Comparative Evaluation of Semifragile Watermarking Algorithms
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
electronics seminars
Active In SP

Posts: 694
Joined: Nov 2009
22-12-2009, 03:02 PM

.pdf   Comparative Evaluation of Semifragile Watermarking Algorithms.pdf (Size: 239.17 KB / Downloads: 79)
.ppt   Comparative Evaluation of Semifragile Watermarking Algorithms.ppt (Size: 900.5 KB / Downloads: 94)
Semifragile watermarking techniques aim to prevent tampering and fraudulent use of modified images. A semifragile watermark monitors the integrity of the content of the image but not its numerical representation. Therefore, the watermark is designed so that the integrity is proven if the content of the image has not been tampered with, despite some mild processing on the image. However, if parts of the image are replaced with the wrong key or are heavily processed, the watermark information should indicate evidence of forgery. We compare the performance of eight semifragile watermarking algorithms in terms of their miss probability under forgery attack, and in terms of false alarm probability under no malicious signal processing operations that preserve the content and quality of the image. We propose desiderata for semifragile watermarking algorithms and indicate the promising algorithms among existing ones

One prominent application of watermarking technology is the monitoring of the integrity of the multimedia documents. The specific interest in semi fragile watermarking algorithms arises from the multitude of practical and commercial applications, where content needs to be strictly protected, but the exact representation during exchange and storage need not be guaranteed. The alterations on the documents can occur unintentionally or can be implanted intentionally. The so-called unintentional or innocent alterations typically arise from such diverse facts as bit errors during transmission and storage, or signal processing operations such as altering contrast enhancement, sharpening, and compression. Intentional or malicious alterations, on the other hand, are assumed to be due to an explicit forgery attempt by a pirate with the explicit purpose of changing the contents of a document. The main distinction then, is whether the content is altered as in malicious and intentional attacks or whether only the representation, but not the content, of the document is altered, as occurs in unintentional, no malicious cases. The line of demarcation between these two attacks categories is, however, not al- ways clear-cut, as it depends very much on the application domain. A case in point is histogram equalization, where, if the representation of the lighting condition is considered informative, it then becomes a malicious manipulation; alternately, it remains simply a well-intentioned contrast enhancement.

Prominent application of watermarking technology is monitoring of the integrity of multimedia documents, Semifragile watermark monitors the integrity of the content of the image but not its numerical representation
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: semi fragal watermarking,
Popular Searches: comparative project class 12, digital watermarking algorithms and applications, comparative, watermarking algorithms, survey image watermarking algorithms 2011, a comparative study of digital watermarking technology techniques and applications ppt, watermarking coppermine,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Computerized Paper Evaluation using Neural Network computer science crazy 11 8,900 03-02-2014, 03:21 PM
Last Post: Guest
  Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Net seminar projects maker 0 393 30-09-2013, 04:22 PM
Last Post: seminar projects maker
  ALGORITHMS IN NETWORKS seminar projects maker 0 412 25-09-2013, 04:28 PM
Last Post: seminar projects maker
  Fast algorithms for solving H∞-norm minimization problems pdf seminar projects maker 0 302 23-09-2013, 04:31 PM
Last Post: seminar projects maker
  IMAGE ADAPTIVE & FRAGILE WATERMARKING ppt seminar projects maker 0 414 14-09-2013, 12:44 PM
Last Post: seminar projects maker
  ALGORITHMS FOR ROUTING LOOKUPS AND PACKET CLASSIFICATION pdf seminar projects maker 0 342 11-09-2013, 12:23 PM
Last Post: seminar projects maker
  Basic Algorithms pdf study tips 0 386 10-09-2013, 04:20 PM
Last Post: study tips
  The clinical evaluation of vein contrast enhancement study tips 0 231 20-08-2013, 04:28 PM
Last Post: study tips
  Radiation optimization and image processing algorithms in the identi- fication study tips 0 281 20-08-2013, 04:28 PM
Last Post: study tips
  ppt on Genetic Algorithms project girl 2 644 17-08-2013, 03:03 PM
Last Post: study tips