Presented by :
Anand Karandikar
Guided by:
Prof. G. G. Chiddarwar
Digital Image Protection Using
Adaptive Watermarking Tec...
Overview:
DigitalWatermarking
Least Significant BitAlgorithm
Discrete CosineTransform Algorithm
Metrics for quality
L...
Digital Watermarking: The concept
3 May 20143
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Digital Watermarking: Types
Visible watermark:
3 May 20144
Digital Image Protection UsingAdaptive
WatermarkingTechniques
F...
Digital Watermarking: Types (cont.)
Invisible watermark:
3 May 20145
Digital Image Protection UsingAdaptive
WatermarkingTe...
Digital Watermarking: Classification
3 May 20146
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Fig.3.Class...
Least Significant Bit Technique
10110101 01001101 11001101
00010011 00010100 01001010
10110100 01001100 11001101
00010010 ...
8
Secret
data
Convert to bit stream
Conversion of data
Encode Data
Embedding
Extract
Decode Data
Original Source
Image
Loa...
Discrete Cosine Transform Algorithm
3 May 20149
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Fig.6.The DC...
Discrete Cosine Transform Algorithm
3 May 201410
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Fig.7.The D...
3 May 201411
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Fig.8.The MBEC algorithm
Select the FM region
S...
16 11 10 16 24 40 51 61
12 12 14 19 26 48 16 55
14 13 16 24 40 57 69 56
14 17 20
29 51 87 80 62
18 22 37 56 68 10
9
10
8
7...
MBEC: The actual thing.
3 May 2014
Digital Image Protection UsingAdaptive
WatermarkingTechniques13
16 11 10 16 24 40 51 61...
Metrics for quality:
 Peak Signal to Noise Ratio(PSNR) PSNR> 0.35 dB
PSNR = 10 log10 . A2
1
N x M [f(i,j) – f’(i,j)]2
 N...
LSB & DCT : Comparison
LSB Substitution
technique
DCT technique
Spatial domain technique Frequency domain technique
Provid...
Conclusion
 DigitalWatermarking proves crucial.
 A combination of more than one technique is
required.
 DCT proves to b...
References
[1].Yusuf Perwej, Firoj Parwej ,Asif Perwej -The International
Journal of Multimedia & Its Applications (IJMA)V...
THANKYOU…!
3 May 201418
Digital Image Protection UsingAdaptive
WatermarkingTechniques
3 May 201419
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Upcoming SlideShare
Loading in …5
×

Digital image protection using adaptive watermarking techniques

984 views
763 views

Published on

Watermaking of images using Discrete Cosine Transform technique (DCT approach)

Published in: Technology, Art & Photos
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
984
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
71
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Digital image protection using adaptive watermarking techniques

  1. 1. Presented by : Anand Karandikar Guided by: Prof. G. G. Chiddarwar Digital Image Protection Using Adaptive Watermarking Techniques 3 May 20141 Digital Image Protection UsingAdaptive WatermarkingTechniques
  2. 2. Overview: DigitalWatermarking Least Significant BitAlgorithm Discrete CosineTransform Algorithm Metrics for quality LSB and DCT: Comparison Conclusion References 3 May 20142 Digital Image Protection UsingAdaptive WatermarkingTechniques
  3. 3. Digital Watermarking: The concept 3 May 20143 Digital Image Protection UsingAdaptive WatermarkingTechniques
  4. 4. Digital Watermarking: Types Visible watermark: 3 May 20144 Digital Image Protection UsingAdaptive WatermarkingTechniques Fig.1.VisibleWatermark
  5. 5. Digital Watermarking: Types (cont.) Invisible watermark: 3 May 20145 Digital Image Protection UsingAdaptive WatermarkingTechniques Fig.2.InvisibleWatermark
  6. 6. Digital Watermarking: Classification 3 May 20146 Digital Image Protection UsingAdaptive WatermarkingTechniques Fig.3.Classification ofWatermarking techniques
  7. 7. Least Significant Bit Technique 10110101 01001101 11001101 00010011 00010100 01001010 10110100 01001100 11001101 00010010 00010100 01001011 3 May 20147 Digital Image Protection UsingAdaptive WatermarkingTechniques Fig.4.The LSB Substitution technique Embed 001001 Secret Data Original Image encoded format Embedded data
  8. 8. 8 Secret data Convert to bit stream Conversion of data Encode Data Embedding Extract Decode Data Original Source Image Load Source image Convert to stego image Extracted secret data Digital Image Protection UsingAdaptive WatermarkingTechniques 3 May 2014 Fig.5.The LSB Substitution procedure
  9. 9. Discrete Cosine Transform Algorithm 3 May 20149 Digital Image Protection UsingAdaptive WatermarkingTechniques Fig.6.The DCT algorithm Fragment Use DCT Block selection Coefficient selection EmbedWatermarks Apply inverse DCT
  10. 10. Discrete Cosine Transform Algorithm 3 May 201410 Digital Image Protection UsingAdaptive WatermarkingTechniques Fig.7.The DCT region Low band frequency region Middle band frequency region High band frequency region
  11. 11. 3 May 201411 Digital Image Protection UsingAdaptive WatermarkingTechniques Fig.8.The MBEC algorithm Select the FM region Select two points say Pi(u1,v1) & Pi(u2,v2) Pi(u1,v1)>= Pi(u2,v2) Encode 0 Encode 1 A A True False
  12. 12. 16 11 10 16 24 40 51 61 12 12 14 19 26 48 16 55 14 13 16 24 40 57 69 56 14 17 20 29 51 87 80 62 18 22 37 56 68 10 9 10 8 77 24 35 55 64 81 10 4 11 3 92 49 64 78 87 10 3 12 1 12 0 10 1 72 92 95 98 11 2 10 0 10 3 99 E.g.: 3 May 2014 Digital Image Protection UsingAdaptive WatermarkingTechniques12 16 11 10 16 24 40 51 61 12 12 14 19 26 48 16 55 14 13 16 24 40 57 69 56 14 17 20 29 51 87 80 62 18 22 37 56 68 10 9 10 8 77 24 35 55 64 81 10 4 11 3 92 49 64 78 87 10 3 12 1 12 0 10 1 72 92 95 98 11 2 10 0 10 3 99 Fig.9.An illustration of DCT algorithm Transform Embed Inverse Transform 16 11 10 16 24 40 51 61 12 12 14 19 26 48 16 55 14 13 16 24 40 57 69 56 14 17 20 29 51 87 80 62 18 22 37 56 68 10 9 10 8 77 24 35 55 64 81 10 4 11 3 92 49 64 78 87 10 3 12 1 12 0 10 1 72 92 95 98 11 2 10 0 10 3 99 16 11 10 16 24 40 51 61 12 12 14 19 26 48 16 55 14 13 16 24 40 57 69 56 14 17 20 29 51 87 80 62 18 22 37 56 68 10 9 10 8 77 24 35 55 64 81 10 4 11 3 92 49 64 78 87 10 3 12 1 12 0 10 1 72 92 95 98 11 2 10 0 10 3 99
  13. 13. MBEC: The actual thing. 3 May 2014 Digital Image Protection UsingAdaptive WatermarkingTechniques13 16 11 10 16 24 40 51 61 12 12 14 19 26 48 16 55 14 13 16 24 40 57 69 56 14 17 20 29 51 87 80 62 18 22 37 56 68 109 108 77 24 35 55 64 81 104 113 92 49 64 78 87 103 121 120 101 72 92 95 98 112 100 103 99 14 = 14; Encode 0 20 < 22; Encode 1 Fig.10.MBEC encoding
  14. 14. Metrics for quality:  Peak Signal to Noise Ratio(PSNR) PSNR> 0.35 dB PSNR = 10 log10 . A2 1 N x M [f(i,j) – f’(i,j)]2  Normalized Cross-correlation(NC) NC>0.75 3 May 201414 Digital Image Protection UsingAdaptive WatermarkingTechniques
  15. 15. LSB & DCT : Comparison LSB Substitution technique DCT technique Spatial domain technique Frequency domain technique Provides limited ROBUSTNESS Provides better ROBUSTNESS Embeds little INFORMATION Embeds more INFORMATION Lesser NOISE immunity Highly immune to NOISE SIMPLE implementation COMPLEX implementation 3 May 201415 Digital Image Protection UsingAdaptive WatermarkingTechniques Table.1.LSB and DCT technique comparison
  16. 16. Conclusion  DigitalWatermarking proves crucial.  A combination of more than one technique is required.  DCT proves to be advantageous. 3 May 201416 Digital Image Protection UsingAdaptive WatermarkingTechniques
  17. 17. References [1].Yusuf Perwej, Firoj Parwej ,Asif Perwej -The International Journal of Multimedia & Its Applications (IJMA)Vol.4, No.2, April 2012,An AdaptiveWatermarkingTechnique for the copyright of digital images and Digital Image Protection. [2] Lin Liu -A Survey of DigitalWatermarkingTechnologies. [3]. Petitcolas, F.A. P.,Anderson, R. J.: Kuhn, M. G., Information Hiding –A Survey, Proceedings of the IEEE, Special Issue on Protection of Multimedia Content. 3 May 201417 Digital Image Protection UsingAdaptive WatermarkingTechniques
  18. 18. THANKYOU…! 3 May 201418 Digital Image Protection UsingAdaptive WatermarkingTechniques
  19. 19. 3 May 201419 Digital Image Protection UsingAdaptive WatermarkingTechniques

×