SlideShare a Scribd company logo
1 of 11
Under the Guidance
of
Mrs. A. Krishna Kumari
By
MD Arif Ahmed
M.Tech, ECE
12H66D7007
Date of Approval of PRC : 20/03/2014
Base Paper: Optimization of Size of Pixel
Blocks for orthogonal Transform in Optical
Watermarking Technique
Reference Papers
 Journal of Electronic Imaging by Komori and Uehira:
Optical watermarking technology for protecting portrait
rights
 Y. Ishikawa, K. Uehira, and K. Yanaka, “Optical
watermarking technique robust to geometrical distortion in
image,” in Proc. ISSPIT2010, 2010, pp. 67–72.
 O. Matoba et al., “Optical techniques for information
security,” Proc. IEEE 97(6), 1128–1148 (2009).
 International Journal of Advanced Computer and
Mathematical Sciences ISSN 2230-9624. Vol 3, Issue 1,
2012, pp 194-204
OPTICAL WATERMARKING
 OW is also similar to DW, but the
difference is we use here light to embed the
data on the real image like famous
paintings, ancient monuments etc.
Operation/Transform Techniques
 Watermarked image is selected and its area
is divided into N*N Pixel Blocks
(4*4,8*8,16*16), Then Applying Inverse
Transform Techniques (DCT,WHT,HDWT)
 Now varying the DC values, Comparing the
extracting the embedded information
Problems in existing system
 DCT - Not robust against geometric attacks
 And
 Using Wavelet Transforms we have 4
issues
 Problem 1: Shift Variance
 Problem 2: Oscillations
 Problem 3: Aliasing
 Problem 4: Lack of Directionality
Proposed System
 With the problems by using Wavelet
transforms we go further with Complex
wavelet Transforms which can overcome
the above 4 issues
 We apply the Dual Tree Complex Wavelet
Transform to the optical watermarking
Technique and Comparing the result with
the other Transforms.
Extract
Watermarking
Painting/
Human Face
Project
Watermark
Pattern
Inverse
transform
Calculate
Accuracy
Ratio
Painting taken
with camera
Watermarked
Images
Vary for diff HC
Values
Start
Watermarked Image
4*4,8*8
16*16
Size
Apply Inverse
WHT
Extract the
watermark for
Diff HC Values
Compare
the
Accuracy
Extract the
watermark for
different HC
Values
Extract the
watermark for
Different HC
Values
Apply Inverse
DCT
Apply Dual
Tree Complex
Divide image into N*N
Pixel Blocks
Flow Chart:
Conclusion
 The Optical watermarking provides better
security than DW, to protect real images
like famous paintings, humans(celebrity),
famous sculptures etc and comparing with
the previous techniques
Review ppt2

More Related Content

What's hot

Region wise processing of an image using multithreading in multi core environ
Region wise processing of an image using multithreading in multi core environRegion wise processing of an image using multithreading in multi core environ
Region wise processing of an image using multithreading in multi core environ
IAEME Publication
 

What's hot (17)

Compressed sensing techniques for sensor data using unsupervised learning
Compressed sensing techniques for sensor data using unsupervised learningCompressed sensing techniques for sensor data using unsupervised learning
Compressed sensing techniques for sensor data using unsupervised learning
 
Image processing
Image processingImage processing
Image processing
 
Analog signal processing approach for coarse and fine depth estimation
Analog signal processing approach for coarse and fine depth estimationAnalog signal processing approach for coarse and fine depth estimation
Analog signal processing approach for coarse and fine depth estimation
 
3D visualisation of medical images
3D visualisation of medical images3D visualisation of medical images
3D visualisation of medical images
 
image processing
image processingimage processing
image processing
 
Quality assessment for online iris
Quality assessment for online irisQuality assessment for online iris
Quality assessment for online iris
 
Image Processing
Image ProcessingImage Processing
Image Processing
 
Kt3618371840
Kt3618371840Kt3618371840
Kt3618371840
 
Estimation of 3d Visualization for Medical Machinary Images
Estimation of 3d Visualization for Medical Machinary ImagesEstimation of 3d Visualization for Medical Machinary Images
Estimation of 3d Visualization for Medical Machinary Images
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
 
538 207-219
538 207-219538 207-219
538 207-219
 
IRJET- 3D Object Recognition of Car Image Detection
IRJET-  	  3D Object Recognition of Car Image DetectionIRJET-  	  3D Object Recognition of Car Image Detection
IRJET- 3D Object Recognition of Car Image Detection
 
Medical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet TransformMedical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet Transform
 
Region wise processing of an image using multithreading in multi core environ
Region wise processing of an image using multithreading in multi core environRegion wise processing of an image using multithreading in multi core environ
Region wise processing of an image using multithreading in multi core environ
 
Medical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transformMedical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transform
 
Medical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transformMedical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transform
 
Development of 3D convolutional neural network to recognize human activities ...
Development of 3D convolutional neural network to recognize human activities ...Development of 3D convolutional neural network to recognize human activities ...
Development of 3D convolutional neural network to recognize human activities ...
 

Viewers also liked

Space elevator 20091118
Space elevator 20091118Space elevator 20091118
Space elevator 20091118
kluniversity
 
Space Elevator Module
Space Elevator ModuleSpace Elevator Module
Space Elevator Module
AccessNano
 
Space Elevator
Space ElevatorSpace Elevator
Space Elevator
Amit Sah
 

Viewers also liked (6)

the space elevator
the space elevatorthe space elevator
the space elevator
 
Space elevator
Space elevator Space elevator
Space elevator
 
Space elevator 20091118
Space elevator 20091118Space elevator 20091118
Space elevator 20091118
 
Space Elevator Module
Space Elevator ModuleSpace Elevator Module
Space Elevator Module
 
Space Elevator
Space ElevatorSpace Elevator
Space Elevator
 
BASIC STUDY ABOUT SPACE ELEVATOR
BASIC STUDY ABOUT SPACE ELEVATOR BASIC STUDY ABOUT SPACE ELEVATOR
BASIC STUDY ABOUT SPACE ELEVATOR
 

Similar to Review ppt2

Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &
Iaetsd Iaetsd
 
A130104
A130104A130104
A130104
irjes
 
A130104
A130104A130104
A130104
irjes
 
Image compression and reconstruction using improved Stockwell transform for q...
Image compression and reconstruction using improved Stockwell transform for q...Image compression and reconstruction using improved Stockwell transform for q...
Image compression and reconstruction using improved Stockwell transform for q...
IJECEIAES
 

Similar to Review ppt2 (20)

Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &Iaetsd literature review on generic lossless visible watermarking &
Iaetsd literature review on generic lossless visible watermarking &
 
Near Reversible Data Hiding Scheme for images using DCT
Near Reversible Data Hiding Scheme for images using DCTNear Reversible Data Hiding Scheme for images using DCT
Near Reversible Data Hiding Scheme for images using DCT
 
A130104
A130104A130104
A130104
 
A130104
A130104A130104
A130104
 
Image compression and reconstruction using improved Stockwell transform for q...
Image compression and reconstruction using improved Stockwell transform for q...Image compression and reconstruction using improved Stockwell transform for q...
Image compression and reconstruction using improved Stockwell transform for q...
 
G0523444
G0523444G0523444
G0523444
 
Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...Blind image watermarking scheme based on lowest energy contourlet transform c...
Blind image watermarking scheme based on lowest energy contourlet transform c...
 
E1083237
E1083237E1083237
E1083237
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption
 
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
 
1918 1923
1918 19231918 1923
1918 1923
 
1918 1923
1918 19231918 1923
1918 1923
 
Ceis 5
Ceis 5Ceis 5
Ceis 5
 
K42016368
K42016368K42016368
K42016368
 
Et31962968
Et31962968Et31962968
Et31962968
 
CT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingCT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image Watermarking
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDWatermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
 
Design and implementation of image compression using set partitioning in hier...
Design and implementation of image compression using set partitioning in hier...Design and implementation of image compression using set partitioning in hier...
Design and implementation of image compression using set partitioning in hier...
 

Recently uploaded

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 

Review ppt2

  • 1. Under the Guidance of Mrs. A. Krishna Kumari By MD Arif Ahmed M.Tech, ECE 12H66D7007 Date of Approval of PRC : 20/03/2014
  • 2. Base Paper: Optimization of Size of Pixel Blocks for orthogonal Transform in Optical Watermarking Technique Reference Papers  Journal of Electronic Imaging by Komori and Uehira: Optical watermarking technology for protecting portrait rights  Y. Ishikawa, K. Uehira, and K. Yanaka, “Optical watermarking technique robust to geometrical distortion in image,” in Proc. ISSPIT2010, 2010, pp. 67–72.  O. Matoba et al., “Optical techniques for information security,” Proc. IEEE 97(6), 1128–1148 (2009).  International Journal of Advanced Computer and Mathematical Sciences ISSN 2230-9624. Vol 3, Issue 1, 2012, pp 194-204
  • 3.
  • 4. OPTICAL WATERMARKING  OW is also similar to DW, but the difference is we use here light to embed the data on the real image like famous paintings, ancient monuments etc.
  • 5. Operation/Transform Techniques  Watermarked image is selected and its area is divided into N*N Pixel Blocks (4*4,8*8,16*16), Then Applying Inverse Transform Techniques (DCT,WHT,HDWT)  Now varying the DC values, Comparing the extracting the embedded information
  • 6. Problems in existing system  DCT - Not robust against geometric attacks  And  Using Wavelet Transforms we have 4 issues  Problem 1: Shift Variance  Problem 2: Oscillations  Problem 3: Aliasing  Problem 4: Lack of Directionality
  • 7. Proposed System  With the problems by using Wavelet transforms we go further with Complex wavelet Transforms which can overcome the above 4 issues  We apply the Dual Tree Complex Wavelet Transform to the optical watermarking Technique and Comparing the result with the other Transforms.
  • 9. Start Watermarked Image 4*4,8*8 16*16 Size Apply Inverse WHT Extract the watermark for Diff HC Values Compare the Accuracy Extract the watermark for different HC Values Extract the watermark for Different HC Values Apply Inverse DCT Apply Dual Tree Complex Divide image into N*N Pixel Blocks Flow Chart:
  • 10. Conclusion  The Optical watermarking provides better security than DW, to protect real images like famous paintings, humans(celebrity), famous sculptures etc and comparing with the previous techniques