You are on page 1of 2

ABSTRACT The project Copyright Protection of Multimedia documents using Authentication uses the watermarking algorithms and authentication

procedures to authenticate the multimedia document users. Here the multimedia documents are provided to the user with a watermark message. Messages are inserted according to the user details. Their usage is limited according to the access permissions given to them. The watermark message can be inserted into the multimedia files like image audio video files. !t is also easily available to the users. "y identifying the position for the image and video file the message is inserted into the multimedia documents. #or audio file the message is inserted in a wave format. #or inserting the invisible watermark message to documents the user message is encrypted and inserted into the multimedia files. Those inserted invisible message can be later retrieved by entering the correct encryption key entered while inserting message. Authentication is provided by specifying access rights to users and the user information is stored in a $M% file as database.

LIST OF FIGURES FIG. NO. &. *. -. /. 1. 3. 5. ,. ). &0. &&. &*. &-. &/. &1. TITLE .'(T #ramework Architecture +ystem Architecture .ata flow diagram of visible watermarking .ata flow diagram of invisible watermarking %ogin 2indow !mage 4isible 2atermarking !mage !nvisible 2atermarking Audio 4isible 2atermarking Audio !nvisible 2atermarking 4ideo 4isible 2atermarking 4ideo !nvisible 2atermarking Add 6ser 2indow Change 6ser 2indow (dit 6ser 2indow $M% .atabase #ile PAGE NO. ) &, &) *0 -0 -& -* --/ -1 -3 -5 -, -) /0

ii

You might also like