0% found this document useful (0 votes)
28 views9 pages

Watermarking

dsgdg

Uploaded by

shilpa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views9 pages

Watermarking

dsgdg

Uploaded by

shilpa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Image Watermaking

Submitted in the partial fulfillment for the award of


the degree of
BACHELOR OF ENGINEERING
IN

Submitted by:
COMPUTER SCIENCE WITH SPECIALIZATION
Shobhit - 21CDO1036 Devops
Sudhir Yadav– 21CDO1041
Under the Supervision of:
Mrs.Shilpa Sharma

Department of AIT-CSE DISCOVER . LEARN . EMPOWER


1
Outline
• Introduction to Project
• Problem Formulation
• Objectives of the work
• Methodology used
• Conclusion
• References

2
Introduction to Project
Image watermarking is a technique used in the digital age to protect intellectual
property and ensure content authenticity. It involves embedding a visible or
invisible watermark into an image, either overlaid or hidden. This serves to assert
ownership, prevent misuse, and authenticate the content, ensuring it remains
undetectable to the naked eye but can be extracted with specialized software.

3
Problem Formulation
This project aims to develop an effective image watermarking system
that securely embeds and extracts watermarks while maintaining high
image quality and robustness against image processing attacks. The
project addresses challenges such as watermark embedding,
extraction, and security. The goal is to create a robust algorithm,
ensure high quality and imperceptibility, optimize performance, and
provide a user-friendly interface. The system should be optimized for
image quality, computational resources, and robustness, and integrate
seamlessly into existing workflows.
4
Objectives of the Work
The objectives of an image watermarking project should include developing a
robust algorithm, ensuring high image quality and imperceptibility, implementing
reliable watermark extraction, optimizing performance and efficiency, enhancing
security against unauthorized tampering, creating a user-friendly interface,
evaluating system performance, ensuring compatibility across different platforms,
and providing comprehensive documentation and support. These objectives should
balance security, efficiency, and user-friendliness, while ensuring the system's
effectiveness and usability across different platforms.

5
Methodology used
• Design of Watermarking Algorithm
Objective: Develop a robust and effective algorithm for embedding and extracting
watermarks.
Activities:
• Select Watermarking Technique:
• Choose between spatial domain techniques (e.g., Least Significant Bit (LSB) embedding) and frequency
domain techniques (e.g., Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT)).
• Implementation
Objective: Develop the watermarking system based on the designed algorithm.
Activities:
• Algorithm Coding:
• Implement the watermarking algorithm using a programming language suitable for image processing
(e.g., Python with libraries like OpenCV, MATLAB).

6
Methodology Cont.
• Testing and Evaluation
Objective: Assess the performance, robustness, and quality of the
watermarking system.
Activities:
• Performance Testing:
• Evaluate the system’s efficiency in terms of processing time and resource usage.
• Robustness Testing:
• Test the watermark’s resilience to various image transformations (e.g., resizing, cropping,
compression) to ensure it remains intact and detectable.

7
Conclusion
The image watermarking project has developed a robust and efficient
system for embedding and extracting watermarks in images. The system
balances security, imperceptibility, and performance, ensuring a user-
friendly experience. Key achievements include an effective watermarking
algorithm, high quality and imperceptibility, reliable watermark extraction,
optimized performance, and an intuitive user interface. Comprehensive
testing and evaluation validated the effectiveness of the watermarking
technique. Future work includes exploring advanced watermarking
techniques, expanding compatibility to include additional image formats
and platforms, implementing enhanced security measures, and
continuously gathering user feedback to ensure the system remains
relevant and effective.
8
References
We have referred various authors project work and their research
on the cloud enabled bookstore system.

[1] Fridrich, J., & Goljan, M. (2003). "Robust Watermarking of Images: A Survey." In Handbook of Image and
Video Processing (pp. 737-766).
[2] Cox, I. J., Miller, M. L., & K. Mathews, J. (2002). Digital Watermarking and Steganography. Morgan
Kaufmann.
[3] Hernández, J., & Peinado, A. (2007). Digital Watermarking for Digital Media: Model, Algorithms, and
Applications. Wiley.
[4] M. M. Yuen, K. K. Wong, and D. C. T. Kwan. (2019). "A Novel Image Watermarking Scheme Based on Deep
Learning and Frequency Domain Transform." IEEE Transactions on Image Processing, 28(5), 2335-2349.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy