Top Banner
SEMINAR on DIGITAL WATERMARKING
27

43612872 Digital Watermarking Ppt

Apr 28, 2015

Download

Documents

Pranusha Adivi
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 43612872 Digital Watermarking Ppt

SEMINAR on

DIGITAL WATERMARKING

Page 2: 43612872 Digital Watermarking Ppt

Digital Watermarking

Introduction and history Terminologies Framework Techniques/Types Reuirements

Limitations Applications

Page 3: 43612872 Digital Watermarking Ppt

What is digital watermarking..??

Digital watermarking is the process of embedding “information” into a digital media without compromising the media’s value in a way that it is difficult to remove.

The term ‘watermark’watermark’ was introduced near the end of the 18th century. It was probably given because the marks resemble the effects of water on paper.

Page 4: 43612872 Digital Watermarking Ppt
Page 5: 43612872 Digital Watermarking Ppt

History in brief…

Was used in ancient Italy for indicating the paper brands and name of mills. In 18th century to prevent money counterfeting. The first example of a similar technology was done by Emil Hembrooke in 1954 for identifying music works. Later it was used by Komatsu and Tominaga in 1988.

Page 6: 43612872 Digital Watermarking Ppt

Terminologies…

Steganography Watermarking Data hiding and data embedding Copy protection Copyright protection

Page 7: 43612872 Digital Watermarking Ppt

Terminologies…

Steganography-is an art,science,study, work of communicating in a waywhich hides a secret message in the main information.

Steganography methods rely generally on the assumption that the existence of the covert data is unknown to unauthorized parties and are mainly used in secret point-to-point communication between trusting parties.

Page 8: 43612872 Digital Watermarking Ppt

Terminologies…

Watermarking- as opposed to steganography – in an ideal world can resists attacks. Thus, even if the existence of the hidden information is known, it should be difficult for an attacker to remove the embedded watermark, even if the algorithmic principle is known.

Page 9: 43612872 Digital Watermarking Ppt

Terminologies…

Copy protection- attempts to find ways, which limits the access to copyrighted material and/or inhibit the copy process itself. Copyright protection- inserts copyright information into the digital object without the loss of quality. Whenever the copyright of a digital object is in question, this information is extracted to identify the rightful owner.

Page 10: 43612872 Digital Watermarking Ppt

Framewrok

Watermarking is the process that embeds data called ‘watermark’ into a media such that watermark can be detected or extracted later to make an assertion about the media. For example, digital watermarking technique for images is to add a visible seal to the existing image.

Page 11: 43612872 Digital Watermarking Ppt

A general watermarking system…

Page 12: 43612872 Digital Watermarking Ppt

Watermarking techniques…

According to the working domain According to the type of document According to the human

perception According to the application

Page 13: 43612872 Digital Watermarking Ppt
Page 14: 43612872 Digital Watermarking Ppt

Spatial domain

Is applied to graphic images and text.

Slightly modifies the pixels of one or two randomly selected subsets of an image.(generally the lower bits).

However, not reliable when subjected to normal media operations such as filtering or lossy compression.

Page 15: 43612872 Digital Watermarking Ppt

Frequency domain

also called transform domain. Values of certain

frequencies(normally low) are altered from their original.

The watermark is applied to the whole image so as not to be removed during a cropping operation and also to make its verification difficult.

Page 16: 43612872 Digital Watermarking Ppt

Visible and Invisible watermarking

Visible watermark is a secondary translucent overlaid into the primary image

The invisible-robust watermark is embedded in such a way that alternations made to the pixel value are perceptually not noticed .

The invisible-fragile watermark is embedded in such a way that any manipulation or modification of the image would alter or destroy the watermark.

Page 17: 43612872 Digital Watermarking Ppt

Fragile watermarking technique

A watermark is said to be fragile if the watermark hidden within the host signal is destroyed as soon as the watermarked signal undergoes any manipulation.

When a fragile watermark is present in a signal, we can infer, with a high probability, that the signal has not been altered.

Page 18: 43612872 Digital Watermarking Ppt

Robust watermarking

Robust watermarks are those which can survive signal manipulations.

Can withstand mallicious attacks and signal processing too.

Thus recommended for those media which need to undergo during lossy compressions

Page 19: 43612872 Digital Watermarking Ppt

Some other techniques

Text line,word or charcter shifting. Boundary modifications. Least significant bit alterations.

Page 20: 43612872 Digital Watermarking Ppt

Digital watermarking - Requirements

The watermark should exibit certain characterstics.These include that the watermark is difficult to notice, survives common distortion,resists malicious attacks, carry many bits of information, can coexist with otherwatermarks, and requires little computation to insert or detect.

Page 21: 43612872 Digital Watermarking Ppt

Technically…

Fidelity(imperceptibility)

Robustness

Fragility

Modification and multiple watermarks

Page 22: 43612872 Digital Watermarking Ppt

Attacks on the watermarks

The attacks on the digital watermarking can broadly be classified in two types:

Attacks on the signal. Cryptographic attacks.

Page 23: 43612872 Digital Watermarking Ppt

Attacks on signal

The majority of the attacks are related to the watermark signal itself .

They intend to remove the mark, or somehow mask it.

These techniques can rely on the structure of the embedding algorithm to know where and how the watermark was incrusted.

Page 24: 43612872 Digital Watermarking Ppt

Cryptolographics Attacks

Some attacks try not to access the watermark, but to modify its interpretation.

This is quite general applicability and possesses the initially remarkable property that a marked image for example can be unmarked and yet still rendered pixel for pixel in exactly the same way as the marked image by a standard browser.

Page 25: 43612872 Digital Watermarking Ppt

Applications

Signature Fingerprinting Broadcast and internet monitoring Autentication and integrity Copy and copyright protection Covert communication

Page 26: 43612872 Digital Watermarking Ppt

By - Priyanka Raj charan Cs 5b 0114cs081089

Page 27: 43612872 Digital Watermarking Ppt

Queries….???