Arab Academy for Science And Technology and Maritime Transport College of Engineering and Technology NEXT G WIRELESS MULTIMEDIA COMMUNICATION SYSTEMS Watermarking and Data Hiding Techniques Presented by Rana Fadel Ahmed EI-Jaru Department of Electronics and Communication Engineering Supervised by Prof. Dr. Said El Khamy Faculty of Engineering, Alexandria University Final Year Graduation Project B.Eng. July 2007, Alexandria ACKOWLEDGMENTS First ,1 would like to express my sincere gratitude to my supervisors, Professor Dr. Said EI-Khamy, for his guidance, encouragement, and invaluable advice in helping me for the completion of the project. I am also thankful for my Father and mother for the support, love they gave me throughout the years Finally, I would like to thank my brother Fadi EI-Jaru and my fiance Ismael ElSourani for the special support & understanding they gave to me. ABSTRACT Various digital watennarking techniques have been proposed in recent years as methods to protect the copyright of digital data. The aim of the present research is to develop a scheme that will protect a digital image from copyright fraud by embedding a unique message on the original infonnation. There is one aspect of copy control that digital rights management technologies based on encryption do not address. It is the case when the high value content leaves the "digital world", namely when it is converted to wavefonns that can be heard or seen by people. To solve this problem, there has been a growing "interest" on digital watermarking, mainly created by pressure from the content industry on the consumer electronics and the high technologies industries to find ways to better protect copyrights. Watermarks are imperceptible marks hidden in multimedia object, including audio visual signals. In a typical content screening system, the client's media player searches the content for such hidden information. If the secret mark is found, the player then verifies whether a valid license is present. By default, unmarked content is considered as unprotected and is played without any barriers. To be effective, the watermarking technology should be such that breaking a single player or a subset of players does not compromise the security of the entire system. TT Table of contents Part} : Introduction to next generation wireless systems. 1. Introduction to wireless communication systems ........................ 1 2. Propagation effects in wireless channels ................................. 3 3. Spread spectrum and CDMA principles ................................. II 4. Introduction to cryptography and encryption Techniques ............. 14 5. Introduction to compression and watermarking ........................ 20 6. Introduction to channel coding techniques .............................. 25 7. Evolution to mobile communication systems ........................... 29 8. Introduction to wireless networks ........................................ 33 PartII Chapter 1: Introduction To Watermarking ................... .. 42 Chapter 2: Transform Technique ................................ .43 2.1 Introduction ................................................................43 2.2 DeT ............................................................... .......... 43 2.3 Wavelets .................................................................. 44 2.3.1 Introduction ......................................................... 44 2.3.2 Orthogonal wavelet transform .................................... 45 2.3.3 Discrete wavelet transform ....................................... 46 2.3.4 Practical use of wavelet transform .............................. .47 2.4 Other transforms ..........................................................48 III Chapter 3 :Watermarking Embedding Techniques: ......... .49 3.1 Introduction .............................................................. 49 3.2 Elements of a Watermarking System .................................. 49 3.3 Watermarking theory .................................................. 51 3.4 Types of Digital Watermarks .......................................... 53 3.3.1 Simple Visible Watermarking .................................... 53 3.5Image watermarking spatial domain .................................. 54 3.5.1 Least Significant Bit Method(LSB) ........................... 54 3.5.2 Spread Spectrum Techniques ................................... 56 3.5.3 Patchwork Algorithm ............................................ 56 3.5.4 Zigzag Algorithm ................................................ 57 3.5.5 Loop Algorithm .................................................. 59 3.5.6 colored Images Watermarking ................................. 59 3.6DCT ....................................................................... 60 3.7 Wavelet .................................................................. 61 3.7.1 Introduction ......................................................... 61 3.7.2 Embedding Watermark in Wavelet Method .................... 61 3.7.3 Advantages of Watermarks in the Wavelet. ................... 63 3.8 Examples (applications) ................................. : ............. 64 3.8.1 Fingerprinting ..................................................... 64 3.8.2 Indexing ............................................................ 64 3.8.3 Copyright Protection & Owner identification ................. 64 3.8.4 Broadcast monitoring ............................................ 64 3.8.5 Copy protection ................................................... 65 3.8.6 Data Authentication .............................................. 65 3.8.7 Data Hiding (Covert Communications) ....................... 65 3.8.8 Medical Safety .................................................... 65 Matlab program .............................................................. 66 IV Chapter 4: Data hiding (Steganography): ...... ................ 76 4 .1 Introduction ............................................................. 76 4.2 Steganography Categories ............................................. 79 4.2.1 Pure steganography ............................................... 79 4.2.2 Secret key steganography ......................................... 79 4.2.3 Public key steganography ......................................... 79 4.3 Steganography Techniques ............................................ 80 4.3.1 Substitution Systems Techniques ............................ 80 4.3.2 Transform Domain Techniques .............................. 81 4.3.3 Statistical Methods ............................................ 81 4.3.4 Distortion Techniques ........................................ 81 4.4 Examples (applications) ............................................... 81 4.4.1 Covert Channels ................................................. 81 4.4.2 Audio data ........................................................ 82 4.4.3 Military ............................................................ 83 4.4.4 E-commerce ...................................................... 84 Conculsion: ............................................................. 85 v