Download presentation
Presentation is loading. Please wait.
1
DEPARTMENT OF ECE, BEC, BAGALKOT
DIGITAL IMAGE WATERMARKING FOR SECURED COMMUNICATION PROJECT MEMBERS DEEPIKA S.K SUDHARANI B.B VIDYASHREE H LAVANYALAKSHMI L.R PROJECT GUIDE ASHOK V. SUTAGUNDAR ASSISTANT PROFESSOR DEPARTMENT OF ECE, BEC, BAGALKOT HOD PROF.S.M IDDALAGI DATE 20/11/2012
2
OUTLINE INTRODUCTION LITERATURE SURVEY OBJECTIVIES CHARACTERISTICS WATERMARKING TECHNIQUES LIMITATIONS CONCLUSION REFERENCE
3
INTRODUCTION
4
DIGITAL WATERMARKING:
Technique used to hide a small amount of digital data in a digital signal is Digital Watermarking WATERMARKED IMAGE WATERMARK WATERMARK EMBEDDING WATERMARK RECOVERY WATERMARK IMAGE WATERMARKED IMAGE KEY KEY Watermark Original Image Watermarked Image
5
Original Image Watermark Watermarked Image TYPES OF WATERMARKING: VISIBLE INVISIBLE PUBLIC PRIVATE FRAGILE PERCEPTUAL
6
NEEDS OF WATERMARKING:
Proof of Ownership (copyrights and IP protection) Copying Prevention Broadcast Monitoring Authentication Data hiding Copyright protection Source tracking Broadcast tracking, such as watermarked videos from global news organizations Hidden communication.
7
LITERATURE SURVEY
8
DWT Based Invisible Image Watermarking Algorithm for Color Images
This used two stages Embedding stage Extracting stage In order to watermark the image it uses the Discrete Wavelet Transform(DWT) In this technique a new robust watermarking technique for color images was performed. The RGB image is converted to HSV and watermarked by using discrete wavelet transform. Watermarking embedded stage and extraction stage is designed using low power invisible watermarking algorithm. Here the host signal is an image and after embedding the secret data a watermarked image is obtained and then extracts secret image and original image separately.
9
A Novel DWT Based Invisible Watermarking Technique for Digital Images
There are three significant phases: Watermark generation Water mark embedding water mark detection The method is tested using MATLAB It considers the images with number of rows & columns are of equal size since embedded watermark is a square matrix . A new robust watermarking scheme & extracts the watermark information effectively. In this method , a binary watermark pattern was constructed from the content of the host image itself & was disordered with the help of “Arnold” transform . The designed method makes use of the Discrete Wavelet Transform (DWT) which provides a frequency spread of the watermark within the host image. Authentication process provides qualities like imperceptibility, robustness & security.
10
Semi-Blind Color Image Watermarking on High Frequency Band Using DWT SVD
In this scheme watermark is embedded in high frequency. It has good performance in a variety of image processing. SVD decomposition belongs to spatial domain transform and has robustness to geometrical attack. For considering this, we use DWT and IDWT transformation to obtain the high frequency image. Accordingly the scheme has robustness to geometrical attack. There are three frequency image (low frequency image, middle-low frequency image, middle-high frequency image) are not used. Different watermarks can be embedded in them. It is a semi-blind scheme so when extraction is done without need of original image, only original watermark and the algorithm is required for detection of content ownership. The PSNR shows that the extracted watermark from the attacked image is closer to the original watermark.
11
Robust Dynamic Block-Based Image Watermarking in DWT Domain
In this paper, a robust watermarking scheme in DWT domain is proposed. We embedded the watermark into the significant wavelet coefficients in those dynamic blocks with strong edges according to “Binary Algorithm”. Since the change to the blocks with strong edge strength is less visible to human eyes. In this implementation the edge dynamic blocks are identified using a “Binary Algorithm”, for this reason variation of its threshold is influencing the quality and accuracy of the extracted watermark. The proposed method is suitable for maps and natural images that have better edges. In this section, some experimental results are demonstrated to show the effectiveness of the proposed watermarking scheme. In order to test the performance of the proposed method we choose a binary watermark image of size 8×8.
12
Removable Visible Image Watermarking Algorithm in Discrete Cosine
Transform Domain To identify the ownership of works and to prevent the viewers from making unauthorized use. Provides an efficient solution to copyright protection problems. Generation of preprocessed watermark. It succeeds in defeating illegal removal and resisting compression to a certain extent. To protect the multimedia content and to ensure that the reconstructed images are of high quality for authorized users, and otherwise, of low quality for unauthorized users. This preprocesses the watermark using a secret key before embedding it into host images. The mechanism can be easily extended and applied to other transform domains.
13
OBJECTIVES
14
To embed a watermark containing key information such as authentication or copyright codes.
To find the balance among the aspects such as robustness to various attacks and invisibility. It an efficient technology for ensuring data integrity and data-origin authenticity . To provide copyright protection and ownership identification to the image.
15
CHARACTERISTICS
16
Invisibility : An embedded watermark is not visible.
Robustness : Piracy attack or image processing should not affect the embedded watermark. Readability : A watermark should convey as much information as possible. A watermark should be statistically undetectable. Security : A watermark should be secret and must be undetectable by an unauthorized user in general.
17
WATERMARKING TECHNIQUES
18
SPACIAL DOMAIN TECHNIQUES
LEAST SIGNIFICANT BIT(LSB) SSM MODULATION BASED TECHNIQUE FREQUENCY DOMAIN TECHNIQUE DISCRETE COSINE TRANSFORM DISCRETE WAVELET TRANSFORM
19
Wavelet transform can accurately model HVS than other transforms like Discrete Fourier Transform Or Discrete Cosine Transform . Wavelet coded image is a multi-resolution description of image. Visual artefacts introduced by wavelet coded images are less evident compared to DCT. DWT has spatial frequency locality. Current image compression standard JPEG 2000 is based on wavelet transform. discrete wavelet transform has over Fourier transforms is temporal resolution. It gives perfect reconstruction of decomposed image It offers multi resolution representation of a image.
20
LIMITATIONS
22
The larger amount of information stored on a digital watermark, results in a more distorted picture.
Copyright owners may move or assign their ownership interest to another party. Some companies are offering their digital watermarking software at no charge and thus make some of their profit by charging annual fees to copyright owners for maintenance of on-line current contact information. not all watermarking techniques will be useful in resolving ownership disputes in courts of law
23
CONCLUSION
24
The work in this thesis, primarily focus on to provide good tradeoff between perceptual quality of the watermarked image and its robustness to different attacks. For this purpose, we have discussed two digital watermarking algorithms in discrete wavelet domain (DWT) by incorporating contrast sensitivity based human visual system model (HVS). We used grayscale watermark for fusion based watermarking and binary watermark for spread spectrum based watermarking. Through computer simulation, we analyzed the performance of the algorithms against different attacks such as JPEG compression, AWGN noise, mean and median filtering, cropping and image resizing. From the simulation analysis, we conclude that the both the methods are robust against different non geometric attacks. However, both the methods fail for non-geometric attacks such as rotation or affine transformations.
25
REFERENCE
26
Rafael C Gonzalez, Richard E Woods, Steven L Eddins “Image Processing Using MATLAB”
“International Journal Of Emerging Technology And Advanced Engineering available at (ISSN ,Volume 2,Issue 5,May 2012) Abou Ella Hassanien “A Copyright Protection Using Watermarking Algorithm” published at INFORMATICA,2006,Volume 17,No 2,pp
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.