You are on page 1of 8

i

DESIGN AND IMPLEMENTATION OF AN ADAPTIVE

DIGITAL ENCRYPTION PROTECTED SYSTEM USING

WATERMARKING.
ii

DECLARATION

This is to verify that this project work: “design and implementation of an adaptive

digital encryption protected system using watermarking” was carried out by Ilonor

N. Victor with the registration number MOUAU/CME/15/84585 and approved in

the department of Computer Engineering in Michael Okpara University of

Agriculture, Umudike, Abia State under the supervision of Engr. Aguodoh Patrick.

……………………………….. …………………..
ILONOR N. VICTOR DATE
MOUAU/CME/15/84585
iii

CERTIFICATION

I certify that this project work was carried out by Ilonor N. Victor with the

registration number MOUAU/CME/15/84585 and approved by the Department of

Computer Engineering, Michael Okpara University of Agriculture Umudike, Abia

State. As meeting the requirement for the award of Bachelor of Engineering

(B.Eng), Computer Engineering.

……………………………………………. …………………
Engr. Aguodoh Patrick Date
(Project supervisor)

……………………………………………. …………………
Engr. Dr. E. U. Udo Date
(Head of Department)
iv

DEDICATION

To everyone who believed in me I am grateful for your trust and every word of

encouragement
v

ACKNOWLEDGEMENT

I want to appreciate my supervisor Engr. Aguodoh Patrick, for being available

every time I needed him also for his constructive criticism towards the finishing of

this work.

Finally, I thank God for life and inspiration


vi

TABLE OF CONTENT

Title page i
Declaration ii
Certification iii
Dedication iv
Acknowledgment v
Table of content vi
Abstract viii

CHAPTER 1

INTRODUCTION

1.1 BACKGROUND TO THE STUDY 1


1.2 STATEMENT OF THE PROBLEM 2
1.3 AIM AND OBJECTIVES OF THE STUDY 3
1.4 SCOPE OF THE STUDY 3
1.5 SIGNIFICANCE OF THE STUDY 4
1.6 ORGANISATION OF THE WORK 5

CHAPTER 2

LITERATURE REVIEW

2.1 SPATIAL DOMAIN 6


2.1.1 Checksum Technique 6
2.1.2 Basic M-sequence approach 7
2.1.3 Secure Spread Spectrum Watermarking for Multimedia 8
2.2 FREQUENCY DOMAIN 9
2.3 A WAVELET-BASED WATERMARKING ALGORITHM
FOR OWNERSHIP VERIFICATION OF DIGITAL IMAGE 9
2.4 HIERARCHICAL WATERMARKING DEPENDING
ON LOCAL CONSTRAINTS 10
2.5 IMAGE WATERMARKING BASED ON DWT 10
2.6 BEHAVIOUR OF DIGITAL WATERMARKING 14
vii

CHAPTER 3

MATERIALS AND METHODS


3.1 MATERIALS 22
3.2 ANALYSIS OF THE SYSTEM 24
3.3 TYPES OF WATERMARKS 25
3.3.1 Visible Watermarks 25
3.3.2 Invisible Watermarks 26
3.4 DEFINITION OF METHODS 28
3.4.1 List of Methods 28
3.4.2 Choice of Method Used 31
3.4.3 Benefits of object-oriented approach 32
3.4.4 Benefits of Top down Design 33
3.5 SYSTEM ANALYSIS 34
3.5.1 Feasibility Report 34
3.6 SYSTEM ALGORITHM 35
3.7 SYSTEMS DEIGN TECHNIQUE 37
3.8 DATA GATHERING/ COLLECTION 38
3.9 THE PROPOSED SYSTEM 39
3.9.1 Flow Chart of the Proposed System 40
3.9.2 Input and output process of the system 41
REFERENCES
viii

ABSTRACT

This project introduces an unfamiliar method of watermarking, the digital


watermarking technique. Rights protection for the data which is confidential or
belonging to a particular group which cannot be copied or used is watermarking
process. This embeds a signal into data for copy- right control. There are many
algorithms and methods avail- able which are ready and easy to implement in
market. These have been successful to a level in multimedia applications, but these
were unsuccessful in the issue of noise, security and robustness. In this paper we
present the digital watermarking technique overview which approaches these
problems in a unique way being highly effective and efficient against several forms
of attacks that can destroy the originality of the content. It clearly describes how
the process such as embed- ding, detection and response against the watermarks,
which humans cannot identify and how triggering activity is done. The system was
developed in such manner that it provides maximum user friendly interface using
PHP (Hypertext pre-processor) programming language using the XAMPP as the
testbed.

You might also like