SlideShare a Scribd company logo
1 of 25
Presentation on
 Watermarking




               Presented
                   By
             Deepak Singh
             (1009131031)

                Supervised
                   By
          V L Swarup + N Suvarna
Outlines
•   Historical background
•   Classifications
•   Characteristics
•   Examples
•   Applications
•   Problems
•   Bibliography
Steganography
              Art of hiding information

        •   Initial Applications of information
            hiding to Pass Secret messages.



        •   Histaeus used his slaves
            (information tattooed on a slave’s
            shaved head )
Cryptography




•   Study of techniques for secure     •   German Lorenz cipher machine, used
    communication in the presence of       in World WarII to encrypt very-high-
    third parties                          level general staff messages
Cryptography(cont)

The Greeks of Classical times are said to have
known of ciphers (e.g., the scytale
transposition cipher claimed to have been
used by the Spartan military)
Watermarking
• Technique for inserting information into another information
  (text,image,video) which can be later extracted or detected for
  variety of purposes including identification and authentication
  purposes
Example of watermarked slide




Originality of hardcopy is ensured
Adding watermark to ppt
Characteristics of a watermark
Fragile:      Distorted or broken under slight changes
               Used for tamper detection.
Robust:       withstand moderate to severe signal
               processing attacks .
               used for copyright protection and to verify
                the ownership.
Semi-fragile: features of both robust and fragile.
               Sensitive to modification and provides
               authentication.
Text Watermarking
• Text-line coding
  Text lines of a document
  page are shifted
  imperceptibly up or down
  Word-shift coding Spacing
  between words in a line
  text is altered Character
  coding
  E.g., endline at the top of
  a letter, say “t” is          feature coding; slightly modifies the features
  extended
                                Goal: making watermark removal more
                                expensive than obtaining the right to copy
                                from the copy right owner
Image Watermarking
•   Softwares
     1:-Digital image security evaluation.
     2:-TSR Watermark Image software
    2.3.3.4 .
    (applicable on pictures,images)
Audio Watermarking
    Spread spectrum audio watermarking (SSW)


•   Narrow-band message signal is transmitted over a much larger bandwidth
    So watermark is spread over many frequency bins so that the energy in one bin is
    very small and certainly undetectable.


•   Audio watermarks won't survive compression to a format like MP3 or WMA or
    M4A, which is one reason they aren't used very much.
Video Watermarking
•   placing a digital watermark or logo or text over an existing video in the batch
    mode.

•   Watermarks can be used for adding comments to your movies.

•   Research is going on.
Applications
Tamper proofing: To find out if data was tampered.




    Eg. Change meaning of images


    Hidden Watermarks track
    change in meaning
Applications
 Copyright Protecton:To prove the ownership
 of digital media




Eg. Cut paste of images


 Hidden Watermarks represent
 the copyright information
Applications
 Quality Assessment: Degradation of Visual Quality




                           Loss of Visual Quality


               Hidden Watermarks track change in visual quality
Applications
• Fingerprinting:-
  Owner can embed a robust watermark that identifies the
  buyer of the copy .If unauthorized copies are found later,
  origin of the illegal copies can be traced.

• Authentication:-
  Owner can embed fragile watermark to provide proof of
  authenticity and integrity. Tampering destroys fragile
  watermark and thus can be detected
• Ownership assertion:-
  A rightful owner can retrieve a watermark from his content to
  prove his ownership
Problems

• In case the key used during watermark is lost anyone can
  read the watermark and remove it.

• In case the watermark or key is public, it can be encoded
  and copyright information is lost.
Bibliography
• http://en.wikipedia.org/wiki/Watermark
• http://en.wikipedia.org/wiki/Digital_watermarking
• http://www.videowatermarkfactory.com/
Thank you!!!

More Related Content

Viewers also liked

Stimulating Reform - The European Union Approach to the Regulation of Energy ...
Stimulating Reform - The European Union Approach to the Regulation of Energy ...Stimulating Reform - The European Union Approach to the Regulation of Energy ...
Stimulating Reform - The European Union Approach to the Regulation of Energy ...
Cillian Dervan
 

Viewers also liked (15)

Warner bros
Warner brosWarner bros
Warner bros
 
Operadores de búsqueda en google
Operadores de búsqueda en googleOperadores de búsqueda en google
Operadores de búsqueda en google
 
Lezione 20 2015-2016 Approfondimenti,o, Lezione finale del corso
Lezione 20 2015-2016 Approfondimenti,o, Lezione finale del corsoLezione 20 2015-2016 Approfondimenti,o, Lezione finale del corso
Lezione 20 2015-2016 Approfondimenti,o, Lezione finale del corso
 
flegga products presentation
flegga products presentationflegga products presentation
flegga products presentation
 
Stimulating Reform - The European Union Approach to the Regulation of Energy ...
Stimulating Reform - The European Union Approach to the Regulation of Energy ...Stimulating Reform - The European Union Approach to the Regulation of Energy ...
Stimulating Reform - The European Union Approach to the Regulation of Energy ...
 
Windows nt 4
Windows nt 4Windows nt 4
Windows nt 4
 
8 Benefits of Outsourcing Data Entry Services
8 Benefits of Outsourcing Data Entry Services8 Benefits of Outsourcing Data Entry Services
8 Benefits of Outsourcing Data Entry Services
 
FERIA TECNO-CIENTIFICA
FERIA TECNO-CIENTIFICAFERIA TECNO-CIENTIFICA
FERIA TECNO-CIENTIFICA
 
Suzanne Gray, BMW - Changing Customer Expectations - Transversal customer sum...
Suzanne Gray, BMW - Changing Customer Expectations - Transversal customer sum...Suzanne Gray, BMW - Changing Customer Expectations - Transversal customer sum...
Suzanne Gray, BMW - Changing Customer Expectations - Transversal customer sum...
 
How to Create an A/B Testing Campaign in MailChimp
How to Create an A/B Testing Campaign in MailChimpHow to Create an A/B Testing Campaign in MailChimp
How to Create an A/B Testing Campaign in MailChimp
 
Secuencia didáctica final
Secuencia didáctica finalSecuencia didáctica final
Secuencia didáctica final
 
Calentamiento específico y general del fútbol
Calentamiento específico y general del fútbolCalentamiento específico y general del fútbol
Calentamiento específico y general del fútbol
 
Music video treatment
Music video treatmentMusic video treatment
Music video treatment
 
Fish anatomy and physilogy
Fish anatomy and physilogy Fish anatomy and physilogy
Fish anatomy and physilogy
 
L'oració simple
L'oració simpleL'oració simple
L'oració simple
 

Similar to Presentation

Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Parag Agarwal
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
Ankush Kr
 
Chapter 13 steganography and watermarking
Chapter 13   steganography and watermarkingChapter 13   steganography and watermarking
Chapter 13 steganography and watermarking
amitchauhan1990
 

Similar to Presentation (20)

Steganography
SteganographySteganography
Steganography
 
8-steg.ppt
8-steg.ppt8-steg.ppt
8-steg.ppt
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
DigitalWatermarking.ppt
DigitalWatermarking.pptDigitalWatermarking.ppt
DigitalWatermarking.ppt
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
 
8-steganography basic principle of the lesson.ppt
8-steganography basic principle of the lesson.ppt8-steganography basic principle of the lesson.ppt
8-steganography basic principle of the lesson.ppt
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Watermark
WatermarkWatermark
Watermark
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking Techniques
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
Chapter 13 steganography and watermarking
Chapter 13   steganography and watermarkingChapter 13   steganography and watermarking
Chapter 13 steganography and watermarking
 

Presentation

  • 1. Presentation on Watermarking Presented By Deepak Singh (1009131031) Supervised By V L Swarup + N Suvarna
  • 2. Outlines • Historical background • Classifications • Characteristics • Examples • Applications • Problems • Bibliography
  • 3. Steganography Art of hiding information • Initial Applications of information hiding to Pass Secret messages. • Histaeus used his slaves (information tattooed on a slave’s shaved head )
  • 4. Cryptography • Study of techniques for secure • German Lorenz cipher machine, used communication in the presence of in World WarII to encrypt very-high- third parties level general staff messages
  • 5.
  • 6. Cryptography(cont) The Greeks of Classical times are said to have known of ciphers (e.g., the scytale transposition cipher claimed to have been used by the Spartan military)
  • 7. Watermarking • Technique for inserting information into another information (text,image,video) which can be later extracted or detected for variety of purposes including identification and authentication purposes
  • 8. Example of watermarked slide Originality of hardcopy is ensured
  • 10.
  • 11. Characteristics of a watermark Fragile: Distorted or broken under slight changes Used for tamper detection. Robust: withstand moderate to severe signal processing attacks . used for copyright protection and to verify the ownership. Semi-fragile: features of both robust and fragile. Sensitive to modification and provides authentication.
  • 12. Text Watermarking • Text-line coding Text lines of a document page are shifted imperceptibly up or down Word-shift coding Spacing between words in a line text is altered Character coding E.g., endline at the top of a letter, say “t” is feature coding; slightly modifies the features extended Goal: making watermark removal more expensive than obtaining the right to copy from the copy right owner
  • 14.
  • 15. Softwares 1:-Digital image security evaluation. 2:-TSR Watermark Image software 2.3.3.4 . (applicable on pictures,images)
  • 16. Audio Watermarking Spread spectrum audio watermarking (SSW) • Narrow-band message signal is transmitted over a much larger bandwidth So watermark is spread over many frequency bins so that the energy in one bin is very small and certainly undetectable. • Audio watermarks won't survive compression to a format like MP3 or WMA or M4A, which is one reason they aren't used very much.
  • 17. Video Watermarking • placing a digital watermark or logo or text over an existing video in the batch mode. • Watermarks can be used for adding comments to your movies. • Research is going on.
  • 18. Applications Tamper proofing: To find out if data was tampered. Eg. Change meaning of images Hidden Watermarks track change in meaning
  • 19. Applications Copyright Protecton:To prove the ownership of digital media Eg. Cut paste of images Hidden Watermarks represent the copyright information
  • 20. Applications Quality Assessment: Degradation of Visual Quality Loss of Visual Quality Hidden Watermarks track change in visual quality
  • 21. Applications • Fingerprinting:- Owner can embed a robust watermark that identifies the buyer of the copy .If unauthorized copies are found later, origin of the illegal copies can be traced. • Authentication:- Owner can embed fragile watermark to provide proof of authenticity and integrity. Tampering destroys fragile watermark and thus can be detected
  • 22. • Ownership assertion:- A rightful owner can retrieve a watermark from his content to prove his ownership
  • 23. Problems • In case the key used during watermark is lost anyone can read the watermark and remove it. • In case the watermark or key is public, it can be encoded and copyright information is lost.