Upload
vikramraju
View
223
Download
0
Embed Size (px)
Citation preview
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 1/37
A Fragile Watermarking AlgorithmA Fragile Watermarking Algorithm
Based on Logistic System and JPEGBased on Logistic System and JPEG
Under the Esteemed Guidance of
SRI K.AMARENDRA
Associate Professor & HOD
Department of CSE
PRESENTED BY
SUSRUTHA CHINNI
(07U41A0548)
KUNA PRAVEENA
(07U41A0523)
N.VIKRAM RAJU
(07U41A0532) V.RAJA
(07U41A0553)
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 2/37
What is a Watermark ?What is a Watermark ?
v
v
vWatermark
l Recognizable image or pattern in paper that appears lighter when
viewed by transmitted light.A watermark is often a faded image or
text used as a background of a slide. Watermarks are sometimes
used in the form of a logo, discreetly placed on a slide to brand the
presentation.
Eg: Currency Notes and Logos
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 3/37
What is Digital Watermarking ?What is Digital Watermarking ?
vA digital watermark is a digital signal or pattern inserted into a digital
document such as text, graphics or multimedia, and carries information
unique to the copyright owner, the creator of the document or the
authorized consumer.
vMessage is a group of bits describing information pertaining to the signal
or its author.
v
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 4/37
History of Lena(Lenna)History of Lena(Lenna)
vLena Sjooblom, (also spelled Lenna by many publications) was the Playboy playmate in November 1972 and rose to fame in thecomputer world when researchers atthe University of SouthernCalifornia scanned and digitized her image inJune 1973.
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 5/37
Working ThemeWorking Theme
Watermarkin
gAlgorithm
WatermarkedImageOriginalImage
Watermark
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 6/37
Watermarking ProcessWatermarking Process
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 7/37
Classification of WatermarkingClassification of Watermarking
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 8/37
Visible WatermarkingVisible Watermarking
vIn Visible Watermarking, the information is visible in the picture or
video. Typically, the information is text or a logo, which identifies
the owner of the media. The image on the right has a visible
watermark. When a television broadcaster adds its logo to the corner
of transmitted video, this also is a visible watermark.
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 9/37
Invisible WatermarkingInvisible Watermarking
vIn invisible digital watermarking, information is added as digital data
to audio, picture, or video, but it cannot be perceived as such (although
it may be possible to detect that some amount of information is hidden
in the signal)
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 10/37
Concept DevelopmentConcept DevelopmentvRobust Watermark
l Embedded invisible watermarks.
l Resist to image processing or attacks.
l Used for copyright protection or to verify the ownership.
vFragile Watermark l Mainly used for the authentication and integrity verification of the images transmitted through internet
has attracted more attention in the research and industrial communities.
l Used for tamper detection
vSemi Fragile Watermark l Sensitive to signal modification
l Feature of both robust & Fragile watermark.
l Provides data authentication
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 11/37
v Blind Watermark (or) Public Watermark
The original signal is not needed during the detection process to detect the mark.
v Non Blind Watermark (or) Private Watermark
The original cover signal is required during the detection process.
v Semi –Blind Watermark
§ In Particular some Watermarking Schemes require access to the ‘Published’
watermarked signal ,that is the original signal just adding the Watermark.
v Asymmetric Watermark (or) Public Key Watermark
The detection process (and in particular the detection key) is fully known to
anyone as opposed to blind watermarking where a secret key is required. So
here, only a 'public key' is needed for verification and a 'private key' (secret) is
used for the embedding though.
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 12/37
Steganography V/S watermarkingSteganography V/S watermarking
vWatermarking the hiding data is used to protectthe original image (e.g. copyrightmanagement)
vSteganography the image is used to protect thehiding data (e.g. secret message).
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 13/37
Drawbacks of Existing SystemDrawbacks of Existing System
vIllegal Copyingv
vFalsificationv
v No Copyright Protectionv
v No Ownership Identification
v No Robustness
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 14/37
Proposed SystemProposed System
vDue to above mentioned failures a new technique has been
proposed so that to cover and maintain the drawbacks prevailed in
the previous system and hence a technique called Fast Hadamard
Transformation(FHT) is proposed.
vThe FHT embedding algorithm was found to provide a robust and
efficient approach to perform digital watermarking of digital image
data for copyright protection and proof of rightful ownership.
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 15/37
Admin
+Username
#password
Images
+JPEG
+change_view()
+Loading()
+verification()
+Tamper_Location()
Algorithm
+Fragile_WaterMarking()
+Logistic_System()
Load image
1..*1
depends on
1
1
Fig 1:Class Diagram for Fragile Watermarking
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 16/37
System
Admin
Login
Username & password
Invalid user
<<extend>>
select image folder
Change image view
Quit
Watermark image
Change the image mode
Fig 2 : Use Case Diagram for Fragile Watermarking
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 17/37
AdminSystem AlgorithmLogin
1 : Username
,password()2 : Verification()
3 : Authorized Person()
4 : Select image folder()
5 : Load image()
6 : Apply image view()
7 : Change view()
8 : Load Output()
9 : Show Output()
Fig 3:Sequence Diagram for Fragile Watermarking
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 18/37
Login
valid user
Invalid user
Select image folder
Change image view
Watermark the image
exit
Fig 5:Activity Diagram for Fragile Watermarking
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 19/37
Output ScreensOutput Screens
Fig 1: login form for user
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 20/37
Fig 2: Before Importing the images
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 21/37
Fig 3:After Importing the Images
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 22/37
Fig 4 :Adjusting the Mode
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 23/37
Fig 5: Process for applying watermark text to Image
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 24/37
Fig 6: Inserting the Watermark Text to the Selecting Image
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 25/37
Fig 7 : Starting the Progress bar
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 26/37
Fig 8: Watermark Image
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 27/37
Fig 9 : Process to View the Slide Show
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 28/37
Test Case ReportsTest Case Reports
Test No. Test Case Expected Output Actual Output Result
1. Invalid Log In Test: By providing invalidUser name andPassword
A dialog Box to bedisplayed sayingInvalid Login, AccessDenied
A dialog Box isdisplayed sayingInvalid Login, AccessDenied
Passed
2. Valid Log In Test: Byproviding Valid Username and Password
The Text Screen foraccepting the text tobe shown
The Text Screen foraccepting the text isshown
Passed
3. Invalid input test: By providing invalid input images
It will not showimages
It will show error onruntime
passed
4. Valid input test: By providing valid input images(jpeg)
It will show images It will show images passed
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 29/37
Fig 1 :Test case Report Screen
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 30/37
ApplicationsApplications
vCopyright protection :Digital watermarks can be used to Identify and protect copyright ownership.
v Tracking : Digital watermarks can be used to track the usage of digital
content.
vBroadcast Monitoring: Digital watermarks can be used to monitor
broadcasted content like television and broadcast radio.
vContent protection for audio and video content.
vDocument and image security.
v
v
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 31/37
vAuthentication & integrity verification :
§Watermarks should be able to detect even the slightest
change in the document.
§A unique key associated with the source is used the
create the watermark and then embed in the document.
§This key is then used to extract the watermark and the
integrity of the document verified on the basis of the
integrity of the watermark
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 32/37
AdvantagesAdvantages
vFragile Watermarking Algorithm
vCopyright Protection.
vApplicable to all content types (images, documents,
movies, music, TV)
vFHT(Fast Hadamard Transformation)
§ Shorter processing time
§ Invisibility of the watermark guaranteed
§ Increased watermark energy leads to higher robustness
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 33/37
DisadvantagesDisadvantages
vThe blind watermarking algorithm which is really robust
is not in existence today.
vBy knowing the exact content of watermark and
algorithms to embedded and retrieve it.
vHacker can erase the watermark easily ,by knowing the
exact content of watermark and algorithms to
embedded and retrieve it .
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 34/37
ConclusionConclusion
v The large need of networked multimedia system has created the need
of COPYRIGHT PROTECTION .It is very important to protect
intellectual properties of digital media.
v Internet playing an important role of digital data
transfer. Digital watermarking is the great solution of the problem
of how to protect copyright. Digital watermarking is the solution
for the protection of legal rights of digital content owner and
customer.
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 35/37
BibliographyBibliography
1)R Van Schyndel, A Trikel, C Osborne. A digital watermark. Proceedings of
IEEE International Conference on Image Processing, ICIP1994
2) R Wolfgang, E Delp. A watermark for digital images. Proceedings of the
IEEE International Conference on Image Processing, ICIP1996
3) YU Miao, HE Hongjie, ZHANG Jiashu. A digital authentication
watermarking scheme for JPEG images with superior localization and
security. Science in China Series F: Information Sciences. 2007
4)http://www.Scribd.com
5)http://www.seminarprojects.com
6)http://www.metois.com
8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram
http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 36/37
A n y
Q ue r
i e s