Top Banner
DIGITAL WATERMARKING 1
14
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Digital watermarking

1

DIGITAL WATERMARKING

Page 2: Digital watermarking

2

INTRODUCTION:-

Think of a multimedia data that is being distributed over the Internet.

Someone downloads it , claims it that he has the copyright, and sells it. In these kinds of situations, digital watermarking techniques can be used for establishing ownership rights, ensuring authorized access, preventing illegal reapplication and facilitating content authentication.

Page 3: Digital watermarking

3

“Digital watermarking is the process of embedding information into a digital signal in a way that is difficult to remove.”

The signal may be audio, pictures or video, for example. If the signal is copied, then the information is also carried in the copy. A signal may carry several different watermarks at the same time.

Page 4: Digital watermarking

4

General Procedure for Digital Watermarking:

Page 5: Digital watermarking

5

WATERMARKING LIEF-CYCLE

Page 6: Digital watermarking

6

ATTACKS:-

Attacks on watermark may not necessarily remove the watermark, but disable its readability. Image processing and transforms are commonly employed to create and apply watermarks.

These same techniques can also be used to disable or overwrite watermarks. Multiple watermarks can be placed in an image and one cannot determine which one is valid. Currently watermark registration service is "first come, first served." Someone other than the rightful owner may attempt to register a copyright first.

Page 7: Digital watermarking

7

TYPES OF ATTACKS ON WATERMARKS Removal attacks Geometrical attacks Cryptographic attacks Protocol attacks

Page 8: Digital watermarking

8

TYPES OF WATERMARK:

(1)ROBUST WATERMARK: A robust watermark is a watermark that is difficult to remove from the object in which it is embedded.

(2)FRAGILE WATERMARK: A fragile watermark is destroyed if anybody attempts to tamper with the object in which it is embedded.

(3)VISIBLE WATERMARK: A visible watermark is immediately perceptible and clearly identifies the cover object as copyright-protected material, much like the copyright symbols ã, â, and ä

(4)INVISIBLE WATERMARK: An invisible watermark is not normally perceptible, but can still be used by the rightful owner as evidence of data authenticity in a court of law.

Page 9: Digital watermarking

9

Important Parameters

Transparency Robustness Security Capacity Invertibility (reversibility) Complexity Possibility of verification

Page 10: Digital watermarking

10

Common watermarking techniques

Choice of Watermark Object Time domain-LSB Modification Frequency Domain Wavelet Domain

Page 11: Digital watermarking

11

APPLICATION

Owner identification and proof of ownership

Page 12: Digital watermarking

12

Broadcast monitoring Transaction tracking Usage control

Page 13: Digital watermarking

13

CONCLUSION:-

Digital watermarking has emerged as an essential security technology, fully complementary to encryption-based secure transmission and copy protection.

This technology is widely applicable to almost all electronic information services and systems where data protection, security, and intellectual property rights are needed.

However, effective uses in fields such as digital camera, DVD, digital broadcasting, electronic commerce, and law enforcement have not been explored.

Page 14: Digital watermarking

14

THANK YOU