SlideShare a Scribd company logo
1 of 20
DESIGNING AN LTE CHANNEL FOR
DATA TRANSMISSION
Proposal of final project EE571
Presented by – Mohammed Aljnoobi & Mohammed
Siddiqui
Agenda
 Introduction
 LTE technology overview.
 Sending image over the LTE simulated channel.
 (SVD) watermarking overview.
 What is digital watermarking?
 Features of watermarking
 What is SVD?
 Using channel for an embedded watermarked imaqe.
Introduction
 We will investigate 2-D
image processing by
sending an image over
a channel.
 And we will observe
how watermarked
image is effected when
passed through this
channel.
LTE
 LTE (Long Term Evolution) has flexible and expandable
spectrum bandwidth
 Simplified network architecture
 Time-frequency scheduling on shared-channel
 Support for multi-antenna scheme
 High data throughput
 Self-Organizing Network
Simulation
steps
 Sending the image:
 Choose any image.
 Choosing the type of channel (AWGN or Rayleigh distribution).
 Add modulation technique (QAM).
 Apply OFDM .
 Add Cyclic prefix.
 Receiving the image:
 Removing cyclic prefix.
 Demultiplexer (Filter).
 Demodulator.
 Receive the data.
OFDM
• Orthogonal Frequency-
Division
Multiplexing (OFDM) is a
method of encoding digital
data on multiple carrier
frequencies.
• Total bandwidth is divided
into smaller non-
overlapping frequency sub-
bands.
• Used in cable television
and satellite
communications.
Cyclic
prefix
• Cyclic prefix refers to the prefixing of a
symbol with a repetition of the end.
• Guard time between adjacent symbols is
inserted to eliminate ISI.
• Inserted to preserve orthogonality.
• Increases required transmission
bandwidth, hence lowers spectral
efficiency.
• Cyclic Prefixes are used in OFDM in order
to combat multipath by making channel
estimation easy.
Digital Watermarking
 Allows users to embed SPECIAL PATTERN or SOME DATA into digital
contents without changing its perceptual quality.
 When data is embedded, it is not written at HEADER PART but embedded
directly into digital media itself by changing media contents data.
 Watermarking is a key process for the PROTECTION of copyright ownership
of electronic data.
Classification Of WATERMARK
• According to Human Perception
 Invisible
 Visible
• According to types of Document
 Text
 Image
 Audio
 Video
• According to Robustness
 Fragile
 Semi fragile
 Robust
Features of Watermarking
 Invisible/Inaudible
 Information is embedded without digital content degradation, because of the level of
embedding operation is too small for human to notice the change.
 Inseparable
 The embedded information can survive after some processing, compression and format
transformation.
 Unchanging data file size
 Data size of the media is not changed before and after embedding operation because
information is embedded directly into the media.
Purpose of Watermarking
 Copyright Protection
 Fingerprinting
 Copy Protection
 Broadcasting Monitoring
 Data Authentication
SVD(Singular Value Decomposition)
 SVD for any image say A of size m*m is a factorization of the
form given by ,A = UΣV∗ Where U and V are orthogonal matrices
in which columns of U are left singular vectors and columns of V
are right singular vectors of image A.
 Suppose M is a m*n matrix whose entries come from the field K,
which is either the field of real numbers or the field of complex
number. Then there exists a factorization of the form
 where U is an m × m unary matrix over K (orthogonal matrix if K
= R), Σ is a m × n diagonal matrix with non-negative real numbers
on the diagonal, and the n × n unitary matrix V∗ denotes the
conjugate transpose of the n × n unitary matrix V. Such a
factorization is called a singular value decomposition of M
Embedding and extracting technique of
SVD
How To overcome the problems of SVD
 Measuring of performance of SVD should be easy.
 SVD should become fast from computational point of view .
 To find the technique to calculate the SVD easily.
 Less calculations should be made to measure the performance of SVD
 SVD characteristics which are not utilized in image processing should be utilized by finding the
techniques to utilize the unused SVD characteristics in image processing such as image capacity for
hiding information, roughness measure etc.
Result and analysis
Original image
The image after the
channel
• As shown in the image the received image there are some error which should be
corrected by error correction some techniques based on the channel specification.
Watermarking results
Watermarking results
Watermarked image
Watermarked image after a channel of
(ADWGN) & QAM
Extracted watermark
Extracted water mark without effect
of the channel Extracted water mark with channel effect
Comments about the Results
 The quality of extracted image has changed slightly from the
original watermark image, but still it has very good which
means that, the used SVD system works rightly.
 It is clear from the last image that the applied communication
has affected our watermarking system, but still we can
recognize the image the a lot of details. Thus, image
enhancement techniques and an error correction algorithm are
needed to improve the result of the watermarking system in this
case.
 And in the case of the image over LTE channel we observed
the image there are some error which should be corrected by
Conclusions
 The coding and error correction algorithms are very important
to increase the performance of any communication systems.
 The watermarking system used over communication channel
should should be robust to be able to extract that image.
 The image sent over a channel may contain errors at the
receiver end which can be corrected using error correcting
techniques.

More Related Content

What's hot

“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...
“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...
“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...Edge AI and Vision Alliance
 
Iaetsd chaos cdsk communication system
Iaetsd chaos cdsk communication systemIaetsd chaos cdsk communication system
Iaetsd chaos cdsk communication systemIaetsd Iaetsd
 
A quick illustration of jpeg 2000
A quick illustration of jpeg 2000A quick illustration of jpeg 2000
A quick illustration of jpeg 2000Data Fok
 
Machine Learning (ML) in Wireless Sensor Networks (WSNs)
Machine Learning (ML) in Wireless Sensor Networks (WSNs)Machine Learning (ML) in Wireless Sensor Networks (WSNs)
Machine Learning (ML) in Wireless Sensor Networks (WSNs)mabualsh
 
Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...IJECEIAES
 
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA)
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA) LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA)
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA) cscpconf
 
Legendre transform based color image authentication (ltcia)
Legendre transform based color image authentication (ltcia)Legendre transform based color image authentication (ltcia)
Legendre transform based color image authentication (ltcia)csandit
 
Simulation of Wireless Communication Systems
Simulation of Wireless Communication SystemsSimulation of Wireless Communication Systems
Simulation of Wireless Communication SystemsBernd-Peter Paris
 
Review On Different Feature Extraction Algorithms
Review On Different Feature Extraction AlgorithmsReview On Different Feature Extraction Algorithms
Review On Different Feature Extraction AlgorithmsIRJET Journal
 
Hybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaHybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaIAEME Publication
 
Comparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression TechniquesComparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression Techniquessipij
 
“FIELD PROGRAMMABLE DSP ARRAYS” - A NOVEL RECONFIGURABLE ARCHITECTURE FOR EFF...
“FIELD PROGRAMMABLE DSP ARRAYS” - A NOVEL RECONFIGURABLE ARCHITECTURE FOR EFF...“FIELD PROGRAMMABLE DSP ARRAYS” - A NOVEL RECONFIGURABLE ARCHITECTURE FOR EFF...
“FIELD PROGRAMMABLE DSP ARRAYS” - A NOVEL RECONFIGURABLE ARCHITECTURE FOR EFF...sipij
 
Applications of machine learning in Wireless sensor networks.
Applications of machine learning in Wireless sensor networks.Applications of machine learning in Wireless sensor networks.
Applications of machine learning in Wireless sensor networks.Sahana B S
 
Copy of colloquium 3 latest
Copy of  colloquium 3 latestCopy of  colloquium 3 latest
Copy of colloquium 3 latestshaik fairooz
 
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...ijiert bestjournal
 
A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...
A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...
A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...VLSICS Design
 

What's hot (19)

“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...
“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...
“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...
 
Iaetsd chaos cdsk communication system
Iaetsd chaos cdsk communication systemIaetsd chaos cdsk communication system
Iaetsd chaos cdsk communication system
 
A quick illustration of jpeg 2000
A quick illustration of jpeg 2000A quick illustration of jpeg 2000
A quick illustration of jpeg 2000
 
Resume_Naveena1
Resume_Naveena1Resume_Naveena1
Resume_Naveena1
 
Machine Learning (ML) in Wireless Sensor Networks (WSNs)
Machine Learning (ML) in Wireless Sensor Networks (WSNs)Machine Learning (ML) in Wireless Sensor Networks (WSNs)
Machine Learning (ML) in Wireless Sensor Networks (WSNs)
 
Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...
 
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA)
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA) LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA)
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA)
 
Legendre transform based color image authentication (ltcia)
Legendre transform based color image authentication (ltcia)Legendre transform based color image authentication (ltcia)
Legendre transform based color image authentication (ltcia)
 
Simulation of Wireless Communication Systems
Simulation of Wireless Communication SystemsSimulation of Wireless Communication Systems
Simulation of Wireless Communication Systems
 
Review On Different Feature Extraction Algorithms
Review On Different Feature Extraction AlgorithmsReview On Different Feature Extraction Algorithms
Review On Different Feature Extraction Algorithms
 
Hybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaHybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pca
 
Comparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression TechniquesComparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression Techniques
 
“FIELD PROGRAMMABLE DSP ARRAYS” - A NOVEL RECONFIGURABLE ARCHITECTURE FOR EFF...
“FIELD PROGRAMMABLE DSP ARRAYS” - A NOVEL RECONFIGURABLE ARCHITECTURE FOR EFF...“FIELD PROGRAMMABLE DSP ARRAYS” - A NOVEL RECONFIGURABLE ARCHITECTURE FOR EFF...
“FIELD PROGRAMMABLE DSP ARRAYS” - A NOVEL RECONFIGURABLE ARCHITECTURE FOR EFF...
 
Dip sdit 7
Dip sdit 7Dip sdit 7
Dip sdit 7
 
Hv2514131415
Hv2514131415Hv2514131415
Hv2514131415
 
Applications of machine learning in Wireless sensor networks.
Applications of machine learning in Wireless sensor networks.Applications of machine learning in Wireless sensor networks.
Applications of machine learning in Wireless sensor networks.
 
Copy of colloquium 3 latest
Copy of  colloquium 3 latestCopy of  colloquium 3 latest
Copy of colloquium 3 latest
 
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
 
A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...
A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...
A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...
 

Viewers also liked

Comparison between Zero Forcing (ZF) & Maximum Ratio Transmission (MRT) on th...
Comparison between Zero Forcing (ZF) & Maximum Ratio Transmission (MRT) on th...Comparison between Zero Forcing (ZF) & Maximum Ratio Transmission (MRT) on th...
Comparison between Zero Forcing (ZF) & Maximum Ratio Transmission (MRT) on th...Eng. Mohammed Ahmed Siddiqui
 
Presentation at ITU Workshop on "ICT Innovations in Emerging Economies", OFDM...
Presentation at ITU Workshop on "ICT Innovations in Emerging Economies", OFDM...Presentation at ITU Workshop on "ICT Innovations in Emerging Economies", OFDM...
Presentation at ITU Workshop on "ICT Innovations in Emerging Economies", OFDM...Mohamed Siala
 
Ieee vts talk
Ieee vts talkIeee vts talk
Ieee vts talkozzie73
 
Summer Training Report At Doordarshan
Summer Training Report At Doordarshan Summer Training Report At Doordarshan
Summer Training Report At Doordarshan Himanshu Gupta
 
ADDITTIVE WHITE GAUSIAN NOIS ( AWGN)
ADDITTIVE WHITE GAUSIAN NOIS ( AWGN)ADDITTIVE WHITE GAUSIAN NOIS ( AWGN)
ADDITTIVE WHITE GAUSIAN NOIS ( AWGN)mohammedalimahdi
 
Lte power control
Lte power controlLte power control
Lte power controlPranay Akul
 
Energy efficient wireless technology
Energy efficient wireless technologyEnergy efficient wireless technology
Energy efficient wireless technologyEisha Madhwal
 
Events in tems products
Events in tems productsEvents in tems products
Events in tems productsTo Anh
 
Mimo tutorial by-fuyun_ling
Mimo tutorial by-fuyun_lingMimo tutorial by-fuyun_ling
Mimo tutorial by-fuyun_lingFuyun Ling
 
Introduction to Massive Mimo
Introduction to Massive MimoIntroduction to Massive Mimo
Introduction to Massive MimoAhmed Nasser Agag
 
Tems layer3_messages
Tems  layer3_messagesTems  layer3_messages
Tems layer3_messagesbadgirl3086
 

Viewers also liked (20)

Comparison between Zero Forcing (ZF) & Maximum Ratio Transmission (MRT) on th...
Comparison between Zero Forcing (ZF) & Maximum Ratio Transmission (MRT) on th...Comparison between Zero Forcing (ZF) & Maximum Ratio Transmission (MRT) on th...
Comparison between Zero Forcing (ZF) & Maximum Ratio Transmission (MRT) on th...
 
Writing
WritingWriting
Writing
 
Presentation at ITU Workshop on "ICT Innovations in Emerging Economies", OFDM...
Presentation at ITU Workshop on "ICT Innovations in Emerging Economies", OFDM...Presentation at ITU Workshop on "ICT Innovations in Emerging Economies", OFDM...
Presentation at ITU Workshop on "ICT Innovations in Emerging Economies", OFDM...
 
5 g wireless systems
5 g wireless systems5 g wireless systems
5 g wireless systems
 
Lte advanced
Lte advancedLte advanced
Lte advanced
 
Ieee vts talk
Ieee vts talkIeee vts talk
Ieee vts talk
 
Summer Training Report At Doordarshan
Summer Training Report At Doordarshan Summer Training Report At Doordarshan
Summer Training Report At Doordarshan
 
ADDITTIVE WHITE GAUSIAN NOIS ( AWGN)
ADDITTIVE WHITE GAUSIAN NOIS ( AWGN)ADDITTIVE WHITE GAUSIAN NOIS ( AWGN)
ADDITTIVE WHITE GAUSIAN NOIS ( AWGN)
 
Lte power control
Lte power controlLte power control
Lte power control
 
Lte advanced
Lte advancedLte advanced
Lte advanced
 
Long Term Evolution (LTE)
Long Term Evolution (LTE)Long Term Evolution (LTE)
Long Term Evolution (LTE)
 
5G: Your Questions Answered
5G: Your Questions Answered5G: Your Questions Answered
5G: Your Questions Answered
 
Lte basic
Lte basicLte basic
Lte basic
 
Energy efficient wireless technology
Energy efficient wireless technologyEnergy efficient wireless technology
Energy efficient wireless technology
 
Events in tems products
Events in tems productsEvents in tems products
Events in tems products
 
Tems operation steps
Tems operation stepsTems operation steps
Tems operation steps
 
Mimo tutorial by-fuyun_ling
Mimo tutorial by-fuyun_lingMimo tutorial by-fuyun_ling
Mimo tutorial by-fuyun_ling
 
Introduction to Massive Mimo
Introduction to Massive MimoIntroduction to Massive Mimo
Introduction to Massive Mimo
 
Tems layer3_messages
Tems  layer3_messagesTems  layer3_messages
Tems layer3_messages
 
MIMO in 15 minutes
MIMO in 15 minutesMIMO in 15 minutes
MIMO in 15 minutes
 

Similar to Designing an lte channel for data transmission

BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESijma
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESijma
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
 
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT DomainA Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT DomainIRJET Journal
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital mediaijctet
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarkingijceronline
 
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDWatermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDIRJET Journal
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...IRJET Journal
 
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET Journal
 
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmIRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmLalith Kumar
 
A Blind Watermarking Algorithm
A Blind Watermarking AlgorithmA Blind Watermarking Algorithm
A Blind Watermarking AlgorithmIRJET Journal
 

Similar to Designing an lte channel for data transmission (20)

BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT DomainA Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital media
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
1918 1923
1918 19231918 1923
1918 1923
 
1918 1923
1918 19231918 1923
1918 1923
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
G0523444
G0523444G0523444
G0523444
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarking
 
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDWatermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
 
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
 
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmIRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking Algorithm
 
A Blind Watermarking Algorithm
A Blind Watermarking AlgorithmA Blind Watermarking Algorithm
A Blind Watermarking Algorithm
 

Recently uploaded

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 

Recently uploaded (20)

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

Designing an lte channel for data transmission

  • 1. DESIGNING AN LTE CHANNEL FOR DATA TRANSMISSION Proposal of final project EE571 Presented by – Mohammed Aljnoobi & Mohammed Siddiqui
  • 2. Agenda  Introduction  LTE technology overview.  Sending image over the LTE simulated channel.  (SVD) watermarking overview.  What is digital watermarking?  Features of watermarking  What is SVD?  Using channel for an embedded watermarked imaqe.
  • 3. Introduction  We will investigate 2-D image processing by sending an image over a channel.  And we will observe how watermarked image is effected when passed through this channel.
  • 4. LTE  LTE (Long Term Evolution) has flexible and expandable spectrum bandwidth  Simplified network architecture  Time-frequency scheduling on shared-channel  Support for multi-antenna scheme  High data throughput  Self-Organizing Network
  • 5. Simulation steps  Sending the image:  Choose any image.  Choosing the type of channel (AWGN or Rayleigh distribution).  Add modulation technique (QAM).  Apply OFDM .  Add Cyclic prefix.  Receiving the image:  Removing cyclic prefix.  Demultiplexer (Filter).  Demodulator.  Receive the data.
  • 6. OFDM • Orthogonal Frequency- Division Multiplexing (OFDM) is a method of encoding digital data on multiple carrier frequencies. • Total bandwidth is divided into smaller non- overlapping frequency sub- bands. • Used in cable television and satellite communications.
  • 7. Cyclic prefix • Cyclic prefix refers to the prefixing of a symbol with a repetition of the end. • Guard time between adjacent symbols is inserted to eliminate ISI. • Inserted to preserve orthogonality. • Increases required transmission bandwidth, hence lowers spectral efficiency. • Cyclic Prefixes are used in OFDM in order to combat multipath by making channel estimation easy.
  • 8. Digital Watermarking  Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual quality.  When data is embedded, it is not written at HEADER PART but embedded directly into digital media itself by changing media contents data.  Watermarking is a key process for the PROTECTION of copyright ownership of electronic data.
  • 9. Classification Of WATERMARK • According to Human Perception  Invisible  Visible • According to types of Document  Text  Image  Audio  Video • According to Robustness  Fragile  Semi fragile  Robust
  • 10. Features of Watermarking  Invisible/Inaudible  Information is embedded without digital content degradation, because of the level of embedding operation is too small for human to notice the change.  Inseparable  The embedded information can survive after some processing, compression and format transformation.  Unchanging data file size  Data size of the media is not changed before and after embedding operation because information is embedded directly into the media.
  • 11. Purpose of Watermarking  Copyright Protection  Fingerprinting  Copy Protection  Broadcasting Monitoring  Data Authentication
  • 12. SVD(Singular Value Decomposition)  SVD for any image say A of size m*m is a factorization of the form given by ,A = UΣV∗ Where U and V are orthogonal matrices in which columns of U are left singular vectors and columns of V are right singular vectors of image A.  Suppose M is a m*n matrix whose entries come from the field K, which is either the field of real numbers or the field of complex number. Then there exists a factorization of the form  where U is an m × m unary matrix over K (orthogonal matrix if K = R), Σ is a m × n diagonal matrix with non-negative real numbers on the diagonal, and the n × n unitary matrix V∗ denotes the conjugate transpose of the n × n unitary matrix V. Such a factorization is called a singular value decomposition of M
  • 13. Embedding and extracting technique of SVD
  • 14. How To overcome the problems of SVD  Measuring of performance of SVD should be easy.  SVD should become fast from computational point of view .  To find the technique to calculate the SVD easily.  Less calculations should be made to measure the performance of SVD  SVD characteristics which are not utilized in image processing should be utilized by finding the techniques to utilize the unused SVD characteristics in image processing such as image capacity for hiding information, roughness measure etc.
  • 15. Result and analysis Original image The image after the channel • As shown in the image the received image there are some error which should be corrected by error correction some techniques based on the channel specification.
  • 17. Watermarking results Watermarked image Watermarked image after a channel of (ADWGN) & QAM
  • 18. Extracted watermark Extracted water mark without effect of the channel Extracted water mark with channel effect
  • 19. Comments about the Results  The quality of extracted image has changed slightly from the original watermark image, but still it has very good which means that, the used SVD system works rightly.  It is clear from the last image that the applied communication has affected our watermarking system, but still we can recognize the image the a lot of details. Thus, image enhancement techniques and an error correction algorithm are needed to improve the result of the watermarking system in this case.  And in the case of the image over LTE channel we observed the image there are some error which should be corrected by
  • 20. Conclusions  The coding and error correction algorithms are very important to increase the performance of any communication systems.  The watermarking system used over communication channel should should be robust to be able to extract that image.  The image sent over a channel may contain errors at the receiver end which can be corrected using error correcting techniques.