SlideShare a Scribd company logo
1 of 40
Digital Water Marking By Sheikh Qaisar Ayub Advanced Topics in Image Processing [email_address] Qaisar Ayub & Sulma Rashid
Watermark Observe  image It is intellectual property Some one may spend a lot of time And thinking to compose this image
The image has been extended by any other person now he is owner of image
How to protect image ? P roblem Solution Watermark
[object Object],[object Object],[object Object],[object Object],[object Object],Watermarked image Image without watermark Watermark
[object Object],[object Object],[object Object],Watermark
[object Object],[object Object],1. Word Document Types of Digital Watermark
[object Object],[object Object],2. On Images Types of Digital Watermark
[object Object],2. Multimedia Files Types of Digital Watermark Click  on image to Play
[object Object],[object Object],[object Object],[object Object],[object Object],Types of Digital Watermark
[object Object],Types of Digital Watermark How to implement ? Step -1 Select randomly the area of image to obtain its pixel values A=
[object Object],Types of Digital Watermark How to implement ? Step -2 Convert into its binary values B= A=
[object Object],Types of Digital Watermark How to implement ? Step -3 Form a watermarking key Watermark Key A= C= B=
[object Object],Types of Digital Watermark How to implement ? Step -4 The OR Operation is used B= D= B + C 01100101 00000011 01101000 01100100 00000001 01100101 01100110 00000010 01101000 01100111 00000000 01100111
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Types of Digital Watermark A= B= C=
Types of Digital Watermark 01100101 00000011 01101000 Encoder Key Data ENCODING Algorithm Note Watermark will not effect the composition of image
[object Object],[object Object],[object Object],Achievement
[object Object],[object Object],[object Object],Types of Digital Watermark The Answer is yes What is the function of watermark ?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Types of Digital Watermark 01101000 Extract the encoded data from image Input to Decoding Algorithm Detect watermark Algorithm 01100101
Example Extract Watermark Algorithm Watermark detected by the Algorithm and hence intellectual property can be saved.
Encoding & Decoding 01100101 00000011 01101000 Encoder Key Data ENCODING Algorithm Extract Watermark Algorithm DECODING Algorithm Communication Media 01101000
Mathematically Encoding X’ = EK (X,W) Hence X = Original Image W= watermark information being embedded K= user insertion key E= watermark insertion function X’ = Watermarked  Image Mathematically Decoding W = DK’ (X’) Hence X’ = Watermarked image K’= extraction key D= watermark extraction function W= Extracted watermarked information
[object Object],[object Object],[object Object],Achievement
Application of watermark ,[object Object]
Application of watermark Finger Print IS File save ?
Application of watermark Finger Print Data Center-01 Data Center-02 Data Center-03 Network
Application of watermark Finger Print A invalid copy is found at any location Extract the embedded figure print From file A figure print is unique value form each data center Can identify the data center
Application of watermark Embed the number of copies to be allowed for copying embed in the hardware 4 4 3 2 1 Copy not allowed Click  on image to Play
Application of watermark Fraud  Detection Data Center-01 Data Center-02 Data Center-03 Network
[object Object],Application of watermark Muhammad Ishfaque Karim Ahmad Observe ID card WHAT IS THE PROBLEM ?
[object Object],Application of watermark Muhammad Ishfaque Muhammad Ishfaque Extract name using watermarked algorithm Muhammad Ishfaque Compare the to validate ID CARD. M Jamil M.jamil M.jamil Muhammad Ishfaque
[object Object],[object Object],Achievement
[object Object],[object Object],[object Object],[object Object],Original Image Properties of Watermark Resize Rotation & Compression
[object Object],[object Object],[object Object],[object Object],Original Image Properties of Watermark Watermarked image
[object Object],[object Object],[object Object],[object Object],Properties of Watermark
[object Object],Achievement
Methods of Water Marking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Methods of Water Marking ,[object Object],[object Object],[object Object],Image:   11001010 00110101 00011010 00000000... Watermark:   01  01  10  11... Watermarked   Image: 110010 11  001100 10  00011 100  000000 11 ...
[object Object]

More Related Content

What's hot

digital watermarking
digital watermarkingdigital watermarking
digital watermarking
Bharath
 
Watermarking
WatermarkingWatermarking
Watermarking
Pushkar Dutt
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
Ankush Kr
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
divya sri
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
ncct
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Ankush Kr
 

What's hot (20)

Watermark
WatermarkWatermark
Watermark
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Digital Image Watermarking
Digital Image WatermarkingDigital Image Watermarking
Digital Image Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Digital Watermarking Report
Digital Watermarking ReportDigital Watermarking Report
Digital Watermarking Report
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarking
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking Techniques
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 

Viewers also liked (9)

Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
discrete wavelet transform
discrete wavelet transformdiscrete wavelet transform
discrete wavelet transform
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
 
Image processing research proposal
Image processing research proposalImage processing research proposal
Image processing research proposal
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
 
watermarking
watermarkingwatermarking
watermarking
 

Similar to Watermarking in-imageprocessing

Aw2419401943
Aw2419401943Aw2419401943
Aw2419401943
IJMER
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
10e11a0545
 
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
IDES Editor
 
Ch31354359
Ch31354359Ch31354359
Ch31354359
IJMER
 

Similar to Watermarking in-imageprocessing (20)

Vidhi's ppt
Vidhi's pptVidhi's ppt
Vidhi's ppt
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdf
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
Survey on Reversible Watermarking
Survey on Reversible Watermarking Survey on Reversible Watermarking
Survey on Reversible Watermarking
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwt
 
Aw2419401943
Aw2419401943Aw2419401943
Aw2419401943
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
HTC Developer - 2012
HTC Developer - 2012HTC Developer - 2012
HTC Developer - 2012
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarking
 
Ch31354359
Ch31354359Ch31354359
Ch31354359
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 

Watermarking in-imageprocessing

  • 1. Digital Water Marking By Sheikh Qaisar Ayub Advanced Topics in Image Processing [email_address] Qaisar Ayub & Sulma Rashid
  • 2. Watermark Observe image It is intellectual property Some one may spend a lot of time And thinking to compose this image
  • 3. The image has been extended by any other person now he is owner of image
  • 4. How to protect image ? P roblem Solution Watermark
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Types of Digital Watermark 01100101 00000011 01101000 Encoder Key Data ENCODING Algorithm Note Watermark will not effect the composition of image
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Example Extract Watermark Algorithm Watermark detected by the Algorithm and hence intellectual property can be saved.
  • 22. Encoding & Decoding 01100101 00000011 01101000 Encoder Key Data ENCODING Algorithm Extract Watermark Algorithm DECODING Algorithm Communication Media 01101000
  • 23. Mathematically Encoding X’ = EK (X,W) Hence X = Original Image W= watermark information being embedded K= user insertion key E= watermark insertion function X’ = Watermarked Image Mathematically Decoding W = DK’ (X’) Hence X’ = Watermarked image K’= extraction key D= watermark extraction function W= Extracted watermarked information
  • 24.
  • 25.
  • 26. Application of watermark Finger Print IS File save ?
  • 27. Application of watermark Finger Print Data Center-01 Data Center-02 Data Center-03 Network
  • 28. Application of watermark Finger Print A invalid copy is found at any location Extract the embedded figure print From file A figure print is unique value form each data center Can identify the data center
  • 29. Application of watermark Embed the number of copies to be allowed for copying embed in the hardware 4 4 3 2 1 Copy not allowed Click on image to Play
  • 30. Application of watermark Fraud Detection Data Center-01 Data Center-02 Data Center-03 Network
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.