Search or add a thesis

Advanced Search (Beta)
Home > Study of Watermarking for Image and Text Based Applications

Study of Watermarking for Image and Text Based Applications

Thesis Info

Access Option

External Link

Author

Munib, Summuyya

Program

PhD

Institute

Pakistan Institute of Engineering and Applied Sciences

City

Islamabad

Province

Islamabad.

Country

Pakistan

Thesis Completing Year

2018

Thesis Completion Status

Completed

Subject

Computer Science

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/9890/1/Thesis%20R_v1Final.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676727841247

Similar


Due to the rapid development of multimedia and communications technologies, issues related to data vulnerability and copyrights violation has increased. Digital content can be manipulated and reproduced effortlessly. Consequently, there is a considerable requirement for techniques aimed at content protection and authentication. Watermarking techniques can provide copyrights enforcement and authentication to prevent the illegitimate use of digital content. These techniques can be classified into two categories i.e. robust watermarking and reversible watermarking. In this thesis, research work is carried out in three phases. The first phase proposes a robust watermarking technique, which is resilient against the geometrical attacks. It is helpful in executing copyright protection. In robust watermarking, watermark is able to survive in case of attack on the digital content and can be successfully retrieved on extraction. The proposed technique exploits both the robust image feature points and local Zernike moments for embedding secret information. Delaunay tessellation is employed to divide an image into distinct triangular segments based on robust features identified using Harris detector. Zernike moments are calculated for each selected triangular segment, and then the watermark is embedded in the magnitude of Zernike moments using dither modulation. In the second phase, a reversible watermarking technique is proposed. Reversible watermarking is a special type of watermarking technique in which watermark is extracted along with restoration of the host media. Whereas, in case of robust watermarking, we are not able to retrieve the original image. Such watermarking system finds its application in medical and law enforcement, etc. The proposed watermarking scheme is based on pixel value ordering. Image is divided into sub blocks and each block is assessed using a threshold value. If the block belongs to the smooth category, watermark bit is embedded. In contrast, if it is classified as rough block, then the sub block is left unchanged. This technique does not require a location map since it uses histogram shifting. In third phase, the watermarking approaches and their applications for the protection DNA sequences are explored. In DNA watermarking, which is type of text xii watermarking; watermark information should be embedded in DNA sequence in such a way that it should not raise any functional disorders in the living organism. A watermark is embedded in a DNA sequence through synonymous substitution of nucleotides. The proposed approach ensures Amino Acid conservation, efficient utilization of the available embedding space in DNA sequences, and achieves mutation resistance by since it employs Reed-Solomon codes. The performance of these techniques has been evaluated on the standard test datasets. In some of the cases, the proposed watermarking approaches performed better than the recent existing approaches and showed comparable performance in other cases. The first technique finds its application in protecting the copyrights of the owner. The second watermarking technique can be used in applications where significant amount of data needs to be embedded e.g. information related to the patient in medical images. The third technique related to the DNA watermarking can be used for protection of DNA sequences and also to provide biological data storage as large amount of data can be stored.
Loading...

Similar Thesis

Showing 1 to 20 of 100 entries
TitleAuthorSupervisorDegreeInstitute
PhD
Pakistan Institute of Engineering and Applied Sciences, Islamabad, Pakistan
PhD
Pakistan Institute of Engineering and Applied Sciences, Islamabad, Pakistan
PhD
Pakistan Institute of Engineering and Applied Sciences, Islamabad, Pakistan
PhD
National University of Computer and Emerging Sciences, Islamabad, Pakistan
BET and BCE
COMSATS University Islamabad, Islamabad, Pakistan
MS
COMSATS University Islamabad, Islamabad, Pakistan
PhD
Pakistan Institute of Engineering and Applied Sciences, Islamabad, Pakistan
MS
International Islamic University, Islamabad, Pakistan
PhD
COMSATS University Islamabad, Islamabad, Pakistan
MS
International Islamic University, Islamabad, Pakistan
University of Engineering and Technology, Lahore, Pakistan
PhD
National University of Computer and Emerging Sciences, Islamabad, Pakistan
PhD
National University of Computer and Emerging Sciences, Islamabad, Pakistan
BCS
International Islamic University, Islamabad, Pakistan
Mphil
Quaid-i-Azam University, Islamabad, Pakistan
Mphil
Quaid-i-Azam University, Islamabad, Pakistan
BS
International Islamic University, Islamabad, Pakistan
University of Engineering and Technology, Lahore, Pakistan
Mphil
Quaid-i-Azam University, Islamabad, Pakistan
BS
International Islamic University, Islamabad, Pakistan
TitleAuthorSupervisorDegreeInstitute
Showing 1 to 20 of 100 entries

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...