SlideShare a Scribd company logo
Presented by :
Anand Karandikar
Guided by:
Prof. G. G. Chiddarwar
Digital Image Protection Using
Adaptive Watermarking Techniques
3 May 20141
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Overview:
DigitalWatermarking
Least Significant BitAlgorithm
Discrete CosineTransform Algorithm
Metrics for quality
LSB and DCT: Comparison
Conclusion
References
3 May 20142
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Digital Watermarking: The concept
3 May 20143
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Digital Watermarking: Types
Visible watermark:
3 May 20144
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Fig.1.VisibleWatermark
Digital Watermarking: Types (cont.)
Invisible watermark:
3 May 20145
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Fig.2.InvisibleWatermark
Digital Watermarking: Classification
3 May 20146
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Fig.3.Classification ofWatermarking techniques
Least Significant Bit Technique
10110101 01001101 11001101
00010011 00010100 01001010
10110100 01001100 11001101
00010010 00010100 01001011
3 May 20147
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Fig.4.The LSB Substitution technique
Embed 001001
Secret Data
Original Image
encoded
format
Embedded
data
8
Secret
data
Convert to bit stream
Conversion of data
Encode Data
Embedding
Extract
Decode Data
Original Source
Image
Load Source image
Convert to
stego image
Extracted
secret data
Digital Image Protection UsingAdaptive
WatermarkingTechniques
3 May 2014
Fig.5.The LSB Substitution procedure
Discrete Cosine Transform Algorithm
3 May 20149
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Fig.6.The DCT algorithm
Fragment
Use DCT
Block selection
Coefficient selection
EmbedWatermarks
Apply inverse DCT
Discrete Cosine Transform Algorithm
3 May 201410
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Fig.7.The DCT region
Low band
frequency region
Middle band
frequency region
High band
frequency region
3 May 201411
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Fig.8.The MBEC algorithm
Select the FM region
Select two points
say Pi(u1,v1) & Pi(u2,v2)
Pi(u1,v1)>=
Pi(u2,v2)
Encode 0 Encode 1
A
A
True False
16 11 10 16 24 40 51 61
12 12 14 19 26 48 16 55
14 13 16 24 40 57 69 56
14 17 20
29 51 87 80 62
18 22 37 56 68 10
9
10
8
77
24 35 55 64 81 10
4
11
3
92
49 64 78 87 10
3
12
1
12
0
10
1
72 92 95 98 11
2
10
0
10
3
99
E.g.:
3 May 2014
Digital Image Protection UsingAdaptive
WatermarkingTechniques12
16 11 10 16 24 40 51 61
12 12 14 19 26 48 16 55
14 13 16 24 40 57 69 56
14 17 20
29 51 87 80 62
18 22 37 56 68 10
9
10
8
77
24 35 55 64 81 10
4
11
3
92
49 64 78 87 10
3
12
1
12
0
10
1
72 92 95 98 11
2
10
0
10
3
99
Fig.9.An illustration of DCT algorithm
Transform
Embed
Inverse
Transform
16 11 10 16 24 40 51 61
12 12 14 19 26 48 16 55
14 13 16 24 40 57 69 56
14 17 20
29 51 87 80 62
18 22 37 56 68 10
9
10
8
77
24 35 55 64 81 10
4
11
3
92
49 64 78 87 10
3
12
1
12
0
10
1
72 92 95 98 11
2
10
0
10
3
99
16 11 10 16 24 40 51 61
12 12 14 19 26 48 16 55
14 13 16 24 40 57 69 56
14 17 20
29 51 87 80 62
18 22 37 56 68 10
9
10
8
77
24 35 55 64 81 10
4
11
3
92
49 64 78 87 10
3
12
1
12
0
10
1
72 92 95 98 11
2
10
0
10
3
99
MBEC: The actual thing.
3 May 2014
Digital Image Protection UsingAdaptive
WatermarkingTechniques13
16 11 10 16 24 40 51 61
12 12 14 19 26 48 16 55
14 13 16 24 40 57 69 56
14 17 20 29 51 87 80 62
18 22 37 56 68 109 108 77
24 35 55 64 81 104 113 92
49 64 78 87 103 121 120 101
72 92 95 98 112 100 103 99
14 = 14; Encode 0
20 < 22; Encode 1
Fig.10.MBEC encoding
Metrics for quality:
 Peak Signal to Noise Ratio(PSNR) PSNR> 0.35 dB
PSNR = 10 log10 . A2
1
N x M [f(i,j) – f’(i,j)]2
 Normalized Cross-correlation(NC) NC>0.75
3 May 201414
Digital Image Protection UsingAdaptive
WatermarkingTechniques
LSB & DCT : Comparison
LSB Substitution
technique
DCT technique
Spatial domain technique Frequency domain technique
Provides limited ROBUSTNESS Provides better ROBUSTNESS
Embeds little INFORMATION Embeds more INFORMATION
Lesser NOISE immunity Highly immune to NOISE
SIMPLE implementation COMPLEX implementation
3 May 201415
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Table.1.LSB and DCT technique comparison
Conclusion
 DigitalWatermarking proves crucial.
 A combination of more than one technique is
required.
 DCT proves to be advantageous.
3 May 201416
Digital Image Protection UsingAdaptive
WatermarkingTechniques
References
[1].Yusuf Perwej, Firoj Parwej ,Asif Perwej -The International
Journal of Multimedia & Its Applications (IJMA)Vol.4, No.2,
April 2012,An AdaptiveWatermarkingTechnique for the
copyright of digital images and Digital Image Protection.
[2] Lin Liu -A Survey of DigitalWatermarkingTechnologies.
[3]. Petitcolas, F.A. P.,Anderson, R. J.: Kuhn, M. G.,
Information Hiding –A Survey, Proceedings of the IEEE,
Special Issue on Protection of Multimedia Content.
3 May 201417
Digital Image Protection UsingAdaptive
WatermarkingTechniques
THANKYOU…!
3 May 201418
Digital Image Protection UsingAdaptive
WatermarkingTechniques
3 May 201419
Digital Image Protection UsingAdaptive
WatermarkingTechniques

More Related Content

What's hot

Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital media
ijctet
 
Discrete wavelet transform using matlab
Discrete wavelet transform using matlabDiscrete wavelet transform using matlab
Discrete wavelet transform using matlab
IAEME Publication
 
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET Journal
 
M.Tech project on Haar wavelet based approach for image compression
M.Tech project on Haar wavelet based approach for image compressionM.Tech project on Haar wavelet based approach for image compression
M.Tech project on Haar wavelet based approach for image compression
Veerendra B R Revanna
 
Satellite Image Resolution Enhancement Technique Using DWT and IWT
Satellite Image Resolution Enhancement Technique Using DWT and IWTSatellite Image Resolution Enhancement Technique Using DWT and IWT
Satellite Image Resolution Enhancement Technique Using DWT and IWT
Editor IJCATR
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijripublishers Ijri
 
Lifting Scheme Cores for Wavelet Transform
Lifting Scheme Cores for Wavelet TransformLifting Scheme Cores for Wavelet Transform
Lifting Scheme Cores for Wavelet Transform
David Bařina
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
IJERA Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijripublishers Ijri
 
Gh2411361141
Gh2411361141Gh2411361141
Gh2411361141
IJERA Editor
 
AUTO AI 2021 talk Real world data augmentations for autonomous driving : B Ra...
AUTO AI 2021 talk Real world data augmentations for autonomous driving : B Ra...AUTO AI 2021 talk Real world data augmentations for autonomous driving : B Ra...
AUTO AI 2021 talk Real world data augmentations for autonomous driving : B Ra...
Ravi Kiran B.
 
Introduction to wavelet transform
Introduction to wavelet transformIntroduction to wavelet transform
Introduction to wavelet transform
Raj Endiran
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT DomainA Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
IRJET Journal
 
Hybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video WatermarkingHybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video Watermarking
IJSRD
 
Image compression techniques by using wavelet transform
Image compression techniques by using wavelet transformImage compression techniques by using wavelet transform
Image compression techniques by using wavelet transform
Alexander Decker
 
DCT
DCTDCT
11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...
Alexander Decker
 

What's hot (19)

Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital media
 
Discrete wavelet transform using matlab
Discrete wavelet transform using matlabDiscrete wavelet transform using matlab
Discrete wavelet transform using matlab
 
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
 
M.Tech project on Haar wavelet based approach for image compression
M.Tech project on Haar wavelet based approach for image compressionM.Tech project on Haar wavelet based approach for image compression
M.Tech project on Haar wavelet based approach for image compression
 
Satellite Image Resolution Enhancement Technique Using DWT and IWT
Satellite Image Resolution Enhancement Technique Using DWT and IWTSatellite Image Resolution Enhancement Technique Using DWT and IWT
Satellite Image Resolution Enhancement Technique Using DWT and IWT
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
 
Lifting Scheme Cores for Wavelet Transform
Lifting Scheme Cores for Wavelet TransformLifting Scheme Cores for Wavelet Transform
Lifting Scheme Cores for Wavelet Transform
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
 
Gh2411361141
Gh2411361141Gh2411361141
Gh2411361141
 
AUTO AI 2021 talk Real world data augmentations for autonomous driving : B Ra...
AUTO AI 2021 talk Real world data augmentations for autonomous driving : B Ra...AUTO AI 2021 talk Real world data augmentations for autonomous driving : B Ra...
AUTO AI 2021 talk Real world data augmentations for autonomous driving : B Ra...
 
Introduction to wavelet transform
Introduction to wavelet transformIntroduction to wavelet transform
Introduction to wavelet transform
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT DomainA Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
 
Hybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video WatermarkingHybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video Watermarking
 
Image compression techniques by using wavelet transform
Image compression techniques by using wavelet transformImage compression techniques by using wavelet transform
Image compression techniques by using wavelet transform
 
DCT
DCTDCT
DCT
 
11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...
 

Viewers also liked

Normalization Cross Correlation Value of Rotational Attack on Digital Image W...
Normalization Cross Correlation Value of Rotational Attack on Digital Image W...Normalization Cross Correlation Value of Rotational Attack on Digital Image W...
Normalization Cross Correlation Value of Rotational Attack on Digital Image W...
Komal Goyal
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
Ankush Kr
 
Пять трендов на пять лет. Или где тумбочка с деньгами у интернет-провайдера
Пять трендов на пять лет. Или где тумбочка с деньгами у интернет-провайдераПять трендов на пять лет. Или где тумбочка с деньгами у интернет-провайдера
Пять трендов на пять лет. Или где тумбочка с деньгами у интернет-провайдера
Михаил Климарёв
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
longagofaraway
 
Архитектура и принципы проектирования многоуровневых корпоративных ЛВС. Част...
 Архитектура и принципы проектирования многоуровневых корпоративных ЛВС. Част... Архитектура и принципы проектирования многоуровневых корпоративных ЛВС. Част...
Архитектура и принципы проектирования многоуровневых корпоративных ЛВС. Част...Cisco Russia
 
Ip Networking Over Satelite Course Sampler
Ip Networking Over Satelite Course SamplerIp Networking Over Satelite Course Sampler
Ip Networking Over Satelite Course Sampler
Jim Jenkins
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Samarth Godara
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
rupareliab14
 

Viewers also liked (8)

Normalization Cross Correlation Value of Rotational Attack on Digital Image W...
Normalization Cross Correlation Value of Rotational Attack on Digital Image W...Normalization Cross Correlation Value of Rotational Attack on Digital Image W...
Normalization Cross Correlation Value of Rotational Attack on Digital Image W...
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Пять трендов на пять лет. Или где тумбочка с деньгами у интернет-провайдера
Пять трендов на пять лет. Или где тумбочка с деньгами у интернет-провайдераПять трендов на пять лет. Или где тумбочка с деньгами у интернет-провайдера
Пять трендов на пять лет. Или где тумбочка с деньгами у интернет-провайдера
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Архитектура и принципы проектирования многоуровневых корпоративных ЛВС. Част...
 Архитектура и принципы проектирования многоуровневых корпоративных ЛВС. Част... Архитектура и принципы проектирования многоуровневых корпоративных ЛВС. Част...
Архитектура и принципы проектирования многоуровневых корпоративных ЛВС. Част...
 
Ip Networking Over Satelite Course Sampler
Ip Networking Over Satelite Course SamplerIp Networking Over Satelite Course Sampler
Ip Networking Over Satelite Course Sampler
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 

Similar to Digital image protection using adaptive watermarking techniques

A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
ijiert bestjournal
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
sophiabelthome
 
1820 1824
1820 18241820 1824
1820 1824
Editor IJARCET
 
1820 1824
1820 18241820 1824
1820 1824
Editor IJARCET
 
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
researchinventy
 
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionAdvance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
IJERA Editor
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
IRJET Journal
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
eSAT Journals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
eSAT Journals
 
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
IJET - International Journal of Engineering and Techniques
 
G0523444
G0523444G0523444
G0523444
IOSR Journals
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarking
ijceronline
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
ijmpict
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
ijmpict
 
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
IJET - International Journal of Engineering and Techniques
 
Imperceptible and secure image watermarking using DCT and random spread techn...
Imperceptible and secure image watermarking using DCT and random spread techn...Imperceptible and secure image watermarking using DCT and random spread techn...
Imperceptible and secure image watermarking using DCT and random spread techn...
TELKOMNIKA JOURNAL
 
50120140506015
5012014050601550120140506015
50120140506015
IAEME Publication
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
IOSR Journals
 
Significant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation ApproachSignificant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation Approach
Eswar Publications
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
acijjournal
 

Similar to Digital image protection using adaptive watermarking techniques (20)

A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
1820 1824
1820 18241820 1824
1820 1824
 
1820 1824
1820 18241820 1824
1820 1824
 
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
 
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionAdvance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
G0523444
G0523444G0523444
G0523444
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarking
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
 
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
 
Imperceptible and secure image watermarking using DCT and random spread techn...
Imperceptible and secure image watermarking using DCT and random spread techn...Imperceptible and secure image watermarking using DCT and random spread techn...
Imperceptible and secure image watermarking using DCT and random spread techn...
 
50120140506015
5012014050601550120140506015
50120140506015
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
Significant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation ApproachSignificant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation Approach
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Digital image protection using adaptive watermarking techniques

  • 1. Presented by : Anand Karandikar Guided by: Prof. G. G. Chiddarwar Digital Image Protection Using Adaptive Watermarking Techniques 3 May 20141 Digital Image Protection UsingAdaptive WatermarkingTechniques
  • 2. Overview: DigitalWatermarking Least Significant BitAlgorithm Discrete CosineTransform Algorithm Metrics for quality LSB and DCT: Comparison Conclusion References 3 May 20142 Digital Image Protection UsingAdaptive WatermarkingTechniques
  • 3. Digital Watermarking: The concept 3 May 20143 Digital Image Protection UsingAdaptive WatermarkingTechniques
  • 4. Digital Watermarking: Types Visible watermark: 3 May 20144 Digital Image Protection UsingAdaptive WatermarkingTechniques Fig.1.VisibleWatermark
  • 5. Digital Watermarking: Types (cont.) Invisible watermark: 3 May 20145 Digital Image Protection UsingAdaptive WatermarkingTechniques Fig.2.InvisibleWatermark
  • 6. Digital Watermarking: Classification 3 May 20146 Digital Image Protection UsingAdaptive WatermarkingTechniques Fig.3.Classification ofWatermarking techniques
  • 7. Least Significant Bit Technique 10110101 01001101 11001101 00010011 00010100 01001010 10110100 01001100 11001101 00010010 00010100 01001011 3 May 20147 Digital Image Protection UsingAdaptive WatermarkingTechniques Fig.4.The LSB Substitution technique Embed 001001 Secret Data Original Image encoded format Embedded data
  • 8. 8 Secret data Convert to bit stream Conversion of data Encode Data Embedding Extract Decode Data Original Source Image Load Source image Convert to stego image Extracted secret data Digital Image Protection UsingAdaptive WatermarkingTechniques 3 May 2014 Fig.5.The LSB Substitution procedure
  • 9. Discrete Cosine Transform Algorithm 3 May 20149 Digital Image Protection UsingAdaptive WatermarkingTechniques Fig.6.The DCT algorithm Fragment Use DCT Block selection Coefficient selection EmbedWatermarks Apply inverse DCT
  • 10. Discrete Cosine Transform Algorithm 3 May 201410 Digital Image Protection UsingAdaptive WatermarkingTechniques Fig.7.The DCT region Low band frequency region Middle band frequency region High band frequency region
  • 11. 3 May 201411 Digital Image Protection UsingAdaptive WatermarkingTechniques Fig.8.The MBEC algorithm Select the FM region Select two points say Pi(u1,v1) & Pi(u2,v2) Pi(u1,v1)>= Pi(u2,v2) Encode 0 Encode 1 A A True False
  • 12. 16 11 10 16 24 40 51 61 12 12 14 19 26 48 16 55 14 13 16 24 40 57 69 56 14 17 20 29 51 87 80 62 18 22 37 56 68 10 9 10 8 77 24 35 55 64 81 10 4 11 3 92 49 64 78 87 10 3 12 1 12 0 10 1 72 92 95 98 11 2 10 0 10 3 99 E.g.: 3 May 2014 Digital Image Protection UsingAdaptive WatermarkingTechniques12 16 11 10 16 24 40 51 61 12 12 14 19 26 48 16 55 14 13 16 24 40 57 69 56 14 17 20 29 51 87 80 62 18 22 37 56 68 10 9 10 8 77 24 35 55 64 81 10 4 11 3 92 49 64 78 87 10 3 12 1 12 0 10 1 72 92 95 98 11 2 10 0 10 3 99 Fig.9.An illustration of DCT algorithm Transform Embed Inverse Transform 16 11 10 16 24 40 51 61 12 12 14 19 26 48 16 55 14 13 16 24 40 57 69 56 14 17 20 29 51 87 80 62 18 22 37 56 68 10 9 10 8 77 24 35 55 64 81 10 4 11 3 92 49 64 78 87 10 3 12 1 12 0 10 1 72 92 95 98 11 2 10 0 10 3 99 16 11 10 16 24 40 51 61 12 12 14 19 26 48 16 55 14 13 16 24 40 57 69 56 14 17 20 29 51 87 80 62 18 22 37 56 68 10 9 10 8 77 24 35 55 64 81 10 4 11 3 92 49 64 78 87 10 3 12 1 12 0 10 1 72 92 95 98 11 2 10 0 10 3 99
  • 13. MBEC: The actual thing. 3 May 2014 Digital Image Protection UsingAdaptive WatermarkingTechniques13 16 11 10 16 24 40 51 61 12 12 14 19 26 48 16 55 14 13 16 24 40 57 69 56 14 17 20 29 51 87 80 62 18 22 37 56 68 109 108 77 24 35 55 64 81 104 113 92 49 64 78 87 103 121 120 101 72 92 95 98 112 100 103 99 14 = 14; Encode 0 20 < 22; Encode 1 Fig.10.MBEC encoding
  • 14. Metrics for quality:  Peak Signal to Noise Ratio(PSNR) PSNR> 0.35 dB PSNR = 10 log10 . A2 1 N x M [f(i,j) – f’(i,j)]2  Normalized Cross-correlation(NC) NC>0.75 3 May 201414 Digital Image Protection UsingAdaptive WatermarkingTechniques
  • 15. LSB & DCT : Comparison LSB Substitution technique DCT technique Spatial domain technique Frequency domain technique Provides limited ROBUSTNESS Provides better ROBUSTNESS Embeds little INFORMATION Embeds more INFORMATION Lesser NOISE immunity Highly immune to NOISE SIMPLE implementation COMPLEX implementation 3 May 201415 Digital Image Protection UsingAdaptive WatermarkingTechniques Table.1.LSB and DCT technique comparison
  • 16. Conclusion  DigitalWatermarking proves crucial.  A combination of more than one technique is required.  DCT proves to be advantageous. 3 May 201416 Digital Image Protection UsingAdaptive WatermarkingTechniques
  • 17. References [1].Yusuf Perwej, Firoj Parwej ,Asif Perwej -The International Journal of Multimedia & Its Applications (IJMA)Vol.4, No.2, April 2012,An AdaptiveWatermarkingTechnique for the copyright of digital images and Digital Image Protection. [2] Lin Liu -A Survey of DigitalWatermarkingTechnologies. [3]. Petitcolas, F.A. P.,Anderson, R. J.: Kuhn, M. G., Information Hiding –A Survey, Proceedings of the IEEE, Special Issue on Protection of Multimedia Content. 3 May 201417 Digital Image Protection UsingAdaptive WatermarkingTechniques
  • 18. THANKYOU…! 3 May 201418 Digital Image Protection UsingAdaptive WatermarkingTechniques
  • 19. 3 May 201419 Digital Image Protection UsingAdaptive WatermarkingTechniques