DOC PREVIEW
UT Arlington EE 5359 - Digital Watermarking

This preview shows page 1-2-3-4-25-26-27-52-53-54-55 out of 55 pages.

Save
View full document
Premium Document
Do you want full access? Go Premium and unlock all 55 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Digital Watermarking Abrar Ahmed Syed 1000614216 abrar syed mavs uta edu The University of Texas Arlington Guided by Dr K R Rao Digital Watermarking EE 5359 MULTIMEDIA PROCESSING PROJECT REPORT DIGITAL WATERMARKING Under guidance of Dr K R Rao Submitted By Abrar Ahmed Syed 1000614216 abrar syed mavs uta edu The University of Texas at Arlington 2 Abrar Ahmed Syed 1000614216 Digital Watermarking Table of Contents Abstract 7 1 0 Introduction of Digital Watermarking 7 2 0 Watermarking 8 2 1 Definition of Watermarking 8 2 2 Principle of Watermarking 9 3 0 Requirements 10 3 1 Transparency 10 3 2 Robustness 10 3 3 Capacity or Data Load 10 4 0 Applications 10 4 1 Copyright Protection 10 4 2 Authentication 10 4 3 Broadcast Monitoring 10 4 4 Content Labeling 10 4 5 Tamper Detection 10 4 6 Digital Fingerprinting 10 4 7 Content protection 11 5 0 Classifications of Watermarking 11 5 1 Visible 11 5 2 Invisible 11 5 2 1 Robust Watermarks 11 5 2 2 Fragile Watermarks 11 5 2 3 Public and Private Watermark 12 5 3 Capacity 12 5 4 Perceptibility 12 5 5 Embedding Techniques 12 5 5 1 Spread Spectrum 12 3 Abrar Ahmed Syed 1000614216 Digital Watermarking 5 5 2 Quantization 12 5 5 3 Amplitude Modification 12 6 0 Techniques or Schemes of Watermarking 13 6 1 Spatial Domain Techniques 13 6 1 1 Least Significant Bit Coding LSB 13 6 1 2 Predictive Coding Schemes 13 6 1 3 Correlation Based Techniques 13 6 1 4 Patchwork Techniques 14 6 2 Frequency Domain techniques 14 6 2 1 Discrete cosine transform DCT based technique 14 6 3 Wavelet Transform based Watermarking 18 6 4 Simple Watermarking 19 7 0 Attacks 20 7 1 Basic 20 7 2 Robustness 20 7 3 Presentation 20 7 4 Interpretation 21 7 5 Implementation 21 7 6 Removal 21 7 7 Geometrical 22 7 8 Cryptographic 22 7 9 Active Passive 22 7 10 Forgery 22 7 11 Collusion 22 7 12 Distortive 23 8 0 Counter Attacks 23 8 1 Power Spectrum Condition PSC 23 8 2 Noise Visibility Function NVF 24 9 0 Privacy Laws of Watermarking 25 10 0 Project Goal 25 10 1 Invisible Watermarking Least significant bit Watermarking 25 10 1 1 Steps 25 4 Abrar Ahmed Syed 1000614216 Digital Watermarking 10 1 2 Program 26 10 1 3 Algorithm Explanation 28 10 1 14 Flow chart 31 10 1 5 Results 31 10 2 Visible Watermarking Concatenation 33 10 2 1 Steps 33 10 2 2 Program 33 10 2 3 Algorithm Explanation 36 10 2 4 Flow chart 38 10 2 5 Result 39 10 3 Visible Watermarking Noise Addition 40 10 3 1 Steps 40 10 3 2 Program 41 10 3 3 Algorithm Explanation 41 10 3 4 Flow chart 42 10 3 5 Result 42 10 4 Visible Watermarking JPEG Compression 43 10 4 1 Steps 43 10 4 2 Flow chart 43 10 4 3 Flow chart Jpeg Compression 44 10 4 4 Result 45 10 5 Visible Watermarking Denoising 45 10 5 1 Steps 45 10 5 2 Program 46 10 5 3 Algorithm Explanation 46 10 5 4 Flow chart 47 10 5 5 Result 47 10 6 Visible Watermarking Separating the Watermark 48 10 6 1 Steps 48 10 6 2 Program 48 10 6 3 Algorithm Explanation 50 10 6 4 Flow chart 50 5 Abrar Ahmed Syed 1000614216 Digital Watermarking 10 6 5 Results 50 11 0 Testing 51 12 0 Conclusions 53 References 53 6 Abrar Ahmed Syed 1000614216 Digital Watermarking DIGITAL WATERMARKING Abstract Everyday tons of data is embedded on digital media or distributed over the internet The data so distributed can easily be replicated without error putting the rights of their owners at risk Even when encrypted for distribution data can easily be decrypted and copied One way to discourage illegal duplication is to insert information known as watermark into potentially vulnerable data in such a way that it is impossible to separate the watermark from the data These challenges motivated researchers to carry out intense research in the field of watermarking A watermark is a form image or text that is impressed onto paper which provides evidence of its authenticity Digital watermarking is an extension of the same concept There are two types of watermarks visible watermark and invisible watermark In this project we have concentrated on implementing watermark in image The main consideration for any watermarking scheme is its robustness to various attacks Watermarking dependency on the original image increases its robustness but at the same time we need to make sure that the watermark is imperceptible In this project a invisible watermarking technique least significant bit and an visible watermarking technique is implemented An attack is also implemented on the visible watermarked image by adding a random noise to the watermarked image The watermarked image is then compressed and decompressed using JPEG compression 1 Finally noise is removed and the images are separated from the recovered watermarked image 1 0 Introduction of Digital Watermarking Information hiding can be mainly divided into three processes cryptography stenography and watermarks Cryptography is the process of converting information to an unintelligible form so that only the authorized person with the key can decipher it As many advances were made in the field of communication it became rather simple to decrypt a cipher text Hence more sophisticated methods were designed to offer better security than what cryptography could offer This led to the discovery of stenography and watermarking Stenography is the process of hiding information over a cover object such that the hidden information cannot be perceived by the user Thus even the existence of secret information is not known to the attacker Watermarking is closely related to stenography but in watermarking the hidden information is usually related to the cover object Hence it is mainly used for copyright protection and owner authentication 7 Abrar Ahmed Syed 1000614216 Digital Watermarking 2 0 Watermarking The history of watermark dates back to the 13th century Watermarks were used to indicate the paper brand and the mill that produced it in Italy By the 18th century watermarks began to be used as anticounterfeiting measures on money and other documents and in 1995 interest in digital watermarking began to mushroom Intense research has been carried out in this field for the past few years which has led to the discovery of various algorithms 1 2 3 4 5 Throughout this report some of these techniques are discussed and one such technique is implemented As many advances are made in the field of communication it became rather simple to decrypt a cipher text Hence more sophisticated methods are designed to offer better security than what cryptography can offer This led to the discovery of stenography and watermarking


View Full Document

UT Arlington EE 5359 - Digital Watermarking

Documents in this Course
JPEG 2000

JPEG 2000

27 pages

MPEG-II

MPEG-II

45 pages

MATLAB

MATLAB

22 pages

AVS China

AVS China

22 pages

Load more
Download Digital Watermarking
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Digital Watermarking and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Digital Watermarking and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?