Вы находитесь на странице: 1из 37

A Fragile Watermarking Algorithm

Based on Logistic System and JPEG


PRESENTED BY

SUSRUTHA CHINNI KUNA PRAVEENA


(07U41A0548) (07U41A0523)

N.VIKRAM RAJU
(07U41A0532) V.RAJA
(07U41A0553)

Under the Esteemed Guidance of


SRI K.AMARENDRA
Associate Professor & HOD
Department of CSE
What is a Watermark ?

v
v
vWatermark
l Recognizable image or pattern in paper that appears lighter when
viewed by transmitted light.A watermark is often a faded image or
text used as a background of a slide. Watermarks are sometimes
used in the form of a logo, discreetly placed on a slide to brand the
presentation.

Eg: Currency Notes and Logos


What is Digital Watermarking ?

vA digital watermark is a digital signal or pattern inserted into a digital


document such as text, graphics or multimedia, and carries information
unique to the copyright owner, the creator of the document or the
authorized consumer.

vMessage is a group of bits describing information pertaining to the signal


or its author.
v
History of Lena(Lenna)

vLena Sjooblom, (also spelled Lenna by many


publications) was the Playboy playmate in
November 1972 and rose to fame in the
computer world when researchers at
the University of Southern
California scanned and digitized her image in
June 1973.
Working Theme

Watermark

Watermarkin
Original Watermarked
g
Image Image
Algorithm
Watermarking Process
Classification of Watermarking
Visible Watermarking
vIn Visible Watermarking, the information is visible in the picture or
video. Typically, the information is text or a logo, which identifies
the owner of the media. The image on the right has a visible
watermark. When a television broadcaster adds its logo to the corner
of transmitted video, this also is a visible watermark.
Invisible Watermarking
vIn invisible digital watermarking, information is added as digital data
to audio, picture, or video, but it cannot be perceived as such (although
it may be possible to detect that some amount of information is hidden
in the signal)
Concept Development
vRobust Watermark
l Embedded invisible watermarks.
l Resist to image processing or attacks.
l Used for copyright protection or to verify the ownership.

vFragile Watermark
l Mainly used for the authentication and integrity verification of the images transmitted through internet
has attracted more attention in the research and industrial communities.
l Used for tamper detection

vSemi Fragile Watermark


l Sensitive to signal modification
l Feature of both robust & Fragile watermark.
l Provides data authentication



v Blind Watermark (or) Public Watermark
 The original signal is not needed during the detection process to detect the mark.

v Non Blind Watermark (or) Private Watermark


 The original cover signal is required during the detection process.
v Semi –Blind Watermark

§ In Particular some Watermarking Schemes require access to the ‘Published’


watermarked signal ,that is the original signal just adding the Watermark.

v Asymmetric Watermark (or) Public Key Watermark


 The detection process (and in particular the detection key) is fully known to
anyone as opposed to blind watermarking where a secret key is required. So
here, only a 'public key' is needed for verification and a 'private key' (secret) is
used for the embedding though.



Steganography V/S watermarking

vWatermarking the hiding data is used to protect


the original image (e.g. copyright
management)

vSteganography the image is used to protect the


hiding data (e.g. secret message).

Drawbacks of Existing System
vIllegal Copying
v
vFalsification
v
vNo Copyright Protection
v
vNo Ownership Identification

vNo Robustness
Proposed System
vDue to above mentioned failures a new technique has been
proposed so that to cover and maintain the drawbacks prevailed in
the previous system and hence a technique called Fast Hadamard
Transformation(FHT) is proposed.

vThe FHT embedding algorithm was found to provide a robust and


efficient approach to perform digital watermarking of digital image
data for copyright protection and proof of rightful ownership.
Images
Admin
Load image +JPEG
+Username
#password 1 +change_view()
1..*
+Loading()
+verification()
+Tamper_Location()
1

depends on

Algorithm

+Fragile_WaterMarking()
+Logistic_System()

Fig 1:Class Diagram for Fragile Watermarking


System

Login

<<extend>>

Invalid user

Username & password

Admin
select image folder

Change image view

Watermark image

Change the image mode

Quit

Fig 2 : Use Case Diagram for Fragile Watermarking


Login System Algorithm
Admin

1 : Username
,password()
2 : Verification()

3 : Authorized Person()

4 : Select image folder()

5 : Load image()

6 : Apply image view()

7 : Change view()

8 : Load Output()

9 : Show Output()

Fig 3:Sequence Diagram for Fragile Watermarking


Login

Invalid user

valid user

Select image folder

Change image view

Watermark the image

exit

Fig 5:Activity Diagram for Fragile Watermarking


Output Screens

Fig 1: login form for user


Fig 2: Before Importing the images
Fig 3:After Importing the Images
Fig 4 :Adjusting the Mode
Fig 5: Process for applying watermark text to Image
Fig 6: Inserting the Watermark Text to the Selecting Image
Fig 7 : Starting the Progress bar
Fig 8: Watermark Image
Fig 9 : Process to View the Slide Show
Test Case Reports
Test No. Test Case Expected Output Actual Output Result
1. Invalid Log In Test: A dialog Box to be A dialog Box is Passed
By providing invalid displayed saying displayed saying
User name and Invalid Login, Access Invalid Login, Access
Password Denied Denied

2. Valid Log In Test: By The Text Screen for The Text Screen for Passed
providing Valid User accepting the text to accepting the text is
name and Password be shown shown

3. Invalid input test: By It will not show It will show error on passed
providing invalid images runtime
input images

4. Valid input test: By It will show images It will show images passed
providing valid input
images(jpeg)
Fig 1 :Test case Report Screen
Applications
v Copyright protection :Digital watermarks can be used to Identify and
protect copyright ownership.

v Tracking : Digital watermarks can be used to track the usage of digital


content.

v Broadcast Monitoring: Digital watermarks can be used to monitor


broadcasted content like television and broadcast radio.

v Content protection for audio and video content.


v Document and image security.

v
v

vAuthentication & integrity verification :
§Watermarks should be able to detect even the slightest
change in the document.
§A unique key associated with the source is used the
create the watermark and then embed in the document.
§This key is then used to extract the watermark and the
integrity of the document verified on the basis of the
integrity of the watermark
Advantages
vFragile Watermarking Algorithm
vCopyright Protection.
vApplicable to all content types (images, documents,
movies, music, TV)
vFHT(Fast Hadamard Transformation)
§ Shorter processing time
§ Invisibility of the watermark guaranteed
§ Increased watermark energy leads to higher robustness


Disadvantages
vThe blind watermarking algorithm which is really robust
is not in existence today.

vBy knowing the exact content of watermark and


algorithms to embedded and retrieve it.

vHacker can erase the watermark easily ,by knowing the


exact content of watermark and algorithms to
embedded and retrieve it .
Conclusion
v The large need of networked multimedia system has created the need
of COPYRIGHT PROTECTION .It is very important to protect
intellectual properties of digital media.
v Internet playing an important role of digital data
transfer. Digital watermarking is the great solution of the problem
of how to protect copyright. Digital watermarking is the solution
for the protection of legal rights of digital content owner and
customer.
Bibliography

1)R Van Schyndel, A Trikel, C Osborne. A digital watermark. Proceedings of


IEEE International Conference on Image Processing, ICIP1994
2) R Wolfgang, E Delp. A watermark for digital images. Proceedings of the
IEEE International Conference on Image Processing, ICIP1996
3) YU Miao, HE Hongjie, ZHANG Jiashu. A digital authentication
watermarking scheme for JPEG images with superior localization and
security. Science in China Series F: Information Sciences. 2007
4)http://www.Scribd.com
5)http://www.seminarprojects.com
6)http://www.metois.com
e s
r i
u e
Q
n y
A

Вам также может понравиться