SYNOPSIS OF DIGITAL WATER MARKINGDiscrete Cosine Transform(DCT) and Discrete Wavelet Transform(DWT


MADE BY: ANSHUL ARORA – 1751152808 MADHURIMA KUMAR – 1801152808 ATIREK GUPTA – 1821152808 PRAGATI MALIK – 1831152808 (ECE-2 , 3rd year)

and all the marks together constitute the watermark. manipulation and editing. It is the process by which identifying data is woven into media content such as images. decryption and broadcast — without affecting the quality of the content. music or programming. Digital watermarking is the process of embedding information into a digital signal in a way that is difficult to remove. APPLICATIONS Digital Watermarking can be used for a wide range of applications such as: • • • • Copyright protection Source Tracking (Different recipients get differently watermarked content) Broadcast Monitoring (Television news often contains watermarked video from international agencies) Covert Communication ABSTRACT OF THE MINI PROJECT This mini project introduces the algorithm of digital watermarking based on Discrete Cosine Transform(DCT) and Discrete Wavelet Transform(DWT). compression and decompression. a digital watermark remains constant even through recording. digital identity that can be used for a variety of valuable applications. pictures or video.INTRODUCTION Watermark is a recognizable image or pattern in paper used to identify authenticity. audio. Protection schemes are usually based upon the insertion of digital watermarks into the data. and text has long been a concern for owners of these digital assets. images. These intentional errors are called marks. movies. The watermarking software introduces small errors into the object being watermarked. . The signal may be audio. video. The marks are chosen so as to have an insignificant impact on the usefulness of the data and are placed in such a way that a malicious user cannot destroy them without making the data significantly less useful. encryption. Imperceptible to the human senses yet easily recognized by special software detectors. NEED FOR WATER MARKING The piracy of software. giving those objects a unique.

The simulation results show that this algorithm is invisible and has good robustness for some common image processing operations.According to the characters of human vision. the information of digital watermarking which has been discrete Cosine transformed. in this algorithm. Then distils the digital watermarking with the help of the original image and the watermarking image. . is put into the high frequency band of the image which has been wavelet transformed.

Sign up to vote on this title
UsefulNot useful