ppt rupesh

26
“Combination of Multiple Techniques Used For Combined Encryption And Digital Watermarking Gives Better Performance over Individual Techniques for Security of Still Image”. Synopsis Presentation on

Upload: ashokupadhye1955

Post on 09-Dec-2015

231 views

Category:

Documents


2 download

DESCRIPTION

ppt i

TRANSCRIPT

Page 1: Ppt Rupesh

“Combination of Multiple Techniques Used For Combined Encryption And Digital Watermarking Gives Better

Performance over Individual Techniques for Security of Still Image”.

Synopsis Presentation on

Page 2: Ppt Rupesh

Need for Research.Recent advancements in computer technologies offer many facilities:

Duplication. Distribution. Creation. Manipulation of digital contents.

Page 3: Ppt Rupesh

Problem DefinitionRecently Digital Images are utilized in various applications such as: Digital image used as logo on Indian currency note.Digital image of cheques used by CTS of bank.Digital image of patients reports used by doctors. Digital images taken by satellites,etc.

To provide the security & copyright protection for digital images, it is proposed to study of security & copyright protection technique like “Digital Watermarking ”.

Page 4: Ppt Rupesh

Types of Images

Medical Image.

Indoor Image.

Outdoor Image.

Satellite Image.

Page 5: Ppt Rupesh

Types of Watermarks

Page 6: Ppt Rupesh

Contd.Visible Watermark: •Visible watermarks are an extension of the concept of logos. •Such watermarks are applicable to images only. •These logos are inlaid into the image but they are transparent. •Such watermarks cannot be removed by cropping the centre part of the image. •Further, such watermarks are protected against attacks such as statistical analysis

Invisible Watermark :•Invisible watermark is hidden in the content. •It can be detected by an authorized agency only. •Such watermarks are used for content and/or author authentication and for detecting unauthorized copier

Public Watermark :•Such a watermark can be read or retrieved by anyone using the specialized algorithm. •In this sense, public watermarks are not secure. •However, public watermarks are useful for carrying (IPR) information. •They are good alternatives to labels

Page 7: Ppt Rupesh

Contd.Perceptual Watermark :•A perceptual watermark exploits the aspects of human sensory system to provide invisible yet robust watermark

Private Watermark :•Private watermarks are also known as secure watermarks. •To read or retrieve such a watermark, it is necessary to have the secret key.

Fragile Watermark :•Fragile watermarks are also known as tamper-proof watermarks. •Such watermarks are destroyed by data manipulation.

Page 8: Ppt Rupesh

Methods used for Implementing Digital Watermarking Techniques.

Frequency Domain Method.

Spatial Domain Method.

Neural Network Method.

Fuzzy Logic Domain Method.

Genetic Algorithm Method.

Page 9: Ppt Rupesh

Implementing Digital Watermarking Techniques Using Frequency Domain.

Frequency Domain

DCT DWT FFT SVDCombination of

one or more frequency domain

Combined DWT-DCT

Combined DCT-SVD

Combined DWT-SVD

Combined DCT-DWT-SVD

Combined DCT-FFT

Combined DCT-DWT-FFT-SVD

Page 10: Ppt Rupesh

Implementing Digital Watermarking Techniques Using Fuzzy Logic Techniques

Fuzzy Logic Techniques

Fuzzy Interference SystemCombined one or two frequency domain & Fuzzy Interference System

Page 11: Ppt Rupesh

Implementing Digital Watermarking Techniques Using Neural Network

Techniques

Neural Network Techniques

Neuro-Fuzzy NetworkAdaptive Neuro Fuzzy Interference System

Page 12: Ppt Rupesh

Implementing Digital Watermarking Techniques Using Genetic Algorithm Techniques

Genetic Algorithm Method.

Using DCT-DWT Domain

Using DCT-SVD DomainUsing DWT-SVD

Domain

Page 13: Ppt Rupesh

Implementing Digital Watermarking Techniques Using Combination of all Techniques.

Combination of all Techniques

Combination of one or more frequency domain techniques and fuzzy interference system and dynamic neural network

Combination of Spatial Domain Technique and Adaptive neuro –fuzzy

interference system

Page 14: Ppt Rupesh

Proposed System.

Image

Watermark Embedding Techniques

Watermark

Watermarked Image

Advanced Encryption Standard Algorithm

Secret Key (128 bits or 192 bits or 256 bits)

Encrypted Watermarked Image

Decryption Algorithm

Decrypted Watermarked Image

Watermark Extraction Techniques

Extracted Watermark

Image after Extraction of Watermark

Apply Enhancement

Techniques

ApplyVarious Attacks

Page 15: Ppt Rupesh

Objectives of ResearchCombination of Multiple Techniques Used For Combined Encryption And Digital Watermarking is to be studied.

To calculate the peak signal to noise ratio of watermarked image & compare it with covered image.

To calculate the elapsed time during watermark for insertion and extraction process.

To calculate the imperceptibility and robustness of watermark image & compare with cover image.

Page 16: Ppt Rupesh

Objectives of ResearchTo calculate the robustness & good capacity of image again various attack such as cropping, compression , rotation,etc.

After calculating the peak signal to noise ratio, impercepbility ,robustness & good capacity by using various schemes of digital watermarking Techniques and comparing their results to see which is the best scheme that can be used for security of digital still image.

Page 17: Ppt Rupesh

Implementation Requirement.Implementation Decision:-

a. Selection of platform(O.S)

b. Selection of the programming language, tools.

c. Coding guideline to be followed.

Two types of Implementation requirements:-

A. Software Requirement.

B. Hardware Requirement.

Page 18: Ppt Rupesh

Software Requirement.1)The Software chosen for this research is Matlab (R2010a).

2)Operating System used:-Microsoft Window xp (32 bit and 64 bit)

Or Window-7.

Page 19: Ppt Rupesh

Hardware Requirement

Intel core i3-330 Microprocessor 2.13GHZ.

250 GB Hard Disk.

RAM more than 1 GB.

Page 20: Ppt Rupesh

Key References.[1]“Robust Digital Image Watermarking Scheme with Neural Network and Fuzzy Logic Approach.”by-Nallagarla Ramamurthy, Dr.S.Varadarajan, International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 9, September 2012).

 

[2] “A robust and secure watermarking scheme basedon singular values replacement” by-AKSHYA KUMAR GUPTA and MEHUL S RAVAL,Sa¯dhana¯ Vol. 37, Part 4, ∗August 2012, pp. 425–440._c Indian Academy of Sciences.

 

[3] “The Robust Digital Image Watermarking using Quantization and Fuzzy Logic Approach in DWT Domain.” by-Nallagarla Ramamurthy, Dr.S.Varadarajan, International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 5, June 2012 www.ijcsn.org ISSN 2277-5420.

 

[4] “A Survey of Digital Watermarking Techniques for Multimedia Data.”by- FarooqHusain,MITMuradabad,India,MIT International Journal of Electronics and Communication Engineering, Vol.2,No.1,Jan 2012,PP(37-43).

Page 21: Ppt Rupesh

Key References.[5] “Optimization of Digital Image Watermarking Scheme Using Artificial Intelligent Technique.”By-P.Kumsawat, K. Pasitwilitham, K. Attakitmongcol and A. Srikaew , INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTERS IN SIMULATION Issue 1, Volume 6, 2012.

 

[6]“ADAPTATIVE IMAGEWATERMARKING SCHEME BASED ONNEURAL NETWORK”,by- SAMEH OUESLATI, ADNENE CHERIF and BASSEL SOLAIMANE, SamehOueslati et al. / International Journal of Engineering Science and Technology (IJEST), ISSN : 0975-5462 Vol. 3 No. 1 Jan 2011.

 

[7] “ROBUST IMAGE ADAPTIVE WATERMARKING USING FUZZYLOGIC AN FPGA APPROACH.”by-PankajU.Lande Sanjay N. Talbar G.N. Shinde, International Journal of Signal Processing, Image Processing and Pattern RecognitionVol. 3, No. 4, December, 2010.

 

 [8] “Performance Analysis of Digital Image Watermarking Technique–Combined DWT

–DCT over individual DWT.”By-A.M.Kothari, A.C.Suthar and R.S.Gajre, Published in International Journal of Advanced Engineering & Applications, Jan. 2010.

 

Page 22: Ppt Rupesh

Key References.[9] “Comparison of Digital Water Marking methods.”by-DarshanaMistry / (IJCSE) International Journal on Computer Science and EngineeringVol. 02, No. 09, 2010, 2905-2909.

 

[10] “A FUZZY LOGIC APPROACH TO ENCRYPTEDWATERMARKING FOR STILL IMAGES IN WAVELETDOMAIN ON FPGA”by-PankajU.Lande Sanjay N. Talbar and G.N. ShindeInternational Journal of Signal Processing, Image Processing and Pattern RecognitionVol. 3, No. 2, June, 2010.

 

 

[11] “Robust Secure SVD Based DCT – DWT Oriented Watermarking Technique for Image Authentication.” S SBedi, Ashwani Kumar, and PiyushKapoor, International Conference on IT to Celebrate S. Charmonman's 72nd Birthday, March 2009, Thailand.

 

 

[12] “Robust Digital Image Watermarking Based on Joint DWT-DCT.”By-Saeed K. Amirgholipour, Ahmad R. Naghsh-Nilchi, International Journal of Digital Content Technology and its Applications Volume 3, Number 2, June 2009.

Page 23: Ppt Rupesh

Key References.[13] “A Digital Watermarking Algorithm Based On DCT and DWT” by- Mei Jiansheng, Li Sukang and Tan Xiaomei, ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM)Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA’09)Nanchang, P. R. China, May 22-24, 2009, pp. 104-107. [14] “Watermarking Algorithm Research andImplementation Based on DCT Block.” by-Gengming Zhu, and Nong Sang, World Academy of Science, Engineering and Technology 45, 2008. [15]“Rafael C. Gonzalez and Richard Eugene Woods, “Digital image processing” Prentice Hall, 2008.” [16] “Combined DWT-DCT Digital Image Watermarking. “by-Ali Al-Haj, Journal of Computer Science 3 (9): 740-746, 2007 ISSN 1549-3636 © 2007 Science Publications. [17]“A Blind DCT Domain Digital Watermarking” by-SaeidSaryazdi, MehrnazDemehriDepartement of Electrical Engineering, University of Kerman, Kerman, Iran, SETIT2005.

Page 24: Ppt Rupesh

Key References.[18]. Tsai, M. and H. Hung, 2005. "DCT and DWTbasedImage Watermarking Using Subsampling,"in Proc. of the 2005 IEEE Fourth Int. Conf. onMachine Learning and Cybernetics, pp: 5308-5313,China.

 

 

[19] “Robust DWT-SVD Domain Image Watermarking:Embedding Data in All Frequencies.” by-Emir Ganic andAhmet M. Eskicioglu, MM&SEC'04, September 20–21, 2004, Magdeburg, Germany. Copyright 2004 ACM 1-58113-854-7/04/0009.

 

 

[20]. Voloshynovskiy, S., S. Pereira and T. Pun, 2001."Attacks on DigitalWatermarks: Classification,Estimation-Based Attacks, and Benchmarks,"Comm. Magazine, 39(8): 118-126.

 

[21]. Ejima, M. and A. Myazaki, 2001." On theevaluation of performance of digital watermarkingin the frequency domain," in Proc. of the IEEEInt. Conf. on Image Processing, 2: 546-549.

 

[22] “Color Image Watermarking based on the DCT-Domain ofThree RGB ColorChannels.”By-I. El-Fegh, D. Mustafa, ZakariaSulimanZubi, Faraj A. El-Mouadib., Proceedings of the 10th WSEAS International Conference on EVOLUTIONARY COMPUTING, ISSN: 1790-5109 ISBN: 978-960-474-067-3.

Page 25: Ppt Rupesh

Key References.[23]. Hsu, C. and J. Wu, 1998. "MultiresolutionWatermarking for Digital Images," IEEE Trans. OnCircuits and Systems- II, 45(8): 1097-1101.

 

 

[24]. Wu, C. and W. Hsieh, 2000. "Digital watermarkingusing zerotree of DCT," IEEE Trans. ConsumerElectronics, vol. 46, no. 1, pp: 87-94.

 

 

[25]http://www.tafinn.com/andyfinn-us/Writing/Technology/digital_watermarks.htm.

Page 26: Ppt Rupesh

Thank You