"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Digital Image Watermarking
1. Feature Region Set for
Digital Image Watermarking
PRALIN PAVITHRAN
ME- MECHATRONICS
EMAIL :pralinpavithran@gmail.com
10/20/2013
copyright protected (c)
2. AIM
After watermarked to preserve the original image
quality.
Multi-dimensional knapsack problem technique .
10/20/2013
copyright protected (c)
3. INTRODUCTION
Before watermarking to select the high freguency
by using Harris laplican transform.
Attacks which attempt to destroy watermarks can
be classified into two types,
1. Noise-like signal processing.
2. Geometric distortions.
10/20/2013
copyright protected (c)
5. 1.Secure spread Spectrum watermarking for multimedia.
This paper presents a secure (tamper-resistant) algorithm
for watermarking images, and a methodology for digital
watermarking that may be generalized to audio, video, and
multimedia data. Advocate that a watermark should be
constructed as an independent and identically distributed
Gaussian random vector that is imperceptibly inserted in a
spread-spectrum-like fashion into the perceptually most
significant spectral components of the data.
ADVANTAGE:
Two watermarking approaches executed properly.
DRAWBACK:
Detect the watermarked image, again shows as
original as watermarked. 10/20/2013 copyright protected (c)
6. 2. Cocktail watermarking for digital image protection.
A novel image protection scheme called “cocktail
watermarking” is proposed in this paper. We analyze and point
out the inadequacy of the modulation techniques commonly used
in ordinary spread spectrum watermarking methods and the
visual model-based ones. To resolve the inadequacy, two
watermarks which play complementary roles are simultaneously
embedded into a host image is remarkably effective in resisting
various attacks, including combined ones.
ADVANTAGE:
It is secure algorithm for watermarking images.
DRAWBACK:
The original image is not available after watermarked
extraction.
10/20/2013
copyright protected (c)
7. 3. Digital watermarking robust to geometric distortions.
In this paper, we present two watermarking approaches
that are robust to geometric distortions. The first approach is
based on image normalization, in which both watermark
embedding and extraction are carried out with respect to an
image normalized to meet a set of predefined moment criteria.
ADVANTAGE:
Two watermarking approaches executed properly.
DRAWBACK:
Detect the watermarked image, again shows as original
as watermarked.
10/20/2013
copyright protected (c)
8. 4. Image watermarking Algorithm with mathematical
modeling and analysis of the watermarking Processes.
In this paper, a new rotation and scaling invariant image
watermarking scheme is proposed based on rotation invariant
feature and image normalization. A mathematical model is
established to approximate the image based on the mixture
generalized Gaussian distribution, which can facilitate the
analysis of the watermarking processes.
ADVANTAGE:
The rotation invariant features are extracted from the
segmented areas and are selected as reference points.
DRAWBACK:
Difficult to selecting the high frequency region.
10/20/2013
copyright protected (c)
9. 5. A New Approach for Optimal Multiple Watermarks
Injection.
The digital imaging technology has grown explosively
for multimedia applications in recent years. The need for the
copyrighted digitalized media becomes urgent nowadays. An
approach for the digital copyright protection is to employ
advanced watermarking techniques, where watermarks can
reveal the ownership identities. Generally speaking, the
watermarks are embedded into an image or video signals.
ADVANTAGE:
Efficient scale-factor optimization scheme, which can
lead to the maximum overall SNR for both subject signal and
watermarks.
DRAWBACK:
Detect the watermarked image, again shows as original
as watermarked.
10/20/2013
copyright protected (c)
11. EXISTING SYSTEM
Robust image watermarking scheme for resisting
geometric attacks and traditional signal processing
attacks simultaneously by two main phases, the feature
point based watermark synchronization and the
Discrete Wavelet Transform (DWT) based watermark
embedding.
10/20/2013
copyright protected (c)
14. ADVANTAGES
Robust digital image watermarking under the
constraint of preserving image quality.
The robustness against
significantly improved.
10/20/2013
various
copyright protected (c)
attacks
is
16. RESULT AND FUTURE SCOPE
From this project the secrete image can be watermarked
into an original image.
Finally to protect the original image, that means to
preserve the image quality as the original image.
In future it will use in company way because the
important documents, file watermark in a path.
10/20/2013
copyright protected (c)
17. REFERENCE
[1.] Jen-Sheng Tsai, Win-Bin Huang, and Yau-Hwang Ku,” On
the Selection of Optimal Feature Region Set for Robust
Digital Image Watermarking”. IEEE TRANSACTIONS ON
IMAGE PROCESSING, VOL. 20, NO. 3, MARCH 2011.
[2.] C. W. Dang and H. M. Hang, “A feature-based robust
digital image watermarking scheme,” IEEE Trans. Signal
Process., vol. 51, no. 4,pp. 950–959, Apr. 2008.
[3.] D. G. Gowe, “Distinctive image features from scaleinvariant key points,”Int. J. Comput. Vis., vol. 60, no. 2, pp.
91–110, Nov. 2004.
[4.] H. Kellerer, U. Pferschy, and D. Pisinger, “Knapsack
Problems”. Berlin: Springer, 2004.
[5.]F. A. P. Petitcolas, “Watermarking schemes evaluation,”
IEEE Signal Process. Mag., vol. 17, no. 5, pp. 58–64, Sep. 2009.
10/20/2013
copyright protected (c)