SlideShare a Scribd company logo
1 of 18
Download to read offline
SPREAD SPECTRUM
WATERMARKING
Presented by
Debkumar Bera
CONTENT
 Introduction
 Digital Watermarking.
 Diagram of general watermarking system.
 Spread Spectrum Watermarking.
 Diagram of Spread Spectrum Watermarking.
 Techniques of Spread Spectrum Watermarking.
 Embedding.
 Detection & Comparison.
 Conclusion.
 Reference.
INTRODUCTION
 In the modern world, various media types such as
text, audio, image and video have managed to
enter the network arena. Reasons for this is
quicker sharing and acquiring the data in a
quicker period of time and this is amply supported
by the considerable cheap availability of resources
like high bandwidth. This step has raised many
challenges. One of the most challenging issues is
the lack of security of the data.
 The convincing techniques that have come to the
fore to meet this situation are cryptography and
digital watermarking.
 Many techniques in digital watermarking were
developed as and when required, to counter this
challenge
DIGITAL WATERMARKING
 Watermarking is the process of altering a work to embed a
message (possibly a secret code or copyright information)
imperceptibly. The hidden signal that is embedded in the
multimedia data is the watermark and the resulting
document after embedding the watermark is the
watermarked document.
 Watermark embedding is the process of embedding the
watermark imperceptibly. Secret key can be used to encrypt
the watermark and then embed in the document, so that
extraction and manipulation of watermark can be prevented.
 Watermark extraction is the process of extracting the
embedded watermark from the possibly distorted
watermarked document which have undergone some
processing.
 Two main defense approaches: Cryptography and Spread
Spectrum
DIAGRAM OF GENERAL WATERMARKING SYSTEM
SPREAD SPECTRUM WATERMARKING
 For the watermark to be robust, it is essential that the
distortions and tampering of the marked signal doesn't really
effect changes in the embedded watermark. One of the
effective methods for achieving this demand is by
watermarking in the particular frequency domain of the
signal. This method is called as frequency-based method of
watermarking and is achieved using spread spectrum
techniques.
 If one wish to add resilience to the watermark against any of
such attacks or operations the watermark must be placed in
the perceptually significant regions of the signal, i.e. it must
not be placed in regions of least importance of the signal, as
these are the components which are most likely to get
eliminated by the lossy compression algorithms and other
geometric processes. Further, it should not be placed in
regions of high frequency owing to probable data loss among
these components due to affine transformations like affine
scaling and cropping.
DIAGRAM OF SPREAD SPECTRUM WATERMARKING
TECHNIQUES OF SPREAD SPECTRUM
WATERMARKING
 When said that the watermark should be placed in the most
significant regions of the image or signal, the obvious
question that is being asked is that how to achieve it without
such operations being noticeable.
 A large measure of security can be attained when the
watermark is spread throughout the spectrum of the signal
at precisely selected frequency regions and it can be placed in
the low energy component of the selected frequency
coefficient. This leads to total imperceptibility of the
watermark.
 When frequency transformations are applied, the perceptual
significant regions in the spectrum of the signal are
highlighted by the perceptual mask. The watermarks can
then be embedded in these regions by modifying the
coefficients in that region to a specific magnitude, which is
known only to the owner. This capacity of the frequency
domain for accommodating additional quantity of data
without much impact on the quality of the signal is called as
perceptual capacity.
TECHNIQUE 1
 The document D is splitted into a sequence of values V = vi,
…, vn , into which the watermark X = xi, …, xn is inserted to
get the adjusted sequence of values V' = v'i , …., v'n .V' is
substituted in the place of V in the original document D, to
get the watermarked document D'. The watermark X is
scaled and inserted in V to get the altered sequence V'. Thus
V' can be computed using any one of these formulae:
A single scaling parameter α may not be sufficient for all the
values vi , because different spectral components may have
different tolerance to modification. Multiple scaling factors αi,
…, αn are used to improve the robustness. The scaling factor αi
should be a relative measure of the alterations possible to the
value Vi such that the changes are imperceptible.
It is expected that an attacker will attempt to modify or remove
the watermark by intentionally modifying the watermarked
document. The modified document D* contains corrupted
watermark X* . In the corrupted watermark X* , some of the
values could be greatly distorted, these values can be ignored.
TECHNIQUE 2
 In order to place a length n watermark into an N×N image,
the N×N DCT of the image is computed and watermark is
placed into the n highest magnitude coefficients (which are
data dependent)of the transformed image, excluding the DC
component (not necessary).
 A watermark consists of a sequence of real numbers X = xi,
…, xn, where each value xi is chosen independently according
to N(0,1) : normal distribution assumption. When we insert X
into V to obtain V' we specify a scaling parameter α, which
determines the extent to which X alters V.
 (1)may not be appropriate when the values vi of varying
widely!!
 Insertion based on (2) or (3)are more robust against ‘different
in scales.’
 A single α may not be applicable for perturbing all of the
values vi , since different spectral components may exhibit
more or less tolerance to modification.
EMBEDDING
DETECTION & COMPARISON
CONCLUSION
 Watermarking is not a new concept and has been a while in
the field of security in distributable digital data; but its
robustness, reliability and imperceptibility for all types of
media has remained un-explored and un-addressed in the
past. This condition has to be explored, where a single
watermarking algorithm is employed for all possible
multimedia signals. Further, it has been proposed that
crypto mechanisms can be used as an additional security
layer in digital watermarking, which in turn combines the
effectiveness of approaches. All these goodness, when
incorporated into a single procedure, will prove to be a
robust and healthy approach in resisting any type of
attacks.
REFERENCE
 Multimedia Security by M. Nithya, Department of Computer
Science and Engineering, Indian Institute of Technology,
Bombay, Mumbai.
 SECURE SPREAD SPECTRUM WATERMARKING FOR
MULTIMEDIA by Mahhek Tahir, Khizra Samad, Asma
Shaheen.
 SPREAD SPECTRUM WATERMARKING TECHNIQUE
FOR INFORMATION SYSTEM SECURING by Todor
Todorov,
 Digital Watermarking by DR. TAMARA CHER R.
MERCADO, University of Southeastern Philippines Institute
of Computing
THANK YOU

More Related Content

What's hot

Digital communication system
Digital communication systemDigital communication system
Digital communication systembabak danyal
 
Fsk modulation and demodulation
Fsk modulation and demodulationFsk modulation and demodulation
Fsk modulation and demodulationMafaz Ahmed
 
Reed Soloman and convolution codes
Reed Soloman and convolution codesReed Soloman and convolution codes
Reed Soloman and convolution codesShailesh Tanwar
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarkingLikan Patra
 
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.comFEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.comMapYourTech
 
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Madhumita Tamhane
 
Video signal-ppt
Video signal-pptVideo signal-ppt
Video signal-pptDeepa K C
 
A Project Report on RFID Based Attendance System.pdf
A Project Report on RFID Based Attendance System.pdfA Project Report on RFID Based Attendance System.pdf
A Project Report on RFID Based Attendance System.pdfSudipto Krishna Dutta
 
(S.C.E.T) Appliction of pll fm demodulation fsk demodulation
(S.C.E.T) Appliction of pll fm demodulation fsk demodulation(S.C.E.T) Appliction of pll fm demodulation fsk demodulation
(S.C.E.T) Appliction of pll fm demodulation fsk demodulationChirag vasava
 
Introduction to HEVC
Introduction to HEVCIntroduction to HEVC
Introduction to HEVCYoss Cohen
 
Dictionary Based Compression
Dictionary Based CompressionDictionary Based Compression
Dictionary Based Compressionanithabalaprabhu
 
solution manual of goldsmith wireless communication
solution manual of goldsmith wireless communicationsolution manual of goldsmith wireless communication
solution manual of goldsmith wireless communicationNIT Raipur
 
Linear block coding
Linear block codingLinear block coding
Linear block codingjknm
 

What's hot (20)

Digital communication system
Digital communication systemDigital communication system
Digital communication system
 
Fsk modulation and demodulation
Fsk modulation and demodulationFsk modulation and demodulation
Fsk modulation and demodulation
 
Subband Coding
Subband CodingSubband Coding
Subband Coding
 
H261
H261H261
H261
 
Reed Soloman and convolution codes
Reed Soloman and convolution codesReed Soloman and convolution codes
Reed Soloman and convolution codes
 
BCH Codes
BCH CodesBCH Codes
BCH Codes
 
Microwave measurements in detail
Microwave measurements in detailMicrowave measurements in detail
Microwave measurements in detail
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarking
 
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.comFEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
 
Source coding theorem
Source coding theoremSource coding theorem
Source coding theorem
 
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
Convolution codes - Coding/Decoding Tree codes and Trellis codes for multiple...
 
Video signal-ppt
Video signal-pptVideo signal-ppt
Video signal-ppt
 
A Project Report on RFID Based Attendance System.pdf
A Project Report on RFID Based Attendance System.pdfA Project Report on RFID Based Attendance System.pdf
A Project Report on RFID Based Attendance System.pdf
 
(S.C.E.T) Appliction of pll fm demodulation fsk demodulation
(S.C.E.T) Appliction of pll fm demodulation fsk demodulation(S.C.E.T) Appliction of pll fm demodulation fsk demodulation
(S.C.E.T) Appliction of pll fm demodulation fsk demodulation
 
Introduction to HEVC
Introduction to HEVCIntroduction to HEVC
Introduction to HEVC
 
Dictionary Based Compression
Dictionary Based CompressionDictionary Based Compression
Dictionary Based Compression
 
The Audio watermarking
The Audio watermarkingThe Audio watermarking
The Audio watermarking
 
solution manual of goldsmith wireless communication
solution manual of goldsmith wireless communicationsolution manual of goldsmith wireless communication
solution manual of goldsmith wireless communication
 
Chapter 03 cyclic codes
Chapter 03   cyclic codesChapter 03   cyclic codes
Chapter 03 cyclic codes
 
Linear block coding
Linear block codingLinear block coding
Linear block coding
 

Similar to Spread spectrum watermarking Seminar

Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital mediaijctet
 
Comparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingComparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET Journal
 
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...IOSR Journals
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMijfcstjournal
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform ijfcstjournal
 
Protection of Multispectral Images using Watermarking and Encryption
Protection of Multispectral Images using Watermarking and EncryptionProtection of Multispectral Images using Watermarking and Encryption
Protection of Multispectral Images using Watermarking and EncryptionIRJET Journal
 

Similar to Spread spectrum watermarking Seminar (20)

Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital media
 
G0523444
G0523444G0523444
G0523444
 
Comparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for WatermarkingComparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for Watermarking
 
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
 
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
M0262076085
M0262076085M0262076085
M0262076085
 
M0262076085
M0262076085M0262076085
M0262076085
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
 
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
 
B011110614
B011110614B011110614
B011110614
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
E04122330
E04122330E04122330
E04122330
 
50120140506015
5012014050601550120140506015
50120140506015
 
Iw2415551560
Iw2415551560Iw2415551560
Iw2415551560
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
 
Protection of Multispectral Images using Watermarking and Encryption
Protection of Multispectral Images using Watermarking and EncryptionProtection of Multispectral Images using Watermarking and Encryption
Protection of Multispectral Images using Watermarking and Encryption
 
1918 1923
1918 19231918 1923
1918 1923
 

Recently uploaded

Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Recently uploaded (20)

Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Spread spectrum watermarking Seminar

  • 2. CONTENT  Introduction  Digital Watermarking.  Diagram of general watermarking system.  Spread Spectrum Watermarking.  Diagram of Spread Spectrum Watermarking.  Techniques of Spread Spectrum Watermarking.  Embedding.  Detection & Comparison.  Conclusion.  Reference.
  • 3. INTRODUCTION  In the modern world, various media types such as text, audio, image and video have managed to enter the network arena. Reasons for this is quicker sharing and acquiring the data in a quicker period of time and this is amply supported by the considerable cheap availability of resources like high bandwidth. This step has raised many challenges. One of the most challenging issues is the lack of security of the data.  The convincing techniques that have come to the fore to meet this situation are cryptography and digital watermarking.  Many techniques in digital watermarking were developed as and when required, to counter this challenge
  • 4. DIGITAL WATERMARKING  Watermarking is the process of altering a work to embed a message (possibly a secret code or copyright information) imperceptibly. The hidden signal that is embedded in the multimedia data is the watermark and the resulting document after embedding the watermark is the watermarked document.  Watermark embedding is the process of embedding the watermark imperceptibly. Secret key can be used to encrypt the watermark and then embed in the document, so that extraction and manipulation of watermark can be prevented.  Watermark extraction is the process of extracting the embedded watermark from the possibly distorted watermarked document which have undergone some processing.  Two main defense approaches: Cryptography and Spread Spectrum
  • 5. DIAGRAM OF GENERAL WATERMARKING SYSTEM
  • 6. SPREAD SPECTRUM WATERMARKING  For the watermark to be robust, it is essential that the distortions and tampering of the marked signal doesn't really effect changes in the embedded watermark. One of the effective methods for achieving this demand is by watermarking in the particular frequency domain of the signal. This method is called as frequency-based method of watermarking and is achieved using spread spectrum techniques.  If one wish to add resilience to the watermark against any of such attacks or operations the watermark must be placed in the perceptually significant regions of the signal, i.e. it must not be placed in regions of least importance of the signal, as these are the components which are most likely to get eliminated by the lossy compression algorithms and other geometric processes. Further, it should not be placed in regions of high frequency owing to probable data loss among these components due to affine transformations like affine scaling and cropping.
  • 7. DIAGRAM OF SPREAD SPECTRUM WATERMARKING
  • 8. TECHNIQUES OF SPREAD SPECTRUM WATERMARKING  When said that the watermark should be placed in the most significant regions of the image or signal, the obvious question that is being asked is that how to achieve it without such operations being noticeable.  A large measure of security can be attained when the watermark is spread throughout the spectrum of the signal at precisely selected frequency regions and it can be placed in the low energy component of the selected frequency coefficient. This leads to total imperceptibility of the watermark.  When frequency transformations are applied, the perceptual significant regions in the spectrum of the signal are highlighted by the perceptual mask. The watermarks can then be embedded in these regions by modifying the coefficients in that region to a specific magnitude, which is known only to the owner. This capacity of the frequency domain for accommodating additional quantity of data without much impact on the quality of the signal is called as perceptual capacity.
  • 9. TECHNIQUE 1  The document D is splitted into a sequence of values V = vi, …, vn , into which the watermark X = xi, …, xn is inserted to get the adjusted sequence of values V' = v'i , …., v'n .V' is substituted in the place of V in the original document D, to get the watermarked document D'. The watermark X is scaled and inserted in V to get the altered sequence V'. Thus V' can be computed using any one of these formulae:
  • 10. A single scaling parameter α may not be sufficient for all the values vi , because different spectral components may have different tolerance to modification. Multiple scaling factors αi, …, αn are used to improve the robustness. The scaling factor αi should be a relative measure of the alterations possible to the value Vi such that the changes are imperceptible. It is expected that an attacker will attempt to modify or remove the watermark by intentionally modifying the watermarked document. The modified document D* contains corrupted watermark X* . In the corrupted watermark X* , some of the values could be greatly distorted, these values can be ignored.
  • 11. TECHNIQUE 2  In order to place a length n watermark into an N×N image, the N×N DCT of the image is computed and watermark is placed into the n highest magnitude coefficients (which are data dependent)of the transformed image, excluding the DC component (not necessary).  A watermark consists of a sequence of real numbers X = xi, …, xn, where each value xi is chosen independently according to N(0,1) : normal distribution assumption. When we insert X into V to obtain V' we specify a scaling parameter α, which determines the extent to which X alters V.
  • 12.  (1)may not be appropriate when the values vi of varying widely!!  Insertion based on (2) or (3)are more robust against ‘different in scales.’  A single α may not be applicable for perturbing all of the values vi , since different spectral components may exhibit more or less tolerance to modification.
  • 15.
  • 16. CONCLUSION  Watermarking is not a new concept and has been a while in the field of security in distributable digital data; but its robustness, reliability and imperceptibility for all types of media has remained un-explored and un-addressed in the past. This condition has to be explored, where a single watermarking algorithm is employed for all possible multimedia signals. Further, it has been proposed that crypto mechanisms can be used as an additional security layer in digital watermarking, which in turn combines the effectiveness of approaches. All these goodness, when incorporated into a single procedure, will prove to be a robust and healthy approach in resisting any type of attacks.
  • 17. REFERENCE  Multimedia Security by M. Nithya, Department of Computer Science and Engineering, Indian Institute of Technology, Bombay, Mumbai.  SECURE SPREAD SPECTRUM WATERMARKING FOR MULTIMEDIA by Mahhek Tahir, Khizra Samad, Asma Shaheen.  SPREAD SPECTRUM WATERMARKING TECHNIQUE FOR INFORMATION SYSTEM SECURING by Todor Todorov,  Digital Watermarking by DR. TAMARA CHER R. MERCADO, University of Southeastern Philippines Institute of Computing