# Introduction n computer science information hiding or hiding data in a message is the important principle of steganography.Information hiding is mainly divided into three categories Cryptography, Steganography, and Watermark. Cryptography is the process of converting comprehensible data into unintelligible data that can't be able understand by unauthorized people. The authorized user with the key can decrypt the ciphertext. As many modification were made in the field of multimedia and communications, now it became easy for the unauthorized users to decrypt a ciphertext into comprehensible data. Hence more complicated methods were developed to provide higher security than cryptography. These techniques are known as Steganography and Watermarking. Steganography is the time taking process. It hides data over a cover object in such a way that the sence of data is not detected by the hacker. Watermarking is related to the steganography. There is one main point in watermarking is that the invisible data is related to the cover object. Watermarking is mainly used for copyright protection, user authentication and security. Digital watermarking is the process of embedding a digital signal (audio, video or image) or hide a small digital data in comprehensible data which can not be easily removed is called digital watermarking. Digital watermarking is also called data hiding. Author B Tech, Department of Electronics and Computer Engineering KL University,India. e-mail: keshav372@gmail.com ? Associate Professor, Department of Electronics and Computer Engineering KL University,India. Watermarking block diagram watermarking system is divided into three types embedding [1], attack and detection. In embedding technique an algorithm accept user and data as input to be embedded and implement the watermark signal. Then watermark signal is send to another host. If this person makes any changes to the watermark signal is called an attacking. There are various types of attack is possible on the watermarked signal. Detection is an algorithm which takes attacked data as input and Extract the watermark data form the attacked data II. # Types of Digital Watermaking Simple watermarked image Where O is the original image, W is the watermark information being embedded, U is the user's insertion key, and Erepresents the watermark insertion function. Invisible Watermarking [1] (Least significant bit watermarking)-Least significant bit watermarking is themost secured technique of watermarking. It also be applied to both visible and invisible watermarking. Spatial domain technique changes the pixels of one or two subset of the image. # Let us see the one example on image watermarking process Steps-1. For the image testing standard images A and B will be selected. The base image or original image is A for which watermaking is added .the watermarking image is B that will be added to the original image A. # Requirements of Digital Watermarking The requirements of digital watermarking are A. Transparency-making the watermark image clear and transparent without effecting the quality of original image . B. Robustness-This is one of the requirements of the watermarking .it means the watermark which is designed must be resistible to all kinds of attacks by the unauthorized users and hackers. C. Capacity-it describes the amount of data that can be embedded into multimedia formats such as image, audio, video or text for retrieving the prefect data of watermark during extraction. IV. # Conclusion In this paper we describes about different types of watermarking and its techniques. There are two types of digital watermarking techniques they are visible and invisible watermarking techniques. It provides authentication for owners. hence by using this watermaking techniques the data can be protected and stored from the unauthorized users. ![sh ? , R.V Kes shavaRao ? & & Dr R. BulliB Babu ? Ab spr the use dat mu bstract-Large read in the inte e help of som eful technology ta. Digital wat ultimedia. amount of da ernet. This dat me software. D y in today's wor termarking can ta is embedde a can be repla Digital waterma ld, to prevent il n be applied ed in media and aced easily wit rking is a ver legal copying o to all Aut thor : Watermark insertion is represented as: O" = EU (A,W)](image-2.png "") 2![The least significant bits(LSB) of the original image A will replaced with the most significant bits(MSB) of the water marking image B[2] 3. The resulting image that comes after the combination of both A and B images is Final image C will be watermarked image. Hence C contains an image A which LSB bits are replaced with the MSB of the image B. The original image and watermarking image is taken in binary code form-WatermarkImage=11110101 Base Image = 11010111Base image=Here the LSB of the original image is replaced with zeros and the MSB bits of the watermark image will be shifted to LSB bitsFinal image=The Final water marked image contains 5 MSB bits of orginal image and 3LSB bits of the water mark](image-3.png "2 .") © 2014 Global Journals Inc. (US) © 2014 Global Journals Inc. (US) 2 Year 2014 ## Acknowledgement We would like to give thanks toDr.R.Bullibabu for his guidance and help us to complete this paper. * IJCox Digital Watermarking and Steganography 2008 Morgan Kaufmann Second edition * Techniques for data hiding WBender D. Gruhl NMoromoto ALu IBM Systems Journals 35 3