Top Banner
14
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Watermarking
Page 2: Watermarking

ASeminar

On

Watermarking

Page 3: Watermarking

ContentsIntroductionHistoryTypes of watermarkAttributes associated with watermarking Techniques ApplicationsAdvantagesDisadvantagesConclusionReferences

Page 4: Watermarking

IntroductionDigital Watermarking describes methods

and technologies that hide information, for example a number or text, in digital media, such as images, video.

Watermarking is the insertion of imperceptible and inseparable information into data for data integrity.

Page 5: Watermarking

General Watermarking

Procedure

Page 6: Watermarking

History More than 700 years ago, watermarks were used

in Italy to indicate the paper brand and the mill that produced it.

By the 18th century watermarks began to be used as Anticounterfeiting measures on money and other documents. The term watermark was introduced near the end of the 18th century.

The first example of a technology similar to digital watermarking is a patent filed in 1954 by Emil Hem Brooke .

In 1988, Komatsu and Tominaga appear to be the first to use the term “digital watermarking”.

Page 7: Watermarking

Digital Watermark

Digital watermark is a message which is embedded into digital content that can be extracted or detected later.

Page 8: Watermarking

Types of Watermark

VisibleInvisiblePublicFragile

Page 9: Watermarking

Attributes Associated With Watermarking

Imperceptibility Robustness Security Complexity Verification

Page 10: Watermarking

Watermarking Techniques• Watermarking for text

Word space coding Line shift coding

Page 11: Watermarking

Watermarking Techniques……..• Watermarking for text

Feature coding

Page 12: Watermarking

Watermarking Techniques……• watermarking for images

spatial domain watermarkingFrequency domain watermarking

Detection of watermarks

Page 13: Watermarking

Applications• Copy prevention or control

• In the field of data security

Page 14: Watermarking

Applications………• Tampering with images