Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Unseen Visible Watermarking: A Novel Methodology for Auxiliary Information Delivery
Post: #1

Unseen Visible Watermarking: A Novel Methodology for Auxiliary Information Delivery via Visual Contents
A novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW schemes, hidden information can be embedded covertly and then directly extracted using the human visual system as long as appropriate operations (e.g., gamma correction provided by almost all display devices or changes in viewing angles relative to LCD monitors) are performed. UVW eliminates the requirement of invisible watermarking that specific watermark extractors must be deployed to the receiving end in advance, and it can be integrated with 2-D barcodes to transmit machine-readable information that conventional visible watermarking schemes fail to deliver. We also adopt visual cryptographic techniques to guard the security of hidden information and, at the same time, increase the practical value of visual cryptography. Since UVW can be alternatively viewed as a mechanism for visualizing patterns hidden with least-significant-bit embedding, its security against statistical steganalysis is proved by empirical tests. Limitations and other potential extensions of UVW are also addressed.
Existing System
In the past decade, digital watermarking technologies have been proposed to provide robust connections between auxiliary information and multimedia. Digital watermarking schemes can be roughly classified into two approaches: invisible and visible. Invisible watermarking schemes embed messages into multimedia content in such a way that content users cannot perceptually tell the differences between unmarked and marked contents. However, in addition to their disputed vulnerability in security, invisible watermarking schemes suffer from the limitation that, in many important application scenarios, specific watermark extraction modules must be deployed to the receiving end beforehand. Consequently, taking value-added metadata as an example, users of legacy visual systems like out-of-date TV sets lacking updating capabilities will never enjoy the benefits facilitated by invisible watermarks. Visible watermarking approaches on the other hand, eliminate the trouble of extraction module deployment. However, the applicability of this class of watermarking techniques is seriously constrained due to the inevitable quality degradation caused by the unobtrusive but visible watermark patterns. Moreover, only human-readable information can be conveyed by existing visible watermarking schemes, since automatically distinguishing faint watermark patterns from marked visual contents would be a very difficult task.
Proposed System
We propose a novel class of watermarking schemes, called unseen visible watermarking (UVW), to deliver auxiliary information via visual content. Visual content marked with UVW schemes share the same perceptual quality as those marked with simple invisible watermarking schemes. But when adequate operations, like image enhancement operations
(provided by common display devices) are performed, information hidden in the marked content will be disclosed and recognized by content users without the need of extractor deployment. Furthermore, to overcome the constraint that visible watermarking schemes are only capable of delivering human-readable messages, 2-D bar codes are integrated with UVW schemes so that machine-readable messages can be extracted with the help of simple 2-D barcode readers. For steganographic applications, we combine UVW with the visual cryptography technology to enable secure secret communication without the need to deploy any security-related module to the receiving end. An interesting setup in which secrets hidden in video can be extracted and deciphered solely by using projectors or the combination of a projector and a television (is illustrated).
Processor : Any Processor above 500 MHz.
RAM : 128Mb.
Hard Disk : 10 GB.
Compact Disk : 650 Mb.
Input device : Standard Keyboard and Mouse.
Output device : VGA and High Resolution Monitor.
Operating System : Windows 2000 server Family.
Techniques : JDK 1.5.

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: literature review in research methodology, methodology of online examination, methodology of brickbats coba, research methodology project report sample, methodology of automatic bumber, auxiliary power unit of aircraft ppt, auxiliary emission control device,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  watermarking algorithm seminar class 3 1,827 27-04-2016 11:17 AM
Last Post: dhanyavp
  STUDENT INFORMATION SYSTEM IN JAVA project topics 14 9,006 19-08-2015 11:28 PM
Last Post: Guest
  INTELLECTUAL INFORMATION SYSTEM USING GPS+GSM smart paper boy 3 1,187 10-04-2015 09:52 AM
Last Post: seminar report asees
  Blood Bank Management System Using Unified Process Methodology seminar class 3 8,437 24-02-2015 01:49 PM
Last Post: Guest
  ENQUIRY INFORMATION ON INSTITUTE full report seminar topics 1 1,357 10-11-2014 09:15 PM
Last Post: Guest
  WEB PORTAL FOR STUDENT INFORMATION SYSTEM OF E.C.A smart paper boy 2 2,126 29-03-2014 11:49 PM
Last Post: Guest
  Developing a web application to transfer image and patient information project report maker 2 2,648 21-03-2014 01:44 AM
Last Post: MichaelPn
  A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video electronics seminars 4 2,051 23-03-2013 07:40 PM
Last Post: [email protected]
  Digital Video Watermarking ( Project ) saeedah 6 4,030 18-03-2013 04:06 PM
Last Post: computer topic
  HUMAN RESOURCE INFORMATION SYSTEMS electronics seminars 1 1,539 29-11-2012 01:51 PM
Last Post: seminar details