T EXT D IGITAL W ATERMARKING O F A M ALAYALAM T EXT D OCUMENT B ASED O N F RAGMENTS R EGROUPING S TRATEGY. Guide:Presented by: Mrs.Sreeja Sasinas Alias.

Slides:



Advertisements
Similar presentations
Rob Farraher Ken Pickering Lim Vu
Advertisements

Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Fifth International Conference on Information
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
Interword Distance Changes Represented by Sine Waves for Watermarking Text Images Author: Ding Huang Supervisor: Prof. Hong Yan.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
By Elo Leung and Wing Wong CS 265 Section 2 Spring 2004.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Robust Digital Right Management Scheme (DRM) for Multimedia Anuj Maheshwari Victor Sutan
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates Li Lei School of Information Science and Technology Sun Yat-Sen University.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Project title : Automated Detection of Sign Language Patterns Faculty: Sudeep Sarkar, Barbara Loeding, Students: Sunita Nayak, Alan Yang Department of.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
A study for Relational Database watermarking scheme Speaker: Pei-Feng Shiu Date: 2012/09/21.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Watermarking Text Document Images Using Edge Direction Histograms Young-Won Kim and Il-Seok Oh Pattern Recognition Letters, Vol. 25, 2004, pp – 1251.
PERFORMANCE ANALYSIS OF AVS-M AND ITS APPLICATION IN MOBILE ENVIRONMENT By Vidur Vajani ( ) Under the guidance of Dr.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
Advanced Science and Technology Letters Vol.28 (NT 2013), pp Print-scan Resilient Watermarking for the.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
A New Threat Evaluation Method Based on Cloud Model Wang Bailing 1*, Guo Shi 1, Qu Yun 1, Wang Xiaopeng 1, Liu Yang 1 1 Harbin Institute of Technology,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Fingerprinting Text in Logical Markup Languages Christian D. Jensen G.I. Davida and Y. Frankel (Eds.): Proc. Information Security Conference 2001, Lecture.
A Study on Visual Secret Display Student: Ming-Chiang Chen Advisors: Dr. Shyong Jian Shyu and Dr. Kun-Mao Chao 1.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Proposed enrollment and production of an identification document. Figure Legend:
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Watermarking Scheme Capable of Resisting Sensitivity Attack
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Watermarking for Image Authentication ( Fragile Watermarking )
Parag Agarwal Digital Watermarking Parag Agarwal
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Data hiding based Hamming code
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Digital Watermarking for Image Authentication with Localization
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
An imperceptible spatial domain color image watermarking scheme
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source : Digital Signal Processing. Vol. 73, pp , Feb
Digital Watermarking Lecture 2
A Quadratic-Residue-based Fragile Watermarking Scheme
Presentation transcript:

T EXT D IGITAL W ATERMARKING O F A M ALAYALAM T EXT D OCUMENT B ASED O N F RAGMENTS R EGROUPING S TRATEGY. Guide:Presented by: Mrs.Sreeja Sasinas Alias Haritha.Z.A Asst.Professor mcs Dept. of CSE. M.Tech CSE

P ROBLEM D EFINITION  Embedding a digital watermark into a digital text document that carries information unique to the copyright owner or the creator of the document.

I NTRODUCTION  Digital Watermarking  Text Digital Watermarking Process of embedding a digital watermark into a digital text document. Proposed in 1995 by Brassil and Low. Classification Based on the format Based on Expand space Based on semantics

 Format based Text Watermarking Three methods Line shift coding Word shift coding Feature coding  Watermark capacity and robustness of most algorithms unsatisfactory.  Enhancing robustness using Fragments regrouping strategy.

L ITERATURE S URVEY Existing works  Brassil and Maxemchunk[1] proposed coding methods that is applied either to a bitmap image or to a format file. Line shift coding Word shift coding Feature coding : altering features (eg: alter upward the vertical endlines – letters b,d,h etc.)  Merits and demerits:  Line shift coding has stronger robust but low watermarking capacity.  Word shift coding has better watermarking imperceptibility.  Feature coding is hard to implement for all kind of formats.

 R.Davarsani and K.Yaghmei[2] proposed a method to embed watermark data in Farsi letters by readjusting the amount of their slopes.  Merits: Better watermarking capacity and blindness  Demerits: Can only be used with special scripts.  Thein vui khen and A.Makur[3] introduced a word based self embedding watermarking scheme for document images coded in binary format.  Merits: Better coding of self embedding watermark.  Demerits: Extraneous detection and restoration failure.

 Qing-Cheng Li and Zhen-Hua Dong[4] Proposed a novel watermarking algorithm based on Chinese character structure.  Merits : Stronger watermarking robustness, greater watermarking capacity and better watermarking imperceptibility.  Demerits: Applicable only to Chinese language. Watermark may be attacked.  Xinmin Zhou et al.[5] proposed a semi-fragile watermarking scheme for content authentication of Chinese text documents.  Merits: More secure and reliable  Demerits :No copyright protection.

 Liu Jin’ An et al.[6] proposed a text digital watermarking for Chinese word document where inter character spaces are modified for coding.  Merits: Better capacity and efficient extraction of watermark.  Wengang Cheng et al.[7] proposed a text digital watermarking algorithm based on fragments regrouping strategy.  Merits : Stronger watermarking robustness,greater watermarking capacity and better watermarking invisibility.

P ROBLEM D ESCRIPTION  In [7] an efficient text digital watermarking algorithm is proposed based on fragments regrouping strategy.  Hash function is used for mapping watermark into document.  Format based watermarking – color feature used for embedding watermarking.  This algorithm can only be used with document in RGB color format.

S TUDY Approach Input : A Malayalam text document,a watermark. Fragment the watermark. Find the characters with loops in the text document. Embed the fragment using hash function into document characters redundantly. Expected output. A watermarked Malayalam document which is more robust,have better capacity and better invisibility.

R EFERENCES 1. J. Brassil, S. Low, N. Maxemchuk, and L. O’Gorman, “Electron marking and identification techniques to discourage document copying,” IEEE Journal on Selected Areas in Communications, VOL13, Oct.1995, pp. 1495–504, doi: / R. Davarzani and K. Yaghmaie, “Farsi Text Watermarking Based on Character Coding,” International Conference on Signal Processing Systems (ICSPS 2009), IEEE Computer Society. 3. T. V. Khen and A. Makur, “A Word Based Self-Embedding Scheme For Document Watermark,” 2006 IEEE Region 10 Conference (TENCON 2006), Institute of Electrical and Electronics Engineers Inc, Nov. 2006, pp. 906–909, doi: /TENCON Q. C. Li and Z. H. Dong, “Novel Text Watermarking Algorithm based on Chinese Characters Structure,” 2008 International Symposium on Computer Science and Computational Technology (ISCSCT), IEEE Press, Dec. 2008, pp. 348–51, doi: /ISCSCT X. M. Zhou, W. D. Zhao, S. C. Wang and R. Peng, “A semi-fragile watermarking scheme for content authentication of Chinese text documents,” nd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2009), IEEE Press, Aug. 2009, pp. 439– J. A. Liu, L. He, D. Y. Fang and X. L. Gui, “A text digital watermarking for Chinese word document,” 2008 International Symposium on Computer Science and Computational Technology (ISCSCT), IEEE Press, Dec. 2008, pp. 217–20, doi: /ISCSCT A Robust Text Digital Watermarking Algorithm Based on Fragments Regrouping Strategy Wengang Cheng, Hui Feng, Cuiru Yang