Professional Documents
Culture Documents
5WI11LVZ23
Agenda
Abstract
Literature survey
Watermarking
Abstract
These days, people are using social networking sites for
Cryptography
The focus in cryptography is to protect the content of the
message and to keep it secure from unintended audiences.
Main task is to ensure users are able to communicate
securely over an insecure channel.
Steganography
Its the art and science of hiding information in ways that
prevent the detection of hidden messages.
Watermarking
Watermarking is the process of embedding a message on a
host signal which can be any form of multimedia
Image
Audio
Video
Text
Literature Survey
Anand Bora et.al proposed a competitive analysis of Digital
Watermarking
Watermarking is a branch of information hiding which is
distinct steps
Embedding
Attack
Detection
Original Image
Embedding
Procedure
Watermarked
Image
Extraction
Procedure
Watermark
Original Image
a time-frequency
Haar
A Haar wavelet is the simplest type of wavelet. They are
related to
Transform.
mathematical
operation
called
Haar
running difference.
Step 1:
A
A+B C+D
A-B
C-D
Step 2:
A
A+B
LL
A-B
LH
C+D
HL
C-D
HH
LL1
HL1
LH1
HH1
First level
LL2
HL2
LH2 HH2
LH1
HL1
HH1
Second level
Original
Image
LL
HL
LH
HH
Applications
Wavelet Transforms are applied in different fields ranging
Block Diagram
Original Image
Communication Channel
Watermark
Embedding
Algorithm
Watermark
Retrieval
Algorithm
Watermark Image
Watermarked Image
Extracted Watermark
Specifications
Inputs
Original Image of size 256 256
Watermark Image of size 256 256
Algorithms
Watermark Embedding and retrieval Algorithms.
Output
Watermarked Image
Extracted Watermark
2-Level DWT
Watermark
Image
2-Level DWT
Alpha Blending
Technique
Inverse 2-Level
DWT
Watermarked
Image
Where:
LL1
Watermark Extraction
Watermarked
Image
2-Level
DWT
Extract
watermark
RW = (WMI k * LL2)
Watermark
Image
... (2)
Where
RW = Recovered Watermark
LL2 = low frequency approximation of the original image
WMI = Watermarked Image
Simulink Model
Hardware Model
1
2
3
Results
Test Case 1:
Sl.
No
Original
Watermark
0.1
11.77
0.5
9.01
0.01
11.96
0.05
11.91
0.0001
11.97
0.0035
12.22
Best
Result
Watermarked
Extracted
Watermark
0.007
12.21
0.085
12.05
0.78
6.745
10
5.157
MSE
6000
5000
4000
3000
2000
1000
0
0.1
0.5
0.01
0.05
0.0001
0.0035
k( scaling factor )
0.007
0.085
0.78
12
10
PSNR
0
0.1
0.5
0.01
0.005
0.0001 0.0035
k (scaling factor)
0.007
0.085
0.78
Test Case 2:
Sl.N
Original
Watermark
0.1
9.083
0.5
6.648
0.01
9.564
0.05
9.357
0.00
9.613
01
6
0.00
9.596
35
7
0.00
9.579
7
8
Watermarked
Extracted
Watermark
0.08
9.167
5
9
0.78
5.008
10
3.835
Best Result
7.00E+03
MSE
6.00E+03
5.00E+03
4.00E+03
3.00E+03
2.00E+03
1.00E+03
0.00E+00
0.1
0.5
0.01
0.05
0.0001
k ( scaling factor )
0.0035
0.007
0.085
0.78
10
PSNR
0
0.1
0.5
0.01
0.005
0.0001
0.0035
k (scaling factor)
0.007
0.085
0.78
Conclusion
The results obtained, ensure that the data which has been
watermarking is achieved.
Future Scope
In
References
[1] F. Petitcolas, R. Anderson and M. Kuhn, Attacks on Copyright
Marking Systems in Information Hiding, LNCS, Berlin, vol.
1524, pp. 218-238,1998.
[2] Gurupreet kaur, Kamaljeet kaur,Image watermarking using LSB,
IJARCSSE, volume 3, Issue 4,pp858-861, April 25, 2013.
[3] Pravin M.Pithiya, H.L. Desai,DCT based Digital Image
Watermarking, De-watermarking & Authentication, IJLTET, vol.2,
Issue 3,pp. 213-219, May 2013.
[4] Akhil Pratap Singh et. al.., Wavelet Based Watermarking on
Digital Image, Indian Journal of Computer Science and
Engineering Vol 1 No 2, 86-91.
[5] Mustafa Osman Ali, Elamir Abu Abaida Ali Osman et. al..
Invisible Digital Image Watermarking in spatial domain with
random localization, International Journal of Engineering and
Innovative Technology, Volume 2, Issue 5, November 2012.
[6] R.S. Alomari, A AI-Jaber, "A Fragile watermarking algorithm for
content authentication" in IEEE Trans. JCIS, vol. 2, No. 1, April,
2004.
[7] X. Zhang, S. Wang, "Fragile watermarking with error-free
restoration capability," in IEEE Trans. on Multimedia, vol. 10,
no. 8, December, 2008.
[8] Chih-Yang Lin and Yu-Tai Ching, A Robust Image hiding
method using wavelet technique, Journal of information
science and engineering vol 22, 163-174 (2006)
[9] Cox, I. J., Kilian, J., Leighton, F. T., Shamoon, T.,Secure Spread
Spectrum Watermarking for Multimedia", IEEE Trans.On Image
Processing, No. 6, Vol. 12,pp 1673-1687, 1997.
[10] Ibrahim Nasir, Ying Weng, Jianmin Jiang, A new robust
watermarking scheme for color images in spatial domain,
13] Raghuveer M. Rao and Ajith S. Bapardikar, Wavelet TransformIntroduction to theory and applications. Pearson Education 2000.
DWT Sub-Block
Embedding Sub-Block
IDWT Sub-Block
PSNR
Frame Serial
Frame Deserial
Considered best
Region for
Modification
Leads to local
Distortion along
edges
Spartan 6 FPGA
Optimized for high
performance logic.
2.1 Mbits/sec of fast
block RAM.
6 Phase-locked loop
58 DSP slices
500 MHz+ clock speeds
Key Features:
Xilinx Spartan-6 LX45 FPGA, 324-pin BGA package.
128 MByte DDR2 16 bit wide data.
10/100/1000 Ethernet PHY.
On board USB2 ports for programming and data transfer.
USB-UART and USB-HID port (for mouse/keyboard).
Two HDMI video input ports and two HDMI output ports.
AC-97 codec with line-in, line-out, mic and headphone.
Real time power monitors on all power rails.
16 Mbyte x 4 SPI flash for configuration and data storage.
100 MHz CMOS oscillator.
48 I/O are routed to expansion connectors.
GPIO includes 8 LEDs, 6 buttons and 8 slide switches.
Shifts with a 20W power supply and USB cable.