Project Documentation Guide Lines - preparation steps (M.tech and B.tech)


 follow this procedure to get an effective Project Record 
Send your documentation doubts to: Bsureshvja@gmail.com

Before Table of Contents you have to include these documents


1)CERTIFICATE                             i

2)ACKNOWLEDGEMENTS                                   ii

3)DECLARATION                                 iii 

in this you have to give assurance  that this  Project Report have not been submitted to any other University or Institute for the award of any other degree or diploma.
----------------------------------------------------------------------------------------------------------
You have to include from this page in your table of contents (Index)
4)ABSTRACT : minimum of one or two pages      iv

                                          TABLE OF CONTENTS

ABSTRACT                                                                                                                   v                                                                                                                                           
TABLE OF CONTENTS                                                                                                 vi                                                                                                                                   
LIST OF TABLES                                                                                                         vii                                                                                                                                                   
LIST OF FIGURES                                                                                                       viii                                                                                                                                                  
LIST OF ABRIVATIONS                                                                                               xi           

CHAPTER 1 : 1. Intorduction About your Project
             
                            1.1  Overview                                                                                                                                                                              
            1.2  Problem statement                                                                                                                     
            1.3  Objective                                                                                                                                      
                            1.4 Thesis outline   


CHAPTER 2  : Introduction to your Project Basics i.e History and  related to your project, for idea just see bellow.(every thing related to your project which are helpful)                                                                                                                                               
2.Introduction
            2.1 History of watermarking
            2.1.1 What is Digital Watermark
2.2 Features of digital watermarking
            2.2.1 Imperceptibility
            2.2.2 Robustness
            2.2.3 Security
            2.2.4 Capacity
            2.2.5 Multiple Watermarks
2.3 How Watermarking is Different from Steganography and Cryptography
            2.3.1 Steganography vs. Watermarking
            2.3.2 Cryptography vs. Watermarking
            2.3.3 How watermarking is better than Digital Signatures.
2.4 Classification of Watermarking Techniques
            2.4..1 Inserted Media Category
            2.4.2 Robust & Fragile Watermarking
            2.4.3 Visible & Transparent Watermarking
            2.4.4 Public & Private Watermarking
            2.4.5 Asymmetric & Symmetric Watermarking
            2.4.6 Steganographic & Non-Steganographic watermarking
2.5 Watermarking techniques
            2.5.1 Spatial Domain Techniques:
                        2.5.1.1 Least Significant Bit (LSB) Technique
                        2.5.1.2 Binary Image Watermarking
2.5.2 Frequency Domain Techniques
                        2.5.2.1 DCT Watermarking Techniques
                        2.5.2.2 Wavelet Watermarking
2.6 Daubechies Wavelet filter :
            2.6.1 Properties of the Daubechies Wavelet
            2.6.2 Advantages of the Daubechies Wavelet
2.7 Applications of watermarking
            2.7.1 Security:
                        2.7.1.1 Certification:
                        2.7.1.2 Authentication:
                        2.7.1.3 Conditional access:
            2.7.2 Copyright Protection
            2.7.3 Copy protection
            2.7.4 Other applications
2.8 Disadvantages of digital watermarking
            2.8.1 Degrade image quality
            2.8.2 Non -Authentic Result of Embedding Data      
                                                                                              

CHAPTER 3: Literature Survey ( To implement your project what are the base papers you are refereed, that information you have to include in this chapter)                                                                                                                                                          
            3. Literature Survey
            3.1 Reversible Watermarking
            3.2 Digital Right Management(DRM)
                        3.2.1 Digital Right Management(DRM) for Watermarking
            3.3 Reversible Watermarking using Generalized LSB embedding
            3.4 Reversible Watermarking using Difference Expansion method
                        3.4.1 Feature map
                        3.4.2 Location map
3.5 Reversible Data embedding for Authentication of Robust Watermark
            3.5.1 The Idea of implementing the Tamper-proof Watermarks
3.6 The features of the Reversible Watermarking
            3.6.1 Robustness
            3.6.2 Imperceptibility
            3.6.3 Readily Embedding and Retrieving
            3.6.4 Blind watermarking
            3.6.5 Higher Embedding Capacity
3.7 Advantages of Reversible Watermarking
3.8 Attacks on Watermarks
            3.8.1 Removal attacks
            3.8.2 Geometric attacks
            3.8.3 Cryptographic attacks
            3.8.4 Protocol attacks
            3.8.5 Estimation-based attacks
            3.8.6 Copy attack
3.9 2D-Discrete Wavelet Transform Domain(DWT)


CHAPTER 4 : Implementation of your Project ,which includes your block diagram,how you are implemented that explanation you have to give                                                                                

4.  Watermarking Implementation                                                                                                  
    4.1 Watermark Embedding process               
          
          4.1.1 Block diagram of the Embedding Process                                                                              
           4.1.2 Feature map                                                                                                                          
           4.1.3 Location map              
           4.1.4 Coefficient Adjustment at Level-3                                                                                          4.1.5 Coefficient Adjustment at Level-2                                 
 
4.2 Watermark Extraction process                                                                                                         4.2.1 Block diagram of watermark extraction process
 
4.3 Performance Evaluation                                
       
 4.3.1 Mean Square Error (MSE)                                                                                                      
 4.3.2 Peak Signal to Noise Ratio (PSNR) 
         
 4.3.3 Normalized Cross Correlation (NCC)                                                                                       
 4.3.4 Similarity (SIM)    

   CHAPTER 5 : Simulation Results (In this you have to give your results with proper                                                                           justification)                                                                                                                                   
5. Simulation Results                                                                                               
5.1 Images and Logo used for watermarking                                                                  
5.2 Simulation results without attacks                                                                
5.3 Attacks on watermarked image                                                                                
                        5.3.1 Self-Similarity                                                                                   
                        5.3.2 Salt and Pepper                                                                                     
                        5.3.3 Speckle noise                                                                                      
  5.3.4 Blur                                                                                                          
  5.3.5 Cropping                                                                                              

CHAPTER 6  : Conclusion and Future Scope                                                                                                                                             
             6. Conclusion (which include Project you are implemented that should be justified and                                      you have to give the project future scope)                                                                                                    

                  Bibliography : Reference papers                                                                                        Publications : You have to publish your paper in international Journal                                       Personal Profile : your Bio data                                                                                                               

send your Project thesis preparation doubts to my mail Id:  

Bsureshvja@gmail.com


                                                                                                               
Project Documentation Guide Lines - preparation steps (M.tech and B.tech) Project Documentation Guide Lines - preparation steps (M.tech and B.tech) Reviewed by Suresh Bojja on 9/25/2015 07:36:00 AM Rating: 5

Subjects & Labs

AC (6) ADS (2) ATMEL (6) AWP (5) C- Language (3) CAO (5) CDAC (1) Cloud Computing (1) CMC (6) CN (10) CONSERVATION & MANAGEMENT Complete Notes (1) Control Sys (2) CVSM (2) Data Analytics (1) DC (5) Digital System Design (3) DIP (17) DLD (10) DLD Lab Manual (1) DS (4) DSD&DICA (9) DSP (6) EDC (45) Electonic Components (2) Embedded (7) EMWTL (6) ENERGY AUDIT (1) Engg. Mechanics (2) Engg.Chemistry (11) Faculty Files (6) Faculty Labs (1) Fuzzy (3) II MID (1) Job Exam Papers (4) LICA (1) Linux OS (1) Materials (1) MATLAB (27) MCU IDE 8051 (1) MEMS (4) MPMC (57) MPMC LAB Manual (3) MTECH (6) MWE (2) OC (1) PDC (9) Projects (8) RADAR (1) Research (9) RVSP (3) SC (1) Softwares (1) SS (1) STLD (18) TCSS (1) TSSN (1) TV Engg (1) VHDL (4) VLSI (8) VLSI Lab manual (1) WCN (1) Wireless Commu. (1) WSN (2)

Contact Form :

Name

Email *

Message *

Theme images by enjoynz. Powered by Blogger.