SlideShare une entreprise Scribd logo
1  sur  18
Feature Region Set for
Digital Image Watermarking
PRALIN PAVITHRAN
ME- MECHATRONICS
EMAIL :pralinpavithran@gmail.com

10/20/2013

copyright protected (c)
AIM


After watermarked to preserve the original image
quality.



Multi-dimensional knapsack problem technique .

10/20/2013

copyright protected (c)
INTRODUCTION


Before watermarking to select the high freguency
by using Harris laplican transform.



Attacks which attempt to destroy watermarks can
be classified into two types,
1. Noise-like signal processing.
2. Geometric distortions.

10/20/2013

copyright protected (c)
LITERATURE SURVEY

10/20/2013

copyright protected (c)
1.Secure spread Spectrum watermarking for multimedia.
This paper presents a secure (tamper-resistant) algorithm
for watermarking images, and a methodology for digital
watermarking that may be generalized to audio, video, and
multimedia data. Advocate that a watermark should be
constructed as an independent and identically distributed
Gaussian random vector that is imperceptibly inserted in a
spread-spectrum-like fashion into the perceptually most
significant spectral components of the data.

ADVANTAGE:
Two watermarking approaches executed properly.

DRAWBACK:
Detect the watermarked image, again shows as
original as watermarked. 10/20/2013 copyright protected (c)
2. Cocktail watermarking for digital image protection.
A novel image protection scheme called “cocktail
watermarking” is proposed in this paper. We analyze and point
out the inadequacy of the modulation techniques commonly used
in ordinary spread spectrum watermarking methods and the
visual model-based ones. To resolve the inadequacy, two
watermarks which play complementary roles are simultaneously
embedded into a host image is remarkably effective in resisting
various attacks, including combined ones.
ADVANTAGE:
It is secure algorithm for watermarking images.
DRAWBACK:
The original image is not available after watermarked
extraction.
10/20/2013

copyright protected (c)
3. Digital watermarking robust to geometric distortions.
In this paper, we present two watermarking approaches
that are robust to geometric distortions. The first approach is
based on image normalization, in which both watermark
embedding and extraction are carried out with respect to an
image normalized to meet a set of predefined moment criteria.
ADVANTAGE:
Two watermarking approaches executed properly.
DRAWBACK:
Detect the watermarked image, again shows as original
as watermarked.

10/20/2013

copyright protected (c)
4. Image watermarking Algorithm with mathematical
modeling and analysis of the watermarking Processes.
In this paper, a new rotation and scaling invariant image
watermarking scheme is proposed based on rotation invariant
feature and image normalization. A mathematical model is
established to approximate the image based on the mixture
generalized Gaussian distribution, which can facilitate the
analysis of the watermarking processes.

ADVANTAGE:
The rotation invariant features are extracted from the
segmented areas and are selected as reference points.
DRAWBACK:
Difficult to selecting the high frequency region.
10/20/2013

copyright protected (c)
5. A New Approach for Optimal Multiple Watermarks
Injection.
The digital imaging technology has grown explosively
for multimedia applications in recent years. The need for the
copyrighted digitalized media becomes urgent nowadays. An
approach for the digital copyright protection is to employ
advanced watermarking techniques, where watermarks can
reveal the ownership identities. Generally speaking, the
watermarks are embedded into an image or video signals.

ADVANTAGE:
Efficient scale-factor optimization scheme, which can
lead to the maximum overall SNR for both subject signal and
watermarks.
DRAWBACK:
Detect the watermarked image, again shows as original
as watermarked.
10/20/2013

copyright protected (c)
SOFTWARE REQUIRED
 MATLAB 7.5.0( R2007b)

10/20/2013

copyright protected (c)
EXISTING SYSTEM
Robust image watermarking scheme for resisting
geometric attacks and traditional signal processing
attacks simultaneously by two main phases, the feature
point based watermark synchronization and the
Discrete Wavelet Transform (DWT) based watermark
embedding.

10/20/2013

copyright protected (c)
PROPOSED SYSTEM

10/20/2013

copyright protected (c)
10/20/2013

copyright protected (c)
ADVANTAGES


Robust digital image watermarking under the
constraint of preserving image quality.



The robustness against
significantly improved.

10/20/2013

various

copyright protected (c)

attacks

is
APPLICATION


Military purpose.



Authenticated message.



Medical purpose.

10/20/2013

copyright protected (c)
RESULT AND FUTURE SCOPE


From this project the secrete image can be watermarked
into an original image.



Finally to protect the original image, that means to
preserve the image quality as the original image.



In future it will use in company way because the
important documents, file watermark in a path.

10/20/2013

copyright protected (c)
REFERENCE
[1.] Jen-Sheng Tsai, Win-Bin Huang, and Yau-Hwang Ku,” On
the Selection of Optimal Feature Region Set for Robust
Digital Image Watermarking”. IEEE TRANSACTIONS ON
IMAGE PROCESSING, VOL. 20, NO. 3, MARCH 2011.
[2.] C. W. Dang and H. M. Hang, “A feature-based robust
digital image watermarking scheme,” IEEE Trans. Signal
Process., vol. 51, no. 4,pp. 950–959, Apr. 2008.
[3.] D. G. Gowe, “Distinctive image features from scaleinvariant key points,”Int. J. Comput. Vis., vol. 60, no. 2, pp.
91–110, Nov. 2004.
[4.] H. Kellerer, U. Pferschy, and D. Pisinger, “Knapsack
Problems”. Berlin: Springer, 2004.
[5.]F. A. P. Petitcolas, “Watermarking schemes evaluation,”
IEEE Signal Process. Mag., vol. 17, no. 5, pp. 58–64, Sep. 2009.
10/20/2013

copyright protected (c)
10/20/2013

copyright protected (c)

Contenu connexe

Tendances

Watermark
WatermarkWatermark
Watermarkravi33s
 
Digital image processing using matlab
Digital image processing using matlab Digital image processing using matlab
Digital image processing using matlab Amr Rashed
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 
digital image processing
digital image processingdigital image processing
digital image processingN.CH Karthik
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesPrashant Singh
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageIOSR Journals
 
DCT image compression
DCT image compressionDCT image compression
DCT image compressionyoussef ramzy
 
Digital image processing
Digital image processingDigital image processing
Digital image processingmanpreetgrewal
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image ProcessingAzharo7
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java projectTutorial Learners
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Real Time Object Dectection using machine learning
Real Time Object Dectection using machine learningReal Time Object Dectection using machine learning
Real Time Object Dectection using machine learningpratik pratyay
 
OpenCV presentation series- part 1
OpenCV presentation series- part 1OpenCV presentation series- part 1
OpenCV presentation series- part 1Sairam Adithya
 

Tendances (20)

Watermark
WatermarkWatermark
Watermark
 
Digital image processing using matlab
Digital image processing using matlab Digital image processing using matlab
Digital image processing using matlab
 
Watermark
WatermarkWatermark
Watermark
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
digital image processing
digital image processingdigital image processing
digital image processing
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
DCT image compression
DCT image compressionDCT image compression
DCT image compression
 
Digital image processing
Digital image processingDigital image processing
Digital image processing
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Real Time Object Dectection using machine learning
Real Time Object Dectection using machine learningReal Time Object Dectection using machine learning
Real Time Object Dectection using machine learning
 
OpenCV presentation series- part 1
OpenCV presentation series- part 1OpenCV presentation series- part 1
OpenCV presentation series- part 1
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
point operations in image processing
point operations in image processingpoint operations in image processing
point operations in image processing
 

En vedette

Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarkingJasni Zain
 
A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...Editor IJCATR
 
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...Shalu Singh
 
عشر مشروعات ناشئة من منطقة الشرق الأوسط
عشر مشروعات ناشئة من منطقة الشرق الأوسط عشر مشروعات ناشئة من منطقة الشرق الأوسط
عشر مشروعات ناشئة من منطقة الشرق الأوسط MOTC Qatar
 
Data hiding using image interpolation
Data hiding using image interpolationData hiding using image interpolation
Data hiding using image interpolationVikrant Arya
 
Watermarking & Encryption
Watermarking & EncryptionWatermarking & Encryption
Watermarking & EncryptionHossam Halapi
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionPapitha Velumani
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniquesprashant3535
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
 
امن الوثائق والمعلومات عرض تقديمى
امن الوثائق والمعلومات عرض تقديمىامن الوثائق والمعلومات عرض تقديمى
امن الوثائق والمعلومات عرض تقديمىNasser Shafik
 
امن المعلومات
امن المعلوماتامن المعلومات
امن المعلوماتToto Tarik
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 

En vedette (14)

Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarking
 
A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...
 
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
 
عشر مشروعات ناشئة من منطقة الشرق الأوسط
عشر مشروعات ناشئة من منطقة الشرق الأوسط عشر مشروعات ناشئة من منطقة الشرق الأوسط
عشر مشروعات ناشئة من منطقة الشرق الأوسط
 
Data hiding using image interpolation
Data hiding using image interpolationData hiding using image interpolation
Data hiding using image interpolation
 
Watermarking & Encryption
Watermarking & EncryptionWatermarking & Encryption
Watermarking & Encryption
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
امن الوثائق والمعلومات عرض تقديمى
امن الوثائق والمعلومات عرض تقديمىامن الوثائق والمعلومات عرض تقديمى
امن الوثائق والمعلومات عرض تقديمى
 
امن المعلومات
امن المعلوماتامن المعلومات
امن المعلومات
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 

Similaire à Digital Image Watermarking

SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
 
A130104
A130104A130104
A130104irjes
 
A130104
A130104A130104
A130104irjes
 
Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd Iaetsd
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingEditor IJMTER
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET Journal
 
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET Journal
 
Reversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting TechniqueReversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET Journal
 
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...CSCJournals
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...IRJET Journal
 
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...csandit
 
Robust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueRobust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueCSCJournals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH acijjournal
 

Similaire à Digital Image Watermarking (20)

[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
 
A130104
A130104A130104
A130104
 
A130104
A130104A130104
A130104
 
Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
 
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
 
Reversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting TechniqueReversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting Technique
 
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
 
1820 1824
1820 18241820 1824
1820 1824
 
1820 1824
1820 18241820 1824
1820 1824
 
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
 
Robust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet TechniqueRobust Image Watermarking Scheme Based on Wavelet Technique
Robust Image Watermarking Scheme Based on Wavelet Technique
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
50120140506015
5012014050601550120140506015
50120140506015
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
 

Dernier

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 

Dernier (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 

Digital Image Watermarking

  • 1. Feature Region Set for Digital Image Watermarking PRALIN PAVITHRAN ME- MECHATRONICS EMAIL :pralinpavithran@gmail.com 10/20/2013 copyright protected (c)
  • 2. AIM  After watermarked to preserve the original image quality.  Multi-dimensional knapsack problem technique . 10/20/2013 copyright protected (c)
  • 3. INTRODUCTION  Before watermarking to select the high freguency by using Harris laplican transform.  Attacks which attempt to destroy watermarks can be classified into two types, 1. Noise-like signal processing. 2. Geometric distortions. 10/20/2013 copyright protected (c)
  • 5. 1.Secure spread Spectrum watermarking for multimedia. This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. Advocate that a watermark should be constructed as an independent and identically distributed Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. ADVANTAGE: Two watermarking approaches executed properly. DRAWBACK: Detect the watermarked image, again shows as original as watermarked. 10/20/2013 copyright protected (c)
  • 6. 2. Cocktail watermarking for digital image protection. A novel image protection scheme called “cocktail watermarking” is proposed in this paper. We analyze and point out the inadequacy of the modulation techniques commonly used in ordinary spread spectrum watermarking methods and the visual model-based ones. To resolve the inadequacy, two watermarks which play complementary roles are simultaneously embedded into a host image is remarkably effective in resisting various attacks, including combined ones. ADVANTAGE: It is secure algorithm for watermarking images. DRAWBACK: The original image is not available after watermarked extraction. 10/20/2013 copyright protected (c)
  • 7. 3. Digital watermarking robust to geometric distortions. In this paper, we present two watermarking approaches that are robust to geometric distortions. The first approach is based on image normalization, in which both watermark embedding and extraction are carried out with respect to an image normalized to meet a set of predefined moment criteria. ADVANTAGE: Two watermarking approaches executed properly. DRAWBACK: Detect the watermarked image, again shows as original as watermarked. 10/20/2013 copyright protected (c)
  • 8. 4. Image watermarking Algorithm with mathematical modeling and analysis of the watermarking Processes. In this paper, a new rotation and scaling invariant image watermarking scheme is proposed based on rotation invariant feature and image normalization. A mathematical model is established to approximate the image based on the mixture generalized Gaussian distribution, which can facilitate the analysis of the watermarking processes. ADVANTAGE: The rotation invariant features are extracted from the segmented areas and are selected as reference points. DRAWBACK: Difficult to selecting the high frequency region. 10/20/2013 copyright protected (c)
  • 9. 5. A New Approach for Optimal Multiple Watermarks Injection. The digital imaging technology has grown explosively for multimedia applications in recent years. The need for the copyrighted digitalized media becomes urgent nowadays. An approach for the digital copyright protection is to employ advanced watermarking techniques, where watermarks can reveal the ownership identities. Generally speaking, the watermarks are embedded into an image or video signals. ADVANTAGE: Efficient scale-factor optimization scheme, which can lead to the maximum overall SNR for both subject signal and watermarks. DRAWBACK: Detect the watermarked image, again shows as original as watermarked. 10/20/2013 copyright protected (c)
  • 10. SOFTWARE REQUIRED  MATLAB 7.5.0( R2007b) 10/20/2013 copyright protected (c)
  • 11. EXISTING SYSTEM Robust image watermarking scheme for resisting geometric attacks and traditional signal processing attacks simultaneously by two main phases, the feature point based watermark synchronization and the Discrete Wavelet Transform (DWT) based watermark embedding. 10/20/2013 copyright protected (c)
  • 14. ADVANTAGES  Robust digital image watermarking under the constraint of preserving image quality.  The robustness against significantly improved. 10/20/2013 various copyright protected (c) attacks is
  • 16. RESULT AND FUTURE SCOPE  From this project the secrete image can be watermarked into an original image.  Finally to protect the original image, that means to preserve the image quality as the original image.  In future it will use in company way because the important documents, file watermark in a path. 10/20/2013 copyright protected (c)
  • 17. REFERENCE [1.] Jen-Sheng Tsai, Win-Bin Huang, and Yau-Hwang Ku,” On the Selection of Optimal Feature Region Set for Robust Digital Image Watermarking”. IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 3, MARCH 2011. [2.] C. W. Dang and H. M. Hang, “A feature-based robust digital image watermarking scheme,” IEEE Trans. Signal Process., vol. 51, no. 4,pp. 950–959, Apr. 2008. [3.] D. G. Gowe, “Distinctive image features from scaleinvariant key points,”Int. J. Comput. Vis., vol. 60, no. 2, pp. 91–110, Nov. 2004. [4.] H. Kellerer, U. Pferschy, and D. Pisinger, “Knapsack Problems”. Berlin: Springer, 2004. [5.]F. A. P. Petitcolas, “Watermarking schemes evaluation,” IEEE Signal Process. Mag., vol. 17, no. 5, pp. 58–64, Sep. 2009. 10/20/2013 copyright protected (c)