SlideShare a Scribd company logo
1 of 23
Image Authentication
Techniques
based on Watermarking
Nawin Kumar Sharma
CDS16M009@IIITDM.AC.IN
Introduction
 Image authentication techniques have become very important due to
the emergence of wide range multimedia applications.
 Images have to cross non-secure channels like the Internet for
transmission.
 Images must be protected against manipulation attempts, especially
in the case of military and medical applications.
 Unauthorized replication is also a problem, which leads copyright
dispute for actual ownership.
Image Authentication
 A mechanism to ensure
 The image is not faked
 The image is originated from a trusted sender
 Authentication
 Data Authentication (Content protection)
 Owner authentication
Digital Watermarking
 Digital Image Watermarking is a technique for inserting
information (the watermark) into an image, which can
be later extracted or detected for protecting digital
content copyright and ensuring tamper-resistance, which
is hard to remove by unauthorized persons.
Digital Watermarking Process
A watermarking system is
usually divided into three
distinct steps.
• Embedding
• Attack
• Detection
• Embedding F : Watermarked Image = Function (Cover, Watermark, Key)
• Extraction F : Watermark = Function (Watermarked Image, Cover, Key(
• Non-blinded detection: Original host image(Cover) is used in detection part.
• Blinded detection: When Cover is not used in detection part.
Digital Watermarking Process
(Non-blinded and with key)
Embedding
In embedding, an algorithm accepts the host and the data to be
embedded, and produces a watermarked signal.
• Inputs to the scheme are the watermark, the cover data and an
optional public or secret key. The output are watermarked data.
The key is used to enforce security.
• Image Content
 Spatial Domain (Ex-Least Significant Bit Watermarking)
 FFT - Magnitude and Phase
 Wavelet Transforms
 DCT Coefficients
7
Extraction/Detection
Detection (often called extraction) is an algorithm which is applied to
the attacked signal to attempt to extract the watermark from it. If the
signal was unmodified during transmission, then the watermark still is
present and it may be extracted.
 Inputs to the scheme are the watermarked data, the secret or public
key and, depending on the method, the original data and/or the
original watermark.
 The output is the recovered watermarked W or some kind of
confidence measure indicating how likely it is for the given
watermark at the input to be present in the data under inspection.
8
Watermark Detection
* = 
Suspected Image
Extracted
Watermark,W2
Original
Watermark,W1
Correlation
•Watermark Extracted from Suspected Image
•Correlation, =E[W1*W2]/{ E[W12]E[W22]}
•Compute correlation of Extracted and Original Watermark
•Threshold correlation to determine watermark existence
Attacks on Watermarking
 Unintentional
 All image manipulations commonly used to prepare images for print
publication.
 For example: Resizing, rotation, sharpening, contrast modification,
compression, etc.
 Intentional (Malicious)
 All the well-known intentional attacks include: Disabling, altering,
embedding new watermark etc.
10
11
Attacks on the Watermarked image
SVD Domain Watermarking
 [U1,S1,V1] = svd(A); // A is cover image
 temp = S1+(a * W); // a is scaling factor, and W is watermark
 [Uw,Sw,Vw] = svd(temp);
 Aw = U1*Sw*(V1.'); // Aw is watermarked image
 Extraction of watermark in SVD domain
 [Uw1,Sw1,Vw1] = svd(Aw);
 D = Uw*Sw1*(Vw.') //temp;
 W = (D-S1)/a;
Watermark Properties
 Watermark should appear random, noise-like
sequence
 Appear Undetectable
 Good Correlation Properties
 High correlation with signals similar to watermark
 Low correlation with other watermarks or random
noise
W=[1 0 0 1 0
0 1 1 0 1
1 1 0 1 0
0 1 1 1 1
0 1 0 0 0]
Steganography vs. Watermarking
 Steganography is to hide a message m in data d such eavesdropper cannot
detect the presence of m in d.
 Watermarking is to hide a message m in data d, to obtain new data s0 an
eavesdropper cannot remove or replace m in d.
 Main aim of Steganography is imperceptibility of human senses, whereas main
aim of watermarking is robustness.
Cryptography vs. Watermarking
 Cryptography is the most common method of protecting digital content and is
one of the best developed science.
 However, encryption cannot help the seller monitor how a legitimate
customer handles the content after decryption.
 Digital watermarking can protect content even after it is decrypted.
Classification of Watermarking
Classifications of digital watermarking
o Robust watermark
 It sticks to document ( image, audio, video or text) to which it is embedded.
 Removing it destroys the quality of signal.
 It is used for copyright protection.
 Frequency based techniques are very robust against attack involving image compression
and filtering because the watermark is actually spread through the image.
 As high frequency component is not resistant to JPEG compression so low frequency
component are used for watermarked embedding.
o Fragile Watermark
 It breaks very easily on modifying host signal.
 It is used for temper detection, finger printing and digital signature.
 Hash code of the host image can be used as fragile watermark for tamper detection.
o Semi Fragile Watermark
 It is sensitive to signal modification and gives information about nature and location of
attack also, it provides data authentication.
Limitations / Conclusions
 Rapidly growing field of digitized images, video and audio has
urged for the need of protection.
 Watermarking is a key process in the protection of copyright
ownership of electronic data (image, videos, audio, ...).
 Digital watermarking does not prevent copying or distribution.
 Digital watermarking alone is not a complete solution for
access/copy control or copyright protection.
 Digital watermarks cannot survive every possible attack.22
References
1. Mohmmad Ali M. Saiyyad, Nitin N. Patil (2014). Authentication and Tamper
Detection in Images Using Dual Watermarking Approach IEEE
2. Qingtang Su, Gang Wang, Xiaofeng Zhang, Gaohuan,Beijing Chen (2017). A
new algorithm of blind color image watermarking based on LU decomposition
Multidim Syst Sign Process, Springer
3. Wikipedia article on Digital watermarking

More Related Content

What's hot

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingnafees321
 
Watermark
WatermarkWatermark
Watermarkravi33s
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slideSanjoy Dutta
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbhijit Akotkar
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking TechniquesNazeera Sheth
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesPrashant Singh
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwtIAEME Publication
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 

What's hot (20)

digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermark
WatermarkWatermark
Watermark
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking Techniques
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Signature recognition
Signature recognitionSignature recognition
Signature recognition
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwt
 
digital steganography
digital steganographydigital steganography
digital steganography
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 

Similar to Image authentication techniques based on Image watermarking

digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfMekalaSamayochitha
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000authority12
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniquestheijes
 
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...IOSR Journals
 
A Robust Watermarking Technique Based On Dwt on Digital Images
A Robust Watermarking Technique Based On Dwt on Digital  ImagesA Robust Watermarking Technique Based On Dwt on Digital  Images
A Robust Watermarking Technique Based On Dwt on Digital ImagesIJMER
 
Review on Quantum Watermarking Techniques
Review on Quantum Watermarking TechniquesReview on Quantum Watermarking Techniques
Review on Quantum Watermarking TechniquesIRJET Journal
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET Journal
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyAlexander Decker
 
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...IOSR Journals
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 

Similar to Image authentication techniques based on Image watermarking (20)

digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdf
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
 
A Robust Watermarking Technique Based On Dwt on Digital Images
A Robust Watermarking Technique Based On Dwt on Digital  ImagesA Robust Watermarking Technique Based On Dwt on Digital  Images
A Robust Watermarking Technique Based On Dwt on Digital Images
 
Review on Quantum Watermarking Techniques
Review on Quantum Watermarking TechniquesReview on Quantum Watermarking Techniques
Review on Quantum Watermarking Techniques
 
Iw2415551560
Iw2415551560Iw2415551560
Iw2415551560
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...
 
E04122330
E04122330E04122330
E04122330
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 

Recently uploaded

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Recently uploaded (20)

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 

Image authentication techniques based on Image watermarking

  • 1. Image Authentication Techniques based on Watermarking Nawin Kumar Sharma CDS16M009@IIITDM.AC.IN
  • 2. Introduction  Image authentication techniques have become very important due to the emergence of wide range multimedia applications.  Images have to cross non-secure channels like the Internet for transmission.  Images must be protected against manipulation attempts, especially in the case of military and medical applications.  Unauthorized replication is also a problem, which leads copyright dispute for actual ownership.
  • 3. Image Authentication  A mechanism to ensure  The image is not faked  The image is originated from a trusted sender  Authentication  Data Authentication (Content protection)  Owner authentication
  • 4. Digital Watermarking  Digital Image Watermarking is a technique for inserting information (the watermark) into an image, which can be later extracted or detected for protecting digital content copyright and ensuring tamper-resistance, which is hard to remove by unauthorized persons.
  • 5. Digital Watermarking Process A watermarking system is usually divided into three distinct steps. • Embedding • Attack • Detection
  • 6. • Embedding F : Watermarked Image = Function (Cover, Watermark, Key) • Extraction F : Watermark = Function (Watermarked Image, Cover, Key( • Non-blinded detection: Original host image(Cover) is used in detection part. • Blinded detection: When Cover is not used in detection part. Digital Watermarking Process (Non-blinded and with key)
  • 7. Embedding In embedding, an algorithm accepts the host and the data to be embedded, and produces a watermarked signal. • Inputs to the scheme are the watermark, the cover data and an optional public or secret key. The output are watermarked data. The key is used to enforce security. • Image Content  Spatial Domain (Ex-Least Significant Bit Watermarking)  FFT - Magnitude and Phase  Wavelet Transforms  DCT Coefficients 7
  • 8. Extraction/Detection Detection (often called extraction) is an algorithm which is applied to the attacked signal to attempt to extract the watermark from it. If the signal was unmodified during transmission, then the watermark still is present and it may be extracted.  Inputs to the scheme are the watermarked data, the secret or public key and, depending on the method, the original data and/or the original watermark.  The output is the recovered watermarked W or some kind of confidence measure indicating how likely it is for the given watermark at the input to be present in the data under inspection. 8
  • 9. Watermark Detection * =  Suspected Image Extracted Watermark,W2 Original Watermark,W1 Correlation •Watermark Extracted from Suspected Image •Correlation, =E[W1*W2]/{ E[W12]E[W22]} •Compute correlation of Extracted and Original Watermark •Threshold correlation to determine watermark existence
  • 10. Attacks on Watermarking  Unintentional  All image manipulations commonly used to prepare images for print publication.  For example: Resizing, rotation, sharpening, contrast modification, compression, etc.  Intentional (Malicious)  All the well-known intentional attacks include: Disabling, altering, embedding new watermark etc. 10
  • 11. 11 Attacks on the Watermarked image
  • 12. SVD Domain Watermarking  [U1,S1,V1] = svd(A); // A is cover image  temp = S1+(a * W); // a is scaling factor, and W is watermark  [Uw,Sw,Vw] = svd(temp);  Aw = U1*Sw*(V1.'); // Aw is watermarked image  Extraction of watermark in SVD domain  [Uw1,Sw1,Vw1] = svd(Aw);  D = Uw*Sw1*(Vw.') //temp;  W = (D-S1)/a;
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Watermark Properties  Watermark should appear random, noise-like sequence  Appear Undetectable  Good Correlation Properties  High correlation with signals similar to watermark  Low correlation with other watermarks or random noise W=[1 0 0 1 0 0 1 1 0 1 1 1 0 1 0 0 1 1 1 1 0 1 0 0 0]
  • 18. Steganography vs. Watermarking  Steganography is to hide a message m in data d such eavesdropper cannot detect the presence of m in d.  Watermarking is to hide a message m in data d, to obtain new data s0 an eavesdropper cannot remove or replace m in d.  Main aim of Steganography is imperceptibility of human senses, whereas main aim of watermarking is robustness.
  • 19. Cryptography vs. Watermarking  Cryptography is the most common method of protecting digital content and is one of the best developed science.  However, encryption cannot help the seller monitor how a legitimate customer handles the content after decryption.  Digital watermarking can protect content even after it is decrypted.
  • 21. Classifications of digital watermarking o Robust watermark  It sticks to document ( image, audio, video or text) to which it is embedded.  Removing it destroys the quality of signal.  It is used for copyright protection.  Frequency based techniques are very robust against attack involving image compression and filtering because the watermark is actually spread through the image.  As high frequency component is not resistant to JPEG compression so low frequency component are used for watermarked embedding. o Fragile Watermark  It breaks very easily on modifying host signal.  It is used for temper detection, finger printing and digital signature.  Hash code of the host image can be used as fragile watermark for tamper detection. o Semi Fragile Watermark  It is sensitive to signal modification and gives information about nature and location of attack also, it provides data authentication.
  • 22. Limitations / Conclusions  Rapidly growing field of digitized images, video and audio has urged for the need of protection.  Watermarking is a key process in the protection of copyright ownership of electronic data (image, videos, audio, ...).  Digital watermarking does not prevent copying or distribution.  Digital watermarking alone is not a complete solution for access/copy control or copyright protection.  Digital watermarks cannot survive every possible attack.22
  • 23. References 1. Mohmmad Ali M. Saiyyad, Nitin N. Patil (2014). Authentication and Tamper Detection in Images Using Dual Watermarking Approach IEEE 2. Qingtang Su, Gang Wang, Xiaofeng Zhang, Gaohuan,Beijing Chen (2017). A new algorithm of blind color image watermarking based on LU decomposition Multidim Syst Sign Process, Springer 3. Wikipedia article on Digital watermarking