Vidhi's ppt

4,852 views

Published on

3 Comments
2 Likes
Statistics
Notes
No Downloads
Views
Total views
4,852
On SlideShare
0
From Embeds
0
Number of Embeds
10
Actions
Shares
0
Downloads
487
Comments
3
Likes
2
Embeds 0
No embeds

No notes for slide

Vidhi's ppt

  1. 1. A SEMINAR ON DIGITAL WATERMARKING PRESENTED BY: VIDHI AGARWAL CS FINAL YR. CSE/1754
  2. 2. TABLE OF CONTENTS  Introduction to DW  Information Hiding  Process of DW  Watermarking issues  Types of DW  Watermark attack  Application of DW  Limitations of DW  Conclusion
  3. 3. INTRODUCTION TO DW  Digital watermarking is the process of embedding information into a digital signal.  The purpose of digital watermarking is to provide copyright protection.
  4. 4. INFORMATION HIDING  The process of secretly embedding inside a data source without changing its perceptual quality.  DW and steganography are the implementations of information hiding.
  5. 5. CONTINUED….. Extraction function M(L) Channel Retrieved information M(L) Information to embed Embedding function ^ Key Original data
  6. 6. PROCESS OF DW Fig. Watermark embedding
  7. 7. CONTINUED…. Fig. Watermark detection
  8. 8. DETECTIONS OF WATERMARK Fig . Using digital watermarks for integrity verification: the protected image is the image (a) above; a modified image is obtained by swapping the numbers 9 and 4 of the number plate (b); digital watermarking technology allows detecting and highlights the modified areas, as shown on (c).
  9. 9. WATERMARKING ISSUES  Capacity  Robustness  Transparency  Security
  10. 10. TYPES OF DW Fig. Types of watermarking
  11. 11. Visible watermarking  In visible watermarking, the information is visible in the picture or video.
  12. 12. Invisible watermarking (a)original image (b) watermarked image
  13. 13. WATERMARK ATTACKS  Active Attacks.  Hacker attempts to remove or destroy the watermark.  Passive Attacks.  Hacker tries to find if a watermark is present.  Removal of watermark is not an aim.
  14. 14. CONTINUED…  Collusion Attacks.  Hacker uses several copies of watermarked data (images, video etc.) to construct a copy with no watermark.  Forgery Attacks.  Hacker tries to embed a valid watermark
  15. 15. APPLICATIONS OF DW  ID card security.  Ownership assertion.  Copy prevention or control.  Fraud and tamper detection.
  16. 16. LIMITATIONS OF DW  Digital watermarking does not prevent copying or distribution.  Digital watermarks cannot survive every possible attack.
  17. 17. CONCLUSION  Digital watermarking is a rapidly evolving area of research and development.  One key research problem that we still face today is the development of truly robust, transparent and secure watermarking technique for different digital media including images, video and audio.
  18. 18. QUERIES???
  19. 19. THANK YOU!!!!!!!

×