27
SEMINAR on DIGITAL WATERMARKING

Digital Watermarking Ppt

Embed Size (px)

Citation preview

Page 1: Digital Watermarking Ppt

SEMINAR on

DIGITAL WATERMARKING

Page 2: Digital Watermarking Ppt

Digital Watermarking

Introduction and history Terminologies Framework Techniques/Types Reuirements

Limitations Applications

Page 3: Digital Watermarking Ppt

What is digital watermarking..??

Digital watermarking is the process of embedding “information” into a digital media without compromising the media’s value in a way that it is difficult to remove.

The term ‘watermark’watermark’ was introduced near the end of the 18th century. It was probably given because the marks resemble the effects of water on paper.

Page 4: Digital Watermarking Ppt
Page 5: Digital Watermarking Ppt

History in brief… Was used in ancient Italy for indicating the paper brands and name of mills. In 18th century to prevent money counterfeting. The first example of a similar technology was done by Emil Hembrooke in 1954 for identifying music works. Later it was used by Komatsu and Tominaga in 1988.

Page 6: Digital Watermarking Ppt

Terminologies… Steganography Watermarking Data hiding and data embedding Copy protection Copyright protection

Page 7: Digital Watermarking Ppt

Terminologies… Steganography-is an art,science,study, work of communicating in a waywhich hides a secret message in the main information.

Steganography methods rely generally on the assumption that the existence of the covert data is unknown to unauthorized parties and are mainly used in secret point-to-point communication between trusting parties.

Page 8: Digital Watermarking Ppt

Terminologies… Watermarking- as opposed to

steganography – in an ideal world can resists attacks. Thus, even if the existence of the hidden information is known, it should be difficult for an attacker to remove the embedded watermark, even if the algorithmic principle is known.

Page 9: Digital Watermarking Ppt

Terminologies… Copy protection- attempts to find ways, which limits the access to copyrighted material and/or inhibit the copy process itself. Copyright protection- inserts copyright information into the digital object without the loss of quality. Whenever the copyright of a digital object is in question, this information is extracted to identify the rightful owner.

Page 10: Digital Watermarking Ppt

Framewrok

Watermarking is the process that embeds data called ‘watermark’ into a media such that watermark can be detected or extracted later to make an assertion about the media. For example, digital watermarking technique for images is to add a visible seal to the existing image.

Page 11: Digital Watermarking Ppt

A general watermarking system…

Page 12: Digital Watermarking Ppt

Watermarking techniques… According to the working domain According to the type of document According to the human

perception According to the application

Page 13: Digital Watermarking Ppt
Page 14: Digital Watermarking Ppt

Spatial domain Is applied to graphic images and

text. Slightly modifies the pixels of one or

two randomly selected subsets of an image.(generally the lower bits).

However, not reliable when subjected to normal media operations such as filtering or lossy compression.

Page 15: Digital Watermarking Ppt

Frequency domain also called transform domain. Values of certain

frequencies(normally low) are altered from their original.

The watermark is applied to the whole image so as not to be removed during a cropping operation and also to make its verification difficult.

Page 16: Digital Watermarking Ppt

Visible and Invisible watermarking Visible watermark is a secondary

translucent overlaid into the primary image

The invisible-robust watermark is embedded in such a way that alternations made to the pixel value are perceptually not noticed .

The invisible-fragile watermark is embedded in such a way that any manipulation or modification of the image would alter or destroy the watermark.

Page 17: Digital Watermarking Ppt

Fragile watermarking technique A watermark is said to be fragile if

the watermark hidden within the host signal is destroyed as soon as the watermarked signal undergoes any manipulation.

When a fragile watermark is present in a signal, we can infer, with a high probability, that the signal has not been altered.

Page 18: Digital Watermarking Ppt

Robust watermarking Robust watermarks are those which

can survive signal manipulations. Can withstand mallicious attacks

and signal processing too. Thus recommended for those

media which need to undergo during lossy compressions

Page 19: Digital Watermarking Ppt

Some other techniques Text line,word or charcter shifting.

Boundary modifications. Least significant bit alterations.

Page 20: Digital Watermarking Ppt

Digital watermarking - Requirements

The watermark should exibit certain characterstics.These include that the watermark is difficult to notice, survives common distortion,resists malicious attacks, carry many bits of information, can coexist with otherwatermarks, and requires little computation to insert or detect.

Page 21: Digital Watermarking Ppt

Technically… Fidelity(imperceptibility)

Robustness

Fragility

Modification and multiple watermarks

Page 22: Digital Watermarking Ppt

Attacks on the watermarks The attacks on the digital

watermarking can broadly be classified in two types:

Attacks on the signal. Cryptographic attacks.

Page 23: Digital Watermarking Ppt

Attacks on signal The majority of the attacks are

related to the watermark signal itself .

They intend to remove the mark, or somehow mask it.

These techniques can rely on the structure of the embedding algorithm to know where and how the watermark was incrusted.

Page 24: Digital Watermarking Ppt

Cryptolographics Attacks Some attacks try not to access the

watermark, but to modify its interpretation.

This is quite general applicability and possesses the initially remarkable property that a marked image for example can be unmarked and yet still rendered pixel for pixel in exactly the same way as the marked image by a standard browser.

Page 25: Digital Watermarking Ppt

Applications Signature Fingerprinting Broadcast and internet monitoring Autentication and integrity Copy and copyright protection Covert communication

Page 26: Digital Watermarking Ppt

By - Priyanka Raj charan Cs 5b 0114cs081089

Page 27: Digital Watermarking Ppt

Queries….???