SlideShare a Scribd company logo
1 of 42
DIGITAL WATERMARKING
Shashwat Shriparv
dwivedishashwat@gmail.com
Overview
 Introduction
 What is Watermarking?
 What is Digital Watermarking?
 Behind the Technology.
 Importance
 Types of Watermarking.
 Digital Watermarking Techniques.
 Features of Digital Watermarking.
 Applications
 Attacks to Digital Watermarking.
 Conclusion.
Introduction
 Advantages of Digital Data
 Copy right problems with digital data
 Encryption & Decryption
 Problems with Encryption & Decryption
Conventional Encryption
System
Watermark
“ Watermarking can be considered as a special
technique of steganography where one message is
embedded in another and the two messages are
related to each other in some way. “
Example :-
The presence of specific patterns in currency notes
which are visible only when the note is held to light is
a well known example for watermark.
What is Watermarking?
Example of a conventional
watermark
Courtesy of Blue Spike, Inc.
Digital Watermarking is originated
from Steganography
What is Digital Watermarking?
“ Digital watermarking is similar to watermarking
physical objects, except that the watermarking technique
is used for digital content instead of physical objects. “
Digital Watermark
Digital Watermark (Contn..)
In digital watermarking a low-energy signal is
imperceptibly embedded in another signal. The
low-energy signal is called watermark.
The main signal in which the watermark is
embedded is referred to as cover signal since it
covers the watermark.
An entity called watermark key used for
embedding and detecting watermark signal
Watermark key is private
Behind The Technology
Sending Side …
Watermark Embedding process
 Water mark
 Original message
 Key
 Water marked image
Behind The Technology
Watermark retrieval process
 Water marked image
 Key
 Confidential message
Receiving Side …
The Overall System
The Technology Roars…
Importance Of Digital
Watermarking
© Copyright Information
© On-line music industry
© News gathering using digital cameras
Types of Digital
Watermarking.
 Robust & Fragile Watermarking
 Visible & Invisible Watermarking
 Public & Private Watermarking
 Asymmetric & Symmetric
Watermarking
 Steganograhic & Non-
Steganographic watermarking
Variety Adds…
Robust & Fragile
Watermarking
 Robust Watermarking:-Modification of
watermarked content will not affect watermark
 Fragile Watermarking:-Watermark get
destroyed when watermarked content is
modified or tampered with
Visible & Invisible
Watermarking
 On Visible watermarking, contents are visible
Visible & Invisible
Watermarking (Contn..)
 Invisible watermarking are not viewed on
just looking
Public & Private
Watermarking
• Public Watermarking
Users of content are authorized to detect
watermark
• Private Watermarking
Users not authorized to detect watermark
Asymmetric & Symmetric
watermarking
 In Asymmetric watermarking different keys
used for embedding and detecting watermark
Asymmetric & Symmetric
watermarking (Contn..)
 In symmetric watermarking same keys are
used for embedding and detecting watermarks
Steganographic & Non-
Steganographic
Watermarking
 Steganographic Watermarking
User unaware of the presence of a watermark
eg:-Used in finger printing applications
 Non-Steganographic WM:-
User aware of the presence of a watermark.
e.g.:-User to detect piracy
Digital Watermarking
Techniques
 LSB Watermarking
 Color Separation Technique
 Bit Stream Watermarking
 Word Space Coding, Line Space Coding
&Character Coding
LSB Watermarking
 Lower order bits of selected pixels in the
image are used to store watermarks
 Replacing lower order bits of each pixel with
higher order bit of different image
Color Separation Technique
 Watermark appears only in one of the color
bands
 Used to watermark in still images
 Can be extended to moving images
Bit Stream Watermarking
 Used in audio watermarking
 Data is directly inserted into compressed
audio files
Word Space Coding, Line Space
Coding &Character Coding
 Used for watermarking in text documents
 In word space coding, the spaces between
words are altered to embed watermark code. In
line space coding the space between the lines
are altered and in character coding some of
the characters are imperceptibly modified (i.e.,
made larger, serifs enhanced, etc).
Features of Digital Watermarking
 Imperceptibility
 Robustness
 Security
Applications of Digital
Watermarking.
 Copy Protection
 Content Authentication
 Copyright Protection
 Metadata Tagging
Copy Protection
 It limits the access to copyrighted material
and inhibit the copy process
Content Authentication
 Robust watermarks are used in this area
Example:-A photographic information that may
be presented as evidence in court. Since digital
images can be easily manipulated, there is a
need to provide proof that an image has not
been altered.
Content Authentication
Copyright Protection
 One of the main application
 Embedding watermarks in digital
photographs
Metadata Tagging
 Watermarks convey object specific information
to users of the object.
 Used to attach patient identification data to
medical images, or to highlight regions of
diagnostic significance.
Attacks to Digital
Watermarking
 Stirmark
 Mosaic Attack
Stirmark
 It is tool developed to test the robustness of
image marking system
 Stirmark is commonly produced by printers
and scanners
 IBM researchers have recently announced a
technique that defeats the stir mark attack.
 Detects and measures the geometric
distortions in images, and removes the
distortion to restore image geometry
Stirmark
Example
Mosaic Attack
 Use of a web crawler
 Dividing into sub images with rendition
instructions
 Browser will be rearranging the sub images to
appear as the original
 Sub images will be sufficiently small that no
single image on its own will contain a
recognizable mark.
Mosaic Attack
Example
Conclusion
 DRM systems and content management are important
for protection of rights of digital multimedia creations
that are distributed on the Internet. Digital
watermarking is an effective technique for embedding
rights information in digital multimedia data.
 Digital watermark technology can be used in consumer
electronic devices like digital still camera, digital video
camera, DVD players, MP3 players, etc., for various
applications like providing controlled access,
preventing illegal replication and watermark
embedding
Conclusion (Contd..)
 Digital information can easily be disseminated
and copied via global networks.
 The future of digital watermarking relies on
setting standards and creating applications so
that creators of digital content can easily
implement it.
References
 www.watermarkingworld.org
 www.digital-watermark.com
Shashwat Shriparv
dwivedishashwat@gmail.com
InfinitySoft

More Related Content

What's hot

CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
divya sri
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
Bharath
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
Ankush Kr
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Ankush Kr
 

What's hot (20)

CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Watermark
WatermarkWatermark
Watermark
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking Techniques
 
steganography
steganographysteganography
steganography
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 

Viewers also liked

Ted 111 power point
Ted 111 power pointTed 111 power point
Ted 111 power point
lewshaffer
 
Image encryption
Image encryptionImage encryption
Image encryption
rakshit2105
 

Viewers also liked (15)

Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Image encryption technique incorporating wavelet transform and hash integrity
Image encryption technique incorporating wavelet transform and hash integrityImage encryption technique incorporating wavelet transform and hash integrity
Image encryption technique incorporating wavelet transform and hash integrity
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
 
Digital plus No watermark
Digital plus No watermarkDigital plus No watermark
Digital plus No watermark
 
iOS advanced architecture workshop 3h edition
iOS advanced architecture workshop 3h editioniOS advanced architecture workshop 3h edition
iOS advanced architecture workshop 3h edition
 
Digital Water marking
Digital Water markingDigital Water marking
Digital Water marking
 
60 312-318
60 312-31860 312-318
60 312-318
 
Reversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A ReviewReversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A Review
 
Image processing on matlab presentation
Image processing on matlab presentationImage processing on matlab presentation
Image processing on matlab presentation
 
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3 REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3
 
Robust Watermarking of Video Streams
Robust Watermarking of Video StreamsRobust Watermarking of Video Streams
Robust Watermarking of Video Streams
 
AVIS BML facility for 350.000MT
AVIS BML facility for 350.000MTAVIS BML facility for 350.000MT
AVIS BML facility for 350.000MT
 
Ted 111 power point
Ted 111 power pointTed 111 power point
Ted 111 power point
 
Image encryption
Image encryptionImage encryption
Image encryption
 

Similar to Digital water marking

Technical seminar
Technical seminarTechnical seminar
Technical seminar
10e11a0545
 

Similar to Digital water marking (20)

Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and Applications
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
A108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxA108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptx
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
50120130406038
5012013040603850120130406038
50120130406038
 
50120140504020 2
50120140504020 250120140504020 2
50120140504020 2
 
Seminar PPT on Crypto Watermarking B.Tech
Seminar PPT on Crypto Watermarking B.TechSeminar PPT on Crypto Watermarking B.Tech
Seminar PPT on Crypto Watermarking B.Tech
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 

More from Shashwat Shriparv

LibreOffice 7.3.pptx
LibreOffice 7.3.pptxLibreOffice 7.3.pptx
LibreOffice 7.3.pptx
Shashwat Shriparv
 

More from Shashwat Shriparv (20)

Learning Linux Series Administrator Commands.pptx
Learning Linux Series Administrator Commands.pptxLearning Linux Series Administrator Commands.pptx
Learning Linux Series Administrator Commands.pptx
 
LibreOffice 7.3.pptx
LibreOffice 7.3.pptxLibreOffice 7.3.pptx
LibreOffice 7.3.pptx
 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptx
 
Suspending a Process in Linux.pptx
Suspending a Process in Linux.pptxSuspending a Process in Linux.pptx
Suspending a Process in Linux.pptx
 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptx
 
Command Seperators.pptx
Command Seperators.pptxCommand Seperators.pptx
Command Seperators.pptx
 
Upgrading hadoop
Upgrading hadoopUpgrading hadoop
Upgrading hadoop
 
Hadoop migration and upgradation
Hadoop migration and upgradationHadoop migration and upgradation
Hadoop migration and upgradation
 
R language introduction
R language introductionR language introduction
R language introduction
 
Hive query optimization infinity
Hive query optimization infinityHive query optimization infinity
Hive query optimization infinity
 
H base introduction & development
H base introduction & developmentH base introduction & development
H base introduction & development
 
Hbase interact with shell
Hbase interact with shellHbase interact with shell
Hbase interact with shell
 
H base development
H base developmentH base development
H base development
 
Hbase
HbaseHbase
Hbase
 
H base
H baseH base
H base
 
My sql
My sqlMy sql
My sql
 
Apache tomcat
Apache tomcatApache tomcat
Apache tomcat
 
Linux 4 you
Linux 4 youLinux 4 you
Linux 4 you
 
Introduction to apache hadoop
Introduction to apache hadoopIntroduction to apache hadoop
Introduction to apache hadoop
 
Next generation technology
Next generation technologyNext generation technology
Next generation technology
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Digital water marking

  • 2. Overview  Introduction  What is Watermarking?  What is Digital Watermarking?  Behind the Technology.  Importance  Types of Watermarking.  Digital Watermarking Techniques.  Features of Digital Watermarking.  Applications  Attacks to Digital Watermarking.  Conclusion.
  • 3. Introduction  Advantages of Digital Data  Copy right problems with digital data  Encryption & Decryption  Problems with Encryption & Decryption
  • 5. Watermark “ Watermarking can be considered as a special technique of steganography where one message is embedded in another and the two messages are related to each other in some way. “ Example :- The presence of specific patterns in currency notes which are visible only when the note is held to light is a well known example for watermark. What is Watermarking?
  • 6. Example of a conventional watermark Courtesy of Blue Spike, Inc.
  • 7. Digital Watermarking is originated from Steganography
  • 8. What is Digital Watermarking? “ Digital watermarking is similar to watermarking physical objects, except that the watermarking technique is used for digital content instead of physical objects. “ Digital Watermark
  • 9. Digital Watermark (Contn..) In digital watermarking a low-energy signal is imperceptibly embedded in another signal. The low-energy signal is called watermark. The main signal in which the watermark is embedded is referred to as cover signal since it covers the watermark. An entity called watermark key used for embedding and detecting watermark signal Watermark key is private
  • 10. Behind The Technology Sending Side … Watermark Embedding process  Water mark  Original message  Key  Water marked image
  • 11. Behind The Technology Watermark retrieval process  Water marked image  Key  Confidential message Receiving Side …
  • 12. The Overall System The Technology Roars…
  • 13. Importance Of Digital Watermarking © Copyright Information © On-line music industry © News gathering using digital cameras
  • 14. Types of Digital Watermarking.  Robust & Fragile Watermarking  Visible & Invisible Watermarking  Public & Private Watermarking  Asymmetric & Symmetric Watermarking  Steganograhic & Non- Steganographic watermarking Variety Adds…
  • 15. Robust & Fragile Watermarking  Robust Watermarking:-Modification of watermarked content will not affect watermark  Fragile Watermarking:-Watermark get destroyed when watermarked content is modified or tampered with
  • 16. Visible & Invisible Watermarking  On Visible watermarking, contents are visible
  • 17. Visible & Invisible Watermarking (Contn..)  Invisible watermarking are not viewed on just looking
  • 18. Public & Private Watermarking • Public Watermarking Users of content are authorized to detect watermark • Private Watermarking Users not authorized to detect watermark
  • 19. Asymmetric & Symmetric watermarking  In Asymmetric watermarking different keys used for embedding and detecting watermark
  • 20. Asymmetric & Symmetric watermarking (Contn..)  In symmetric watermarking same keys are used for embedding and detecting watermarks
  • 21. Steganographic & Non- Steganographic Watermarking  Steganographic Watermarking User unaware of the presence of a watermark eg:-Used in finger printing applications  Non-Steganographic WM:- User aware of the presence of a watermark. e.g.:-User to detect piracy
  • 22. Digital Watermarking Techniques  LSB Watermarking  Color Separation Technique  Bit Stream Watermarking  Word Space Coding, Line Space Coding &Character Coding
  • 23. LSB Watermarking  Lower order bits of selected pixels in the image are used to store watermarks  Replacing lower order bits of each pixel with higher order bit of different image
  • 24. Color Separation Technique  Watermark appears only in one of the color bands  Used to watermark in still images  Can be extended to moving images
  • 25. Bit Stream Watermarking  Used in audio watermarking  Data is directly inserted into compressed audio files
  • 26. Word Space Coding, Line Space Coding &Character Coding  Used for watermarking in text documents  In word space coding, the spaces between words are altered to embed watermark code. In line space coding the space between the lines are altered and in character coding some of the characters are imperceptibly modified (i.e., made larger, serifs enhanced, etc).
  • 27. Features of Digital Watermarking  Imperceptibility  Robustness  Security
  • 28. Applications of Digital Watermarking.  Copy Protection  Content Authentication  Copyright Protection  Metadata Tagging
  • 29. Copy Protection  It limits the access to copyrighted material and inhibit the copy process
  • 30. Content Authentication  Robust watermarks are used in this area Example:-A photographic information that may be presented as evidence in court. Since digital images can be easily manipulated, there is a need to provide proof that an image has not been altered.
  • 32. Copyright Protection  One of the main application  Embedding watermarks in digital photographs
  • 33. Metadata Tagging  Watermarks convey object specific information to users of the object.  Used to attach patient identification data to medical images, or to highlight regions of diagnostic significance.
  • 34. Attacks to Digital Watermarking  Stirmark  Mosaic Attack
  • 35. Stirmark  It is tool developed to test the robustness of image marking system  Stirmark is commonly produced by printers and scanners  IBM researchers have recently announced a technique that defeats the stir mark attack.  Detects and measures the geometric distortions in images, and removes the distortion to restore image geometry
  • 37. Mosaic Attack  Use of a web crawler  Dividing into sub images with rendition instructions  Browser will be rearranging the sub images to appear as the original  Sub images will be sufficiently small that no single image on its own will contain a recognizable mark.
  • 39. Conclusion  DRM systems and content management are important for protection of rights of digital multimedia creations that are distributed on the Internet. Digital watermarking is an effective technique for embedding rights information in digital multimedia data.  Digital watermark technology can be used in consumer electronic devices like digital still camera, digital video camera, DVD players, MP3 players, etc., for various applications like providing controlled access, preventing illegal replication and watermark embedding
  • 40. Conclusion (Contd..)  Digital information can easily be disseminated and copied via global networks.  The future of digital watermarking relies on setting standards and creating applications so that creators of digital content can easily implement it.