23-01-2010, 04:03 PM
Hey buddy i want a project based on JAVA on "Digital Water Marking".
Waiting for ur reply...
23-01-2010, 04:03 PM
Hey buddy i want a project based on JAVA on "Digital Water Marking". Waiting for ur reply...
25-01-2010, 01:09 AM
Digital watermark is a special message embedded in an image, whether it is a photo, video or
other digital content. A digital watermark software embeds these "imperceptible" messages by making subtle changes to the data of the original digital content and it can be "read" to validate original content. It thus provides an imperceptoble way to embed information in both digital and conventional media content. Watermarking systems must include the following attributes: -robustness against distortion and attack -visibility of the water mark -data capacity of the watermark Digital Watermarking can be used for applications such as: - Copyright protection -Fingerprinting -Covert Communication (steganography) -Broadcast Monitoring Watermarking life-cycle phases The information to be embedded is called a digital watermark, The signal where the watermark is to be embedded is called the host signal.embedding, attack and detection. are the three steps. In embedding, an algorithm accepts the host and the data to be embedded and produces a watermarked signal. The watermarked signal is then transmitted or stored. If the reciever makes a modification, this is called an attack. In the ATTACK,the pirates attempt to remove the digital watermark through modification through methods like lossy compression of the data, cropping an image or video, or intentionally adding noise. Detection (often called extraction) is an algorithm which is applied to the attacked signal to attempt to extract the watermark from it. The watermark is still present and it can be extracted, If the signal was unmodified during transmission. Embedding method A watermarking method is referred to as spread-spectrum if the marked signal is obtained by an additive modification. It has low information capacity due to host interference. A watermarking method is said to be of quantization type if the marked signal is obtained by quantization. This method shows low robustness, but have a high information capacity . A watermarking method is referred to as amplitude modulation if the marked signal is embedded by additive modification which is similar to spread spectrum method but is particularly embedded in the spatial domain. Full report download: Watermarking Java Programs.pdf (Size: 567.44 KB / Downloads: 366) digital watermarking.pdf (Size: 115.97 KB / Downloads: 481)
05-01-2011, 06:09 PM
hi,
[/size][/font]
05-01-2011, 06:19 PM
Hi,
I'm doin BE in APSCE.. I need seminar report of digital watermarking technology in pdf and ppt of latest 2010
05-01-2011, 06:20 PM
i have more information about digital watermarking
i am not satisified with this information
18-01-2011, 03:55 PM
hey ashmi ,
if you have .. please share it here ..
01-02-2012, 12:15 PM
Digital Watermarking
DigitalWatermarking.ppt (Size: 815 KB / Downloads: 39) Introduction What is Digital Watermarking? Digital watermarking technology allows users to embed data into digital contents such as text, images, video and audio data. It is the process of Information hiding. The hiding process has to be such that the modifications of the media are imperceptible. Classification .Digital Watermarking Techniques Can be Classified in Several Ways As follows: .Robustness Fragile: it fails to be detected after the Slightest modification. Semi-fragile: it fails detection after big transformation Robust: it resists a designated class of transformation .Perceptibility .Capacity .Embedding Methods spread-spectrum quantization Types There are basically five types of watermarking 1)Visible Watermarking - Change the original image in such way that the new signals can easily differentiated . - Used as Marketing tool. 2)Invisible Watermarking - Original image can not be Changed. Fig2.image with invisible watermark 3)Text-Based Watermarking The Original text are replaced with its synonyms . 4)Image Watermarking Watermarking is done in such way that pixels of image will changed. It can be visible or invisible . Application Invisible marking on blank paper: It is used to embed the name of the lawyer or important information Fig4. The image on the left shows blank paper marked by the invisible digital watermark. Ownership Assertion: A watermark is placed in a music document to declare who owns the music. Usage Control: To control accessing and copying music.
18-02-2012, 10:51 AM
to get information about the topic digital watermarking full report ppt and related topic refer the link bellow
https://seminarproject.net/Thread-digita...t-download https://seminarproject.net/Thread-digita...king--5450 https://seminarproject.net/Thread-digital-water-marking https://seminarproject.net/Thread-digita...ng-project https://seminarproject.net/Thread-waterm...ull-report https://seminarproject.net/Thread-digita...ull-report https://seminarproject.net/Thread-digita...plications https://seminarproject.net/Thread-digita...termarking https://seminarproject.net/Thread-digita...ad?page=15 https://seminarproject.net/Thread-digita...ad?page=22 https://seminarproject.net/Thread-digita...oad?page=4 https://seminarproject.net/Thread-digita...ad?page=17 https://seminarproject.net/Thread-digita...ad?page=19 https://seminarproject.net/Thread-digita...ad?page=18
01-09-2012, 10:35 AM
Digital Watermarking
Digital Watermarking.doc (Size: 565 KB / Downloads: 32) ABSTRACT With the growing popularity of digital Medias through the World Wide Web, intellectual property needs copyright protection, prevention of illegal copying and verification of content integrity. The new data hiding techniques need to be developed that satisfy the requirements of imperceptibility, robustness, capacity, or data hiding rate and security of the hidden data etc. At this stage, water marking plays the role of an efficient tool. The objective of this project is to explore the basic concepts of digital water marking and various types and techniques involved in the water marking. INTRODUCTION Protection of Copyrighted Digital Content Historically, copyright laws have protected authored content by restricting distribution and modification of the content. The effectiveness of these laws, however, depends on three important requirements: The creator of original content must be able to refute anybody else’s claim to having created that content. Creators and owners must be able to track the distribution of their content, so that they can detect attempts to distribute it illegally. Illegal attempts to alter the content and distribute it as if it were genuine must be detectable. Today, creators and owners of digital video, audio, and images want assurance that their content will not be illegally redistributed. Unless content owners are confident that their works will be properly compensated and acknowledged, few would willingly make their content publicly available. Also, consumers want assurance that the content they buy is legitimate. Without mechanisms to support the above requirements, copyright owners cannot generate proof that somebody else violated copyright law. The techniques that have been proposed for solving this problem are collectively called digital watermarking. Digital watermarking refers to the embedding of unobtrusive marks or labels that can be represented as bits in digital content. DECODING PROCESS A decoder function D takes an image J (J can be a watermarked or un-watermarked image, and possibly corrupted) whose ownership is to be determined and recovers a signature Ś from the image. In this process an additional image I can also be included which is often the original and un-watermarked version of J. This is due to the fact that some encoding schemes may make use of the original images in the watermarking process to provide extra robustness against intentional and unintentional corruption of pixels. TYPES OF DIGITAL WATERMARKS Watermarks and watermarking techniques can be divided into various categories in various ways. The watermarks can be applied in spatial domain. An alternative to spatial domain watermarking is frequency domain watermarking. It has been pointed out that the frequency domain methods are more robust than the spatial domain techniques. Different types of watermarks are shown in the figure below APPLICATIONS Digital Watermarks are potentially useful in many applications, including: Ownership assertion: Watermarks can be used for ownership assertion. To assert ownership of an image, Alice can generate a watermarking signal using a secret private key, and then embed it into the original image. She can then make the watermarked image publicly available. Later, when Bob contends the ownership of an image derived from this public image, Alice can produce the unmarked original image and also demonstrate the presence of her watermark in Bob’s image. Since Alice’s original image is unavailable to Bob, he cannot do the same. For such a scheme to work, the watermark has to survive image processing operations aimed at malicious removal. In addition, the watermark should be inserted in such a manner that it cannot be forged as Alice would not want to be held accountable for an image that she does not own. CONCLUSION Digital watermarking holds significant promise as one of the keys to protecting proprietary digital content in the coming years. It focuses on embedding information inside a digital object such that the embedded information is in separable bound to the object. Tampering with the watermark or otherwise altering a watermarked object should always be detectable, and attempting to remove a watermark from its object should cause to be that object useless. Currently, watermarking suffers from several drawbacks that prevent it from providing the creators of digital content with a solid guarantee of copyright protection. The watermarking research is progressing very fast and numerous researchers from various fields are focusing to develop some workable scheme. Different companies also working to get commercial products. We hope some commercial and effective schemes will be available in future. |
|