Minor Project Synopsis of Digital Watermarking Using DCT and Genetic Algorithm
Minor Project Synopsis of Digital Watermarking Using DCT and Genetic Algorithm
On
B.TECH
IN
INFORMATION TECHNOLOGY
Submitted By:
Mohit Kukreja(60196303115)
Arun Kumar (60296303115)
Vipul Kumar
(60396303115)
August-November 2018
MAHARAJA SURAJMAL INSTITUTE OF TECHNOLOGY
C-4, Janak Puri, New Delhi-110058
Digital Watermarking Using DCT
INTRODUCTION
APPLICATIONS
Digital Watermarking can be used for a wide range of applications such as:
● Copyright protection
● Source Tracking (Different recipients get differently watermarked content)
● Broadcast Monitoring (Television news often contains watermarked video from
international agencies)
● Covert Communication
Literature Survey
[1] Maheshwari et al. 2015 provide Digital Image Watermarking based on DCT based
pyramid transform with malicious JPEG compression attack. Signal to Noise Ratio (SNR) is
computed to measure image quality for a proposed technique for better results as compared to
previous techniques of information hiding.
[2] Mathur and Mathuria 2017 provided a complete study on LSB and DCT. In this research
paper, they compared both LSB and DCT to find the best digital watermarking technique to
highly secure digital image form the illegal copies. They also analyzed the possibilities of
dual watermarking.
[3] Parah et al. 2016 proposed a robust blind watermarking technique, based on block-based
DCT coefficient modification. The difference between two DCT coefficients of the adjacent
blocks at the same position is calculated. Depending upon the watermark bit to be embedded.
He also examined the robustness of the proposed scheme for various singular and hybrid
attacks.
[4] Bansal et al. 2015 provide results of watermarking done by using LSB technique, DCT
transform and DWT transform and are compared on the basis of peak signal to noise ratio
(PSNR) and normalized correlation (NC).
[5] Li et al. 2017 provide a new method that simplifies the previous DCT-based methods
while more robust to common attacks than conventional methods. M*N block is used in this
algorithm rather than conventional 8*8 block technique. It is showed that it is robust to kinds
of common piracy attacks. Also, extraction of a watermark can be done just by subtracting
the watermarked image with the original image to get the watermark.
[6] Abraham and Paul 2014 proposed algorithm that ensures a higher visual quality after
watermark addition by enforcing watermark only in safer portions. Blocks or pixel regions
selected for watermark hiding are such regions in the image where modifications are least
noticeable by human eyes by using DCT.
Watermarking was proposed to resolve illegal duplication of images without the consent of
owner so that a watermark is hidden in the image as a token of ownership. But the intelligent
attacker performed various attacks on the image to destroy the watermark without harming
the image much. For eg, by changing the height and width of the image can destroy
watermark. By this, digital media can be copied, redistributed, and manipulated.
A very unsolvable problem is still there is no appropriate method for image security to
identify ownership with the image sharing tool over the internet. The digital image
watermarking is still appreciable and demandable techniques. There is a need for a robust
algorithm which resists various attacks like JPEG Compression, Addition of Noise and
Cropping attack.
Objective
Proposed Solution
● Use of M*N block technique in DCT to embed a digital watermark in a given image
to withstand attacks
● Use of DCT technique in such regions which are least visible to human eyes which
will help in maintaining the quality of the image.
● Create an efficient watermarking embedding and extraction algorithm using DCT
transform
Hardware Requirements
Software Requirements
● Sublime Text
● Required libraries
● MATLAB
Time plan
Timeline Action
1st Aug – 15th Aug Exclusive and extensive study of related paper.
[3] S. A. Parah, J. A. Sheikh, N. A. Loan, and G. M. Bhat, “Robust and blind watermarking
technique in DCT domain using inter-block coefficient differencing,” Digit. Signal
Process., vol. 53, pp. 11–24, Jun. 2016.
[4] N. Bansal, V. K. Deolia, A. Bansal, and P. Pathak, “Comparative analysis of LSB, DCT
and DWT for Digital Watermarking,” in 2015 2nd International Conference on
Computing for Sustainable Global Development (INDIACom), 2015, pp. 40–45.
[5] J. Abraham and V. Paul, “Image watermarking using DCT in selected pixel regions,” in
2014 International Conference on Control, Instrumentation, Communication and
Computational Technologies (ICCICCT), 2014, pp. 398–402.
[6] X. Li, X. Wang, A. Chen, and L. Xiao, “A Simplified and Robust DCT-based
Watermarking Algorithm,” in 2017 2nd International Conference on Multimedia and
Image Processing (ICMIP), 2017, pp. 167–171.