|The required tasks to complete this project are:
|1. Research the available watermarking algorithms. (Team)||yes|
|2. Understand the different techniques of the image watermarking. (Team)||yes|
|3. Choose an algorithm that satisfies our requirements. (Team)||yes|
|4. Analyze and modify the code of the chosen algorithm to suit our requirements. (Team)||yes|
|5. Create a GUI in Visual Basic as an interface between the user and the algorithm code. (Pat)||in progress|
|6. Create a poster to showcase our project for the end of term presentations. (Eric)||in progress|
|7. Create a website to showcase our project on the web (Manny)||in progress|
1. RESEARCH ALGORITHMS
A variety of algorithms were researched and analyzed for their ability to withstand attacks to remove or distort the watermark.
2. DIFFERENT WATERMARKING TECHNIQUES
A myriad of different techniques are used in Digital Watermarking technologies. Perhaps the simplest technique includes embedding or adding the watermark to the least significant bit of the original image. The watermark is extracted by taking the least significant bit at respective points. However, this technique is not robust to additive noise and is simple to remove.
The common and more robust algorithms used today involve embedding the watermark into specific wave or frequency domains within the image. For example the Cox algorithm, places watermarks in perceptually significant areas of the image. The watermark was based on 1000 random samples of N(0,1) distribution. These samples were added to the 1000 largest DCT coefficients of the original image, and the inverse DCT was taken to retrieve the watermarked image.
Other techniques involve embedding the technique in the wavelet domain using the discrete wave transform (DWT).
3. ALGORITHM CHOSEN
The algorithm chosen was Cox. Although developed in originally outlined in [Cox95], the Cox algorithm is still one of the strongest algorithms available. It is robust in resistance to a wide spectrum of intentional or unintentional attacks.
4. ALGORITHM EXECUTABLE
The algorithm executable were written by Peter Meerwald and made available for research and experimentation into watermarking. Recently, Meerwald has implemented in C many of the algorithms that have been conceived by other researchers.
See Algorithm Testing Overview below/
The GUI will allow the user to:
select a ppm image to add a watermark to
select the information to be embedded as a watermark
The web page will include screen shots of the GUI, sample watermarked images, a description of the work involved, and most of the information from the progress reports.
| Week #
||research / choose algorithm
||progress report #1
||pr. report #1 due Monday May 28th
||build GUI / algorithm changes
||progress report #2
||progress report #2 due June 29th
||test: robustness, invisibility
||make web page
|| July 13
|| final report
|| make poster for presentation
||poster presentations on July 27th
|| report and website due Aug 3rd