Modeling in Electronics and Engineering

*Modeling and Simulation in Engineering - Selected Problems*

[19] Serageldin AA, Abdelrahman AK, Ookawara S. Earth-air heat exchanger thermal performance in Egyptian conditions: Experimental results,

mathematical model, and computational fluid dynamics simulation. Energy Conversion and Management. 2016;**122**:25-38

[20] Nemś A, Nemś M, Świder K. Analysis of the possibilities of using a heat pump for greenhouse heating in polish climatic conditions—A case study. Sustainability. 2018;**10**:3483

[21] Janiszewski M, Caballero Hernandez E, Siren T, Uotinen L, Kukkonen I, Rinne M. In situ experiment and numerical model validation of a borehole heat exchanger in shallow hard crystalline rock.

[22] Rosa N, Soares N, Costa JJ, Santos P, Gervásio H. Assessment of an earth-air heat exchanger (EAHE) system for residential buildings in warm-summer Mediterranean climate. Sustainable Energy Technologies and Assessments.

[23] Dabaieh M, Serageldin AA. Earth air heat exchanger, Trombe wall and green wall for passive heating and cooling in premium passive refugee house in Sweden. Energy Conversion and Management. 2020;**209**:112555

[24] Wengang H, Yifeng L, Yanhua L, Mingxin L. Application of earth-air heat exchanger cooling technology in an office building in Jinan city. Energy

[25] Porras-Amores C, Mazarrón FR, Cañas I, Villoría SP. Natural ventilation

Procedia. 2019;**158**:6105-6111

analysis in an underground construction: CFD simulation and experimental validation. Tunnelling and Underground Space Technology.

2019;**90**:162-173

Energies. 2018;**11**:963

2020;**38**:100649

**106**

**Chapter 6**

**Abstract**

ment is witnessed.

PSNR and NCC

**1. Introduction**

**109**

Algorithm

*and K. Raja Rajeswari*

A Robust and Oblivious

Modulation and Genetic

Watermarking Method Using

*Surya Prasada Rao Borra, Kongara Ramanjaneyulu*

An image watermarking method using Discrete Wavelet Transform (DWT) and Genetic Algorithm (GA) is presented for applications like content authentication and copyright protection. This method is robust to various image attacks. For watermark detection/extraction, the cover image is not essential. Gray scale images of size 512 512 as cover image and binary images of size 64 64 as watermark are used in the simulation of the proposed method. Watermark embedding is done in the DWT domain. 3rd and 2nd level detail sub-band coefficients are selected for further processing. Selected coefficients are arranged in different blocks. The size of the block and the number blocks depends on the size of the watermark. One watermark bit is embedded in each block. Then, inverse DWT operation is

performed to get the required watermarked image. This watermarked image is used for transmission and distribution purposes. In case of any dispute over the ownership, the hidden watermark is decoded to solve the problem. Threshold-based method is used for watermark extraction. Control parameters are identified and optimized based on GA for targeted performance in terms of PSNR and NCC. Performance comparison is done with the existing works and substantial improve-

**Keywords:** image watermarking, discrete wavelet transform, genetic algorithm,

In today's world, digital media storage and its security are of the highest importance for any multimedia application. Copyright protection, proof of ownership and image authentication are some of the applications in the protection of the digital data. Watermarking Technique is one of the methods used in these applications. In the watermarking process, specific information called watermark is embedded imperceptibly into the original media object. The Watermarking algorithm is

Maximum Wavelet Coefficient

### **Chapter 6**
