•Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing. •Basic Types of Images • Binary images •Indexed images •Grayscale images. •True color images.
Dec 31, 2015
•Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
•Basic Types of Images
• Binary images
•Indexed images
•Grayscale images.
•True color images.
The process of embedding information into another object/signal
is termed as watermarking.
The signal can be audio, text , picture or a video.
Types of Watermarks
Visible watermarkThe information is visible which is a text or a logo
which identifies the owner of the media.
Invisible watermarkAn invisible watermark is an embedded image which
cannot be perceived with human’s eyes and are intended to prevent or deter unauthorized copying of digital media.
Visible Watermark
Original Image Watermarked image
Invisible Watermark
Original image Watermarked image
Detection of modification of an image using Watermarking Technology.
(a)Image protected with Watermarking technology.(b)Tampered image.(c) Image after running the Watermark Detection Technology.
Cryptography is secret writing
In cryptography the message will be encrypted and cannot be decoded without
knowing the proper key.
Steganography is the act of adding a hidden message to an image or other media file. It is similar to encrypting a document, but instead of running it through a cypher, the document is broken up and stored in unused, or unnoticable, bits within the overall image.
Watermarking attempts to hide a message as it is to tag a document for later identification. Watermarking is used to protect the copyright of the original owner
Watermarking life-cycle phases
Steps in the watermarking system
• EmbeddingThe information to be embedded is called a digital watermark whereas the signal where the watermark is to be embedded is called the host signal Inembedding, an algorithm accepts the host and the data to be embedded and produces a watermarked signal.
• Attack During transmission of the signal to a person, If this person makes a modification, this is called an attack.
• DetectionIt is an algorithm which is applied to the attacked or unmodified signal to attempt to extract the watermark from it.
How can an image be watermarked ? How can an image be watermarked ?
• Visible watermarks on images can be easily achieved thorough image editing software.
• Invisible watermarks implements several different watermarking algorithms which can be done in two ways.
1. Spatial domain.
2. Frequency domain
Spatial Domain
Spatial domain watermarking methods use blockxblock based watermarking.e.g. they embed the watermarks on a randomly selected 8x8 blocks of pixels of the image.
Frequency domain
To embed a watermark, a frequency transformation is applied to the host data. Then, modifications are made to the transform coefficients. Possible frequency image transformations include the Discrete Fourier Transform
• 1. Correlation based Watermarking.
• 2. CDMA Watermarking.
• Discrete Cosine transform PN sequence watermarking
• Mid-Band coefficient Exchange Watermarking
• Imperceptibility :In watermarking, we traditionally seek high fidelity, i.e. the watermarked work must look or sound like the original.
• Robustness: It is more a property and not a requirement of watermarking. The watermark should be able to survive any resonable processing inflicted on the carrier.
• Security: The watermarked image should not reveal any clues of the presence of the watermark, with respect to un-authorized detection.
1. Copyright protection
2. Fingerprinting
3. Copy protection
4. Image authentication
Purpose of the Project
• Implementing different watermarking algorithms and observed
the imperceptibility of the watermark embedded using each algorithm
• SOFTWARE: MATLAB 7.0
• PLATFORM: WINDOWS 98/ 2000 /XP/ Vista
Conclusion
Digital watermarking focuses on embedding information inside a digital object such that the embedded information is in separable bound to the object.
Any Queries?