Top Banner

of 55

Abrar Ahmed Syed_Digital Watermarking

Oct 23, 2014

ReportDownload

Documents

Digital WatermarkingAbrar Ahmed Syed1000614216 abrar.syed@mavs.uta.edu The University of Texas, Arlington Guided by Dr. K.R.Rao

Digital Watermarking

EE 5359 MULTIMEDIA PROCESSING PROJECT REPORT

DIGITAL WATERMARKING

Under guidance of Dr.K.R.Rao

Submitted By,

Abrar Ahmed Syed 1000614216abrar.syed@mavs.uta.edu

The University of Texas at Arlington

2

Abrar Ahmed Syed 1000614216

Digital Watermarking

Table of ContentsAbstract .................................................................................................................................................. 7 1.0 Introduction of Digital Watermarking ................................................................................................ 7 2.0 Watermarking ................................................................................................................................... 8 2.1 Definition of Watermarking ........................................................................................................... 8 2.2 Principle of Watermarking ............................................................................................................. 9 3.0 Requirements .................................................................................................................................. 10 3.1 Transparency: .............................................................................................................................. 10 3.2 Robustness: ................................................................................................................................. 10 3.3 Capacity or Data Load: ................................................................................................................. 10 4.0 Applications ..................................................................................................................................... 10 4.1 Copyright Protection: ................................................................................................................... 10 4.2 Authentication: ............................................................................................................................ 10 4.3 Broadcast Monitoring: ................................................................................................................. 10 4.4 Content Labeling: ......................................................................................................................... 10 4.5 Tamper Detection: ....................................................................................................................... 10 4.6 Digital Fingerprinting: .................................................................................................................. 10 4.7 Content protection: ..................................................................................................................... 11 5.0 Classifications of Watermarking ....................................................................................................... 11 5.1 Visible .......................................................................................................................................... 11 5.2 Invisible ....................................................................................................................................... 11 5.2.1 Robust Watermarks .............................................................................................................. 11 5.2.2 Fragile Watermarks ............................................................................................................... 11 5.2.3 Public and Private Watermark ............................................................................................... 12 5.3 Capacity ....................................................................................................................................... 12 5.4 Perceptibility ............................................................................................................................... 12 5.5 Embedding Techniques: ............................................................................................................... 12 5.5.1 Spread Spectrum ................................................................................................................... 12

3

Abrar Ahmed Syed 1000614216

Digital Watermarking

5.5.2 Quantization ......................................................................................................................... 12 5.5.3 Amplitude Modification: ....................................................................................................... 12 6.0 Techniques or Schemes of Watermarking ........................................................................................ 13 6.1 Spatial Domain Techniques .......................................................................................................... 13 6.1.1 Least Significant Bit Coding (LSB) ........................................................................................... 13 6.1.2 Predictive Coding Schemes.................................................................................................... 13 6.1.3 Correlation-Based Techniques ............................................................................................... 13 6.1.4 Patchwork Techniques .......................................................................................................... 14 6.2 Frequency Domain techniques ..................................................................................................... 14 6.2.1 Discrete cosine transform (DCT) based technique: ................................................................ 14 6.3 Wavelet Transform based Watermarking ..................................................................................... 18 6.4 Simple Watermarking .................................................................................................................. 19 7.0 Attacks ............................................................................................................................................ 20 7.1 Basic ............................................................................................................................................ 20 7.2 Robustness .................................................................................................................................. 20 7.3 Presentation ................................................................................................................................ 20 7.4 Interpretation .............................................................................................................................. 21 7.5 Implementation ........................................................................................................................... 21 7.6 Removal....................................................................................................................................... 21 7.7 Geometrical ................................................................................................................................. 22 7.8 Cryptographic .............................................................................................................................. 22 7.9 Active & Passive ........................................................................................................................... 22 7.10 Forgery ...................................................................................................................................... 22 7.11 Collusion .................................................................................................................................... 22 7.12 Distortive ................................................................................................................................... 23 8.0 Counter Attacks ............................................................................................................................... 23 8.1 Power Spectrum Condition (PSC) ................................................................................................. 23 8.2 Noise Visibility Function (NVF): .................................................................................................... 24 9.0 Privacy Laws of Watermarking ......................................................................................................... 25 10.0 Project Goal ................................................................................................................................... 25 10.1 Invisible Watermarking (Least significant bit Watermarking) ...................................................... 25 10.1.1 Steps ................................................................................................................................... 25 4 Abrar Ahmed Syed 1000614216

Digital Watermarking

10.1.2 Program .............................................................................................................................. 26 10.1.3 Algorithm Explanation ......................................................................................................... 28 10.1.14 Flow-chart: ........................................................................................................................ 31 10.1.5 Results: ............................................................................................................................... 31 10.2 Visible Watermarking Concatenation ...................................................................................... 33 10.2.1 Steps ..........................................................................................................