Free Essay

Watermark

In:

Submitted By kanthu
Words 2120
Pages 9
International Journal of Computer Applications (0975 – 8887) Volume 4– No.8, August 2010

Invisible Digital Watermarking Through Encryption
Samir Kumar Bandyopadhyay
Dept. of Computer Sc. & Engg, University of Calcutta 92 A.P.C. Road, Kolkata – 700009, India

Tuhin Utsab Paul
Dept. of Computer Sc. & Engg, University of Calcutta, 92 A.P.C. Road, Kolkata-700009, India

Avishek Raychoudhury
Dept. of Computer Sc. & Engg, University of Calcutta 92 A.P.C. Road, Kolkata-700009, India

ABSTRACT
Technique for hiding the data of images has been proposed in this paper. At the source, hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be adjusted by resize function. Secondly, only the final encrypted image i.e. cover image and target image is sent over the network. This image is finally decoded at the receiver end. Received results are encouraging from practical point of view.

keys, the relative entropy between encrypt and one specific decrypt key Yusuk Lim, Changsheng Xu and David Dagan Feng, 2001, developed the web based authentication system. In case of watermark embedding system, it is installed in the server as application software that any authorized user, who has access to server, can generate watermarked image. The distribution can use any kind of network transmission such as FTP, email etc. Once image is distributed to externally, client can access to authentication web page to get verification of image [2]. Min Wu and Bede Liu, June 2003, proposed [3] a new method which manipulates “flappable” pixels to enforce specific block based relationship in order to embed a significant amount of data without causing noticeable artifacts. The hidden data can then be extracted without using the original image and can also be accurately extracted after high quality printing and scanning with the help of a few registration marks. In 2007, Nameer N. EL-Emam proposed data security using LSB insertion steganographic method. In this approach, high security layers have been proposed through three layers to make it difficult to break through the encryption of the input data and confuse steganalysis too [4]. Rehab H. Alwan, Fadhil J. Kadhim, and Ahmad T. Al- Taani, 2005, have explained a method with three main steps. First, the edge of the image is detected using Sobel mask filters. Second, the least significant bit LSB of each pixel is used. Finally, a gray level connectivity is applied using a fuzzy approach and the ASCII code is used for information hiding. The prior bit of the LSB represents the edged image after gray level connectivity, and the remaining six bits represent the original image with very little difference in contrast. The given method embeds three images in one image and includes, as a special case of data embedding, information hiding, identifying and authenticating text embedded within the digital images [5]. Prof S. K. Bandyopadhyay, Debnath Bhattacharyya, Swarnendu Mukherjee, Debashis Ganguly, Poulami Das in 2008 has proposed a heuristic approach to hide huge amount of data using LSB steganography technique. The resultant stego-image was distortion less. Also, they have given much emphasis on space complexity of the data hiding technique [6]. G. Sahoo and R. K. Tiwari in 2008 proposed method works on more than one image using the concept of file hybridization. This particular method implements the cryptographic technique to embed two information files using steganography and due to this reason they have used a stego key for the embedding process [7]. In fact, the embedding of high-entropy data (often due to encryption) changes the histogram of colour frequencies in a predictable way. So, in order to obtain more security in our prescribed method, we have embedded an entire image behind another image of twice the size of target image for a remarkable change in the final image. 18

Keywords
Data, image, Hiding, Security, Encryption

1. INTRODUCTION
Invisible digital watermarks are a new technology which could solve the “problem” of enforcing the copyright of content transmitted across shared networks. They allow a copyright holder to insert a hidden message (invisible watermark) within images, moving pictures, sound files, and even raw text. Furthermore, the author can monitor traffic on the shared network for the presence of his or her watermark via network system. Because this method conceals both the content of the message (cryptography) and the presence of the message (steganography) an invisible watermark is very difficult to remove. Thereby, this technology could greatly strengthen the enforcement of copyright law on the Internet. Data hiding is defined as the process by which a message or image is imperceptibly embedded into a host or cover to get a composite signal. Generally, in encryption, the actual information is not maintained in its original format and thereby it is converted into an alternative equivalent multimedia file like image, video or audio, which in turn is being hidden within another object. This apparent message is sent through the network to the recipient, where the actual message is separated from it. In this paper, our first consideration is that of embedding information into image, which could survive attacks on the network. Next, digital embedding technique is proposed for hiding an image into another image in such a way that the quality of the recovered image improves significantly. In most of the algorithms designed based on the principle of data hiding, requires the sending original cover image along with the encoded cover image to the receiver. This approach makes the designed algorithm weaker as it conveys some idea of data hiding to the sender. But our method only the encrypted image will be sent to the receiver. The design of this technique is based on extensive analysis of the data-hiding process.

2. PREVIOUS WORKS
Miroslav Dobsicek [1] has developed method where the content is encrypted with one key and can be decrypted with several other

International Journal of Computer Applications (0975 – 8887) Volume 4– No.8, August 2010

3. PROPOSED WORK
Algorithms are basically implemented over normal bitmap image file, but it should be clarified that the same scheme can be extended to operate over other file formats also. The image file, which is to be hidden, is here referred as Target Image and the image behind which it is to be hidden is termed as Cover Image. The selection of neither the Target Image nor the Cover Image is constrained by any size limit. The Cover Image is zoomed twice of its original size using rowcolumn duplication scheme ie, say a pixel (x,y) is duplicated in {(x’, y’), (x’+1,y’), (x’,y’+1), (x’+1,y’+1)}. In next attempt, the entire Target Image will be hidden in the Cover Image starting from the first byte position of the Cover Image. The method for encryption can be personalized, i.e., can be selected according to the user needs. But, the authors specifically suggests this specialized scheme, proposed in this paper, as because here the information are no longer being merged or masked with another and instead of that keeping the pixel values of the Target Image as an encrypted information in the carrier, i.e., the Cover Image is altered to obtain resultant image which is taken as Final Image. Thus no essence of the actual information is retrained in the Final Image, whereas in usual methods of the mostly done bitwise merging; the information belongs in encrypted way directly merged into final object obtained. The stated Algorithm has got five distinct divisions: a. main function for each of the sender and receiver end which calls next sections; b. to resize the Cover Image in the size of the Target Image. c. to zoom the Cover Image in twice the size of the Target Image d. Encryption; e. Decryption. SENDER END APPROACH

3.1 Algorithms
3.1.1 SNDR_MAIN (Target Image, Cover Image)
This is the main function in our algorithm. This function will also be used in the sender side and will call other modules of our algorithm. Input: This function will take Target Image and Cover Image as input. Output: It will output the encoded stego-image.

3.1.2 RESIZE (PICTURE, SIZE)
This function is used in the algorithm to resize an image to obtain an image of the desired size from the input image. Input: This function will take the image, which has to be resized along with the desired image size, which is to be obtained after resizing. Output: This function outputs an image of desired size.

3.1.3 ZOOM (PICTURE, SIZE)
This function is used in the algorithm to zoom an image to obtain an image of the double size of the input image using row-column duplication technique. Input: This function will take the image, which has to be zoomed along with the desired image size, which is to be obtained after zooming. Output: This function outputs an image of desired size.

3.1.4 SNDR_ENC (PICTURE_1, PICTURE_2)
This function is used in the algorithm to encrypt an image with the help of another image to obtain an encrypted image. Input: This function will take the cover image (PICTURE_1) [Resized and Zoomed 4x] in which another image will be hidden i.e. the target image (PICTURE_2). Output: This function will output the stego-image as the final image.

3.1.5 RCVR_MAIN (STEGOIMAGE)
This is the main function in our algorithm. This function will be used in the receiver side and will call other modules of our algorithm. Input: This function will take StegoImage as input. RECIEVER END APPROACH Output: It will output the decoded Image.

3.1.6 RCVR_DCD (PICTURE_1)
This function is used in the algorithm to decrypt an image with the help of a key to obtain the final image. Input: This function will take the StegoImage (PICTURE_1) in which another image is hidden. Output: This function will output the TargetImage as the final image.

4. TEST RESULT 4.1 Complexity analysis of the stated algorithm
19

International Journal of Computer Applications (0975 – 8887) Volume 4– No.8, August 2010 In case of space complexity at the sender end, for cover image dimension mXn, after the zooming operation, the size becomes 2mX2n. So, for storing this zoomed image, space required=2m*2n=4mn,which is O(mn).The target image is then encrypted and stored in this zoomed image, which does not alter the space complexity. In the receiver end the decryption algorithm performs image scan in row wise order and generate the target image. Thus the time complexity order becomes O(mn). In case of space complexity at the receiver end, if the received image size is mXn, then the FinalImage is (m/2Xn/2). So, for storing the FinalImage space required=(m/2)*(n/2)=mn/4,which is O(mn). Receiver end:

4.2 Test Results
Sender End: Figure 4: Final Image (513x420)

5. CONCLUSION
The main advantage of our algorithm is that the final image can be derived only from the StegoImage. The original cover image is not needed for decoding the stego image. This provides less network transmission overhead as well as less scope of suspicion for the network intruder. Moreover this algorithm is free from size constrains i.e. it performs well on any size of the cover image or target image. The fourth pixel value of every quadrant of the stego image is free and using LSB modification can use it for transmission of additional data or DCT based method or any other method. Figure 1 :Cover Image (300x280)

6. REFERENCES
[1]

[2]

[3]

[4]

Figure 2: Targe Image(513x420)
[5]

[6]

[7]

Dobsicek, M., Extended steganographic system. In: 8th Intl. Student Conf. on Electrical Engineering, FEE CTU 2004, Poster 04. Yusuk Lim, Changsheng Xu and David Dagan Feng, “Web based Image Authentication Using Invisible Fragile Watermark”, 2001, Pan-Sydney Area Workshop on Visual Information Processing (VIP2001), Sydney, Australia, Page(s): 31 - 34 Min Wu, Member, IEEE, and Bede Liu, Fellow, IEEE, “Data Hiding in Binary Image for Authentication and Annotation”, IEEE Trans. Image Processing, volume 6, Issue 4, Aug. 2004 Page(s): 528 - 538 Nameer N. EL-Emam "Hiding a large amount of data with high security using steganography algorithm", Journal of Computer Science. April 2007, Page(s): 223 – 232 Rehab H. Alwan, Fadhil J. Kadhim, and Ahmad T. Al-Taani, “Data Embedding Based on Better Use of Bits in Image Pixels”, International Journal of Signal Processing Vol 2, No. 2, 2005, Page(s): 104 - 107 S.K.Bandyopadhyay, Debnath Bhattacharyya, Swarnendu Mukherjee, Debashis Ganguly, PoulumiDas, "A Secure Scheme for Image Transformation", August 2008, IEEE SNPD, Page(s): 490 – 493 G. Sahoo, R. K. Tiwari, "Designing an Embedded Algorithm for Data Hiding using Steganographic.

Figure 3: Stego Image (1026x840)

20

Similar Documents

Free Essay

Watermarking: Legalities of Digital Media

... V. A Simple Watermark: Patchwork VI. Current Work in Watermarking VII. Conclusion VIII. Works Cited Introduction It's no news to anyone that's reading this that the meteoric rise of the Internet in recent years has significantly increased the availability of all forms of media. Nowhere is this more obvious than in the realm of commercial musical recordings, where Napster and other internet-based distribution systems have made incredible volumes of musical content widely available, all without the consent of the music's originators. This situation, though, is not unique to the music industry, as photographers, filmmakers, and other content-originators all have the same problem to varying degrees. The solution, and even the need for a solution, to this problem of copyright infringement is still a topic that is open to great debate, but there is no debating the fact that some interesting and novel technology has been designed to help. Digital image watermarking, the practice of secretly embedding a piece of information in an image, is one of the more interesting of these technologies, and deserves some consideration. It is the purpose of this paper to give the reader an overview of watermarking and the diverse benefits that it offers. We begin with a brief history of watermarking and then go on to describe the basic components of any watermarking system, different uses for and characteristics of watermarking systems, types of attacks that watermarks are designed to...

Words: 3166 - Pages: 13

Premium Essay

Nt1310 Unit 5 Exercise 1

...To generate the watermark an input frame is scanned to compute the , which represents the 128-bit hash value MD5 cryptographic function. The watermark is nothing but the bits of digital signature of hash value and secretes key . In the initial stage we extract the frames from the video sequence. The watermark generation process shown in Fig. 2. is explained in following steps: 1. The hash value is initialized to some arbitrary fixed value. 2. The position of the Last Non Zero (LNZ) level for each block is stored so that it can be used while extracting the watermark. 3. The value of the JPEG quantization matrix corresponding to LNZ is set to 1 so that after embedding the watermark bit the pixel value vary by plus or minus 1 instead of plus or minus . This modification in quantizer value leads to less distortion in video signal....

Words: 708 - Pages: 3

Free Essay

How to Watermark

...LESSON PLAN Subject / Title Materials - list all required materials Objectives/ Learning Goals - identify all objectives, both direct and indirect Control of error (but only if obviously appropriate) Age range: Adult/child ratio: Date of Lesson: Time of Lesson: Anticipated duration: Setting: Pre-requisites: - identify the child(ren)’s previous knowledge/skills necessary to undertake this lesson. Advance preparation for the lesson: what the teacher needs to get ready for the lesson. Step by step guidelines: Write a plan for the lesson. Remember that anyone should be able to use this plan to present the lesson, so it is essential that the information is clear and detailed. Differentiation: Consider the needs of different children, different ages, special needs or where English is an additional language. Indicate any possible changes to the lesson plan. Implementation of the lesson Write a detailed implementation - everything that happened during the lesson – as soon as possible after the lesson. Following implementation of the lesson, please ask the person who permitted this lesson to sign and date the lesson plan. Signature of supervising teacher together with a confirmation of the date on which the lesson was implemented. ……………………………….…………………………………………………………….. Signature Date of implementation Evaluation of the implementation Complete...

Words: 298 - Pages: 2

Free Essay

Attacks on Image Watermark

...qwwde wer w etr ag a FQ WER FSD GT4 RQ AVSD GR WEF GR SDF SWF E GE WREQ WERGER AER AG GEGEQR EGGGG ERG E GQER ERG GEQR qwwde wer w etr ag a FQ WER FSD GT4 RQ AVSD GR WEF GR SDF SWF E GE WREQ WERGER AER AG GEGEQR EGGGG ERG E GQER ERG GEQR qwwde wer w etr ag a FQ WER FSD GT4 RQ AVSD GR WEF GR SDF SWF E GE WREQ WERGER AER AG GEGEQR EGGGG ERG E GQER ERG GEQR qwwde wer w etr ag a FQ WER FSD GT4 RQ AVSD GR WEF GR SDF SWF E GE WREQ WERGER AER AG GEGEQR EGGGG ERG E GQER ERG GEQR qwwde wer w etr ag a FQ WER FSD GT4 RQ AVSD GR WEF GR SDF SWF E GE WREQ WERGER AER AG GEGEQR EGGGG ERG E GQER ERG GEQR qwwde wer w etr ag a FQ WER FSD GT4 RQ AVSD GR WEF GR SDF SWF E GE WREQ WERGER AER AG GEGEQR EGGGG ERG E GQER ERG GEQR qwwde wer w etr ag a FQ WER FSD GT4 RQ AVSD GR WEF GR SDF SWF E GE WREQ WERGER AER AG GEGEQR EGGGG ERG E GQER ERG GEQR qwwde wer w etr ag a FQ WER FSD GT4 RQ AVSD GR WEF GR SDF SWF E GE WREQ WERGER AER AG GEGEQR EGGGG ERG E GQER ERG GEQR qwwde wer w etr ag a FQ WER FSD GT4 RQ AVSD GR WEF GR SDF SWF E GE WREQ WERGER AER AG GEGEQR EGGGG ERG E GQER ERG GEQR qwwde wer w etr ag a FQ WER FSD GT4 RQ AVSD GR WEF GR SDF SWF E GE WREQ WERGER AER AG GEGEQR EGGGG ERG E GQER ERG GEQR qwwde wer w etr ag a FQ WER FSD GT4 RQ AVSD GR WEF GR SDF SWF E GE WREQ WERGER AER AG GEGEQR EGGGG ERG E GQER ERG GEQR qwwde wer w etr ag a FQ WER FSD GT4 RQ AVSD GR WEF GR SDF SWF E GE WREQ WERGER AER AG GEGEQR EGGGG ERG E GQER ERG GEQR qwwde wer w etr ag a FQ WER FSD GT4 RQ AVSD GR WEF...

Words: 3840 - Pages: 16

Free Essay

Watermarking

...using Java decompilers[15], such as SourceAgain[2], Jad[14], Mocha[24], etc. In this situation, the Java program developer’s intellectual property will be infringed if a program user steals anyone else’s class file and builds it into his/her own program without the original programmer's permission. We call this copyright infringement a program theft, which is one of the reasons why many companies hesitate to use Java in the real software development. Although we have copyright law to prohibit the program theft, it is still very important for us to protect our Java program by ourselves [3]. This paper proposes a technique that discourages program theft by embedding Java programs with a digital watermark. Embedding a program developer's copyright notation as a watermark into Java class files will ensure the legal...

Words: 4625 - Pages: 19

Free Essay

Research

...additional help, search for “watermark” in the product help or on the Microsoft support site at http://support.microsoft.com.] A watermark is any text or graphic image (such as the “Draft” in the background of this document) that is printed to overlap existing text in a document. A logo printed lightly behind a letter or the word "Confidential" printed lightly on a contract are other examples of watermarks. The rotated “Draft” watermark on this page was created using the Word Art feature. You can insert pictures (such as a logo) from a file or using Clip Art. All three features can be found by clicking on Picture in the Insert menu. To view a watermark as it will appear on the printed page, click Print Layout on the View menu or click Print Preview on the File menu. The watermark will print on every page of this document, just like headers and footers. To edit the watermark or insert a new one, you need to click Header and Footer on the View menu. TO FORMAT A WORDART WATERMARK (LIKE THIS “DRAFT” EXAMPLE): Use the WordArt… command on the Format menu to choose your desired settings for your watermark. There are multiple tabs in that dialog. Use the “Colors and Lines” tab to set the color and transparency. (This “draft” sample uses light gray and 50% transparency.) Use the “Size” tab to set the watermark size and rotation. (Or, you can resize and rotate using your mouse and the “Free Rotate” button on the WordArt toolbar.) Use the “Layout” tab to set the watermark to appear behind your...

Words: 504 - Pages: 3

Free Essay

Areviewofwavelet

...A Review of Wavelet-domain Watermarking Techniques Mukul Salhotra, Shivam Maurya, Shashvat Jaiswal, Amit Kumar Singh Department of CS/ICT, Jaypee University of Information Technology Abstract--As networking continues to grow exponentially, the Intellectual Property Rights (IPR) can be obtained and reproduced easily. These threats create a high demand for a content protection technique such as digital watermarking; which is one of the most efficient ways to protect the digital properties in recent years. Image watermarking techniques are frequently applied in the transform and spatial domains to achieve desired secure and robust protection. This paper provides an overview of the wavelet-based watermarking techniques available for medical images until now. In this paper the major methods have been analyzed along with their advantages & disadvantages. Keywords: Discrete Wavelet Transform, Medical image watermarking, ROI, NROI, I. INTRODUCTION D igital watermarking has emerged as a research area that was originally focused on copyright protection. Also, it has been implemented in lot of domains, such as video, audio, image, and 3D graphic model. Despite the fact there are only a few medical oriented watermarking studies in the literature to date, digital watermarking will be a valuable tool for copyright protection with medical confidentiality protection, patient and examination-related information hiding, data integrity control and source identification, in Hospital Information...

Words: 3893 - Pages: 16

Premium Essay

Nihms

...Author manuscript; available in PMC 2013 January 03. Published in final edited form as: Nat Rev Microbiol. 2011 April ; 9(4): 244–253. doi:10.1038/nrmicro2537. The skin microbiome $watermark-text Elizabeth A. Grice and Julia A. Segre Genetics and Molecular Biology Branch, National Human Genome Research Institute, National Institutes of Health, Bethesda, Maryland, 20892–4442, USA. Abstract $watermark-text The skin is the human body’s largest organ, colonized by a diverse milieu of microorganisms, most of which are harmless or even beneficial to their host. Colonization is driven by the ecology of the skin surface, which is highly variable depending on topographical location, endogenous host factors and exogenous environmental factors. The cutaneous innate and adaptive immune responses can modulate the skin microbiota, but the microbiota also functions in educating the immune system. The development of molecular methods to identify microorganisms has led to an emerging view of the resident skin bacteria as highly diverse and variable. An enhanced understanding of the skin microbiome is necessary to gain insight into microbial involvement in human skin disorders and to enable novel promicrobial and antimicrobial therapeutic approaches for their treatment. $watermark-text The skin is an ecosystem composed of 1.8 m2 of diverse habitats with an abundance of folds, invaginations and specialized niches that support a wide range of microorganisms. The...

Words: 4523 - Pages: 19

Free Essay

Medical Images - Literature Review

...Literature Review When dealing with patients' sensitive medical records, it's always important how one also deals with medical images that should also be kept private. Health Insurance Portability and Accountability initiated on April 14, 2013 by the federal government, establishes all relevant standards to address the issue of privacy protection. The HIPAA requires for integrity and confidentiality in all of current, previous and future from hospitals, doctors, and other relevant professionals. In an era where digital technology has become of major importance, there is a series of medical images that can now be kept in digital format and become quite easy to retrieve, store and preserve. Watermarking – An Essential Aspect for the Protection of Medical Images A. Ethical reasons and relevant legislation define Medical Information Assurance & Watermarking Medical directions. USA's HIPAA and Europe's EC 95/46 Directive are the major legislations defining relevant directions. When dealing with medical information records, thus, which involve a series of clinical examinations, diagnoses, and EPR images, three major security attributes should be considered: • Confidentiality: only authorised users can view and evaluate medical information; • Availability: Scheduled accessing periods should be set when entering the information system containing the medical data; • Reliability: The information should be examined by authorised people and not changed by unauthorised...

Words: 2623 - Pages: 11

Free Essay

Lemob

...not all text may have been recognized. To remove this note, right-click and select "Delete table". This PDF was created using Adolix PDF Converter Demo . Register to remove this watermark! This PDF was created using Adolix PDF Converter Demo . Register to remove this watermark! = LE P-AGB eet une eeeiete renïebie deeeie quelques enneee evee dee beneñeee nen dietrìbuee de 5 E33 Forte augmentation den frais de áistrinntinn mais diminution des frais @administration 1 iinplications sur la pntitique conimerciaie This PDF was created using Adolix PDF Converter Demo . Register to remove this watermark! LEMDE! Capitm - Capitali - Réserves Rémunération das actionnaires privilégiés; QU at iïianariaaa rairwaaiis dans la société 5 rachat des aatiaaa privilégiés -SUG actions scticms ordinaires privilégiées 5011 aan aaa non (300 nun) 111 This PDF was created using Adolix PDF Converter Demo . Register to remove this watermark! LEMDEI Exercice cias le 31 décembre Eteneñoe not + Charges oaloulees Dotations aux amortissements Variation du BPR Stocks Emprunt bancaire {nei} Financement de Ieeaipensent {nei} Divicienaea vereea Reenat d`aetiana priviiegieea Fiux de financement Fiux nei de trésorerie This PDF was created using Adolix PDF Converter Demo . Register to remove this watermark! Las tlisi clé tréséréria générés par l’astiriité gpératignnéllé sant négatifs dé W45 an 2121143. il ast nnrrnal gua las tluni générés parfactivité ngératlonnéllé séiént parfois positifs...

Words: 1248 - Pages: 5

Premium Essay

Accounting

...P R E FAC E THE ACCOUNTING ENVIRONMENT Accounting is the most employable, sought-after major for 2009, according to entrylevel job site CollegeGrad.com. One reason for this interest is found in the statement by former Secretary of the Treasury and Economic Advisor to the President, Lawrence Summers. He noted that the single-most important innovation shaping our capital markets was the idea of generally accepted accounting principles (GAAP). We agree with Mr. Summers. Relevant and reliable financial information is a necessity for viable capital markets. Without it, our markets would be chaotic, and our standard of living would decrease. This textbook is the market leader in providing the tools needed to understand what GAAP is and how it is applied in practice. Mastery of this material will be invaluable to you in whatever field you select. Through many editions, this textbook has continued to reflect the constant changes taking place in the GAAP environment. This edition continues this tradition, which has become even more significant as the financial reporting environment is exploding with major change. Here are three areas of major importance that are now incorporated extensively into this edition of the text. A New Way of Looking at Generally Accepted Principles (GAAP) Learning GAAP used to be a daunting task, as it is comprised of many standards that vary in form, completeness, and structure. Fortunately, the profession has recently developed the Financial Accounting...

Words: 115901 - Pages: 464

Premium Essay

Fra Chapter 8

...C H A P T E R 8 VALUATION OF I NVE NTOR I E S : A COST-BASIS APPROAC H LEARNING OBJECTIVES After studying this chapter, you should be able to: •1 •2 •3 •4 •5 •6 •7 •8 •9 •10 Identify major classifications of inventory. Distinguish between perpetual and periodic inventory systems. Identify the effects of inventory errors on the financial statements. Understand the items to include as inventory cost. Describe and compare the cost flow assumptions used to account for inventories. Explain the significance and use of a LIFO reserve. Understand the effect of LIFO liquidations. Explain the dollar-value LIFO method. Identify the major advantages and disadvantages of LIFO. Understand why companies select given inventory methods. Inventories in the Crystal Ball A substantial increase in inventory may be a leading indicator of an upcoming decline in profit margins. Take the auto industry as an example. Detroit’s inventories have been growing for several years because the domestic manufacturers like to run the factories at full capacity, even if they are not selling cars as fast as they can make them. The current arrangement is particularly tough for General Motors. It overproduces and then tries to push the sales with incentives and month-long “blow-out” sales. GM is hoping that the ever-growing market will cover the problem until customer demand grows to the point where the cars are purchased without so many incentives. But recently, all that was growing was GM inventories...

Words: 30350 - Pages: 122

Premium Essay

Consolidation

...This watermark does not appear in the registered version - http://www.clicktoconvert.com 1 LESSON 1: INTRODUCTION TO FINAL ACCOUNT CONTENTS 1.0. Aims and Objectives 1.1 Introduction 1.1.1. Definition 1.2. Sundry Debtors 1.3. Sundry Creditors 1.4. Final Accounts 1.5. Trading Account 1.5.1. Balancing of Trading Account 1.6. Profit and Loss Account 1.7. Balance Sheet 1.7.1. Definition 1.7.2. Objectives of Balance Sheet 1.7.3. Assets 1.7.4. Liabilities 1.8. Difference between a Trial Balance and a Balance Sheet 1.9. Let Us Sum Up 1.10 Lesson end Activities 1.11. Points for Discussion 1.12. Model answer to “Check your Progress” 1.13. Suggested Reading / References/ Sources 1.0 AIMS AND OBJECTIVES At the end of the lesson you be able to: Ø Understand basics of Final Accounts Ø Understand the difference between Profit and Loss Account with Trial Balance Ø Understand how to prepare Balance Sheet 1.1 INTRODUCTION All business transactions are first recorded in Journal or Subsidiary Books. They are transferred to Ledger and balanced it. The main object of keeping the books of accounts is to ascertain the profit or loss of business and to assess the financial position of the business at the end of the year. The object is better served if the businessman first satisfies himself that the accounts written up during the year are correct or al least arithmetically accurate. When the transactions are recorded under double entry system, there is a credit for every debit, when on a/c is debited;...

Words: 19905 - Pages: 80

Premium Essay

Fundamentals of Accounting

...involved in double entry system 1.4.4 Advantages of double entry system 1.5 Meaning of Debit and Credit 1.6 Types of Accounts and its rules 1.6.1 Personal Accounts 1.6.2 Real Accounts 1.6.3 Nominal Accounts 1.7 Distinction between Book Keeping and Accounting 1.8 Branches of Accounting 1.8.1 Financial Accounting 1.8.2 Cost Accounting 1.8.3 Management Accounting 1.9 Let us Sum Up 1.10 Lesson-End Activities 1.11 Check your Progress 1.12 Points for Discussion 1.13 References 1.0 AIMS AND OBJECTIVES i) ii) To know the Meaning ,Definition and objective of Book- Keeping To study the objectives, functions, importance and limitations of Accounting iii) To understand the methods of Accounting, kinds of Accounts and Accounting rules. This watermark does not appear in the registered version - http://www.clicktoconvert.com 1 iv) To study the difference between Book- keeping and Accounting v) To study the various branches of Accounting 1.1 INTRODUCTION In all activities (whether business activities or non-business activities) and in all organizations (whether business organizations like a manufacturing entity or trading entity or non-business organizations like schools, colleges, hospitals, libraries, clubs, temples, political parties) which require money and other economic resources, accounting is required to account for these resources. In other words, wherever money is involved, accounting is required to account for it. Accounting is often called the language of business. The...

Words: 97819 - Pages: 392

Free Essay

Thesis

...This watermark does not appear in the registered version - http://www.clicktoconvert.com 1 BACHELOR OF COMPUTER APPLICATIONS (BCA) COBOL CONTENTS Syllabus UNIT –1 Lesson-1 Lesson-2 Lesson-3 Lesson-4 Lesson-5 Introduction to COBOL Divisions of COBOL Picture clause characteristics Editing Level Structure PAGE NO 1 9 16 20 26 UNIT – 2 Lesson-6 Lesson-7 Lesson-8 Lesson-9 Lesson-10 Data Movement verb: MOVE Arithmetic Verbs Input and Output Verbs Corresponding Options Programs using Arithmetic Verbs 30 34 41 48 54 UNIT – 3 Lesson-11 Lesson-12 Lesson-13 Lesson-14 Lesson-15 Conditions Conditionals Statements PERFORM statements RENAMES & REDEFINES Clauses Programs 60 70 77 82 86 UNIT– 4 Lesson-16 Lesson-17 Lesson-18 Lesson-19 Lesson-20 Sequential Files Direct Access Files Indexed Sequential Files Sorting and Merging of Files Programs 92 98 102 107 114 UNIT – 5 Lesson-21 Lesson-22 Lesson-23 Lesson-24 Lesson-25 Table Handling Indexed Tables & Index Names Search & Start Verbs Programs using OCCURS & Screen Section List of Programs 123 128 132 136 142 This watermark does not appear in the registered version - http://www.clicktoconvert.com 2 UNIT – I LESSON – 1: INTRODUCTION TO COBOL CONTENTS 1.0 Aims and Objectives 1.1 History of COBOL 1.2 FORMAT FOR COBOL PROGRAMS 1.3 STRUCTURE OF A COBOL PROGRAM 1.4 CHARACTER SET 1.5 COBOL WORDS ...

Words: 43822 - Pages: 176