• To compare watermarking with cryptography• To compare the relative advantages and disadvantages• To provide security needs as well as extra layer of authentication
• Watermarking is a technique for labelling digital pictures by hiding secret information into the images.• Cryptography is a scheme of protecting information by transforming it into an unreadable format.
• Cryptography is a secret sharing scheme which independently disclose no information about the original secret image Cryptography can be applied to, TEXT CODE IMAGES
• Watermarking uses electronic stamps which is used for labeling digital pictures by hiding secret information into the images.Water Marking can be applied to, IMAGES TEXT AUDIO VIDEO
ORIGINAL WATERMARKEDIMAGE WATERMARK IMAGE EMBEDDING INVERSE DWT DWT PROCESS
WATERMARKING CRYPTOGRAPHY1. Watermarking is about 1. Cryptography is aboutrobustness against protecting the meaning ofpossible attacks the document2. Uses steganography 2. Uses biometricstechniques techniques3. Gives more privacy 3. No privacy
• Undetectable and Undeletable by hackers• Resistant to lossy data compression EXAMPLE : JPEG• Resistant to image manipulation and processing operations EXAMPLE : cut-copy-paste• Privacy• Security• Cost and Capacity• Recoverable and Reversible
• Message secure algorithm• Security parameter• Secure keying• Not transmitted to anyone• Enables use of DIGITAL CERTIFICATES• Fully automated• High speed
• Copyright protection• Prevention of unauthorized copying• Authentication• Media Bridging• Broadcast Monitoring• Fingerprinting• Secret Communication• Determination of ownership
• Secrecy in transmission and storage• Integrity in transmission and storage• Authentication of identity• Credentialing system• System using changing key• Hardware support
Perceptually Invisible Robustness Embedding Effectiveness Data Payload Blind and Informed Detection High bit rate
Requirements vary with application. Forexample, Perceptually transparent - must not perceptually degrade original content. Robust – survive accidental of malicious attempts at removal. Oblivious or Non-oblivious – recoverable with or without access to original. Capacity – number of watermark bits embedded. Efficient encoding and decoding.
1. Embedding Locations2. Robust Watermarking3. Fragile Watermarking4. Semi-Fragile Watermarking5. Configuration of Cover Work by Watermark Embedding6. Watermarking Domains
Detecting and decoding the hidden data within a given medium. Even if secret content is not revealed, modifying the cover medium changes the medium’s statistical properties. Distributed Dictionary Attack It deals with possible attacks and protects the content. Once you try to hack the secret the whole content gets destroy.
The most important use of CRYPTOGRAPHY techniques will probably lie in the field of digital watermarking.It may become limited under laws - governments claimed that criminals use CRYPTOGRAPHY AND WATERMARKING to communicate.
• Independent watermarking classification by Dittmann, J., Mukherjee, A., & Steinebach, M. (2000, March 27 - 29).• Applied cryptography by Wiley and Sons, 1996.
• Hidden Digital Watermarks in Images by Chiou-Ting Hsu and Ja-Ling Wu, Senior Member, IEEE• A Feature-Based Robust Digital Image Watermarking Scheme by Chih-Wei Tang and Hsueh-Ming Hang, Fellow, IEEE• Comparison Of Visual Cryptography Schemes by M. Amarnath Reddy, IJEST