SlideShare a Scribd company logo
WATERMARKING TECHNIQUES AND
THEIR COMPARISON
By:
Abhijeet Misra
Jaypee Institute of InformationTechnology
Introduction:
 In this project, the proposed method should
provide better security when transmitting or
transferring the data or messages from one
end to another.The main objective of the
project is to hide the message or a secret data
into an image which further act as a carrier of
secret data and to transmit to the destination
securely without any modification.
Summary:
 This project presents a digital image
watermarking based on Least Significant Bits
(LSB), two dimensional discrete wavelet
transform (DWT2), two dimensional discrete
cosines transform (DCT2) and two dimensional
fast Fourier transform (FFT2). Signal to noise
ratio (SNR) and similarity ratio (SR) are
computed to measure image quality for each
transform.This work has been implemented
through MATLAB.

LSB Method
 Information can be inserted directly into
every bit of image information or the more
busy areas of an image can be calculated so
as to hide such messages in less perceptible
parts of an image .
 This section explains how this works for an 8-
bit grayscale image and the possible effects
of altering such an image.The principle of
embedding is fairly simple and effective. If we
use a grayscale bitmap image, which is 8- bit,
. The main algorithm for LSB is :-
.
DWTTechnique:-
 .The basic idea of discrete wavelet transform (DWT)
in image process is to multi-differentiated
decompose the image into sub-image of different
spatial domain and independent frequency district
.Then transform the coefficient of sub-image. After
the original image has been DWT transformed, it is
decomposed into 4 frequency districts which is one
low frequency district(LL) and three high-frequency
districts(LH,HL,HH).
. If the information of low-frequency district is
DWT transformed, the sub-level frequency
district information will be obtained.The
following figure represents the watermarking
system in DWT .
.DCTTechnique:-
 The original image I (to be watermarked) and the watermark image
W are reading. (Both the images may be not of equal size).
 The watermark image resize if necessary to make it size the same of
host image.
 The DCT coefficients for host image and watermark image are found
out.
 The value of embedding factor defined to be suitable for visible
watermarking.
 The DCT coefficient of the host image and watermark image is
modified using the following equation.The IDCT of modified
coefficients give the watermarked image.
.The basic algorithm is displayed in the diagram
below:-
.Quality Measurements:-
 In order to evaluate the quality of watermarked
image, the following signal-to-noise ratio (SNR)
equation is used:
. The number of mismatched data between the
embedded watermark and the extracted watermark
is used to represent the Similarity of watermarks.
The similarity factor of extracted watermark and
original watermark is computed by the following:
 Where and represent the original watermark image
and the extracted watermark image, respectively, M
and N represent the image size.The magnitude
range of SF is [0, 1]
.Comparison between DCT and FFT
 As discussed in two previous chapters we can
note that the DCT and FFT algorithm are the
same.The process doesn’t change; figure 1 on
next page show the summary of insertion and
retrieval of watermark process we can easily
change the type of the transformer.The
different between the two types will appear in
the results,Table 2 show the results.
Contd. Figure 1
.Contd Figure 2
.Conclusions :-
In chapter three and four we discuss watermarking
process in two frequency domain DCT and FFT we
notice that the process is the same but we apply
different transformation, also we can note that the
two method have the same robust for all types of
attack except blurring we can note that FFT more
robust than DCT.
References :
 http://imageprocessingblog.com/digital-
watermarking
 http://www.mathworks.in/matlabcentral/ans
wers/33322-digital-image-watermarking
http://www.alpvision.com/watermarking.html

More Related Content

What's hot

Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
vijay rastogi
 
Digital Image Watermarking
Digital Image WatermarkingDigital Image Watermarking
Digital Image Watermarking
Pralin Pavithran
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
Ankush Kr
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
Qaisar Ayub
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
Sej Visawadia
 
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
Shalu Singh
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwt
IAEME Publication
 
Vidhi's ppt
Vidhi's pptVidhi's ppt
Vidhi's ppt
Vidhi Agarwal
 
Watermark
WatermarkWatermark
Watermark
ravi33s
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
divya sri
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
ncct
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
Jaykrishna Thakkar
 
dwm
dwmdwm
Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....
Arif Ahmed
 
Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—a
Agnianbu Wrong
 
Watermark
WatermarkWatermark
Watermark
Anju Tom
 
Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
Abhishek Mukherjee
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Parag Agarwal
 
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSDIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
debasis sahoo
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Ankush Kr
 

What's hot (20)

Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Digital Image Watermarking
Digital Image WatermarkingDigital Image Watermarking
Digital Image Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwt
 
Vidhi's ppt
Vidhi's pptVidhi's ppt
Vidhi's ppt
 
Watermark
WatermarkWatermark
Watermark
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
dwm
dwmdwm
dwm
 
Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....
 
Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—a
 
Watermark
WatermarkWatermark
Watermark
 
Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSDIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 

Viewers also liked

LSB Brochure ENG.PDF
LSB Brochure ENG.PDFLSB Brochure ENG.PDF
LSB Brochure ENG.PDF
Nadeem Abbas
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
eSAT Journals
 
A blind and robust video watermarking scheme in the DT CWT and SVD domain
A blind and robust video watermarking scheme in the DT CWT and SVD domainA blind and robust video watermarking scheme in the DT CWT and SVD domain
A blind and robust video watermarking scheme in the DT CWT and SVD domain
Abhishek Nath
 
Steganography
Steganography Steganography
Steganography
Prabakara Pandian
 
Wavelet
WaveletWavelet
Wavelet
aiQUANT
 
Wavelet Multi-resolution Analysis of High Frequency FX Rates
Wavelet Multi-resolution Analysis of High Frequency FX RatesWavelet Multi-resolution Analysis of High Frequency FX Rates
Wavelet Multi-resolution Analysis of High Frequency FX Rates
aiQUANT
 
Wavelet transform and its applications in data analysis and signal and image ...
Wavelet transform and its applications in data analysis and signal and image ...Wavelet transform and its applications in data analysis and signal and image ...
Wavelet transform and its applications in data analysis and signal and image ...
Sourjya Dutta
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
Sreelekshmi Sree
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
rupareliab14
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarking
Manjesh Kumar
 
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
International Journal of Technical Research & Application
 
discrete wavelet transform
discrete wavelet transformdiscrete wavelet transform
discrete wavelet transform
piyush_11
 

Viewers also liked (12)

LSB Brochure ENG.PDF
LSB Brochure ENG.PDFLSB Brochure ENG.PDF
LSB Brochure ENG.PDF
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
A blind and robust video watermarking scheme in the DT CWT and SVD domain
A blind and robust video watermarking scheme in the DT CWT and SVD domainA blind and robust video watermarking scheme in the DT CWT and SVD domain
A blind and robust video watermarking scheme in the DT CWT and SVD domain
 
Steganography
Steganography Steganography
Steganography
 
Wavelet
WaveletWavelet
Wavelet
 
Wavelet Multi-resolution Analysis of High Frequency FX Rates
Wavelet Multi-resolution Analysis of High Frequency FX RatesWavelet Multi-resolution Analysis of High Frequency FX Rates
Wavelet Multi-resolution Analysis of High Frequency FX Rates
 
Wavelet transform and its applications in data analysis and signal and image ...
Wavelet transform and its applications in data analysis and signal and image ...Wavelet transform and its applications in data analysis and signal and image ...
Wavelet transform and its applications in data analysis and signal and image ...
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
 
discrete wavelet transform
discrete wavelet transformdiscrete wavelet transform
discrete wavelet transform
 

Similar to Watermarking Techniques

Comparative Study between DCT and Wavelet Transform Based Image Compression A...
Comparative Study between DCT and Wavelet Transform Based Image Compression A...Comparative Study between DCT and Wavelet Transform Based Image Compression A...
Comparative Study between DCT and Wavelet Transform Based Image Compression A...
IOSR Journals
 
I017125357
I017125357I017125357
I017125357
IOSR Journals
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
High Speed and Area Efficient 2D DWT Processor Based Image Compression
High Speed and Area Efficient 2D DWT Processor Based Image CompressionHigh Speed and Area Efficient 2D DWT Processor Based Image Compression
High Speed and Area Efficient 2D DWT Processor Based Image Compression
sipij
 
Architectural implementation of video compression
Architectural implementation of video compressionArchitectural implementation of video compression
Architectural implementation of video compression
iaemedu
 
145 153
145 153145 153
Wavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile DevicesWavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile Devices
csandit
 
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet TransformImage Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
ijbuiiir1
 
H0144952
H0144952H0144952
H0144952
Shetty Brothers
 
3 - A critical review on the usual DCT Implementations (presented in a Malays...
3 - A critical review on the usual DCT Implementations (presented in a Malays...3 - A critical review on the usual DCT Implementations (presented in a Malays...
3 - A critical review on the usual DCT Implementations (presented in a Malays...
Youness Lahdili
 
Image compression using Hybrid wavelet Transform and their Performance Compa...
Image compression using Hybrid wavelet Transform and their  Performance Compa...Image compression using Hybrid wavelet Transform and their  Performance Compa...
Image compression using Hybrid wavelet Transform and their Performance Compa...
IJMER
 
Discrete wavelet transform using matlab
Discrete wavelet transform using matlabDiscrete wavelet transform using matlab
Discrete wavelet transform using matlab
IAEME Publication
 
E017263040
E017263040E017263040
E017263040
IOSR Journals
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
ijctet
 
I3602061067
I3602061067I3602061067
I3602061067
ijceronline
 
G0352039045
G0352039045G0352039045
G0352039045
inventionjournals
 
A COMPARATIVE STUDY OF IMAGE COMPRESSION ALGORITHMS
A COMPARATIVE STUDY OF IMAGE COMPRESSION ALGORITHMSA COMPARATIVE STUDY OF IMAGE COMPRESSION ALGORITHMS
A COMPARATIVE STUDY OF IMAGE COMPRESSION ALGORITHMS
Kate Campbell
 
Neural network based image compression with lifting scheme and rlc
Neural network based image compression with lifting scheme and rlcNeural network based image compression with lifting scheme and rlc
Neural network based image compression with lifting scheme and rlc
eSAT Publishing House
 

Similar to Watermarking Techniques (20)

Comparative Study between DCT and Wavelet Transform Based Image Compression A...
Comparative Study between DCT and Wavelet Transform Based Image Compression A...Comparative Study between DCT and Wavelet Transform Based Image Compression A...
Comparative Study between DCT and Wavelet Transform Based Image Compression A...
 
I017125357
I017125357I017125357
I017125357
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
High Speed and Area Efficient 2D DWT Processor Based Image Compression
High Speed and Area Efficient 2D DWT Processor Based Image CompressionHigh Speed and Area Efficient 2D DWT Processor Based Image Compression
High Speed and Area Efficient 2D DWT Processor Based Image Compression
 
Architectural implementation of video compression
Architectural implementation of video compressionArchitectural implementation of video compression
Architectural implementation of video compression
 
145 153
145 153145 153
145 153
 
Wavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile DevicesWavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile Devices
 
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet TransformImage Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
 
H0144952
H0144952H0144952
H0144952
 
3 - A critical review on the usual DCT Implementations (presented in a Malays...
3 - A critical review on the usual DCT Implementations (presented in a Malays...3 - A critical review on the usual DCT Implementations (presented in a Malays...
3 - A critical review on the usual DCT Implementations (presented in a Malays...
 
Image compression using Hybrid wavelet Transform and their Performance Compa...
Image compression using Hybrid wavelet Transform and their  Performance Compa...Image compression using Hybrid wavelet Transform and their  Performance Compa...
Image compression using Hybrid wavelet Transform and their Performance Compa...
 
Discrete wavelet transform using matlab
Discrete wavelet transform using matlabDiscrete wavelet transform using matlab
Discrete wavelet transform using matlab
 
E017263040
E017263040E017263040
E017263040
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
I3602061067
I3602061067I3602061067
I3602061067
 
G0352039045
G0352039045G0352039045
G0352039045
 
A COMPARATIVE STUDY OF IMAGE COMPRESSION ALGORITHMS
A COMPARATIVE STUDY OF IMAGE COMPRESSION ALGORITHMSA COMPARATIVE STUDY OF IMAGE COMPRESSION ALGORITHMS
A COMPARATIVE STUDY OF IMAGE COMPRESSION ALGORITHMS
 
Neural network based image compression with lifting scheme and rlc
Neural network based image compression with lifting scheme and rlcNeural network based image compression with lifting scheme and rlc
Neural network based image compression with lifting scheme and rlc
 

Recently uploaded

原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
Prakhyath Rai
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
AI for Legal Research with applications, tools
AI for Legal Research with applications, toolsAI for Legal Research with applications, tools
AI for Legal Research with applications, tools
mahaffeycheryld
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
CVCSOfficial
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
edwin408357
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
PIMR BHOPAL
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 

Recently uploaded (20)

原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
AI for Legal Research with applications, tools
AI for Legal Research with applications, toolsAI for Legal Research with applications, tools
AI for Legal Research with applications, tools
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 

Watermarking Techniques

  • 1. WATERMARKING TECHNIQUES AND THEIR COMPARISON By: Abhijeet Misra Jaypee Institute of InformationTechnology
  • 2. Introduction:  In this project, the proposed method should provide better security when transmitting or transferring the data or messages from one end to another.The main objective of the project is to hide the message or a secret data into an image which further act as a carrier of secret data and to transmit to the destination securely without any modification.
  • 3. Summary:  This project presents a digital image watermarking based on Least Significant Bits (LSB), two dimensional discrete wavelet transform (DWT2), two dimensional discrete cosines transform (DCT2) and two dimensional fast Fourier transform (FFT2). Signal to noise ratio (SNR) and similarity ratio (SR) are computed to measure image quality for each transform.This work has been implemented through MATLAB. 
  • 4. LSB Method  Information can be inserted directly into every bit of image information or the more busy areas of an image can be calculated so as to hide such messages in less perceptible parts of an image .  This section explains how this works for an 8- bit grayscale image and the possible effects of altering such an image.The principle of embedding is fairly simple and effective. If we use a grayscale bitmap image, which is 8- bit,
  • 5. . The main algorithm for LSB is :-
  • 6. . DWTTechnique:-  .The basic idea of discrete wavelet transform (DWT) in image process is to multi-differentiated decompose the image into sub-image of different spatial domain and independent frequency district .Then transform the coefficient of sub-image. After the original image has been DWT transformed, it is decomposed into 4 frequency districts which is one low frequency district(LL) and three high-frequency districts(LH,HL,HH).
  • 7. . If the information of low-frequency district is DWT transformed, the sub-level frequency district information will be obtained.The following figure represents the watermarking system in DWT .
  • 8. .DCTTechnique:-  The original image I (to be watermarked) and the watermark image W are reading. (Both the images may be not of equal size).  The watermark image resize if necessary to make it size the same of host image.  The DCT coefficients for host image and watermark image are found out.  The value of embedding factor defined to be suitable for visible watermarking.  The DCT coefficient of the host image and watermark image is modified using the following equation.The IDCT of modified coefficients give the watermarked image.
  • 9. .The basic algorithm is displayed in the diagram below:-
  • 10. .Quality Measurements:-  In order to evaluate the quality of watermarked image, the following signal-to-noise ratio (SNR) equation is used:
  • 11. . The number of mismatched data between the embedded watermark and the extracted watermark is used to represent the Similarity of watermarks. The similarity factor of extracted watermark and original watermark is computed by the following:  Where and represent the original watermark image and the extracted watermark image, respectively, M and N represent the image size.The magnitude range of SF is [0, 1]
  • 12. .Comparison between DCT and FFT  As discussed in two previous chapters we can note that the DCT and FFT algorithm are the same.The process doesn’t change; figure 1 on next page show the summary of insertion and retrieval of watermark process we can easily change the type of the transformer.The different between the two types will appear in the results,Table 2 show the results.
  • 15. .Conclusions :- In chapter three and four we discuss watermarking process in two frequency domain DCT and FFT we notice that the process is the same but we apply different transformation, also we can note that the two method have the same robust for all types of attack except blurring we can note that FFT more robust than DCT.
  • 16. References :  http://imageprocessingblog.com/digital- watermarking  http://www.mathworks.in/matlabcentral/ans wers/33322-digital-image-watermarking http://www.alpvision.com/watermarking.html