SlideShare a Scribd company logo
1 of 32
SHARBANI BHATTACHARYA
Fuzzy Logic in
Watermarking System
Gyanodaya 2014
IEC-College of Engineering & Technology, Greater Noida
29th March 2014
WATERMARK AND NATURAL CALAMITY
The natural calamity and disaster
management are often predicted by pictures
taken from satellite from space shuttle.
Terrorist can tamper the image and can given
altogether different image which depicts
different view.
So, image is required to be watermarked
properly to be used for any kind of
judgement..
WATERMARKING
Watermarking is a method of authentication
of an image. It is used for copyright of the
digital contents.
Watermarki
ng text
Encrypte
d Text
Conve
rt to
byte
code
Byte
Code of
Digital
Image
Watermarked
Digital Image
Extracte
d Byte
Code
Covert
to Text
file
Decryptio
n
Algorithm
Watermarking
Text
ENCRYPTION
Cryptography is art of converting an
message into cipher text and sent to the
destination. The authorized person can
decipher the text and retrieve the original
message.
FUZZY LOGIC
It is logic developed by Loft Zadeh in 1965 at
University of California. It is the logic with
which unprecise data can be captured to
form a set.
FUZZIFICATION
Fuzzy set are acquired from Crisp Set using
membership function. This process is known
as fuzzification.
DEFUZZIFICATION
Converting Fuzzy set to Crisp set .
FUZZY SET & WATERMARKING SYSTEM
This fuzzy sets are then used to design the
front-end of the Watermarking System.
WATERMARKING CRITERIA
 Robustness
 Visual Quality
 Information Embedding Capacity
FUZZY SET WATERMARKING CRITERIA
 FRobustness is Fuzzy set for Robustness criteria
 FVisual Quality for Visual Quality
 FEmbedding Capacity Information Embedding
Capacity
Criteria for Watermarking
Factors affecting
Watermarking
Fuzzy Sets of Factors
Fuzzy Rule
Design of Front-End
CRITERIA FOR CHOICE
Front-end architecture of watermarking
system with criteria robustness.
FACTOR EFFECTING ROBUSTNESS
1. Visibile (Vis)
2. Invisible(NVis)
3. Blind(BL)
4. Non-Blind(NBL)
5. Medical Image(Mimg)
6. Non-Medical Image(Nimg)
7. Cryptography (Cryp)
8. Non-Crypotographic (Ncryp)
9. RSA Algo used(RSA)
10. DES Algo used (DES)
11. AES Algo used (AES)
12. New Algo used (Jnew)
13. Watermarking Method using Fuzzy logic(WMF)
14. Watermarking Method using Genetic Algorithm(WMGA)
15. Watermarking Method using Fuzzy-Genetic algo(WMFGA)
16. Fuzzy set for Robust Watermarking Scheme I
17. Fuzzy set for Semi Fragile Watermarking Scheme (SFr)
18. Fuzzy set for Fragile Watermarking Scheme (Fr)
19. Fuzzy set for Watermarking Method(WM)
20. Fuzzy set for Robustness (FRobustness)
STEPS FOR WATERMARKING SYSTEM
DESIGN
 Taking all the factors on which robustness of
watermarking scheme depends as crisp set.
 This crisp set is converted to fuzzy sets.
 This fuzzy sets are then used to design the
front-end of the Watermarking System.
 Converting crisp set to fuzzy set is called
fuzzification.
 These, fuzzy set elements are then put to their
respective places and positions in the user-
friendly front-end according to their membership
functions.
FUZZY SETS OF WATERMARKING
SYSTEM
 We are defining the following fuzzy sets.
FRobustness =[ (R,0.8), (Fr, 0.2), (SFr,0.4)]
 WM =[ (WMF, 0.5) , (WMGA, 0.4),( WMFGA,0.8)]
 FCryp = [ (RSA,0.8) , (DES,0.6),(AES,0.4),
(Jnew,0.2)]

 Fr=[ (Vis,0.8) , (BL,0.9), (Ncryp,0.9)]
 SFr=[ (Vis,0.4),(BL,0.6), (Cryp,0.6)]
 R=[(NBL,0.8) , (Cryp,0.8) ,(Nvis,0.9) ,(WM,0.4)]
ROBUSTNESS
FRobustness.This opens a Frame having three
tabs
 Robust
 Semi Fragile
 Fragile.
ROBUST TAB HAS
1. Invisibility
2.Cryptography
3.Non-Blind
4.Watermarking method i.e.
-Fuzzy or GA or Fuzzy-Genetic etc.
FRONT-END ARCHITECTURE
Using fuzzy sets in front-end architecture can
give more user-friendly interface. The user
can see the values of each factors in
percentage. This is defuzzification of fuzzy
set into crisp set.
FRONT-END ARCHITECTURE
The architecture is designed on the fuzzy
rules and user can understand the impact of
the changes with its effects of factors in
percentage given in the text box below a
drop down box.
CONCLUSION
The above method is applicable to all kind of
software architecture. As the complexity
increases the fuzzy rules can make design
easier.
BENEFIT
The benefit is it makes more user friendly
front-end.
DRAWBACKS
Drawback is if membership function is not
properly judged it can be cumbersome. User
can be dismayed by its complicacy.
REFERENCES
 [1] Lecture Notes on Cryptography Shafi Goldwasser1 Mihir Bellare2, July 2008
 [2]Answare, ETIK, ELTE Jedlik Ányos Program RFID research project “Cryptographic Techniques for Physical Security” (Seminar Notes)
Author: Daniel A. Nagy ELTECRYPT Research Group Supported by the National Office for Research and Technology (NKTH) in the
framework of Jedlik Ányos Program with number of tender NKFP2-00027/2005.
 [3] Whitefiled Diffie and Martin E. Hellman,“Multiuser Cryptographic Techniques*” ,Stanford University Stanford, California
 [4] Alina Mihaela Oprea ,“Efficient Cryptographic Techniques for Securing Storage Systems” CMU-CS-07-119April 2007, PhD thesis,
School of Computer Science Carnegie Mellon University ,Pittsburgh, PA 15213.
 [5] Kenneth W. Dam and Herbert S. Lin “Cryptography's Role in Securing the Information Society”, Editors, Committee to Study National
Cryptography Policy, National Research Council.
 [6] Public-Key Cryptography Theory and Practice, PhD thesis of Darmstadt.
 [7] Glenn Durfee, PhD thesis “Cryptanalysis Of RSA Using Algebraic And Lattice Methods”, June 2002, Stanford University.
 [8] Sharbani Bhattacharya , “Data Security :Issue in Cloud Computing for e-Learning” , Published in University School of Management
Studies ,Guru Govind Singh Indraprastha University in National Conference on Information Management 20th March 2010 on.
Conference proceedings & Book in “ Information Management in Knowledge Economy” named “ by MacMillan Publishers Page 165.
 [9] Xinyuan Wang, “Robust Correlation of Encrypted Attack Traffic Through Stepping Stones By Watermarking The Interpacket Timing”,
Dept. of Computer Science, North Carolina State University Raleigh, NC 27695ACM No. 3543246 Douglas S. Reeves (Advisor) Dept. of
Computer Science ,North Carolina State University,Raleigh, NC 27695
 [10] J. C. Kelkboom, Jeroen Breebaart, Member, Ileana Buhan, and Raymond N. J.Veldhuis “ Maximum Key Size and Classification
Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources” IEEE Transaction On Information Forensic and Security,
Vol. 7, No. 4, August 2012 Page No. 122Emile
 [11] Harvey Cohn , “Advanced Number Theory”, ,Distinguished Professor, City University New York.
 [12]Rethinking Public Key Infrastructures and Digital Certificates, Rethinking Public Key Infrastructures and Digital Certificates, MIT
Press
 [13] A. Menezes, P. van Oorschot, and S. Vanstone, “Handbook of Applied Cryptography”, CRC Press, 1996.
 [14]Lecture Notes on Advanced Cryptography, MIT
 [15] William Duke Yuri Tschinkel ,Editors , “Clay Mathematics Institute A Tribute to Gauss and Dirichlet” ,Clay Mathematics
Proceedings,Volume 7 American Mathematical Society.
 [16]Elementary Number Theory: Primes, Congruences, and Secrets William Stein November 16, 2011
 [17]An Introduction to Cryptography, Copyright © 1990-1999 Network Associates, Inc. and its Affiliated Companies.
 [18] Benny Pinkas, “Cryptographic techniques for privacy preserving data mining”, HP Labs ,benny.pinkas@hp.com
 [19] W. Edwin Clark , Elementary Number Theory A revision by Jim Hefferon, St Michael’s College, 2003-Dec of notes, University of
South Florida, 2002-Dec.
 [20]Classical Encryption Techniques Lecture Notes on “Computer and Network Security”
 by Avi Kak (kak@purdue.edu)January 19, 2012 Avinash Kak, Purdue University.
 [21] Discrete Mathematics, Lecture Notes, Yale University, Spring 1999 ,L. Lov´asz and K. Vesztergombi
 [22]Number Theory ,Naoki Sato sato@artofproblemsolving.com
 [23] Sharbani Bhattacharya , “Additive Watermarking in Optimized Digital Image in IEEE Beacon,IEEE (Delhi Section) publication in
March 2012 Volume 31 No.1 ,page 79 www.ieeebeacon.com.
Thankyou

More Related Content

What's hot

IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET Journal
 
Image encryption
Image encryptionImage encryption
Image encryptionrakshit2105
 
Image Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine LearningImage Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine Learningijtsrd
 
A survey on deep learning based approaches for action and gesture recognition...
A survey on deep learning based approaches for action and gesture recognition...A survey on deep learning based approaches for action and gesture recognition...
A survey on deep learning based approaches for action and gesture recognition...Danbi Cho
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit GoelMohit Goel
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportMohit Kumar
 
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...IOSR Journals
 
Interpretability of Convolutional Neural Networks - Xavier Giro - UPC Barcelo...
Interpretability of Convolutional Neural Networks - Xavier Giro - UPC Barcelo...Interpretability of Convolutional Neural Networks - Xavier Giro - UPC Barcelo...
Interpretability of Convolutional Neural Networks - Xavier Giro - UPC Barcelo...Universitat Politècnica de Catalunya
 
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and  secret map techniques Image steganography using least significant bit and  secret map techniques
Image steganography using least significant bit and secret map techniques IJECEIAES
 
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATDATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATalphin jose
 
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...IJERA Editor
 
Attention boosted deep networks for video classification
Attention boosted deep networks for video classificationAttention boosted deep networks for video classification
Attention boosted deep networks for video classificationDanbi Cho
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Publishing House
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Journals
 
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...TELKOMNIKA JOURNAL
 

What's hot (20)

Multimodal Deep Learning
Multimodal Deep LearningMultimodal Deep Learning
Multimodal Deep Learning
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
Image encryption
Image encryptionImage encryption
Image encryption
 
Image Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine LearningImage Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine Learning
 
Deep Learning Representations for All (a.ka. the AI hype)
Deep Learning Representations for All (a.ka. the AI hype)Deep Learning Representations for All (a.ka. the AI hype)
Deep Learning Representations for All (a.ka. the AI hype)
 
A survey on deep learning based approaches for action and gesture recognition...
A survey on deep learning based approaches for action and gesture recognition...A survey on deep learning based approaches for action and gesture recognition...
A survey on deep learning based approaches for action and gesture recognition...
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit Goel
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training Report
 
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...
 
Interpretability of Convolutional Neural Networks - Xavier Giro - UPC Barcelo...
Interpretability of Convolutional Neural Networks - Xavier Giro - UPC Barcelo...Interpretability of Convolutional Neural Networks - Xavier Giro - UPC Barcelo...
Interpretability of Convolutional Neural Networks - Xavier Giro - UPC Barcelo...
 
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and  secret map techniques Image steganography using least significant bit and  secret map techniques
Image steganography using least significant bit and secret map techniques
 
CI image processing
CI image processing CI image processing
CI image processing
 
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATDATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
 
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
 
Attention boosted deep networks for video classification
Attention boosted deep networks for video classificationAttention boosted deep networks for video classification
Attention boosted deep networks for video classification
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Bi34381384
Bi34381384Bi34381384
Bi34381384
 
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
 

Similar to Sharbani bhattacharya gyanodya 2014

IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWIMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWijcsit
 
Image Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A ReviewImage Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A ReviewAIRCC Publishing Corporation
 
Image Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A ReviewImage Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A ReviewAIRCC Publishing Corporation
 
IRJET- Identification of Missing Person in the Crowd using Pretrained Neu...
IRJET-  	  Identification of Missing Person in the Crowd using Pretrained Neu...IRJET-  	  Identification of Missing Person in the Crowd using Pretrained Neu...
IRJET- Identification of Missing Person in the Crowd using Pretrained Neu...IRJET Journal
 
September 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image ProcessingSeptember 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
August 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image ProcessingAugust 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
October 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image ProcessingOctober 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
April 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processingsipij
 
January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing	January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing sipij
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNCJournal
 
May 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image ProcessingMay 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image Processingsipij
 
June 2022: Top 10 Read Articles in Signal & Image Processing
June 2022: Top 10 Read Articles in Signal & Image   ProcessingJune 2022: Top 10 Read Articles in Signal & Image   Processing
June 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...AIRCC Publishing Corporation
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...ijcsit
 
July 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
Top downloaded article in academia 2020 - International Journal of Informatio...
Top downloaded article in academia 2020 - International Journal of Informatio...Top downloaded article in academia 2020 - International Journal of Informatio...
Top downloaded article in academia 2020 - International Journal of Informatio...Zac Darcy
 
April 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image ProcessingApril 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image Processingsipij
 
October 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsOctober 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
DEF CON 27 - BRENT STONE - reverse enginerring 17 cars
DEF CON 27 - BRENT STONE - reverse enginerring 17 carsDEF CON 27 - BRENT STONE - reverse enginerring 17 cars
DEF CON 27 - BRENT STONE - reverse enginerring 17 carsFelipe Prado
 

Similar to Sharbani bhattacharya gyanodya 2014 (20)

IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWIMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
 
Image Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A ReviewImage Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A Review
 
Image Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A ReviewImage Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A Review
 
IRJET- Identification of Missing Person in the Crowd using Pretrained Neu...
IRJET-  	  Identification of Missing Person in the Crowd using Pretrained Neu...IRJET-  	  Identification of Missing Person in the Crowd using Pretrained Neu...
IRJET- Identification of Missing Person in the Crowd using Pretrained Neu...
 
September 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image ProcessingSeptember 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image Processing
 
August 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image ProcessingAugust 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image Processing
 
October 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image ProcessingOctober 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image Processing
 
April 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processing
 
January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing	January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!
 
May 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image ProcessingMay 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image Processing
 
June 2022: Top 10 Read Articles in Signal & Image Processing
June 2022: Top 10 Read Articles in Signal & Image   ProcessingJune 2022: Top 10 Read Articles in Signal & Image   Processing
June 2022: Top 10 Read Articles in Signal & Image Processing
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
 
July 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processing
 
Top downloaded article in academia 2020 - International Journal of Informatio...
Top downloaded article in academia 2020 - International Journal of Informatio...Top downloaded article in academia 2020 - International Journal of Informatio...
Top downloaded article in academia 2020 - International Journal of Informatio...
 
April 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image ProcessingApril 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image Processing
 
October 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsOctober 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its Applications
 
Ransomware
RansomwareRansomware
Ransomware
 
DEF CON 27 - BRENT STONE - reverse enginerring 17 cars
DEF CON 27 - BRENT STONE - reverse enginerring 17 carsDEF CON 27 - BRENT STONE - reverse enginerring 17 cars
DEF CON 27 - BRENT STONE - reverse enginerring 17 cars
 

More from Sharbani Bhattacharya

Biometric authentication green apple computer learning
Biometric authentication green apple computer learningBiometric authentication green apple computer learning
Biometric authentication green apple computer learningSharbani Bhattacharya
 
Sharbani Bhattacharya SE design & Implementation
Sharbani Bhattacharya SE design & ImplementationSharbani Bhattacharya SE design & Implementation
Sharbani Bhattacharya SE design & ImplementationSharbani Bhattacharya
 
Requirement Analysis & Specification sharbani bhattacharya
Requirement Analysis & Specification sharbani bhattacharyaRequirement Analysis & Specification sharbani bhattacharya
Requirement Analysis & Specification sharbani bhattacharyaSharbani Bhattacharya
 
Sharbani bhattacharya Visual Basic User Interface-ii
Sharbani bhattacharya  Visual Basic User Interface-iiSharbani bhattacharya  Visual Basic User Interface-ii
Sharbani bhattacharya Visual Basic User Interface-iiSharbani Bhattacharya
 
Sharbani Bhattacharya VB User Interface1
Sharbani Bhattacharya VB User Interface1Sharbani Bhattacharya VB User Interface1
Sharbani Bhattacharya VB User Interface1Sharbani Bhattacharya
 
Software Metrics & Measurement-Sharbani Bhattacharya
Software Metrics & Measurement-Sharbani BhattacharyaSoftware Metrics & Measurement-Sharbani Bhattacharya
Software Metrics & Measurement-Sharbani BhattacharyaSharbani Bhattacharya
 
SE Introduction sharbani bhattacharya
SE Introduction sharbani bhattacharyaSE Introduction sharbani bhattacharya
SE Introduction sharbani bhattacharyaSharbani Bhattacharya
 
Sharbani bhattacharya Macromedia-flash
Sharbani bhattacharya Macromedia-flashSharbani bhattacharya Macromedia-flash
Sharbani bhattacharya Macromedia-flashSharbani Bhattacharya
 

More from Sharbani Bhattacharya (20)

Biometric authentication green apple computer learning
Biometric authentication green apple computer learningBiometric authentication green apple computer learning
Biometric authentication green apple computer learning
 
Javascript
JavascriptJavascript
Javascript
 
PHP programmimg
PHP programmimgPHP programmimg
PHP programmimg
 
Sharbani Bhattacharya SE design & Implementation
Sharbani Bhattacharya SE design & ImplementationSharbani Bhattacharya SE design & Implementation
Sharbani Bhattacharya SE design & Implementation
 
Visual Basic –User Interface- V
Visual Basic –User Interface- VVisual Basic –User Interface- V
Visual Basic –User Interface- V
 
Visual Basic User Interface-VI
Visual Basic User Interface-VIVisual Basic User Interface-VI
Visual Basic User Interface-VI
 
Microsoft Front Page
Microsoft Front PageMicrosoft Front Page
Microsoft Front Page
 
Visual Basic User Interface-III
Visual Basic User Interface-IIIVisual Basic User Interface-III
Visual Basic User Interface-III
 
Visual Basic User Interface -IV
Visual Basic User Interface -IVVisual Basic User Interface -IV
Visual Basic User Interface -IV
 
Requirement Analysis & Specification sharbani bhattacharya
Requirement Analysis & Specification sharbani bhattacharyaRequirement Analysis & Specification sharbani bhattacharya
Requirement Analysis & Specification sharbani bhattacharya
 
Estimation sharbani bhattacharya
Estimation sharbani bhattacharyaEstimation sharbani bhattacharya
Estimation sharbani bhattacharya
 
Sharbani bhattacharya Visual Basic User Interface-ii
Sharbani bhattacharya  Visual Basic User Interface-iiSharbani bhattacharya  Visual Basic User Interface-ii
Sharbani bhattacharya Visual Basic User Interface-ii
 
Sharbani Bhattacharya VB User Interface1
Sharbani Bhattacharya VB User Interface1Sharbani Bhattacharya VB User Interface1
Sharbani Bhattacharya VB User Interface1
 
Sharbani bhattacharya VB Structures
Sharbani bhattacharya VB StructuresSharbani bhattacharya VB Structures
Sharbani bhattacharya VB Structures
 
Software Metrics & Measurement-Sharbani Bhattacharya
Software Metrics & Measurement-Sharbani BhattacharyaSoftware Metrics & Measurement-Sharbani Bhattacharya
Software Metrics & Measurement-Sharbani Bhattacharya
 
Slcm sharbani bhattacharya
Slcm sharbani bhattacharyaSlcm sharbani bhattacharya
Slcm sharbani bhattacharya
 
SE Introduction sharbani bhattacharya
SE Introduction sharbani bhattacharyaSE Introduction sharbani bhattacharya
SE Introduction sharbani bhattacharya
 
Sharbani bhattacharya Macromedia-flash
Sharbani bhattacharya Macromedia-flashSharbani bhattacharya Macromedia-flash
Sharbani bhattacharya Macromedia-flash
 
Sharbani bhattacharya Visual Basic
Sharbani bhattacharya Visual BasicSharbani bhattacharya Visual Basic
Sharbani bhattacharya Visual Basic
 
Sharbani bhattacharya sacta 2014
Sharbani bhattacharya sacta 2014Sharbani bhattacharya sacta 2014
Sharbani bhattacharya sacta 2014
 

Recently uploaded

(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 

Recently uploaded (20)

(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 

Sharbani bhattacharya gyanodya 2014

  • 1. SHARBANI BHATTACHARYA Fuzzy Logic in Watermarking System Gyanodaya 2014 IEC-College of Engineering & Technology, Greater Noida 29th March 2014
  • 2. WATERMARK AND NATURAL CALAMITY The natural calamity and disaster management are often predicted by pictures taken from satellite from space shuttle. Terrorist can tamper the image and can given altogether different image which depicts different view. So, image is required to be watermarked properly to be used for any kind of judgement..
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. WATERMARKING Watermarking is a method of authentication of an image. It is used for copyright of the digital contents.
  • 10. Watermarki ng text Encrypte d Text Conve rt to byte code Byte Code of Digital Image Watermarked Digital Image Extracte d Byte Code Covert to Text file Decryptio n Algorithm Watermarking Text
  • 11. ENCRYPTION Cryptography is art of converting an message into cipher text and sent to the destination. The authorized person can decipher the text and retrieve the original message.
  • 12. FUZZY LOGIC It is logic developed by Loft Zadeh in 1965 at University of California. It is the logic with which unprecise data can be captured to form a set.
  • 13. FUZZIFICATION Fuzzy set are acquired from Crisp Set using membership function. This process is known as fuzzification.
  • 15. FUZZY SET & WATERMARKING SYSTEM This fuzzy sets are then used to design the front-end of the Watermarking System.
  • 16. WATERMARKING CRITERIA  Robustness  Visual Quality  Information Embedding Capacity
  • 17. FUZZY SET WATERMARKING CRITERIA  FRobustness is Fuzzy set for Robustness criteria  FVisual Quality for Visual Quality  FEmbedding Capacity Information Embedding Capacity
  • 18. Criteria for Watermarking Factors affecting Watermarking Fuzzy Sets of Factors Fuzzy Rule Design of Front-End
  • 19. CRITERIA FOR CHOICE Front-end architecture of watermarking system with criteria robustness.
  • 20. FACTOR EFFECTING ROBUSTNESS 1. Visibile (Vis) 2. Invisible(NVis) 3. Blind(BL) 4. Non-Blind(NBL) 5. Medical Image(Mimg) 6. Non-Medical Image(Nimg) 7. Cryptography (Cryp) 8. Non-Crypotographic (Ncryp) 9. RSA Algo used(RSA) 10. DES Algo used (DES) 11. AES Algo used (AES) 12. New Algo used (Jnew) 13. Watermarking Method using Fuzzy logic(WMF) 14. Watermarking Method using Genetic Algorithm(WMGA) 15. Watermarking Method using Fuzzy-Genetic algo(WMFGA) 16. Fuzzy set for Robust Watermarking Scheme I 17. Fuzzy set for Semi Fragile Watermarking Scheme (SFr) 18. Fuzzy set for Fragile Watermarking Scheme (Fr) 19. Fuzzy set for Watermarking Method(WM) 20. Fuzzy set for Robustness (FRobustness)
  • 21. STEPS FOR WATERMARKING SYSTEM DESIGN  Taking all the factors on which robustness of watermarking scheme depends as crisp set.  This crisp set is converted to fuzzy sets.  This fuzzy sets are then used to design the front-end of the Watermarking System.  Converting crisp set to fuzzy set is called fuzzification.  These, fuzzy set elements are then put to their respective places and positions in the user- friendly front-end according to their membership functions.
  • 22. FUZZY SETS OF WATERMARKING SYSTEM  We are defining the following fuzzy sets. FRobustness =[ (R,0.8), (Fr, 0.2), (SFr,0.4)]  WM =[ (WMF, 0.5) , (WMGA, 0.4),( WMFGA,0.8)]  FCryp = [ (RSA,0.8) , (DES,0.6),(AES,0.4), (Jnew,0.2)]   Fr=[ (Vis,0.8) , (BL,0.9), (Ncryp,0.9)]  SFr=[ (Vis,0.4),(BL,0.6), (Cryp,0.6)]  R=[(NBL,0.8) , (Cryp,0.8) ,(Nvis,0.9) ,(WM,0.4)]
  • 23. ROBUSTNESS FRobustness.This opens a Frame having three tabs  Robust  Semi Fragile  Fragile.
  • 24. ROBUST TAB HAS 1. Invisibility 2.Cryptography 3.Non-Blind 4.Watermarking method i.e. -Fuzzy or GA or Fuzzy-Genetic etc.
  • 25.
  • 26. FRONT-END ARCHITECTURE Using fuzzy sets in front-end architecture can give more user-friendly interface. The user can see the values of each factors in percentage. This is defuzzification of fuzzy set into crisp set.
  • 27. FRONT-END ARCHITECTURE The architecture is designed on the fuzzy rules and user can understand the impact of the changes with its effects of factors in percentage given in the text box below a drop down box.
  • 28. CONCLUSION The above method is applicable to all kind of software architecture. As the complexity increases the fuzzy rules can make design easier.
  • 29. BENEFIT The benefit is it makes more user friendly front-end.
  • 30. DRAWBACKS Drawback is if membership function is not properly judged it can be cumbersome. User can be dismayed by its complicacy.
  • 31. REFERENCES  [1] Lecture Notes on Cryptography Shafi Goldwasser1 Mihir Bellare2, July 2008  [2]Answare, ETIK, ELTE Jedlik Ányos Program RFID research project “Cryptographic Techniques for Physical Security” (Seminar Notes) Author: Daniel A. Nagy ELTECRYPT Research Group Supported by the National Office for Research and Technology (NKTH) in the framework of Jedlik Ányos Program with number of tender NKFP2-00027/2005.  [3] Whitefiled Diffie and Martin E. Hellman,“Multiuser Cryptographic Techniques*” ,Stanford University Stanford, California  [4] Alina Mihaela Oprea ,“Efficient Cryptographic Techniques for Securing Storage Systems” CMU-CS-07-119April 2007, PhD thesis, School of Computer Science Carnegie Mellon University ,Pittsburgh, PA 15213.  [5] Kenneth W. Dam and Herbert S. Lin “Cryptography's Role in Securing the Information Society”, Editors, Committee to Study National Cryptography Policy, National Research Council.  [6] Public-Key Cryptography Theory and Practice, PhD thesis of Darmstadt.  [7] Glenn Durfee, PhD thesis “Cryptanalysis Of RSA Using Algebraic And Lattice Methods”, June 2002, Stanford University.  [8] Sharbani Bhattacharya , “Data Security :Issue in Cloud Computing for e-Learning” , Published in University School of Management Studies ,Guru Govind Singh Indraprastha University in National Conference on Information Management 20th March 2010 on. Conference proceedings & Book in “ Information Management in Knowledge Economy” named “ by MacMillan Publishers Page 165.  [9] Xinyuan Wang, “Robust Correlation of Encrypted Attack Traffic Through Stepping Stones By Watermarking The Interpacket Timing”, Dept. of Computer Science, North Carolina State University Raleigh, NC 27695ACM No. 3543246 Douglas S. Reeves (Advisor) Dept. of Computer Science ,North Carolina State University,Raleigh, NC 27695  [10] J. C. Kelkboom, Jeroen Breebaart, Member, Ileana Buhan, and Raymond N. J.Veldhuis “ Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources” IEEE Transaction On Information Forensic and Security, Vol. 7, No. 4, August 2012 Page No. 122Emile  [11] Harvey Cohn , “Advanced Number Theory”, ,Distinguished Professor, City University New York.  [12]Rethinking Public Key Infrastructures and Digital Certificates, Rethinking Public Key Infrastructures and Digital Certificates, MIT Press  [13] A. Menezes, P. van Oorschot, and S. Vanstone, “Handbook of Applied Cryptography”, CRC Press, 1996.  [14]Lecture Notes on Advanced Cryptography, MIT  [15] William Duke Yuri Tschinkel ,Editors , “Clay Mathematics Institute A Tribute to Gauss and Dirichlet” ,Clay Mathematics Proceedings,Volume 7 American Mathematical Society.  [16]Elementary Number Theory: Primes, Congruences, and Secrets William Stein November 16, 2011  [17]An Introduction to Cryptography, Copyright © 1990-1999 Network Associates, Inc. and its Affiliated Companies.  [18] Benny Pinkas, “Cryptographic techniques for privacy preserving data mining”, HP Labs ,benny.pinkas@hp.com  [19] W. Edwin Clark , Elementary Number Theory A revision by Jim Hefferon, St Michael’s College, 2003-Dec of notes, University of South Florida, 2002-Dec.  [20]Classical Encryption Techniques Lecture Notes on “Computer and Network Security”  by Avi Kak (kak@purdue.edu)January 19, 2012 Avinash Kak, Purdue University.  [21] Discrete Mathematics, Lecture Notes, Yale University, Spring 1999 ,L. Lov´asz and K. Vesztergombi  [22]Number Theory ,Naoki Sato sato@artofproblemsolving.com  [23] Sharbani Bhattacharya , “Additive Watermarking in Optimized Digital Image in IEEE Beacon,IEEE (Delhi Section) publication in March 2012 Volume 31 No.1 ,page 79 www.ieeebeacon.com.