SlideShare a Scribd company logo
1 of 25
•In this application our aim is to develop a watermarking
algorithm based on DCT and Spread spectrum communications.
•To provide highly robust with respect jpeg compression and
also other common attacks whenever they are applied to
watermarked image.
•To provide higher imperceptibility is gained by scattering the
watermark’s bit in different blocks.
•The digital image processing deals with developing a digital
system that performs operation on digital images.
•It is a subfield of signals and system but focus particularly on
images.
•The input of that system is a digital image &the system process
that image using efficient algorithms gives an image as an output.
•Ex:adobe Photoshop
 Matlab is a high performance language for technical
computing.
 Matlab is a software package developed by Math-
Works, Inc.
 It has a wide applications in signals and system, image
&video processing.
 Matlab contains five types of windows:
 Command window, current directory, editor
window,workspace,command history
 Version:matlab 7.8.0.347(R2009a)
 MATLAB is an interpreted language (making it for the
most part slower than a compiled language such as C+
+).
 MATLAB is designed for scientific computation and is
not suitable for some things (such as parsing text).
◦ Data hiding
◦ Making the information imperceptible
◦ E.g. watermarking
◦ Keeping the existence of information secret
 Water marking
1. visible-----copy right protection
2. Fragile ---Authentication, security
•This technique is proposed to protect copyright of digital
multimedia data.
•Water marking is one of the data hiding technique for security
purpose.
•Watermarking is an important mechanism applied to physical
objects like bills, papers, garment labels, product packing…
 Imperceptibility
◦ The modifications caused by watermark embedding should be below the perceptible
threshold
 Robustness
◦ - The ability of the watermark to resist distortion introduced by standard or malicious data
processing
 Security
◦ - A watermark is secure if knowing the algorithms for embedding and extracting does not
help unauthorized party to detect or remove the watermark
•DCT splits up the image into frequency bands, similar to discrete
Fourier transform, it transforms a signal or image from the spatial
domain to the frequency domain.
 The DCT is a widely used transformation in
transformation for data compression.
 The DCT is fast. It can be quickly calculated and is
best for images with smooth edges like Photos with
human subjects.
 DCT transform is a pretty good technique for image
compression. Correctly use the Advantage that provide
by DCT is the key to achieve good result while keep a
good Compression ratio.
 A narrow band signal is transmitted over a much larger
bandwidth such that, the signal energy present in any
single frequency is imperceptible.
 It transmits a narrowband signal over a much larger
bandwidth.
 The signal energy present in any single frequency is
un-detectable.
 1. Compute BDCT of host image,
 2. Create LRAI,
 3. Compute BDCT of LRAI,
 4. Embed each bit of Watermark, as a
 pseudo-random noise sequence into FH
 coefficients of each 8x8 block of transformed
 LRAI using (1),
 5. Compute IBDCT of watermarked LRAI,
 6. Replace the watermarked DC coefficients with
 the original ones in LRAI,
 7. Compute IBDCT of LRAI.
 1. Denoise watermarked image,
 2. Calculate difference image by subtracting denoised image
from watermarked image,
 3. Do steps from 1 through 3 from the embedding algorithm
for difference image,
 4. Compute the correlation between each block of transformed
LRAI. And both noise patterns for one and zero bits,
 Choose the noise pattern with higher correlation related to the
extracted watermark bit,
 Compute the average correlation coefficient overall extracted
watermark bits, and then compare it with a pre defined
threshold. The watermark is considered to be present if the
average correlation coefficient is greater than threshold.
a)host image b)watermark
bit
c)Watermarked image
Difference image
Extracted
watermark
original image
Watermarked imageOriginal image
Difference image between
watermarked image and
original image
 Imperceptibility
 Robustness
 HIGH SECURITY
 HIGH CAPACITY
•Not full proof
•Reduces social sharing
• Promotes negative image of you
 Copyright watermarking
 Data hiding watermarking
 Broadcast watermarking
 Integrity watermarking
•The watermark embedding scheme can be extended to
included encrypted watermarks.
•Watermark extraction algorithm can be extended to perform
water mark validation automatically.
• Suitable feature extraction and matching techniques have to
be explored.
 In this project, we proposed a DCT-based blind
watermarking scheme based on spread spectrum
communications.
 The low frequency nature of the proposed algorithm
makes the embedded watermark very robust to
common image manipulations such as filtering, scaling,
compression and malicious attacking.
 
 [1] Lu C.-S., "Multimedia Security: Steganography and Digital
Watermarking Techniques for Protection of Intellectual Property", Idea
Group Publishing, 2005, ISBN: 1-59140-192-5.
 [2] Katzenbeisser S. and Petitcolas A.-P., "Information Hiding
Techniques for Steganography and Digital Watermarking," Artech
House, January 2000, ISBN: 1580530354.
 [3] Voloshynovskiy S. and Deguillaume F., "Information-Theoretic
Data-Hiding: Recent
 Achievements And Open Problems", International Journal of Image
and Graphics, Vol. 5, No.1,p.5–36, 2005
 [4] P. Meerwald, A. Uhl, “A Survey of Wavelet-Domain Watermarking
Algorithms”, EI San Jose, CA, USA, 2001
 [5] Cox I. J., Miller M. L., "The First 50 years of Electronic
Watermarking", Journal of Applied Signal Processing, vol.2, Issue 2, p.
126, 2002.
robust image watermarking

More Related Content

What's hot

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingGovind Raj
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networksantoniomorancardenas
 
Image forgery detection using error level analysis and deep learning
Image forgery detection using error level analysis and deep learningImage forgery detection using error level analysis and deep learning
Image forgery detection using error level analysis and deep learningTELKOMNIKA JOURNAL
 
Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat DetectionNapier University
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingnafees321
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project ReportVijayMaheshwari12
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology vijay rastogi
 
2. introduction to compiler
2. introduction to compiler2. introduction to compiler
2. introduction to compilerSaeed Parsa
 
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityPratap Dangeti
 

What's hot (20)

Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networks
 
Image forgery detection using error level analysis and deep learning
Image forgery detection using error level analysis and deep learningImage forgery detection using error level analysis and deep learning
Image forgery detection using error level analysis and deep learning
 
Image Security
Image SecurityImage Security
Image Security
 
Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat Detection
 
Steganography
Steganography Steganography
Steganography
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Jpeg dct
Jpeg dctJpeg dct
Jpeg dct
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
2. introduction to compiler
2. introduction to compiler2. introduction to compiler
2. introduction to compiler
 
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
 
Artificial Face Aging
Artificial Face AgingArtificial Face Aging
Artificial Face Aging
 
Application of Machine Learning in Cybersecurity
Application of Machine Learning in CybersecurityApplication of Machine Learning in Cybersecurity
Application of Machine Learning in Cybersecurity
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 

Viewers also liked

IEEE 2015 Projects for M.Tech & B.Tech VLSI
IEEE 2015 Projects for M.Tech & B.Tech VLSIIEEE 2015 Projects for M.Tech & B.Tech VLSI
IEEE 2015 Projects for M.Tech & B.Tech VLSIMaryala Srinivas
 
Ieee project reversible logic gates by_amit
Ieee project reversible logic gates  by_amitIeee project reversible logic gates  by_amit
Ieee project reversible logic gates by_amitAmith Bhonsle
 
Image stegnography and steganalysis
Image stegnography and steganalysisImage stegnography and steganalysis
Image stegnography and steganalysisPrince Boonlia
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis zaidsalfawzan
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis pptOm Vishnoi
 

Viewers also liked (9)

Multimedia Steganography
Multimedia SteganographyMultimedia Steganography
Multimedia Steganography
 
Thủy vân số
Thủy vân số Thủy vân số
Thủy vân số
 
IEEE 2015 Projects for M.Tech & B.Tech VLSI
IEEE 2015 Projects for M.Tech & B.Tech VLSIIEEE 2015 Projects for M.Tech & B.Tech VLSI
IEEE 2015 Projects for M.Tech & B.Tech VLSI
 
Ieee project reversible logic gates by_amit
Ieee project reversible logic gates  by_amitIeee project reversible logic gates  by_amit
Ieee project reversible logic gates by_amit
 
Image stegnography and steganalysis
Image stegnography and steganalysisImage stegnography and steganalysis
Image stegnography and steganalysis
 
Robust watermarking technique sppt
Robust watermarking technique spptRobust watermarking technique sppt
Robust watermarking technique sppt
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis ppt
 

Similar to robust image watermarking

Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital mediaijctet
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarkingijceronline
 
High Speed and Area Efficient 2D DWT Processor Based Image Compression
High Speed and Area Efficient 2D DWT Processor Based Image CompressionHigh Speed and Area Efficient 2D DWT Processor Based Image Compression
High Speed and Area Efficient 2D DWT Processor Based Image Compressionsipij
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Design and implementation of DADCT
Design and implementation of DADCTDesign and implementation of DADCT
Design and implementation of DADCTSatish Kumar
 
Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...eSAT Publishing House
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
M.Tech project on Haar wavelet based approach for image compression
M.Tech project on Haar wavelet based approach for image compressionM.Tech project on Haar wavelet based approach for image compression
M.Tech project on Haar wavelet based approach for image compressionVeerendra B R Revanna
 
Optimizing Real Time Interactive Video Delivery from the Cloud
Optimizing Real Time Interactive Video Delivery from the CloudOptimizing Real Time Interactive Video Delivery from the Cloud
Optimizing Real Time Interactive Video Delivery from the CloudIMTC
 
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...IRJET Journal
 
Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image WatermarkingIJERA Editor
 
Novel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital imagesNovel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital imagesIDES Editor
 
Blur Detection Methods for Digital Images-A Survey
Blur Detection Methods for Digital Images-A SurveyBlur Detection Methods for Digital Images-A Survey
Blur Detection Methods for Digital Images-A SurveyEditor IJCATR
 
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT DomainA Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT DomainIRJET Journal
 

Similar to robust image watermarking (20)

G0523444
G0523444G0523444
G0523444
 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital media
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarking
 
High Speed and Area Efficient 2D DWT Processor Based Image Compression
High Speed and Area Efficient 2D DWT Processor Based Image CompressionHigh Speed and Area Efficient 2D DWT Processor Based Image Compression
High Speed and Area Efficient 2D DWT Processor Based Image Compression
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Design and implementation of DADCT
Design and implementation of DADCTDesign and implementation of DADCT
Design and implementation of DADCT
 
Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
M.Tech project on Haar wavelet based approach for image compression
M.Tech project on Haar wavelet based approach for image compressionM.Tech project on Haar wavelet based approach for image compression
M.Tech project on Haar wavelet based approach for image compression
 
Optimizing Real Time Interactive Video Delivery from the Cloud
Optimizing Real Time Interactive Video Delivery from the CloudOptimizing Real Time Interactive Video Delivery from the Cloud
Optimizing Real Time Interactive Video Delivery from the Cloud
 
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
 
Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image Watermarking
 
G0352039045
G0352039045G0352039045
G0352039045
 
Novel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital imagesNovel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital images
 
E04122330
E04122330E04122330
E04122330
 
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
 
Blur Detection Methods for Digital Images-A Survey
Blur Detection Methods for Digital Images-A SurveyBlur Detection Methods for Digital Images-A Survey
Blur Detection Methods for Digital Images-A Survey
 
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT DomainA Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
 

Recently uploaded

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 

robust image watermarking

  • 1.
  • 2. •In this application our aim is to develop a watermarking algorithm based on DCT and Spread spectrum communications. •To provide highly robust with respect jpeg compression and also other common attacks whenever they are applied to watermarked image. •To provide higher imperceptibility is gained by scattering the watermark’s bit in different blocks.
  • 3. •The digital image processing deals with developing a digital system that performs operation on digital images. •It is a subfield of signals and system but focus particularly on images. •The input of that system is a digital image &the system process that image using efficient algorithms gives an image as an output. •Ex:adobe Photoshop
  • 4.  Matlab is a high performance language for technical computing.  Matlab is a software package developed by Math- Works, Inc.  It has a wide applications in signals and system, image &video processing.  Matlab contains five types of windows:  Command window, current directory, editor window,workspace,command history
  • 5.  Version:matlab 7.8.0.347(R2009a)  MATLAB is an interpreted language (making it for the most part slower than a compiled language such as C+ +).  MATLAB is designed for scientific computation and is not suitable for some things (such as parsing text).
  • 6. ◦ Data hiding ◦ Making the information imperceptible ◦ E.g. watermarking ◦ Keeping the existence of information secret  Water marking 1. visible-----copy right protection 2. Fragile ---Authentication, security
  • 7. •This technique is proposed to protect copyright of digital multimedia data. •Water marking is one of the data hiding technique for security purpose. •Watermarking is an important mechanism applied to physical objects like bills, papers, garment labels, product packing…
  • 8.  Imperceptibility ◦ The modifications caused by watermark embedding should be below the perceptible threshold  Robustness ◦ - The ability of the watermark to resist distortion introduced by standard or malicious data processing  Security ◦ - A watermark is secure if knowing the algorithms for embedding and extracting does not help unauthorized party to detect or remove the watermark
  • 9. •DCT splits up the image into frequency bands, similar to discrete Fourier transform, it transforms a signal or image from the spatial domain to the frequency domain.
  • 10.  The DCT is a widely used transformation in transformation for data compression.  The DCT is fast. It can be quickly calculated and is best for images with smooth edges like Photos with human subjects.  DCT transform is a pretty good technique for image compression. Correctly use the Advantage that provide by DCT is the key to achieve good result while keep a good Compression ratio.
  • 11.  A narrow band signal is transmitted over a much larger bandwidth such that, the signal energy present in any single frequency is imperceptible.  It transmits a narrowband signal over a much larger bandwidth.  The signal energy present in any single frequency is un-detectable.
  • 12.
  • 13.  1. Compute BDCT of host image,  2. Create LRAI,  3. Compute BDCT of LRAI,  4. Embed each bit of Watermark, as a  pseudo-random noise sequence into FH  coefficients of each 8x8 block of transformed  LRAI using (1),  5. Compute IBDCT of watermarked LRAI,  6. Replace the watermarked DC coefficients with  the original ones in LRAI,  7. Compute IBDCT of LRAI.
  • 14.
  • 15.  1. Denoise watermarked image,  2. Calculate difference image by subtracting denoised image from watermarked image,  3. Do steps from 1 through 3 from the embedding algorithm for difference image,  4. Compute the correlation between each block of transformed LRAI. And both noise patterns for one and zero bits,  Choose the noise pattern with higher correlation related to the extracted watermark bit,  Compute the average correlation coefficient overall extracted watermark bits, and then compare it with a pre defined threshold. The watermark is considered to be present if the average correlation coefficient is greater than threshold.
  • 18. Watermarked imageOriginal image Difference image between watermarked image and original image
  • 19.  Imperceptibility  Robustness  HIGH SECURITY  HIGH CAPACITY
  • 20. •Not full proof •Reduces social sharing • Promotes negative image of you
  • 21.  Copyright watermarking  Data hiding watermarking  Broadcast watermarking  Integrity watermarking
  • 22. •The watermark embedding scheme can be extended to included encrypted watermarks. •Watermark extraction algorithm can be extended to perform water mark validation automatically. • Suitable feature extraction and matching techniques have to be explored.
  • 23.  In this project, we proposed a DCT-based blind watermarking scheme based on spread spectrum communications.  The low frequency nature of the proposed algorithm makes the embedded watermark very robust to common image manipulations such as filtering, scaling, compression and malicious attacking.
  • 24.    [1] Lu C.-S., "Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property", Idea Group Publishing, 2005, ISBN: 1-59140-192-5.  [2] Katzenbeisser S. and Petitcolas A.-P., "Information Hiding Techniques for Steganography and Digital Watermarking," Artech House, January 2000, ISBN: 1580530354.  [3] Voloshynovskiy S. and Deguillaume F., "Information-Theoretic Data-Hiding: Recent  Achievements And Open Problems", International Journal of Image and Graphics, Vol. 5, No.1,p.5–36, 2005  [4] P. Meerwald, A. Uhl, “A Survey of Wavelet-Domain Watermarking Algorithms”, EI San Jose, CA, USA, 2001  [5] Cox I. J., Miller M. L., "The First 50 years of Electronic Watermarking", Journal of Applied Signal Processing, vol.2, Issue 2, p. 126, 2002.