Documente Academic
Documente Profesional
Documente Cultură
Abstract: Digital watermarking holds significant promise as one of the keys to protecting proprietary digital content
in the coming years. It focuses on embedding information inside a digital object such that the embedded information
is in separable bound to the object. The proposed scheme has been implemented on MATLAB, as it is a high level
technical computing language and interactive environment for algorithm development, data visualization, data
analysis, and numerical computation. We wanted to know about how one can embed information in an image such
that he can later claim the ownership of that image by extracting back the embedded information. Hence, copyright
protection of images was our main motivation in starting this project. This paper includes, Implementation of
several watermarking algorithms and examines them in terms of how they meet the requirements of different
applications and general requirements of watermarking.
Keywords: MATLAB, Algorithms, Digital watermarking, Security
I. INTRODUCTION
The advent of the Internet and the wide availability
of computers and printers make digital data exchange and
transmission a simple task. However, making digital data
accessible to others through networks also creates
opportunities for malicious parties to make salable copies
of copyrighted content without permission of the content
owner.
A digital watermark is an invisible signature embedded
inside an image to show authenticity and ownership. An
effective digital watermark should be perceptually invisible
to prevent obstruction of the original image. It should be
statistically invisible to prevent detection, and it should also
be robust to many image manipulations, such as filtering,
additive noise, and compression. Digital Watermarking is
the process of embedding information into digital
multimedia content such that the information (which we
call the watermark) can later be extracted or detected for a
variety of purposes including copy prevention and control.
Digital watermarking has been proposed as a new,
alternative method to enforce the intellectual property
rights and protect digital media from tampering. It involves
Host Signal
Watermarked
Signal
Water
marker
Embedder
Detected Messege
Watermarker
Detector
Watermark Message
Fig. 3.1
Fig. 3.2
close main;
selectimage;
2.2
EMBEDDING ALGORTIHM: The watermark is
embedded separately in all color channels. A block of 8*8
is considered and frequency transformation (DCT) of each
block is done. For-loop for length of the watermark
close selectimage;
rgbgray;
global img1;
[ans,pathname]=uigetfile(...%opens folder to select
input image
{'*.jpg';'*.jpeg'...
}, ...
'Select an IMAGE');
I=[pathname ans];
img1=imread([pathname ans]);
2
img1=imresize(img1,[160 160]);
close graybw;
imshow(img1)
finfface
global img1;
clc
close finfface;
preview(vid) ;
cropimage;
pause
img=getsnapshot(vid);
camera
close cropimage;
step1;
Fig. 3.3
closepreview
delete(vid);
img1=imresize(img,[320 240]);
% size normalization
k=img1;
imshow(img1)
Step 3:- Convert image from gray scale to black and white.
function graybw_OpeningFcn(hObject, eventdata, handles,
varargin)
Fig. 3.6
global BW;
Fig. 3.7
global I;
BW=im2bw(I);
function pushbutton1_Callback(hObject,eventdata,handles)
imshow(BW)
close step1;
function pushbutton2_Callback(hObject, eventdata,
handles)
global img1;
[ans,pathname]=uigetfile( ...%opens folder to select
input image
{'*.jpg';'*.png';...
}, ...
Fig. 3.4
'Select an IMAGE');
Fig. 3.5
I=[pathname ans];
img1=imread([pathname ans]);
3
imshow(img1)
close step5;
global img1;
web http://wikisend.com/
imshow(img1)
global ext_out
ext_out='bmp';
function
pushbutton1_Callback(hObject,eventdata, handles)
close step3;
step1;
close main;
step5;
function
popupmenu1_Callback(hObject,eventdata, handles)
val = get(hObject,'Value');
str = get(hObject, 'String');
global img1;global img;global imgw;global ext_out;global I1;
ext_out='bmp';
switch str{val}
case 'TEXT'
case 'IMAGE'
watermark=I1;
[imgw]=watermark_img(img1,watermark) ;
imwrite(imgw,['watar_image' '.' ext_out],ext_out);
Fig. 4.1
Fig. 4.2
end
Step 2:- Image selection (Fig. 4.2)
function pushbutton1_Callback(hObject, eventdata, handles)
global img1;
[ans,pathname]=uigetfile( ...
{'*.bmp';...
}, ...
'Select an IMAGE');
I=[pathname ans];
img1=imread([pathname ans]);
imshow(img1
function pushbutton2_Callback(hObject, eventdata, handles)
close step1;
step3;
Step 3:- Extracting process. (Fig. 4.3)
function step3_OpeningFcn(hObject, eventdata, handles,
varargin)
Fig. 3.8
Fig. 3.9
4
global img1
axes(handles.axes1)
imshow (img1)
function
handles)
pushbutton1_Callback(hObject,
eventdata,
popupmenu1_Callback(hObject,
eventdata,
close step3;
step4;
function
handles)
Fig. 4.4
val = get(hObject,'Value');
str = get(hObject, 'String');
switch str{val};
case 'TEXT'
st=dewatermark_k(img1);
set(handles.edit1,'visible','on')
set(handles.text2,'visible','on')
set(handles.edit1,'String',st)
case 'IMAGE'
img_logo=dewatermark_img(img1);
set(handles.axes2,'visible','on')
set(handles.text3,'visible','on')
axes(handles.axes2)
imshow(img_logo)
imwrite(img_logo,'hidden.jpg')
end
Fig. 5.1
Fig. 5.2
Step 2:- selection window opens and ask for select image
source. It has two options either from folder or camera. If
we select folder then open the folder of computer to select
the image. In second option Camera we can capture
image at a time from the web camera.
Fig. 4.3
Step 4:- Dewatermarked image.
Fig. 5.7
Fig. 5.3
Fig. 5.4
Step 5:- Find face in gray scale image and after cropping
located the area for crop.
Fig. 5.8
Fig. 5.5
Step 6:- In this step window shows the finally cropped
image.
Fig. 6.1
Step 2:-Provide next window to select another image from
the folder to watermark.
Fig. 5.6
Fig. 6.2
6
VIII. REFERENCES
Step 3:- Provide next window to select another image from
the folder to watermark.
Fig. 6.3
Step 4:- final dewater marked image.
Fig. 6.4
VII. CONCLUSION
Digital watermarking holds significant promise as one of
the keys to protecting proprietary digital content in the
coming years. It focuses on embedding information inside a
digital object such that the embedded information is in
separable bound to the object. Tampering with the
watermark or otherwise altering a watermarked object
should always be detectable, and attempting to remove a
watermark from its object should cause to be that object
useless. Currently, watermarking suffers from several
drawbacks that prevent it from providing the creators of
digital content with a solid guarantee of copyright
protection.
The watermarking research is progressing very fast and
numerous researchers from various fields are focusing to
develop some workable scheme. Different companies also
working to get commercial products. We hope some
commercial and effective schemes will be available in
future.