Professional Documents
Culture Documents
Duplication.
Distribution.
Creation.
To provide the security & copyright protection for digital images, it is proposed to study of security &
copyright protection technique like Digital Watermarking .
Types of imags:-
Medical Image.
Indoor Image.
Outdoor Image.
Satellite Image
Types of watermark
Visible Watermark:
These logos are inlaid into the image but they are transparent.
Such watermarks cannot be removed by cropping the centre part of the image.
Further, such watermarks are protected against attacks such as statistical analysis
Invisible Watermark :
Such watermarks are used for content and/or author authentication and for detecting unauthorized
copier
Public Watermark :
Such a watermark can be read or retrieved by anyone using the specialized algorithm.
Perceptual Watermark :
A perceptual watermark exploits the aspects of human sensory system to provide invisible yet
robust watermark
Private Watermark :
Fragile Watermark :
Objectives of Research
Combination of Multiple Techniques Used For Combined Encryption And Digital Watermarking
is to be studied.
To calculate the peak signal to noise ratio of watermarked image & compare it with covered
image.
To calculate the elapsed time during watermark for insertion and extraction process.
To calculate the imperceptibility and robustness of watermark image & compare with cover
image.
To calculate the robustness & good capacity of image again various attack such as cropping,
compression , rotation,etc.
After calculating the peak signal to noise ratio, impercepbility ,robustness & good capacity by
using various schemes of digital watermarking Techniques and comparing their results to see
which is the best scheme that can be used for security of digital still image.
Implementation Requirement.
Implementation Decision:a. Selection of platform(O.S)
b. Selection of the programming language, tools.
c. Coding guideline to be followed.
Two types of Implementation requirements:A. Software Requirement.
B. Hardware Requirement.
Software Requirement.
1)The Software chosen for this research is Matlab (R2010a).
2)Operating System used: Microsoft Window xp (32 bit and 64 bit)
Or
Window-7.
Hardware Requirement
[2] A robust and secure watermarking scheme basedon singular values replacement byAKSHYA KUMAR GUPTA and MEHUL S RAVAL,Sadhana Vol. 37, Part 4, August 2012,
pp. 425440._c Indian Academy of Sciences.
[3] The Robust Digital Image Watermarking using Quantization and Fuzzy Logic Approach in
DWT Domain. by-Nallagarla Ramamurthy, Dr.S.Varadarajan, International Journal of Computer
Science and Network (IJCSN) Volume 1, Issue 5, June 2012 www.ijcsn.org ISSN 2277-5420.
[4] A Survey of Digital Watermarking Techniques for Multimedia Data.byFarooqHusain,MITMuradabad,India,MIT International Journal of Electronics and
Communication Engineering, Vol.2,No.1,Jan 2012,PP(37-43).
[5] Optimization of Digital Image Watermarking Scheme Using Artificial Intelligent
Technique.By-P.Kumsawat, K. Pasitwilitham, K. Attakitmongcol and A. Srikaew ,
INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTERS IN SIMULATION
Issue 1, Volume 6, 2012.
[11] Robust Secure SVD Based DCT DWT Oriented Watermarking Technique for Image
Authentication. S SBedi, Ashwani Kumar, and PiyushKapoor, International Conference on IT to
Celebrate S. Charmonman's 72nd Birthday, March 2009, Thailand.
[14] Watermarking Algorithm Research andImplementation Based on DCT Block. byGengming Zhu, and Nong Sang, World Academy of Science, Engineering and Technology 45,
2008.
[15]Rafael C. Gonzalez and Richard Eugene Woods, Digital image processing Prentice Hall,
2008.
[16] Combined DWT-DCT Digital Image Watermarking. by-Ali Al-Haj, Journal of Computer
Science 3 (9): 740-746, 2007 ISSN 1549-3636 2007 Science Publications.
[18]. Tsai, M. and H. Hung, 2005. "DCT and DWTbasedImage Watermarking Using
Subsampling,"in Proc. of the 2005 IEEE Fourth Int. Conf. onMachine Learning and Cybernetics,
pp: 5308-5313,China.
[19] Robust DWT-SVD Domain Image Watermarking:Embedding Data in All Frequencies. byEmir Ganic andAhmet M. Eskicioglu, MM&SEC'04, September 2021, 2004, Magdeburg,
Germany. Copyright 2004 ACM 1-58113-854-7/04/0009.
[22] Color Image Watermarking based on the DCT-Domain ofThree RGB ColorChannels.By-I.
El-Fegh, D. Mustafa, ZakariaSulimanZubi, Faraj A. El-Mouadib., Proceedings of the 10th
WSEAS International Conference on EVOLUTIONARY COMPUTING, ISSN: 1790-5109
ISBN: 978-960-474-067-3.