SlideShare a Scribd company logo
Digital
watermarking
By:-jaykrishna Thakkar
Fy Msc-it
wHat iS a watermark..?
 Watermarking is an important
mechanism applied to physical objects
like bills, papers, garment labels ,product
packing…
 Physical objects can be watermarked
using special dyes and inks or during
paper
manufacturing.
CHaraCteriStiCS of
watermarkS
 The watermark is hidden from view
during normal use, only become visible
by adopting a special viewing process.
– E.g. hold the bill up to light
 The watermark carries information
about the object in which it is hidden.
– E.g. the authenticity of the bill
– E.g. the trademark of the paper
manufacturer
HiStory of watermarking
 The term “watermark” was probably
originated from the German term
“wassermarke”. Since watermark is of
no importance in the creation of the
mark, the name is probably given
because the marks resemble the effects
of water on paper.
 Papers are invented in China over a
thousand years ago. However, the first
paper watermark did not appear until
1282, in Italy.
HiStory of watermarking
 By the 18th century, watermarks on
paper in Europe and America had been
used as trademarks, to record the
manufactured date, or to indicate the
size of original sheets.
 Watermarks are commonly used on bills
nowadays to avoid counterfeiting
wHat iS Digital watermarking?
 Watermarking can also be applied
to digital signals!
image video Audio
HiStory of Digital watermarking
 The first watermarking example similar to the
digital methods nowadays appeared in 1954.
The Muzak Corporation filed a patent for
“watermarking” musical Work. An identification
Work was inserted in music by intermittently
applying a narrow notch filter centred at 1KHz.
 About 1995, interest in digital watermarking
began to mushroom.
Definitions about Digital
watermarking
 Digital watermarking:
– The practice of imperceptibly alternating a
Work to embed a message about the Work.
 – Related terms
 Work: a specific copy of some electronic signal,
such as a song, a video sequence, or a picture
 Cover Work: the original un-watermarked work,
since it covers (hides) the watermark
 Watermark: the messages being embedded,
indicating some information about the work
How it works…
types of watermark
 Visible
 A visible translucent
image which is overlaid
on the primary image
 Invisible
 An overlaid image
which cannot be seen,
but which can be
detected
algorithmically
Visible watermark
 Logo or seal of the organization which
holds the rights to the primary image,
it allows the primary image to be
viewed, but still marks it clearly as the
property of the owning organization.
 Overlay the watermark in a way which
makes it difficult to remove, if the goal
of indicating property rights is to be
achieved.
Visible watermark
inVisible watermark
 Embedding level is too small to notice
 Can be retrieved by extraction software
 Applications:
Authentication
Copyrighting
Etc…
inVisible watermark
ApplicAtions of digitAl
wAtermArking
 Rights management
 Contents management
 Access/copy control
 Authentication
feAtures of wAtermArking
 Invisible/Inaudible
 Information is embedded without digital content
degradation, because of the level of embedding
operation is too small for human to notice the
change.
 Inseparable
 The embedded information can survive after some
processing, compression and format transformation.
 Unchanging data file size
 Data size of the media is not changed before and
after embedding operation because information is
embedded directly into the media.
technicAl requirements for
wAtermArking
Invisibility
Robustness Capacity
digitAl wAtermArking AlliAnce
Represents applications and solutions for:
 Audio and Music Content
 Video, Movies and TV Content
 Digital Imagery
 Identity Documents
 Value Documents
digitAl wAtermArking AlliAnce
members
digitAl wAtermArking exAmples
 Copyright Communication
 Copy Protection
 Monitoring
 Filtering/Classification
 Authentication/Integrity
 Product Serialization & Tracking
 Asset/Content Management
 Rights Management
 Remote Triggering
 Linking/E-Commerce
copyright digitAl
wAtermArk Architecture
Audio/Video Master
Embed Copyright
and Content ID DWM
Content Owner
Provider Index Database Location
(Centralized or Distributed)
User’s PC
Rip Software
Compressed Audio/Video
File (e.g. MP3 file)
User Software
Detect Copyright and Content ID
DWM for Secure and Enhanced
content
Rights & Info Database
Content ID linked to rights, information
and related content
Can be used to address P2P and social network content Identification needs as well
as providing identification of orphan works and access to metadata/networked
information
Digital MeDia Serialization &
tracking
 Identifies content owners and rights
while communicating copyright
information
 Awareness of watermarked content by
consumer creates deterrent against
unauthorized copying and distribution
 Provides accurate identification of source
of unauthorized content discovered on
the Internet and/or physical media
Protected for
privacy
Recordable Media
Embed
Serial # (2)
Embed
Serial # (1)
Content ID
Retail Content
Content Provider
Track and take
proper action Detect
Serial Number
any queStionS…
Digital watermarking

More Related Content

What's hot

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingrupareliab14
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
Shiraz University
 
Watermarking
WatermarkingWatermarking
Watermarking
Pushkar Dutt
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
vijay rastogi
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
vasanthimuniasamy
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 
Watermark
WatermarkWatermark
Watermark
ravi33s
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
Digital Watermarking Report
Digital Watermarking ReportDigital Watermarking Report
Digital Watermarking Report
OECLIB Odisha Electronics Control Library
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
ncct
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
Priyanka Sharma
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
sudip nandi
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
Mazin Alwaaly
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
Qaisar Ayub
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
Surit Datta
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
Kannekanti Utthej
 

What's hot (20)

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermark
WatermarkWatermark
Watermark
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Watermark
WatermarkWatermark
Watermark
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Steganography
SteganographySteganography
Steganography
 
Digital Watermarking Report
Digital Watermarking ReportDigital Watermarking Report
Digital Watermarking Report
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 

Viewers also liked

QR Code Introduction
QR Code IntroductionQR Code Introduction
QR Code Introduction
Jeroen Steeman
 
12205451 pss7
12205451 pss712205451 pss7
12205451 pss7yuti_3011
 
TLA Presentation on QR-codes
TLA Presentation on QR-codesTLA Presentation on QR-codes
TLA Presentation on QR-codes
Dustin Haisler
 
QR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearningQR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearning
Graham Clark
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubi
mishrasubrat
 
2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?Delvinia
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
Prashant Singh
 
QR code
QR codeQR code
QR code
Noah Kim
 
10 Things Money Can´t Buy
10 Things Money Can´t Buy10 Things Money Can´t Buy
10 Things Money Can´t Buy
Abhishek Shah
 
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic AlgorithmImage Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
ijsrd.com
 
Surveillance and Rescue Robot using Android Smartphone and the Internet
Surveillance and Rescue Robot using Android Smartphone and the InternetSurveillance and Rescue Robot using Android Smartphone and the Internet
Surveillance and Rescue Robot using Android Smartphone and the Internet
SHOEB SHAH
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and future
blogzilla
 
Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....
Arif Ahmed
 
60 312-318
60 312-31860 312-318
60 312-318
idescitation
 

Viewers also liked (16)

Vidhi's ppt
Vidhi's pptVidhi's ppt
Vidhi's ppt
 
QR Code Introduction
QR Code IntroductionQR Code Introduction
QR Code Introduction
 
12205451 pss7
12205451 pss712205451 pss7
12205451 pss7
 
TLA Presentation on QR-codes
TLA Presentation on QR-codesTLA Presentation on QR-codes
TLA Presentation on QR-codes
 
QR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearningQR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearning
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubi
 
2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
QR code
QR codeQR code
QR code
 
10 Things Money Can´t Buy
10 Things Money Can´t Buy10 Things Money Can´t Buy
10 Things Money Can´t Buy
 
watermarking
watermarkingwatermarking
watermarking
 
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic AlgorithmImage Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
 
Surveillance and Rescue Robot using Android Smartphone and the Internet
Surveillance and Rescue Robot using Android Smartphone and the InternetSurveillance and Rescue Robot using Android Smartphone and the Internet
Surveillance and Rescue Robot using Android Smartphone and the Internet
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and future
 
Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....
 
60 312-318
60 312-31860 312-318
60 312-318
 

Similar to Digital watermarking

Digital Watermarking.pptx
Digital Watermarking.pptxDigital Watermarking.pptx
Digital Watermarking.pptx
naazminshaikh1727
 
A108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxA108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptx
VaibhavKale80
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000authority12
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
prdpgpt
 
Different kinds of watermarks
Different kinds of watermarksDifferent kinds of watermarks
Different kinds of watermarks
DeftPDF
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
Hyacinth Okeke
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar10e11a0545
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and Applications
YogeshIJTSRD
 
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
IJET - International Journal of Engineering and Techniques
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
Editor IJCATR
 
VladimirNovikovSlides.ppt
VladimirNovikovSlides.pptVladimirNovikovSlides.ppt
VladimirNovikovSlides.ppt
ragsahao2
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
CSCJournals
 
Watermarking
WatermarkingWatermarking
Watermarking
Abbas Ajmal
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
theijes
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
Alexander Decker
 
8-steg.ppt
8-steg.ppt8-steg.ppt
8-steg.ppt
ragsahao2
 
digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdf
MekalaSamayochitha
 
Digital Asset Management
Digital Asset ManagementDigital Asset Management
Digital Asset Management
dibyendupaul
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
ssuser4d4e5a
 

Similar to Digital watermarking (20)

Digital Watermarking.pptx
Digital Watermarking.pptxDigital Watermarking.pptx
Digital Watermarking.pptx
 
A108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxA108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptx
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Different kinds of watermarks
Different kinds of watermarksDifferent kinds of watermarks
Different kinds of watermarks
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and Applications
 
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
 
VladimirNovikovSlides.ppt
VladimirNovikovSlides.pptVladimirNovikovSlides.ppt
VladimirNovikovSlides.ppt
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
 
Watermarking
WatermarkingWatermarking
Watermarking
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 
8-steg.ppt
8-steg.ppt8-steg.ppt
8-steg.ppt
 
digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdf
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
Digital Asset Management
Digital Asset ManagementDigital Asset Management
Digital Asset Management
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
 

Recently uploaded

Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
e20449
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 

Recently uploaded (20)

Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 

Digital watermarking

  • 2. wHat iS a watermark..?  Watermarking is an important mechanism applied to physical objects like bills, papers, garment labels ,product packing…  Physical objects can be watermarked using special dyes and inks or during paper manufacturing.
  • 3. CHaraCteriStiCS of watermarkS  The watermark is hidden from view during normal use, only become visible by adopting a special viewing process. – E.g. hold the bill up to light  The watermark carries information about the object in which it is hidden. – E.g. the authenticity of the bill – E.g. the trademark of the paper manufacturer
  • 4. HiStory of watermarking  The term “watermark” was probably originated from the German term “wassermarke”. Since watermark is of no importance in the creation of the mark, the name is probably given because the marks resemble the effects of water on paper.  Papers are invented in China over a thousand years ago. However, the first paper watermark did not appear until 1282, in Italy.
  • 5. HiStory of watermarking  By the 18th century, watermarks on paper in Europe and America had been used as trademarks, to record the manufactured date, or to indicate the size of original sheets.  Watermarks are commonly used on bills nowadays to avoid counterfeiting
  • 6. wHat iS Digital watermarking?  Watermarking can also be applied to digital signals! image video Audio
  • 7. HiStory of Digital watermarking  The first watermarking example similar to the digital methods nowadays appeared in 1954. The Muzak Corporation filed a patent for “watermarking” musical Work. An identification Work was inserted in music by intermittently applying a narrow notch filter centred at 1KHz.  About 1995, interest in digital watermarking began to mushroom.
  • 8. Definitions about Digital watermarking  Digital watermarking: – The practice of imperceptibly alternating a Work to embed a message about the Work.  – Related terms  Work: a specific copy of some electronic signal, such as a song, a video sequence, or a picture  Cover Work: the original un-watermarked work, since it covers (hides) the watermark  Watermark: the messages being embedded, indicating some information about the work
  • 10. types of watermark  Visible  A visible translucent image which is overlaid on the primary image  Invisible  An overlaid image which cannot be seen, but which can be detected algorithmically
  • 11. Visible watermark  Logo or seal of the organization which holds the rights to the primary image, it allows the primary image to be viewed, but still marks it clearly as the property of the owning organization.  Overlay the watermark in a way which makes it difficult to remove, if the goal of indicating property rights is to be achieved.
  • 13. inVisible watermark  Embedding level is too small to notice  Can be retrieved by extraction software  Applications: Authentication Copyrighting Etc…
  • 15. ApplicAtions of digitAl wAtermArking  Rights management  Contents management  Access/copy control  Authentication
  • 16. feAtures of wAtermArking  Invisible/Inaudible  Information is embedded without digital content degradation, because of the level of embedding operation is too small for human to notice the change.  Inseparable  The embedded information can survive after some processing, compression and format transformation.  Unchanging data file size  Data size of the media is not changed before and after embedding operation because information is embedded directly into the media.
  • 18. digitAl wAtermArking AlliAnce Represents applications and solutions for:  Audio and Music Content  Video, Movies and TV Content  Digital Imagery  Identity Documents  Value Documents
  • 20. digitAl wAtermArking exAmples  Copyright Communication  Copy Protection  Monitoring  Filtering/Classification  Authentication/Integrity  Product Serialization & Tracking  Asset/Content Management  Rights Management  Remote Triggering  Linking/E-Commerce
  • 21. copyright digitAl wAtermArk Architecture Audio/Video Master Embed Copyright and Content ID DWM Content Owner Provider Index Database Location (Centralized or Distributed) User’s PC Rip Software Compressed Audio/Video File (e.g. MP3 file) User Software Detect Copyright and Content ID DWM for Secure and Enhanced content Rights & Info Database Content ID linked to rights, information and related content Can be used to address P2P and social network content Identification needs as well as providing identification of orphan works and access to metadata/networked information
  • 22. Digital MeDia Serialization & tracking  Identifies content owners and rights while communicating copyright information  Awareness of watermarked content by consumer creates deterrent against unauthorized copying and distribution  Provides accurate identification of source of unauthorized content discovered on the Internet and/or physical media
  • 23. Protected for privacy Recordable Media Embed Serial # (2) Embed Serial # (1) Content ID Retail Content Content Provider Track and take proper action Detect Serial Number