Professional Documents
Culture Documents
Prepared by
Mr.Abhishek Chaube
Mr.Bharat Chauhan
Mr.Deepak Chandrasekharan.
to
UNIVERSITY OF MUMBAI
through
in
Dec 2010
1
CERTIFICATE
This is to certify that the report titled
“IMAGE WATERMARKING”
Mr.Abhishek Chaube
Mr.Bharat Chauhan
Mr.Deepak Chandrasekharan
2
Signature………………… Signature…………………
Name…………………… Name…………………….
Internal Examiner External Examiner
CONTENTS
Sr
. Sub. Pg
TOPIC
N Sec. No
o
1. Acknowledgement 4
2. Abstract 5
3. System Overview 9
4 Module Description 20
5. Planning 11
6. Gantt Chart 13
7. Formulation 14
8 Progress/Screenshots 23
9 Current Progress 29
10 Conclusion 30
10.1 Benefits 30
3
10.2 Features 30
References 32
ACKNOWLEDGEMENT
NAMES OF STUDENTS:
ABHISHEK CHAUBE
4
BHARAT CHAUHAN
DEEPAK CHANDRASEKHARAN
iii
ABSTRACT
One of the biggest technological events of the last two decades was
the invasion of digital media in an entire range of everyday life
aspects. Digital data can be stored efficiently and with a very high
quality, and it can be manipulated very easily using computers.
Furthermore, digital data can be transmitted in a fast and
inexpensive way through data communication networks without
losing quality.
5
1. OVERVIEW
1.1 INTRODUCTION
The popularity of World Wide Web demonstrated the
commercial potential of offering multimedia resources
through the digital networks.
6
With images widely available on the Internet, it may
sometimes be desirable to use watermarks. A watermark is a
secondary image which is overlaid on the primary image,
and provides a means of protecting the image
Visible
A visible watermark is a visible translucent image which is
overlaid on the primary image. Perhaps consisting of the logo or
seal of the organization which holds the rights to the primary
image, it allows the primary image to be viewed, but still marks it
clearly as the property of the owning organization.
Invisible
An invisible watermark is an overlaid image which cannot be seen,
but which be detected algorithmically.
7
o A watermark which is destroyed when the image is
manipulated digitally in any way may be useful in proving
authenticity of an image.
8
SYSTEM OVERVIEW
9
1.2 LITERATURE SURVEY
1.2.1History Of Watermarking
More than 700 years ago, watermarks were used in Italy to
indicate the paper brand and the mill that produced it.
By the 18th century watermarks began to be used as anti
counterfeiting measures on money and other documents
measures on money and other documents.
The term watermark was introduced near the end of the 18th
century. It was probably given because the marks resemble
the effects of water on paper
The first example of a technology similar to digital
watermarking is a patent filed in 1954 by Emil Hembrooke
for identifying music works.
In 1988, Komatsu and Tominaga appear to be the first to use
the term “digital watermarking”.
About 1995, interest in digital watermarking began to
mushroom.
10
1.2.2 Implementation and Evaluation of Several
Watermarking Algorithms.
This section will describe some of the algorithms recently
implemented upon.
Least Significant Bit Substitution
11
contribute to the image much, some attacker can possibly
zero out several least significant bits of all pixels of the
image and hence clear the watermark. This algorithm also
will not be robust against JPEG compression because it is
performed in the spatial domain and involves least
significant bits of the image pixels
Patchwork Algorithm
12
movement and translation of pixels, basic filtering
operations such as erosion and dilation change the values of
ai and bi such that the assumption on E[S] does not hold any
more. Hence, the watermark becomes undetectable.
13
same robustness problem described for the patchwork
algorithm.
CDMA Watermarking
I found that this algorithm does not affect the visual quality
of the image if small gain factors are used.
14
It is also somewhat resilient to JPEG compression, however
the probability that all watermark bits will be recovered after
compression is usually low.
15
to embed the watermark in mid-frequency components of the
DFT amplitude.
This algorithm also does not affect the visual quality of the
image much if the gain factor is chosen as a small value
shows the watermarked image where the watermark is
embedded in mid-frequency components.
16
The watermarking scheme preserves its robustness against
JPEG compression if the watermark bits are embedded in the
lowest frequency DCT coefficients. There are only a few
DCT coefficients in which the watermark can be embedded.
If we want to increase the payload of the watermark, then
these coefficients may need to be modified significantly
which probably will impact the quality of the image.
Therefore, it might be better to use a scheme which embeds
watermark bits into both low and mid-frequency DCT
coefficients.
17
Due to the exploitation of HVS, this algorithm does not
affect the visual quality of the image much. In fact it might
even sharpen some parts of the edges in the image.By
increasing theenergy of the watermark, the algorithm
becomes more robust compared to other spatial-domain
watermarking techniques.
18
Authentication for data integrity check
Covert communication
Labelling and annotations.
ATTACKS ON WATERMARKS
19
2. MODULAR DESCRIPTION:
Data Design:
Embedding:
Message File: The data to be concealed.
20
Cover File: The file which will be used to hide the message (also called a
carrier or a container.)
Algorithm: This algorithm to be used to embed the message one wants to hide
within the carrier using a watermarking technique which give Stego-file as
output.
Extracting:
Output:
Produces watermark as output.
FORMULATION
Class diagram:
21
watermarktool
show_cover()
show_message()
show_cover_size()
show_message_size()
hide
select_cover() extract
select_message()
hide_process() extracting_process()
select_watermarkimage()
22
Use case diagram (Extracting):
23
Sequence diagram :
Hiding Extracting
: watermarktool
: user
Select coverfile( )
show_message file( )
Hide( )
password entered( )
password validation( )
yes continue( )
4.2.3 Collaboration
diagram:
24
8: Key validation
11: Embed message into cover
1:Select mark image
3:Select message file
5:Hide
7:key entered
10:
Yes continue
user
Wm tool
2: Show cover
4: Show message
6: Enter key
9: Valid continue?
12:
Mark image
4: Key validation
7: Extraction process
Select markimage
1:
3: Key entered
6: Yes continue
user Wm
tool l
2: Enter key
Valid continue
5:
Data Extracted
8:
Yes
Valid user?
No
Notify user
Re enter
key
Unhide
26
Provide secret data
Provide key
No
Notify user
Hide
27
4.3.1 Hiding:
Level 0
Embedding
algorithm
cover image water marked image
watermark
Level 1
Input Validate
Data Data Valid Data
key
Data
Compression
Data File
Compressed data
DCT
Operation
Dct Coefficients
Quantize
Embedding
Operation
Quantized Dct
DCT Coefficients
Coefficient
Quantization Table
+ Data
De-Quantize IDCT
Operation
Quantized Dct
Coefficients
4.3.2 Extracting: Stego Image
Display
Level 0
28
Extraction algorithm
watermarked image original image
watermark
Level 1
User Notification
key
DCT
Operation
mark Image
Dct Coefficients
Retrieval Quantize
Operation
Quantized Dct
Coefficients
Compressed
Data file Quantization Table
De - Compression
Display
Data File
29
PERT CHART
30
GANTT CHART
31
4. PROGRESS
Extracting frame.
As of now, the user can only validate into the system using the password
provided by the administrator. In future, the application will also provide the
following functionalities:
Hiding of image.
Extracting of image.
Compression of image.
Secure sending of image from source to destination.
Retrieval of image at destination.
De-Compression of image.
Displaying the image.
32
33
34
5. CONCLUSION
35
APPENDIX A
WATERMARK DEFINITION 3
GANTT CHART 11
CLASS DIAGRAM 12
COMPONENTDIAGRAM 13
DEPLOYMENT DIAGRAM 14
36
REFERENCES
1. WEBSITES:
www.google.com
www.w3schools.com
www.programmingtutorials.com
www.IEEE.org
http://www.eurecom.fr/util/publidownload.en.htm?id=975
3. BOOKS:
INTRODUCTION TO DIGITAL IMAGE PROCESSING WITH MATLAB BY
ALASDAIR MCANDREW
37