You are on page 1of 26

TRANSMISSION OF HOMOMORPHIC IMAGE

WATERMARKING WITH SVD ALGORITHM THROUGH


THE CHANNEL

OUR TEAM

Bashair

Wafa

Maryam

Amnh

Mashael

OUTLINE
Introduction
Problem Statement & Significance
Proposed Solution (System)
Project Domain & Limitations
Background Information & Related
Work
Background Information
Related Work Survey
Proposed & Similar Systems
Comparison

OUTLINE
System Analysis
Requirements specification
Requirements Analysis
Functional Requirements
Nonfunctional Requirements
System Design
System Architecture
System Flow Chart
User Interface Design

OUTLINE
Implementation
Implementation requirements
I/O screens
Testing
Test Plan
Test Cases
Test Result
Conclusion
Evaluation
Future work

PROBLEM STATEMENT &


SIGNIFICANCE:
- One of the biggest problems is when they send an
image on the channel it receive for the recipient with
noise or some attack happen and sometime with
cropping. So, that makes the image fragile.
- We studied the multiple ways of embedding
watermark on the image, but mostly have been
ineffective and do not achieve a high level of security.

PROPOSED SOLUTION
(SYSTEM):
- The basic idea of the proposed method is based on
embedding the watermark with the SVD method in
the reflectance component after the homomorphic
transform.
- Watermarks embedded in this component will
survive most of the attacks. We present modifications
to the proposed method with an SVD block based
method.

PROJECT DOMAIN &


LIMITATIONS:
- Our project can help people in different ages and
everywhere, but here we specified Governmental
bodies, companies and Authors to achieve copyright
protection, authentication, and data hiding and to
increase the level of security.
- We use watermarking technology, it means
embedding a piece of information into a cover signal
or image in such a way that it is imperceptible to a
human observer.

BACKGROUND
INFORMATION:
- Watermarking technique consists of an embedding
algorithm and a detection algorithm.
- The watermarking system must satisfy several
requirements which include, Robustness and
fidelity .
- Homomorphic image watermarking is
invisibility of the watermark .

a type of

RELATED WORK SURVEY

Frequency (transform)

Domain:
- Discrete Cosine
Transforms.
- Discrete Wavelet
Transform.
- Singular Value
Decomposition.

Spatial Domain:
- Least Significant Bit
.

PROPOSED & SIMILAR


SYSTEMS COMPARISON:
Comparison between Homomorphic image
watermarking with SVD, LSB , DCT and DWT :
Problem solved
Domain
Users
Design methods
Software & hardware
Output/Watermarked Image
Features
Limitations

REQUIREMENTS
SPECIFICATION:
Questionnaires.

REQUIREMENTS
ANALYSIS:
Software and
hardware
Requirements

Software:
MATLAB.
Hardware:
Laptop.

Functional
Requirements

cover image.
watermark
image .
Use SVD as key.
Share key .
Extract the
watermark
image from the
watermarked
image.

Nonfunctional
Requirements

Performance.
Reliability.
Security.
Acceptability.

SYSTEM DESIGN :
System Architecture :

SYSTEM DESIGN :

USER INTERFACE DESIGN

IMPLEMENTATION
REQUIREMENTS :
- There are hardware and software required for designing
and programming.

I/O SCREENS :

TEST PLAN & TEST


STRATEGY:
TEST PLAN:
Any system must be free of errors and bugs and must be
operated effectively and with high quality.
Test Items.
Features to be tested.
TEST STRATEGY:
Unit Testing.
System Testing.

TEST CASES

TEST RESULT :
- SVD watermarking in the homomorphic domain for
the whole image and on a block-by-block basis.
- It is clear that there is no visual difference between
the original image and the watermarked image,
ensuring the fidelity , robustness and strong security
system with less vulnerable to attacks and an errorfree.

CONCLUSION:
- Our project presented a homomorphic image watermarking
method using the SVD algorithm. By embedding a watermark with
the SVD algorithm to the reflectance component of an image.
- Simulation results have shown that the block-by-block SVD
watermarking in the homomorphic domain has high fidelity,
robustness, and detectability under attacks.
- We have come to the conclusion that permutation-based
algorithms can be used efficiently for this purpose to increase the
level of security.

EVALUATION :
- what Homomorphic image watermarking with SVD
algorithm has accomplished :
Features
Embeddingwatermark
Extractingwatermark
Differentimage formats ( jpg ,
png , tiff )
Differentimage types (color ,
gray )
Affected by attack

Accomplishe Unaccomplis
d

hed

FUTURE WORK:
In the future we have a lot of ideas to develop our
project by creating mobile applications for IOS and
Android system supported multiple languages and we
expand to other types of watermarks.

ANY QUESTIONS

THE END

Thank you

You might also like