Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14

Report of Capstone Project Planning

By

STUDENT FULL NAME


Enrollment No:

Submitted in partial fulfillment of the requirement for


Diploma in Artificial Intelligence and Machine Learning
Of

Maharashtra State Board of Technical Education


Mumbai

Department of Artificial Intelligence and Machine Learning,


Marathwada Institute of Technology (Polytechnic),
Chhatrapati Sambhajinagar.
2023- 2024
CERTIFICATE

This is to certify that the Capstone Project Planning Report

Submitted by

STUDENT NAME
Enrollment No:

Is completed as per the requirement of the Maharashtra State Board of


Technical Education, Mumbai in partial fulfillment of
Diploma
in
Artificial Intelligence and Machine Learning

For the academic Year 2023 – 2024

Prof. X Y Z Prof. R. D. Deshpande


Mentor Head of the Department

Prof.S.G.Deshmukh
Principal
ABSTRACT
With the rapid growth and internet and networks techniques, multimedia
data transforming and sharing is common to many people. Multimedia
data is easily copied and modified, so necessarily for copyright protection is
increasing. It is the imperceptible marking of multimedia data to “brand”
ownership. Digital watermarking has been proposed as technique for
copyright protection of multimedia data.

Digital watermarking invisibly embeds copyright information into


multimedia data. Thus, digital watermarking has been used for copyright
protection, finger protection, fingerprinting, copy protection, and
broadcast monitoring. Common types of signals to watermark are images,
music clips and digital video. The application of digital watermarking to still
images is concentrated here. The major technical challenge is to design a
highly robust digital watermarking technique, which discourages copyright
infringement by making the process of watermarking removal tedious and
costly.
INDEX
INDEX

CHAPTER PAGE
TITLE
NO. NO.
Abstract i
Index ii
List of Figures iii
List of Tables iv
Acknowledgment v

1 Introduction 1
2 Software and Hardware Required
3 Proposed Approach
2.1 Architecture
2.2 System Design
2.3 Procedure along with algorithms followed
2.4 Individual Contribution
4 Testing
5 Result and Discussion
6 Conclusion and future Scope
REFERENCES
List of Figures

PAGE
Sr. No. Name of Figure
NO.
1
2
3
4
5
6
7
8
9
10
List of Tables

PAGE
Sr. No. Name of Table
NO.
1
2
3
4
5
6
7
8
9
10
ACKNOWLEDGMENT

I take this opportunity to express my heartfelt gratitude towards the Department of

Artificial Intelligence and Machine Learning, Marathwada Institute of Technology

(Polytechnic), Chhatrapati Sambhajinagar that gave me an opportunity for presentation

and submission of my Capstone Project Planning Report.

I am grateful to Prof. Name of Mentor, Lecturer, Artificial Intelligence and

Machine Learning Department for his constant encouragement and patience throughout

this presentation and submission of the Capstone Project Planning report.

I express my gratitude to Prof. R. D. Deshpande, Head of Artificial Intelligence and

Machine Learning Department and Prof. S. A. Shendre, Coordinator for their constant

encouragement, co-operation and support.

I must express my sincere thanks to Prof. S.G.Deshmukh, Principal, (Marathwada

Institute of Technology (Polytechnic), Chhatrapati Sambhajinagar and my professors and

colleagues who helped me directly or indirectly in completion of my report.

Name of Student
Artificial Intelligence and Machine Learning
MIT Polytechnic, Chh. Sambhajinagar
1. Introduction

1.1 WHAT IS WATERMARKING ON DATBASE?


Watermarking in a database refers to the practice of adding a hidden, embedded, or
otherwise inconspicuous mark or tag to data to track its usage, detect unauthorized
access, or enforce data security policies. Watermarking can be used in various contexts,
including database security and copyright protection.

1.2 HOW WATERMARKING ON DATBASE WORKS?

Figure 1.1

Watermarking a database typically involves the process of embedding or associating


some form of unique and hidden information with the data stored in the database. The
purpose of this watermark can vary, from tracking data usage to enforcing copyright
protection or monitoring unauthorized access.
1.3 WHAT IS AN WATERMARK?
A watermark is a recognizable, often translucent design, pattern, or text that is
intentionally added to a digital image, document, or other form of media.
Watermarks serve several purposes, including indicating ownership, protecting
intellectual property, and preventing unauthorized use or distribution of the content.
They can be either visible or invisible, depending on their intended function and
visibility.

1.4 HOW A WATERMARKING DATBASE IS FORMED?


Creating a watermarking database involves embedding watermarks into the data
stored in the database for various purposes, such as copyright protection, data
tracking, or security. Here's an overview of how a watermarking database is formed:

1. Select Data for Watermarking:


Determine which data in the database needs watermarking. This may include specific
records, columns, or files, depending on your objectives.

2.Choose a Watermarking Technique:


1. Select the appropriate watermarking technique based on your goals. Common
techniques include:
 Visible Watermarking: Overlaying visible marks like text, logos, or symbols on the
data to indicate ownership or copyright.
 Invisible Watermarking: Embedding information within the data in a way that is
not immediately apparent, often for tracking and identification.

3.Embed the Watermark:


 Apply the chosen watermarking technique to the selected data. The method for
embedding the watermark will depend on the specific technique used.
 For visible watermarks, you would overlay the mark on the data.
 For invisible watermarks, you might alter specific bits or embed information in a
way that doesn't affect the visual appearance.
1.5 WHY WATERMARKING ON DATABASE PROCESSING REQUIRED
Watermarking in the context of database processing refers to the practice of
embedding some form of metadata or identification information into the data
stored in a database. This watermark can serve several important purposes.
 Data Provenance: Watermarking helps establish the origin and ownership
of the data. It can be crucial for tracking data sources, ensuring data
integrity, and preventing unauthorized data distribution. This is especially
important in applications where multiple parties may have access to the
database.
 Data Security: Watermarking can deter data breaches and unauthorized
access. If a watermark contains information about the owner or source of
the data, it can act as a deterrent to potential data thieves.
 Data Tamper Detection: Watermarks can be used to detect unauthorized
changes or tampering with the data. By checking the watermark against a
reference value, you can quickly determine if the data has been altered.

2. SOFTWARE AND HARDWARE REQUIREMENTS

SR no. Software Require Description


1. Jupyter Notebook Jupyter Notebook is a web-based,
interactive computing environment
that combines code execution, rich-
text documentation, and data
visualization, making it ideal for data
analysis and scientific research
3. Proposed Approach

3.1 – Architecture
REFERENCE

1. https://en.wikipedia.org
2. www.engineeringarticles.org

You might also like