Digital watermarking


Published on

Published in: Technology, Art & Photos
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Digital watermarking

  1. 1. DIGITAL WATERMARKING<br />1<br />
  2. 2. INTRODUCTION:-<br /> Think of a multimedia data that is being distributed over the Internet.<br /> Someone downloads it , claims it that he has the copyright, and sells it. In these kinds of situations, digital watermarking techniques can be used for establishing ownership rights, ensuring authorized access, preventing illegal reapplication and facilitating content authentication.<br />2<br />
  3. 3. “Digital watermarking is the process of embedding information into a digital signal in a way that is difficult to remove.”<br /> The signal may be audio, pictures or video, for example. If the signal is copied, then the information is also carried in the copy. A signal may carry several different watermarks at the same time.<br />3<br />
  4. 4. General Procedure for Digital Watermarking:<br />4<br />
  5. 5. WATERMARKING LIEF-CYCLE<br />5<br />
  6. 6. ATTACKS:-<br /> Attacks on watermark may not necessarily remove the watermark, but disable its readability. Image processing and transforms are commonly employed to create and apply watermarks. <br /> These same techniques can also be used to disable or overwrite watermarks. Multiple watermarks can be placed in an image and one cannot determine which one is valid. Currently watermark registration service is "first come, first served." Someone other than the rightful owner may attempt to register a copyright first.<br />6<br />
  7. 7. TYPES OF ATTACKS ON WATERMARKS<br />Removal attacks<br />Geometrical attacks<br />Cryptographic attacks <br />Protocol attacks<br />7<br />
  8. 8. TYPES OF WATERMARK:<br />(1)ROBUST WATERMARK:<br /> A robust watermark is a watermark that is difficult to remove from the object inwhich it is embedded.<br />(2)FRAGILE WATERMARK:<br /> A fragile watermark is destroyed if anybody attempts to tamper with the object inwhich it is embedded.<br />(3)VISIBLE WATERMARK:<br /> A visible watermark is immediately perceptible and clearly identifies the cover object as copyright-protected material, much like the copyright symbols ã, â, and ä <br />(4)INVISIBLE WATERMARK:<br /> An invisible watermark is not normally perceptible, but can still be used by the rightful owner as evidence of data authenticity in a court of law.<br />8<br />
  9. 9. Important Parameters<br />Transparency <br />Robustness <br />Security<br />Capacity<br />Invertibility (reversibility) <br />Complexity <br />Possibility of verification<br />9<br />
  10. 10. Common watermarking techniques<br /> Choice of Watermark Object<br /><ul><li>Time domain-LSB Modification
  11. 11. Frequency Domain
  12. 12. Wavelet Domain</li></ul>10<br />
  13. 13. APPLICATION <br /><ul><li>Owner identification and proof of ownership</li></ul>11<br />
  14. 14. <ul><li>Broadcast monitoring
  15. 15. Transaction tracking
  16. 16. Usage control</li></ul>12<br />
  17. 17. CONCLUSION:-<br /><ul><li>Digital watermarking has emerged as an essential security technology, fully complementary to encryption-based secure transmission and copy protection.
  18. 18. This technology is widely applicable to almost all electronic information services and systems where data protection, security, and intellectual property rights are needed.
  19. 19. However, effective uses in fields such as digital camera, DVD, digital broadcasting, electronic commerce, and law enforcement have not been explored.</li></ul>13<br />
  20. 20. THANK YOU<br />14<br />