SlideShare a Scribd company logo
1 of 20
DESIGNING AN LTE CHANNEL FOR
DATA TRANSMISSION
Proposal of final project EE571
Presented by – Mohammed Aljnoobi & Mohammed
Siddiqui
Agenda
 Introduction
 LTE technology overview.
 Sending image over the LTE simulated channel.
 (SVD) watermarking overview.
 What is digital watermarking?
 Features of watermarking
 What is SVD?
 Using channel for an embedded watermarked imaqe.
Introduction
 We will investigate 2-D
image processing by
sending an image over
a channel.
 And we will observe
how watermarked
image is effected when
passed through this
channel.
LTE
 LTE (Long Term Evolution) has flexible and expandable
spectrum bandwidth
 Simplified network architecture
 Time-frequency scheduling on shared-channel
 Support for multi-antenna scheme
 High data throughput
 Self-Organizing Network
Simulation
steps
 Sending the image:
 Choose any image.
 Choosing the type of channel (AWGN or Rayleigh distribution).
 Add modulation technique (QAM).
 Apply OFDM .
 Add Cyclic prefix.
 Receiving the image:
 Removing cyclic prefix.
 Demultiplexer (Filter).
 Demodulator.
 Receive the data.
OFDM
• Orthogonal Frequency-
Division
Multiplexing (OFDM) is a
method of encoding digital
data on multiple carrier
frequencies.
• Total bandwidth is divided
into smaller non-
overlapping frequency sub-
bands.
• Used in cable television
and satellite
communications.
Cyclic
prefix
• Cyclic prefix refers to the prefixing of a
symbol with a repetition of the end.
• Guard time between adjacent symbols is
inserted to eliminate ISI.
• Inserted to preserve orthogonality.
• Increases required transmission
bandwidth, hence lowers spectral
efficiency.
• Cyclic Prefixes are used in OFDM in order
to combat multipath by making channel
estimation easy.
Digital Watermarking
 Allows users to embed SPECIAL PATTERN or SOME DATA into digital
contents without changing its perceptual quality.
 When data is embedded, it is not written at HEADER PART but embedded
directly into digital media itself by changing media contents data.
 Watermarking is a key process for the PROTECTION of copyright ownership
of electronic data.
Classification Of WATERMARK
• According to Human Perception
 Invisible
 Visible
• According to types of Document
 Text
 Image
 Audio
 Video
• According to Robustness
 Fragile
 Semi fragile
 Robust
Features of Watermarking
 Invisible/Inaudible
 Information is embedded without digital content degradation, because of the level of
embedding operation is too small for human to notice the change.
 Inseparable
 The embedded information can survive after some processing, compression and format
transformation.
 Unchanging data file size
 Data size of the media is not changed before and after embedding operation because
information is embedded directly into the media.
Purpose of Watermarking
 Copyright Protection
 Fingerprinting
 Copy Protection
 Broadcasting Monitoring
 Data Authentication
SVD(Singular Value Decomposition)
 SVD for any image say A of size m*m is a factorization of the
form given by ,A = UΣV∗ Where U and V are orthogonal matrices
in which columns of U are left singular vectors and columns of V
are right singular vectors of image A.
 Suppose M is a m*n matrix whose entries come from the field K,
which is either the field of real numbers or the field of complex
number. Then there exists a factorization of the form
 where U is an m × m unary matrix over K (orthogonal matrix if K
= R), Σ is a m × n diagonal matrix with non-negative real numbers
on the diagonal, and the n × n unitary matrix V∗ denotes the
conjugate transpose of the n × n unitary matrix V. Such a
factorization is called a singular value decomposition of M
Embedding and extracting technique of
SVD
How To overcome the problems of SVD
 Measuring of performance of SVD should be easy.
 SVD should become fast from computational point of view .
 To find the technique to calculate the SVD easily.
 Less calculations should be made to measure the performance of SVD
 SVD characteristics which are not utilized in image processing should be utilized by finding the
techniques to utilize the unused SVD characteristics in image processing such as image capacity for
hiding information, roughness measure etc.
Result and analysis
Original image
The image after the
channel
• As shown in the image the received image there are some error which should be
corrected by error correction some techniques based on the channel specification.
Watermarking results
Watermarking results
Watermarked image
Watermarked image after a channel of
(ADWGN) & QAM
Extracted watermark
Extracted water mark without effect
of the channel Extracted water mark with channel effect
Comments about the Results
 The quality of extracted image has changed slightly from the
original watermark image, but still it has very good which
means that, the used SVD system works rightly.
 It is clear from the last image that the applied communication
has affected our watermarking system, but still we can
recognize the image the a lot of details. Thus, image
enhancement techniques and an error correction algorithm are
needed to improve the result of the watermarking system in this
case.
 And in the case of the image over LTE channel we observed
the image there are some error which should be corrected by
Conclusions
 The coding and error correction algorithms are very important
to increase the performance of any communication systems.
 The watermarking system used over communication channel
should should be robust to be able to extract that image.
 The image sent over a channel may contain errors at the
receiver end which can be corrected using error correcting
techniques.

More Related Content

What's hot

“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...
“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...
“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...Edge AI and Vision Alliance
 
Iaetsd chaos cdsk communication system
Iaetsd chaos cdsk communication systemIaetsd chaos cdsk communication system
Iaetsd chaos cdsk communication systemIaetsd Iaetsd
 
A quick illustration of jpeg 2000
A quick illustration of jpeg 2000A quick illustration of jpeg 2000
A quick illustration of jpeg 2000Data Fok
 
Machine Learning (ML) in Wireless Sensor Networks (WSNs)
Machine Learning (ML) in Wireless Sensor Networks (WSNs)Machine Learning (ML) in Wireless Sensor Networks (WSNs)
Machine Learning (ML) in Wireless Sensor Networks (WSNs)mabualsh
 
Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...IJECEIAES
 
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA)
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA) LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA)
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA) cscpconf
 
Legendre transform based color image authentication (ltcia)
Legendre transform based color image authentication (ltcia)Legendre transform based color image authentication (ltcia)
Legendre transform based color image authentication (ltcia)csandit
 
Simulation of Wireless Communication Systems
Simulation of Wireless Communication SystemsSimulation of Wireless Communication Systems
Simulation of Wireless Communication SystemsBernd-Peter Paris
 
Review On Different Feature Extraction Algorithms
Review On Different Feature Extraction AlgorithmsReview On Different Feature Extraction Algorithms
Review On Different Feature Extraction AlgorithmsIRJET Journal
 
Hybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaHybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaIAEME Publication
 
Comparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression TechniquesComparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression Techniquessipij
 
“FIELD PROGRAMMABLE DSP ARRAYS” - A NOVEL RECONFIGURABLE ARCHITECTURE FOR EFF...
“FIELD PROGRAMMABLE DSP ARRAYS” - A NOVEL RECONFIGURABLE ARCHITECTURE FOR EFF...“FIELD PROGRAMMABLE DSP ARRAYS” - A NOVEL RECONFIGURABLE ARCHITECTURE FOR EFF...
“FIELD PROGRAMMABLE DSP ARRAYS” - A NOVEL RECONFIGURABLE ARCHITECTURE FOR EFF...sipij
 
Applications of machine learning in Wireless sensor networks.
Applications of machine learning in Wireless sensor networks.Applications of machine learning in Wireless sensor networks.
Applications of machine learning in Wireless sensor networks.Sahana B S
 
Copy of colloquium 3 latest
Copy of  colloquium 3 latestCopy of  colloquium 3 latest
Copy of colloquium 3 latestshaik fairooz
 
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...ijiert bestjournal
 
A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...
A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...
A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...VLSICS Design
 

What's hot (19)

“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...
“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...
“DNN Training Data: How to Know What You Need and How to Get It,” a Presentat...
 
Iaetsd chaos cdsk communication system
Iaetsd chaos cdsk communication systemIaetsd chaos cdsk communication system
Iaetsd chaos cdsk communication system
 
A quick illustration of jpeg 2000
A quick illustration of jpeg 2000A quick illustration of jpeg 2000
A quick illustration of jpeg 2000
 
Resume_Naveena1
Resume_Naveena1Resume_Naveena1
Resume_Naveena1
 
Machine Learning (ML) in Wireless Sensor Networks (WSNs)
Machine Learning (ML) in Wireless Sensor Networks (WSNs)Machine Learning (ML) in Wireless Sensor Networks (WSNs)
Machine Learning (ML) in Wireless Sensor Networks (WSNs)
 
Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...Image watermarking based on integer wavelet transform-singular value decompos...
Image watermarking based on integer wavelet transform-singular value decompos...
 
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA)
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA) LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA)
LEGENDRE TRANSFORM BASED COLOR IMAGE AUTHENTICATION (LTCIA)
 
Legendre transform based color image authentication (ltcia)
Legendre transform based color image authentication (ltcia)Legendre transform based color image authentication (ltcia)
Legendre transform based color image authentication (ltcia)
 
Simulation of Wireless Communication Systems
Simulation of Wireless Communication SystemsSimulation of Wireless Communication Systems
Simulation of Wireless Communication Systems
 
Review On Different Feature Extraction Algorithms
Review On Different Feature Extraction AlgorithmsReview On Different Feature Extraction Algorithms
Review On Different Feature Extraction Algorithms
 
Hybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaHybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pca
 
Comparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression TechniquesComparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression Techniques
 
“FIELD PROGRAMMABLE DSP ARRAYS” - A NOVEL RECONFIGURABLE ARCHITECTURE FOR EFF...
“FIELD PROGRAMMABLE DSP ARRAYS” - A NOVEL RECONFIGURABLE ARCHITECTURE FOR EFF...“FIELD PROGRAMMABLE DSP ARRAYS” - A NOVEL RECONFIGURABLE ARCHITECTURE FOR EFF...
“FIELD PROGRAMMABLE DSP ARRAYS” - A NOVEL RECONFIGURABLE ARCHITECTURE FOR EFF...
 
Dip sdit 7
Dip sdit 7Dip sdit 7
Dip sdit 7
 
Hv2514131415
Hv2514131415Hv2514131415
Hv2514131415
 
Applications of machine learning in Wireless sensor networks.
Applications of machine learning in Wireless sensor networks.Applications of machine learning in Wireless sensor networks.
Applications of machine learning in Wireless sensor networks.
 
Copy of colloquium 3 latest
Copy of  colloquium 3 latestCopy of  colloquium 3 latest
Copy of colloquium 3 latest
 
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
DIGITAL IMAGE WATERMARKING OF COMPRESSED IMAGE USING JPEG 2000 AND ENCRYPTION...
 
A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...
A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...
A Detailed Survey on VLSI Architectures for Lifting based DWT for efficient h...
 

Viewers also liked

Mario bross german
Mario bross germanMario bross german
Mario bross germangeuurman
 
Quantum Education Group Qe group international application form
Quantum Education Group Qe group international application formQuantum Education Group Qe group international application form
Quantum Education Group Qe group international application formAbhishek Bajaj
 
Edelweiss Certificate
Edelweiss CertificateEdelweiss Certificate
Edelweiss CertificateMayank Kumar
 
Exposicion de publiciada ii
Exposicion de publiciada iiExposicion de publiciada ii
Exposicion de publiciada iiedwin montero
 
Iloveyou 1
Iloveyou 1Iloveyou 1
Iloveyou 1Kai Tù
 
C1657 ac1 oliva_maría_presentaciocontinguts
C1657 ac1 oliva_maría_presentaciocontingutsC1657 ac1 oliva_maría_presentaciocontinguts
C1657 ac1 oliva_maría_presentaciocontingutsMaría Oliva
 
Early renaissance donatello pic3
Early renaissance donatello pic3Early renaissance donatello pic3
Early renaissance donatello pic3awparker
 
Andamio plan de_montaje_utilizacion_y_seguimiento_en_obra
Andamio plan de_montaje_utilizacion_y_seguimiento_en_obraAndamio plan de_montaje_utilizacion_y_seguimiento_en_obra
Andamio plan de_montaje_utilizacion_y_seguimiento_en_obraAlicia Moreno Castro
 
Proyecto b
Proyecto bProyecto b
Proyecto bnanisdu
 
SIT Immediate skill-shortage-list-2014-03-24-
SIT Immediate skill-shortage-list-2014-03-24-SIT Immediate skill-shortage-list-2014-03-24-
SIT Immediate skill-shortage-list-2014-03-24-Abhishek Bajaj
 
Startup Istanbul 2016 / Amal Dokhan - Chief Program KAUST
Startup Istanbul 2016 / Amal Dokhan - Chief Program KAUSTStartup Istanbul 2016 / Amal Dokhan - Chief Program KAUST
Startup Istanbul 2016 / Amal Dokhan - Chief Program KAUSTStartup Istanbul
 
O assistente social como trab assalariado
O assistente social como trab assalariadoO assistente social como trab assalariado
O assistente social como trab assalariadoRafaela Lerin
 
Australian Academy of Management & Science Flyer sit30813 certificate iii in ...
Australian Academy of Management & Science Flyer sit30813 certificate iii in ...Australian Academy of Management & Science Flyer sit30813 certificate iii in ...
Australian Academy of Management & Science Flyer sit30813 certificate iii in ...Abhishek Bajaj
 
Interpreter Insider - Issue 3
Interpreter Insider - Issue 3Interpreter Insider - Issue 3
Interpreter Insider - Issue 3Dana Austin
 

Viewers also liked (20)

Mario bross german
Mario bross germanMario bross german
Mario bross german
 
Quantum Education Group Qe group international application form
Quantum Education Group Qe group international application formQuantum Education Group Qe group international application form
Quantum Education Group Qe group international application form
 
Edelweiss Certificate
Edelweiss CertificateEdelweiss Certificate
Edelweiss Certificate
 
certificado georgetown
certificado georgetowncertificado georgetown
certificado georgetown
 
Exposicion de publiciada ii
Exposicion de publiciada iiExposicion de publiciada ii
Exposicion de publiciada ii
 
4 periodo
4 periodo4 periodo
4 periodo
 
cosas
cosascosas
cosas
 
Iloveyou 1
Iloveyou 1Iloveyou 1
Iloveyou 1
 
Slide 34
Slide 34Slide 34
Slide 34
 
Scan shibhjazirah001
Scan shibhjazirah001Scan shibhjazirah001
Scan shibhjazirah001
 
C1657 ac1 oliva_maría_presentaciocontinguts
C1657 ac1 oliva_maría_presentaciocontingutsC1657 ac1 oliva_maría_presentaciocontinguts
C1657 ac1 oliva_maría_presentaciocontinguts
 
Sesión primaria ve y md os final
Sesión primaria ve y md os finalSesión primaria ve y md os final
Sesión primaria ve y md os final
 
Early renaissance donatello pic3
Early renaissance donatello pic3Early renaissance donatello pic3
Early renaissance donatello pic3
 
Andamio plan de_montaje_utilizacion_y_seguimiento_en_obra
Andamio plan de_montaje_utilizacion_y_seguimiento_en_obraAndamio plan de_montaje_utilizacion_y_seguimiento_en_obra
Andamio plan de_montaje_utilizacion_y_seguimiento_en_obra
 
Proyecto b
Proyecto bProyecto b
Proyecto b
 
SIT Immediate skill-shortage-list-2014-03-24-
SIT Immediate skill-shortage-list-2014-03-24-SIT Immediate skill-shortage-list-2014-03-24-
SIT Immediate skill-shortage-list-2014-03-24-
 
Startup Istanbul 2016 / Amal Dokhan - Chief Program KAUST
Startup Istanbul 2016 / Amal Dokhan - Chief Program KAUSTStartup Istanbul 2016 / Amal Dokhan - Chief Program KAUST
Startup Istanbul 2016 / Amal Dokhan - Chief Program KAUST
 
O assistente social como trab assalariado
O assistente social como trab assalariadoO assistente social como trab assalariado
O assistente social como trab assalariado
 
Australian Academy of Management & Science Flyer sit30813 certificate iii in ...
Australian Academy of Management & Science Flyer sit30813 certificate iii in ...Australian Academy of Management & Science Flyer sit30813 certificate iii in ...
Australian Academy of Management & Science Flyer sit30813 certificate iii in ...
 
Interpreter Insider - Issue 3
Interpreter Insider - Issue 3Interpreter Insider - Issue 3
Interpreter Insider - Issue 3
 

Similar to Designing an LTE channel for data transmission

BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESijma
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESijma
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
 
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT DomainA Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT DomainIRJET Journal
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital mediaijctet
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarkingijceronline
 
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDWatermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDIRJET Journal
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...IRJET Journal
 
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET Journal
 
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmIRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmLalith Kumar
 
A Blind Watermarking Algorithm
A Blind Watermarking AlgorithmA Blind Watermarking Algorithm
A Blind Watermarking AlgorithmIRJET Journal
 

Similar to Designing an LTE channel for data transmission (20)

BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
 
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGESBLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
BLIND EXTRACTION OF DIGITAL WATERMARKING ALGORITHM FOR COLOR IMAGES
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT DomainA Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital media
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
1918 1923
1918 19231918 1923
1918 1923
 
1918 1923
1918 19231918 1923
1918 1923
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
G0523444
G0523444G0523444
G0523444
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarking
 
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDWatermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
 
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
 
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmIRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking Algorithm
 
A Blind Watermarking Algorithm
A Blind Watermarking AlgorithmA Blind Watermarking Algorithm
A Blind Watermarking Algorithm
 

Designing an LTE channel for data transmission

  • 1. DESIGNING AN LTE CHANNEL FOR DATA TRANSMISSION Proposal of final project EE571 Presented by – Mohammed Aljnoobi & Mohammed Siddiqui
  • 2. Agenda  Introduction  LTE technology overview.  Sending image over the LTE simulated channel.  (SVD) watermarking overview.  What is digital watermarking?  Features of watermarking  What is SVD?  Using channel for an embedded watermarked imaqe.
  • 3. Introduction  We will investigate 2-D image processing by sending an image over a channel.  And we will observe how watermarked image is effected when passed through this channel.
  • 4. LTE  LTE (Long Term Evolution) has flexible and expandable spectrum bandwidth  Simplified network architecture  Time-frequency scheduling on shared-channel  Support for multi-antenna scheme  High data throughput  Self-Organizing Network
  • 5. Simulation steps  Sending the image:  Choose any image.  Choosing the type of channel (AWGN or Rayleigh distribution).  Add modulation technique (QAM).  Apply OFDM .  Add Cyclic prefix.  Receiving the image:  Removing cyclic prefix.  Demultiplexer (Filter).  Demodulator.  Receive the data.
  • 6. OFDM • Orthogonal Frequency- Division Multiplexing (OFDM) is a method of encoding digital data on multiple carrier frequencies. • Total bandwidth is divided into smaller non- overlapping frequency sub- bands. • Used in cable television and satellite communications.
  • 7. Cyclic prefix • Cyclic prefix refers to the prefixing of a symbol with a repetition of the end. • Guard time between adjacent symbols is inserted to eliminate ISI. • Inserted to preserve orthogonality. • Increases required transmission bandwidth, hence lowers spectral efficiency. • Cyclic Prefixes are used in OFDM in order to combat multipath by making channel estimation easy.
  • 8. Digital Watermarking  Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual quality.  When data is embedded, it is not written at HEADER PART but embedded directly into digital media itself by changing media contents data.  Watermarking is a key process for the PROTECTION of copyright ownership of electronic data.
  • 9. Classification Of WATERMARK • According to Human Perception  Invisible  Visible • According to types of Document  Text  Image  Audio  Video • According to Robustness  Fragile  Semi fragile  Robust
  • 10. Features of Watermarking  Invisible/Inaudible  Information is embedded without digital content degradation, because of the level of embedding operation is too small for human to notice the change.  Inseparable  The embedded information can survive after some processing, compression and format transformation.  Unchanging data file size  Data size of the media is not changed before and after embedding operation because information is embedded directly into the media.
  • 11. Purpose of Watermarking  Copyright Protection  Fingerprinting  Copy Protection  Broadcasting Monitoring  Data Authentication
  • 12. SVD(Singular Value Decomposition)  SVD for any image say A of size m*m is a factorization of the form given by ,A = UΣV∗ Where U and V are orthogonal matrices in which columns of U are left singular vectors and columns of V are right singular vectors of image A.  Suppose M is a m*n matrix whose entries come from the field K, which is either the field of real numbers or the field of complex number. Then there exists a factorization of the form  where U is an m × m unary matrix over K (orthogonal matrix if K = R), Σ is a m × n diagonal matrix with non-negative real numbers on the diagonal, and the n × n unitary matrix V∗ denotes the conjugate transpose of the n × n unitary matrix V. Such a factorization is called a singular value decomposition of M
  • 13. Embedding and extracting technique of SVD
  • 14. How To overcome the problems of SVD  Measuring of performance of SVD should be easy.  SVD should become fast from computational point of view .  To find the technique to calculate the SVD easily.  Less calculations should be made to measure the performance of SVD  SVD characteristics which are not utilized in image processing should be utilized by finding the techniques to utilize the unused SVD characteristics in image processing such as image capacity for hiding information, roughness measure etc.
  • 15. Result and analysis Original image The image after the channel • As shown in the image the received image there are some error which should be corrected by error correction some techniques based on the channel specification.
  • 17. Watermarking results Watermarked image Watermarked image after a channel of (ADWGN) & QAM
  • 18. Extracted watermark Extracted water mark without effect of the channel Extracted water mark with channel effect
  • 19. Comments about the Results  The quality of extracted image has changed slightly from the original watermark image, but still it has very good which means that, the used SVD system works rightly.  It is clear from the last image that the applied communication has affected our watermarking system, but still we can recognize the image the a lot of details. Thus, image enhancement techniques and an error correction algorithm are needed to improve the result of the watermarking system in this case.  And in the case of the image over LTE channel we observed the image there are some error which should be corrected by
  • 20. Conclusions  The coding and error correction algorithms are very important to increase the performance of any communication systems.  The watermarking system used over communication channel should should be robust to be able to extract that image.  The image sent over a channel may contain errors at the receiver end which can be corrected using error correcting techniques.