SlideShare a Scribd company logo
1 of 29
Digital Watermarking
Parag Agarwal
{pxa016500@utdallas.edu}
Agenda
• Background
• Terminology
• Applications
• Techniques
• Research topics
• References
Information Hiding
• Information Hiding…..started with
Steganography (art of hidden writing):
The art and science of writing hidden messages in such a way that
no one apart from the intended recipient knows of the existence of
the message. The existence of information is secret.
Stego – Hidden , Graphy – Writing  ‘art of hidden writing’
Steganography
(dates back to 440 BC)
• Histaeus used his slaves (information tattooed on a slave’s shaved
head )
Initial Applications of information hiding  Passing Secret messages
Microchip - Application
• Germans used Microchips in World War II
Initial Applications of information hiding  Passing Secret messages
What is a watermark ?
What is a watermark ? A distinguishing mark
impressed on paper during manufacture; visible
when paper is held up to the light (e.g. $ Bill)
Application for print media  authenticity of print media
What is a watermark ?
Digital Watermarking: Application of Information
hiding (Hiding Watermarks in digital Media, such
as images)
Digital Watermarking can be ?
- Perceptible (e.g. author information in .doc)
- Imperceptible (e.g. author information in images)
Visibility is application dependent
Invisible watermarks are preferred ?
Applications
Copyright Protecton:To prove the ownership
of digital media
Eg. Cut paste of images
Hidden Watermarks represent
the copyright information
Applications
Tamper proofing: To find out if data was
tampered.
Eg. Change meaning of images
Hidden Watermarks track
change in meaning
Issues: Accuracy of detection
Applications
Quality Assessment: Degradation of Visual
Quality
Loss of Visual Quality
Hidden Watermarks track change in visual quality
Comparison
• Watermarking Vs Cryptography
Watermark D  Hide information in D
Encrypt D  Change form of D
Watermarking Process
• Data (D), Watermark (W), Stego Key (K),
Watermarked Data (Dw)
Embed (D, W, K) = Dw
Extract (Dw) = W’ and compare with W
(e.g. find the linear correlation and compare it to a
threshold)
Q. How do we make this system secure ?
A. K is secret (Use cryptography to make information hidden more
secure)
Watermarking Process
Example – Embedding (Dw = D + W)
• Matrix representation (12 blocks – 3 x 4 matrix)
(Algorithm Used: Random number generator RNG), Seed for
RNG = K, D = Matrix representation, W = Author’s name
1
5
2 43
6
10
7
11 12
8
9
Watermarking Process
Example – Extraction
• The Watermark can be identified by generating the
random numbers using the seed K
1
6
10
8
Data Domain Categorization
• Spatial Watermarking
Direct usage of data to embed and extract Watermark
e.g. voltage values for audio data
• Transform Based Watermarking
Conversion of data to another format to embed and
extract.
e.g. Conversion to polar co-ordinate systems of 3D
models, makes it robust against scaling
Extraction Categorization
• Informed (Private)
Extract using {D, K, W}
• Semi - Blind (Semi-Private)
Extract using {K, W}
• Blind (Public)
Extract using {K}
- Blind (requires less information storage)
- Informed techniques are more robust to tampering
Robustness Categorization
• Fragile (for tamper proofing e.g. losing
watermark implies tampering)
• Semi-Fragile (robust against user level
operations, e.g. image compression)
• Robust (against adversary based attack,
e.g. noise addition to images)
This categorization is application dependent
Categorization of Watermark
Eg1. Robust Private Spatial Watermarks
Eg2. Blind Fragile DCT based Watermarks
Eg3. Blind Semi-fragile Spatial Watermarks
Watermarking Example
Application: Copyright Protection
Design Requirements:
- Imperceptibility
- Capacity
- Robustness
- Security
Imperceptibility
Stanford Bunny 3D Model Visible Watermarks in
Bunny Model  Distortion
Watermarking
Stanford Bunny 3D Model
Watermarking
Invisible Watermarks in Bunny
Model  Minimal Distortion
Robustness
Adversaries can attack the data set and
remove the watermark.
Attacks are generally data dependent
e.g. Compression that adds noise can be used
as an attack to remove the watermark. Different
data types can have different compression
schemes.
Robustness
• Value Change Attacks
- Noise addition e.g. lossy compression
- Uniform Affine Transformation e.g. 3D
model being rotated in 3D space OR
image being scaled
If encoding of watermarks are data value dependent 
Watermark is lost  Extraction process fails
Robustness
• Sample loss Attacks
- Cropping e.g. Cropping in images
- Smoothing e.g. smoothing of audio
signals e.g. Change in Sample rates
in audio data change in sampling rat
results in loss of samples
If watermarks are encoded in parts of data set which are
lost  Watermark is lost  Extraction process fails
Robustness
• Reorder Attack
- Reversal of sequence of data values e.g.
reverse filter in audio signal reverses the
order of data values in time
If encoding is dependent on an order and the order is changed
 Watermark is lost Extraction process fails
1 2 3 123
Attack
0 1 1 1 1 0
Samples in time Samples in time
Capacity
• Multiple Watermarks can be supported.
• More capacity implies more robustness
since watermarks can be replicated.
Spatial Methods are have higher capacity than transform
techniques ?
Security
• In case the key used during watermark is
lost anyone can read the watermark and
remove it.
• In case the watermark is public, it can be
encoded and copyright information is lost.
Watermarking Algorithm
Design Requirements
 As much information (watermarks) as possible
 Capacity
 Only be accessible by authorized parties
 Security
 Resistance against hostile/user dependent
changes
 Robustness
 Invisibility
 Imperceptibility
Tamper proofing
• Robustness against user related
operations – compression, format
conversion
• Accuracy of Detection – Only changes in
meaning should be detected
References
• http://en.wikipedia.org/wiki/Steganography
• http://en.wikipedia.org/wiki/Digital_waterm
ark
• http://www.cypak.com/pictures/med/Cypak
%20microchip.jpg
THANK YOU !

More Related Content

What's hot

Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Arif Ahmed
 
An analysis of digital watermarking in frequency domain
An analysis of digital watermarking in frequency domainAn analysis of digital watermarking in frequency domain
An analysis of digital watermarking in frequency domainLikan Patra
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applicationsKannekanti Utthej
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessingQaisar Ayub
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingnafees321
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology vijay rastogi
 
Watermark
WatermarkWatermark
Watermarkravi33s
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar10e11a0545
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingGovind Raj
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detectionncct
 

What's hot (20)

invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
 
Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....
 
An analysis of digital watermarking in frequency domain
An analysis of digital watermarking in frequency domainAn analysis of digital watermarking in frequency domain
An analysis of digital watermarking in frequency domain
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Watermark
WatermarkWatermark
Watermark
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Vidhi's ppt
Vidhi's pptVidhi's ppt
Vidhi's ppt
 
Watermark
WatermarkWatermark
Watermark
 

Viewers also liked

Image Based Relational Database Watermarking: A Survey
Image Based Relational Database Watermarking: A SurveyImage Based Relational Database Watermarking: A Survey
Image Based Relational Database Watermarking: A Surveyiosrjce
 
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...CSCJournals
 
Data Security In Relational Database Management System
Data Security In Relational Database Management SystemData Security In Relational Database Management System
Data Security In Relational Database Management SystemCSCJournals
 
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...anjuvipin
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Samarth Godara
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingrupareliab14
 

Viewers also liked (13)

Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Image Based Relational Database Watermarking: A Survey
Image Based Relational Database Watermarking: A SurveyImage Based Relational Database Watermarking: A Survey
Image Based Relational Database Watermarking: A Survey
 
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
 
Data Security In Relational Database Management System
Data Security In Relational Database Management SystemData Security In Relational Database Management System
Data Security In Relational Database Management System
 
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Ppt
PptPpt
Ppt
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
 
Robust watermarking technique sppt
Robust watermarking technique spptRobust watermarking technique sppt
Robust watermarking technique sppt
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Digital Watermarking

Lectures 1-2 Time-Domain Characterization of LTI Discrete-Time Systems.ppt
Lectures 1-2 Time-Domain Characterization of LTI Discrete-Time Systems.pptLectures 1-2 Time-Domain Characterization of LTI Discrete-Time Systems.ppt
Lectures 1-2 Time-Domain Characterization of LTI Discrete-Time Systems.pptShamsAli42
 
Lectures 1-2 Time-Domain Characterization of LTI Discrete-Time Systems.ppt
Lectures 1-2 Time-Domain Characterization of LTI Discrete-Time Systems.pptLectures 1-2 Time-Domain Characterization of LTI Discrete-Time Systems.ppt
Lectures 1-2 Time-Domain Characterization of LTI Discrete-Time Systems.pptArnabChakraborty499766
 
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...Shantanu Sharma
 
Secure communication
Secure communicationSecure communication
Secure communicationTushar Swami
 
DATA COMMUNICATION PPT
DATA COMMUNICATION PPTDATA COMMUNICATION PPT
DATA COMMUNICATION PPTMajane Padua
 
Chaotic cryptography and multimedia security
Chaotic cryptography and multimedia securityChaotic cryptography and multimedia security
Chaotic cryptography and multimedia securityFatima Azeez
 
Real time streaming analytics
Real time streaming analyticsReal time streaming analytics
Real time streaming analyticsAnirudh
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Liquid Steganography presentation.pptx
Liquid Steganography  presentation.pptxLiquid Steganography  presentation.pptx
Liquid Steganography presentation.pptxChandniA5
 
Accelerating Genomics SNPs Processing and Interpretation with Apache Spark
Accelerating Genomics SNPs Processing and Interpretation with Apache SparkAccelerating Genomics SNPs Processing and Interpretation with Apache Spark
Accelerating Genomics SNPs Processing and Interpretation with Apache SparkDatabricks
 
Digital Fingerprinting
Digital FingerprintingDigital Fingerprinting
Digital Fingerprintingsanthu652
 
digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfMekalaSamayochitha
 

Similar to Digital Watermarking (20)

Presentation
PresentationPresentation
Presentation
 
Steganography
SteganographySteganography
Steganography
 
Lectures 1-2 Time-Domain Characterization of LTI Discrete-Time Systems.ppt
Lectures 1-2 Time-Domain Characterization of LTI Discrete-Time Systems.pptLectures 1-2 Time-Domain Characterization of LTI Discrete-Time Systems.ppt
Lectures 1-2 Time-Domain Characterization of LTI Discrete-Time Systems.ppt
 
Lectures 1-2 Time-Domain Characterization of LTI Discrete-Time Systems.ppt
Lectures 1-2 Time-Domain Characterization of LTI Discrete-Time Systems.pptLectures 1-2 Time-Domain Characterization of LTI Discrete-Time Systems.ppt
Lectures 1-2 Time-Domain Characterization of LTI Discrete-Time Systems.ppt
 
Image Security
Image SecurityImage Security
Image Security
 
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...
 
Secure communication
Secure communicationSecure communication
Secure communication
 
DATA COMMUNICATION PPT
DATA COMMUNICATION PPTDATA COMMUNICATION PPT
DATA COMMUNICATION PPT
 
Chaotic cryptography and multimedia security
Chaotic cryptography and multimedia securityChaotic cryptography and multimedia security
Chaotic cryptography and multimedia security
 
Real time streaming analytics
Real time streaming analyticsReal time streaming analytics
Real time streaming analytics
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Liquid Steganography presentation.pptx
Liquid Steganography  presentation.pptxLiquid Steganography  presentation.pptx
Liquid Steganography presentation.pptx
 
1918 1923
1918 19231918 1923
1918 1923
 
1918 1923
1918 19231918 1923
1918 1923
 
Steganography
SteganographySteganography
Steganography
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Accelerating Genomics SNPs Processing and Interpretation with Apache Spark
Accelerating Genomics SNPs Processing and Interpretation with Apache SparkAccelerating Genomics SNPs Processing and Interpretation with Apache Spark
Accelerating Genomics SNPs Processing and Interpretation with Apache Spark
 
Digital Fingerprinting
Digital FingerprintingDigital Fingerprinting
Digital Fingerprinting
 
digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdf
 
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
 

Digital Watermarking

  • 2. Agenda • Background • Terminology • Applications • Techniques • Research topics • References
  • 3. Information Hiding • Information Hiding…..started with Steganography (art of hidden writing): The art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. The existence of information is secret. Stego – Hidden , Graphy – Writing  ‘art of hidden writing’
  • 4. Steganography (dates back to 440 BC) • Histaeus used his slaves (information tattooed on a slave’s shaved head ) Initial Applications of information hiding  Passing Secret messages
  • 5. Microchip - Application • Germans used Microchips in World War II Initial Applications of information hiding  Passing Secret messages
  • 6. What is a watermark ? What is a watermark ? A distinguishing mark impressed on paper during manufacture; visible when paper is held up to the light (e.g. $ Bill) Application for print media  authenticity of print media
  • 7. What is a watermark ? Digital Watermarking: Application of Information hiding (Hiding Watermarks in digital Media, such as images) Digital Watermarking can be ? - Perceptible (e.g. author information in .doc) - Imperceptible (e.g. author information in images) Visibility is application dependent Invisible watermarks are preferred ?
  • 8. Applications Copyright Protecton:To prove the ownership of digital media Eg. Cut paste of images Hidden Watermarks represent the copyright information
  • 9. Applications Tamper proofing: To find out if data was tampered. Eg. Change meaning of images Hidden Watermarks track change in meaning Issues: Accuracy of detection
  • 10. Applications Quality Assessment: Degradation of Visual Quality Loss of Visual Quality Hidden Watermarks track change in visual quality
  • 11. Comparison • Watermarking Vs Cryptography Watermark D  Hide information in D Encrypt D  Change form of D
  • 12. Watermarking Process • Data (D), Watermark (W), Stego Key (K), Watermarked Data (Dw) Embed (D, W, K) = Dw Extract (Dw) = W’ and compare with W (e.g. find the linear correlation and compare it to a threshold) Q. How do we make this system secure ? A. K is secret (Use cryptography to make information hidden more secure)
  • 13. Watermarking Process Example – Embedding (Dw = D + W) • Matrix representation (12 blocks – 3 x 4 matrix) (Algorithm Used: Random number generator RNG), Seed for RNG = K, D = Matrix representation, W = Author’s name 1 5 2 43 6 10 7 11 12 8 9
  • 14. Watermarking Process Example – Extraction • The Watermark can be identified by generating the random numbers using the seed K 1 6 10 8
  • 15. Data Domain Categorization • Spatial Watermarking Direct usage of data to embed and extract Watermark e.g. voltage values for audio data • Transform Based Watermarking Conversion of data to another format to embed and extract. e.g. Conversion to polar co-ordinate systems of 3D models, makes it robust against scaling
  • 16. Extraction Categorization • Informed (Private) Extract using {D, K, W} • Semi - Blind (Semi-Private) Extract using {K, W} • Blind (Public) Extract using {K} - Blind (requires less information storage) - Informed techniques are more robust to tampering
  • 17. Robustness Categorization • Fragile (for tamper proofing e.g. losing watermark implies tampering) • Semi-Fragile (robust against user level operations, e.g. image compression) • Robust (against adversary based attack, e.g. noise addition to images) This categorization is application dependent
  • 18. Categorization of Watermark Eg1. Robust Private Spatial Watermarks Eg2. Blind Fragile DCT based Watermarks Eg3. Blind Semi-fragile Spatial Watermarks
  • 19. Watermarking Example Application: Copyright Protection Design Requirements: - Imperceptibility - Capacity - Robustness - Security
  • 20. Imperceptibility Stanford Bunny 3D Model Visible Watermarks in Bunny Model  Distortion Watermarking Stanford Bunny 3D Model Watermarking Invisible Watermarks in Bunny Model  Minimal Distortion
  • 21. Robustness Adversaries can attack the data set and remove the watermark. Attacks are generally data dependent e.g. Compression that adds noise can be used as an attack to remove the watermark. Different data types can have different compression schemes.
  • 22. Robustness • Value Change Attacks - Noise addition e.g. lossy compression - Uniform Affine Transformation e.g. 3D model being rotated in 3D space OR image being scaled If encoding of watermarks are data value dependent  Watermark is lost  Extraction process fails
  • 23. Robustness • Sample loss Attacks - Cropping e.g. Cropping in images - Smoothing e.g. smoothing of audio signals e.g. Change in Sample rates in audio data change in sampling rat results in loss of samples If watermarks are encoded in parts of data set which are lost  Watermark is lost  Extraction process fails
  • 24. Robustness • Reorder Attack - Reversal of sequence of data values e.g. reverse filter in audio signal reverses the order of data values in time If encoding is dependent on an order and the order is changed  Watermark is lost Extraction process fails 1 2 3 123 Attack 0 1 1 1 1 0 Samples in time Samples in time
  • 25. Capacity • Multiple Watermarks can be supported. • More capacity implies more robustness since watermarks can be replicated. Spatial Methods are have higher capacity than transform techniques ?
  • 26. Security • In case the key used during watermark is lost anyone can read the watermark and remove it. • In case the watermark is public, it can be encoded and copyright information is lost.
  • 27. Watermarking Algorithm Design Requirements  As much information (watermarks) as possible  Capacity  Only be accessible by authorized parties  Security  Resistance against hostile/user dependent changes  Robustness  Invisibility  Imperceptibility
  • 28. Tamper proofing • Robustness against user related operations – compression, format conversion • Accuracy of Detection – Only changes in meaning should be detected