37
A Fragile W atermar king Algorithm A Fragile W atermar king Algorithm Based on Logistic System and JPEG Based on Logistic System and JPEG Under the Esteemed Guidance of SRI K.AMARENDRA Associate Professor & HOD Department of CSE PRESENTED BY SUSRUTHA CHINNI (07U41A0548) KUNA PRAVEENA (07U41A0523) N.VIKRAM RAJU (07U41A0532 )  V.RAJA (07U41A0553)

Fragile Watermarking Algorithm by Sushrutha and Vikram

Embed Size (px)

Citation preview

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 1/37

A Fragile Watermarking AlgorithmA Fragile Watermarking Algorithm

Based on Logistic System and JPEGBased on Logistic System and JPEG

Under the Esteemed Guidance of 

SRI K.AMARENDRA

Associate Professor & HOD

Department of CSE

PRESENTED BY

SUSRUTHA CHINNI

(07U41A0548)

KUNA PRAVEENA

(07U41A0523)

N.VIKRAM RAJU

(07U41A0532) V.RAJA

(07U41A0553)

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 2/37

What is a Watermark ?What is a Watermark ?

 

v

v

vWatermark 

l Recognizable image or pattern in paper that appears lighter when

viewed by transmitted light.A watermark is often a faded image or 

text used as a background of a slide. Watermarks are sometimes

used in the form of a logo, discreetly placed on a slide to brand the

 presentation. 

Eg: Currency Notes and Logos

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 3/37

What is Digital Watermarking ?What is Digital Watermarking ?

vA digital watermark is a digital signal or pattern inserted into a digital

document such as text, graphics or multimedia, and carries information

unique to the copyright owner, the creator of the document or the

authorized consumer.

vMessage is a group of bits describing information pertaining to the signal

or its author.

v

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 4/37

History of Lena(Lenna)History of Lena(Lenna)

vLena Sjooblom, (also spelled Lenna by many  publications) was the Playboy playmate in  November 1972 and rose to fame in thecomputer world when researchers atthe University of SouthernCalifornia scanned and digitized her image inJune 1973.

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 5/37

Working ThemeWorking Theme

 Watermarkin

gAlgorithm

 WatermarkedImageOriginalImage

 Watermark

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 6/37

Watermarking ProcessWatermarking Process

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 7/37

Classification of WatermarkingClassification of Watermarking

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 8/37

Visible WatermarkingVisible Watermarking

vIn Visible Watermarking, the information is visible in the picture or 

video. Typically, the information is text or a logo, which identifies

the owner of the media. The image on the right has a visible

watermark. When a television broadcaster adds its logo to the corner 

of transmitted video, this also is a visible watermark.

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 9/37

Invisible WatermarkingInvisible Watermarking

vIn invisible digital watermarking, information is added as digital data

to audio, picture, or video, but it cannot be perceived as such (although

it may be possible to detect that some amount of information is hidden

in the signal)

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 10/37

Concept DevelopmentConcept DevelopmentvRobust Watermark 

l Embedded invisible watermarks.

l Resist to image processing or attacks.

l Used for copyright protection or to verify the ownership.

vFragile Watermark l Mainly used for the authentication and integrity verification of the images transmitted through internet

has attracted more attention in the research and industrial communities.

l Used for tamper detection

vSemi Fragile Watermark l Sensitive to signal modification

l Feature of both robust & Fragile watermark.

l Provides data authentication

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 11/37

v Blind Watermark (or) Public Watermark 

The original signal is not needed during the detection process to detect the mark.

v Non Blind Watermark (or) Private Watermark 

The original cover signal is required during the detection process.

v Semi –Blind Watermark 

§ In Particular some Watermarking Schemes require access to the ‘Published’

watermarked signal ,that is the original signal just adding the Watermark.

v Asymmetric Watermark (or) Public Key Watermark 

The detection process (and in particular the detection key) is fully known to

anyone as opposed to blind watermarking where a secret key is required. So

here, only a 'public key' is needed for verification and a 'private key' (secret) is

used for the embedding though.

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 12/37

Steganography V/S watermarkingSteganography V/S watermarking

vWatermarking the hiding data is used to protectthe original image (e.g. copyrightmanagement)

vSteganography the image is used to protect thehiding data (e.g. secret message).

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 13/37

Drawbacks of Existing SystemDrawbacks of Existing System

vIllegal Copyingv

vFalsificationv

v No Copyright Protectionv

v No Ownership Identification

v No Robustness

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 14/37

Proposed SystemProposed System

vDue to above mentioned failures a new technique has been

 proposed so that to cover and maintain the drawbacks prevailed in

the previous system and hence a technique called Fast Hadamard

Transformation(FHT) is proposed.

vThe FHT embedding algorithm was found to provide a robust and

efficient approach to perform digital watermarking of digital image

data for copyright protection and proof of rightful ownership.

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 15/37

 Admin

+Username

#password

Images

+JPEG

+change_view()

+Loading()

+verification()

+Tamper_Location()

Algorithm

+Fragile_WaterMarking()

+Logistic_System()

Load image

1..*1

depends on

1

1

Fig 1:Class Diagram for Fragile Watermarking 

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 16/37

System

Admin

Login

Username & password

Invalid user 

<<extend>>

select image folder 

Change image view

Quit

Watermark image

Change the image mode

Fig 2 : Use Case Diagram for Fragile Watermarking

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 17/37

AdminSystem AlgorithmLogin

1 : Username

,password()2 : Verification()

3 : Authorized Person()

4 : Select image folder()

5 : Load image()

6 : Apply image view()

7 : Change view()

8 : Load Output()

9 : Show Output()

Fig 3:Sequence Diagram for Fragile Watermarking

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 18/37

Login

valid user 

Invalid user 

Select image folder 

Change image view

Watermark the image

exit

Fig 5:Activity Diagram for Fragile Watermarking

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 19/37

Output ScreensOutput Screens

Fig 1: login form for user

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 20/37

Fig 2: Before Importing the images 

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 21/37

Fig 3:After Importing the Images

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 22/37

Fig 4 :Adjusting the Mode

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 23/37

Fig 5: Process for applying watermark text to Image

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 24/37

Fig 6: Inserting the Watermark Text to the Selecting Image

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 25/37

Fig 7 : Starting the Progress bar

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 26/37

Fig 8: Watermark Image

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 27/37

Fig 9 : Process to View the Slide Show

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 28/37

Test Case ReportsTest Case Reports

Test No. Test Case Expected Output Actual Output Result

1.  Invalid Log In Test: By providing invalidUser name andPassword

A dialog Box to bedisplayed sayingInvalid Login, AccessDenied

A dialog Box isdisplayed sayingInvalid Login, AccessDenied

Passed

2. Valid Log In Test: Byproviding Valid Username and Password

The Text Screen foraccepting the text tobe shown

The Text Screen foraccepting the text isshown

Passed

3.  Invalid input test: By providing invalid input images

It will not showimages

It will show error onruntime

passed

4. Valid input test: By providing valid input images(jpeg)

It will show images It will show images passed

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 29/37

Fig 1 :Test case Report Screen

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 30/37

ApplicationsApplications

vCopyright protection :Digital watermarks can be used to Identify and protect copyright ownership.

v Tracking : Digital watermarks can be used to track the usage of digital

content.

vBroadcast Monitoring: Digital watermarks can be used to monitor 

 broadcasted content like television and broadcast radio.

vContent protection for audio and video content.

vDocument and image security.

v

v

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 31/37

vAuthentication & integrity verification :

§Watermarks should be able to detect even the slightest

change in the document.

§A unique key associated with the source is used the

create the watermark and then embed in the document.

§This key is then used to extract the watermark and the

integrity of the document verified on the basis of the

integrity of the watermark 

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 32/37

AdvantagesAdvantages

vFragile Watermarking Algorithm

vCopyright Protection.

vApplicable to all content types (images, documents,

movies, music, TV)

vFHT(Fast Hadamard Transformation)

§ Shorter processing time

§ Invisibility of the watermark guaranteed

§ Increased watermark energy leads to higher robustness

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 33/37

DisadvantagesDisadvantages

vThe blind watermarking algorithm which is really robust

is not in existence today.

vBy knowing the exact content of watermark and

algorithms to embedded and retrieve it.

vHacker can erase the watermark easily ,by knowing the

exact content of watermark and algorithms to

embedded and retrieve it .

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 34/37

ConclusionConclusion

v The large need of networked multimedia system has created the need

of COPYRIGHT PROTECTION .It is very important to protect

intellectual properties of digital media.

v Internet playing an important role of digital data

transfer. Digital watermarking is the great solution of the problem

of how to protect copyright. Digital watermarking is the solution

for the protection of legal rights of digital content owner and

customer.

 

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 35/37

BibliographyBibliography

1)R Van Schyndel, A Trikel, C Osborne. A digital watermark. Proceedings of 

IEEE International Conference on Image Processing, ICIP1994

2) R Wolfgang, E Delp. A watermark for digital images. Proceedings of the

IEEE International Conference on Image Processing, ICIP1996

3) YU Miao, HE Hongjie, ZHANG Jiashu. A digital authentication

watermarking scheme for JPEG images with superior localization and

security. Science in China Series F: Information Sciences. 2007 

4)http://www.Scribd.com

5)http://www.seminarprojects.com

6)http://www.metois.com

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 36/37

 A n y

Q ue r

i e s

8/7/2019 Fragile Watermarking Algorithm by Sushrutha and Vikram

http://slidepdf.com/reader/full/fragile-watermarking-algorithm-by-sushrutha-and-vikram 37/37