DSP IEEE 2016 Projects @ Chennai

Looking for Matlab 2016 Project,Click Here or Contact @ +91 9894220795/+9144 42647783.For more details visit www.verilogcourseteam.com


IEEE 2016 Projects @ Chennai


Year 2007
  • An OFDM-CDMA scheme for High Data Rate UWB applications
  • Time-Domain Signal Detection Based on Second-Order Statistics for MIMO-OFDM Systems.
  • Sequence Synchronization in a wideband CDMA  System
Year 2008
  • A Token-Based Scheduling Scheme for WLANs Supporting Voice/Data Traffic and its Performance Analysis
  • Adaptive Radio Resource Allocation for Downlink OFDMA/SDMA Systems with Multimedia Traffic
  • Coding Schemes Applied to Peak-to-Average Power Ratio (PAPR) Reduction in OFDM Systems
  • Cooperative Sensing for Primary Detection in Cognitive Radio
  • Design and Analysis of Bit Interleaved Coded Space-Time Modulation
  • Enhancing MB-OFDM Throughput with Dual Circular 32-QAM
  • Fast and Efficient QoS-Guaranteed Adaptive Transmission Algorithm in the Mobile WiMAX System
  • Filter Bank Spectrum Sensing for Cognitive Radios
  • Joint Optimum Linear Precoding and Power Control Strategies for Downlink MC-CDMA Systems
  • Efficient Spatial Covariance Estimation for Asynchronous Co-channel Interference Suppression in MIMO-OFDM Systems
  • Power Allocation for Two Different Traffics in Layered MIMO Systems
  • Performance Evaluation of the WiMedia PHY in WPAN Environments and Efficiency Improvement by Application of LDPC Codes
  • Variable Sub-carrier in OFDM to Reduce the ICI Due to Carrier Frequency Offset and IQ Imbalance
Year 2009
  • Ranging With Ultrawide Bandwidth Signals in Multipath Environments
  • Semisoft Handover Gain Analysis Over OFDM-Based Broadband Systems
  • Ultra-Wide-Band Propagation Channels
  • Pulsed-OFDM Modulation for Ultrawideband Communications
  • Grouping Technique for Cooperative Spectrum Sensing in Cognitive Radios
  • Implementation of the least squares channel estimation algorithm for MIMO-OFDM systems
  • Sequential Detection for Multiuser MIMO CDMA Systems with Single Spreading Code Per User
  • A Multicode Approach for High Data Rate UWB System Design
  • Replacement of Spectrum Sensing in Cognitive Radio
  • Variance-Reduced Partial Parallel Interference Cancellation for MC-CDMA Uplink Systems
  • A Closed-Form Blind CFO Estimator Based on Frequency Analysis for OFDM Systems
  • Eigenvalue based Spectrum Sensing Algorithms for Cognitive Radio
  • A New Parameter for UWB Indoor Channel Profile Identification
  • Cognitive Radio Sensing Architecture and A Sensor Selection Case Study
  • Cooperative Spectrum Sensing with Cluster-Based Architecture in Cognitive Radio Networks
  • Efficient Power Allocation for Coded OFDM Systems
  • Measurement Based Channel-Adaptive Video Streaming for Mobile Devices over Mobile WiMAX
  • Sparsity-Embracing Multiuser Detection for CDMA Systems with Low Activity Factor
  • Analysis and Comparison of Clipping Techniques for OFDM Peak-to-Average Power Ratio Reduction
  • Error control coding in wireless sensor networks
Year 2010
  • Bandwidth Exchange: An Energy Conserving Incentive Mechanism for Cooperation
  • Blind Matched Filtering for Multiple Input Multiple Output Transceivers
  • Estimation of Cubic Nonlinear Bandpass Channels in Orthogonal Frequency-Division Multiplexing Systems
  • Error-Resilient H.264/AVC Video Transmission Using Two-Way Decodable Variable Length Data Block
  • Simplified Multiaccess Interference Reduction for MC-CDMA With Carrier Frequency Offsets
  • Optical Communications Performance of Hybrid 34-Meter Microwave Antennas
  • Performance Analysis of Distributed Decision Fusion Using A Censoring Scheme in Wireless Sensor Networks
  • Gradient Descent Bit Flipping Algorithms for Decoding LDPC Codes
  • Efficacy of Multiband OFDM Approach in High Data Rate Ultra WideBand WPAN Physical Layer Standard using Realistic Channel Models
  • Carrier Frequency Offsets Problem in DCT-SC-FDMA System
  • Signal to Interference Ratio Based Handoff Management for Next-Generation Wireless Systems
  • Anti-Phishing detection of phishing attacks using Genetic Algorithm
  • Convolutional Codes in Two Way Relay Networks with Physical-Layer Network Coding
Year 2011
  • Low complexity PTS algorithm based on gray code and its FPGA implementation
  • Performance Analysis of MIMO-OFDM System Using QOSTBC Code Structure for M-QAM
  • Dynamic Dwell Timer for Hybrid Vertical Handover in 4G Coupled Networks
  • Exploiting Sparse User Activity in Multiuser Detection
  • IIR system identification using cat swarm optimization
  • Peak to Average Power Ratio (PAPR) Reduction in OFDM for a WLAN network Using SLM Technique
  • Suppression of Narrowband Interference in impulse radio based high data rate UWB WPAN communication system using NLOS Channel Model
  • Digital Fractional Order Savitzky-Golay Differentiator
  • A New Algorithm for Power Allocation in  MIMO-OFDM Systems  with a Beam-forming Scheme
  • Poly:A reliable and energy efficient topology control protocol for wireless
  • High user capacity collaborative code-division multiple access  
  • Phishing Website Detection and Optimization using Particle Swarm Optimization
Year 2012
  • Analysis and Design of Coding and Interleaving in a MIMO-OFDM Communication System
  • Optimum Clustered Pilot Sequence for OFDM Systems under Rapidly Time-Varying Channel
  • Performance Evaluation of Complex Wavelet Packet Modulation (CWPM) System over Multipath Rayleigh Fading Channel
  • Two-Way Amplify-and-Forward MIMO Relay Networks with Antenna Selection
  • A Frequency Offset Estimation and Compensation Scheme for  MB-OFDM UWB Modem 
  • Analysis and Design of Coding and Interleavingin a MIMO-OFDM Communication System  
  • Anti-Phishing Techniques:A Review 
  • Robust Fast Time-Varying Multipath Fading Channel  Estimation and Equalization for MIMO-OFDM Systems via Fuzzy Method
  • Design of frequency response masking FIR filter in the Canonic Signed Digit space using modified ABC Algorithm
Year 2013
  • Adaptive resource allocation for downlink grouped MC-CDMA systems with power and BER constraints
  • Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks
  • An Evolving Graph-Based Reliable Routing Scheme for VANETs
  •  An Incremental Hop Selection Scheme for Amplify-and-Forward Multi-Hop Networks
Year 2014
  • A Review of Exposure and Avoidance Techniques for Phishing Attack
  • Comparative Analysis of FBMC and OFDM Multicarrier Techniques for Wireless Communication Networks
  • Review of Phishing Detection Techniques 
  • Design and Analysis of Low-Complexity Multi-Antenna Relaying for OFDM-Based Relay Networks
Year 2015 
  • Survey on Phishing Attacks 
  • Performance of two dimensional asymmetrically and symmetrically clipping optical OFDM in AWGN
  • Comparative analysis of the BER performance of DWT OFDM over that of FFT OFDM in presence of phase noise
  • OFDM-Modulated Dynamic Coded Cooperation in Underwater Acoustic Channels
  • Underwater communication implementation with OFDM
  • A Survey on Channel Estimation in MIMO-OFDM Systems
  • Relative Analysis of Transceiver Diversity and Channel Estimation of MIMO OFDM
  • On the Sum Capacity of the Gaussian X Channel inthe Mixed Interference Regime
  • Min-Max Approximation of Transfer Functions With Application to Filter Design
  • New Robust Estimators of Correlation and Weighted Basis Pursuit
  • MIO:Enhancing Wireless Communications Security Through Physical Layer Multiple Inter-Symbol Obfuscation
 Year 2016
  • Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video Encoding
  • Golay-Correlator Window-Based Noise Cancellation Equalization Technique for 60-GHz Wireless OFDM-SC Receiver
  • Efficient Integer Frequency Offset Estimation Architecture for Enhanced OFDM Synchronization
  • Local Spectral Component Decomposition for Multi-Channel Image Denoising
  • McMAC: A Parallel Rendezvous Multi-Channel MAC Protocol
  • Performance of Coded Multi-Carrier DS-CDMA systems in Multi-path fading channels
  • Interference Rejection in Direct Sequence Spread Spectrum Communication Systems
  • Support vector machine based multi-view face detection and recognition-2004
  • Fingerprint Feature Extraction Based Discrete Cosine Transformation (DCT)-2006
  • Intensified fuzzy clusters for classifying plant, soil, and residue regions of interest from color images
  • Determination of Minutiae Scores for Fingerprint Image Applications
  • MRI brain image segmentation by multi-resolution edge detection and region selection
  • Recognition of human actions using motion history information extracted from the compressed video
  • Automated Classification of fMRI Data Employing Trial
  • Complex Wavelets and its application to Image Fusion
  • Genetic Algorithms for the Unsupervised Classification of Satellite Images
Year 2007
  • Color Image Segmentation Based on Mean Shift and Normalized Cuts
  • Hierarchical contour matching for dental X-ray radiographs
  • An Improving Model Watermarking with Iris Biometric Code
  • Lossless Video Sequence Compression Using Adaptive Prediction
  • A Leaf Recognition Algorithm for Plant Classification Using Probabilistic Neural Network
Year 2008
  • Active Learning Methods for Interactive Image Retrieval
  • Detecting Dominant Motions in Dense Crowds
  • Personal Authentication Based on Iris Texture Analysis
  • Robust Image Segmentation Algorithm Using Fuzzy Clustering Based on Kernel-Induced Distance Measure
  • Wearable Monitoring of Seated Spinal Posture
  • Design of a Distributed Traffic Monitoring System and Algorithm based on Web-camera
  • VisualRank: Applying PageRank to Large-Scale Image Search
  • Watermarking Relational Databases using Optimization Based Techniques
  • Fingerprint Verification Using SIFT Features
  • A Lossless Compression Scheme for Bayer Color Filter Array Images
  • Motion-Tracking for Hands-Free Mouse-Pointer Manipulation
  • Face Tracking and Recognition with Visual Constraints in Real-World Videos
  • An a contrario approach for outliers segmentation application to multiple sclerosis in MRI
  • An Unsupervised Technique Based on Morphological Filters for Change Detection in Very High Resolution Images
  • A Novel Segmentation Algorithm for Side-scan Sonar Imagery with Multi-Object
Year 2009
  • A Fast Image Compression Algorithm Based on SPIHT
  • Application of Support Vector Machine and Genetic Algorithm for Improved Blood Cell Recognition
  • Reconstruction Of Underwater Image By BISPECTRUM
  • Combined Wavelet-Domain and Motion-Compensated Video Denoising Based on Video Codec Motion Estimation Methods
  • Artificial Neural Network Based Automatic Face Parts Prediction System from Only Fingerprints
  • A Histogram Modification Framework and Its Application for Image Contrast Enhancement
  • New Statistical Detector for DWT-Based Additive Image Watermarking Using the Gauss–Hermite Expansion
  • Fast Query Point Movement Techniques for Large CBIR Systems.
  • A Video Coding Scheme Based on Joint Spatiotemporal and Adaptive Prediction
  • The Global K-Means Algorithm for Clustering in Feature Space
  • Towards Handwritten Mathematical Expression Recognition.
  • Content-Based Classification&Segmentation of Mixed Type Audio by Using MPEG Features
  • ECG Arrhythmia Classification with Support Vector Machines and Genetic Algorithm
Year 2010
  • Face Verification across Age Progression using Discriminative Methods
  • Frequency Compounding for Ultrasound Freehand Elastography
  • Satellite Image Resolution Enhancement Using Complex Wavelet Transform
  • Video sensor network for real-time traffic monitoring and surveillance
  • Error-Resilient H.264/AVC Video Transmission Using Two-Way Decodable Variable Length Data Block
  • IRIS Recognition Using Neural Network
  • A Secure Iris Image Encryption Technique Using Bio-Chaotic Algorithm
  • Relative Radiometric Correction of Cloudy Multitemporal Satellite Imagery
  • Region Duplication Detection Using Image Feature Matching
  • Content Based Image Retrieval using Hierarchical and K-Means Clustering Techniques
  • A rapid 3D seed-filling algorithm based on scan slice
Year 2011
  • A Point Feature-based Cylindrical Image Mosaic Method
  • Image Mosaics Algorithm Based on Feature-Block Matching
  • Modeling and Formalization of Fuzzy Finite Automata for Detection of Irregular Fire Flames
  • Real-time Sign Language Recognition based on Neural Network Architecture
  • Improved Biometric Recognition and Identification of human IRIS patterns using Neural Networks.
  • A robust detection algorithm for copy-move forgery in digital images
  • An Optimal Data Hiding Scheme With Tree-Based Parity Check
  • A Robust and Fast Video Copy Detection System Using Content-Based Fingerprinting
  • Matching Forensic Sketches to Mug Shot Photos
  • Automated classification of discrete human thoughts using functional magnetic resonance imaging (fMRI)
  • Automatic Road Detection Using MCSC
  • Dental biometrics Human identification based on teeth
  • Detection of Parked Vehicles Using Spatiotemporal maps
  • Text From Corners a Novel Approach to Detect Text and Caption in Videos
  • Automatic Segmentation of NewBorn Brain MRI using Mathematical Morphology
Year 2012
  • Artifacts Removal and Edge Detection of Digitally Compressed Images
  • Gender Recognition from Face Images with Local WLD Descriptor
  • Drowsiness Detection based on Eye Movement, Yawn Detection and Head Rotation
  • Index Codes for Multibiometric Pattern Retrival
  • A Bayesian Technique for Image Classifying Registration
  • A Joint Encryption Watermarking System for erifying the Reliability of Medical Images
  • Framelet-Based Blind Motion Deblurring From a Single Image
  • Image Segmentation using Fuzzy Rule Based
  • Index Codes for Multibiometric Pattern Retrieval
  • In-painting approach to repair cracked images
  • Multistage Image Clustering and Segmentation with Normalised Cuts
Year 2013
  • Image steganography in DWT domain using double-stegging with RSA encryption
  • Spine Image Fusion via Graph Cuts
  • Heterogeneous Face Recognition Using Kernel Prototype Similarities
  • 3D Face Recognition under Expressions,Occlusions, and Pose Variations
  • A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique
  • Detection and Removal of Cracks in Digitized Paintings
  • Emotion recognition from geometric facial features using self-organizing map
  • Image Adaptive Enhancement Strategy Based on Neural Network
  • Cellular Automata for unsupervised remotely sensed data classification 
  • Computerized Detection of Lung Nodules by Meansof “Virtual Dual-Energy” Radiography 
  • Separable Reversible Data Hiding Using Rc4 Algorithm
  • Superpixel Classification Based Optic Disc and Optic Cup Segmentation for Glaucoma Screening
  • Video Object Tracking in the Compressed Domain Using Spatio-Temporal Markov Random Fields
  • Wavelet-Based ECG Steganography for Protecting Patient Confidential Information in Point-of-Care Systems
Year 2014
  • Image Fusion Based On Wavelet Transform 
  • Localization of License Plate Number Using Dynamic Image Processing Techniques and Genetic Algorithms
  • A New Secure Image Transmission Technique via Secret-Fragment-Visible Mosaic Images by Nearly Reversible Color Transformations
  • Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution 
  • Detection of Lung Cancer using Sputum Image Segmentation 
  • An ultrasound image enhancement method using local gradient based fuzzy similarity
  • Content Based Image Retrieval Using Interactive Genetic Algorithm 
  • Satellite Image Fusion using Fast Discrete Curvelet Transforms
  • Activity Recognition in Egocentric Life-logging Videos
Year 2015
  • Second Facial Expression Recognition and Analysis Challenge
  • Multi-view Face Detection Using Deep Convolutional Neural Networks
  • A Review on-Image Fusion using Wavelet Transform
  • Automatic Vehicle Number Plate Recognition for Vehicle Parking Management System
  • Improving Dermoscopy Image Classification Using Color Constancy
  • Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture
  • An Efficient SIFT-Based Mode-Seeking Algorithm for Sub-Pixel Registration of Remotely Sensed Images
  • Combining Facial Dynamics With Appearance for Age Estimation
  • Edge-Preserving Image Denoising via Group Coordinate Descent on the GPU
  • Event Oriented Dictionary Learning for Complex Event Detection
  • Tree Leaves Extraction in Natural Images:Comparative Study of Preprocessing Tools and Segmentation Methods
  • Undersampled Face Recognition via Robust Auxiliary Dictionary Learning 
  •  EMR-A Scalable Graph-based Ranking Model for Content-based Image Retrieval
Year 2016
  • A new intra prediction with adaptive template matching through finite state machine
  • Bitplane Image Coding With Parallel Coefficient Processing
  • Enhancing Sketch-Based Image Retrieval by Re-Ranking and Relevance Feedback
  • Representation Learning of Temporal Dynamics for Skeleton-Based ActionRecognitio
  • Robust Face Sketch Style Synthesis
  • Speech Emotion Recognition Based on HMM AND SVM-2005
  • Improving the intelligibility of dysarthric speech-2007
  • Content-Based Music Information Retrieval: Current Directions and Future Challenges-2008
  • An Overview of Text-Independent Speaker Recognition: from Features to Supervectors-2009
  • ECG Arrhythmia Classification with Support Vector Machines and Genetic Algorithm-2009
  • Epileptic Seizure Detection in EEGs Using Time–Frequency Analysis-2009
  • Speech Enhancement Using Harmonic Emphasis and Adaptive Comb Filtering-2010
  • Implementing a Speech Recognition System Interface for Indian Languages-2010
  • Calibration of Confidence Measures in Speech Recognition-2011
  • Broad Acoustic Classification of Spoken Hindi Hybrid Paired Words using Artificial Neural Networks-2012
  • Design and Development of a Malayalam to English Translator-2012
  • Speech and Speaker Recognition System using Artificial Neural Networks and Hidden Markov Model-2012
  • Multiclass epileptic seizure classification using time- frequency analysis of EEG signals-2012 
  • Audio Watermarking Via EMD-2013 
  • Intelligibility enhancement of HMM generated speech in additive noise by modifying Mel cepstral coefficients to increase the glimpse proportion-2013
  • Audio Steganography using RSA Algorithm and Genetic based Substitution method to Enhance Security-2014
  • GA-based Approach with Reduced RSA Encryption Security for Audio Steganography-2014
  • DUCHA: A New Dual-channel MAC Protocol for Multihop Ad Hoc Networks-2006
  • Adaptive Routing in Dynamic Ad Hoc Networks-2008
  • Cooperative MIMO-Beamforming For Multiuser Relay Networks-2009
  • A Medium Access Control Scheme for TDD-CDMA Cellular Networks with Two-Hop Relay Architecture-2009
  • Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths-2009
  • A Matrix-Based Pairwise Key Establishment Scheme for Wireless Mesh Networks Using Pre Deployment Knowledge-2013 
  • A Clustering Routing Protocol for Energy Balance of Wireless Sensor Network based on Simulated Annealing and Genetic Algorithm-2014

The above listed topics are just for reference. If you have any new Ideas/Papers send to us at info@verilogcourseteam.com or Call +91 98942 20795.



MULTICARRIER code division multiple access (MCCDMA) is one of the promising techniques for fourth generation wireless mobile communication systems. MCCDMA has several advantages, such as efficient spectrum utilization and immunity to multipath impairment. One major drawback associated with MC-CDMA is that multiuser detection is often necessary to overcome the multiple access interference (MAI) problem in uplink systems. Many multiuser detection approaches have been proposed in the literature .Among them, multistage parallel interference cancellation (PIC) has received great attention because of its low complexity and low processing latency, but it fails to guarantee performance improvement with more interference cancellation (IC) stages in moderate to high system load environments. To alleviate this problem, Divsalar et al. proposed the partial PIC (PPIC) detector, which first estimates MAI and then partially cancels it from the received signal on a stage-by-stage basis. Moshavi also indicated in that linearly combining soft tentative decisions of each IC stage can reduce the variance of the signal estimate, which will generate more reliable MAI estimates. As revealed in, a bit estimator that linearly combines the soft decisions from previous stages at a given stage for interference cancellation is inherently used by the PPIC approach. Therefore, the PPIC approach outperforms the PIC approach. Because the PPIC detector introduces weighting factors (WFs) to each IC stage, the performance depends highly on the choice of them. For good performance, two optimal WF (OWF) selection schemes based on analyzing the bit-error-rate (BER) were proposed for CDMA systems. However, the complexity of BER analysis increases greatly with the number of IC stages, and these approaches generally are not suitable for applications with more than two IC stages.

In this project, an improved version of PPIC, called variance-reduced PPIC (VRPPIC),for C-CDMA uplink systems. First,the main PPIC operations, where (the number of active users) multiplications of the original PPIC scheme are replaced with additions for each IC stage.Then we derive VRPPIC based on this simplified PPIC, where a new bit estimator is used for linearly combining soft tentative decisions from PPIC to reduce the conditional variance of the final signal estimate. In addition, an OWF selection algorithm for VRPPIC based on minimizing a conditional variance function of the final signal estimate. With the monotonically increasing property of the conditional variance function, it is shown that the OWFs for all IC stages are equal and can be approximately expressed as a linear function of the number of active users. Computer simulation results show that the proposed VRPPIC using the derived OWFs significantly improves the system performance.





Edge detection is a fundamental tool used in most image processing applications to obtain information from the frames before feature extraction and object segmentation. This process detects outlines of an object and boundaries between objects and the background in the image. Beyond that, Edge Detection refers to the process of identifying and locating sharp discontinuities in intensities in an image. The discontinuities are abrupt changes in pixels intensity which characterize boundaries of objects in a scene structure. This process significantly reduces the amount of date in the image, while preserving the most important structural feature of that image. Edge detection is considered to be the ideal algorithm for images that are corrupted with white noise. The Edge is characterized by its height, slope angle,and horizontal coordinate of the slope midpoint. An ideal Edge Detector should produce an edge indication localized to a single pixel located at the midpoint of the slope.There are many ways to perform Edge detection. However, the majority of different methods may be grouped into two categories, gradient and Laplacian. The basic Edge detection operator is a matrix area gradient operation that determines the level of variance between different pixels. The edge detection operator is calculated by forming a matrix centered on a pixel chosen as the centre of the matrix area. If the value of the matrix area is above a given threshold, then the middle pixel is classified as an edge. Examples of gradient based edge detectors are Roberts, Prewitt and Sobel operators. All the gradient –based algorithms have Kernel operators that calculate the strength of the slope in directions that are orthogonal to each other, generally horizontal and vertical.
The requirements that the algorithms must meet are:
a) Show the effectiveness and the noise resistance for remote sensing image.
b) Satisfying real time-constraints, and minimizing hardware resources in order to meet embedding requirements.
c) Significantly reducing the amount of date and filters out useless information.

Classically, Edge detection algorithms are implemented on software. With advances in the VLSI technology hardware implementation has become an attractive alternative. Assigning complex computation tasks to hardware and exploiting the parallelism and pipelining in algorithm yield significant speedup in running times. Implementation image processing on reconfigurable hardware minimizes the time-to-market cost, enables rapid prototyping of complex algorithm and simplifies debugging and verification.




We using one algorithm of the discrette wavelet transformation DWT, which sends itself in wise Haar for performing in water sign. The discrette wavelet transformation is relatively new notion, which wants to change the purpose (Or Filler) Broad used discrette transformation of the cosine (DCT) that uses itself in Compression JPEG. The Purpose a method on this in use biometric discriminating line is provided digital scene. The Copyright Protection- digital scene offers the method with use one Bio measured feature,and as follows: iris-play-off owner, who identifies his(its) synonymy Embedding watermark.The Input signal elements are a transport image, which must be protected for this method, watermark has took into consideration include. She standing with compute the rubbish for iris-play-off of the code of the pattern human. The Algorithm,which is elected to be an execution, which lifted contribution uses the obvious wave transformation so it is named transformation Haar, what include the water volumes of the mark in seconds level wavelets(2- two levels DWT), and two levels HL2 and two justify LH2 region. Since the message defines on these level information in less degree on image because of this also change (include the noise) on image and they will less. Here, it is necessary to addiction as is mentionned also in picture-machine and quality on water mark. This dependency solves as information, e.g. volume on water mark, can change without visibility of the garbling the rebel against transport image.The Used watermark in offered models - also digital image, which is elected to be on to grey scale of the format BMP.

The Number water sign must be according to with size transport image, this can be gained program. In undefended event this not carry in checkmore lung completion doubtful displacement to be capable observer changes quality introductions to other frame-transport and other water sign.For embedding the watermark is using setup the generator of whatever worth's uses itself, as he is installed with respect to chosen by us switch e. g. this hash worth had calculated for the concrete iris-code. The used hash function is MD 5 (Algorithm 5 Message Digest), from which we receive 128-BIT code. Each Hash value will be different on the different pictures to irises - but the goal is alone worth for digests is being got here unique worth for Iris code.