Transcript

BY:- SUBRAT KUMAR MISHRA

RUBI KUMARI

INTRODUCTION

EXAMPLE OF WATERMARKING

VISIBLE WATERMARK

INVISIBLE WATERMARK

1.)Inversion attack.

2.)Copy attack .

TECHNIQUES OF WATERMARKINGCLASSIFICATION ACCORDING TO TYPE

OF DOMAIN IN WHICH DATA EMBEDDING TAKES PLACE

( 1.) SPATIAL DOMAIN .

-> LSB Modification .

Continued....CLASSIFICATION ACCORDING TO

ELIGIBILITY OF WATERMARK TO RESIST ATTACK .

(1.) FRAGILE WATERMARK .

(2.) ROBUST WATERMARK .

Continued....CLASSIFICATION ACCORDING TO THE

TYPE OF INFORMATION NEEDED IN THE EXTRACTION PROCESS .

(1.) BLIND WATERMARK SYSTEM .

(2.) NON-BLIND WATERMARK SYSTEM .

ParametersTransparencyRobustnessSecurityCapacityUndetectabilityEfficiency

Applications

Digital copyright protection

Fingerprinting

Medical ApplicationsLyric sync service

Copy ControlDevice ControlAuthentication & Integrity Verification

ConclusionDigital watermarking technology represents a data hiding techniques that is used to embed useful information in multimedia object.The proposed technique is classified on different criteria mainly on the domain to spatial domain watermarks, frequency domain watermarks and wavelet domain watermarks.Recently many proposed algorithms searches the use of watermarking for 3D object.The experimental result show that the proposed method is robust against approximately 70 % of attacks.

THANK YOU

top related