Chat with Expert
Cover image
project image

A Robust Fractal Code and LSB Based Image Image Watermarking

Free



Mtech Thesis Provider

9907385555

128 apsara aparment near Treasure Island Mall Indore

Verified
View : 2265      Download : 399

Project Video

Project Discription

02-July-2018

Abstract As the internet users are increasing day by day, so privacy of their data is highly required for different kind of information. One of important digital data is image as it required that proprietor is maintain. Watermarking is done at edge and non edge region of the image using LSB technique. Here in order to increase the robustness of the work fractal codes are send in the network which will regenerate effected packets from the received files. So this invisible watermarking has not decrease the quality of the image. Experiment are done under different type of attack under which results are appreciable. Conclusion In this paper a new approach of privacy is done where watermark data is based on LSB on edge and flat regions. Based on human view, edges are not identifiable so it make a invisible watermarking technique base on hash-canny combination at LSB and fractal codes part. Here in order to increase the robustness of the work fractal codes are send in the network which will regenerate effected packets from the received files. Results shows that the proposed work is producing the results which maintain the image quality as well as robustness against the noise, filter attack of images. It is obtained that under no attack after embedding an average of 61db SNR value while 37 db PSNR is maintained.

Project Sample Image

Other Detail

Software Requirement :   MATLAB 2012 and Above

Hardware Requirement :   RAM: 2GB, Processor 2.2Ghz


Application :   Copyright Protection: The primary use of watermarking is where an organization wishes to as sert its ownership of copyright for digital matter. Watermarking can be utilized as a sturdy device to avoid unlawful copying. Temper Detection In this application area, it is necessary to assure that the origin of a data object is demonstrated and its honesty is proved. Single example of temper recognition is photographic forensic information which may be presented as evidence in the court. Fingerprinting If monitoring and owner identification applications place the same watermark in all copies of the equal content, it might generate a problem. Annotation Applications In this applications area, watermarks convey object-specific information (“feature tags” or “captions”) to users of the object. Example, patient recognition knowledge (data) can be embedded interested in medical picture.


Project Attachement

PDF IEEE Base Paper
Doc Synopsis
Source Code Complete Code files