Top Banner
WELCOME T u e s d a y , J u n e 1 4 , 2 0 2 2 1
28

Optical Watermarking

Aug 06, 2015

Download

Documents

Suresh Patel

watermaring need techniques and attacks ,their removal is discussed.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Optical Watermarking

Ap

ril 13

, 20

23

1

WELCOME

Page 2: Optical Watermarking

Ap

ril 13

, 20

23

2

DIGITAL WATERMARKING

FOR DOCUMENTS

Page 3: Optical Watermarking

Ap

ril 13

, 20

23

3

CONTENTS

IntroductionLiterature ReviewProposed WorkConclusionReferences

Page 4: Optical Watermarking

Ap

ril 13

, 20

23

4

INTRODUCTION

Watermark :- Recognizable image or pattern in paper.

Digital watermark :- Encoding an identifying code into digitized music, video, picture, or other file.

Watermarking :- Techniques that allow secret communication , usually by embedding or hiding the secret information

Page 5: Optical Watermarking

Ap

ril 13

, 20

23

5

LITERATURE REVIEW

Page 6: Optical Watermarking

Ap

ril 13

, 20

23

6

HISTORY OF WATERMARKS

The first watermark was invented in 1826 by John Marshall. A watermark is made by impressing a water-coated metal stamp or dandy roll onto the paper during manufacturing.

Another type of watermark is called the cylinder mould watermark. A shaded watermark, first used in 1848, incorporates tonal depth and creates a greyscale image.

The first stamp on watermarked paper was issued in April of 1895.

Page 7: Optical Watermarking

Ap

ril 13

, 20

23

7

HISTORY OF DIGITAL WATERMARKING

The term "digital watermark" was first coined in 1992 by Andrew Tirkel and Charles Osborne in their paper A.Z.Tirkel, G.A. Rankin, R.M. Van Schyndel, W.J.Ho, N.R.A.Mee, C.F.Osborne. “Electronic Water Mark”. DICTA 93, Macquarie University. p.666-673.

The term used by Tirkel and Osborne was originally used in Japan-- from the Japanese-- "denshi sukashi" -- literally, an "electronic watermark".

Page 8: Optical Watermarking

Ap

ril 13

, 20

23

8

BASIC WATERMARKING PRINCIPLES

The public or secret key is used to enforce security Many watermarking schemes use spread-spectrum

methods , they add a PN signal with low amplitude to the host data.

Correlator is used for watermark detection.

Page 9: Optical Watermarking

Ap

ril 13

, 20

23

9

WATERMARKING REQUIREMENTS

Capacity :- As much information as possible.

Security :- Only be accessible by authorized parties by means of cryptographic key.

Robusteness :- Resist against hostile.

Invisibility.

Page 10: Optical Watermarking

Ap

ril 13

, 20

23

10

CLASSIFICATION OF DIGITAL WATERMARKING

Digital watermarking techniques may be classified in several ways.

Robustness :-A digital watermark is called robust if it resists a designated class of transformations.

Perceptibility :-A digital watermark is called perceptible if its presence in the marked signal is noticeable.

Capacity :-The length of the embedded message .

Embedding method :- Spread spectrum , quantization and modulation.

Page 11: Optical Watermarking

Ap

ril 13

, 20

23

11

TYPES OF WATERMARKING TECHNIQUES

Fig 3. Watermarking Techniques

Page 12: Optical Watermarking

Ap

ril 13

, 20

23

12

DIGITAL WATERMARKING SYSTEM

Fig 4. Digital Watermarking system

Page 13: Optical Watermarking

Ap

ril 13

, 20

23

13

PURPOSE OF DIGITAL WATERMARKING

Ownership Assertion – to establish ownership of the content (i.e. image)

Fingerprinting – to avoid unauthorized duplication and distribution of publicly available multimedia content

Authentication and integrity verification – the authenticator is inseparably bound to the content whereby the author has a unique key associated with the content and can verify integrity of that content by extracting the watermark.

Page 14: Optical Watermarking

Ap

ril 13

, 20

23

14

CONT’D….

Usage control – added to limit the number of copies created whereas the watermarks are modified by the hardware and at some point would not create any more copies (i.e. DVD)

Content protection – content stamped with a visible watermark that is very difficult to remove so that it can be publicly and freely distributed

Content labeling – bits embedded into the data that gives further information about the content such as a graphic image with time and place information.

Page 15: Optical Watermarking

Ap

ril 13

, 20

23

15

ATTACKS ON WATERMARK

Active Attacks – hacker tries to remove the watermark or make it undetectable. An example is to crop it out.

Passive Attacks – hacker tries to determine whether there is a watermark and identify it. However, no damage or removal is done.

Collusion Attacks – hacker uses several copies of one piece of media, each with a different watermark, to construct a copy with no watermark.

Forgery Attacks – hacker tries to embed a valid watermark of their own rather than remove one.

Page 16: Optical Watermarking

Ap

ril 13

, 20

23

16

APPLICATIONS Copyright Protection

Invisibly mark products. Authentication (temper detection, monitoring). Manage distribution of assets

Apply unique watermark key to each copy of a distributed video/image.

Embed all necessary data in a single image. Many more, including

-(Multi-level) secure data systems in military,-medical and law enforcement fields.-Digital notarization..-On-line identity verification.

Page 17: Optical Watermarking

Ap

ril 13

, 20

23

17

PROPOSED WORK In this paper, we present a novel and simple

optical watermarking system aiming at overriding some practical problems when digital watermarking techniques are applied to authenticate the printed documents.

Optical watermarking differing from traditional digital watermarking in a sense that the watermark extraction is done by some optical and visual means like photocopier. While no any digitization is required.

The system security is guaranteed by adopting content-based key share scheme originated from visual cryptography.

Page 18: Optical Watermarking

Ap

ril 13

, 20

23

18

SYSTEM OVERVIEW AND SECURITY

Our proposed solution mainly originates from two different research fields: -

Visual cryptography Frequency modulation.

Page 19: Optical Watermarking

Ap

ril 13

, 20

23

19

VISUAL CRYPTOGRAPHY

The idea of visual cryptography was independently invented by G.R. Blakley and A. Schamir which originated from traditional topic in cryptography: secret sharing.

In general, a n-out-of-m threshold scheme is a method of sharing a secret K among a set of m participants a way in such that - Any n participants can compute the value of K, and - No group of n-1 (or fewer) participants can compute information about the value of K.

Page 20: Optical Watermarking

Ap

ril 13

, 20

23

20

CONT’D….

Fig 5. A 2-out-of-2 visual threshold scheme

Page 21: Optical Watermarking

Ap

ril 13

, 20

23

21

FREQUENCY MODULATION

For images with a limited bandwidth, it is possible to completely reconstruct the original image if the sampling frequency Ws> 2Wm, where Wm is the highest frequency present in the image.

Fig 6. Watermark embedding and extracting (a) embedding (b) extracting

Page 22: Optical Watermarking

Ap

ril 13

, 20

23

22

WATERMARK EMBEDDING

Two main kinds of modulation methods are employed here :-

Line modulation Dot modulation.

The strength of modulation is actually controlling the line width or doc size. If the value of watermark seed is 1 (black), after zooming in, the corresponding block pixel values should be all 1s. Thus we can modify these 1s by replacing some of them with 0s to form a thin directional line or to form a large dot.

If the value of watermark seed is 0 (white), we can modify all those 0s by replacing some of them with 1 to form a thin line with another direction or to form a small dot. By carefully selecting the zoom in resolution and the direction of the line or the size of the dot, a good visual quality can be still kept after watermark embedding.

Page 23: Optical Watermarking

Ap

ril 13

, 20

23

23

SYSTEM DESCRIPTION

Fig 7. System Diagram

Page 24: Optical Watermarking

Ap

ril 13

, 20

23

24

KEY FORMATION

Fig 8. Key formation

Page 25: Optical Watermarking

Ap

ril 13

, 20

23

25

Fig 9.Watermark image

Fig 11.Extracted Watermark image

Fig 10. Final watermark image

Page 26: Optical Watermarking

Ap

ril 13

, 20

23

26

CONCLUSIONAn optical watermarking solution for document authentication has been given .

We introduced a concept of optical watermarking by conducting document authenticity verification with human eyes.

The system security is guaranteed by adopting visual cryptography in key set generation.

Page 27: Optical Watermarking

Ap

ril 13

, 20

23

27

REFERENCES A.Z.Tirkel, G.A. Rankin, R.M. Van Schyndel, W.J.Ho, N.R.A.Mee,

C.F.Osborne. “Electronic Water Mark”. DICTA 93, Macquarie University. p.666-673.

Meggs, Philip B. (1998). A History of Graphic Design (Third ed.). John Wiley & Sons, Inc.. pp. 58. ISBN 978-0-471-29198-5.

Biermann, Christopher J. (1996). "7". Handbook of Pulping and Papermaking (2 ed.). San Diego, California, USA: Academic Press. p. 171. ISBN 0-12-097362-6.

M. Yeung and F. Mintzer, An invisible watermarking techniques for image verification,IEEE ICIP’97,Santa Barbara, USA, Oct., 1997.

Doug Stinson, Visual cryptography and thresholdscheme,IEEE Potential, pp.13-19, Feb./Mar., 1998.

Q.B. Sun, P.R. Feng and R. Deng, An Optical Watermarking Solution for AuthenticatingPrinted Documents, verification,IEEE ITCC’2001.

Page 28: Optical Watermarking

Ap

ril 13

, 20

23

28

THANKS