Unseen Visible Watermarking: A Novel Methodology for Auxiliary Information Delivery
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar topics
Active In SP

Posts: 559
Joined: Mar 2010
22-03-2010, 11:29 PM

Unseen Visible Watermarking: A Novel Methodology for Auxiliary Information Delivery via Visual Contents
A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW schemes, hidden information can be embedded covertly and then directly extracted using the human visual system as long as appropriate operations (e.g., gamma correction provided by almost all display devices or changes in viewing angles relative to LCD monitors) are performed. UVW eliminates the requirement of invisible watermarking that specific watermark extractors must be deployed to the receiving end in advance, and it can be integrated with 2-D barcodes to transmit machine-readable information that conventional visible watermarking schemes fail to deliver. We also adopt visual cryptographic techniques to guard the security of hidden information and, at the same time, increase the practical value of visual cryptography. Since UVW can be alternatively viewed as a mechanism for visualizing patterns hidden with least-significant-bit embedding, its security against statistical steganalysis is proved by empirical tests. Limitations and other potential extensions of UVW are also addressed.
Existing System
In the past decade, digital watermarking technologies have been proposed to provide robust connections between auxiliary information and multimedia. Digital watermarking schemes can be roughly classified into two approaches: invisible and visible. Invisible watermarking schemes embed messages into multimedia content in such a way that content users cannot perceptually tell the differences between unmarked and marked contents. However, in addition to their disputed vulnerability in security, invisible watermarking schemes suffer from the limitation that, in many important application scenarios, specific watermark extraction modules must be deployed to the receiving end beforehand. Consequently, taking value-added metadata as an example, users of legacy visual systems like out-of-date TV sets lacking updating capabilities will never enjoy the benefits facilitated by invisible watermarks. Visible watermarking approaches on the other hand, eliminate the trouble of extraction module deployment. However, the applicability of this class of watermarking techniques is seriously constrained due to the inevitable quality degradation caused by the unobtrusive but visible watermark patterns. Moreover, only human-readable information can be conveyed by existing visible watermarking schemes, since automatically distinguishing faint watermark patterns from marked visual contents would be a very difficult task.
Proposed System
We propose a novel class of watermarking schemes, called unseen visible watermarking (UVW), to deliver auxiliary information via visual content. Visual content marked with UVW schemes share the same perceptual quality as those marked with simple invisible watermarking schemes. But when adequate operations, like image enhancement operations
(provided by common display devices) are performed, information hidden in the marked content will be disclosed and recognized by content users without the need of extractor deployment. Furthermore, to overcome the constraint that visible watermarking schemes are only capable of delivering human-readable messages, 2-D bar codes are integrated with UVW schemes so that machine-readable messages can be extracted with the help of simple 2-D barcode readers. For steganographic applications, we combine UVW with the visual cryptography technology to enable secure secret communication without the need to deploy any security-related module to the receiving end. An interesting setup in which secrets hidden in video can be extracted and deciphered solely by using project and implimentationors or the combination of a project and implimentationor and a television (is illustrated).
Processor : Any Processor above 500 MHz.
RAM : 128Mb.
Hard Disk : 10 GB.
Compact Disk : 650 Mb.
Input device : Standard Keyboard and Mouse.
Output device : VGA and High Resolution Monitor.
Operating System : Windows 2000 server Family.
Techniques : JDK 1.5.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: unseen visible watermarking, unseen visible watermarking project, existing system proposed system watermarking, unseen visible watermarking pdf, how to do project in unseen visible watermarking, ppts on invisible watermarking, existing system of visible watermarking and compare,
Popular Searches: ship s auxiliary machineries, computer conversion methodology, auxiliary warning system ppt, project physics methodology, what is the methodology of a drawing table, coding for implementation of a visible watermarking in a secure still digital camera using vlsi design in matlab, generic lossless visible watermarking a new approach,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Last Post: jaseela123
  A Novel Data Embedding Method Using Adaptive Pixel Pair Matching Report project girl 4 1,842 18-09-2014, 03:49 PM
Last Post: Radhika.m
  Developing a web application to transfer image and patient information project report maker 2 4,938 17-03-2014, 03:03 PM
Last Post: MichaelKa
  Detecting Anomalous Insiders in Collaborative Information Systems project girl 1 777 11-11-2013, 10:22 PM
Last Post: Guest
  Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks seminar projects maker 0 338 26-09-2013, 02:08 PM
Last Post: seminar projects maker
  STUDENT INFORMATION SYSTEM IN JAVA project topics 22 14,384 23-09-2013, 09:07 PM
Last Post: Guest
  CAMPUS SMS INFORMATION SYSTEM pdf seminar projects maker 0 492 20-09-2013, 01:24 PM
Last Post: seminar projects maker
  A Novel Anti Phishing framework based on Visual Cryptography Report seminar projects maker 0 566 19-09-2013, 03:18 PM
Last Post: seminar projects maker
  A Robust Image Watermarking Using Two Level DCT And Wavelet Packet Denoising PPT seminar projects maker 0 435 13-09-2013, 04:56 PM
Last Post: seminar projects maker
  Dental Biometrics: Human Identification Based On Dental Work Information pdf seminar projects maker 0 369 13-09-2013, 04:28 PM
Last Post: seminar projects maker