Presentation is loading. Please wait.

Presentation is loading. Please wait.

 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.

Similar presentations


Presentation on theme: " Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete."— Presentation transcript:

1

2  Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete Wavelet Transform) are applied this technique

3  Watermarking protocol used for only send the image in embedding to the content owner image  Seller dose not exact watermarked copy that the buyer services  visible watermarking techniques  Public key cryptography and private key are used

4  Communicate only image seller, buyer and also the third parity can see that the image  No security  Restrict our invisible process

5  Lossless data embedding techniques  Two techniques are used i) Payload extractions is robust ii) Feature of the images  Spatial domain algorithm are used  There are comprises of three components i) Prediction ii) context modeling and quantization iii) conditional entropy coding

6  The process is irreversible  It offers the distortion curve and capacity  Compression efficiency is low

7  An analysis of the local standard deviation of the marked encrypted image in order to remove the embedded data during the decryption step.  AES algorithm  This algorithm has several modes are used but now used for ECB(Electronic Code Book)  Symmetric key are used

8  Only applied for the medical images  Payload and complexity is low  Efficiency is low

9  Watermaking techniques may be applied in the without fear of image destruction due to lossy compression because they are more integrated into the image  Algorithm used for DCT (Discrete Cosine Transform) which is used in JPEG compression  It is a spatial domain  DCT depend on time or frequency domain

10  watermarking schemas is that they are not very robust against different types of image manipulations or attacks.  Zigzag error is produced  some of these techniques are quite complicated to implement in real-time.

11  DWT(Discrete Wavelet Transform)  The discrete wavelet transform (DWT) is being increasingly used for image coding.  This is due to the fact that DWT supports features like progressive image transmission (by quality, by resolution), ease of compressed image manipulation, region of interest coding, etc.  DWT has traditionally been implemented by convolution.

12 ‣No need to divide the input coding into non-overlapping ‣Transformation of the whole image ‣It depend on time and frequency domain ‣Compression ratio is high ‣Higher flexibility Performance ‣ Peak Signal to Noise ratio used to be a measure of image quality ‣ The PSNR between two images having 8 bits per pixel or sample in terms of decibels (dBs) is given by: ‣ PSNR = 10 log 10 255²/MSE

13 key secret data key DWT EmbeddingOPA Stegno image Inverse transform Extraction message input image IMAGE ENCRYPTION DATA EMBEDDING DATA EXTRACTION

14  There are three methods i) Image encryption ii) Data embedding iii) Data extraction/Image recovery

15  By embedding data in only certain region  Image cropping concept introduced, maintains security at respectable level since no one can extract message without having value of cropped region.  It increases the quality of stego image.  The proposed approach provides fine image quality.

16  Secret communication  Defence application  Medical image application

17  Software tool Tool : Matlab Version : 7 Operating system : windows7

18  A novel lossless (reversible) data embedding technique – Lossless G-LSB  Embedding capacity is high  Low distortion

19  N.Menon and P.W.Wong,‶A buyer seller watermarking protocol″,IEEE transactions. image process.,vol 10.no 4,april 2001  Z.Ni,Y.Q.Shi,N.Ansari,and W.Su, ‶ Reversible data hiding ″,IEEE transactions. image process.,vol 16.no 3,March 2006  X.Zhang, ‶ Reversible data hiding in encrypted images″IEEE signal process.,vol 18.pp 255- 258,April 2011

20 THANK YOU


Download ppt " Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete."

Similar presentations


Ads by Google