2 Dec 2014

Digital Image Tracing by Sequential Multiple Watermarking



Abstract


            The possibility of adding several watermarks to the same image would enable many interesting applications such as multimedia document tracing, data usage monitoring, multiple property management. In this paper, we present a novel watermarking scheme, which allows inserting and reliably detecting multiple watermarks sequentially embedded into a digital image. The proposed method, based on elementary linear algebra, is asymmetric, secure under projection attack and robust against distortion due to basic operations such as storage, transmission, and format conversion.



Proposed system

          The proposed method, based on elementary linear algebra, is asymmetric, involving a private key for embedding and a public key for detection. Its robustness against standard image degradation operations has been extensively tested and its security under projection attack has also been proven even though the envisaged applications refer to a collaborative environment, in which malicious attacks are not a critical aspect.






Existing System

          The existing method, only done by single water marking. That will not give that much security to image. Although some researchers focused on the viability of existing watermarking approaches for the insertion of multiple signatures, the development of specific techniques can provide much more effective results. The general problem of multiple digital watermarking has been the object of several investigations since the pioneering contribution. It is suggested that the insertion of multiple watermarks can be exploited to convey multiple sets of information. More recently, a multiple watermark-embedding procedure was proposed, which allows simultaneous insertions without requiring the key sets to be orthogonal to each other. Specific applications such as the already mentioned medical image management may even require the insertion of two different types of watermark, namely, a robust one for authentication purposes, and a fragile one for data integrity control. This paradigm is often referred to as multipurpose watermarking.








Hardware Requirements
         SYSTEM             : Pentium IV 2.4 GHz
         HARD DISK        : 40 GB
         FLOPPY DRIVE  : 1.44 MB
         MONITOR           : 15 VGA colour
         MOUSE               : Logitech.
         RAM                    : 256 MB
         KEYBOARD       : 110 keys enhanced.

Software Requirements
         Operating system           :- Windows XP Professional
         Front End             :- Microsoft Visual Studio .Net 2005
         Coding Language :- Visual C# .Net

No comments:

Post a Comment

Note: only a member of this blog may post a comment.