Digital Image Watermarking


Published on

Feature Region Set for Digital Image Watermarking
is the new technique in digital image processing

Published in: Technology, Art & Photos
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Digital Image Watermarking

  1. 1. Feature Region Set for Digital Image Watermarking PRALIN PAVITHRAN ME- MECHATRONICS EMAIL 10/20/2013 copyright protected (c)
  2. 2. AIM  After watermarked to preserve the original image quality.  Multi-dimensional knapsack problem technique . 10/20/2013 copyright protected (c)
  3. 3. INTRODUCTION  Before watermarking to select the high freguency by using Harris laplican transform.  Attacks which attempt to destroy watermarks can be classified into two types, 1. Noise-like signal processing. 2. Geometric distortions. 10/20/2013 copyright protected (c)
  4. 4. LITERATURE SURVEY 10/20/2013 copyright protected (c)
  5. 5. 1.Secure spread Spectrum watermarking for multimedia. This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. Advocate that a watermark should be constructed as an independent and identically distributed Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. ADVANTAGE: Two watermarking approaches executed properly. DRAWBACK: Detect the watermarked image, again shows as original as watermarked. 10/20/2013 copyright protected (c)
  6. 6. 2. Cocktail watermarking for digital image protection. A novel image protection scheme called “cocktail watermarking” is proposed in this paper. We analyze and point out the inadequacy of the modulation techniques commonly used in ordinary spread spectrum watermarking methods and the visual model-based ones. To resolve the inadequacy, two watermarks which play complementary roles are simultaneously embedded into a host image is remarkably effective in resisting various attacks, including combined ones. ADVANTAGE: It is secure algorithm for watermarking images. DRAWBACK: The original image is not available after watermarked extraction. 10/20/2013 copyright protected (c)
  7. 7. 3. Digital watermarking robust to geometric distortions. In this paper, we present two watermarking approaches that are robust to geometric distortions. The first approach is based on image normalization, in which both watermark embedding and extraction are carried out with respect to an image normalized to meet a set of predefined moment criteria. ADVANTAGE: Two watermarking approaches executed properly. DRAWBACK: Detect the watermarked image, again shows as original as watermarked. 10/20/2013 copyright protected (c)
  8. 8. 4. Image watermarking Algorithm with mathematical modeling and analysis of the watermarking Processes. In this paper, a new rotation and scaling invariant image watermarking scheme is proposed based on rotation invariant feature and image normalization. A mathematical model is established to approximate the image based on the mixture generalized Gaussian distribution, which can facilitate the analysis of the watermarking processes. ADVANTAGE: The rotation invariant features are extracted from the segmented areas and are selected as reference points. DRAWBACK: Difficult to selecting the high frequency region. 10/20/2013 copyright protected (c)
  9. 9. 5. A New Approach for Optimal Multiple Watermarks Injection. The digital imaging technology has grown explosively for multimedia applications in recent years. The need for the copyrighted digitalized media becomes urgent nowadays. An approach for the digital copyright protection is to employ advanced watermarking techniques, where watermarks can reveal the ownership identities. Generally speaking, the watermarks are embedded into an image or video signals. ADVANTAGE: Efficient scale-factor optimization scheme, which can lead to the maximum overall SNR for both subject signal and watermarks. DRAWBACK: Detect the watermarked image, again shows as original as watermarked. 10/20/2013 copyright protected (c)
  10. 10. SOFTWARE REQUIRED  MATLAB 7.5.0( R2007b) 10/20/2013 copyright protected (c)
  11. 11. EXISTING SYSTEM Robust image watermarking scheme for resisting geometric attacks and traditional signal processing attacks simultaneously by two main phases, the feature point based watermark synchronization and the Discrete Wavelet Transform (DWT) based watermark embedding. 10/20/2013 copyright protected (c)
  12. 12. PROPOSED SYSTEM 10/20/2013 copyright protected (c)
  13. 13. 10/20/2013 copyright protected (c)
  14. 14. ADVANTAGES  Robust digital image watermarking under the constraint of preserving image quality.  The robustness against significantly improved. 10/20/2013 various copyright protected (c) attacks is
  15. 15. APPLICATION  Military purpose.  Authenticated message.  Medical purpose. 10/20/2013 copyright protected (c)
  16. 16. RESULT AND FUTURE SCOPE  From this project the secrete image can be watermarked into an original image.  Finally to protect the original image, that means to preserve the image quality as the original image.  In future it will use in company way because the important documents, file watermark in a path. 10/20/2013 copyright protected (c)
  17. 17. REFERENCE [1.] Jen-Sheng Tsai, Win-Bin Huang, and Yau-Hwang Ku,” On the Selection of Optimal Feature Region Set for Robust Digital Image Watermarking”. IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 3, MARCH 2011. [2.] C. W. Dang and H. M. Hang, “A feature-based robust digital image watermarking scheme,” IEEE Trans. Signal Process., vol. 51, no. 4,pp. 950–959, Apr. 2008. [3.] D. G. Gowe, “Distinctive image features from scaleinvariant key points,”Int. J. Comput. Vis., vol. 60, no. 2, pp. 91–110, Nov. 2004. [4.] H. Kellerer, U. Pferschy, and D. Pisinger, “Knapsack Problems”. Berlin: Springer, 2004. [5.]F. A. P. Petitcolas, “Watermarking schemes evaluation,” IEEE Signal Process. Mag., vol. 17, no. 5, pp. 58–64, Sep. 2009. 10/20/2013 copyright protected (c)
  18. 18. 10/20/2013 copyright protected (c)