Top Banner
DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar
36
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

DIGITAL WATERMARKING

Saurabh GuptaTarun KumarRishi Kumar

Page 2: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Watermark

“ Watermarking can be considered as a special technique

of steganography where one message is embedded in another and the two messages are related to each other in some way. “

Example :-

The presence of specific patterns in currency notes which are visible only when the note is held to light is a well known example for watermark.

What is Watermarking?

Page 3: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Example of a conventional watermark

Courtesy of Blue Spike, Inc.

Page 4: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Digital Watermark

“ Digital watermarking is similar to watermarking physical objects, except that the watermarking technique is used for digital content instead of physical objects.”

Page 5: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Digital Watermark (Cont..)In digital watermarking a low-energy

signal is imperceptibly embedded in another signal. The low-energy signal is called watermark.

The main signal in which the watermark is embedded is referred to as cover signal since it covers the watermark.

An entity called watermark key used for embedding and detecting watermark signal

Watermark key is private

Page 6: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Behind The Technology

Sending Side …

Watermark Embedding process Water mark Original message Key Water marked image

Page 7: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Behind The Technology

Watermark retrieval process Water marked image KeyConfidential message

Receiving Side …

Page 8: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

The Overall SystemThe Technology

Roars…

Page 9: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Importance Of Digital Watermarking

©Copyright Information©On-line music industry©News gathering using digital

cameras

Page 10: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Types of Digital Watermarking

Robust & Fragile Watermarking

Visible & Invisible Watermarking

Public & Private Watermarking Asymmetric & Symmetric

Watermarking Steganograhic & Non-

Steganographic watermarking

Page 11: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Robust & Fragile Watermarking

Robust Watermarking:-Modification of watermarked content will not affect watermark

Fragile Watermarking:-Watermark get destroyed when watermarked content is modified or tampered with

Page 12: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Visible & Invisible Watermarking

On Visible watermarking, contents are visible

Page 13: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Visible & Invisible Watermarking (Cont..) Invisible watermarking are not

viewed on just looking

Page 14: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Public & Private Watermarking• Public Watermarking Users of content are authorized to

detect watermark

• Private Watermarking Users not authorized to detect

watermark

Page 15: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Asymmetric & Symmetric watermarking

In Asymmetric watermarking different keys used for embedding and detecting watermark

Page 16: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Asymmetric & Symmetric watermarking (Cont..)

In symmetric watermarking same keys are used for embedding and detecting watermarks

Page 17: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Steganographic & Non-Steganographic Watermarking

Steganographic Watermarking User unaware of the presence of a

watermark eg:-Used in finger printing

applicationsNon-Steganographic WM:- User aware of the presence of a

watermark.

e.g.:-User to detect piracy

Page 18: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Digital Watermarking Techniques

LSB WatermarkingColor Separation TechniqueBit Stream WatermarkingWord Space Coding, Line Space

Coding &Character Coding

Page 19: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

LSB Watermarking

Lower order bits of selected pixels in the image are used to store watermarks

Replacing lower order bits of each pixel with higher order bit of different image

Page 20: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Color Separation Technique

Watermark appears only in one of the color bands

Used to watermark in still imagesCan be extended to moving

images

Page 21: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Bit Stream Watermarking

Used in audio watermarking

Data is directly inserted into compressed audio files

Page 22: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Word Space Coding, Line Space Coding & Character Coding

Used for watermarking in text documents

In word space coding, the spaces between words are altered to embed watermark code. In line space coding the space between the lines are altered and in character coding some of the characters are imperceptibly modified (i.e., made larger, serifs enhanced, etc).

Page 23: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Applications of Digital Watermarking

Copy ProtectionContent AuthenticationCopyright ProtectionMetadata Tagging

Page 24: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Copy Protection

It limits the access to copyrighted material and inhibit the copy process

Page 25: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Content Authentication

Robust watermarks are used in this area

Example:-A photographic information that may be presented as evidence in court. Since digital images can be easily manipulated, there is a need to provide proof that an image has not been altered.

Page 26: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Content Authentication

Page 27: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Copyright Protection

One of the main application

Embedding watermarks in digital photographs

Page 28: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Metadata Tagging

Watermarks convey object specific information to users of the object.

Used to attach patient identification data to medical images, or to highlight regions of diagnostic significance.

Page 29: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Attacks to Digital Watermarking

Stirmark Mosaic Attack

Page 30: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Stirmark

It is tool developed to test the robustness of image marking system

Stirmark is commonly produced by printers and scanners

IBM researchers have recently announced a technique that defeats the stir mark attack.

Detects and measures the geometric distortions in images, and removes the distortion to restore image geometry

Page 31: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Stirmark Example

Page 32: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Mosaic Attack

Use of a web crawlerDividing into sub images with

rendition instructionsBrowser will be rearranging the sub

images to appear as the originalSub images will be sufficiently small

that no single image on its own will contain a recognizable mark.

Page 33: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Mosaic Attack Example

Page 34: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

ConclusionDRM systems and content management are

important for protection of rights of digital multimedia creations that are distributed on the Internet. Digital watermarking is an effective technique for embedding rights information in digital multimedia data.

Digital watermark technology can be used in consumer electronic devices like digital still camera, digital video camera, DVD players, MP3 players, etc., for various applications like providing controlled access, preventing illegal replication and watermark embedding

Page 35: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

Conclusion (Contd..)

Digital information can easily be disseminated and copied via global networks.

The future of digital watermarking relies on setting standards and creating applications so that creators of digital content can easily implement it.

Page 36: DIGITAL WATERMARKING Saurabh Gupta Tarun Kumar Rishi Kumar.

THANK YOU