Digital Watermarking Ppt

Preview:

Citation preview

SEMINAR on

DIGITAL WATERMARKING

Digital Watermarking

Introduction and history Terminologies Framework Techniques/Types Reuirements

Limitations Applications

What is digital watermarking..??

Digital watermarking is the process of embedding “information” into a digital media without compromising the media’s value in a way that it is difficult to remove.

The term ‘watermark’watermark’ was introduced near the end of the 18th century. It was probably given because the marks resemble the effects of water on paper.

History in brief… Was used in ancient Italy for indicating the paper brands and name of mills. In 18th century to prevent money counterfeting. The first example of a similar technology was done by Emil Hembrooke in 1954 for identifying music works. Later it was used by Komatsu and Tominaga in 1988.

Terminologies… Steganography Watermarking Data hiding and data embedding Copy protection Copyright protection

Terminologies… Steganography-is an art,science,study, work of communicating in a waywhich hides a secret message in the main information.

Steganography methods rely generally on the assumption that the existence of the covert data is unknown to unauthorized parties and are mainly used in secret point-to-point communication between trusting parties.

Terminologies… Watermarking- as opposed to

steganography – in an ideal world can resists attacks. Thus, even if the existence of the hidden information is known, it should be difficult for an attacker to remove the embedded watermark, even if the algorithmic principle is known.

Terminologies… Copy protection- attempts to find ways, which limits the access to copyrighted material and/or inhibit the copy process itself. Copyright protection- inserts copyright information into the digital object without the loss of quality. Whenever the copyright of a digital object is in question, this information is extracted to identify the rightful owner.

Framewrok

Watermarking is the process that embeds data called ‘watermark’ into a media such that watermark can be detected or extracted later to make an assertion about the media. For example, digital watermarking technique for images is to add a visible seal to the existing image.

A general watermarking system…

Watermarking techniques… According to the working domain According to the type of document According to the human

perception According to the application

Spatial domain Is applied to graphic images and

text. Slightly modifies the pixels of one or

two randomly selected subsets of an image.(generally the lower bits).

However, not reliable when subjected to normal media operations such as filtering or lossy compression.

Frequency domain also called transform domain. Values of certain

frequencies(normally low) are altered from their original.

The watermark is applied to the whole image so as not to be removed during a cropping operation and also to make its verification difficult.

Visible and Invisible watermarking Visible watermark is a secondary

translucent overlaid into the primary image

The invisible-robust watermark is embedded in such a way that alternations made to the pixel value are perceptually not noticed .

The invisible-fragile watermark is embedded in such a way that any manipulation or modification of the image would alter or destroy the watermark.

Fragile watermarking technique A watermark is said to be fragile if

the watermark hidden within the host signal is destroyed as soon as the watermarked signal undergoes any manipulation.

When a fragile watermark is present in a signal, we can infer, with a high probability, that the signal has not been altered.

Robust watermarking Robust watermarks are those which

can survive signal manipulations. Can withstand mallicious attacks

and signal processing too. Thus recommended for those

media which need to undergo during lossy compressions

Some other techniques Text line,word or charcter shifting.

Boundary modifications. Least significant bit alterations.

Digital watermarking - Requirements

The watermark should exibit certain characterstics.These include that the watermark is difficult to notice, survives common distortion,resists malicious attacks, carry many bits of information, can coexist with otherwatermarks, and requires little computation to insert or detect.

Technically… Fidelity(imperceptibility)

Robustness

Fragility

Modification and multiple watermarks

Attacks on the watermarks The attacks on the digital

watermarking can broadly be classified in two types:

Attacks on the signal. Cryptographic attacks.

Attacks on signal The majority of the attacks are

related to the watermark signal itself .

They intend to remove the mark, or somehow mask it.

These techniques can rely on the structure of the embedding algorithm to know where and how the watermark was incrusted.

Cryptolographics Attacks Some attacks try not to access the

watermark, but to modify its interpretation.

This is quite general applicability and possesses the initially remarkable property that a marked image for example can be unmarked and yet still rendered pixel for pixel in exactly the same way as the marked image by a standard browser.

Applications Signature Fingerprinting Broadcast and internet monitoring Autentication and integrity Copy and copyright protection Covert communication

By - Priyanka Raj charan Cs 5b 0114cs081089

Queries….???

Recommended