watermarking Techniques used in Medical Image:a survey, Journal of Digital Imaging, Volume 27, Issue 6, pp 714-729, 2014. [6] R.K.Singh, D.K.Shaw and M.J.Alam,''Experimental Studies of LSB Watermarking with Different Noise'', Eleventh International Multi- Conference on Information Processing IMCIP, 2015. [7] M.Mousavi, A.Naghsh, S.A.R.Abu-Bakar, A robust medical watermarking against salt & pepper noise for brain MRI s, Springer Science+Business Media New York, 2016. [8] K.A.K.Shamsul, M.D.Mustafa, M.M.Kamaruddin, Anti Cropping Digital Image Watermarking using Sudoku,International Journal of Grid and Utility Computing, Volume 4 Issue 2/3, 2013. [9] K.A.K.Shamsul,M.D.Mustafa, M.M.Kamaruddin, A Robust Digital Image Watermarking against Salt & Pepper using Sudoku, The Second International Conference on Informatics Engineering & Information Science (ICIEIS2013), 2013. [10] S.Saneie, A.Naghsh, Introducing a new method of Robust Digital Image Watermarking against Cropping and Salt & Pepper Noise using Sudoku, Majlesi Journal of Multimedia Processing, 2015. [11] B.Deshpande, H.K. Verma, P.Deshpande, '' Fuzzy Based Median Filtering for Removal of Salt-and-Pepper Noise '', International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307,Volume- 2, Issue-3, July 2012. 37