Vous êtes sur la page 1sur 7

DIGITAL WATERMARKING

SEMINAR REPORT
Submitted by K. Yogeeta Monica : 07J41A0560

Under the Supervision of

Mr. V. Satish Kumar


Assistant Professor to the Jawaharlal Nehru Technological University Hyderabad in partial fulfillment of the requirements for the award of degree of

BACHELOR OF TECHNOLOGY
in

COMPUTER SCIENCE AND ENGINEERING

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING MALLA REDDY ENGINEERING COLLEGE(Autonomous)


Maisammaguda Dhulapally, (post Via) Hakimpet, Secunderabad - 500014

2011-2012

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING MALLA REDDY ENGINEERING COLLEGE SECUNDERABAD - 500014

BONAFIDE CERTIFICATE This is to certify that the Seminar Report titled DIGITAL WATERMARKING is a bonafide work done by K.Yogeeta Monica (07J41A0560), in partial fulfillment for the award of the degree of Bachelor of Technology in Computer Science and Engineering of the Jawaharlal Nehru Technological University and that this work has not been submitted for the award of any other degree of this institution.

Seminar Supervisor Seminar Co-ordinator Head of the Department. (Mr.V Satish Kumar) (Mr. P.V.Ramana Murthy) (Dr. B.Srinivasa Rao)

Submitted for the University Examination held on

Examiners :

5 Pen Pc Technology
Abstract:
P-ISM (Pen-style Personal Networking Gadget Package), which is nothing but the new discovery which is under developing stage by NEC Corporation. At the 2003 ITU Telecom World exhibition held in Geneva ,the Tokyo-based NEC Corporation displayed a conceptual $30,000 prototype of P-ISM. It is simply a new invention in computer and it is associated with communication field. Surely this will have a great impact on the computer field. In this device you will find Bluetooth as the main interconnecting device between different peripherals. P-ISM is a gadget package including five functions: a pen-style cellular phone with a handwriting data input function, virtual keyboard, a very small projector, camera scanner, and personal ID key with cashless pass function. P-ISMs are connected with one another through short-range wireless technology. The whole set is also connected to the Internet through the cellular phone function. This personal gadget in a minimalist pen style enables the ultimate ubiquitous computing.

Table Of Contents
Chapter No. Title ABSTRACT LIST OF FIGURES
INTRODUCTION The Digital Watermark Principles of Digital Water Marking Materials Suitable For Watermarking Structure of Digital Watermark Importance Of Digital Watermark 2 2 2 3 4

Page NO.

1 1 1.1 1.1.1 1.1.2 1.2 1.3

DIGITAL WATERMARK TYPES AND TERMS

REQUIREMENTS FOR WATERMARKING PROCESS

4 4.1 4.2

THE WATERMARKING PROCESS Invisible Watermarking Process Visible Watermarking Process

10 10 11

DISTORTIONS AND ATTACKS ON WATERMARKS

14

DIGITAL WATERMARK APPLICATIONS

15

7 7.1 7.2 7.2.1 7.3 8 8.1 8.2 8.3

VIDEO WATERMARKS Uncompressed Domain Watermarking for Video Compressed Domain Watermarking for Video Differential Energy Watermark MPEG based Watermarking Schemes CASE STUDIES Piracy Deterrence Document Security ID Authentication

17 18 19 20 21 22 22 22 23

9 10

DIGITAL WATERMARKING-FUTURE TRENDS CONCLUSION

24 25

REFERENCES

26

LIST OF FIGURES
NO.
1 2 3 4 5 6

FIGURE
Structure of Embedding a Digital Watermark onto an image Structure of Detecting a Digital Watermark from a image Insertion of Invisible Watermark onto a Image Detection of an Invisible Watermark from a Image Steps for Inserting a Visible watermark Spread Spectrum Watermark Embedding in Uncompressed domain

PAGE
3 4 10 11 12 18

Spread Spectrum Watermark Recovery in Uncompressed domain

19

Differential Energy Watermark Embedding in Compressed Domain

20

Vous aimerez peut-être aussi