You are on page 1of 10

Combination of Multiple Techniques Used For Combined Encryption And

Digital Watermarking Gives Better Performance over Individual Techniques


for Security of Still Image.
Need for Research
Recent advancements in computer technologies offer many facilities:

Duplication.

Distribution.

Creation.

Manipulation of digital contents.


Problem Definition
Recently Digital Images are utilized in various applications such as:
Digital image used as logo on Indian currency note.
Digital image of cheques used by CTS of bank.
Digital image of patients reports used by doctors.

Digital images taken by satellites,etc.

To provide the security & copyright protection for digital images, it is proposed to study of security &
copyright protection technique like Digital Watermarking .
Types of imags:-

Medical Image.
Indoor Image.
Outdoor Image.
Satellite Image
Types of watermark

Visible Watermark:

Visible watermarks are an extension of the concept of logos.

Such watermarks are applicable to images only.

These logos are inlaid into the image but they are transparent.

Such watermarks cannot be removed by cropping the centre part of the image.

Further, such watermarks are protected against attacks such as statistical analysis

Invisible Watermark :

Invisible watermark is hidden in the content.

It can be detected by an authorized agency only.

Such watermarks are used for content and/or author authentication and for detecting unauthorized
copier

Public Watermark :

Such a watermark can be read or retrieved by anyone using the specialized algorithm.

In this sense, public watermarks are not secure.

However, public watermarks are useful for carrying (IPR) information.

They are good alternatives to labels

Perceptual Watermark :

A perceptual watermark exploits the aspects of human sensory system to provide invisible yet
robust watermark

Private Watermark :

Private watermarks are also known as secure watermarks.

To read or retrieve such a watermark, it is necessary to have the secret key.

Fragile Watermark :

Fragile watermarks are also known as tamper-proof watermarks.

Such watermarks are destroyed by data manipulation.

Methods used for Implementing Digital Watermarking Techniques


Frequency Domain Method.
Spatial Domain Method.
Neural Network Method.
Fuzzy Logic Domain Method.
Genetic Algorithm Method.

Objectives of Research
Combination of Multiple Techniques Used For Combined Encryption And Digital Watermarking
is to be studied.
To calculate the peak signal to noise ratio of watermarked image & compare it with covered
image.
To calculate the elapsed time during watermark for insertion and extraction process.

To calculate the imperceptibility and robustness of watermark image & compare with cover
image.
To calculate the robustness & good capacity of image again various attack such as cropping,
compression , rotation,etc.
After calculating the peak signal to noise ratio, impercepbility ,robustness & good capacity by
using various schemes of digital watermarking Techniques and comparing their results to see
which is the best scheme that can be used for security of digital still image.
Implementation Requirement.
Implementation Decision:a. Selection of platform(O.S)
b. Selection of the programming language, tools.
c. Coding guideline to be followed.
Two types of Implementation requirements:A. Software Requirement.
B. Hardware Requirement.
Software Requirement.
1)The Software chosen for this research is Matlab (R2010a).
2)Operating System used: Microsoft Window xp (32 bit and 64 bit)
Or

Window-7.
Hardware Requirement

Intel core i3-330 Microprocessor 2.13GHZ.


250 GB Hard Disk.
RAM more than 1 GB.
Key References
[1]Robust Digital Image Watermarking Scheme with Neural Network and Fuzzy Logic
Approach.by-Nallagarla Ramamurthy, Dr.S.Varadarajan, International Journal of Emerging

Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2,


Issue 9, September 2012).

[2] A robust and secure watermarking scheme basedon singular values replacement byAKSHYA KUMAR GUPTA and MEHUL S RAVAL,Sadhana Vol. 37, Part 4, August 2012,
pp. 425440._c Indian Academy of Sciences.

[3] The Robust Digital Image Watermarking using Quantization and Fuzzy Logic Approach in
DWT Domain. by-Nallagarla Ramamurthy, Dr.S.Varadarajan, International Journal of Computer
Science and Network (IJCSN) Volume 1, Issue 5, June 2012 www.ijcsn.org ISSN 2277-5420.

[4] A Survey of Digital Watermarking Techniques for Multimedia Data.byFarooqHusain,MITMuradabad,India,MIT International Journal of Electronics and
Communication Engineering, Vol.2,No.1,Jan 2012,PP(37-43).
[5] Optimization of Digital Image Watermarking Scheme Using Artificial Intelligent
Technique.By-P.Kumsawat, K. Pasitwilitham, K. Attakitmongcol and A. Srikaew ,
INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTERS IN SIMULATION
Issue 1, Volume 6, 2012.

[6]ADAPTATIVE IMAGEWATERMARKING SCHEME BASED ONNEURAL


NETWORK,by- SAMEH OUESLATI, ADNENE CHERIF and BASSEL SOLAIMANE,
SamehOueslati et al. / International Journal of Engineering Science and Technology (IJEST),
ISSN : 0975-5462 Vol. 3 No. 1 Jan 2011.

[7] ROBUST IMAGE ADAPTIVE WATERMARKING USING FUZZYLOGIC AN FPGA


APPROACH.by-PankajU.Lande Sanjay N. Talbar G.N. Shinde, International Journal of Signal
Processing, Image Processing and Pattern RecognitionVol. 3, No. 4, December, 2010.

[8] Performance Analysis of Digital Image Watermarking TechniqueCombined DWT


DCT over individual DWT.By-A.M.Kothari, A.C.Suthar and R.S.Gajre, Published in
International Journal of Advanced Engineering & Applications, Jan. 2010.
[9] Comparison of Digital Water Marking methods.by-DarshanaMistry / (IJCSE) International
Journal on Computer Science and EngineeringVol. 02, No. 09, 2010, 2905-2909.

[10] A FUZZY LOGIC APPROACH TO ENCRYPTEDWATERMARKING FOR STILL


IMAGES IN WAVELETDOMAIN ON FPGAby-PankajU.Lande Sanjay N. Talbar and G.N.
ShindeInternational Journal of Signal Processing, Image Processing and Pattern RecognitionVol.
3, No. 2, June, 2010.

[11] Robust Secure SVD Based DCT DWT Oriented Watermarking Technique for Image
Authentication. S SBedi, Ashwani Kumar, and PiyushKapoor, International Conference on IT to
Celebrate S. Charmonman's 72nd Birthday, March 2009, Thailand.

[12] Robust Digital Image Watermarking Based on Joint DWT-DCT.By-Saeed K.


Amirgholipour, Ahmad R. Naghsh-Nilchi, International Journal of Digital Content Technology
and its Applications Volume 3, Number 2, June 2009.
[13] A Digital Watermarking Algorithm Based On DCT and DWT by- Mei Jiansheng, Li
Sukang and Tan Xiaomei, ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM)
Proceedings of the 2009 International Symposium on Web Information Systems and Applications
(WISA09)Nanchang, P. R. China, May 22-24, 2009, pp. 104-107.

[14] Watermarking Algorithm Research andImplementation Based on DCT Block. byGengming Zhu, and Nong Sang, World Academy of Science, Engineering and Technology 45,
2008.

[15]Rafael C. Gonzalez and Richard Eugene Woods, Digital image processing Prentice Hall,
2008.

[16] Combined DWT-DCT Digital Image Watermarking. by-Ali Al-Haj, Journal of Computer
Science 3 (9): 740-746, 2007 ISSN 1549-3636 2007 Science Publications.

[17]A Blind DCT Domain Digital Watermarking by-SaeidSaryazdi,


MehrnazDemehriDepartement of Electrical Engineering, University of Kerman, Kerman, Iran,
SETIT2005.

[18]. Tsai, M. and H. Hung, 2005. "DCT and DWTbasedImage Watermarking Using
Subsampling,"in Proc. of the 2005 IEEE Fourth Int. Conf. onMachine Learning and Cybernetics,
pp: 5308-5313,China.

[19] Robust DWT-SVD Domain Image Watermarking:Embedding Data in All Frequencies. byEmir Ganic andAhmet M. Eskicioglu, MM&SEC'04, September 2021, 2004, Magdeburg,
Germany. Copyright 2004 ACM 1-58113-854-7/04/0009.

[20]. Voloshynovskiy, S., S. Pereira and T. Pun, 2001."Attacks on DigitalWatermarks:


Classification,Estimation-Based Attacks, and Benchmarks,"Comm. Magazine, 39(8): 118-126.

[21]. Ejima, M. and A. Myazaki, 2001." On theevaluation of performance of digital


watermarkingin the frequency domain," in Proc. of the IEEEInt. Conf. on Image Processing, 2:
546-549.

[22] Color Image Watermarking based on the DCT-Domain ofThree RGB ColorChannels.By-I.
El-Fegh, D. Mustafa, ZakariaSulimanZubi, Faraj A. El-Mouadib., Proceedings of the 10th
WSEAS International Conference on EVOLUTIONARY COMPUTING, ISSN: 1790-5109
ISBN: 978-960-474-067-3.

You might also like