Digital Watermarking Abrar Ahmed Syed 1000614216 [email protected] The University of Texas, Arlington Guided by Dr. K.R.RaoDigital Watermarking 2 Abrar Ahmed Syed 1000614216 EE 5359 MULTIMEDIA PROCESSING PROJECT REPORT DIGITAL WATERMARKING Under guidance of Dr.K.R.Rao Submitted By, Abrar Ahmed Syed 1000614216 [email protected] The University of Texas at ArlingtonDigital Watermarking 3 Abrar Ahmed Syed 1000614216 Table of Contents Abstract .................................................................................................................................................. 7 1.0 Introduction of Digital Watermarking ................................................................................................ 7 2.0 Watermarking ................................................................................................................................... 8 2.1 Definition of Watermarking ........................................................................................................... 8 2.2 Principle of Watermarking ............................................................................................................. 9 3.0 Requirements .................................................................................................................................. 10 3.1 Transparency: .............................................................................................................................. 10 3.2 Robustness: ................................................................................................................................. 10 3.3 Capacity or Data Load: ................................................................................................................. 10 4.0 Applications ..................................................................................................................................... 10 4.1 Copyright Protection: ................................................................................................................... 10 4.2 Authentication: ............................................................................................................................ 10 4.3 Broadcast Monitoring: ................................................................................................................. 10 4.4 Content Labeling: ......................................................................................................................... 10 4.5 Tamper Detection: ....................................................................................................................... 10 4.6 Digital Fingerprinting: .................................................................................................................. 10 4.7 Content protection: ..................................................................................................................... 11 5.0 Classifications of Watermarking ....................................................................................................... 11 5.1 Visible .......................................................................................................................................... 11 5.2 Invisible ....................................................................................................................................... 11 5.2.1 Robust Watermarks .............................................................................................................. 11 5.2.2 Fragile Watermarks ............................................................................................................... 11 5.2.3 Public and Private Watermark ............................................................................................... 12 5.3 Capacity ....................................................................................................................................... 12 5.4 Perceptibility ............................................................................................................................... 12 5.5 Embedding Techniques: ............................................................................................................... 12 5.5.1 Spread Spectrum ................................................................................................................... 12Digital Watermarking 4 Abrar Ahmed Syed 1000614216 5.5.2 Quantization ......................................................................................................................... 12 5.5.3 Amplitude Modification: ....................................................................................................... 12 6.0 Techniques or Schemes of Watermarking ........................................................................................ 13 6.1 Spatial Domain Techniques .......................................................................................................... 13 6.1.1 Least Significant Bit Coding (LSB) ........................................................................................... 13 6.1.2 Predictive Coding Schemes .................................................................................................... 13 6.1.3 Correlation-Based Techniques ............................................................................................... 13 6.1.4 Patchwork Techniques .......................................................................................................... 14 6.2 Frequency Domain techniques ..................................................................................................... 14 6.2.1 Discrete cosine transform (DCT) based technique: ................................................................ 14 6.3 Wavelet Transform based Watermarking ..................................................................................... 18 6.4 Simple Watermarking .................................................................................................................. 19 7.0 Attacks ............................................................................................................................................ 20 7.1 Basic ............................................................................................................................................ 20 7.2 Robustness
View Full Document