CHAOTIC WATERMARKING SCHEME FOR AUTHENTICATION OF JPEG IMAGES
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Wifi
Active In SP
**

Posts: 158
Joined: Oct 2010
#1
29-10-2010, 08:40 AM


CHAOTIC WATERMARKING SCHEME FOR AUTHENTICATION OF JPEG IMAGES
VISAKH VIJAYAN
S7 ECE
NO : 71
College of Engineering, Trivandrum
2007-11 batch



.pptx   CHAOTIC WATERMARKING SCHEME FOR AUTHENTICATION OF JPEG IMAGES.pptx (Size: 1.27 MB / Downloads: 64)

OUTLINE
INTRODUCTION
WATERMARK EMBEDDING
WATERMARK EMBEDDING PROCESS
WATERMARK EXTRACTION & AUTHENTICATION
CONCLUSION
REFERENCE

INTRODUCTION
Watermarking: Process of embedding digital signal (information) in a way that is difficult to remove.
Information may be text or a logo which is used for identification and authentication purposes.
Watermarking may be visible watermarking or invisible watermarking.
In visible watermarking, information is visible whereas in invisible watermarking information is invisible.

Applications :
Copyright protection systems.
Source tracing.
Annotation of photographs.
Broadcast monitoring.
Covert communication.

This seminar and presentation propose a novel chaotic fragile watermarking algorithm for JPEG images.
JPEG images are preferred due to its better store capacity and difficulty to extract watermarked information.
In fragile watermarking, data fails to be detected after slightest modification.





The figure shows two watermarked images. Figure ‘a’ shows an invisible watermarking image and figure ‘b’ shows a visible watermarking image.
WATERMARK EMBEDDING
Watermarking will be performed on quantized DCT coefficients.
Original image is first performed entropy decoding. Then quantized DCT coefficients are obtained.
For each 8*8 block of quantized DCT coefficients, we select the AC coefficients ( ) .
To generate and embed the watermark, the LSB (Least Significant Bit) plane is set to zero and obtain .
We map each to the range of initial values of chaotic mapping as follows :





where d is the parameter for controlling the range of .
These mapped initial values are closely related to the content of the image.
We know that an important property of chaos is that a very small change in the initial state of the chaotic system can lead to a large effect on its later state.
Based on this property of chaos, the initial value
mapped by is performed n times iteration by chaotic system.
nth iteration result of after binary quantization is as the watermark bit to be embed into the LSB plane of quantized AC coefficients.
Then we get the watermarked quantized DCT coefficients .
Finally, we perform entropy coding to the DCT coefficients carrying watermark information and watermarked image can be obtained.
Note that iteration time n is random for security purpose when we perform chaotic iteration, which is decided by the random numbers generated by a chaotic system whose initial conditions as the key.
WATERMARK EMBEDDING PROCESS
WATERMARK EXTRACTION AND AUTHENTICATION

The watermark extraction will be performed in the compressed domain, so that we can skip re-quantization, inverse DCT etc in JPEG decoding procedure.
After decoding Huffman code & run length code, the 8*8 blocks with watermarked quantized DCT coefficients are obtained.
We extract the watermark bits from the LSB plane of DCT blocks to form a watermark version
On the other hand, the quantized DCT coefficients whose LSB is set to zero are generated another watermark version by chaotic iteration.
Then the two versions of watermark make the comparison.
The generated watermark version is different from the one that is extracted.
Thus we think this generated 8*8 image block is tampered.
Let denote a 8*8 image block, and assume some pixels , (1 i ,j 8) is maliciously
tampered to ,then the whole
corresponding 8*8 DCT coefficient block will be different from the original one .
The tampered matrix is as follows:


where the non zero will be tampered block.
After all of 8*8 blocks in image are detected, the tampered region is obtained & authentication is completed.
CONCLUSION
The proposed scheme avoids the quantization error coming from JPEG quantization and re-quantization process
The proposed scheme avoids a large of computation on full decoding and re-encoding process, so the authentication speed is quick.
The applications of proposed scheme are the authentication of JPEG images on Internet network and trust-worthy digital cameras.
The scheme is very fit for the integrity authentication of the electronic image in Internet.
SOME WATERMARK IMAGES


REFERENCES

W. N. Lie, L. C. Chang, “Robust and high-quality time-domain audio watermarking based on low-frequency amplitude modification,” IEEE Trans. on Multimedia, vol.8, no.1, pp. 46-59, January 2006.
FU Yu, WU Xiaoping, Chen Zemao, Ye Qing, “A Wavelet Digital Watermarking Algorithm Based on Chaotic Mapping”, International Symposium on Electronic Commerce and Security, IEEE computer society,pp.886-889,2008.
Z. M. Lu, D. G. Xu, S. H. Sun, “Multipurpose image watermarking algorithm based on multistage vector quantization,” IEEE Trans. Image Processing, vol.14, no.6, pp. 822-831, June 2005.






Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  user identification and authentication systems must support the minimum requirements jaseelati 0 512 04-12-2014, 01:44 PM
Last Post: jaseelati
  FINGER VEIN AUTHENTICATION TECHNOLOGY seminar ideas 5 2,034 10-01-2014, 03:01 PM
Last Post: seminar project topic
  Implicit Password Authentication System seminar ideas 5 4,987 10-01-2014, 01:53 PM
Last Post: seminar project topic
  Two-Stage Enhancement for Low Quality Fingerprint Images in Spatial Report study tips 0 361 22-06-2013, 03:36 PM
Last Post: study tips
  Biorthogonal Wavelet Transform Digital Image Watermarking pdf study tips 0 476 29-05-2013, 03:59 PM
Last Post: study tips
  Comparative Study of Digital Audio Watermarking Technique Report study tips 0 432 19-02-2013, 11:10 AM
Last Post: study tips
  CURVELET FUSION OF MR AND CT IMAGES pdf study tips 0 270 16-02-2013, 09:40 AM
Last Post: study tips
  A Synchrophasor Assisted Frequency and Voltage Stability Based Load Shedding Scheme f seminar tips 0 467 06-02-2013, 03:24 PM
Last Post: seminar tips
  REGULATIONS, SCHEME AND SYLLABUS FOR ELECTRONICS AND COMMUNICATION ENGINEERING project girl 0 370 22-01-2013, 11:40 AM
Last Post: project girl
  AN IMPROVED AUTHENTICATION AND KEY AGREEMENT PROTOCOL OF 3G report project girl 0 432 18-12-2012, 03:24 PM
Last Post: project girl