Ppt nc

2,673 views

Published on

0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,673
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
19
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Ppt nc

  1. 1. SAVEETHA UNIVERSITY CHENNAI:602105DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
  2. 2. DONE BY,POOJA SHUKLAPRIYANKA RANJANSONAM TIWARI
  3. 3. • To compare watermarking with cryptography• To compare the relative advantages and disadvantages• To provide security needs as well as extra layer of authentication
  4. 4. • Watermarking is a technique for labelling digital pictures by hiding secret information into the images.• Cryptography is a scheme of protecting information by transforming it into an unreadable format.
  5. 5. • Cryptography is a secret sharing scheme which independently disclose no information about the original secret image Cryptography can be applied to,  TEXT  CODE  IMAGES
  6. 6. • Watermarking uses electronic stamps which is used for labeling digital pictures by hiding secret information into the images.Water Marking can be applied to, IMAGES TEXT AUDIO VIDEO
  7. 7. ORIGINAL WATERMARKEDIMAGE WATERMARK IMAGE EMBEDDING INVERSE DWT DWT PROCESS
  8. 8. WATERMARKING CRYPTOGRAPHY1. Watermarking is about 1. Cryptography is aboutrobustness against protecting the meaning ofpossible attacks the document2. Uses steganography 2. Uses biometricstechniques techniques3. Gives more privacy 3. No privacy
  9. 9. • Undetectable and Undeletable by hackers• Resistant to lossy data compression EXAMPLE : JPEG• Resistant to image manipulation and processing operations EXAMPLE : cut-copy-paste• Privacy• Security• Cost and Capacity• Recoverable and Reversible
  10. 10. • Message secure algorithm• Security parameter• Secure keying• Not transmitted to anyone• Enables use of DIGITAL CERTIFICATES• Fully automated• High speed
  11. 11. • Copyright protection• Prevention of unauthorized copying• Authentication• Media Bridging• Broadcast Monitoring• Fingerprinting• Secret Communication• Determination of ownership
  12. 12. • Secrecy in transmission and storage• Integrity in transmission and storage• Authentication of identity• Credentialing system• System using changing key• Hardware support
  13. 13.  Perceptually Invisible Robustness Embedding Effectiveness Data Payload Blind and Informed Detection High bit rate
  14. 14.  Image resistance Message authentication codes Accessibility Cryptokey security Protection Exportable and Removable Unique owner
  15. 15. Requirements vary with application. Forexample, Perceptually transparent - must not perceptually degrade original content. Robust – survive accidental of malicious attempts at removal. Oblivious or Non-oblivious – recoverable with or without access to original. Capacity – number of watermark bits embedded. Efficient encoding and decoding.
  16. 16. 1. Embedding Locations2. Robust Watermarking3. Fragile Watermarking4. Semi-Fragile Watermarking5. Configuration of Cover Work by Watermark Embedding6. Watermarking Domains
  17. 17. 1. Hash Techniques2. Symmetric Key Cryptography3. Asymmetric Key Cryptography
  18. 18. DISCRETE FREQUENCY TRANSFORMDISCRETE COSINE TRANSFORMDISCRETE WAVELET TRANSFORM
  19. 19. • PSNR• SNR• Transformation Method• Image Format• Quality Factor• Kemel size• Security Parameter• Embedding Parameter• Detection Parameter
  20. 20.  Detecting and decoding the hidden data within a given medium. Even if secret content is not revealed, modifying the cover medium changes the medium’s statistical properties. Distributed Dictionary Attack It deals with possible attacks and protects the content. Once you try to hack the secret the whole content gets destroy.
  21. 21. The most important use of CRYPTOGRAPHY techniques will probably lie in the field of digital watermarking.It may become limited under laws - governments claimed that criminals use CRYPTOGRAPHY AND WATERMARKING to communicate.
  22. 22. • Independent watermarking classification by Dittmann, J., Mukherjee, A., & Steinebach, M. (2000, March 27 - 29).• Applied cryptography by Wiley and Sons, 1996.
  23. 23. • Hidden Digital Watermarks in Images by Chiou-Ting Hsu and Ja-Ling Wu, Senior Member, IEEE• A Feature-Based Robust Digital Image Watermarking Scheme by Chih-Wei Tang and Hsueh-Ming Hang, Fellow, IEEE• Comparison Of Visual Cryptography Schemes by M. Amarnath Reddy, IJEST

×