Escolar Documentos
Profissional Documentos
Cultura Documentos
For Authentication
Guided By :Prof. Mita C Paunwala Prepared By :Sandhya Verma Poonam Yadav Disha Parmar Yesha Patel
Introduction
Digital Image Watermarking is defined as the process of
embeds digital data into the material to identify the origin, owner, informal user, etc.
image.
Semi-fragile :- Watermark is adopted to detect the
unauthorized modifications, and, at the same time, it must survive some authorized image processing operations.
watermark from watermarked-data and use original coverdata to determine where the watermark is.
for extraction and just yield a yes/no answer to the question weather watermarked-data contains a watermark.
Blind Watermarking: Neither cover-data nor embedded
watermarks are required for extraction - this is the most challenging problem.
Secret Message
Carrier Document
Embeddin g Algorithm
Detecto r
Retrive Messag e
EMBEDDING TECHNIQUE
COVER IMAGE
EMBEDDING TECHNIQUE
DCT TRANSFORM COVER IMAGE
EMBEDDING TECHNIQUE
8x8
8x8
COVER IMAGE
DCT TRANSFORM
EMBEDDING TECHNIQUE
8x8
8x8
COVER IMAGE
DCT TRANSFORM
DC
AC(0,1) AC(0,2)
AC(1,0) AC(2,0)
AC(1,1)
ESTIMATED ACS AC(0,1)=1.13884*(DC4 DC6) / 8; AC(1,0)=1.13884*(DC2 DC8) / 8; AC(0,2)=0.27881*(DC4 +DC6 -2* DC5) / 8; AC(2,0)=0.27881*(DC2 + DC8 2* DC5) / 8; AC(1,1)=0.16213*(DC1 + DC9 DC3 DC7) / 8;
EMBEDDING WATERMARK If watermark bit=1 Aci >=ACi + If watermark bit=0 Aci <=ACi +
BLOCK 1 BLOCK 2 BLOCK 3 DC 1 DC 2 DC3 BLOCK 4 BLOCK5 DC 4 DC5 BLOCK7 DC 7 BLOCK8 DC8 BLOCK 6 DC6 BLOCK 9 DC9
RETRIVING TECHNIQUE
8x8
8x8
WATERMARKED IMAGE
DCT TRANSFORM
AC(0,1) AC(0,2)
AC(1,0) AC(2,0)
SF=
Peak signal to noise ratio (PSNR):
PSNR= 10 log10
RESULT
COVER IMAGE
WATERMARK IMAGE
WATERMARKED IMAGE
RECOVER IMAGE
Application
Automatic monitoring and tracking of copy-write material
on WEB. (For example, a robot searches the Web for marked material and thereby identifies potential illegal issues.) Automatic audit of radio transmissions: (A robot can listen to a radio station and look for marks, which indicate that a particular piece of music, or advertisement , has been broadcast.)
Contd
distributed data)
Actually, watermarking has recently emerged as
can be watermarked: audio, images, video, formatted text, 3D models, model animation parameter
CONCLUSION
Nowadays multimedia products are digitized but it has many disadvantage like copyright, unauthorized modification, hence we have to protect from such problem. Mostly all the non-blind technique require original image for recovering at the receiver, but it is not desirable to have original image at the recevier side. There are many applications of watermarking like broadcasting, TV, news serial in which watermark image is visible like logo of the channel. So for that non-blind technique is used.
But in case of finger print security, valuable companies image data no original image is present so for that case blind watermarking technique is necessary. So looking about the above interest we are using blind watermarking technique in which original image is not require.
REFRENCE
[1] Katzenbeisser, S., Petitcolas, F. A. P., Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Editions, 2000. [2] Cox, I. J., Kilian, J., Leighton, F. T., Shamoon, T., Secure Spread Spectrum Watermarking for Multimedia, IEEE Trans. On Image Processing, No. 6, Vol. 12,pp 1673-1687, 1997. [3] Hsu, C. T., Wu, J. L., Multi-resolution Watermarking for Digital Images, IEEE Trans. On Circuits & Systems: Analog & Digital Signal Processing, Vol. 45, No. 8, 1998. [4] Hsu, C. T., Wu, J. L., Hidden Digital Watermarks in Images, IEEE Trans. On Image Processing, Vol.8, No. 1, 1999. [5] Wang, Y., Pearmain. A., Blind Image Data Hiding Based on Self Reference, Pattern Recognition Letters, Vol. 25, Issue 15, pp. 1681-1689, November 2004. [6] B.J. Falkowski, L. Lim, Image watermarking using Hadamard transform, Electron. Lett. 36 (3), pp. 211213, 2000.
[7] Ho, A., Shen, J., Soon, H. T., Kot, A. C., Digital Image-in-image watermarking for Copyright
Protection of Satellite Images using the Fast Hadamard Transform, IEEE Int. Geosciences and Remote Sensing Symp., pp. 3311-3313., 2002. [8] Gilani, S. M., Skodras, A. N., Watermarking by Multi-resolution Hadamard Transform, Proc. of European Conf. On Electronic Imaging and Visual Arts (EVA 2001), Florence, Italy, March 2001. [9] Fei, C., Kundur, D., Kwong, R. H., The Choice of Watermark Domain in the Presence of Compression, Proc. Of IEEE Int. Conf. On Information Technology: Coding & Computing, pp 7984, Las Vegas, Nevada, April 2001. [10] Prat, W. K., Digital Image Processing, John Wiley Editions, 1991. [11] Gonzales, C. A., Allman, L., Mccarthy, T., Wendt,P., "DCT Coding for Motion Video Storage Using Adaptive Arithmetic Coding ",Signal Processing: Image Communication,No.2,1990. [12] Kim, C., Li, Q., Kuo, C., J., "Fast Intra-Prediction Model Selection for H- 264 Codec", Proc. of ITCOM03, 2003.