Академический Документы
Профессиональный Документы
Культура Документы
Presentation on
Problem Definition
Recently Digital Images are utilized in various applications such as:
Types of Images
Medical Image.
Indoor Image.
Outdoor Image.
Satellite Image.
Types of Watermarks
Contd
.
Visible Watermark:
Contd
.
Perceptual Watermark :
A perceptual watermark exploits the aspects of human sensory
system to provide invisible yet robust watermark
Private Watermark :
Private watermarks are also known as secure watermarks.
To read or retrieve such a watermark, it is necessary to have the secret
key.
Fragile Watermark :
Fragile watermarks are also known as tamper-proof watermarks.
Such watermarks are destroyed by data manipulation.
DCT
DWT
FFT
SVD
Combined DWT-DCT
Combined DCT-SVD
Combined DWT-SVD
Combined DCT-FFT
Combined DCT-DWT-SVD
Combined DCT-DWT-FFTSVD
Combination
of one or
more
frequency
domain
Neuro-Fuzzy Network
Using DWT-SVD
Domain
Using DCT-SVD
Domain
Combination of Spatial
Domain Technique and
Adaptive neuro fuzzy
interference system
Proposed System.
Apply
Enhancement
Techniques
Image
Watermark
Embedding
Techniques
Watermarked
Image
Apply
Various
Attacks
Advanced
Encryption
Standard
Algorithm
Encrypted
Watermarked Image
Watermark
Image after
Extraction of
Watermark
Extracted
Watermark
Decryption
Algorithm
Watermark Extraction
Techniques
Decrypted
Watermarked Image
Objectives of Research
Combination of Multiple Techniques Used For Combined
Encryption And Digital Watermarking is to be studied.
To calculate the peak signal to noise ratio of watermarked
image & compare it with covered image.
To calculate the elapsed time during watermark for
insertion and extraction process.
To calculate the imperceptibility and robustness of
watermark image & compare with cover image.
Objectives of Research
To calculate the robustness & good capacity of
image again various attack such as cropping,
compression , rotation,etc.
After calculating the peak signal to noise ratio,
impercepbility ,robustness & good capacity by
using various schemes of digital watermarking
Techniques and comparing their results to see
which is the best scheme that can be used for
security of digital still image.
Implementation Requirement.
Implementation Decision:a. Selection of platform(O.S)
b. Selection of the programming language, tools.
c. Coding guideline to be followed.
. Two types of Implementation requirements:A. Software Requirement.
B. Hardware Requirement.
Software Requirement.
1)The Software chosen for this research is Matlab
(R2010a).
2)Operating System used:Microsoft Window xp (32 bit and 64 bit)
Or
Window-7.
Hardware Requirement
Intel core i3-330 Microprocessor 2.13GHZ.
250 GB Hard Disk.
RAM more than 1 GB.
Key References.
[1]Robust Digital Image Watermarking Scheme with Neural Network and Fuzzy Logic
Approach.by-Nallagarla Ramamurthy, Dr.S.Varadarajan, International Journal of
Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN
2250-2459, Volume 2, Issue 9, September 2012).
[2] A robust and secure watermarking scheme basedon singular values replacement
by-AKSHYA KUMAR GUPTA and MEHUL S RAVAL,Sadhana Vol. 37, Part 4,
August 2012, pp. 425440._c Indian Academy of Sciences.
[3] The Robust Digital Image Watermarking using Quantization and Fuzzy Logic
Approach in DWT Domain. by-Nallagarla Ramamurthy, Dr.S.Varadarajan,
International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 5,
June 2012 www.ijcsn.org ISSN 2277-5420.
[4] A Survey of Digital Watermarking Techniques for Multimedia Data.byFarooqHusain,MITMuradabad,India,MIT International Journal of Electronics and
Communication Engineering, Vol.2,No.1,Jan 2012,PP(37-43).
Key References.
[5] Optimization of Digital Image Watermarking Scheme Using Artificial Intelligent
Technique.By-P.Kumsawat, K. Pasitwilitham, K. Attakitmongcol and A. Srikaew ,
INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTERS IN
SIMULATION Issue 1, Volume 6, 2012.
[6]ADAPTATIVE IMAGEWATERMARKING SCHEME BASED ONNEURAL
NETWORK,by- SAMEH OUESLATI, ADNENE CHERIF and BASSEL
SOLAIMANE, SamehOueslati et al. / International Journal of Engineering Science and
Technology (IJEST), ISSN : 0975-5462 Vol. 3 No. 1 Jan 2011.
[7] ROBUST IMAGE ADAPTIVE WATERMARKING USING FUZZYLOGIC AN
FPGA APPROACH.by-PankajU.Lande Sanjay N. Talbar G.N. Shinde, International
Journal of Signal Processing, Image Processing and Pattern RecognitionVol. 3, No. 4,
December, 2010.
[8] Performance Analysis of Digital Image Watermarking TechniqueCombined
DWT
DCT over individual DWT.By-A.M.Kothari, A.C.Suthar and R.S.Gajre, Published in
International Journal of Advanced Engineering & Applications, Jan. 2010.
Key References.
[9] Comparison of Digital Water Marking methods.by-DarshanaMistry / (IJCSE)
International Journal on Computer Science and EngineeringVol. 02, No. 09, 2010,
2905-2909.
[10] A FUZZY LOGIC APPROACH TO ENCRYPTEDWATERMARKING FOR
STILL IMAGES IN WAVELETDOMAIN ON FPGAby-PankajU.Lande Sanjay N.
Talbar and G.N. ShindeInternational Journal of Signal Processing, Image Processing
and Pattern RecognitionVol. 3, No. 2, June, 2010.
[11] Robust Secure SVD Based DCT DWT Oriented Watermarking Technique for
Image Authentication. S SBedi, Ashwani Kumar, and PiyushKapoor, International
Conference on IT to Celebrate S. Charmonman's 72nd Birthday, March 2009, Thailand.
Key References.
[13] A Digital Watermarking Algorithm Based On DCT and DWT by- Mei Jiansheng, Li
Sukang and Tan Xiaomei, ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CDROM)
Proceedings of the 2009 International Symposium on Web Information Systems and
Applications (WISA09)Nanchang, P. R. China, May 22-24, 2009, pp. 104-107.
[14] Watermarking Algorithm Research andImplementation Based on DCT Block. byGengming Zhu, and Nong Sang, World Academy of Science, Engineering and
Technology 45, 2008.
[17]A
Blind
DCT
Domain
Digital
Watermarking
by-SaeidSaryazdi,
MehrnazDemehriDepartement of Electrical Engineering, University of Kerman, Kerman,
Iran, SETIT2005.
Key References.
[18]. Tsai, M. and H. Hung, 2005. "DCT and DWTbasedImage Watermarking Using
Subsampling,"in Proc. of the 2005 IEEE Fourth Int. Conf. onMachine Learning and Cybernetics,
pp: 5308-5313,China.
[19] Robust DWT-SVD Domain Image Watermarking:Embedding Data in All Frequencies. byEmir Ganic andAhmet M. Eskicioglu, MM&SEC'04, September 2021, 2004, Magdeburg,
Germany. Copyright 2004 ACM 1-58113-854-7/04/0009.
Key References.
[23]. Hsu, C. and J. Wu, 1998. "MultiresolutionWatermarking
for Digital Images," IEEE Trans. OnCircuits and Systems- II,
45(8): 1097-1101.
[25]http://www.tafinn.com/andyfinnus/Writing/Technology/digital_watermarks.htm.
Thank You