DIGITALWATERMARKING
Contents   What is DWM ?   Applications   Classification   Working   Attacks   Advantages and Disadvantages   Techn...
Digital Watermarking   We add ‘Visible’ or ‘Invisible’ structure called ‘Watermarks’    to digital media. The process of ...
Applications   Copyright Protection   Owner Identification   Content Authentification   Proof of Ownership
Classification   Perceptible Watermarks and Imperceptible Watermarks   Robust Watermarks and Fragile Watermarks   Priva...
Classification (contd.)   Perceptible Watermarks and Imperceptible Watermarks   Perceptible Watermarks are visible to hu...
Classification (contd.)   Robust Watermarks and Fragile Watermarks   Degree to which watermarks can withstand any modifi...
Classification (contd.)   Private Watermarks and Public Watermarks   Private Watermark requires at least original data t...
Working   Typical DWM system consists of mainly 3 parts / process   Watermark Insertion   Watermark Extraction   Water...
A Generic Watermarking System   Cover Work                    Watermarked                  Detected   Watermark           ...
User Key                                         Watermarked Input Image      Watermark Insertion                         ...
General Digital Watermarking Process(a) Watermark Embedding                   Digital Watermark                     0101 …...
General Digital Watermarking Process (contd.)(b) Watermark Extraction                       Original                      ...
Attacks   Mosaic Attack   Stir mark Attack   Geometric Attack       Subtractive       Distortive   Forgery Attack
Attacks (contd.)Mosaic Attack
Attacks (contd.)Stirmark
Attacks (contd.)   Geometric Attack   Subtractive Attack involves ‘removing’ the mark by cropping or    digital editing....
Attacks (contd.)   Forgery Attack   Also known as ‘Additive Attack’.   The attacker include his/her own watermark overl...
Advantages   Uniquely identifies the author of copyrighted work.   Implementation on PC platform is possible.   Embeddi...
Disadvantages   Watermarking doesn’t prevent image copying but we can track    down and detect ownership of copied images...
DWM Techniques   Image Domain Encoding   Also known as Least Significant Bit (LSB).   LSB works by reducing the no of c...
Thank you Question ??
Upcoming SlideShare
Loading in...5
×

Digital Watermarking

7,716

Published on

Published in: Technology, Art & Photos
5 Comments
17 Likes
Statistics
Notes
No Downloads
Views
Total Views
7,716
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
5
Likes
17
Embeds 0
No embeds

No notes for slide

Digital Watermarking

  1. 1. DIGITALWATERMARKING
  2. 2. Contents What is DWM ? Applications Classification Working Attacks Advantages and Disadvantages Techniques
  3. 3. Digital Watermarking We add ‘Visible’ or ‘Invisible’ structure called ‘Watermarks’ to digital media. The process of adding watermarks is called ‘Digital Watermarking’. Adaptation of Paper Watermarks. Describes methods and technologies that allow to hide/embed various types of information to digital document. In general Digital Watermarking means “Author Signature”.
  4. 4. Applications Copyright Protection Owner Identification Content Authentification Proof of Ownership
  5. 5. Classification Perceptible Watermarks and Imperceptible Watermarks Robust Watermarks and Fragile Watermarks Private Watermarks and Public Watermarks
  6. 6. Classification (contd.) Perceptible Watermarks and Imperceptible Watermarks Perceptible Watermarks are visible to human eye Useful for primary Applications. E.g. of watermark in a video E.g.. Of watermark in a image Imperceptible watermarks are Invisible to human eye. Used in the places where the content being watermarked must appear in unchanged form. Remains hidden in content and can be detected only by authorized agencies.
  7. 7. Classification (contd.) Robust Watermarks and Fragile Watermarks Degree to which watermarks can withstand any modification of any type (Accidental or Intentional ). Robust Watermarks are difficult to remove from the object in which they are embedded. Perceptible Watermarks are more Robust. Fragile Watermarks can be easily destroyed by any attempt to temper with them.
  8. 8. Classification (contd.) Private Watermarks and Public Watermarks Private Watermark requires at least original data to recover watermark. They are also known as ‘Secure Watermarks’. Public Watermark requires neither original data nor embedded watermark to recover watermark information.
  9. 9. Working Typical DWM system consists of mainly 3 parts / process Watermark Insertion Watermark Extraction Watermark Detection
  10. 10. A Generic Watermarking System Cover Work Watermarked Detected Watermark Watermark Watermark Embedder Work Detector MessageWatermark Message
  11. 11. User Key Watermarked Input Image Watermark Insertion Image Watermark User Key Extracted Watermark Extraction Watermarked Watermark Image User KeyWatermarked Decision Watermark Detection Image ( Yes or No ) Specified ID ( Watermark )
  12. 12. General Digital Watermarking Process(a) Watermark Embedding Digital Watermark 0101 …. . . .. . . Original Data Watermarked Data Embedding Algorithm 0101 …. . Distribution
  13. 13. General Digital Watermarking Process (contd.)(b) Watermark Extraction Original DataWatermarked Data Extracted Watermark Extraction 0101 …. . 0101 …. . . .. . . Algorithm
  14. 14. Attacks Mosaic Attack Stir mark Attack Geometric Attack  Subtractive  Distortive Forgery Attack
  15. 15. Attacks (contd.)Mosaic Attack
  16. 16. Attacks (contd.)Stirmark
  17. 17. Attacks (contd.) Geometric Attack Subtractive Attack involves ‘removing’ the mark by cropping or digital editing. Distortive Attack attempts to make some ‘uniform distortive changes’ in the image such that mark becomes ‘unrecognizable’.
  18. 18. Attacks (contd.) Forgery Attack Also known as ‘Additive Attack’. The attacker include his/her own watermark overlaying the original image and marking the content as their own.
  19. 19. Advantages Uniquely identifies the author of copyrighted work. Implementation on PC platform is possible. Embedding watermark is easy Image Tampering Detection
  20. 20. Disadvantages Watermarking doesn’t prevent image copying but we can track down and detect ownership of copied images. Watermarks vanishes if someone manipulates the image. Resizing, compressing images from one file type to another may diminish the watermark and it becomes unreadable.
  21. 21. DWM Techniques Image Domain Encoding Also known as Least Significant Bit (LSB). LSB works by reducing the no of colors used by image itself and uses the rest of the palette to encode the information. If the colors in an image are less then more information can be stored without quality loss.
  22. 22. Thank you Question ??

×