Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Like this presentation? Why not share!

Like this? Share it with your network

Share
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
  • how to download this
    Are you sure you want to
    Your message goes here
  • please immediatley send
    Are you sure you want to
    Your message goes here
  • please immediatley send
    Are you sure you want to
    Your message goes here
No Downloads

Views

Total Views
4,417
On Slideshare
4,417
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
442
Comments
3
Likes
2

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. A SEMINAR ON DIGITAL WATERMARKING PRESENTED BY: VIDHI AGARWAL CS FINAL YR. CSE/1754
  • 2. TABLE OF CONTENTS
    • Introduction to DW
    • Information Hiding
    • Process of DW
    • Watermarking issues
    • Types of DW
    • Watermark attack
    • Application of DW
    • Limitations of DW
    • Conclusion
  • 3. INTRODUCTION TO DW
    • Digital watermarking is the process of embedding information into a digital signal.
    • The purpose of digital watermarking is to provide copyright protection.
  • 4. INFORMATION HIDING
    • The process of secretly embedding inside a data source without changing its perceptual quality.
    • DW and steganography are the implementations of information hiding.
  • 5. CONTINUED….. Extraction function M ( L ) Channel Retrieved information M ( L ) Information to embed Embedding function ^
            • Key
    Original data
  • 6. PROCESS OF DW Fig. Watermark embedding
  • 7. CONTINUED…. Fig. Watermark detection
  • 8. DETECTIONS OF WATERMARK Fig . Using digital watermarks for integrity verification: the protected image is the image (a) above; a modified image is obtained by swapping the numbers 9 and 4 of the number plate (b); digital watermarking technology allows detecting and highlights the modified areas, as shown on (c).
  • 9. WATERMARKING ISSUES
    • Capacity
    • Robustness
    • Transparency
    • Security
  • 10. TYPES OF DW Fig. Types of watermarking
  • 11. Visible watermarking
    • In visible watermarking, the information is visible in the picture or video.
  • 12. Invisible watermarking (a)original image (b) watermarked image
  • 13. WATERMARK ATTACKS
    • Active Attacks .
    • Hacker attempts to remove or destroy the watermark.
    • Passive Attacks .
    • Hacker tries to find if a watermark is present.
    • Removal of watermark is not an aim .
  • 14. CONTINUED…
    • Collusion Attacks .
    • Hacker uses several copies of watermarked data (images, video etc.) to construct a copy with no watermark.
    • Forgery Attacks.
    • Hacker tries to embed a valid watermark
  • 15. APPLICATIONS OF DW
    • ID card security.
    • Ownership assertion.
    • Copy prevention or control.
    • Fraud and tamper detection.
  • 16. LIMITATIONS OF DW
    • Digital watermarking does not prevent copying or distribution.
    • Digital watermarks cannot survive every possible attack.
  • 17. CONCLUSION
    • Digital watermarking is a rapidly evolving area of research and development.
    • One key research problem that we still face today is the development of truly robust, transparent and secure watermarking technique for different digital media including images, video and audio.
  • 18. QUERIES???
  • 19. THANK YOU!!!!!!!