You are on page 1of 26

Synopsis

Presentation on

Combination of Multiple Techniques


Used For Combined Encryption And
Digital Watermarking Gives Better
Performance over Individual Techniques
for Security of Still Image.

Need for Research.


Recent advancements in computer technologies
offer many facilities:
Duplication.
Distribution.
Creation.
Manipulation of digital contents.

Problem Definition
Recently Digital Images are utilized in various applications such as:

Digital image used as logo on Indian currency note.


Digital image of cheques used by CTS of bank.
Digital image of patients reports used by doctors.
Digital images taken by satellites,etc.
To provide the security & copyright protection for digital
images, it is proposed to study of security & copyright
protection technique like Digital Watermarking .

Types of Images
Medical Image.
Indoor Image.
Outdoor Image.
Satellite Image.

Types of Watermarks

Contd
.
Visible Watermark:

Visible watermarks are an extension of the concept of logos.


Such watermarks are applicable to images only.
These logos are inlaid into the image but they are transparent.
Such watermarks cannot be removed by cropping the centre part of the image.
Further, such watermarks are protected against attacks such as statistical analysis
Invisible Watermark :
Invisible watermark is hidden in the content.
It can be detected by an authorized agency only.
Such watermarks are used for content and/or author authentication and for detecting
unauthorized copier
Public Watermark :
Such a watermark can be read or retrieved by anyone using the specialized algorithm.
In this sense, public watermarks are not secure.
However, public watermarks are useful for carrying (IPR) information.
They are good alternatives to labels

Contd
.
Perceptual Watermark :
A perceptual watermark exploits the aspects of human sensory
system to provide invisible yet robust watermark
Private Watermark :
Private watermarks are also known as secure watermarks.
To read or retrieve such a watermark, it is necessary to have the secret
key.
Fragile Watermark :
Fragile watermarks are also known as tamper-proof watermarks.
Such watermarks are destroyed by data manipulation.

Methods used for Implementing Digital


Watermarking Techniques.
Frequency Domain Method.
Spatial Domain Method.
Neural Network Method.
Fuzzy Logic Domain Method.
Genetic Algorithm Method.

Implementing Digital Watermarking


Techniques Using Frequency Domain.
Frequency Domain

DCT

DWT

FFT

SVD

Combined DWT-DCT
Combined DCT-SVD
Combined DWT-SVD
Combined DCT-FFT
Combined DCT-DWT-SVD
Combined DCT-DWT-FFTSVD

Combination
of one or
more
frequency
domain

Implementing Digital Watermarking Techniques Using Fuzzy Logic Techniques

Fuzzy Logic Techniques

Fuzzy Interference System

Combined one or two


frequency domain &
Fuzzy Interference System

Implementing Digital Watermarking


Techniques Using Neural Network
Techniques
Neural Network Techniques

Neuro-Fuzzy Network

Adaptive Neuro Fuzzy


Interference System

Implementing Digital Watermarking Techniques


Using Genetic Algorithm Techniques

Genetic Algorithm Method.

Using DCTDWT Domain

Using DWT-SVD
Domain

Using DCT-SVD
Domain

Implementing Digital Watermarking Techniques


Using Combination of all Techniques.

Combination of all Techniques

Combination of one or more


frequency domain techniques
and fuzzy interference system
and dynamic neural network

Combination of Spatial
Domain Technique and
Adaptive neuro fuzzy
interference system

Proposed System.
Apply
Enhancement
Techniques

Image
Watermark
Embedding
Techniques

Watermarked
Image
Apply
Various
Attacks

Advanced
Encryption
Standard
Algorithm

Encrypted
Watermarked Image

Watermark
Image after
Extraction of
Watermark
Extracted
Watermark

Secret Key (128 bits or


192 bits or 256 bits)

Decryption
Algorithm

Watermark Extraction
Techniques

Decrypted
Watermarked Image

Objectives of Research
Combination of Multiple Techniques Used For Combined
Encryption And Digital Watermarking is to be studied.
To calculate the peak signal to noise ratio of watermarked
image & compare it with covered image.
To calculate the elapsed time during watermark for
insertion and extraction process.
To calculate the imperceptibility and robustness of
watermark image & compare with cover image.

Objectives of Research
To calculate the robustness & good capacity of
image again various attack such as cropping,
compression , rotation,etc.
After calculating the peak signal to noise ratio,
impercepbility ,robustness & good capacity by
using various schemes of digital watermarking
Techniques and comparing their results to see
which is the best scheme that can be used for
security of digital still image.

Implementation Requirement.
Implementation Decision:a. Selection of platform(O.S)
b. Selection of the programming language, tools.
c. Coding guideline to be followed.
. Two types of Implementation requirements:A. Software Requirement.
B. Hardware Requirement.

Software Requirement.
1)The Software chosen for this research is Matlab
(R2010a).
2)Operating System used:Microsoft Window xp (32 bit and 64 bit)
Or
Window-7.

Hardware Requirement
Intel core i3-330 Microprocessor 2.13GHZ.
250 GB Hard Disk.
RAM more than 1 GB.

Key References.
[1]Robust Digital Image Watermarking Scheme with Neural Network and Fuzzy Logic
Approach.by-Nallagarla Ramamurthy, Dr.S.Varadarajan, International Journal of
Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN
2250-2459, Volume 2, Issue 9, September 2012).
[2] A robust and secure watermarking scheme basedon singular values replacement
by-AKSHYA KUMAR GUPTA and MEHUL S RAVAL,Sadhana Vol. 37, Part 4,
August 2012, pp. 425440._c Indian Academy of Sciences.
[3] The Robust Digital Image Watermarking using Quantization and Fuzzy Logic
Approach in DWT Domain. by-Nallagarla Ramamurthy, Dr.S.Varadarajan,
International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 5,
June 2012 www.ijcsn.org ISSN 2277-5420.
[4] A Survey of Digital Watermarking Techniques for Multimedia Data.byFarooqHusain,MITMuradabad,India,MIT International Journal of Electronics and
Communication Engineering, Vol.2,No.1,Jan 2012,PP(37-43).

Key References.
[5] Optimization of Digital Image Watermarking Scheme Using Artificial Intelligent
Technique.By-P.Kumsawat, K. Pasitwilitham, K. Attakitmongcol and A. Srikaew ,
INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTERS IN
SIMULATION Issue 1, Volume 6, 2012.
[6]ADAPTATIVE IMAGEWATERMARKING SCHEME BASED ONNEURAL
NETWORK,by- SAMEH OUESLATI, ADNENE CHERIF and BASSEL
SOLAIMANE, SamehOueslati et al. / International Journal of Engineering Science and
Technology (IJEST), ISSN : 0975-5462 Vol. 3 No. 1 Jan 2011.
[7] ROBUST IMAGE ADAPTIVE WATERMARKING USING FUZZYLOGIC AN
FPGA APPROACH.by-PankajU.Lande Sanjay N. Talbar G.N. Shinde, International
Journal of Signal Processing, Image Processing and Pattern RecognitionVol. 3, No. 4,
December, 2010.
[8] Performance Analysis of Digital Image Watermarking TechniqueCombined
DWT
DCT over individual DWT.By-A.M.Kothari, A.C.Suthar and R.S.Gajre, Published in
International Journal of Advanced Engineering & Applications, Jan. 2010.

Key References.
[9] Comparison of Digital Water Marking methods.by-DarshanaMistry / (IJCSE)
International Journal on Computer Science and EngineeringVol. 02, No. 09, 2010,
2905-2909.
[10] A FUZZY LOGIC APPROACH TO ENCRYPTEDWATERMARKING FOR
STILL IMAGES IN WAVELETDOMAIN ON FPGAby-PankajU.Lande Sanjay N.
Talbar and G.N. ShindeInternational Journal of Signal Processing, Image Processing
and Pattern RecognitionVol. 3, No. 2, June, 2010.

[11] Robust Secure SVD Based DCT DWT Oriented Watermarking Technique for
Image Authentication. S SBedi, Ashwani Kumar, and PiyushKapoor, International
Conference on IT to Celebrate S. Charmonman's 72nd Birthday, March 2009, Thailand.

[12] Robust Digital Image Watermarking Based on Joint DWT-DCT.By-Saeed K.


Amirgholipour, Ahmad R. Naghsh-Nilchi, International Journal of Digital Content
Technology and its Applications Volume 3, Number 2, June 2009.

Key References.
[13] A Digital Watermarking Algorithm Based On DCT and DWT by- Mei Jiansheng, Li
Sukang and Tan Xiaomei, ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CDROM)
Proceedings of the 2009 International Symposium on Web Information Systems and
Applications (WISA09)Nanchang, P. R. China, May 22-24, 2009, pp. 104-107.

[14] Watermarking Algorithm Research andImplementation Based on DCT Block. byGengming Zhu, and Nong Sang, World Academy of Science, Engineering and
Technology 45, 2008.

[15]Rafael C. Gonzalez and Richard Eugene Woods, Digital image processing


Prentice Hall, 2008.

[16] Combined DWT-DCT Digital Image Watermarking. by-Ali Al-Haj, Journal of


Computer Science 3 (9): 740-746, 2007 ISSN 1549-3636 2007 Science Publications.

[17]A
Blind
DCT
Domain
Digital
Watermarking
by-SaeidSaryazdi,
MehrnazDemehriDepartement of Electrical Engineering, University of Kerman, Kerman,
Iran, SETIT2005.

Key References.
[18]. Tsai, M. and H. Hung, 2005. "DCT and DWTbasedImage Watermarking Using
Subsampling,"in Proc. of the 2005 IEEE Fourth Int. Conf. onMachine Learning and Cybernetics,
pp: 5308-5313,China.

[19] Robust DWT-SVD Domain Image Watermarking:Embedding Data in All Frequencies. byEmir Ganic andAhmet M. Eskicioglu, MM&SEC'04, September 2021, 2004, Magdeburg,
Germany. Copyright 2004 ACM 1-58113-854-7/04/0009.

[20]. Voloshynovskiy, S., S. Pereira and T. Pun, 2001."Attacks on DigitalWatermarks:


Classification,Estimation-Based Attacks, and Benchmarks,"Comm. Magazine, 39(8): 118-126.
[21]. Ejima, M. and A. Myazaki, 2001." On theevaluation of performance of digital watermarkingin
the frequency domain," in Proc. of the IEEEInt. Conf. on Image Processing, 2: 546-549.
[22] Color Image Watermarking based on the DCT-Domain ofThree RGB ColorChannels.By-I.
El-Fegh, D. Mustafa, ZakariaSulimanZubi, Faraj A. El-Mouadib., Proceedings of the 10th WSEAS
International Conference on EVOLUTIONARY COMPUTING, ISSN: 1790-5109 ISBN: 978960-474-067-3.

Key References.
[23]. Hsu, C. and J. Wu, 1998. "MultiresolutionWatermarking
for Digital Images," IEEE Trans. OnCircuits and Systems- II,
45(8): 1097-1101.

[24]. Wu, C. and W. Hsieh, 2000. "Digital watermarkingusing


zerotree of DCT," IEEE Trans. ConsumerElectronics, vol. 46,
no. 1, pp: 87-94.

[25]http://www.tafinn.com/andyfinnus/Writing/Technology/digital_watermarks.htm.

Thank You

You might also like