Video watermark with OpenCV in python
Video watermark with OpenCV in python
PROJECT ID: PYTHON29
PROJECT
NAME: Video watermark with OpenCV in python
PROJECT CATEGORY: MCA / BCA / BCCA / MCM / POLY / ENGINEERING
PROJECT ABSTRACT:
With the rapid growth and internet and networks techniques, multimedia data transforming and sharing is common to many people. Multimedia data is easily copied and modified, so necessarily for copyright protection is increasing. It is the imperceptible marking of multimedia data to ȃbrandȄ ownership. Digital watermarking has been proposed as technique for copyright protection of multimedia data. Digital watermarking invisibly embeds copyright information into multimedia data.
Thus,digital watermarking has been used for copyright protection, finger protection, fingerprinting, copy protection, and broadcast monitoring. Common types of signals to watermark are images, music clips and digital video. The application of digital watermarking to still images is concentrated here. The major technical challenge is to design a highly robust digital watermarking technique, which discourages copyright infringement by making the process of watermarking removal tedious and costly.
SYSTEM DESIGN
Visible watermark is a translucent overlaid into an image and is visible to the viewer. Visible watermarking is used to indicate ownership and for copyright protection. Whereas an invisible watermark is embedded into the data in such a way that the changes made to the pixel values are perceptually not noticed. Invisible watermark is used as evidence of ownership and to detect misappropriated images. Dual watermark is the combination of visible and invisible watermark. An invisible watermark is used as a backup for the visible watermark. According to Working Domain, the watermarking techniques can be divided into two types
a) Spatial Domain Watermarking Techniques
b) Frequency Domain Watermarking Techniques
In spatial domain techniques, the watermark embedding is done on image pixels while in frequency domain ater marking techniques the embedding is done after taking image transforms. Generally frequency domain methods are more robust than spatial domain techniques. According to the watermarking extraction process, techniques can be divided into three types
● Non-blind
● Semi-blind
● Blind
Non-blind watermarking schemes require original image and secret key for watermark detection whereas semi-blind schemes require secret key and watermark bit sequence for extraction. Blind schemes need only secret keys for extraction.
SOFTWARE REQUIREMENTS:
OS : Windows
Python IDE : Python 2.7.x and above
Language : Python Programming
Database : MYSQL
HARDWARE REQUIREMENTS:
RAM : 4GB and Higher
Processor : Intel i3 and above
Hard Disk : 500GB Minimum
Setting up Software Environment
Python is a high level, interpreted, interactive and object-oriented scripting language.
Python is designed to be highly readable and has fewer syntactical constructions than other languages. Python is used in the development of this model. In this experiment, the following python libraries are used to develop the machine learning models:
• NLTK: It is a python package which works with human language data and provides an easy-to-use interface to different lexical resources like WordNet and text processing libraries. These lexical resources are used for classification, tokenization, stemming, tagging, parsing, and semantic reasoning [23].
• Pandas: It is a python package which acts as a data analysis tool and deals with data structures. Pandas carry out entire data analysis workflow in Python without having to switch to a more domain specific language like R [46].
• Tweepy: It is used in accessing the Twitter API by establishing the connection and to gather tweets from Twitter [24]. This module is used to stream live tweets directly from Twitter in real-time.
• Numpy: NumPy is the fundamental package for computing with Python. It is used to add support to multi-dimensional arrays and matrices, with a large collection of high-level mathematical functions [47].
• scikit-learn: It is a simple and efficient tool for data mining and data analysis [47]. • matplotlib python library which generates plots, histograms, power spectra, bar charts, etc.
In this work matplotlib.pyplot module is used to plot the metrics [47].
• Gensim It is used to automatically extract semantic topics from documents, as efficiently as possible. Gensim is designed to process raw, unstructured text data. The algorithms in Gensim, such as Word2Vec where it automatically discovers the semantic structure of phrase by examining statistical co-occurrence patterns within a corpus of training documents. These algorithms are unsupervised. Once these statistical patterns are found, any plain text documents can be succinctly expressed in the new, semantic representation and queried for topical similarity against other documents [48].
• Keras: Keras is a high-level neural networks API, written in Python and capable of running on top of TensorFlow, CNTK, or Theano. It was developed with a focus on enabling fast experimentation. Being able to go from idea to result with the least possible delay is key to doing good research [49]
TABLE OF CONTENTS
·
Title
Page
·
Declaration
·
Certification
Page
·
Dedication
·
Acknowledgements
·
Table of
Contents
·
List of
Tables
·
Abstract
CHAPTER SCHEME
CHAPTER ONE: INTRODUCTION
CHAPTER TWO: OBJECTIVES
CHAPTER THREE: PRELIMINARY
SYSTEM ANALYSIS
·
Preliminary
Investigation
·
Present System in Use
·
Flaws In Present System
·
Need Of New System
·
Feasibility Study
·
Project Category
CHAPTER FOUR: SOFTWARE
ENGINEERING AND PARADIGM APPLIED
·
Modules
·
System / Module Chart
CHAPTER FIVE: SOFTWARE AND
HARDWARE REQUIREMENT
CHAPTER SIX: DETAIL SYSTEM
ANALYSIS
·
Data Flow Diagram
·
Number of modules and
Process Logic
·
Data Structures and Tables
·
Entity- Relationship
Diagram
·
System Design
·
Form Design
·
Source Code
·
Input Screen and Output
Screen
CHAPTER SEVEN:
TESTING
AND VALIDATION CHECK
CHAPTER EIGHT:
SYSTEM SECURITY MEASURES
CHAPTER NINE:
IMPLEMENTATION, EVALUATION &
MAINTENANCE
CHAPTER TEN:
FUTURE SCOPE OF THE PROJECT
CHAPTER ELEVEN: SUGGESTION AND CONCLUSION
CHAPTER TWELE: BIBLIOGRAPHY& REFERENCES
Other
Information
PROJECT
SOFWARE |
ZIP |
PROJECT REPORT PAGE |
60
-80 Pages |
CAN BE USED IN |
Marketing
(MBA) |
PROJECT COST |
1500/-
Only |
PDF SYNOPSIS COST |
250/-
Only |
PPT PROJECT COST |
300/-
Only |
PROJECT WITH SPIRAL BINDING |
1750/-
Only |
PROJECT WITH HARD BINDING |
1850/-
Only |
TOTAL
COST (SYNOPSIS, SOFTCOPY, HARDBOOK, and SOFTWARE, PPT) |
2500/-
Only |
DELIVERY TIME |
1
OR 2 Days (In
case Urgent Call: 8830288685) |
SUPPORT / QUERY |
|
CALL |
8830288685 |
|
help@projectsready.in |
[Note:
We Provide Hard Binding and Spiral Binding only Nagpur Region] |
Comments
Post a Comment
If you have any doubt let me know