Escolar Documentos
Profissional Documentos
Cultura Documentos
NAME: .............................................................. ROLL NO.NAME: .............................................................. ROLL NO.NAME: .............................................................. ROLL NO.NAME: .............................................................. ROLL NO.BRANCH: B.E. (E&TC)
BATCH: SEM-VIIth, 2015
SUBJECT:
SCIENTIFIC CONTENT:
BACKGROUND
With the widespread distribution of digital information over the World
Wide Web (WWW), the protection of intellectual property rights has become
increasingly important. This information includes still images, video, audio, or
text are stored and transmitted in digital format. Information stored in digital
format can be easily copied without loss of quality and efficiently distributed by
pirate (a person or organisation) to violate the copyright of real owner.
Watermarking of multimedia data has become a hotspot for research in
recent years. Watermarking can be used to identify the owners, license
information, or other information related to the digital object carrying the
watermark. Watermarks can provide the mechanism for determining if a
particular work has been tampered with or copied illegally.
Digital watermarking has gained reputation due to its significance in
content authentication and copyright protection for digital multimedia data. It
hides information in the data in such a way that the basic appearance of the data
is not destroyed [1]. Watermarking problem can be mathematically represented
as
XN= KN (SN) +M
Where, M is the watermark to be embedded in S N with the embedding strength
using KN secret key function that operates on the host message to deliver
watermarked message XN that is sent from the transmitter. YN is the
watermarked data received at the receiver end from which M is extracted.
In figure 1, M is the secret message (watermark) to be embedded in host
message SN with an embedding strength , X N is the watermarked message sent
at the transmitter end, Y N is the message received at the receiver end, and M is
the watermark extracted from the transmitted message. The host medium and
secret message may be any of the image, audio or video depending on the
requirement of the application [2].
ENCODER
XN
TRANSMISSION
YN
M'
DECODER
MEDIA
SN
KN,
Fig.1. Graphical illustration of watermarking communication problem
OBJECTIVE:
Wavelet based image watermarking is gaining more popularity because
of its resemblance with the human visual system. This paper elaborates
suitability of wavelet families transform for image watermarking, wavelet
transform based image watermarking process, and analysis of wavelet families
based watermarking techniques.
In this thesis, a novel algorithm for robust audio watermarking in image
using wavelet families transform based on image entropy is used. The
motivation of choosing image as a cover is driven by the fact that human visual
system is less sensitive than human auditory system thus an image provides
better masking effect. The algorithm is based on decomposition of images using
Haar wavelet basis, Daubechies wavelet, Biorthogonal wavelet, Reverse
biorthogonal wavelet and Discrete approximation of Meyer wavelet.
In the later part, analyze the watermarking results of different waveletbased watermarking techniques on different images and audio samples, using
various quality assessment metrics and compare the performance. The secret
data used is audio and the input image is color image. The study emphasizes on
devising an algorithm that allows minimum audible distortion to the audio by
PROPOSED METHOD:
DWT has been employed in order to preserve the high-frequency
components of the image. DWT separates the image into different
sub-band images, namely, LL, LH, HL, and HH. A high-frequency
sub-band contains the high frequency component of the image.
Hide the audio in approximation coefficient of the image by using the
mathematical calculation, and then apply IDWT for reconstruct the
low and high frequency to watermarked image.
BLOCK DIAGRAM :
EMBEDDING:
EXTRACTION:
BLOCKDIAGRAM DESCRIPTION:
Read cover image and apply pre processing technique like as
enhancement, filtering technique. Then apply Discrete Wavelet Transform
(DWT), for that cover image it will generate four band of output like as (LL,
LH, HL, HH). Take the approximation band (LL) of cover image for hiding
audio; now convert the approximation band from 2D to 1D. Check the length of
LL band, if the LL band length is less then secret audio length, you cant hide
the data in cover image. If the LL band length is greater than secret audio, you
can hide the data in cover image.
Then hide the secret audio in approximation band by using the
mathematical equation, then convert the embedded pixel from 1D to 2D, and
apply inverse wavelet transform and save the image. Same procedure follows in
extraction in inverse.
APPLICATION OF WATERMARKING:
IPR Protection
Demonstration of rightful ownership
Authentication
Covert communication
SIGNIFICANCE;
Protection of IRP- Intellectual Property Rights
Content authentication and copy right protection
Information hiding
To identify owners, License information and other digital object
To determine whether digital multimedia data tempered with or copied
illegally