SlideShare a Scribd company logo
1 of 29
Copy-Right Protection with Wavelet Based Watermarking
Adnan Özdemir
Introduction
In this project a watermarking method which is working
on frequency domain was generated and implemented.
In order to protect the copy-right laws, a unique QR code
was inserted to the remote sensing images.
• Wavelet
The project has several targets:
Generating watermarking algorithm with existing approaches,
Generating a method which is resistant to resize,
(Minimum 1/16 resizing)
Successfully regenerating the data and image from watermarked
image,
Executing an efficient useful low time consuming program.
Problems at Watermarking Methods
Actually, watermarking is easy to implement any simple algorithm. Operation on
pixel values at time domain allows to programmer inserting special key in a image.
At that type of methods it is important to what type of destruction or corruption are
exposed to image. In other words, if the pixels which consist watermarked values,
are changed unpredictably the inverse transformation of image watermarking will
not produce any meaningful results.
For example, if the key values are located at small area of images, after deleting
this area or corrupting this area will cause losing watermarking knowledge.
In order to minimize the locality, the key informations
can be inserted periodical. However, at this case,
resizing operations on image will damage the
watermark informations
All the watermarking methods which are operated at time domain
have weakness with process at time domain.
Therefore, frequency domain watermarking operation are generated.
Specially discrete time Fast Fourier Transformation discrete time and
wavelet transformation are commonly used.
Main idea is minimizing the losing information at image and generate
a watermarked image which can resist most of the process at time
domain.
Due to do that approach, low frequency components are extracted
and the the key components are located. This approach can resist to
the resizing and most of local operations.
Even using low frequency variables, the image loses details.
Depending to image, this data losing causes destruction and
low resolute images.
In order to keep the image with high quality, low frequency
bands should be selected wisely.
The key values should effect the image minimum. At this
case, wavelet methods shows themselves.
If the image band processed with wavelet transformation with
several times, lowest frequency elements will be separated.
The key values are placed at this frequency bands. This
approach is called as "Wavelet Tree Quantization".
DWT2 and IDWT2
DWT2 and IDWT2
Landsat 8
• Each pixel is sampled by 16 bits.
• OLI Spectral Bands
• Spectral Band WavelengthResolution
• Band 1 - Coastal / Aerosol 0.433 - 0.453 µm 30 m
• Band 2 - Blue 0.450 - 0.515 µm 30 m
• Band 3 - Green 0.525 - 0.600 µm 30 m
• Band 4 - Red 0.630 - 0.680 µm 30 m
• Band 5 - Near Infrared 0.845 - 0.885 µm 30 m
• Band 6 - Short Wavelength Infrared 1.560 - 1.660 µm 30 m
• Band 7 - Short Wavelength Infrared 2.100 - 2.300 µm 30 m
• Band 8 - Panchromatic 0.500 - 0.680 µm 15 m
• Band 9 - Cirrus 1.360 - 1.390 µm 30 m
Marking Process
DWT2
Haar
kernel
Marking Process
IDWT2
Haar
kernel
Marking Process
PSNR = 128.2023 db
Exracting The QR
DWT2
Test
Test
Thresholding? (Otsu)
• Kullanım Alanları Örnekleri
Lig tv
Spotify
Netflix
References
[1] Ruanaidh, JJK Ó., W. J. Dowling, and F. M. Boland. "Watermarking digital images for copyright protection." IEE
Proceedings-Vision, Image and Signal Processing 143.4 (1996): 250-256.
[2] Wang, Shih-Hao, and Yuan-Pei Lin. "Wavelet tree quantization for copyright protection watermarking." Image
Processing, IEEE Transactions on 13.2 (2004): 154-165.
[3] Lin, Shinfeng D., and Chin-Feng Chen. "A robust DCT-based watermarking for copyright protection." Consumer
Electronics, IEEE Transactions on 46.3 (2000): 415-421.
[4] Iyer, Ms Aparna, et al. "IMAGE RETRIEVAL USING COLOUR AND TEXTURE ANALYSIS." IMAGE 2.5 (2013).
Questions?

More Related Content

What's hot

Particle image velocimetry
Particle image velocimetryParticle image velocimetry
Particle image velocimetryHemant Rawat
 
A fast single image haze removal algorithm using color attenuation prior
A fast single image haze removal algorithm using color attenuation priorA fast single image haze removal algorithm using color attenuation prior
A fast single image haze removal algorithm using color attenuation priorLogicMindtech Nologies
 
Ijmsr 2016-10
Ijmsr 2016-10Ijmsr 2016-10
Ijmsr 2016-10ijmsr
 
IRJET - Underwater Object Identification using Matlab and Machine
IRJET - Underwater Object Identification using Matlab and MachineIRJET - Underwater Object Identification using Matlab and Machine
IRJET - Underwater Object Identification using Matlab and MachineIRJET Journal
 
Facial Feature Analysis For Model Based Coding
Facial Feature Analysis For Model Based CodingFacial Feature Analysis For Model Based Coding
Facial Feature Analysis For Model Based CodingEric Larson
 
IRJET- A Comparative Analysis of various Visibility Enhancement Techniques th...
IRJET- A Comparative Analysis of various Visibility Enhancement Techniques th...IRJET- A Comparative Analysis of various Visibility Enhancement Techniques th...
IRJET- A Comparative Analysis of various Visibility Enhancement Techniques th...IRJET Journal
 
image processing
image processingimage processing
image processingDhriya
 
Basic Video-Surveillance with Low Computational and Power Requirements Using ...
Basic Video-Surveillance with Low Computational and Power Requirements Using ...Basic Video-Surveillance with Low Computational and Power Requirements Using ...
Basic Video-Surveillance with Low Computational and Power Requirements Using ...uberticcd
 
The single image dehazing based on efficient transmission estimation
The single image dehazing based on efficient transmission estimationThe single image dehazing based on efficient transmission estimation
The single image dehazing based on efficient transmission estimationAVVENIRE TECHNOLOGIES
 
Particle image velocimetry
Particle image velocimetryParticle image velocimetry
Particle image velocimetryMohsin Siddique
 
09.50 Ernst Vrolijks
09.50 Ernst Vrolijks09.50 Ernst Vrolijks
09.50 Ernst VrolijksThemadagen
 
Image compression techniques by using wavelet transform
Image compression techniques by using wavelet transformImage compression techniques by using wavelet transform
Image compression techniques by using wavelet transformAlexander Decker
 
Wavelet video processing tecnology
Wavelet video processing tecnologyWavelet video processing tecnology
Wavelet video processing tecnologyPrashant Madnavat
 
Improved single image dehazing by fusion
Improved single image dehazing by fusionImproved single image dehazing by fusion
Improved single image dehazing by fusioneSAT Publishing House
 
Digital radiography
Digital radiographyDigital radiography
Digital radiographyharibudke
 
Wavelet based image compression technique
Wavelet based image compression techniqueWavelet based image compression technique
Wavelet based image compression techniquePriyanka Pachori
 

What's hot (20)

Particle image velocimetry
Particle image velocimetryParticle image velocimetry
Particle image velocimetry
 
A fast single image haze removal algorithm using color attenuation prior
A fast single image haze removal algorithm using color attenuation priorA fast single image haze removal algorithm using color attenuation prior
A fast single image haze removal algorithm using color attenuation prior
 
Ijmsr 2016-10
Ijmsr 2016-10Ijmsr 2016-10
Ijmsr 2016-10
 
IRJET - Underwater Object Identification using Matlab and Machine
IRJET - Underwater Object Identification using Matlab and MachineIRJET - Underwater Object Identification using Matlab and Machine
IRJET - Underwater Object Identification using Matlab and Machine
 
Facial Feature Analysis For Model Based Coding
Facial Feature Analysis For Model Based CodingFacial Feature Analysis For Model Based Coding
Facial Feature Analysis For Model Based Coding
 
Dip lect1-sent
Dip lect1-sentDip lect1-sent
Dip lect1-sent
 
Ijetcas14 479
Ijetcas14 479Ijetcas14 479
Ijetcas14 479
 
IRJET- A Comparative Analysis of various Visibility Enhancement Techniques th...
IRJET- A Comparative Analysis of various Visibility Enhancement Techniques th...IRJET- A Comparative Analysis of various Visibility Enhancement Techniques th...
IRJET- A Comparative Analysis of various Visibility Enhancement Techniques th...
 
image processing
image processingimage processing
image processing
 
Basic Video-Surveillance with Low Computational and Power Requirements Using ...
Basic Video-Surveillance with Low Computational and Power Requirements Using ...Basic Video-Surveillance with Low Computational and Power Requirements Using ...
Basic Video-Surveillance with Low Computational and Power Requirements Using ...
 
The single image dehazing based on efficient transmission estimation
The single image dehazing based on efficient transmission estimationThe single image dehazing based on efficient transmission estimation
The single image dehazing based on efficient transmission estimation
 
Particle image velocimetry
Particle image velocimetryParticle image velocimetry
Particle image velocimetry
 
09.50 Ernst Vrolijks
09.50 Ernst Vrolijks09.50 Ernst Vrolijks
09.50 Ernst Vrolijks
 
Image compression techniques by using wavelet transform
Image compression techniques by using wavelet transformImage compression techniques by using wavelet transform
Image compression techniques by using wavelet transform
 
F05843238
F05843238F05843238
F05843238
 
Wavelet video processing tecnology
Wavelet video processing tecnologyWavelet video processing tecnology
Wavelet video processing tecnology
 
Improved single image dehazing by fusion
Improved single image dehazing by fusionImproved single image dehazing by fusion
Improved single image dehazing by fusion
 
Digital radiography
Digital radiographyDigital radiography
Digital radiography
 
Wavelet based image compression technique
Wavelet based image compression techniqueWavelet based image compression technique
Wavelet based image compression technique
 
CR & DR
CR & DRCR & DR
CR & DR
 

Viewers also liked

3.21 session 35 einheit 5
3.21 session 35 einheit 53.21 session 35 einheit 5
3.21 session 35 einheit 5nblock
 
POVERTY university of sulamani Baryar abubakr
POVERTY  university of sulamani   Baryar abubakr POVERTY  university of sulamani   Baryar abubakr
POVERTY university of sulamani Baryar abubakr Bryar Abwbakr
 
Pyschminer Sportschule
Pyschminer SportschulePyschminer Sportschule
Pyschminer Sportschuleprosvsports
 
Cartaadimad21s
Cartaadimad21sCartaadimad21s
Cartaadimad21ssoypublica
 
Horario de clases
Horario de clasesHorario de clases
Horario de clasesjerson1997
 
9 M-CARE: Dagelijkse huishoudelijke taken
9 M-CARE: Dagelijkse huishoudelijke taken9 M-CARE: Dagelijkse huishoudelijke taken
9 M-CARE: Dagelijkse huishoudelijke takenKarel Van Isacker
 
Díptico Seminario Re-mirando: Yo educador y educadora en las Aulas de 2 años
Díptico Seminario Re-mirando: Yo educador y educadora en las Aulas de 2 añosDíptico Seminario Re-mirando: Yo educador y educadora en las Aulas de 2 años
Díptico Seminario Re-mirando: Yo educador y educadora en las Aulas de 2 añosSandra Mediavilla
 
Portfoliotagung - Workshop Wampfler - 2016
Portfoliotagung - Workshop Wampfler - 2016Portfoliotagung - Workshop Wampfler - 2016
Portfoliotagung - Workshop Wampfler - 2016Philippe Wampfler
 
Díptico "Re-Encuentros en Educación Infantil"
Díptico "Re-Encuentros en Educación Infantil"Díptico "Re-Encuentros en Educación Infantil"
Díptico "Re-Encuentros en Educación Infantil"InfantilCantabria
 
Warum Social Media für Lehrkräfte 2016 Pflicht sind
Warum Social Media für Lehrkräfte 2016 Pflicht sindWarum Social Media für Lehrkräfte 2016 Pflicht sind
Warum Social Media für Lehrkräfte 2016 Pflicht sindPhilippe Wampfler
 
Deutsch ein Hit 1: Lektion 4: Wir machen eine Schülerzeitung
Deutsch ein Hit 1: Lektion 4: Wir machen eine SchülerzeitungDeutsch ein Hit 1: Lektion 4: Wir machen eine Schülerzeitung
Deutsch ein Hit 1: Lektion 4: Wir machen eine Schülerzeitungmuenchnerin99
 
10 28 session 34
10 28 session 3410 28 session 34
10 28 session 34nblock
 
3.28 tag 19 - verwandlung 3
3.28   tag 19 - verwandlung 33.28   tag 19 - verwandlung 3
3.28 tag 19 - verwandlung 3nblock
 

Viewers also liked (16)

3.21 session 35 einheit 5
3.21 session 35 einheit 53.21 session 35 einheit 5
3.21 session 35 einheit 5
 
POVERTY university of sulamani Baryar abubakr
POVERTY  university of sulamani   Baryar abubakr POVERTY  university of sulamani   Baryar abubakr
POVERTY university of sulamani Baryar abubakr
 
Pyschminer Sportschule
Pyschminer SportschulePyschminer Sportschule
Pyschminer Sportschule
 
Cartaadimad21s
Cartaadimad21sCartaadimad21s
Cartaadimad21s
 
Horario de clases
Horario de clasesHorario de clases
Horario de clases
 
Mc donaldsinindia
Mc donaldsinindiaMc donaldsinindia
Mc donaldsinindia
 
La nube en informatica
La nube en informaticaLa nube en informatica
La nube en informatica
 
9 M-CARE: Dagelijkse huishoudelijke taken
9 M-CARE: Dagelijkse huishoudelijke taken9 M-CARE: Dagelijkse huishoudelijke taken
9 M-CARE: Dagelijkse huishoudelijke taken
 
Díptico Seminario Re-mirando: Yo educador y educadora en las Aulas de 2 años
Díptico Seminario Re-mirando: Yo educador y educadora en las Aulas de 2 añosDíptico Seminario Re-mirando: Yo educador y educadora en las Aulas de 2 años
Díptico Seminario Re-mirando: Yo educador y educadora en las Aulas de 2 años
 
Portfoliotagung - Workshop Wampfler - 2016
Portfoliotagung - Workshop Wampfler - 2016Portfoliotagung - Workshop Wampfler - 2016
Portfoliotagung - Workshop Wampfler - 2016
 
Díptico "Re-Encuentros en Educación Infantil"
Díptico "Re-Encuentros en Educación Infantil"Díptico "Re-Encuentros en Educación Infantil"
Díptico "Re-Encuentros en Educación Infantil"
 
Warum Social Media für Lehrkräfte 2016 Pflicht sind
Warum Social Media für Lehrkräfte 2016 Pflicht sindWarum Social Media für Lehrkräfte 2016 Pflicht sind
Warum Social Media für Lehrkräfte 2016 Pflicht sind
 
Deutsch ein Hit 1: Lektion 4: Wir machen eine Schülerzeitung
Deutsch ein Hit 1: Lektion 4: Wir machen eine SchülerzeitungDeutsch ein Hit 1: Lektion 4: Wir machen eine Schülerzeitung
Deutsch ein Hit 1: Lektion 4: Wir machen eine Schülerzeitung
 
Cyclassics 2013 pdf
Cyclassics 2013 pdfCyclassics 2013 pdf
Cyclassics 2013 pdf
 
10 28 session 34
10 28 session 3410 28 session 34
10 28 session 34
 
3.28 tag 19 - verwandlung 3
3.28   tag 19 - verwandlung 33.28   tag 19 - verwandlung 3
3.28 tag 19 - verwandlung 3
 

Similar to Copy-Right Protection with Wavelet Based Watermarking

Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image WatermarkingIJERA Editor
 
IRJET- Heuristic Approach for Low Light Image Enhancement using Deep Learning
IRJET- Heuristic Approach for Low Light Image Enhancement using Deep LearningIRJET- Heuristic Approach for Low Light Image Enhancement using Deep Learning
IRJET- Heuristic Approach for Low Light Image Enhancement using Deep LearningIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
priyankamainthesisppt.pptx
priyankamainthesisppt.pptxpriyankamainthesisppt.pptx
priyankamainthesisppt.pptxsaiproject
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...eSAT Publishing House
 
IRJET-Retina Image Decomposition using Variational Mode Decomposition
IRJET-Retina Image Decomposition using Variational Mode DecompositionIRJET-Retina Image Decomposition using Variational Mode Decomposition
IRJET-Retina Image Decomposition using Variational Mode DecompositionIRJET Journal
 
Despeckling of Sar Image using Curvelet Transform
 	  Despeckling of Sar Image using Curvelet Transform 	  Despeckling of Sar Image using Curvelet Transform
Despeckling of Sar Image using Curvelet TransformIRJET Journal
 
IRJET- A Review on Image Denoising & Dehazing Algorithm to Improve Dark Chann...
IRJET- A Review on Image Denoising & Dehazing Algorithm to Improve Dark Chann...IRJET- A Review on Image Denoising & Dehazing Algorithm to Improve Dark Chann...
IRJET- A Review on Image Denoising & Dehazing Algorithm to Improve Dark Chann...IRJET Journal
 
Adaptive denoising technique for colour images
Adaptive denoising technique for colour imagesAdaptive denoising technique for colour images
Adaptive denoising technique for colour imageseSAT Journals
 
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...IRJET Journal
 
IRJET - Change Detection in Satellite Images using Convolutional Neural N...
IRJET -  	  Change Detection in Satellite Images using Convolutional Neural N...IRJET -  	  Change Detection in Satellite Images using Convolutional Neural N...
IRJET - Change Detection in Satellite Images using Convolutional Neural N...IRJET Journal
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESijma
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESijma
 
High Speed and Area Efficient 2D DWT Processor Based Image Compression
High Speed and Area Efficient 2D DWT Processor Based Image CompressionHigh Speed and Area Efficient 2D DWT Processor Based Image Compression
High Speed and Area Efficient 2D DWT Processor Based Image Compressionsipij
 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital mediaijctet
 

Similar to Copy-Right Protection with Wavelet Based Watermarking (20)

Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image Watermarking
 
IRJET- Heuristic Approach for Low Light Image Enhancement using Deep Learning
IRJET- Heuristic Approach for Low Light Image Enhancement using Deep LearningIRJET- Heuristic Approach for Low Light Image Enhancement using Deep Learning
IRJET- Heuristic Approach for Low Light Image Enhancement using Deep Learning
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
priyankamainthesisppt.pptx
priyankamainthesisppt.pptxpriyankamainthesisppt.pptx
priyankamainthesisppt.pptx
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...
 
IRJET-Retina Image Decomposition using Variational Mode Decomposition
IRJET-Retina Image Decomposition using Variational Mode DecompositionIRJET-Retina Image Decomposition using Variational Mode Decomposition
IRJET-Retina Image Decomposition using Variational Mode Decomposition
 
Despeckling of Sar Image using Curvelet Transform
 	  Despeckling of Sar Image using Curvelet Transform 	  Despeckling of Sar Image using Curvelet Transform
Despeckling of Sar Image using Curvelet Transform
 
IRJET- A Review on Image Denoising & Dehazing Algorithm to Improve Dark Chann...
IRJET- A Review on Image Denoising & Dehazing Algorithm to Improve Dark Chann...IRJET- A Review on Image Denoising & Dehazing Algorithm to Improve Dark Chann...
IRJET- A Review on Image Denoising & Dehazing Algorithm to Improve Dark Chann...
 
G0523444
G0523444G0523444
G0523444
 
1674 1677
1674 16771674 1677
1674 1677
 
1674 1677
1674 16771674 1677
1674 1677
 
Adaptive denoising technique for colour images
Adaptive denoising technique for colour imagesAdaptive denoising technique for colour images
Adaptive denoising technique for colour images
 
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...
Fuzzy Forest Learning based Online Facial Biometric Verification for Privacy ...
 
IRJET - Change Detection in Satellite Images using Convolutional Neural N...
IRJET -  	  Change Detection in Satellite Images using Convolutional Neural N...IRJET -  	  Change Detection in Satellite Images using Convolutional Neural N...
IRJET - Change Detection in Satellite Images using Convolutional Neural N...
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
 
High Speed and Area Efficient 2D DWT Processor Based Image Compression
High Speed and Area Efficient 2D DWT Processor Based Image CompressionHigh Speed and Area Efficient 2D DWT Processor Based Image Compression
High Speed and Area Efficient 2D DWT Processor Based Image Compression
 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital media
 

Recently uploaded

5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 

Recently uploaded (20)

5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 

Copy-Right Protection with Wavelet Based Watermarking

  • 1. Copy-Right Protection with Wavelet Based Watermarking Adnan Özdemir
  • 2. Introduction In this project a watermarking method which is working on frequency domain was generated and implemented. In order to protect the copy-right laws, a unique QR code was inserted to the remote sensing images.
  • 3.
  • 4.
  • 6.
  • 7. The project has several targets: Generating watermarking algorithm with existing approaches, Generating a method which is resistant to resize, (Minimum 1/16 resizing) Successfully regenerating the data and image from watermarked image, Executing an efficient useful low time consuming program.
  • 8. Problems at Watermarking Methods Actually, watermarking is easy to implement any simple algorithm. Operation on pixel values at time domain allows to programmer inserting special key in a image. At that type of methods it is important to what type of destruction or corruption are exposed to image. In other words, if the pixels which consist watermarked values, are changed unpredictably the inverse transformation of image watermarking will not produce any meaningful results. For example, if the key values are located at small area of images, after deleting this area or corrupting this area will cause losing watermarking knowledge. In order to minimize the locality, the key informations can be inserted periodical. However, at this case, resizing operations on image will damage the watermark informations
  • 9. All the watermarking methods which are operated at time domain have weakness with process at time domain. Therefore, frequency domain watermarking operation are generated. Specially discrete time Fast Fourier Transformation discrete time and wavelet transformation are commonly used. Main idea is minimizing the losing information at image and generate a watermarked image which can resist most of the process at time domain. Due to do that approach, low frequency components are extracted and the the key components are located. This approach can resist to the resizing and most of local operations.
  • 10.
  • 11. Even using low frequency variables, the image loses details. Depending to image, this data losing causes destruction and low resolute images. In order to keep the image with high quality, low frequency bands should be selected wisely. The key values should effect the image minimum. At this case, wavelet methods shows themselves. If the image band processed with wavelet transformation with several times, lowest frequency elements will be separated. The key values are placed at this frequency bands. This approach is called as "Wavelet Tree Quantization".
  • 12.
  • 15. Landsat 8 • Each pixel is sampled by 16 bits. • OLI Spectral Bands • Spectral Band WavelengthResolution • Band 1 - Coastal / Aerosol 0.433 - 0.453 µm 30 m • Band 2 - Blue 0.450 - 0.515 µm 30 m • Band 3 - Green 0.525 - 0.600 µm 30 m • Band 4 - Red 0.630 - 0.680 µm 30 m • Band 5 - Near Infrared 0.845 - 0.885 µm 30 m • Band 6 - Short Wavelength Infrared 1.560 - 1.660 µm 30 m • Band 7 - Short Wavelength Infrared 2.100 - 2.300 µm 30 m • Band 8 - Panchromatic 0.500 - 0.680 µm 15 m • Band 9 - Cirrus 1.360 - 1.390 µm 30 m
  • 18.
  • 19. Marking Process PSNR = 128.2023 db
  • 21. Test
  • 22.
  • 23. Test
  • 24.
  • 26.
  • 27. • Kullanım Alanları Örnekleri Lig tv Spotify Netflix
  • 28. References [1] Ruanaidh, JJK Ó., W. J. Dowling, and F. M. Boland. "Watermarking digital images for copyright protection." IEE Proceedings-Vision, Image and Signal Processing 143.4 (1996): 250-256. [2] Wang, Shih-Hao, and Yuan-Pei Lin. "Wavelet tree quantization for copyright protection watermarking." Image Processing, IEEE Transactions on 13.2 (2004): 154-165. [3] Lin, Shinfeng D., and Chin-Feng Chen. "A robust DCT-based watermarking for copyright protection." Consumer Electronics, IEEE Transactions on 46.3 (2000): 415-421. [4] Iyer, Ms Aparna, et al. "IMAGE RETRIEVAL USING COLOUR AND TEXTURE ANALYSIS." IMAGE 2.5 (2013).

Editor's Notes

  1. Resmin değiştirlmesine karşı koruma Boyutunun değiştirilmesi Eklenen key in geri geri getirilebilmesi Algoritmanın kabul edilebilir bir sürede çalışması
  2. Bir dataya key eklememk kolay bir iş Pixelller üzerinde yapılacak bir değişiklik ile herhangi bir veri eklenebilir. Ör: TC kimlik no Resim üzerinde beklenilmeyen, yapılan bir değişiklik key in kaybedilmesine sebep olabilir. Ör: boyut, contrast, format(png, jpeg) Resmin bir bölgesi kaybolursa? Bu nedenle periodik olarak eklenmiş bir key olamsı daha uygun
  3. Zaman domain i yanı datanın üzerinde yapılacak direk işlemlerde zayıflıklar mevcut. Fourier ve Wavelet transform frekans domaini üzerinde işlem yapmaya olanak sağlıyor. Frekans domain i üzerinde yapılacak işlem daha dayanıklı bir koruma sağlıyor. Bu amaç doğrultusunda düşük frekans değerlerine key değerleri eklenir. Bu da çoğu işlemde bize koruma sağler. Ör: yeniden boyutlandırma, resmin üzerinin karalanması gibi
  4. Zaman domain i yanı datanın üzerinde yapılacak direk işlemlerde zayıflıklar mevcut. Fourier ve Wavelet transform frekans domaini üzerinde işlem yapmaya olanak sağlıyor. Frekans domain i üzerinde yapılacak işlem daha dayanıklı bir koruma sağlıyor. Bu amaç doğrultusunda düşük frekans değerlerine key değerleri eklenir. Bu da çoğu işlemde bize koruma sağlar. Ör: yeniden boyutlandırma, resmin üzerinin karalanması gibi
  5. Resim içerinde sürekli tekrarlanan ve resmin genel yapısını oluşruran kısım düşük frekans verisi olarak adlandırılır. Bu kısımlar ayrıntıları daha az içerir. Yüksek frekans verileri ise ayrıntıları içerdiği için resimin karakteristik ayrıntılarını tutar. Bu nedenle resimde veya herhangi datada değiştirilmsi önemsiz olan bir kısım seçilmeli LL .