SlideShare a Scribd company logo
1 of 25
Watermarking Digital
Image Using Fuzzy Matrix
Rules
SACTA 2014
19th April 2014
ITS , Ghaziabad
Watermarking is done in digital
images for authentication and to
restrict its unauthorized usages.
There are two kinds of watermark
Visible
Invisible
Watermarking are sometimes invisible
and can be extracted only by
authenticated party i.e .
It is encrypted with public key –private
key method.
There are various method of
encryption like DES, RSA, Deffie -
Hellman and etc.
In this paper Encryption is done
using Fuzzy Matrix.
The Fuzzy rules are consisting of
rules defined on fuzzy set.
Fuzzy set are acquired from Crisp
Set(say any algebraic set) using
membership function.
 This process is known as
Fuzzification.
Converting fuzzy set to Crisp set is
called Defuzzification.
Fuzzy set has members which can
take values 0 to 1.
Thus, Fuzzy set A values like
A= {0.2/x1 , 0.3/x2 , 0.4/x3}.
This means 0.2 is membership value
of x1 in set A
 0.3 membership value for x2
 0.4 membership value for x3 in set
A
Max-Min Fuzzy Composition
Max-Product Fuzzy Composition
Min-Max Fuzzy Composition
Min-Product Fuzzy Composition
 Max-Mod-Minus Fuzzy Composition
Complimentary-Sum-Minus Fuzzy
Composition
Let A, B and C are fuzzy set with A(x1,x2),
B(y1,y2) and C(z1,z2)
 µA,B(x1,y1)=0.2
 µA,B (x1,y2)=0.3
 µA,B (x2,y1)=0.2
 µA,B (x2,y2)=0.4
 µB,C (y1,z1)=0.3
 µB,C (y1,z2)=0.5
 µB,C (y2,z1)=0.2
 µB,C (y2,z2)=0.2
 µA,C (x1,z1)= max{|µA,B(x1,y1)-µB,C (y1,z1)|,
| µA,B (x1,y2) - µB,C (y2,z1) |}=0.1
 µA,C (x1,z2)= max{|µA,B(x1,y1) -µB,C (y1,z2) |,|µA,B
(x1,y2) - µB,C (y2,z2)|}=0.3
 µA,C (x2,z1)= max{|µA,B (x2,y1) , µB,C (y1,z1)|, |µA,B
(x2,y2) - µB,C (y2,z1)|}=0.2
 µA,C (x2,z2)= max{|µA,B (x2,y1) ,µB,C (y1,z2)|, |µA,B
(x2,y2) - µB,C (y2,z2)|}=0.3
 µA,B(x1,y1)=0.2
 µA,B (x1,y2)=0.3
 µA,B (x2,y1)=0.2
 µA,B (x2,y2)=0.4
 µB,C (y1,z1)=0.3
 µB,C (y1,z2)=0.5
 µB,C (y2,z1)=0.2
 µB,C (y2,z2)=0.2
 µA,C (x1,z1)= |1-{|µA,B(x1,y1) -µB,C (y1,z1)|+
| µA,B (x1,y2) - µB,C (y2,z1) |}|=0.8
 µA,C (x1,z2)= |1-{|µA,B(x1,y1) -µB,C (y1,z2) |+|µA,B (x1,y2)
- µB,C (y2,z2)|}|=0.6
 µA,C (x2,z1)= |1-{|µA,B (x2,y1) - µB,C (y1,z1)| +|µA,B
(x2,y2) - µB,C (y2,z1)|}|=0.7
 µA,C (x2,z2)= |1-{|µA,B (x2,y1) -µB,C (y1,z2)|+ |µA,B
(x2,y2) - µB,C (y2,z2)|}|=0.5
 Step 1:Choose one Fuzzy matrix appropriate
for encryption according to the file size. It is
public key.
 Step2: Select one fuzzy matrix from
database.
 Step3: Find the Fuzzy Compliment-Sum-Minus
Matrix.
 Step3: Generate random number using Fuzzy
 Step4: Retrieve the encrypted text/files.
Decryption algorithm is used decrypt the
encrypted file. The following algorithm is
used-
 Step1: Collect the encrypted four parts from
four different embedded region of image and
combine to for one file.
 Step2:Use Private key Fuzzy matrix key for
decryption.
 Step3: Break the file into same four parts
with appropriate values of fraction of Fuzzy
Matrix elements.
 Step4: Retrieve the original file.
 Encrypted file is divided into four parts and
b11, b12, b21 and b22.
 The four encrypted files are embedded in
digital image as watermark using appropriate
fuzzy rule.
 Max-Mod-Minus Fuzzy matrices and
Complimentary-Sum-Minus Fuzzy matrices
rules are chosen according to suitability.
 The two fuzzy matrices obtained as public
key and private key are first used for
encrypting watermark.
 For embedding the various compositions of
fuzzy matrices are used.
 The encrypted four parts of file are inserted
at four places of digital image using the most
suitable fuzzy matrix composition obtained
using same keys.
3(a) 3(b) 3(c) 3(d)
Figure 3
(a)Original Image peppers.tif
(b)Watermarked using Fuzzy Max-Mod-Minus matrix
(c) Fuzzy Min-Max Matrices
(d) Fuzzy Compliment-Sum-Minus Matrix using the two fuzzy matrices
4(a) 4(b)
Figure 4(a) Original image lena.gif
4(b) Watermarked using Fuzzy Max-Mod-Minus matrix lena.gif
5(a) 5(b)
5(a) Original Image Mypic.jpg
(b) Watermarked using Fuzzy Max-Mod-Minus Matrix
 The digital images are watermarked with
encrypted files in order to have invisible
watermark.
 The watermark are encrypted and decrypted
to see the image is authentic or it is tried to
tamper.
 The above method is robust as the keys used
as public keys does not lead to any clue for
private keys.
 It can restrain attacks like compression,
geometric filters and noise filters.
 The watermark is robust against changes in
file format.
 This embedding method can be used for all
file formats.
Thank you

More Related Content

What's hot

CrystalBall - Compute Relative Frequency in Hadoop
CrystalBall - Compute Relative Frequency in Hadoop CrystalBall - Compute Relative Frequency in Hadoop
CrystalBall - Compute Relative Frequency in Hadoop Suvash Shah
 
Digital Distance Geometry
Digital Distance GeometryDigital Distance Geometry
Digital Distance Geometryppd1961
 
Machine Learning with Go
Machine Learning with GoMachine Learning with Go
Machine Learning with GoJames Bowman
 
8. Vectors data frames
8. Vectors data frames8. Vectors data frames
8. Vectors data framesExternalEvents
 
INDUCTIVE LEARNING OF COMPLEX FUZZY RELATION
INDUCTIVE LEARNING OF COMPLEX FUZZY RELATIONINDUCTIVE LEARNING OF COMPLEX FUZZY RELATION
INDUCTIVE LEARNING OF COMPLEX FUZZY RELATIONijcseit
 
Bucc Toy Project: Learn programming through Game Development
Bucc Toy Project: Learn programming through Game DevelopmentBucc Toy Project: Learn programming through Game Development
Bucc Toy Project: Learn programming through Game DevelopmentSadaf Noor
 
Deep Residual Hashing Neural Network for Image Retrieval
Deep Residual Hashing Neural Network for Image RetrievalDeep Residual Hashing Neural Network for Image Retrieval
Deep Residual Hashing Neural Network for Image RetrievalEdwin Efraín Jiménez Lepe
 

What's hot (19)

CrystalBall - Compute Relative Frequency in Hadoop
CrystalBall - Compute Relative Frequency in Hadoop CrystalBall - Compute Relative Frequency in Hadoop
CrystalBall - Compute Relative Frequency in Hadoop
 
Digital Distance Geometry
Digital Distance GeometryDigital Distance Geometry
Digital Distance Geometry
 
Otsu
OtsuOtsu
Otsu
 
Machine Learning with Go
Machine Learning with GoMachine Learning with Go
Machine Learning with Go
 
8. Vectors data frames
8. Vectors data frames8. Vectors data frames
8. Vectors data frames
 
INDUCTIVE LEARNING OF COMPLEX FUZZY RELATION
INDUCTIVE LEARNING OF COMPLEX FUZZY RELATIONINDUCTIVE LEARNING OF COMPLEX FUZZY RELATION
INDUCTIVE LEARNING OF COMPLEX FUZZY RELATION
 
Ch 03
Ch 03Ch 03
Ch 03
 
Procedural Art
Procedural ArtProcedural Art
Procedural Art
 
Bucc Toy Project: Learn programming through Game Development
Bucc Toy Project: Learn programming through Game DevelopmentBucc Toy Project: Learn programming through Game Development
Bucc Toy Project: Learn programming through Game Development
 
BazzucchiCampolmi
BazzucchiCampolmiBazzucchiCampolmi
BazzucchiCampolmi
 
ISCAS2013_v5
ISCAS2013_v5ISCAS2013_v5
ISCAS2013_v5
 
Ch 06
Ch 06Ch 06
Ch 06
 
Basic Calculus in R.
Basic Calculus in R. Basic Calculus in R.
Basic Calculus in R.
 
16083116
1608311616083116
16083116
 
Sqlserver 2008 r2
Sqlserver 2008 r2Sqlserver 2008 r2
Sqlserver 2008 r2
 
Ch 02
Ch 02Ch 02
Ch 02
 
Fuzzy c means manual work
Fuzzy c means manual workFuzzy c means manual work
Fuzzy c means manual work
 
Deep Residual Hashing Neural Network for Image Retrieval
Deep Residual Hashing Neural Network for Image RetrievalDeep Residual Hashing Neural Network for Image Retrieval
Deep Residual Hashing Neural Network for Image Retrieval
 
130717666736980000
130717666736980000130717666736980000
130717666736980000
 

Viewers also liked

Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingParag Agarwal
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithmeSAT Journals
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationsarhadisoftengg
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and SteganographyPratik Poddar
 
Watermark
WatermarkWatermark
Watermarkravi33s
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingGovind Raj
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Samarth Godara
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesPrashant Singh
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardShafaan Khaliq Bhatti
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingrupareliab14
 

Viewers also liked (20)

Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithm
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
 
Watermark
WatermarkWatermark
Watermark
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 

Similar to Sharbani bhattacharya sacta 2014

Triangle Visibility buffer
Triangle Visibility bufferTriangle Visibility buffer
Triangle Visibility bufferWolfgang Engel
 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalIRJET Journal
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...CSCJournals
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
An enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hidingAn enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hidingAlexander Decker
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression Sayantan Sur
 
Black Hat Europe 2015 - Time and Position Spoofing with Open Source Projects
Black Hat Europe 2015 - Time and Position Spoofing with Open Source ProjectsBlack Hat Europe 2015 - Time and Position Spoofing with Open Source Projects
Black Hat Europe 2015 - Time and Position Spoofing with Open Source ProjectsWang Kang
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475IJRAT
 
COMPAPPABCA49085rFunrAP__Practical Number 9 & 10.docx
COMPAPPABCA49085rFunrAP__Practical Number 9 & 10.docxCOMPAPPABCA49085rFunrAP__Practical Number 9 & 10.docx
COMPAPPABCA49085rFunrAP__Practical Number 9 & 10.docxTashiBhutia12
 
CE344L-200365-Lab6.pdf
CE344L-200365-Lab6.pdfCE344L-200365-Lab6.pdf
CE344L-200365-Lab6.pdfUmarMustafa13
 
Effective Numerical Computation in NumPy and SciPy
Effective Numerical Computation in NumPy and SciPyEffective Numerical Computation in NumPy and SciPy
Effective Numerical Computation in NumPy and SciPyKimikazu Kato
 
A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...ijfcstjournal
 
ECCV2010: feature learning for image classification, part 4
ECCV2010: feature learning for image classification, part 4ECCV2010: feature learning for image classification, part 4
ECCV2010: feature learning for image classification, part 4zukun
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESIJCSEIT Journal
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESijcseit
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES ijcseit
 

Similar to Sharbani bhattacharya sacta 2014 (20)

Triangle Visibility buffer
Triangle Visibility bufferTriangle Visibility buffer
Triangle Visibility buffer
 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
An enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hidingAn enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hiding
 
matlab.docx
matlab.docxmatlab.docx
matlab.docx
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
Black Hat Europe 2015 - Time and Position Spoofing with Open Source Projects
Black Hat Europe 2015 - Time and Position Spoofing with Open Source ProjectsBlack Hat Europe 2015 - Time and Position Spoofing with Open Source Projects
Black Hat Europe 2015 - Time and Position Spoofing with Open Source Projects
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
 
COMPAPPABCA49085rFunrAP__Practical Number 9 & 10.docx
COMPAPPABCA49085rFunrAP__Practical Number 9 & 10.docxCOMPAPPABCA49085rFunrAP__Practical Number 9 & 10.docx
COMPAPPABCA49085rFunrAP__Practical Number 9 & 10.docx
 
CE344L-200365-Lab6.pdf
CE344L-200365-Lab6.pdfCE344L-200365-Lab6.pdf
CE344L-200365-Lab6.pdf
 
Extreme dxt compression
Extreme dxt compressionExtreme dxt compression
Extreme dxt compression
 
Boosting Developer Productivity with Clang
Boosting Developer Productivity with ClangBoosting Developer Productivity with Clang
Boosting Developer Productivity with Clang
 
Effective Numerical Computation in NumPy and SciPy
Effective Numerical Computation in NumPy and SciPyEffective Numerical Computation in NumPy and SciPy
Effective Numerical Computation in NumPy and SciPy
 
A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...
 
ECCV2010: feature learning for image classification, part 4
ECCV2010: feature learning for image classification, part 4ECCV2010: feature learning for image classification, part 4
ECCV2010: feature learning for image classification, part 4
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
50120130405004 2
50120130405004 250120130405004 2
50120130405004 2
 

More from Sharbani Bhattacharya

Biometric authentication green apple computer learning
Biometric authentication green apple computer learningBiometric authentication green apple computer learning
Biometric authentication green apple computer learningSharbani Bhattacharya
 
Sharbani Bhattacharya SE design & Implementation
Sharbani Bhattacharya SE design & ImplementationSharbani Bhattacharya SE design & Implementation
Sharbani Bhattacharya SE design & ImplementationSharbani Bhattacharya
 
Requirement Analysis & Specification sharbani bhattacharya
Requirement Analysis & Specification sharbani bhattacharyaRequirement Analysis & Specification sharbani bhattacharya
Requirement Analysis & Specification sharbani bhattacharyaSharbani Bhattacharya
 
Sharbani bhattacharya Visual Basic User Interface-ii
Sharbani bhattacharya  Visual Basic User Interface-iiSharbani bhattacharya  Visual Basic User Interface-ii
Sharbani bhattacharya Visual Basic User Interface-iiSharbani Bhattacharya
 
Sharbani Bhattacharya VB User Interface1
Sharbani Bhattacharya VB User Interface1Sharbani Bhattacharya VB User Interface1
Sharbani Bhattacharya VB User Interface1Sharbani Bhattacharya
 
Software Metrics & Measurement-Sharbani Bhattacharya
Software Metrics & Measurement-Sharbani BhattacharyaSoftware Metrics & Measurement-Sharbani Bhattacharya
Software Metrics & Measurement-Sharbani BhattacharyaSharbani Bhattacharya
 
SE Introduction sharbani bhattacharya
SE Introduction sharbani bhattacharyaSE Introduction sharbani bhattacharya
SE Introduction sharbani bhattacharyaSharbani Bhattacharya
 
Sharbani bhattacharya Macromedia-flash
Sharbani bhattacharya Macromedia-flashSharbani bhattacharya Macromedia-flash
Sharbani bhattacharya Macromedia-flashSharbani Bhattacharya
 

More from Sharbani Bhattacharya (20)

Biometric authentication green apple computer learning
Biometric authentication green apple computer learningBiometric authentication green apple computer learning
Biometric authentication green apple computer learning
 
Javascript
JavascriptJavascript
Javascript
 
PHP programmimg
PHP programmimgPHP programmimg
PHP programmimg
 
Sharbani Bhattacharya SE design & Implementation
Sharbani Bhattacharya SE design & ImplementationSharbani Bhattacharya SE design & Implementation
Sharbani Bhattacharya SE design & Implementation
 
Visual Basic –User Interface- V
Visual Basic –User Interface- VVisual Basic –User Interface- V
Visual Basic –User Interface- V
 
Visual Basic User Interface-VI
Visual Basic User Interface-VIVisual Basic User Interface-VI
Visual Basic User Interface-VI
 
Microsoft Front Page
Microsoft Front PageMicrosoft Front Page
Microsoft Front Page
 
Visual Basic User Interface-III
Visual Basic User Interface-IIIVisual Basic User Interface-III
Visual Basic User Interface-III
 
Visual Basic User Interface -IV
Visual Basic User Interface -IVVisual Basic User Interface -IV
Visual Basic User Interface -IV
 
Requirement Analysis & Specification sharbani bhattacharya
Requirement Analysis & Specification sharbani bhattacharyaRequirement Analysis & Specification sharbani bhattacharya
Requirement Analysis & Specification sharbani bhattacharya
 
Estimation sharbani bhattacharya
Estimation sharbani bhattacharyaEstimation sharbani bhattacharya
Estimation sharbani bhattacharya
 
Sharbani bhattacharya Visual Basic User Interface-ii
Sharbani bhattacharya  Visual Basic User Interface-iiSharbani bhattacharya  Visual Basic User Interface-ii
Sharbani bhattacharya Visual Basic User Interface-ii
 
Sharbani Bhattacharya VB User Interface1
Sharbani Bhattacharya VB User Interface1Sharbani Bhattacharya VB User Interface1
Sharbani Bhattacharya VB User Interface1
 
Sharbani bhattacharya VB Structures
Sharbani bhattacharya VB StructuresSharbani bhattacharya VB Structures
Sharbani bhattacharya VB Structures
 
Software Metrics & Measurement-Sharbani Bhattacharya
Software Metrics & Measurement-Sharbani BhattacharyaSoftware Metrics & Measurement-Sharbani Bhattacharya
Software Metrics & Measurement-Sharbani Bhattacharya
 
Slcm sharbani bhattacharya
Slcm sharbani bhattacharyaSlcm sharbani bhattacharya
Slcm sharbani bhattacharya
 
SE Introduction sharbani bhattacharya
SE Introduction sharbani bhattacharyaSE Introduction sharbani bhattacharya
SE Introduction sharbani bhattacharya
 
Sharbani bhattacharya Macromedia-flash
Sharbani bhattacharya Macromedia-flashSharbani bhattacharya Macromedia-flash
Sharbani bhattacharya Macromedia-flash
 
Sharbani bhattacharya Visual Basic
Sharbani bhattacharya Visual BasicSharbani bhattacharya Visual Basic
Sharbani bhattacharya Visual Basic
 
Sharbani bhattacharya gyanodya 2014
Sharbani bhattacharya gyanodya 2014Sharbani bhattacharya gyanodya 2014
Sharbani bhattacharya gyanodya 2014
 

Recently uploaded

Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Sharbani bhattacharya sacta 2014

  • 1. Watermarking Digital Image Using Fuzzy Matrix Rules SACTA 2014 19th April 2014 ITS , Ghaziabad
  • 2. Watermarking is done in digital images for authentication and to restrict its unauthorized usages. There are two kinds of watermark Visible Invisible
  • 3. Watermarking are sometimes invisible and can be extracted only by authenticated party i.e . It is encrypted with public key –private key method.
  • 4. There are various method of encryption like DES, RSA, Deffie - Hellman and etc. In this paper Encryption is done using Fuzzy Matrix.
  • 5. The Fuzzy rules are consisting of rules defined on fuzzy set. Fuzzy set are acquired from Crisp Set(say any algebraic set) using membership function.  This process is known as Fuzzification. Converting fuzzy set to Crisp set is called Defuzzification.
  • 6. Fuzzy set has members which can take values 0 to 1. Thus, Fuzzy set A values like A= {0.2/x1 , 0.3/x2 , 0.4/x3}.
  • 7. This means 0.2 is membership value of x1 in set A  0.3 membership value for x2  0.4 membership value for x3 in set A
  • 8. Max-Min Fuzzy Composition Max-Product Fuzzy Composition Min-Max Fuzzy Composition Min-Product Fuzzy Composition
  • 9.  Max-Mod-Minus Fuzzy Composition Complimentary-Sum-Minus Fuzzy Composition
  • 10. Let A, B and C are fuzzy set with A(x1,x2), B(y1,y2) and C(z1,z2)  µA,B(x1,y1)=0.2  µA,B (x1,y2)=0.3  µA,B (x2,y1)=0.2  µA,B (x2,y2)=0.4  µB,C (y1,z1)=0.3  µB,C (y1,z2)=0.5  µB,C (y2,z1)=0.2  µB,C (y2,z2)=0.2
  • 11.  µA,C (x1,z1)= max{|µA,B(x1,y1)-µB,C (y1,z1)|, | µA,B (x1,y2) - µB,C (y2,z1) |}=0.1  µA,C (x1,z2)= max{|µA,B(x1,y1) -µB,C (y1,z2) |,|µA,B (x1,y2) - µB,C (y2,z2)|}=0.3  µA,C (x2,z1)= max{|µA,B (x2,y1) , µB,C (y1,z1)|, |µA,B (x2,y2) - µB,C (y2,z1)|}=0.2  µA,C (x2,z2)= max{|µA,B (x2,y1) ,µB,C (y1,z2)|, |µA,B (x2,y2) - µB,C (y2,z2)|}=0.3
  • 12.  µA,B(x1,y1)=0.2  µA,B (x1,y2)=0.3  µA,B (x2,y1)=0.2  µA,B (x2,y2)=0.4  µB,C (y1,z1)=0.3  µB,C (y1,z2)=0.5  µB,C (y2,z1)=0.2  µB,C (y2,z2)=0.2
  • 13.  µA,C (x1,z1)= |1-{|µA,B(x1,y1) -µB,C (y1,z1)|+ | µA,B (x1,y2) - µB,C (y2,z1) |}|=0.8  µA,C (x1,z2)= |1-{|µA,B(x1,y1) -µB,C (y1,z2) |+|µA,B (x1,y2) - µB,C (y2,z2)|}|=0.6  µA,C (x2,z1)= |1-{|µA,B (x2,y1) - µB,C (y1,z1)| +|µA,B (x2,y2) - µB,C (y2,z1)|}|=0.7  µA,C (x2,z2)= |1-{|µA,B (x2,y1) -µB,C (y1,z2)|+ |µA,B (x2,y2) - µB,C (y2,z2)|}|=0.5
  • 14.
  • 15.  Step 1:Choose one Fuzzy matrix appropriate for encryption according to the file size. It is public key.  Step2: Select one fuzzy matrix from database.  Step3: Find the Fuzzy Compliment-Sum-Minus Matrix.  Step3: Generate random number using Fuzzy  Step4: Retrieve the encrypted text/files.
  • 16.
  • 17. Decryption algorithm is used decrypt the encrypted file. The following algorithm is used-  Step1: Collect the encrypted four parts from four different embedded region of image and combine to for one file.  Step2:Use Private key Fuzzy matrix key for decryption.  Step3: Break the file into same four parts with appropriate values of fraction of Fuzzy Matrix elements.  Step4: Retrieve the original file.
  • 18.  Encrypted file is divided into four parts and b11, b12, b21 and b22.  The four encrypted files are embedded in digital image as watermark using appropriate fuzzy rule.  Max-Mod-Minus Fuzzy matrices and Complimentary-Sum-Minus Fuzzy matrices rules are chosen according to suitability.
  • 19.  The two fuzzy matrices obtained as public key and private key are first used for encrypting watermark.  For embedding the various compositions of fuzzy matrices are used.  The encrypted four parts of file are inserted at four places of digital image using the most suitable fuzzy matrix composition obtained using same keys.
  • 20. 3(a) 3(b) 3(c) 3(d) Figure 3 (a)Original Image peppers.tif (b)Watermarked using Fuzzy Max-Mod-Minus matrix (c) Fuzzy Min-Max Matrices (d) Fuzzy Compliment-Sum-Minus Matrix using the two fuzzy matrices
  • 21. 4(a) 4(b) Figure 4(a) Original image lena.gif 4(b) Watermarked using Fuzzy Max-Mod-Minus matrix lena.gif
  • 22. 5(a) 5(b) 5(a) Original Image Mypic.jpg (b) Watermarked using Fuzzy Max-Mod-Minus Matrix
  • 23.  The digital images are watermarked with encrypted files in order to have invisible watermark.  The watermark are encrypted and decrypted to see the image is authentic or it is tried to tamper.  The above method is robust as the keys used as public keys does not lead to any clue for private keys.
  • 24.  It can restrain attacks like compression, geometric filters and noise filters.  The watermark is robust against changes in file format.  This embedding method can be used for all file formats.