Top Banner
A Fragile W atermar king Algorithm A Fragile W atermar king Algorithm Based on Logistic System and JPEG Based on Logistic System and JPEG Under the Esteemed Guidance of SRI K.AMARENDRA Associate Professor & HOD Department of CSE PRESENTED BY SUSRUTHA CHINNI (07U41A0548) KUNA PRAVEENA (07U41A0523) N.VIKRAM RAJU (07U41A0532 )  V.RAJA (07U41A0553)
37

Fragile Watermarking Algorithm by Sushrutha and Vikram

Apr 08, 2018

Download

Documents

VikramRaju
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 1/37

A Fragile Watermarking AlgorithmA Fragile Watermarking Algorithm

Based on Logistic System and JPEGBased on Logistic System and JPEG

Under the Esteemed Guidance of 

SRI K.AMARENDRA

Associate Professor & HOD

Department of CSE

PRESENTED BY

SUSRUTHA CHINNI

(07U41A0548)

KUNA PRAVEENA

(07U41A0523)

N.VIKRAM RAJU

(07U41A0532) V.RAJA

(07U41A0553)

Page 2: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 2/37

What is a Watermark ?What is a Watermark ?

 

v

v

vWatermark 

l Recognizable image or pattern in paper that appears lighter when

viewed by transmitted light.A watermark is often a faded image or 

text used as a background of a slide. Watermarks are sometimes

used in the form of a logo, discreetly placed on a slide to brand the

 presentation. 

Eg: Currency Notes and Logos

Page 3: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 3/37

What is Digital Watermarking ?What is Digital Watermarking ?

vA digital watermark is a digital signal or pattern inserted into a digital

document such as text, graphics or multimedia, and carries information

unique to the copyright owner, the creator of the document or the

authorized consumer.

vMessage is a group of bits describing information pertaining to the signal

or its author.

v

Page 4: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 4/37

History of Lena(Lenna)History of Lena(Lenna)

vLena Sjooblom, (also spelled Lenna by many  publications) was the Playboy playmate in  November 1972 and rose to fame in thecomputer world when researchers atthe University of SouthernCalifornia scanned and digitized her image inJune 1973.

Page 5: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 5/37

Working ThemeWorking Theme

 Watermarkin

gAlgorithm

 WatermarkedImageOriginalImage

 Watermark

Page 6: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 6/37

Watermarking ProcessWatermarking Process

Page 7: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 7/37

Classification of WatermarkingClassification of Watermarking

Page 8: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 8/37

Visible WatermarkingVisible Watermarking

vIn Visible Watermarking, the information is visible in the picture or 

video. Typically, the information is text or a logo, which identifies

the owner of the media. The image on the right has a visible

watermark. When a television broadcaster adds its logo to the corner 

of transmitted video, this also is a visible watermark.

Page 9: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 9/37

Invisible WatermarkingInvisible Watermarking

vIn invisible digital watermarking, information is added as digital data

to audio, picture, or video, but it cannot be perceived as such (although

it may be possible to detect that some amount of information is hidden

in the signal)

Page 10: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 10/37

Concept DevelopmentConcept DevelopmentvRobust Watermark 

l Embedded invisible watermarks.

l Resist to image processing or attacks.

l Used for copyright protection or to verify the ownership.

vFragile Watermark l Mainly used for the authentication and integrity verification of the images transmitted through internet

has attracted more attention in the research and industrial communities.

l Used for tamper detection

vSemi Fragile Watermark l Sensitive to signal modification

l Feature of both robust & Fragile watermark.

l Provides data authentication

Page 11: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 11/37

v Blind Watermark (or) Public Watermark 

The original signal is not needed during the detection process to detect the mark.

v Non Blind Watermark (or) Private Watermark 

The original cover signal is required during the detection process.

v Semi –Blind Watermark 

§ In Particular some Watermarking Schemes require access to the ‘Published’

watermarked signal ,that is the original signal just adding the Watermark.

v Asymmetric Watermark (or) Public Key Watermark 

The detection process (and in particular the detection key) is fully known to

anyone as opposed to blind watermarking where a secret key is required. So

here, only a 'public key' is needed for verification and a 'private key' (secret) is

used for the embedding though.

Page 12: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 12/37

Steganography V/S watermarkingSteganography V/S watermarking

vWatermarking the hiding data is used to protectthe original image (e.g. copyrightmanagement)

vSteganography the image is used to protect thehiding data (e.g. secret message).

Page 13: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 13/37

Drawbacks of Existing SystemDrawbacks of Existing System

vIllegal Copyingv

vFalsificationv

v No Copyright Protectionv

v No Ownership Identification

v No Robustness

Page 14: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 14/37

Proposed SystemProposed System

vDue to above mentioned failures a new technique has been

 proposed so that to cover and maintain the drawbacks prevailed in

the previous system and hence a technique called Fast Hadamard

Transformation(FHT) is proposed.

vThe FHT embedding algorithm was found to provide a robust and

efficient approach to perform digital watermarking of digital image

data for copyright protection and proof of rightful ownership.

Page 15: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 15/37

 Admin

+Username

#password

Images

+JPEG

+change_view()

+Loading()

+verification()

+Tamper_Location()

Algorithm

+Fragile_WaterMarking()

+Logistic_System()

Load image

1..*1

depends on

1

1

Fig 1:Class Diagram for Fragile Watermarking 

Page 16: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 16/37

System

Admin

Login

Username & password

Invalid user 

<<extend>>

select image folder 

Change image view

Quit

Watermark image

Change the image mode

Fig 2 : Use Case Diagram for Fragile Watermarking

Page 17: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 17/37

AdminSystem AlgorithmLogin

1 : Username

,password()2 : Verification()

3 : Authorized Person()

4 : Select image folder()

5 : Load image()

6 : Apply image view()

7 : Change view()

8 : Load Output()

9 : Show Output()

Fig 3:Sequence Diagram for Fragile Watermarking

Page 18: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 18/37

Login

valid user 

Invalid user 

Select image folder 

Change image view

Watermark the image

exit

Fig 5:Activity Diagram for Fragile Watermarking

Page 19: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 19/37

Output ScreensOutput Screens

Fig 1: login form for user

Page 20: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 20/37

Fig 2: Before Importing the images 

Page 21: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 21/37

Fig 3:After Importing the Images

Page 22: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 22/37

Fig 4 :Adjusting the Mode

Page 23: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 23/37

Fig 5: Process for applying watermark text to Image

Page 24: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 24/37

Fig 6: Inserting the Watermark Text to the Selecting Image

Page 25: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 25/37

Fig 7 : Starting the Progress bar

Page 26: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 26/37

Fig 8: Watermark Image

Page 27: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 27/37

Fig 9 : Process to View the Slide Show

Page 28: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 28/37

Test Case ReportsTest Case Reports

Test No. Test Case Expected Output Actual Output Result

1.  Invalid Log In Test: By providing invalidUser name andPassword

A dialog Box to bedisplayed sayingInvalid Login, AccessDenied

A dialog Box isdisplayed sayingInvalid Login, AccessDenied

Passed

2. Valid Log In Test: Byproviding Valid Username and Password

The Text Screen foraccepting the text tobe shown

The Text Screen foraccepting the text isshown

Passed

3.  Invalid input test: By providing invalid input images

It will not showimages

It will show error onruntime

passed

4. Valid input test: By providing valid input images(jpeg)

It will show images It will show images passed

Page 29: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 29/37

Fig 1 :Test case Report Screen

Page 30: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 30/37

ApplicationsApplications

vCopyright protection :Digital watermarks can be used to Identify and protect copyright ownership.

v Tracking : Digital watermarks can be used to track the usage of digital

content.

vBroadcast Monitoring: Digital watermarks can be used to monitor 

 broadcasted content like television and broadcast radio.

vContent protection for audio and video content.

vDocument and image security.

v

v

Page 31: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 31/37

vAuthentication & integrity verification :

§Watermarks should be able to detect even the slightest

change in the document.

§A unique key associated with the source is used the

create the watermark and then embed in the document.

§This key is then used to extract the watermark and the

integrity of the document verified on the basis of the

integrity of the watermark 

Page 32: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 32/37

AdvantagesAdvantages

vFragile Watermarking Algorithm

vCopyright Protection.

vApplicable to all content types (images, documents,

movies, music, TV)

vFHT(Fast Hadamard Transformation)

§ Shorter processing time

§ Invisibility of the watermark guaranteed

§ Increased watermark energy leads to higher robustness

Page 33: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 33/37

DisadvantagesDisadvantages

vThe blind watermarking algorithm which is really robust

is not in existence today.

vBy knowing the exact content of watermark and

algorithms to embedded and retrieve it.

vHacker can erase the watermark easily ,by knowing the

exact content of watermark and algorithms to

embedded and retrieve it .

Page 34: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 34/37

ConclusionConclusion

v The large need of networked multimedia system has created the need

of COPYRIGHT PROTECTION .It is very important to protect

intellectual properties of digital media.

v Internet playing an important role of digital data

transfer. Digital watermarking is the great solution of the problem

of how to protect copyright. Digital watermarking is the solution

for the protection of legal rights of digital content owner and

customer.

 

Page 35: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 35/37

BibliographyBibliography

1)R Van Schyndel, A Trikel, C Osborne. A digital watermark. Proceedings of 

IEEE International Conference on Image Processing, ICIP1994

2) R Wolfgang, E Delp. A watermark for digital images. Proceedings of the

IEEE International Conference on Image Processing, ICIP1996

3) YU Miao, HE Hongjie, ZHANG Jiashu. A digital authentication

watermarking scheme for JPEG images with superior localization and

security. Science in China Series F: Information Sciences. 2007 

4)http://www.Scribd.com

5)http://www.seminarprojects.com

6)http://www.metois.com

Page 36: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 36/37

 A n y

Q ue r

i e s

Page 37: Fragile Watermarking Algorithm by Sushrutha and Vikram

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 37/37