Академический Документы
Профессиональный Документы
Культура Документы
N.VIKRAM RAJU
(07U41A0532) V.RAJA
(07U41A0553)
v
v
vWatermark
l Recognizable image or pattern in paper that appears lighter when
viewed by transmitted light.A watermark is often a faded image or
text used as a background of a slide. Watermarks are sometimes
used in the form of a logo, discreetly placed on a slide to brand the
presentation.
Watermark
Watermarkin
Original Watermarked
g
Image Image
Algorithm
Watermarking Process
Classification of Watermarking
Visible Watermarking
vIn Visible Watermarking, the information is visible in the picture or
video. Typically, the information is text or a logo, which identifies
the owner of the media. The image on the right has a visible
watermark. When a television broadcaster adds its logo to the corner
of transmitted video, this also is a visible watermark.
Invisible Watermarking
vIn invisible digital watermarking, information is added as digital data
to audio, picture, or video, but it cannot be perceived as such (although
it may be possible to detect that some amount of information is hidden
in the signal)
Concept Development
vRobust Watermark
l Embedded invisible watermarks.
l Resist to image processing or attacks.
l Used for copyright protection or to verify the ownership.
vFragile Watermark
l Mainly used for the authentication and integrity verification of the images transmitted through internet
has attracted more attention in the research and industrial communities.
l Used for tamper detection
v Blind Watermark (or) Public Watermark
The original signal is not needed during the detection process to detect the mark.
Steganography V/S watermarking
vNo Robustness
Proposed System
vDue to above mentioned failures a new technique has been
proposed so that to cover and maintain the drawbacks prevailed in
the previous system and hence a technique called Fast Hadamard
Transformation(FHT) is proposed.
depends on
Algorithm
+Fragile_WaterMarking()
+Logistic_System()
Login
<<extend>>
Invalid user
Admin
select image folder
Watermark image
Quit
1 : Username
,password()
2 : Verification()
3 : Authorized Person()
5 : Load image()
7 : Change view()
8 : Load Output()
9 : Show Output()
Invalid user
valid user
exit
2. Valid Log In Test: By The Text Screen for The Text Screen for Passed
providing Valid User accepting the text to accepting the text is
name and Password be shown shown
3. Invalid input test: By It will not show It will show error on passed
providing invalid images runtime
input images
4. Valid input test: By It will show images It will show images passed
providing valid input
images(jpeg)
Fig 1 :Test case Report Screen
Applications
v Copyright protection :Digital watermarks can be used to Identify and
protect copyright ownership.
v
v
vAuthentication & integrity verification :
§Watermarks should be able to detect even the slightest
change in the document.
§A unique key associated with the source is used the
create the watermark and then embed in the document.
§This key is then used to extract the watermark and the
integrity of the document verified on the basis of the
integrity of the watermark
Advantages
vFragile Watermarking Algorithm
vCopyright Protection.
vApplicable to all content types (images, documents,
movies, music, TV)
vFHT(Fast Hadamard Transformation)
§ Shorter processing time
§ Invisibility of the watermark guaranteed
§ Increased watermark energy leads to higher robustness
Disadvantages
vThe blind watermarking algorithm which is really robust
is not in existence today.