Digital water Marking seminar Topic is for computer science final year students.The main idea of digital water marking is to save data on web. This topic will explain in detail about how this concept can be implemented as a project.
All watermarking methods share the same building blocks : an embedding system and the watermark extraction or recovery system. Any generic embedding system should have as inputs: cove (data/image)/hiding medium (I), watermark symbol, (w)(image/text/number) and a key (k) to enforce security. The output of the embedding process is always the watermarked data/image.
The generic watermark recovery process needs the watermarked data, the secret key or public key and depending on the method, the original data and /or the original watermark as inputs while the output is the recovered watermark W with some kind of confidence measure for the given watermark symbol or an indication about the presence of watermark in the cover document under inspection. Depending on the combination of inputs and outputs three types namely private, semi private public watermarking system can be defined .Private watermarking (also called non blind watermarking) requires at least the cover image and/or watermark symbol and key (if used in embedding) for the recovery of the hidden information.Public watermarking (Blind or oblivious watermarking) system requires neither the cover image nor the embedded watermark symbol but only the secret key/image during the detection of the hidden information.
Proposed technique describes robust and blind digital image watermarking in spatial domain, which is computationally efficient. Embedded watermark is meaningful and recognizable rather than a sequence of real numbers that are normally distributed or a Pseudo-Noise sequence. Proposed technique has been tested over large number of benchmark images as suggested by watermarking community and the results of robustness to different signal processing operations are found to be satisfactory.
Currently investigation is being carried out to insert the same watermark symbol in other region of the cover image also to make the present scheme more resilient to other types of external attacks. Further research works should be carried out in spatial domain watermarking to exploit other higher order factors such as size, shape, color, location and foreground/background of the cover image to generate watermarked image with less visible impairments along with robustness against other types of external attacks such as the image flip and image rotation.
download Seminar Report and paper presentaion on Digital Water Marking .
Latest posts by Ramesh Gavva/Kasarla shanthan (see all)
- Electricity Bill Management System Project in Java - August 28, 2014
- Electricity Billing System Project in Java - August 28, 2014
- Jewellery Management System Project in Asp.Net - August 28, 2014