SlideShare a Scribd company logo
1 of 18
Feature Region Set for
Digital Image Watermarking
PRALIN PAVITHRAN
ME- MECHATRONICS
EMAIL :pralinpavithran@gmail.com

10/20/2013

copyright protected (c)
AIM


After watermarked to preserve the original image
quality.



Multi-dimensional knapsack problem technique .

10/20/2013

copyright protected (c)
INTRODUCTION


Before watermarking to select the high freguency
by using Harris laplican transform.



Attacks which attempt to destroy watermarks can
be classified into two types,
1. Noise-like signal processing.
2. Geometric distortions.

10/20/2013

copyright protected (c)
LITERATURE SURVEY

10/20/2013

copyright protected (c)
1.Secure spread Spectrum watermarking for multimedia.
This paper presents a secure (tamper-resistant) algorithm
for watermarking images, and a methodology for digital
watermarking that may be generalized to audio, video, and
multimedia data. Advocate that a watermark should be
constructed as an independent and identically distributed
Gaussian random vector that is imperceptibly inserted in a
spread-spectrum-like fashion into the perceptually most
significant spectral components of the data.

ADVANTAGE:
Two watermarking approaches executed properly.

DRAWBACK:
Detect the watermarked image, again shows as
original as watermarked. 10/20/2013 copyright protected (c)
2. Cocktail watermarking for digital image protection.
A novel image protection scheme called “cocktail
watermarking” is proposed in this paper. We analyze and point
out the inadequacy of the modulation techniques commonly used
in ordinary spread spectrum watermarking methods and the
visual model-based ones. To resolve the inadequacy, two
watermarks which play complementary roles are simultaneously
embedded into a host image is remarkably effective in resisting
various attacks, including combined ones.
ADVANTAGE:
It is secure algorithm for watermarking images.
DRAWBACK:
The original image is not available after watermarked
extraction.
10/20/2013

copyright protected (c)
3. Digital watermarking robust to geometric distortions.
In this paper, we present two watermarking approaches
that are robust to geometric distortions. The first approach is
based on image normalization, in which both watermark
embedding and extraction are carried out with respect to an
image normalized to meet a set of predefined moment criteria.
ADVANTAGE:
Two watermarking approaches executed properly.
DRAWBACK:
Detect the watermarked image, again shows as original
as watermarked.

10/20/2013

copyright protected (c)
4. Image watermarking Algorithm with mathematical
modeling and analysis of the watermarking Processes.
In this paper, a new rotation and scaling invariant image
watermarking scheme is proposed based on rotation invariant
feature and image normalization. A mathematical model is
established to approximate the image based on the mixture
generalized Gaussian distribution, which can facilitate the
analysis of the watermarking processes.

ADVANTAGE:
The rotation invariant features are extracted from the
segmented areas and are selected as reference points.
DRAWBACK:
Difficult to selecting the high frequency region.
10/20/2013

copyright protected (c)
5. A New Approach for Optimal Multiple Watermarks
Injection.
The digital imaging technology has grown explosively
for multimedia applications in recent years. The need for the
copyrighted digitalized media becomes urgent nowadays. An
approach for the digital copyright protection is to employ
advanced watermarking techniques, where watermarks can
reveal the ownership identities. Generally speaking, the
watermarks are embedded into an image or video signals.

ADVANTAGE:
Efficient scale-factor optimization scheme, which can
lead to the maximum overall SNR for both subject signal and
watermarks.
DRAWBACK:
Detect the watermarked image, again shows as original
as watermarked.
10/20/2013

copyright protected (c)
SOFTWARE REQUIRED
 MATLAB 7.5.0( R2007b)

10/20/2013

copyright protected (c)
EXISTING SYSTEM
Robust image watermarking scheme for resisting
geometric attacks and traditional signal processing
attacks simultaneously by two main phases, the feature
point based watermark synchronization and the
Discrete Wavelet Transform (DWT) based watermark
embedding.

10/20/2013

copyright protected (c)
PROPOSED SYSTEM

10/20/2013

copyright protected (c)
10/20/2013

copyright protected (c)
ADVANTAGES


Robust digital image watermarking under the
constraint of preserving image quality.



The robustness against
significantly improved.

10/20/2013

various

copyright protected (c)

attacks

is
APPLICATION


Military purpose.



Authenticated message.



Medical purpose.

10/20/2013

copyright protected (c)
RESULT AND FUTURE SCOPE


From this project the secrete image can be watermarked
into an original image.



Finally to protect the original image, that means to
preserve the image quality as the original image.



In future it will use in company way because the
important documents, file watermark in a path.

10/20/2013

copyright protected (c)
REFERENCE
[1.] Jen-Sheng Tsai, Win-Bin Huang, and Yau-Hwang Ku,” On
the Selection of Optimal Feature Region Set for Robust
Digital Image Watermarking”. IEEE TRANSACTIONS ON
IMAGE PROCESSING, VOL. 20, NO. 3, MARCH 2011.
[2.] C. W. Dang and H. M. Hang, “A feature-based robust
digital image watermarking scheme,” IEEE Trans. Signal
Process., vol. 51, no. 4,pp. 950–959, Apr. 2008.
[3.] D. G. Gowe, “Distinctive image features from scaleinvariant key points,”Int. J. Comput. Vis., vol. 60, no. 2, pp.
91–110, Nov. 2004.
[4.] H. Kellerer, U. Pferschy, and D. Pisinger, “Knapsack
Problems”. Berlin: Springer, 2004.
[5.]F. A. P. Petitcolas, “Watermarking schemes evaluation,”
IEEE Signal Process. Mag., vol. 17, no. 5, pp. 58–64, Sep. 2009.
10/20/2013

copyright protected (c)
10/20/2013

copyright protected (c)

More Related Content

What's hot

CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
Fields of digital image processing slides
Fields of digital image processing slidesFields of digital image processing slides
Fields of digital image processing slidesSrinath Dhayalamoorthy
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessingQaisar Ayub
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detectionncct
 
Hologram presentation
Hologram presentationHologram presentation
Hologram presentationgopipoppy
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwtIAEME Publication
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of soundVikram Verma
 
Suspicious Activity Detection
Suspicious Activity DetectionSuspicious Activity Detection
Suspicious Activity DetectionMushahid Ali
 
An analysis of digital watermarking in frequency domain
An analysis of digital watermarking in frequency domainAn analysis of digital watermarking in frequency domain
An analysis of digital watermarking in frequency domainLikan Patra
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingrupareliab14
 

What's hot (20)

Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Fields of digital image processing slides
Fields of digital image processing slidesFields of digital image processing slides
Fields of digital image processing slides
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Fog computing
Fog computingFog computing
Fog computing
 
Hologram presentation
Hologram presentationHologram presentation
Hologram presentation
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwt
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of sound
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Suspicious Activity Detection
Suspicious Activity DetectionSuspicious Activity Detection
Suspicious Activity Detection
 
An analysis of digital watermarking in frequency domain
An analysis of digital watermarking in frequency domainAn analysis of digital watermarking in frequency domain
An analysis of digital watermarking in frequency domain
 
image compression ppt
image compression pptimage compression ppt
image compression ppt
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
3D internet
3D internet3D internet
3D internet
 

Viewers also liked

Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarkingJasni Zain
 
A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...Editor IJCATR
 
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...Shalu Singh
 
عشر مشروعات ناشئة من منطقة الشرق الأوسط
عشر مشروعات ناشئة من منطقة الشرق الأوسط عشر مشروعات ناشئة من منطقة الشرق الأوسط
عشر مشروعات ناشئة من منطقة الشرق الأوسط MOTC Qatar
 
Data hiding using image interpolation
Data hiding using image interpolationData hiding using image interpolation
Data hiding using image interpolationVikrant Arya
 
Watermarking & Encryption
Watermarking & EncryptionWatermarking & Encryption
Watermarking & EncryptionHossam Halapi
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionPapitha Velumani
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniquesprashant3535
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
 
امن الوثائق والمعلومات عرض تقديمى
امن الوثائق والمعلومات عرض تقديمىامن الوثائق والمعلومات عرض تقديمى
امن الوثائق والمعلومات عرض تقديمىNasser Shafik
 
امن المعلومات
امن المعلوماتامن المعلومات
امن المعلوماتToto Tarik
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 

Viewers also liked (14)

Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarking
 
A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...
 
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
 
عشر مشروعات ناشئة من منطقة الشرق الأوسط
عشر مشروعات ناشئة من منطقة الشرق الأوسط عشر مشروعات ناشئة من منطقة الشرق الأوسط
عشر مشروعات ناشئة من منطقة الشرق الأوسط
 
Data hiding using image interpolation
Data hiding using image interpolationData hiding using image interpolation
Data hiding using image interpolation
 
Watermarking & Encryption
Watermarking & EncryptionWatermarking & Encryption
Watermarking & Encryption
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
امن الوثائق والمعلومات عرض تقديمى
امن الوثائق والمعلومات عرض تقديمىامن الوثائق والمعلومات عرض تقديمى
امن الوثائق والمعلومات عرض تقديمى
 
امن المعلومات
امن المعلوماتامن المعلومات
امن المعلومات
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 

Similar to Digital Image Watermarking

SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
 
A130104
A130104A130104
A130104irjes
 
A130104
A130104A130104
A130104irjes
 
Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd Iaetsd
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingEditor IJMTER
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET Journal
 
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET Journal
 
Reversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting TechniqueReversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET Journal
 
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...CSCJournals
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...IRJET Journal
 
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...csandit
 
Robust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueRobust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueCSCJournals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH acijjournal
 

Similar to Digital Image Watermarking (20)

[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
 
A130104
A130104A130104
A130104
 
A130104
A130104A130104
A130104
 
Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
 
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
 
Reversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting TechniqueReversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting Technique
 
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
 
1820 1824
1820 18241820 1824
1820 1824
 
1820 1824
1820 18241820 1824
1820 1824
 
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
 
Robust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueRobust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet Technique
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
50120140506015
5012014050601550120140506015
50120140506015
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
 

Recently uploaded

Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 

Recently uploaded (20)

Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 

Digital Image Watermarking

  • 1. Feature Region Set for Digital Image Watermarking PRALIN PAVITHRAN ME- MECHATRONICS EMAIL :pralinpavithran@gmail.com 10/20/2013 copyright protected (c)
  • 2. AIM  After watermarked to preserve the original image quality.  Multi-dimensional knapsack problem technique . 10/20/2013 copyright protected (c)
  • 3. INTRODUCTION  Before watermarking to select the high freguency by using Harris laplican transform.  Attacks which attempt to destroy watermarks can be classified into two types, 1. Noise-like signal processing. 2. Geometric distortions. 10/20/2013 copyright protected (c)
  • 5. 1.Secure spread Spectrum watermarking for multimedia. This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. Advocate that a watermark should be constructed as an independent and identically distributed Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. ADVANTAGE: Two watermarking approaches executed properly. DRAWBACK: Detect the watermarked image, again shows as original as watermarked. 10/20/2013 copyright protected (c)
  • 6. 2. Cocktail watermarking for digital image protection. A novel image protection scheme called “cocktail watermarking” is proposed in this paper. We analyze and point out the inadequacy of the modulation techniques commonly used in ordinary spread spectrum watermarking methods and the visual model-based ones. To resolve the inadequacy, two watermarks which play complementary roles are simultaneously embedded into a host image is remarkably effective in resisting various attacks, including combined ones. ADVANTAGE: It is secure algorithm for watermarking images. DRAWBACK: The original image is not available after watermarked extraction. 10/20/2013 copyright protected (c)
  • 7. 3. Digital watermarking robust to geometric distortions. In this paper, we present two watermarking approaches that are robust to geometric distortions. The first approach is based on image normalization, in which both watermark embedding and extraction are carried out with respect to an image normalized to meet a set of predefined moment criteria. ADVANTAGE: Two watermarking approaches executed properly. DRAWBACK: Detect the watermarked image, again shows as original as watermarked. 10/20/2013 copyright protected (c)
  • 8. 4. Image watermarking Algorithm with mathematical modeling and analysis of the watermarking Processes. In this paper, a new rotation and scaling invariant image watermarking scheme is proposed based on rotation invariant feature and image normalization. A mathematical model is established to approximate the image based on the mixture generalized Gaussian distribution, which can facilitate the analysis of the watermarking processes. ADVANTAGE: The rotation invariant features are extracted from the segmented areas and are selected as reference points. DRAWBACK: Difficult to selecting the high frequency region. 10/20/2013 copyright protected (c)
  • 9. 5. A New Approach for Optimal Multiple Watermarks Injection. The digital imaging technology has grown explosively for multimedia applications in recent years. The need for the copyrighted digitalized media becomes urgent nowadays. An approach for the digital copyright protection is to employ advanced watermarking techniques, where watermarks can reveal the ownership identities. Generally speaking, the watermarks are embedded into an image or video signals. ADVANTAGE: Efficient scale-factor optimization scheme, which can lead to the maximum overall SNR for both subject signal and watermarks. DRAWBACK: Detect the watermarked image, again shows as original as watermarked. 10/20/2013 copyright protected (c)
  • 10. SOFTWARE REQUIRED  MATLAB 7.5.0( R2007b) 10/20/2013 copyright protected (c)
  • 11. EXISTING SYSTEM Robust image watermarking scheme for resisting geometric attacks and traditional signal processing attacks simultaneously by two main phases, the feature point based watermark synchronization and the Discrete Wavelet Transform (DWT) based watermark embedding. 10/20/2013 copyright protected (c)
  • 14. ADVANTAGES  Robust digital image watermarking under the constraint of preserving image quality.  The robustness against significantly improved. 10/20/2013 various copyright protected (c) attacks is
  • 16. RESULT AND FUTURE SCOPE  From this project the secrete image can be watermarked into an original image.  Finally to protect the original image, that means to preserve the image quality as the original image.  In future it will use in company way because the important documents, file watermark in a path. 10/20/2013 copyright protected (c)
  • 17. REFERENCE [1.] Jen-Sheng Tsai, Win-Bin Huang, and Yau-Hwang Ku,” On the Selection of Optimal Feature Region Set for Robust Digital Image Watermarking”. IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 3, MARCH 2011. [2.] C. W. Dang and H. M. Hang, “A feature-based robust digital image watermarking scheme,” IEEE Trans. Signal Process., vol. 51, no. 4,pp. 950–959, Apr. 2008. [3.] D. G. Gowe, “Distinctive image features from scaleinvariant key points,”Int. J. Comput. Vis., vol. 60, no. 2, pp. 91–110, Nov. 2004. [4.] H. Kellerer, U. Pferschy, and D. Pisinger, “Knapsack Problems”. Berlin: Springer, 2004. [5.]F. A. P. Petitcolas, “Watermarking schemes evaluation,” IEEE Signal Process. Mag., vol. 17, no. 5, pp. 58–64, Sep. 2009. 10/20/2013 copyright protected (c)