You are on page 1of 5

ROBUST HYBRID WATERMARKING SCHEME CAPABLE

OF PROTECTING AND AUTHENTICATING IMAGE


USING DWT-DCT

A PROJECT REPORT

Submitted by

NAME OF THE CANDIDATE(S)

in partial fulfillment for the award of the

degree of

NAME OF THE DEGREE

IN

BRANCH OF STUDY

NAME OF THE COLLEGE

ANNA UNIVERSITY: CHENNAI 600 025

MONTH & YEAR


ROBUST HYBRID WATERMARKING SCHEME
CAPABLE OF PROTECTING AND AUTHENTICATING
IMAGE USING DWT-DCT

A PROJECT REPORT

Submitted by

in partial fulfillment for the award of the

degree of

BACHELOR OF ENGINEERING

in

INSTRUMENTATION AND CONTROL ENGINEERING

XXX ENGINEERING COLLEGE, KANCHEEPURAM

ANNA UNIVERSITY:: CHENNAI 600 025

MAY 2005
ANNA UNIVERSITY: CHENNAI 600 025

BONAFIDE CERTIFICATE

Certified that this project report Robust Hybrid Watermarking Scheme Capable of
Protecting and Authenticating Image Using DWT-DCT is the bonafide work of
“…………..NAME OF THE CANDIDATE(S).........................................................”

who carried out the project work under my supervision.

<<Signature of the Head of the Department>> <<Signature of the Supervisor>>


SIGNATURE SIGNATURE

<<Name>> <<Name>>
HEAD OF THE DEPARTMENT SUPERVISOR

<<Academic Designation>>

<<Department>> <<Department>>

<<Full address of the Dept & College >> <<Full address of the Dept & College >>
TABLE OF CONTENTS

CHAPTER NO. TITLE

PAGE NO. ABSTRACT

iii
LIST OF TABLES xvi
LIST OF FIGURES xviii
LIST OF SYMBOLS xxvii

1. INTRODUCTION 1

1.1 Introduction
1.2 Different kinds of Watermarking.
1.3 Image watermarking
1.4 Spatial and Transform Domain
1.5 Problem Statement
1.6 Main objectives of the project
1.7 Proposed Approach

2. LITERATURE REVIEW
2.1 Spatial Domain Watermarking
2.2 Hybrid Domain Watermarking
3. REQUIREMENT SPECIFICATIONS
3.1 Introduction
3.2 Hardware and Software Specification
3.3 Technologies Used
4. DESIGN METHDOLOGY
4.1 Existing system
4.2 Proposed System
MODULE DESCRIPTION
4.3 Robust Watermarking
4.4 Fragile Watermarking
4.5 Fragile and robust watermark extraction
4.6 Flow Diagram
4.7 DCT
4.8 Zigzag
4.9 Robust Watermark Embedding
5 SCREENSHOTS
6 CONCLUSION
7. REFERENCE

You might also like