Digital Watermarking

Read Complete Research Material

DIGITAL WATERMARKING

Digital Watermarking - Computing with Management

Abstract

The progress of new multimedia services and environments need new notions to carry the new employed method to defend the multimedia facts and numbers throughout the output and the circulation in digital marketplaces. This task locations copyright defence as a foremost security demand in digital marketplaces. We apply here watermarking methods for MPEG video with the aim to display the benefits in the scrambled watermarking in DWT domain. The greatest concept of the developments is to deliver sky where digital videos can be manifest by authors or manufacturers as their thoughtful home to double-check and verify ownership privileges on the made video material right through its end wares and distribution. Digital Watermarking is a facts and numbers concealing method where an data or note is concealed interior a pointer clear to the user. This procedure is utilised for copyright defence of digital media. Watermarking disagrees from encryption in a way that in the previous case a general client is permitted to get access to, outlook and understand the pointer but will not assertion the ownership of the content, while in case of encryption the very get access to to the pointer itself is denied. Watermarking is therefore more well liked than encryption where the content generator likes the general client to relish the content but will not infringe upon the copyright. Digital representation of the pointer has made the job of Watermarking simpler and cost productive, and therefore this expertise is currently evolving very fast amidst the newspapers industry.Table of Contents

List of Figures6

List of Tables7

Chapter 110

Introduction10

Ownership assertion14

Fingerprinting15

Copy prevention or control16

Fraud and tamper detection16

ID card security17

Chapter 219

System Analysis19

Chapter 320

Software Development Model20

Required Hardware20

Required Software21

Chapter 422

Feasibility Study22

Operational feasibility22

Technical feasibility23

Economic feasibility24

Chapter 525

Literature Survey25

Steganography & Digital Watermarking26

Spatial and Frequency Domain30

The Zhao Koch Algorithm31

Advantages:32

Disadvantages:32

The Fridrich Algorithm32

Advantages:33

Disadvantages33

Additional Observations33

Current Laws34

Digital Millennium Copyright Act (DMCA)34

Collections of Information Antipiracy Act35

Chapter 636

History Of Digital Watermarking36

Video Watermarking36

Authentication Watermarking39

Digital Watermarking40

Visible Vs. Invisible Watermarks40

Techniques For Watermarking41

Relationship With Information Hiding And Steganography42

Properties of watermarking44

Invisibility44

Robustness45

Capacity45

Low error probability45

Chapter 750

Methods And Approaches50

Discrete Wavelet Transform50

Wavelet Transform50

Chapter 854

Implementation54

8-Bit Plane Slicing54

Watermark Preprocessing54

Watermark Embedding56

Table 162

Table 262

Table 362

Table 463

Table 563

Step 2: Change Pixels In The Original Bitmap That Had Rgb Values (254, 254, 254) To Pixels With Rgb Values (255, 255, 255)63

STEP 2A64

Table 664

Table 764

Table 865

Table 965

Step 2B66

Table 1066

Step 3: Apply First Mask Bitmap To Second Mask Bitmap66

Table 1167

Chapter 968

Results68

Chapter 1070

Comparision With Other State-Of-The-Art Technologies70

Chapter 1173

Future Work73

Recover The Encoded Message Without Original Signal73

Detect Whether A Signal Has Been Watermarked73

Survive Cropping Attacks73

Increase Security By Pseudorandom Sequences74

Encode On Both Audio Channels74

Use Error Correcting Codes74

Chapter 1276

Conclusion76

Scope Of Future Application76

Summary: Chapter wise results obtained77

References78

List of Figures

Fig 1:- 4 levels Discrete Wavelet Transform (DWT).40

Fig 2:- h - low pass filter, g - high pass filter, dij detail coefficients 2D Separable wavelets allow 2D DWT to be done by 2 passes of 1D DWT.42

Fig 3:- Down Sampling of the filtered signals42

Fig 4:- Modified DWT coefficient according to the watermark43

Fig 5:- 8 bit plans46

Fig 6:- Middle frequency sub-band frame47

Fig 7 :- Digital Watermarking Embedding Diagram49

Fig. 8:- Steps involved in getting transparency in the video Frames50

Fig ...
Related Ads