SlideShare une entreprise Scribd logo
1  sur  5
Watermark algorithm
•   function [D]=blockdwt2c(A,W);
•
•   [row,col]=size(A);
•
•   Tr=250;
•   k=0.01;
•
•   [ca,ch,cv,cd] = dwt2(A,'Haar');
•   c1 = [ch cv cd];
•
•   %%%%%%Wavelet level 2 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
•
•   [ca1, ch1, cv1, cd1]= dwt2(ca,'Haar');
•
•   c2=[ch1 cv1 cd1];
•
•   [h, w] = size(ca1');
•   [m, n] = size(c2');
•
•   W=dmgb(W,A);
•
•   %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%Here we take the wavelet transform of the
•   %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%watermark
Watermark algorithm
•
•
              continued
    [caa chh cvv cdd]=dwt2(W,'Haar');
•   W=caa;
•   size(W);
•
•   % Adding watermark image.
•
•   for i=1:h
•     for j=1:w
•        if ca1(i,j)>Tr
•           Ca(i,j)=ca1(i,j)+k*W(i,j); % <--------k*abs(double(c1(i,j)))*W(i,j); de olabilir
•        else
•           Ca(i,j)=ca1(i,j);
•        end
•     end
•   end
•
•   % CH1=C1(1:h,1:w);
•   % CV1=C1(1:h,w+1:2*w);
•   % CD1=C1(1:h,2*w+1:3*w);
•
•   D0= double( idwt2(Ca,ch1, cv1, cd1,'Haar') );
•
•   D= double(idwt2(D0, ch, cv, cd, 'Haar'));
Reversing and detecting
    the watermark
            • h = fspecial('gaussian');
                    • >> I2 = imfilter(marked,h);
                    • imshow(uint8(marked)),
                      title('Original Image')
                    • figure, imshow(uint8(I2)),
                      title('Filtered Image')
                    • >> a=I2-image1;
                    • >> [ca ch cv
                      cd]=dwt2(a,'haar');
                    • >> [ca1 ch1 cv1 cd1]=
                      dwt2(ca,'haar');
                    • >> imshow(ca1)
Wavelet watermark level2

Contenu connexe

Tendances

1 borland c++ 5.02 by aramse
1   borland c++ 5.02 by aramse1   borland c++ 5.02 by aramse
1 borland c++ 5.02 by aramse
Aram SE
 
C Prog. - Strings (Updated)
C Prog. - Strings (Updated)C Prog. - Strings (Updated)
C Prog. - Strings (Updated)
vinay arora
 

Tendances (16)

Lab manual operating system [cs 502 rgpv] (usefulsearch.org) (useful search)
Lab manual operating system [cs 502 rgpv] (usefulsearch.org)  (useful search)Lab manual operating system [cs 502 rgpv] (usefulsearch.org)  (useful search)
Lab manual operating system [cs 502 rgpv] (usefulsearch.org) (useful search)
 
C programs
C programsC programs
C programs
 
C programs Set 2
C programs Set 2C programs Set 2
C programs Set 2
 
Programs
ProgramsPrograms
Programs
 
Computer graphics programs in c++
Computer graphics programs in c++Computer graphics programs in c++
Computer graphics programs in c++
 
Critical buckling load geometric nonlinearity analysis of springs with rigid ...
Critical buckling load geometric nonlinearity analysis of springs with rigid ...Critical buckling load geometric nonlinearity analysis of springs with rigid ...
Critical buckling load geometric nonlinearity analysis of springs with rigid ...
 
ADA FILE
ADA FILEADA FILE
ADA FILE
 
Basic program in java
Basic program in java Basic program in java
Basic program in java
 
1 borland c++ 5.02 by aramse
1   borland c++ 5.02 by aramse1   borland c++ 5.02 by aramse
1 borland c++ 5.02 by aramse
 
Daa practicals
Daa practicalsDaa practicals
Daa practicals
 
C- Programs - Harsh
C- Programs - HarshC- Programs - Harsh
C- Programs - Harsh
 
Critical buckling load geometric nonlinearity analysis of springs with rigid ...
Critical buckling load geometric nonlinearity analysis of springs with rigid ...Critical buckling load geometric nonlinearity analysis of springs with rigid ...
Critical buckling load geometric nonlinearity analysis of springs with rigid ...
 
Cpd lecture im 207
Cpd lecture im 207Cpd lecture im 207
Cpd lecture im 207
 
C Prog. - Strings (Updated)
C Prog. - Strings (Updated)C Prog. - Strings (Updated)
C Prog. - Strings (Updated)
 
C Prog - Array
C Prog - ArrayC Prog - Array
C Prog - Array
 
programs
programsprograms
programs
 

Similaire à Wavelet watermark level2

Introducing AlloyUI DiagramBuilder
Introducing AlloyUI DiagramBuilderIntroducing AlloyUI DiagramBuilder
Introducing AlloyUI DiagramBuilder
Eduardo Lundgren
 

Similaire à Wavelet watermark level2 (12)

敵対的生成ネットワークによる食事画像の変換に関する研究
敵対的生成ネットワークによる食事画像の変換に関する研究敵対的生成ネットワークによる食事画像の変換に関する研究
敵対的生成ネットワークによる食事画像の変換に関する研究
 
Image fft
Image fftImage fft
Image fft
 
Cocos2dを使ったゲーム作成の事例
Cocos2dを使ったゲーム作成の事例Cocos2dを使ったゲーム作成の事例
Cocos2dを使ったゲーム作成の事例
 
SwiftUI Animation - The basic overview
SwiftUI Animation - The basic overviewSwiftUI Animation - The basic overview
SwiftUI Animation - The basic overview
 
Task i
Task iTask i
Task i
 
SKV - Blackpool Viral
SKV - Blackpool ViralSKV - Blackpool Viral
SKV - Blackpool Viral
 
Basics of Computer graphics lab
Basics of Computer graphics labBasics of Computer graphics lab
Basics of Computer graphics lab
 
Dynamic programming
Dynamic programmingDynamic programming
Dynamic programming
 
Introducing AlloyUI DiagramBuilder
Introducing AlloyUI DiagramBuilderIntroducing AlloyUI DiagramBuilder
Introducing AlloyUI DiagramBuilder
 
C Code and the Art of Obfuscation
C Code and the Art of ObfuscationC Code and the Art of Obfuscation
C Code and the Art of Obfuscation
 
cocos2d for i Phoneの紹介
cocos2d for i Phoneの紹介cocos2d for i Phoneの紹介
cocos2d for i Phoneの紹介
 
Graphics programs
Graphics programsGraphics programs
Graphics programs
 

Plus de Amr Nasr (15)

Comparison of image fusion methods
Comparison of image fusion methodsComparison of image fusion methods
Comparison of image fusion methods
 
6 big google buys of 2012
6 big google buys of 20126 big google buys of 2012
6 big google buys of 2012
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
Scaling compression2
Scaling compression2Scaling compression2
Scaling compression2
 
Compression one example
Compression one exampleCompression one example
Compression one example
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
Watermark
WatermarkWatermark
Watermark
 
Whitebalance
WhitebalanceWhitebalance
Whitebalance
 
Wavelet
WaveletWavelet
Wavelet
 
Wavelet watermark level3
Wavelet watermark level3Wavelet watermark level3
Wavelet watermark level3
 
Two dimensional true wavelet compression
Two dimensional true wavelet compressionTwo dimensional true wavelet compression
Two dimensional true wavelet compression
 
Image dct shifting
Image dct shiftingImage dct shifting
Image dct shifting
 
Tcp snoop protocols
Tcp snoop protocols  Tcp snoop protocols
Tcp snoop protocols
 
Digital forensics lessons
Digital forensics lessons   Digital forensics lessons
Digital forensics lessons
 
Crypt
CryptCrypt
Crypt
 

Dernier

Dernier (20)

AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 

Wavelet watermark level2

  • 1.
  • 2. Watermark algorithm • function [D]=blockdwt2c(A,W); • • [row,col]=size(A); • • Tr=250; • k=0.01; • • [ca,ch,cv,cd] = dwt2(A,'Haar'); • c1 = [ch cv cd]; • • %%%%%%Wavelet level 2 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% • • [ca1, ch1, cv1, cd1]= dwt2(ca,'Haar'); • • c2=[ch1 cv1 cd1]; • • [h, w] = size(ca1'); • [m, n] = size(c2'); • • W=dmgb(W,A); • • %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%Here we take the wavelet transform of the • %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%watermark
  • 3. Watermark algorithm • • continued [caa chh cvv cdd]=dwt2(W,'Haar'); • W=caa; • size(W); • • % Adding watermark image. • • for i=1:h • for j=1:w • if ca1(i,j)>Tr • Ca(i,j)=ca1(i,j)+k*W(i,j); % <--------k*abs(double(c1(i,j)))*W(i,j); de olabilir • else • Ca(i,j)=ca1(i,j); • end • end • end • • % CH1=C1(1:h,1:w); • % CV1=C1(1:h,w+1:2*w); • % CD1=C1(1:h,2*w+1:3*w); • • D0= double( idwt2(Ca,ch1, cv1, cd1,'Haar') ); • • D= double(idwt2(D0, ch, cv, cd, 'Haar'));
  • 4. Reversing and detecting the watermark • h = fspecial('gaussian'); • >> I2 = imfilter(marked,h); • imshow(uint8(marked)), title('Original Image') • figure, imshow(uint8(I2)), title('Filtered Image') • >> a=I2-image1; • >> [ca ch cv cd]=dwt2(a,'haar'); • >> [ca1 ch1 cv1 cd1]= dwt2(ca,'haar'); • >> imshow(ca1)