Professional Documents
Culture Documents
OUR TEAM
Bashair
Wafa
Maryam
Amnh
Mashael
OUTLINE
Introduction
Problem Statement & Significance
Proposed Solution (System)
Project Domain & Limitations
Background Information & Related
Work
Background Information
Related Work Survey
Proposed & Similar Systems
Comparison
OUTLINE
System Analysis
Requirements specification
Requirements Analysis
Functional Requirements
Nonfunctional Requirements
System Design
System Architecture
System Flow Chart
User Interface Design
OUTLINE
Implementation
Implementation requirements
I/O screens
Testing
Test Plan
Test Cases
Test Result
Conclusion
Evaluation
Future work
PROPOSED SOLUTION
(SYSTEM):
- The basic idea of the proposed method is based on
embedding the watermark with the SVD method in
the reflectance component after the homomorphic
transform.
- Watermarks embedded in this component will
survive most of the attacks. We present modifications
to the proposed method with an SVD block based
method.
BACKGROUND
INFORMATION:
- Watermarking technique consists of an embedding
algorithm and a detection algorithm.
- The watermarking system must satisfy several
requirements which include, Robustness and
fidelity .
- Homomorphic image watermarking is
invisibility of the watermark .
a type of
Frequency (transform)
Domain:
- Discrete Cosine
Transforms.
- Discrete Wavelet
Transform.
- Singular Value
Decomposition.
Spatial Domain:
- Least Significant Bit
.
REQUIREMENTS
SPECIFICATION:
Questionnaires.
REQUIREMENTS
ANALYSIS:
Software and
hardware
Requirements
Software:
MATLAB.
Hardware:
Laptop.
Functional
Requirements
cover image.
watermark
image .
Use SVD as key.
Share key .
Extract the
watermark
image from the
watermarked
image.
Nonfunctional
Requirements
Performance.
Reliability.
Security.
Acceptability.
SYSTEM DESIGN :
System Architecture :
SYSTEM DESIGN :
IMPLEMENTATION
REQUIREMENTS :
- There are hardware and software required for designing
and programming.
I/O SCREENS :
TEST CASES
TEST RESULT :
- SVD watermarking in the homomorphic domain for
the whole image and on a block-by-block basis.
- It is clear that there is no visual difference between
the original image and the watermarked image,
ensuring the fidelity , robustness and strong security
system with less vulnerable to attacks and an errorfree.
CONCLUSION:
- Our project presented a homomorphic image watermarking
method using the SVD algorithm. By embedding a watermark with
the SVD algorithm to the reflectance component of an image.
- Simulation results have shown that the block-by-block SVD
watermarking in the homomorphic domain has high fidelity,
robustness, and detectability under attacks.
- We have come to the conclusion that permutation-based
algorithms can be used efficiently for this purpose to increase the
level of security.
EVALUATION :
- what Homomorphic image watermarking with SVD
algorithm has accomplished :
Features
Embeddingwatermark
Extractingwatermark
Differentimage formats ( jpg ,
png , tiff )
Differentimage types (color ,
gray )
Affected by attack
Accomplishe Unaccomplis
d
hed
FUTURE WORK:
In the future we have a lot of ideas to develop our
project by creating mobile applications for IOS and
Android system supported multiple languages and we
expand to other types of watermarks.
ANY QUESTIONS
THE END
Thank you