Preview

Watermarking Project Documentation

Good Essays
Open Document
Open Document
13910 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Watermarking Project Documentation
INTRODUCTION

1. INTRODUCTION

1.1 Digital Image

A digital image is a representation of a two-dimensional image using ones and zeros (binary). Depending on whether or not the image resolution is fixed, it may be of vector or raster type. Without qualifications, the term "digital image" usually refers to raster images also called bitmap images.

Digital images are pictures that have been converted into a computer readable binary format consisting of logical 0s and 1s. Usually, by an image we mean a still picture that does not change with time, where as a video evolves with time and generally contains moving and/or changing objects. This project deals primarily with still images. Digital images are usually obtained by converting continuous signals into digital format, although “direct digital” systems are becoming more prevalent. Likewise, digital images are viewed using diverse display media, included digital printers, computer monitors, and digital projection devices. The frequency with which information is transmitted, stored, processed, and displayed in a digital visual format is increasing rapidly, and as such, the design of engineering methods for efficiently transmitting, maintaining, and even improving the visual integrity of this information is of heightened interest.

1.2 Digital Image Processing

An image may be defined as a two-dimensional function, f(x,y) where x and y are spatial coordinates, and the amplitude of f at any pair of coordinates (x,y) is called the intensity or gray level of the image at that point. When x, y and the amplitude values of f are all finite, discrete quantities, we call the image a digital image. The field of digital image processing refers to processing digital images by means of a digital computer. Note that a digital image is composed of a finite number of elements, each of which has a particular location and value. These elements are referred to as picture elements or image elements or



References: | |Piva., A |Image Processing 10 (5) 783–791, 2001. | |5 |Bas P, J | |and Macq. B |Processing, Vol. 11, No. 9, pp. 1014-1028, 2002. | |6 |Bender .W | |and Morimoto .N |Database, vol. 2420, pp. 164–173, 1995. | |7 |Bender W., et.al |“Techniques for Data Hiding”, In IBM Systems Journal, 1996, Vol | |Daubechies I., et.al |Computational Harmonic Analysis, 1998, Vol. 5, pp.332-369. | |9 |Carlson, A.B., et.al |“Communication Systems” |10 |Celik M, Sharma GM, Tekalp.|“Lossless watermarking for image authentication: a new framework and an | | |A |implementation”, IEEE Trans Image Proc;15(4):1042–9, 2006 | | | |August 4-7, 3, pp. 264–267, 2002. | |13 |Chang C.C | | |images,” J.Systems Software 79, 1754-1766, 2006. | |14 |Chang | |Hwang .M.S |Proceedings – Vision, Image and Signal Processing 149 (1) 43–50, 2002. | |15 |Chang |17 |Chen.L |“VLSI Design of Wavelet Transform: Analysis, Architecture and Design Examples”, Imp. | | | |College press, 2007 |18 |Cheng Yaw Low, Andrew Beng |“Fusion of LSB and DWT Biometric Watermarking for Offline Handwritten Signature”, | | |Jin Teoh |Congress on Image and Signal Processing, pp.702-708, 2008 |19 |Chung-Ming Wang a, Nan-I Wu|“A high quality steganographic method with pixel-value differencing and modulus | | |a, et.al |function,” The Journal of Systems and Software, 2007 |21 |Cox I.J, Linnartz J.P.M.G |“Some general methods for tampering with watermarks”, IEEE J Select Area | | | |Commun;16(4),pp.587–93, 1998 |22 |Cox, I.J, Miller. M.L |“Digital Watermarking”, Morgan Kaufmann Publishers Inc. San Francisco, USA, 2001. | |23 |Craver |24 |Daubechies Ingrid |“Ten Lectures on Wavelets,” Society for Industrial and Applied Mathematics, 1992. | |25 |De Vleeschouwer C., et.al |“Circular Interpretation of Histogram for Reversible Watermarking”, In Proc | | |4th Workshop on Multimedia Signal Processing, pp. 345-350, 2001. | |26 |De Vleeschouwer C., |“Circular Interpretation of Bijective Transformations in Lossless Watermarking for | | |.O.R |pp. 1335-1342, 1979. | |28 |Dougherty E | |Astola |Press, Washington, 1994. | |29 |Dugad.R, Ratakonda .K, and|“A new wavelet-base for water- marking image,” in Proc | |Ahuja .N |vol. 2, pp. 419–423, 1998. | |30 |Fisher J., Gasteratos |“Mathematical morphology operations and structuring elements”, In CVonline: On-Line | | | |Filters, 2001. | |31 |Fridrich J | | |Bifurcation and Chaos, 8(6), pp. 1259-1284, June 1998. | |32 |Fridrich J., Goljan M., |“ 'Invertible Authentication”, In Proc | |and Rui D., |Watermarking of Multimedia Contents III, San Jose, California, USA, Vol. 3971, pp. | | | |197-208, January 2001 | | |California, USA, Vol. 4675, pp. 572-583, January, 2002. | |34 |Fridrich J., Goljan M |36 |Gaurav Bhatnagar, et.al |“DWT-SVD based Dual Watermarking Scheme,” IEEE Trans. pp.526-531, 2008. | |37 |Ghazy | | |Prentice-Hall, 1988. | |39 |Gorodetski |42 |Haralick R. and Shapiro L. |“An Introduction to Nonlinear Image Processing,” Vol.16, SPIE Optical Engineering | | | |Press, Washington, 1994

You May Also Find These Documents Helpful

  • Powerful Essays

    Digital graphics are in their own way an art form, digitally constructed to create phenomenal images. However, you need to have some sort of artistic ability combined with a suitable computer system before you can design the perfect graphic.…

    • 3549 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    Video Signal Technology- Video signals can be both analog and digital signals. Analog video consists of a low voltage signal containing intensity information, timing information, and a horizontal sync signal. Digital video signals contain a series of digital images displayed in rapid succession in “frames”, measured by FPS (frames per second).…

    • 302 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Once something is on a computer, it can replicate and move around the world in a heartbeat. Making a million perfect copies takes but an instant – copy of things we want everyone in the world to see, and also copies of things that weren’t meant to be copied at all.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Describe theory and applications of digital graphics technology with some appropriate use of subject terminology.…

    • 742 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    References: Ali, I. (2006, July 24). Copyright Protection-Software-Computer Programs. Retrieved December 4, 2010 from http://www.lawdit.co.uk/reading_room/room/view_article.asp?name=../articles/Computer%20Protection-%20Software-Computer%20Programs.htm…

    • 1793 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    As a child, were you intrigued by the idea of sending a secret message to your best friend? Perhaps you were fascinated by the thought of using an invisible ink pen. If so, then I suggest learning about steganography. According to the online Free Merriam-Webster Dictionary, the definition of steganography is the art or practice of concealing a message, image, or file within another message, image, or file (Merriam-Webster, 2011). People can use many different techniques for steganography, using it for a variety of reasons. Steganography has been used for many years in forms such…

    • 789 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Pub Case Study

    • 473 Words
    • 2 Pages

    On Friday, June 30, 2000, however, researchers at AT&T Labs announced the creation Publius, a software program that enables Web users to encrypt (translate into a secret code) their files – text, pictures or music – break them up like the pieces of a jigsaw puzzle, and store the encrypted pieces on many different servers scattered all over the globe on the World Wide Web. As a result, anyone wanting to examine or censor the files or wanting to trace the original transaction that produced the file would find it impossible to succeed because they would have to examine the contents of dozens of different servers all over the world, and the files in the servers would be encrypted and fragmented in a way that would make the pieces impossible to identify without the help of the person who created the file. A person authorized to retrieve the file, however, would look through a directory of his files posted on a Publius-affiliated website, and the Publius network would reassemble the file for him at his request. Researchers published a description of Publius at www.cs.nyu.edu/waldman/publius.…

    • 473 Words
    • 2 Pages
    Good Essays
  • Better Essays

    is taken, the cameras attach a coded signature that is destroyed if the image is modified and resaved. An…

    • 1137 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Since 1880s visual artists and storytellers have used moving images to create amazing works. Movies have inspired as, Thrilled as and captured our imagination. Film helped share our experiences and dreams. Photo-chemical film has been exclusive format used to capture, develop, project and store moving images for more than 100 years. And it is only recently that the new technology has emerged that is challenging films place is the gold standard of quality and the work flow. Digital technology is evolving to a point that may very well replace film as the primary meanings of creating and sharing motion pictures.…

    • 528 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    With the proliferation of 3-D Printers and the availability of copyrighted materials posted online, there is an additional facet to the current debate surrounding copyright and ownership of intellectual property. Piracy of digital media such as music and videos has been a long-standing issue since the 1990’s with Napster and similar peer-to-peer file sharing programs.…

    • 4860 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Steganography

    • 928 Words
    • 4 Pages

    Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would tattoo messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code.…

    • 928 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Also, misused and unauthorized access to personal and private information has become a serious challenge in the digital world. Encryption is a classic and efficient method to solve these issues. However, traditional standard methods such as DES and AES are typically designed for textual information. Those methods due to certain characteristics such as large data and high correlation among pixels are not suitable for multimedia information…

    • 1090 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Digital Camera

    • 467 Words
    • 2 Pages

    The image quality produced by a digital camera is measured by the number of bits it stores in a dot and the resolution,…

    • 467 Words
    • 2 Pages
    Good Essays