Anda di halaman 1dari 6

ABSTRACT

In this project an information theoretic model for image watermarking and data hiding systems is presented here. The fundamental capacity limits of these systems are determined by the statistical model used for the host image, by the distortion constraints on the data hider and the attacker, and by the information available to the data hider, to the attacker, and to the decoder. We present a parametric statistical model for visual images in the wavelet transform domain. We characterize the joint densities of coefficient magnitudes at adjacent spatial locations, adjacent orientations, and adjacent spatial scales. The model accounts for the statistics of a wide variety of visual images. We consider wavelet statistical models for images and compute data-hiding capacity for compressed and uncompressed host-image sources. Closed form expressions are obtained under sparse-model approximations using MATLAB. The objective of our project could be achieved by the proper implementation which is mentioned above. The present project could be enhanced in future for hiding one image in another image in the security purpose in many fields.

CONTENTS

S.No. Chapter
Abstract List of figures List of Tables 1. INTRODUCTION 1.1 Literature Survey 1.2 Types of Watermark 1.3 Features of Watermarking 1.4 Watermarking Schemes 1.4.1 Spatial Domain 1.4.2 Frequency Domain 1.5 Digital Watermarking life cycle Phases 1.6 The Project Report Organization 2. DIGITAL IMAGE PROCESSING 2.1 History 2.1.1 Pixelization 2.1.2 Linear Filtering 2.1.3 Principle Component Analysis 2.1.4 Independent Component Analysis 2.1.5 Hidden Markov Models 2.1.6 Anisotropic Diffusion 2.1.7 Wavelets 2.1.8 Artificial Neural Effects

Page No.
i iii iv

01
01 03 05 07 08 08 09 10 11 11 13 14 14 15 16 16 17 19

ii

2.2 Fundamental Steps in Digital image processing 3. MATLAB 3.1 Introduction 3.2 MATLAB System 3.2.1 MATLAB Language 3.2.2 MATLAB Mathematical Function Library 3.3 MATLAB Working Environment 3.3.1 MATLAB Desktop 3.3.2 Editor to Create M-file 3.4 Syntax 3.4.1 Variables 3.4.2 Vector / Matrix 3.4.3 Semi Colons 3.4.4 Structures 3.5 Program Development 3.6 Debugging 3.7 Interfacing with Other Languages 4. IMPLEMENTATION OF LWT FOR DATA HIDING 4.1 Discrete Wavelet Transform 4.1.1 One Level Of The transform 4.1.2 Cascading and Filter Banks 4.2 LWT Watermarking 4.2.1 2-D Lifting scheme 4.3 Lifting Implementation DWT 4.3.1 Summary of Literature Review

19 23 23 24 24 24 24 25 25 26 26 26 27 27 28 30 31 32 32 33 34 36 37 42 43

iii

4.4 Watermark Embedding 4.4.1 Algorithm 4.4.2 Flow Chart 5. SIMULATION RESULTS 5.1 Data Embedding 5.2 Signal to Noise Ratio 5.2.1 Definition 6. APPLICATIONS CONCLUSION FUTURE SCOPE BIBLIOGRAPHY

44 44 46 47 47 49 50 53 58 59 60

iv

List of Figures
S.No. Name of the Figure
1.1 2.1 4.1 4.2 4.3 4.4 4.5 4.6 4.7 4.8 4.9 4.10 4.11 5.1 5.2 5.3 5.4 5.5 6.1 General Digital Watermarking life-cycle phases Block Diagram Representation of DIP Block diagram of Filter Analysis Three Level Filter Bank Frequency Domain Representation of DWT Scale 2D DWT Lifting Based Discrete Wavelet Transform 2-D Lifting scheme of an image Lifting Schemes. Lifting DWT Signal Analysis and Reconstruction in LWT Watermark embedding Flowchart of Watermark Embedding Lena image GIKI logo Output Original image Output Watermarked image Watermarked image with psnr value 33.151722 Copyright protection/ user Authentification

Page No.
10 20 34 34 35 36 37 38 38 41 43 44 46 47 48 48 49 52 54

List of Tables
S.No. Name of the Table
1 Analogy between Fourier and Wavelet methods

Page No.
33

vi

Anda mungkin juga menyukai