SlideShare uma empresa Scribd logo
1 de 6
Reversible Watermarking Based on Invariant Image Classification
and Dynamic Histogram Shifting
ABSTRACT:
In this paper, we propose a new reversible watermarking scheme. One first contribution is a
histogram shifting modulation which adaptively takes care of the local specificities of the image
content. By applying it to the image prediction-errors and by considering their immediate
neighborhood, the scheme we propose inserts data in textured areas where other methods fail to
do so. Furthermore, our scheme makes use of a classification process for identifying parts of the
image that can be watermarked with the most suited reversible modulation. This classification is
based on a reference image derived from the image itself, a prediction of it, which has the
property of being invariant to the watermark insertion. In that way, the watermark embedder
and extractor remain synchronized for message extraction and image reconstruction. The
experiments conducted so far, on some natural images and on medical images from different
modalities, show that for capacities smaller than 0.4 bpp, our method can insert more data with
lower distortion than any existing schemes. For the same capacity, we achieve a peak signal-to-
noise ratio (PSNR) of about 1–2 dB greater than with the scheme of Hwang et al., the most
efficient approach actually.
EXISTING SYSTEM:
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
The introduction of the concept of reversible watermarking in the Barton patent, several
methods have been proposed. Among these solutions, most recent schemes use Expansion
Embedding (EE) modulation, Histogram Shifting (HS) modulation or, more recently, their
combination. One of the main concerns with these modulations is to avoid underflows and
overflows. Indeed, with the addition of a watermark signal to the image, caution must be taken
to avoid gray level value underflows (negative) and overflows (greater than for a bit depth
image) in the watermarked image while minimizing at the same time image distortion.
Basically, EE modulation introduced by Thodiet al. is a generalization of Difference Expansion
modulation proposed by Tianet al.which expands the difference between two adjacent pixels by
shifting to the left its binary representation, thus creating a new virtual least significant bit
(LSB) that can be used for data insertion. Since then, EE has been applied in some transformed
domains such as the wavelet domain or to prediction-errors.EE is usually associated with LSB
substitution applied to “samples” that cannot be expanded due to the signal dynamic limits or in
order to preserve the image quality. In, Ni et al.introduced the well-known Histogram Shifting
(HS) modulation. HS adds gray values to some pixels in order to shift a range of classes of the
image histogram and to create a ’gap’ near the histogram maxima. Pixels which belong to the
class of the histogram maxima (“Carrier-class”) are then shifted to the gap or kept unchanged to
encode one bit of the message ’0’ or ’1’. Other pixels (the “noncarriers”) are simply shifted.
Instead of working in the spatial domain, several schemes apply HS to some transformed
coefficients or pixel prediction-errors, histograms of which are most of the time concentrated
around one single class maxima located on zero. This maximizes HS capacity and also
simplifies the reidentification of the histogram classes of maximum cardinality at the extraction
stage. In order to reduce the distortion while preserving the capacity, some preprocessing has
been suggested in order to identify pixels, transformed coefficients or prediction-errors that do
not belong to the histogram maxima classes (“noncarrier classes”). As we will see later,
different schemes working with prediction-errors do not watermark pixels within a
neighborhood of high variance; indeed, these pixels belong to histogram classes that are shifted
without message embedding. Recently, Hwanget al. improved the approach of Sachnevet al..
They suggest defining the set of carrier-classes as the classes which minimize, for a given
capacity, image distortion. However, their set of carrier-classes is uniquely defined for the
whole image and the execution time of this approach is rather high.
DISADVANTAGES OF EXISTING SYSTEM:
The modulation is overflow and underflow.
The image distortions are more.
PROPOSED SYSTEM:
We propose to adapt dynamically the carrier-classes by considering the local specificities of the
image. We simply suggest using the local neighborhood of each prediction-error in order to
determine the most adapted carrier-class for message insertion. Another refinement we propose
is based on the selection of the most locally adapted lossless modulation. Indeed, reversible
modulations are more or less efficient depending on image content. This is especially the case
for medical images where large black areas exist (i.e., the background area). In these regions,
directly applying HS on pixels may be more efficient and of smaller complexity than applying it
on prediction-errors. Because, the histogram maxima corresponds to the null gray value;
capacity is maximized and underflows simply avoided by shifting pixel value to the right, i.e.
by adding a positive gray value. When working on prediction-errors in these regions, the
management of overflows/underflows is more difficult because the shift amplitude can be
positive or negative. This is why we suggest considering the local content of the image in order
to select the most locally adapted lossless modulation. This should allow us to optimize the
compromise capacity/image distortion.
ADVANTAGES OF PROPOSED SYSTEM:
Directly applying HS on pixels may be more efficient and of smaller complexity than
applying it on prediction-errors.
The watermark embedder and extractor remain synchronized because the extractor will
retrieve the same reference image. Herein, we adapt this process to select the most locally
appropriate watermarking modulation.
SYSTEM CONFIGURATION:-
HARDWARE REQUIREMENTS:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE REQUIREMENTS:
• Operating system : - Windows XP.
• Coding Language : C#.Net
REFERENCE:
Gouenou Coatrieux, Member, IEEE, Wei Pan, Nora Cuppens-Boulahia, Member, IEEE,
Frédéric Cuppens, Member, IEEE, and Christian Roux, Fellow, IEEE “Reversible
Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting” -
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8,
NO. 1, JANUARY 2013.
CLOUING
DOMAIN: WIRELESS NETWORK PROJECTS

Mais conteúdo relacionado

Mais procurados

Ibica2014(p15)image fusion based on broveywavelet
Ibica2014(p15)image fusion based on broveywaveletIbica2014(p15)image fusion based on broveywavelet
Ibica2014(p15)image fusion based on broveywaveletAboul Ella Hassanien
 
Comparison of image fusion methods
Comparison of image fusion methodsComparison of image fusion methods
Comparison of image fusion methodsAmr Nasr
 
Imagefusfinalppt 140413102757-phpapp02
Imagefusfinalppt 140413102757-phpapp02Imagefusfinalppt 140413102757-phpapp02
Imagefusfinalppt 140413102757-phpapp02Praveen Kumar
 
A fast single image haze removal algorithm using color attenuation prior
A fast single image haze removal algorithm using color attenuation priorA fast single image haze removal algorithm using color attenuation prior
A fast single image haze removal algorithm using color attenuation priorLogicMindtech Nologies
 
IMAGE FUSION IN IMAGE PROCESSING
IMAGE FUSION IN IMAGE PROCESSINGIMAGE FUSION IN IMAGE PROCESSING
IMAGE FUSION IN IMAGE PROCESSINGgarima0690
 
Wavelet based image fusion
Wavelet based image fusionWavelet based image fusion
Wavelet based image fusionUmed Paliwal
 
Multi-hypothesis projection-based shift estimation for sweeping panorama reco...
Multi-hypothesis projection-based shift estimation for sweeping panorama reco...Multi-hypothesis projection-based shift estimation for sweeping panorama reco...
Multi-hypothesis projection-based shift estimation for sweeping panorama reco...Tuan Q. Pham
 
Image reconstruction in nuclear medicine
Image reconstruction in nuclear medicineImage reconstruction in nuclear medicine
Image reconstruction in nuclear medicineshokoofeh mousavi
 
Survey on Haze Removal Techniques
Survey on Haze Removal TechniquesSurvey on Haze Removal Techniques
Survey on Haze Removal TechniquesEditor IJMTER
 
Improved single image dehazing by fusion
Improved single image dehazing by fusionImproved single image dehazing by fusion
Improved single image dehazing by fusioneSAT Publishing House
 
G143741
G143741G143741
G143741irjes
 
Adaptive Thresholding Using Quadratic Cost Functions
Adaptive Thresholding Using Quadratic Cost FunctionsAdaptive Thresholding Using Quadratic Cost Functions
Adaptive Thresholding Using Quadratic Cost FunctionsCSCJournals
 
Remote Sensing IEEE 2015 Projects
Remote Sensing IEEE 2015 ProjectsRemote Sensing IEEE 2015 Projects
Remote Sensing IEEE 2015 ProjectsVijay Karan
 
Different Image Fusion Techniques –A Critical Review
Different Image Fusion Techniques –A Critical ReviewDifferent Image Fusion Techniques –A Critical Review
Different Image Fusion Techniques –A Critical ReviewIJMER
 
Video Stitching using Improved RANSAC and SIFT
Video Stitching using Improved RANSAC and SIFTVideo Stitching using Improved RANSAC and SIFT
Video Stitching using Improved RANSAC and SIFTIRJET Journal
 
A New Approach of Medical Image Fusion using Discrete Wavelet Transform
A New Approach of Medical Image Fusion using Discrete Wavelet TransformA New Approach of Medical Image Fusion using Discrete Wavelet Transform
A New Approach of Medical Image Fusion using Discrete Wavelet TransformIDES Editor
 
Comparative study on image fusion methods in spatial domain
Comparative study on image fusion methods in spatial domainComparative study on image fusion methods in spatial domain
Comparative study on image fusion methods in spatial domainIAEME Publication
 

Mais procurados (20)

Ibica2014(p15)image fusion based on broveywavelet
Ibica2014(p15)image fusion based on broveywaveletIbica2014(p15)image fusion based on broveywavelet
Ibica2014(p15)image fusion based on broveywavelet
 
Comparison of image fusion methods
Comparison of image fusion methodsComparison of image fusion methods
Comparison of image fusion methods
 
Imagefusfinalppt 140413102757-phpapp02
Imagefusfinalppt 140413102757-phpapp02Imagefusfinalppt 140413102757-phpapp02
Imagefusfinalppt 140413102757-phpapp02
 
A fast single image haze removal algorithm using color attenuation prior
A fast single image haze removal algorithm using color attenuation priorA fast single image haze removal algorithm using color attenuation prior
A fast single image haze removal algorithm using color attenuation prior
 
IMAGE FUSION IN IMAGE PROCESSING
IMAGE FUSION IN IMAGE PROCESSINGIMAGE FUSION IN IMAGE PROCESSING
IMAGE FUSION IN IMAGE PROCESSING
 
Wavelet based image fusion
Wavelet based image fusionWavelet based image fusion
Wavelet based image fusion
 
Multi-hypothesis projection-based shift estimation for sweeping panorama reco...
Multi-hypothesis projection-based shift estimation for sweeping panorama reco...Multi-hypothesis projection-based shift estimation for sweeping panorama reco...
Multi-hypothesis projection-based shift estimation for sweeping panorama reco...
 
B0141020
B0141020B0141020
B0141020
 
Image reconstruction in nuclear medicine
Image reconstruction in nuclear medicineImage reconstruction in nuclear medicine
Image reconstruction in nuclear medicine
 
Ijetr021211
Ijetr021211Ijetr021211
Ijetr021211
 
Survey on Haze Removal Techniques
Survey on Haze Removal TechniquesSurvey on Haze Removal Techniques
Survey on Haze Removal Techniques
 
Improved single image dehazing by fusion
Improved single image dehazing by fusionImproved single image dehazing by fusion
Improved single image dehazing by fusion
 
G143741
G143741G143741
G143741
 
Basics of dip
Basics of dipBasics of dip
Basics of dip
 
Adaptive Thresholding Using Quadratic Cost Functions
Adaptive Thresholding Using Quadratic Cost FunctionsAdaptive Thresholding Using Quadratic Cost Functions
Adaptive Thresholding Using Quadratic Cost Functions
 
Remote Sensing IEEE 2015 Projects
Remote Sensing IEEE 2015 ProjectsRemote Sensing IEEE 2015 Projects
Remote Sensing IEEE 2015 Projects
 
Different Image Fusion Techniques –A Critical Review
Different Image Fusion Techniques –A Critical ReviewDifferent Image Fusion Techniques –A Critical Review
Different Image Fusion Techniques –A Critical Review
 
Video Stitching using Improved RANSAC and SIFT
Video Stitching using Improved RANSAC and SIFTVideo Stitching using Improved RANSAC and SIFT
Video Stitching using Improved RANSAC and SIFT
 
A New Approach of Medical Image Fusion using Discrete Wavelet Transform
A New Approach of Medical Image Fusion using Discrete Wavelet TransformA New Approach of Medical Image Fusion using Discrete Wavelet Transform
A New Approach of Medical Image Fusion using Discrete Wavelet Transform
 
Comparative study on image fusion methods in spatial domain
Comparative study on image fusion methods in spatial domainComparative study on image fusion methods in spatial domain
Comparative study on image fusion methods in spatial domain
 

Destaque

JAVA 2013 IEEE DATAMINING PROJECT Comparable entity mining from comparative q...
JAVA 2013 IEEE DATAMINING PROJECT Comparable entity mining from comparative q...JAVA 2013 IEEE DATAMINING PROJECT Comparable entity mining from comparative q...
JAVA 2013 IEEE DATAMINING PROJECT Comparable entity mining from comparative q...IEEEGLOBALSOFTTECHNOLOGIES
 
Comparable entity mining from comparative questions
Comparable entity mining from comparative questionsComparable entity mining from comparative questions
Comparable entity mining from comparative questionsIEEEFINALYEARPROJECTS
 
Project book on WINDS OF CHANGE:FROM VENDOR LOCK-IN TO THE META CLOUD
Project book on WINDS OF CHANGE:FROM VENDOR LOCK-IN TO THE META CLOUDProject book on WINDS OF CHANGE:FROM VENDOR LOCK-IN TO THE META CLOUD
Project book on WINDS OF CHANGE:FROM VENDOR LOCK-IN TO THE META CLOUDNAWAZ KHAN
 
Project report of OCR Recognition
Project report of OCR RecognitionProject report of OCR Recognition
Project report of OCR RecognitionBharat Kalia
 
PowerPoint Template
PowerPoint TemplatePowerPoint Template
PowerPoint Templatebutest
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Chiranjeevi Adi
 

Destaque (9)

Beaconsoft
BeaconsoftBeaconsoft
Beaconsoft
 
Concept
ConceptConcept
Concept
 
JAVA 2013 IEEE DATAMINING PROJECT Comparable entity mining from comparative q...
JAVA 2013 IEEE DATAMINING PROJECT Comparable entity mining from comparative q...JAVA 2013 IEEE DATAMINING PROJECT Comparable entity mining from comparative q...
JAVA 2013 IEEE DATAMINING PROJECT Comparable entity mining from comparative q...
 
Comparable entity mining from comparative questions
Comparable entity mining from comparative questionsComparable entity mining from comparative questions
Comparable entity mining from comparative questions
 
Star schema
Star schemaStar schema
Star schema
 
Project book on WINDS OF CHANGE:FROM VENDOR LOCK-IN TO THE META CLOUD
Project book on WINDS OF CHANGE:FROM VENDOR LOCK-IN TO THE META CLOUDProject book on WINDS OF CHANGE:FROM VENDOR LOCK-IN TO THE META CLOUD
Project book on WINDS OF CHANGE:FROM VENDOR LOCK-IN TO THE META CLOUD
 
Project report of OCR Recognition
Project report of OCR RecognitionProject report of OCR Recognition
Project report of OCR Recognition
 
PowerPoint Template
PowerPoint TemplatePowerPoint Template
PowerPoint Template
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
 

Semelhante a Reversible watermarking based on invariant image classification and dynamic histogram shifting

Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...Ecway Technologies
 
Matlab reversible watermarking based on invariant image classification and d...
Matlab  reversible watermarking based on invariant image classification and d...Matlab  reversible watermarking based on invariant image classification and d...
Matlab reversible watermarking based on invariant image classification and d...Ecway Technologies
 
Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Editor IJARCET
 
Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Editor IJARCET
 
Remote Sensing IEEE 2015 Projects
Remote Sensing IEEE 2015 ProjectsRemote Sensing IEEE 2015 Projects
Remote Sensing IEEE 2015 ProjectsVijay Karan
 
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...JPINFOTECH JAYAPRAKASH
 
EVP Plus Software delivers state-of-the-art image processing for CR and DR sy...
EVP Plus Software delivers state-of-the-art image processing for CR and DR sy...EVP Plus Software delivers state-of-the-art image processing for CR and DR sy...
EVP Plus Software delivers state-of-the-art image processing for CR and DR sy...Carestream
 
Presentation of Lossy compression
Presentation of Lossy compressionPresentation of Lossy compression
Presentation of Lossy compressionOmar Ghazi
 
Modified clahe an adaptive algorithm for contrast enhancement of aerial medi...
Modified clahe an adaptive algorithm for contrast enhancement of aerial  medi...Modified clahe an adaptive algorithm for contrast enhancement of aerial  medi...
Modified clahe an adaptive algorithm for contrast enhancement of aerial medi...IAEME Publication
 
Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...
Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...
Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...CSCJournals
 
X-Ray Image Enhancement using CLAHE Method
X-Ray Image Enhancement using CLAHE MethodX-Ray Image Enhancement using CLAHE Method
X-Ray Image Enhancement using CLAHE MethodIRJET Journal
 
HUMAN VISION THRESHOLDING WITH ENHANCEMENT FOR DARK BLURRED IMAGES FOR LOCAL ...
HUMAN VISION THRESHOLDING WITH ENHANCEMENT FOR DARK BLURRED IMAGES FOR LOCAL ...HUMAN VISION THRESHOLDING WITH ENHANCEMENT FOR DARK BLURRED IMAGES FOR LOCAL ...
HUMAN VISION THRESHOLDING WITH ENHANCEMENT FOR DARK BLURRED IMAGES FOR LOCAL ...cscpconf
 
Improvement of Image Deblurring Through Different Methods
Improvement of Image Deblurring Through Different MethodsImprovement of Image Deblurring Through Different Methods
Improvement of Image Deblurring Through Different MethodsIOSR Journals
 

Semelhante a Reversible watermarking based on invariant image classification and dynamic histogram shifting (20)

Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...
 
Matlab reversible watermarking based on invariant image classification and d...
Matlab  reversible watermarking based on invariant image classification and d...Matlab  reversible watermarking based on invariant image classification and d...
Matlab reversible watermarking based on invariant image classification and d...
 
U4408108113
U4408108113U4408108113
U4408108113
 
Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276
 
Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276
 
Matlab abstract 2016
Matlab abstract 2016Matlab abstract 2016
Matlab abstract 2016
 
Remote Sensing IEEE 2015 Projects
Remote Sensing IEEE 2015 ProjectsRemote Sensing IEEE 2015 Projects
Remote Sensing IEEE 2015 Projects
 
Ijetr021211
Ijetr021211Ijetr021211
Ijetr021211
 
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
 
robio-2014-falquez
robio-2014-falquezrobio-2014-falquez
robio-2014-falquez
 
EVP Plus Software delivers state-of-the-art image processing for CR and DR sy...
EVP Plus Software delivers state-of-the-art image processing for CR and DR sy...EVP Plus Software delivers state-of-the-art image processing for CR and DR sy...
EVP Plus Software delivers state-of-the-art image processing for CR and DR sy...
 
Presentation of Lossy compression
Presentation of Lossy compressionPresentation of Lossy compression
Presentation of Lossy compression
 
Modified clahe an adaptive algorithm for contrast enhancement of aerial medi...
Modified clahe an adaptive algorithm for contrast enhancement of aerial  medi...Modified clahe an adaptive algorithm for contrast enhancement of aerial  medi...
Modified clahe an adaptive algorithm for contrast enhancement of aerial medi...
 
Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...
Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...
Joint, Image-Adaptive Compression and Watermarking by GABased Wavelet Localiz...
 
X-Ray Image Enhancement using CLAHE Method
X-Ray Image Enhancement using CLAHE MethodX-Ray Image Enhancement using CLAHE Method
X-Ray Image Enhancement using CLAHE Method
 
HUMAN VISION THRESHOLDING WITH ENHANCEMENT FOR DARK BLURRED IMAGES FOR LOCAL ...
HUMAN VISION THRESHOLDING WITH ENHANCEMENT FOR DARK BLURRED IMAGES FOR LOCAL ...HUMAN VISION THRESHOLDING WITH ENHANCEMENT FOR DARK BLURRED IMAGES FOR LOCAL ...
HUMAN VISION THRESHOLDING WITH ENHANCEMENT FOR DARK BLURRED IMAGES FOR LOCAL ...
 
ICSE03
ICSE03ICSE03
ICSE03
 
MTP paper
MTP paperMTP paper
MTP paper
 
2007 asprs
2007 asprs2007 asprs
2007 asprs
 
Improvement of Image Deblurring Through Different Methods
Improvement of Image Deblurring Through Different MethodsImprovement of Image Deblurring Through Different Methods
Improvement of Image Deblurring Through Different Methods
 

Mais de IEEEFINALYEARPROJECTS

Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsIEEEFINALYEARPROJECTS
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsIEEEFINALYEARPROJECTS
 
Reversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferReversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferIEEEFINALYEARPROJECTS
 
Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codesIEEEFINALYEARPROJECTS
 
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...IEEEFINALYEARPROJECTS
 
Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...IEEEFINALYEARPROJECTS
 
An access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la nsAn access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la nsIEEEFINALYEARPROJECTS
 
Towards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsTowards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsIEEEFINALYEARPROJECTS
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...IEEEFINALYEARPROJECTS
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...IEEEFINALYEARPROJECTS
 
Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...IEEEFINALYEARPROJECTS
 
Harnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeHarnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeIEEEFINALYEARPROJECTS
 
Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...IEEEFINALYEARPROJECTS
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...IEEEFINALYEARPROJECTS
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...IEEEFINALYEARPROJECTS
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationIEEEFINALYEARPROJECTS
 
Utility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachUtility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachIEEEFINALYEARPROJECTS
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networksIEEEFINALYEARPROJECTS
 

Mais de IEEEFINALYEARPROJECTS (20)

Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
 
Reversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferReversible data hiding with optimal value transfer
Reversible data hiding with optimal value transfer
 
Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codes
 
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
 
Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...
 
An access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la nsAn access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la ns
 
Towards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsTowards differential query services in cost efficient clouds
Towards differential query services in cost efficient clouds
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...
 
Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...
 
Non cooperative location privacy
Non cooperative location privacyNon cooperative location privacy
Non cooperative location privacy
 
Harnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeHarnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing large
 
Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creation
 
Utility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachUtility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approach
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
Spatial approximate string search
Spatial approximate string searchSpatial approximate string search
Spatial approximate string search
 

Último

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Último (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Reversible watermarking based on invariant image classification and dynamic histogram shifting

  • 1. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting ABSTRACT: In this paper, we propose a new reversible watermarking scheme. One first contribution is a histogram shifting modulation which adaptively takes care of the local specificities of the image content. By applying it to the image prediction-errors and by considering their immediate neighborhood, the scheme we propose inserts data in textured areas where other methods fail to do so. Furthermore, our scheme makes use of a classification process for identifying parts of the image that can be watermarked with the most suited reversible modulation. This classification is based on a reference image derived from the image itself, a prediction of it, which has the property of being invariant to the watermark insertion. In that way, the watermark embedder and extractor remain synchronized for message extraction and image reconstruction. The experiments conducted so far, on some natural images and on medical images from different modalities, show that for capacities smaller than 0.4 bpp, our method can insert more data with lower distortion than any existing schemes. For the same capacity, we achieve a peak signal-to- noise ratio (PSNR) of about 1–2 dB greater than with the scheme of Hwang et al., the most efficient approach actually. EXISTING SYSTEM: GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. The introduction of the concept of reversible watermarking in the Barton patent, several methods have been proposed. Among these solutions, most recent schemes use Expansion Embedding (EE) modulation, Histogram Shifting (HS) modulation or, more recently, their combination. One of the main concerns with these modulations is to avoid underflows and overflows. Indeed, with the addition of a watermark signal to the image, caution must be taken to avoid gray level value underflows (negative) and overflows (greater than for a bit depth image) in the watermarked image while minimizing at the same time image distortion. Basically, EE modulation introduced by Thodiet al. is a generalization of Difference Expansion modulation proposed by Tianet al.which expands the difference between two adjacent pixels by shifting to the left its binary representation, thus creating a new virtual least significant bit (LSB) that can be used for data insertion. Since then, EE has been applied in some transformed domains such as the wavelet domain or to prediction-errors.EE is usually associated with LSB substitution applied to “samples” that cannot be expanded due to the signal dynamic limits or in order to preserve the image quality. In, Ni et al.introduced the well-known Histogram Shifting (HS) modulation. HS adds gray values to some pixels in order to shift a range of classes of the image histogram and to create a ’gap’ near the histogram maxima. Pixels which belong to the class of the histogram maxima (“Carrier-class”) are then shifted to the gap or kept unchanged to encode one bit of the message ’0’ or ’1’. Other pixels (the “noncarriers”) are simply shifted. Instead of working in the spatial domain, several schemes apply HS to some transformed coefficients or pixel prediction-errors, histograms of which are most of the time concentrated around one single class maxima located on zero. This maximizes HS capacity and also simplifies the reidentification of the histogram classes of maximum cardinality at the extraction stage. In order to reduce the distortion while preserving the capacity, some preprocessing has been suggested in order to identify pixels, transformed coefficients or prediction-errors that do not belong to the histogram maxima classes (“noncarrier classes”). As we will see later, different schemes working with prediction-errors do not watermark pixels within a neighborhood of high variance; indeed, these pixels belong to histogram classes that are shifted without message embedding. Recently, Hwanget al. improved the approach of Sachnevet al.. They suggest defining the set of carrier-classes as the classes which minimize, for a given
  • 3. capacity, image distortion. However, their set of carrier-classes is uniquely defined for the whole image and the execution time of this approach is rather high. DISADVANTAGES OF EXISTING SYSTEM: The modulation is overflow and underflow. The image distortions are more. PROPOSED SYSTEM: We propose to adapt dynamically the carrier-classes by considering the local specificities of the image. We simply suggest using the local neighborhood of each prediction-error in order to determine the most adapted carrier-class for message insertion. Another refinement we propose is based on the selection of the most locally adapted lossless modulation. Indeed, reversible modulations are more or less efficient depending on image content. This is especially the case for medical images where large black areas exist (i.e., the background area). In these regions, directly applying HS on pixels may be more efficient and of smaller complexity than applying it on prediction-errors. Because, the histogram maxima corresponds to the null gray value; capacity is maximized and underflows simply avoided by shifting pixel value to the right, i.e. by adding a positive gray value. When working on prediction-errors in these regions, the management of overflows/underflows is more difficult because the shift amplitude can be positive or negative. This is why we suggest considering the local content of the image in order to select the most locally adapted lossless modulation. This should allow us to optimize the compromise capacity/image distortion. ADVANTAGES OF PROPOSED SYSTEM: Directly applying HS on pixels may be more efficient and of smaller complexity than applying it on prediction-errors.
  • 4. The watermark embedder and extractor remain synchronized because the extractor will retrieve the same reference image. Herein, we adapt this process to select the most locally appropriate watermarking modulation. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Coding Language : C#.Net REFERENCE:
  • 5. Gouenou Coatrieux, Member, IEEE, Wei Pan, Nora Cuppens-Boulahia, Member, IEEE, Frédéric Cuppens, Member, IEEE, and Christian Roux, Fellow, IEEE “Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting” - IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, JANUARY 2013.