next g wireless multimedia communication systems

advertisement
Arab Academy for Science
And Technology and Maritime Transport
College of Engineering and Technology
NEXT G WIRELESS MULTIMEDIA
COMMUNICATION SYSTEMS
Watermarking and Data Hiding Techniques
Presented by
Rana Fadel Ahmed EI-Jaru
Department of Electronics and Communication Engineering
Supervised by
Prof. Dr. Said El Khamy
Faculty of Engineering, Alexandria University
Final Year Graduation Project
B.Eng.
July 2007, Alexandria
ACKOWLEDGMENTS
First ,1 would like to express my sincere gratitude to my supervisors, Professor
Dr. Said EI-Khamy, for his guidance, encouragement, and invaluable advice in
helping me for the completion of the project.
I am also thankful for my Father and mother for the support, love they gave
me throughout the years
Finally, I would like to thank my brother Fadi EI-Jaru and my fiance Ismael ElSourani for the special support & understanding they gave to me.
ABSTRACT
Various digital watennarking techniques have been proposed in recent years as methods
to protect the copyright of digital data. The aim of the present research is to develop a
scheme that will protect a digital image from copyright fraud by embedding a unique
message on the original infonnation. There is one aspect of copy control that digital rights
management technologies based on encryption do not address. It is the case when the high
value content leaves the "digital world", namely when it is converted to wavefonns that can
be heard or seen by people. To solve this problem, there has been a growing "interest" on
digital watermarking, mainly created by pressure from the content industry on the consumer
electronics and the high technologies industries to find ways to better protect copyrights.
Watermarks are imperceptible marks hidden in multimedia object, including audio
visual signals. In a typical content screening system, the client's media player searches the
content for such hidden information. If the secret mark is found, the player then verifies
whether a valid license is present. By default, unmarked content is considered as unprotected
and is played without any barriers. To be effective, the watermarking technology should be
such that breaking a single player or a subset of players does not compromise the security of
the entire system.
TT
Table of contents
Part} :
Introduction to next generation wireless systems.
1. Introduction to wireless communication systems ........................ 1
2. Propagation effects in wireless channels ................................. 3
3. Spread spectrum and CDMA principles ................................. II
4. Introduction to cryptography and encryption Techniques ............. 14
5. Introduction to compression and watermarking ........................ 20
6. Introduction to channel coding techniques .............................. 25
7. Evolution to mobile communication systems ........................... 29
8. Introduction to wireless networks ........................................ 33
PartII
Chapter 1: Introduction To Watermarking ................... .. 42
Chapter 2: Transform Technique ................................ .43
2.1 Introduction ................................................................43
2.2 DeT ............................................................... .......... 43
2.3 Wavelets .................................................................. 44
2.3.1 Introduction ......................................................... 44
2.3.2 Orthogonal wavelet transform .................................... 45
2.3.3 Discrete wavelet transform ....................................... 46
2.3.4 Practical use of wavelet transform .............................. .47
2.4 Other transforms ..........................................................48
III
Chapter 3 :Watermarking Embedding Techniques: ......... .49
3.1 Introduction .............................................................. 49
3.2 Elements of a Watermarking System .................................. 49
3.3 Watermarking theory .................................................. 51
3.4 Types of Digital Watermarks .......................................... 53
3.3.1 Simple Visible Watermarking .................................... 53
3.5Image watermarking spatial domain .................................. 54
3.5.1 Least Significant Bit Method(LSB) ........................... 54
3.5.2 Spread Spectrum Techniques ................................... 56
3.5.3 Patchwork Algorithm ............................................ 56
3.5.4 Zigzag Algorithm ................................................ 57
3.5.5 Loop Algorithm .................................................. 59
3.5.6 colored Images Watermarking ................................. 59
3.6DCT ....................................................................... 60
3.7 Wavelet .................................................................. 61
3.7.1 Introduction ......................................................... 61
3.7.2 Embedding Watermark in Wavelet Method .................... 61
3.7.3 Advantages of Watermarks in the Wavelet. ................... 63
3.8 Examples (applications) ................................. : ............. 64
3.8.1 Fingerprinting ..................................................... 64
3.8.2 Indexing ............................................................ 64
3.8.3 Copyright Protection & Owner identification ................. 64
3.8.4 Broadcast monitoring ............................................ 64
3.8.5 Copy protection ................................................... 65
3.8.6 Data Authentication .............................................. 65
3.8.7 Data Hiding (Covert Communications) ....................... 65
3.8.8 Medical Safety .................................................... 65
Matlab program .............................................................. 66
IV
Chapter 4: Data hiding (Steganography): ...... ................ 76
4 .1 Introduction ............................................................. 76
4.2 Steganography Categories ............................................. 79
4.2.1 Pure steganography ............................................... 79
4.2.2 Secret key steganography ......................................... 79
4.2.3 Public key steganography ......................................... 79
4.3 Steganography Techniques ............................................ 80
4.3.1 Substitution Systems Techniques ............................ 80
4.3.2 Transform Domain Techniques .............................. 81
4.3.3 Statistical Methods ............................................ 81
4.3.4 Distortion Techniques ........................................ 81
4.4 Examples (applications) ............................................... 81
4.4.1 Covert Channels ................................................. 81
4.4.2 Audio data ........................................................ 82
4.4.3 Military ............................................................ 83
4.4.4 E-commerce ...................................................... 84
Conculsion: ............................................................. 85
v
Download