Robust Watermarking Technique for Sharing Family Photos on Social Media using Aadhar Number and DCT
Deepti Varshney1, Mamta Bansal2, Birendra Kumar Sharma3

1Deepti Varshney* , Department of Computer Science & Engineering, Shobhit Institute of Eng. & Technology (Deemed-to-be-University), Meerut.
2Dr. Mamta Bansal, Department of Computer Science & Engineering, Shobhit Institute of Eng. & Technology (Deemed-to-be-University), Meerut.
3Dr. Birendra Kumar Sharma, Department of MCA, AKG Engineering College, Ghaziabad.

Manuscript received on August 01, 2020. | Revised Manuscript received on August 05, 2020. | Manuscript published on September 30, 2020. | PP: 381-387 | Volume-9 Issue-3, September 2020. | Retrieval Number: 100.1/ijrte.B4162079220 | DOI: 10.35940/ijrte.B4162.099320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: The mind setup of persons has been changed in today’s environment due to the easily available of internet and smart phone on very low-price cost. Smart phone and internet are two main resources which are being used by persons most of the time in his/her daily routine specially in lockdown due to COVID-19. In this lockdown, persons are doing some creative activity, making fun, etc and recording all his/her this personal information in the form of multimedia contents like text, images, audio and video. This created multimedia content is shared by persons frequently on globe through internet in the daily routine life and some other persons are watching this daily routine activity and making huge business with these data by sometimes with original content or sometimes with modified content without concerns/information/permission of the originator. In this process if everything is going in right way then no issues but if something going wrong then require legal issues and for this, we need to protect our data legally through some methodology. So this paper proposed secure watermarking technique for protecting multimedia content like images using Aadhar number and Discrete Cosine Transform (DCT) technique. In this proposed methodology individual can share the information’s with watermarked information which is hidden in shared images and on demand at the time of legal issue originator will show the actuality and its ownership. This paper explained details concepts of the embedding and reverse of embedding ( i.e. extracting) process for authentication of the images and its protection from the misuse or fraud. The experimental result of the proposed methodology is shown on different family photos shared on globe and found robust results. 
Keywords: Discrete Cosine Transform (DCT), Document Based (DB), Working Domain Based (WDB), Human Perception Based (HPB) and Application Based (AB), Discrete Wavelet Transform (DWT), Intellectual Property Right (IPR), Similarity Ratio (SR).