Top Banner
A SEMINAR ON DIGITAL WATERMARKING PRESENTED BY: VIDHI AGARWAL CS FINAL YR. CSE/1754
19
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Vidhi's ppt

ASEMINAR

ONDIGITAL WATERMARKING

PRESENTED BY:VIDHI AGARWAL

CS FINAL YR.CSE/1754

Page 2: Vidhi's ppt

TABLE OF CONTENTS

Introduction to DW Information Hiding Process of DW Watermarking issues Types of DW Watermark attack Application of DW Limitations of DW Conclusion

Page 3: Vidhi's ppt

INTRODUCTION TO DW

Digital watermarking is the process of embedding information into a digital signal.

The purpose of digital watermarking is to provide copyright protection.

Page 4: Vidhi's ppt

INFORMATION HIDING

The process of secretly embedding inside a data source without changing its perceptual quality.

DW and steganography are the implementations of information hiding.

Page 5: Vidhi's ppt

CONTINUED…..

Extractionfunction

M(L)

Channel

Retrieved information

M(L)

Information to embed

Embedding

function

^

Key

Original data

Page 6: Vidhi's ppt

PROCESS OF DW

Fig. Watermark embedding

Page 7: Vidhi's ppt

CONTINUED….

Fig. Watermark detection

Page 8: Vidhi's ppt

DETECTIONS OF WATERMARK

Fig . Using digital watermarks for integrity verification: the protected image is the image (a) above; a modified image is obtained by swapping the numbers 9 and 4 of the number plate (b); digital watermarking technology allows detecting and highlights the modified areas, as shown on (c).

Page 9: Vidhi's ppt

WATERMARKING ISSUES

Capacity Robustness Transparency Security

Page 10: Vidhi's ppt

TYPES OF DW

Fig. Types of watermarking

Page 11: Vidhi's ppt

Visible watermarking

In visible watermarking, the information is visible in the picture or video.

Page 12: Vidhi's ppt

Invisible watermarking

(a)original image (b) watermarked image

Page 13: Vidhi's ppt

WATERMARK ATTACKS

Active Attacks. Hacker attempts to remove or destroy the

watermark. Passive Attacks. Hacker tries to find if a watermark is present. Removal of watermark is not an aim.

Page 14: Vidhi's ppt

CONTINUED…

Collusion Attacks. Hacker uses several copies of watermarked

data (images, video etc.) to construct a copy with no watermark.

Forgery Attacks. Hacker tries to embed a valid watermark

Page 15: Vidhi's ppt

APPLICATIONS OF DW

ID card security.

Ownership assertion. Copy prevention or control. Fraud and tamper detection.

Page 16: Vidhi's ppt

LIMITATIONS OF DW

Digital watermarking does not prevent copying or distribution.

Digital watermarks cannot survive every possible attack.

Page 17: Vidhi's ppt

CONCLUSION

Digital watermarking is a rapidly evolving area of research and development.

One key research problem that we still face today is the development of truly robust, transparent and secure watermarking technique for different digital media including images, video and audio.

Page 18: Vidhi's ppt

QUERIES???

Page 19: Vidhi's ppt

THANK YOU!!!!!!!