Unseen Visible Watermarking: A Novel Methodology for Auxiliary Information Delivery
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar topics
Active In SP
**

Posts: 559
Joined: Mar 2010
#1
22-03-2010, 11:29 PM


Unseen Visible Watermarking: A Novel Methodology for Auxiliary Information Delivery via Visual Contents
Abstract
A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW schemes, hidden information can be embedded covertly and then directly extracted using the human visual system as long as appropriate operations (e.g., gamma correction provided by almost all display devices or changes in viewing angles relative to LCD monitors) are performed. UVW eliminates the requirement of invisible watermarking that specific watermark extractors must be deployed to the receiving end in advance, and it can be integrated with 2-D barcodes to transmit machine-readable information that conventional visible watermarking schemes fail to deliver. We also adopt visual cryptographic techniques to guard the security of hidden information and, at the same time, increase the practical value of visual cryptography. Since UVW can be alternatively viewed as a mechanism for visualizing patterns hidden with least-significant-bit embedding, its security against statistical steganalysis is proved by empirical tests. Limitations and other potential extensions of UVW are also addressed.
Existing System
In the past decade, digital watermarking technologies have been proposed to provide robust connections between auxiliary information and multimedia. Digital watermarking schemes can be roughly classified into two approaches: invisible and visible. Invisible watermarking schemes embed messages into multimedia content in such a way that content users cannot perceptually tell the differences between unmarked and marked contents. However, in addition to their disputed vulnerability in security, invisible watermarking schemes suffer from the limitation that, in many important application scenarios, specific watermark extraction modules must be deployed to the receiving end beforehand. Consequently, taking value-added metadata as an example, users of legacy visual systems like out-of-date TV sets lacking updating capabilities will never enjoy the benefits facilitated by invisible watermarks. Visible watermarking approaches on the other hand, eliminate the trouble of extraction module deployment. However, the applicability of this class of watermarking techniques is seriously constrained due to the inevitable quality degradation caused by the unobtrusive but visible watermark patterns. Moreover, only human-readable information can be conveyed by existing visible watermarking schemes, since automatically distinguishing faint watermark patterns from marked visual contents would be a very difficult task.
Proposed System
We propose a novel class of watermarking schemes, called unseen visible watermarking (UVW), to deliver auxiliary information via visual content. Visual content marked with UVW schemes share the same perceptual quality as those marked with simple invisible watermarking schemes. But when adequate operations, like image enhancement operations
(provided by common display devices) are performed, information hidden in the marked content will be disclosed and recognized by content users without the need of extractor deployment. Furthermore, to overcome the constraint that visible watermarking schemes are only capable of delivering human-readable messages, 2-D bar codes are integrated with UVW schemes so that machine-readable messages can be extracted with the help of simple 2-D barcode readers. For steganographic applications, we combine UVW with the visual cryptography technology to enable secure secret communication without the need to deploy any security-related module to the receiving end. An interesting setup in which secrets hidden in video can be extracted and deciphered solely by using project and implimentationors or the combination of a project and implimentationor and a television (is illustrated).
4.2 HARDWARE SPECIFICATION
Processor : Any Processor above 500 MHz.
RAM : 128Mb.
Hard Disk : 10 GB.
Compact Disk : 650 Mb.
Input device : Standard Keyboard and Mouse.
Output device : VGA and High Resolution Monitor.
4.3 SOFTWARE SPECIFICATION
Operating System : Windows 2000 server Family.
Techniques : JDK 1.5.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  WATERMARKING RELATIONAL DATABASES USING OPTIMIZATION-BASED TECHNIQUES electronics seminars 12 8,955 13-07-2016, 04:17 PM
Last Post: jaseela123
  A Novel Data Embedding Method Using Adaptive Pixel Pair Matching Report project girl 4 1,853 18-09-2014, 03:49 PM
Last Post: Radhika.m
  Developing a web application to transfer image and patient information project report maker 2 4,964 17-03-2014, 03:03 PM
Last Post: MichaelKa
  Detecting Anomalous Insiders in Collaborative Information Systems project girl 1 783 11-11-2013, 10:22 PM
Last Post: Guest
  Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks seminar projects maker 0 344 26-09-2013, 02:08 PM
Last Post: seminar projects maker
  STUDENT INFORMATION SYSTEM IN JAVA project topics 22 14,396 23-09-2013, 09:07 PM
Last Post: Guest
  CAMPUS SMS INFORMATION SYSTEM pdf seminar projects maker 0 500 20-09-2013, 01:24 PM
Last Post: seminar projects maker
  A Novel Anti Phishing framework based on Visual Cryptography Report seminar projects maker 0 570 19-09-2013, 03:18 PM
Last Post: seminar projects maker
  A Robust Image Watermarking Using Two Level DCT And Wavelet Packet Denoising PPT seminar projects maker 0 443 13-09-2013, 04:56 PM
Last Post: seminar projects maker
  Dental Biometrics: Human Identification Based On Dental Work Information pdf seminar projects maker 0 374 13-09-2013, 04:28 PM
Last Post: seminar projects maker