SlideShare a Scribd company logo
1 of 40
Digital Water Marking By Sheikh Qaisar Ayub Advanced Topics in Image Processing [email_address] Qaisar Ayub & Sulma Rashid
Watermark Observe  image It is intellectual property Some one may spend a lot of time And thinking to compose this image
The image has been extended by any other person now he is owner of image
How to protect image ? P roblem Solution Watermark
[object Object],[object Object],[object Object],[object Object],[object Object],Watermarked image Image without watermark Watermark
[object Object],[object Object],[object Object],Watermark
[object Object],[object Object],1. Word Document Types of Digital Watermark
[object Object],[object Object],2. On Images Types of Digital Watermark
[object Object],2. Multimedia Files Types of Digital Watermark Click  on image to Play
[object Object],[object Object],[object Object],[object Object],[object Object],Types of Digital Watermark
[object Object],Types of Digital Watermark How to implement ? Step -1 Select randomly the area of image to obtain its pixel values A=
[object Object],Types of Digital Watermark How to implement ? Step -2 Convert into its binary values B= A=
[object Object],Types of Digital Watermark How to implement ? Step -3 Form a watermarking key Watermark Key A= C= B=
[object Object],Types of Digital Watermark How to implement ? Step -4 The OR Operation is used B= D= B + C 01100101 00000011 01101000 01100100 00000001 01100101 01100110 00000010 01101000 01100111 00000000 01100111
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Types of Digital Watermark A= B= C=
Types of Digital Watermark 01100101 00000011 01101000 Encoder Key Data ENCODING Algorithm Note Watermark will not effect the composition of image
[object Object],[object Object],[object Object],Achievement
[object Object],[object Object],[object Object],Types of Digital Watermark The Answer is yes What is the function of watermark ?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Types of Digital Watermark 01101000 Extract the encoded data from image Input to Decoding Algorithm Detect watermark Algorithm 01100101
Example Extract Watermark Algorithm Watermark detected by the Algorithm and hence intellectual property can be saved.
Encoding & Decoding 01100101 00000011 01101000 Encoder Key Data ENCODING Algorithm Extract Watermark Algorithm DECODING Algorithm Communication Media 01101000
Mathematically Encoding X’ = EK (X,W) Hence X = Original Image W= watermark information being embedded K= user insertion key E= watermark insertion function X’ = Watermarked  Image Mathematically Decoding W = DK’ (X’) Hence X’ = Watermarked image K’= extraction key D= watermark extraction function W= Extracted watermarked information
[object Object],[object Object],[object Object],Achievement
Application of watermark ,[object Object]
Application of watermark Finger Print IS File save ?
Application of watermark Finger Print Data Center-01 Data Center-02 Data Center-03 Network
Application of watermark Finger Print A invalid copy is found at any location Extract the embedded figure print From file A figure print is unique value form each data center Can identify the data center
Application of watermark Embed the number of copies to be allowed for copying embed in the hardware 4 4 3 2 1 Copy not allowed Click  on image to Play
Application of watermark Fraud  Detection Data Center-01 Data Center-02 Data Center-03 Network
[object Object],Application of watermark Muhammad Ishfaque Karim Ahmad Observe ID card WHAT IS THE PROBLEM ?
[object Object],Application of watermark Muhammad Ishfaque Muhammad Ishfaque Extract name using watermarked algorithm Muhammad Ishfaque Compare the to validate ID CARD. M Jamil M.jamil M.jamil Muhammad Ishfaque
[object Object],[object Object],Achievement
[object Object],[object Object],[object Object],[object Object],Original Image Properties of Watermark Resize Rotation & Compression
[object Object],[object Object],[object Object],[object Object],Original Image Properties of Watermark Watermarked image
[object Object],[object Object],[object Object],[object Object],Properties of Watermark
[object Object],Achievement
Methods of Water Marking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Methods of Water Marking ,[object Object],[object Object],[object Object],Image:   11001010 00110101 00011010 00000000... Watermark:   01  01  10  11... Watermarked   Image: 110010 11  001100 10  00011 100  000000 11 ...
[object Object]

More Related Content

What's hot

digital watermarking
digital watermarkingdigital watermarking
digital watermarking
Bharath
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Ankush Kr
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
ncct
 

What's hot (20)

Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Watermark
WatermarkWatermark
Watermark
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarking
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Digital Watermarking Report
Digital Watermarking ReportDigital Watermarking Report
Digital Watermarking Report
 
Digital Image Watermarking
Digital Image WatermarkingDigital Image Watermarking
Digital Image Watermarking
 
Secure communication
Secure communicationSecure communication
Secure communication
 

Viewers also liked

Viewers also liked (11)

Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
Watermark
WatermarkWatermark
Watermark
 
discrete wavelet transform
discrete wavelet transformdiscrete wavelet transform
discrete wavelet transform
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
 
Image processing research proposal
Image processing research proposalImage processing research proposal
Image processing research proposal
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
 
watermarking
watermarkingwatermarking
watermarking
 

Similar to Watermarking in-imageprocessing

Technical seminar
Technical seminarTechnical seminar
Technical seminar
10e11a0545
 
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
IDES Editor
 

Similar to Watermarking in-imageprocessing (20)

Vidhi's ppt
Vidhi's pptVidhi's ppt
Vidhi's ppt
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdf
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
Survey on Reversible Watermarking
Survey on Reversible Watermarking Survey on Reversible Watermarking
Survey on Reversible Watermarking
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwt
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
HTC Developer - 2012
HTC Developer - 2012HTC Developer - 2012
HTC Developer - 2012
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarking
 

Recently uploaded

IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
17thcssbs2
 
Liberal & Redical Feminism presentation.pptx
Liberal & Redical Feminism presentation.pptxLiberal & Redical Feminism presentation.pptx
Liberal & Redical Feminism presentation.pptx
Rizwan Abbas
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 

Recently uploaded (20)

Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdfPost Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPoint
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 
Liberal & Redical Feminism presentation.pptx
Liberal & Redical Feminism presentation.pptxLiberal & Redical Feminism presentation.pptx
Liberal & Redical Feminism presentation.pptx
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 
Keeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesKeeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security Services
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 

Watermarking in-imageprocessing

  • 1. Digital Water Marking By Sheikh Qaisar Ayub Advanced Topics in Image Processing [email_address] Qaisar Ayub & Sulma Rashid
  • 2. Watermark Observe image It is intellectual property Some one may spend a lot of time And thinking to compose this image
  • 3. The image has been extended by any other person now he is owner of image
  • 4. How to protect image ? P roblem Solution Watermark
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Types of Digital Watermark 01100101 00000011 01101000 Encoder Key Data ENCODING Algorithm Note Watermark will not effect the composition of image
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Example Extract Watermark Algorithm Watermark detected by the Algorithm and hence intellectual property can be saved.
  • 22. Encoding & Decoding 01100101 00000011 01101000 Encoder Key Data ENCODING Algorithm Extract Watermark Algorithm DECODING Algorithm Communication Media 01101000
  • 23. Mathematically Encoding X’ = EK (X,W) Hence X = Original Image W= watermark information being embedded K= user insertion key E= watermark insertion function X’ = Watermarked Image Mathematically Decoding W = DK’ (X’) Hence X’ = Watermarked image K’= extraction key D= watermark extraction function W= Extracted watermarked information
  • 24.
  • 25.
  • 26. Application of watermark Finger Print IS File save ?
  • 27. Application of watermark Finger Print Data Center-01 Data Center-02 Data Center-03 Network
  • 28. Application of watermark Finger Print A invalid copy is found at any location Extract the embedded figure print From file A figure print is unique value form each data center Can identify the data center
  • 29. Application of watermark Embed the number of copies to be allowed for copying embed in the hardware 4 4 3 2 1 Copy not allowed Click on image to Play
  • 30. Application of watermark Fraud Detection Data Center-01 Data Center-02 Data Center-03 Network
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.