Multimedia Tools and Applications

, Volume 77, Issue 3, pp 3597–3622 | Cite as

A recent survey on image watermarking techniques and its application in e-governance

Article
  • 207 Downloads

Abstract

This survey presents a brief discussion of different aspects of digital image watermarking. Included in the present discussion are these general concepts: major characteristics of digital watermark, novel and recent applications of watermarking, different kinds of watermarking techniques and common watermark embedding and extraction process. In addition, recent state-of-art watermarking techniques, potential issues and available solutions are discussed in brief. Further, the performance summary of the various state-of-art watermarking techniques is presented in tabular format. This survey contribution will be useful for the researchers to implement efficient watermarking techniques for secure e-governance applications.

Keywords

ICT Spatial and transform domain techniques Image watermarking Embedding and extraction 

References

  1. 1.
    Abbas NH, Ahmad SMS, Ramli ARB, Parveen S (2016)A multi-purpose watermarking scheme based on hybrid of lifting wavelet transform and Arnold transform. International conference on multidisciplinary in IT and communication science and applicationsGoogle Scholar
  2. 2.
    Aherrahrou N, Tairi H (2013) A new robust watermarkingscheme based on PDE decomposition in computer systems and applications (AICCSA). 2013 ACS International Conference on, IEEE, p 1–5Google Scholar
  3. 3.
    Akhaee A, Sahraeian SM, Marvasti F (2010) Contourlet-based imagewatermarking using optimum detector in noisy environment. IEEE Trans Image Process 19(4):700–715CrossRefMATHGoogle Scholar
  4. 4.
    Akhaee M, Sahraeian S, Jin C (2011) Blind image watermarking usinga sample projection approach. IEEE Trans Inf Forensics Secur 6(3):883–893CrossRefGoogle Scholar
  5. 5.
    Ali M, Ahn CW, Pant M (2017) An efficient lossless robust watermarking scheme by integrating redistributed invariant wavelet and fractional Fourier transforms. Multimed Tool Appl 1–23.  https://doi.org/10.1007/s11042-017-4815-6
  6. 6.
    Amini M, Ahmad MO, Swamy MNS (2017) Digital watermark extraction in wavelet domain using hidden Markov model. Multimed Tool Appl 76(3):3731–3749CrossRefGoogle Scholar
  7. 7.
    Ansari IA, Pant M (2017) Multipurpose image watermarking in the domain of DWT based on SVD and ABC. Pattern Recogn Lett 94:228–236CrossRefGoogle Scholar
  8. 8.
    Ansari A, Pant M, Ahn CW (2016) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239CrossRefGoogle Scholar
  9. 9.
    Badshah G, Liew SC, Zain JM, Ali M (2016) Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique. J Digit Imaging 29(2):216–225CrossRefGoogle Scholar
  10. 10.
    Bas P, Chassery JM, Macq B (2002) Geometrically invariant watermarking using feature points. IEEE Transaction Using Image Processing 11(9):1014–1028CrossRefGoogle Scholar
  11. 11.
    Bhatnagar G, Wu QM, Atrey PK (2013) Secure randomized image watermarking based on singular value decomposition. ACM Trans Multimed Comput Commun Appl 10(1):1–21Google Scholar
  12. 12.
    Cai-yin W, Xiang-wei K, Chao L (2017) Process color watermarking: the use of visual masking and dot gain correction. Multimed Tool Appl 76(15):16291–16314Google Scholar
  13. 13.
    Cao X, Fu Z, Sun X (2016) A privacy-preserving outsourcing data storage scheme with fragile digital watermarking-based data auditing. J Electr Comput Eng 2016(2016):1–7Google Scholar
  14. 14.
    Chang CS, Shen JJ (2017) Features classification Forest: a novel development that is adaptable to robust blind watermarking techniques. IEEE Trans Image Process 26(8):3921–3935Google Scholar
  15. 15.
    Chang CC, Fan YH, Tai WL (2008) Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 41(2):654–661CrossRefMATHGoogle Scholar
  16. 16.
    Chen CH, Tang YL, Wang CP (2014) A robust watermarking algorithm based on salient image features. Optik-International Journal for Light and Electron Optics 125(3):1134–1140CrossRefGoogle Scholar
  17. 17.
    Chen F, He H, Tai HM, Wang H (2014) Chaos-based self-embedding fragile watermarking with flexible watermark payload. Multimed Tool Appl 72(1):41–56CrossRefGoogle Scholar
  18. 18.
    Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann, BurlingtonGoogle Scholar
  19. 19.
    Deng C, Gao X, Li X, Tao D (2009) A local Tchebichef moments-based robust image watermarking. Signal Process 89(8):1531–1539CrossRefMATHGoogle Scholar
  20. 20.
    Deng C, Li J, Gao X (2010) Geometric attacks resistant image watermarking in affine covariant regions. Acta Automat Sin 26(2):221–228CrossRefGoogle Scholar
  21. 21.
    Dorairangaswamy MA (2009) A novel invisible and blind watermarking scheme for copyright protection of digital images. IJCSNS International Journal of Computer Science and Network Security 9(4):71–78Google Scholar
  22. 22.
    Eggers JJ, Girod B (2001) Blind watermarking applied to image authentication. In: Acoustics, Speech, and Signal Processing, 2001. Proceedings (ICASSP'01). 2001 I.E. International Conference on Vol. 3, IEEE, p 1977–1980Google Scholar
  23. 23.
    Gao X, Deng C, Li X, Tao D (2010) Geometric attacks resistant image watermarking in affine covariant regions. IEEE Trans Syst Man Cybern Part C Appl Rev 40(3):278–286CrossRefGoogle Scholar
  24. 24.
    Ghazvini M, Hachrood EM, Mirzadi M (2017) An improved image watermarking method in frequency domain 12(2):260–275Google Scholar
  25. 25.
    Ghebleh M, Kanso A, Own HS (2014) A blind chaos-basedwatermarking technique. Security and Communication Network 4(7):800–811CrossRefGoogle Scholar
  26. 26.
    Gunjal BL, Mali SN (2015) MEO based secured, robust, high capacity and perceptual quality image watermarking in DWT-SVD domain. Springer Plus 4(1):126CrossRefGoogle Scholar
  27. 27.
    Hamghalam M, Mirzakuchaki S, Akhaee MA (2013) Robust imagewatermarking using dihedral angle based maximum-likelihood detector. IET Image Process 7(5):451–463CrossRefGoogle Scholar
  28. 28.
    Horng SJ, Rosiyadi D, Fan P, Wang X, Khan MK (2013) An adaptive watermarking scheme for e-government document images. Multimed Tool Appl 72(3):3085–3103CrossRefGoogle Scholar
  29. 29.
    Horng SJ, Rosiyadi D, Li T, Takao T, Guo M, Khan MK (2013) A blind image copyright protection scheme for e-government. J Vis Commun Image Represent 24(7):1099–1105CrossRefGoogle Scholar
  30. 30.
    Hsia SC, Jou IC, Hwang SM (2002) A gray level watermarking algorithm using double layer hidden ICE TRANSACTIONS on fundamentals of electronics. Communications and Computer Sciences 85(2):436–471Google Scholar
  31. 31.
    Hu Y, Kwong S, Huang J (2006) An algorithm for removable visible watermarking. IEEE Trans Circuits Syst Video Technol 16(1):129–133CrossRefGoogle Scholar
  32. 32.
    Huo Y, He H, Chen F (2012) Alterable-capacity fragile watermarking scheme with restoration capability. Opt Commun 285(7):1759–1766CrossRefGoogle Scholar
  33. 33.
    Jamal SS, Khan MU, Shah T (2016) A watermarking technique with chaotic fractional S-box transformation. Wirel Pers Commun 90(4):2033–2049CrossRefGoogle Scholar
  34. 34.
    Ji F, Deng C, An L, Huang D (2013) Desynchronization attacks resilient image watermarking scheme based on global restoration and local embedding. Neuro Computing 106:42–50Google Scholar
  35. 35.
    Kalantari NK, Ahadi SM (2010) A logarithmic quantization index modulation for perceptually betterdata hiding. IEEE Trans Image Process 19(6):1504–1517MathSciNetCrossRefMATHGoogle Scholar
  36. 36.
    Kang SI, Lee IY (2006) A study on the electronic voting system using blind signature for anonymity. In hybrid information technology. ICHIT'06 International Conference on Vol. 2, IEEE, p 660–663Google Scholar
  37. 37.
    Kumar B, Singh HV, Singh SP, Mohan A (2008) Novel efficient and secure medical data transmission on WIMAX. Telemedicine and e-Health 14(10):1063–1069CrossRefGoogle Scholar
  38. 38.
    Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060–3063CrossRefGoogle Scholar
  39. 39.
    Lee WB, Chen TH (2002) A public verifiable copy protection technique for still images. J Syst Softw 62(3):195–204CrossRefGoogle Scholar
  40. 40.
    Lei B, Zhao X, Lei H, Ni D, Siping C, Zhou F, Wang T (2017) Multipurpose watermarking scheme via intelligent method and chaotic map. Multimed Tools Appl 1–23.  https://doi.org/10.1007/s11042-017-4743-5
  41. 41.
    Liao X, Li K, Yin J (2016) Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform. Multimed Tool Appl pp. 1–15Google Scholar
  42. 42.
    Liu XL, Lin CC (2016) Blind dual watermarking for color images’ authentication and copyright protection. IEEE Trans Circuits Syst Video Technol.  https://doi.org/10.1109/TCSVT.2016.2633878
  43. 43.
    Liu N, Zhang Y, Chen Z, Zhang S (2009) Chaos-based semi-blind watermarking for CAD models. In: Intelligent systems, 2009. GCIS'09. WRI global congress on vol. 3, IEEE, p 411–414Google Scholar
  44. 44.
    Liu N, Li H, Dai H, Guo D, Chen D (2015) Robust blind image watermarking based on chaotic mixtures. Nonlinear Dyn 80(3):1329–1355CrossRefGoogle Scholar
  45. 45.
    Lu CS, Huang SK, Sze CJ, Mark Liao HY (2001) A new watermarking technique for multimedia protection. In: Guan L, Kung SY, Larsen J (eds). Multimedia image and video processing. CRC Press, pp. 507–530Google Scholar
  46. 46.
    Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking usinginterpolation technique. IEEE Trans Inf Forensics Secur 5(1):187–193CrossRefGoogle Scholar
  47. 47.
    Lusson F, Bailey K, Leeney M, Curran K (2013) A novel approach to digital watermarking, exploiting colour spaces. Signal Process 93(5):1268–1294CrossRefGoogle Scholar
  48. 48.
    Maheswari S, Rameshwaran K, Malarselvi KM (2015) DCT-PCA based watermarking on E-governance documents. Res J Appl Sci Eng Technol 9(7):507–511Google Scholar
  49. 49.
    Mingzhi C, Yan L, Yajian Z, Min L (2013) A combined DWT and DCT watermarkingscheme optimized using genetic algorithm. J Multimed 8(3):299–305CrossRefGoogle Scholar
  50. 50.
    Mohanty SP (1999) Digital watermarking: A tutorial review. URL: http://www.csee.usf.edu/~smohanty/research/Reports/WMSurvey1999Mohanty.pdf
  51. 51.
    Mohanty SP, Sengupta A, Guturu P, Kougianos E (2017) Everything you want to know about watermarking: from paper marks to hardware protection: from paper marks to hardware protection. IEEE Consumer Electronics Magazine 6(3):83–91CrossRefGoogle Scholar
  52. 52.
    Mostafa SA, El-Sheimy N, Tolba AS, Abdelkader FM, Elhindy HM (2010) Wavelet packets-based blind watermarking for medical image management. Open Biomed Eng J 4:93–98Google Scholar
  53. 53.
    Mousavi SM, Naghsh A, Abu-Bakar SAR (2014) Watermarking techniques used in medical images: a survey. J Digit Imaging 27(6):714–729CrossRefGoogle Scholar
  54. 54.
    Naheed T, Usman I, Khan TM, Dar AH, Shafique MF (2014) Intelligent reversible watermarking technique in medical images using GA and PSO. Optik-International Journal for Light and Electron Optics 125(11):2515–2525CrossRefGoogle Scholar
  55. 55.
    Nazari M, Sharif A, Mollaeefar M (2016) An improved method for digital image fragile watermarking based on chaotic maps. Multimed Tool Appl 76(15):16107–16123CrossRefGoogle Scholar
  56. 56.
    Neena PM, Bijlani K (2015) Copyright protection for E-learning videos using digital watermarking. In: 2015 fifth international conference onAdvances in computing and communications (ICACC), Kochi, pp 447–450Google Scholar
  57. 57.
    Nezhadarya E, Wang ZJ, Ward RK (2011) Robust image watermarking based on multiscale gradientdirection quantization. IEEE Trans Inf Forensics Secur 6(4):1200–1213CrossRefGoogle Scholar
  58. 58.
    Niu XM, Lu ZM, Sun SH (2000) Digital watermarking of still images with gray-level digital watermarks. IEEE Trans Consum Electron 46(1):137–145CrossRefGoogle Scholar
  59. 59.
    Niu PP, Wang X-Y, Liu Y-N, Yang H-Y (2016) A robust color image watermarking using local invariant significant bitplanehistogram. Multimed Tool Appl 76(3):3403–3433Google Scholar
  60. 60.
    Patra JC, Phua JE, Bornand C (2010) A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digital Signal Process 20(6):1597–1611CrossRefGoogle Scholar
  61. 61.
    Rahman MM, Ahammed MS, Ahmed MR, Izhar MN (2017) A semi blind watermarking technique for copyright protection of image based on DCT and SVD domain. Glob J Res Eng 16(7):1–9Google Scholar
  62. 62.
    Rawat S, Raman B (2012) A blind watermarking algorithm based on fractional Fourier transform and visual cryptography. Signal Process 92(6):1480–1491CrossRefGoogle Scholar
  63. 63.
    Ren Y., Shen J., Wang J., Xu J. and Fang L. (2014) “Security data auditing based on multifunction digital watermark for multimedia file in cloud storage”, International Journal of Multimedia and Ubiquitous Engineering, Vo. 9, No 9, pp. 231–240Google Scholar
  64. 64.
    Rosiyadi D, Horng SJ, Fan P, Wang X, Khan MK, Pan Y (2012) Copyright protection for e-government document images. IEEE Multimedia 19(3):62–73CrossRefGoogle Scholar
  65. 65.
    Run RS, Horng SJ, Lai JL, Kao TW, Chen RJ (2012) An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl 39(1):673–689CrossRefGoogle Scholar
  66. 66.
    Sadreazami H, Ahmad MO, Swamy MNS (2016) Multiplicative watermark decoder in Contourlet domain using the normal inverse Gaussian distribution. IEEE Trans Multimedia 18(2):196–207CrossRefGoogle Scholar
  67. 67.
    Sayahi I, Elkefi A, Amar CB (2016) Blind watermarking algorithm based on spiral scanning method and error-correcting codes. Multimed Tool Appl 76(15):16439–16462CrossRefGoogle Scholar
  68. 68.
    Seo JS, Yoo CD (2004) Localized image watermarking based on feature points of scale- space representation. Pattern Recogn Lett 37(7):1365–1375CrossRefMATHGoogle Scholar
  69. 69.
    Seo JS, Yoo CD (2006) Image watermarking based on invariant regions of scale-space representation. IEEE transaction On Signal Processing 54(4):1537–1549CrossRefMATHGoogle Scholar
  70. 70.
    Sharma A, Singh AK, Kumar P (2017) Combining Haar wavelet and KarhunenLoeve transforms for robust and imperceptible data hiding using digital images. J Intell Syst.  https://doi.org/10.1515/jisys-2017-0032
  71. 71.
    Shieh JM, Lou DC, Chang MC (2006) A semi-blind digital watermarking scheme based on singular value decomposition. Computer Standards & Interfaces 28(4):428–440CrossRefGoogle Scholar
  72. 72.
    Singh HV, Rai S, Mohan A, Singh SP (2011) Robust copyright marking using weibull distribution. Comput Electr Eng 37(5):714–728CrossRefGoogle Scholar
  73. 73.
    Singh AK, Dave M, Mohan A (2014) Wavelet based image watermarking: futuristic Conceptsin information security. Proc Natl Acad Sci, India, Sect A 84(3):345–359CrossRefMATHGoogle Scholar
  74. 74.
    Singh AK, Dave M, Mohan A (2014) Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine. Int J Electron Secur Digit Forensics 6(4):285–305CrossRefGoogle Scholar
  75. 75.
    Singh HV, Singh AK, Yadav S, Mohan A (2014) DCT based secure data hiding for intellectual property right protection. CSI transactions on ICT 2(3):163–168CrossRefGoogle Scholar
  76. 76.
    Singh AK, Dave M, Mohan A (2015) Robust and secure multiple watermarking in wavelet domain. Journal of Medical Imaging and Health Informatics 5(2):406–414CrossRefGoogle Scholar
  77. 77.
    Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. Journal of Medical Imaging and Health Informatics 5(3):607–614CrossRefGoogle Scholar
  78. 78.
    Singh AK, Kumar B, Dave M, Mohan A (2015a) Robust and imperceptible dual watermarking for telemedicine applications. Wirel Pers Commun 80(4):1415–1433CrossRefGoogle Scholar
  79. 79.
    Singh AK, Kumar B, Dave M, Ghrera SP, Mohan A (2016) Digital image watermarking: techniques and emerging applications. In: Handbook of research on modern cryptographic solutions for computer and cyber security 2016, IGI global, USA pp 246–272Google Scholar
  80. 80.
    Singh S, Rathore VS, Singh R, Singh MK (2017) Hybrid semi-blind image watermarking in redundant wavelet domain. Multimed Tool Appl 76(18):19113–19137Google Scholar
  81. 81.
    Singh S, Rathore VS, Singh R (2017) Hybrid NSCT domain multiple watermarking for medical images. Multimed Tool Appl 76(3):3557–3575CrossRefGoogle Scholar
  82. 82.
    Srivastava A, Saxena P (2013) DWT-DCT-SVD based semi-blind image watermarking using middle frequency band. IOSR Journal of Computer Engineering 12(2):63–66CrossRefGoogle Scholar
  83. 83.
    Su Q, Niu Y, Zou H, Liu X (2013) A blind dual color images watermarking based on singular value decomposition. Appl Math Comput 219(16):8455–8466MathSciNetMATHGoogle Scholar
  84. 84.
    Su Q, Niu Y, Wang QJ, Sheng GA (2013) A Blind colorimage watermarking based on DC component in the spatialdomain. Optik-International Journal for Light and Electron Optics Optik 124(23):6255–6260Google Scholar
  85. 85.
    Su Q, Niu Y, Wang G, Jia S, Yue J (2014) Color image blind watermarking scheme based on QR decomposition. Signal Process 94:219–235CrossRefGoogle Scholar
  86. 86.
    Tang CW, Hang HM (2003) A feature-based robust digital image watermarking scheme. IEEE Transaction Using Signal Processing 51(4):950–959MathSciNetCrossRefMATHGoogle Scholar
  87. 87.
    Thakkar FN, Srivastava VK (2016) A fast watermarking algorithm with enhanced security using compressive sensing and principle components and its performance analysis against a set of standard attacks. Multimed Tool Appl 76(14):15191–15219CrossRefGoogle Scholar
  88. 88.
    Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308CrossRefGoogle Scholar
  89. 89.
    Wang SH, Lin YP (2004) Wavelet tree quantization for copyright protection watermarking. IEEE Trans Image Process 13(2):154–165MathSciNetCrossRefGoogle Scholar
  90. 90.
    Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn Lett 34(3):671–683CrossRefMATHGoogle Scholar
  91. 91.
    Wang Y, Doherty J, Dyck RV (2002) A wavelet-based watermarking algorithm forownership verification of digital images. IEEE Trans Image Process 11(2):77–88CrossRefGoogle Scholar
  92. 92.
    Wang XY, Niu PP, Yang HY, Chen LL (2012b) Affine invariant image watermarking using intensityprobability density-based Harris Laplace detector. J Vis Commun Image Represent 23(6):892–907CrossRefGoogle Scholar
  93. 93.
    Wang S, Zheng D, Zhao J, Tam WJ, Speranza F (2014) Adaptive watermarking and tree structure based image quality estimation. IEEE Trans Multimedia 6(2):331–324Google Scholar
  94. 94.
    Wang J, Lian S, Shi YQ (2017) Hybrid multiplicative multi-watermarking in DWT domain. Multidim Syst Sign Process 28(2):617–636CrossRefGoogle Scholar
  95. 95.
    Wu X, Hu J, Gu Z, Huang J (2005) A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parameters. In: proceedings of the 2005 Australasian workshop on grid computing and e-research- vol. 44, Australian Computer Society, Inc., p 75–80Google Scholar
  96. 96.
    Xiao D, Cai H, Wang Y (2015) High-capacity separable data hiding in encrypted image based on compressive sensing. Multimed Tool Appl 75(21):13779–13789CrossRefGoogle Scholar
  97. 97.
    Xiao D, Deng M, Zhu X (2015) A reversible image authentication scheme based on compressive sensing. Multimed Tool Appl 74(18):7729–7752CrossRefGoogle Scholar
  98. 98.
    Yang H, Yin J (2015) A secure removable visible watermarking for BTC compressed images. Multimed Tool Appl 74(6):1725–1739CrossRefGoogle Scholar
  99. 99.
    Yang Y, Sun X, Yang H, Li CT (2008) Removable visible image watermarking algorithm in the discrete cosine transform domain. J Electron Imaging 17(3):033008-1–033008-11Google Scholar
  100. 100.
    Yin Z, Luo B, Hong W (2014) Separable and error-free reversible data hiding in encrypted image with high payload. Sci World J 604876:1–8Google Scholar
  101. 101.
    Yuan Y, Huang D, Liu D (2006) An integer wavelet basedmultiple logo-watermarking scheme. Computer and Computational Sciences, First International Multi-Symposiums on Computer and Computational Sciences, Hanzhou 2:175–179Google Scholar
  102. 102.
    Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258CrossRefGoogle Scholar
  103. 103.
    Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Secur 7(2):826–832CrossRefGoogle Scholar
  104. 104.
    Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. IEEE Transaction Using Image Processing 20(2):485–495MathSciNetCrossRefMATHGoogle Scholar
  105. 105.
    Zhang L, Gao Y, Xia Y, Dai Q, Li X (2015) A fine-grained image categorization system by Cellet-encodedspatial pyramid modeling. IEEE Trans Ind Electron 62(1):564–571CrossRefGoogle Scholar
  106. 106.
    Zhu X, Ding J, Dong H, Hu K, Zhang X (2014) Normalized correlation-based quantization modulation for robust watermarking. IEEE Trans Multimedia 16(7):1888–1904CrossRefGoogle Scholar
  107. 107.
    Zhu XS, Sun Y, Meng QH, Sun B, Wang P, Yang T (2016) Optimal watermark embedding combining spread spectrum and quantization. EURASIP Journal on Advances in Signal Processing 1:74CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  • Chandan Kumar
    • 1
  • Amit Kumar Singh
    • 1
  • Pardeep Kumar
    • 1
  1. 1.Department of CSE & ITJaypee University of Information TechnologySolanIndia

Personalised recommendations