Analysis and Design for Protecting the Intellectual Property Rights Associated with Multimedia Data by Samir B. Patel
Material type:
- TT000011 PAT
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|
![]() |
NIMA Knowledge Centre | Reference | TT000011 PAT (Browse shelf(Opens below)) | Not For Loan | TT000011 | |||
![]() |
NIMA Knowledge Centre | Reference | TT000011 PAT (Browse shelf(Opens below)) | Not For Loan | TT000011-1 | |||
![]() |
NIMA Knowledge Centre | Reference | TT000011 PAT (Browse shelf(Opens below)) | Not For Loan | TT000011-2 |
Browsing Institute of Technology shelves, Collection: Reference Close shelf browser (Hides shelf browser)
Guided by: Dr. S. N. Pradhan With Synopsis and CD 05EXTPHDE01
ABSTRACT:
Different authors are using different meanings for the word \watermark", it is mostly agreed that the watermark is one, which is unnoticeably added to the cover object in order to convey the hidden data. It is the process of inserting information into another object/signal and can be termed as watermarking. Watermarking (now-a-days) is mainly used for copy-protection and copyright-protection. Historically, watermarking has been used to send \sensitive"information hidden in an- other signal which must withstand a few intentional and unintentional attacks. One way to protect the copyright of digital image/video is to add an invisible structure to the image to identify the owner. Copy protection attempts to Find ways, which limits the access to copyrighted material and/or inhibit the copy process itself. Examples of copy protection include encrypted digital TV broadcast, access controls to copyrighted software through the use of license servers and technical copy protection mechanisms on the media. Copyright protection inserts copyright information into the digital cover object with-out the perceptual loss in it. Whenever the copyright of a digital object is in query, this information is mined to identify the rightful owner. It is also possible to encode the identity of the original user along with the information of the copyright holder, which allows tracing of any illegal copies. Whereas copy protection seems to be difficult to implement, copyright protection protocols based on watermarking and strong cryptography are feasible. These have been the motivation for the present study and design of unique approach which includes data mining algorithm such as ID3 and image transformation technique like Discrete Cosine Transform (DCT), which is perhaps the First of its kind. Watermarking has been increasingly recognized as a highly effective means of protecting the intellectual property rights associated with multimedia data. This inner detail describes information hiding methods for the DCT and data mining that is used to embed the message and to retrieve the message. To analyze and design a technique for intellectual property rights associated with multimedia data" The design and implementation of an encoder and decoder algorithm using the decision tree and transformation technique, which is robust and secure for performing digital watermarking has been designed and tested with steganalyzer, Image processing tool like Matlab and data mining tool such as Weka. For information hiding and recovery inside the cover image along with decision tree, discrete cosine transform and Arnold transforms are also used. The information stored at scattered places based on distributed hiding of information using decision rules, makes the algorithm more secure rather than the sequential or static one. The design approach is such that the information is recoverable even if cover images are damaged to a large extent. The design uses Arnold transform to provide an additional security along with the usage of keys in the design. During the design the attributes of the images remains unchanged. The robustness of the watermarked images, is evaluated with a steganalysis tool StegAlyzerAS version 3.2. The design is scalable to have enough embedding capacity and speed. The usage of keys and the transformation techniques have made the design highly robust. The work is focused almost exclusively on the watermarking of digital images, however, most of these ideas could be applied to the watermarking in the digital video and audio domain as well.
There are no comments on this title.