SlideShare a Scribd company logo
Digital watermarking techniques for
security applications
Technical seminar on
Overview
• Abstract
• What is Digital Watermarking?
• Digital watermarking system
• Qualities of Digital Watermarking
• Types of Watermarking Techniques
• Applications of Digital Watermarking
• Watermarking Attacks
Abstract
• Nowadays, the success of internet technology, made our life
very much easy and convenient. But the major problem is to
secure the data from duplication and unauthorized use. So
the digital watermarking is used. With this technology, we
embed the secret information into the actual information for
protecting it from unauthorized use. By using this technique
only authorized user can access the data. It may be classified
into two domains that are spatial domain and frequency
domain. In this paper, we have briefly discussed about these
technologies and their pros and cons.
What is Digital Watermarking?
 Digital watermarking is that technology which is used for
protection of digital media such as video, audio and image.
 In this technique, watermark i.e. secret information is embedded in
digital media using some algorithms and the watermarked media is
processed. After that, watermark i.e. secret information is extracted
using the particular algorithm.
 This technique, i.e. digital watermarking is used for authentication
of data and protection of copyright. Here two phases are used
which are embedding of the watermark and detection and
extraction of watermark
Digital watermarking system
Qualities of Digital Watermarking
 Robustness: When we transmit a watermarked data, then there are
various attacks on that and that information may undergo different
types of operations. So in these conditions, watermark must not degrade
its quality
 Security: It means that, the watermark must be such that only
authorized users can access it. If any user has no embedding
information, he must be unable to detect the watermark. This is termed
as security of watermark
 Computational Cost: It depends on the method which is used for
watermarking. If the watermarking method is more complex, then it
contains complex algorithm, requirement of more software and
hardware, so computational cost increases and vice versa.
Types of Watermarking Techniques
 spatial domain watermarking
 frequency domain watermarking
Spatial Domain Watermarking
 In the spatial domain techniques, we embed the watermark
by modifying the pixel values.
 We know that the image is made up of pixels.
 In this method of watermarking, we embed the watermark
in some specific pixels of image.
 In the extraction phase, we extract the watermark from
these specific pixels.
 This technique is very much easy to use, less complex and
also takes less time.
 But on the other hand, it is not robust for various types of
attacks.
Transform Domain Watermarking
 The transform domain watermarking is better as
compared to the spatial domain watermarking.
 The image is represented in the form of frequency in the
transform domain watermarking.
 In the transform domain watermarking techniques, firstly
conversion of the original image is done by a predefined
transformation.
 Then we embed the watermark in the transform image or
in the transformation coefficients.
 Finally, we take the inverse transform to get the
watermarked image.
Applications of Digital Watermarking
Copyright Protection: Digital watermarking is used to identify and
protect copyright ownership. Digital data is embedded with watermarks to
identify the copyright owners
Medical Application: For any treatment, medical reports are very much
important. If the reports get mixed, it proves very much dangerous for the
patients. So by using digital watermarking, we embed the name of the
patients on the reports such as an MRI scan and X-Ray reports .
Annotation and Privacy Control: To annotate an image multi-bit
watermarking can be used. For example, imaging details and patient
records related to a medical image can be carefully embedded into the
image.
Watermarking Attacks
• Removal Attack: In this, the unauthorized user tries to remove
the watermark i.e. secret information from the watermarked data
• Interference Attack: In these types of attacks, the noise is
inserted to the watermarked media. Some examples of this
category are averaging, quantization, compression etc.
• Active Attack: It is the most important attack. Here the
unauthorized user tries to extract the watermark or simply makes
the watermark such that it cannot be detected by any operation.
• Passive Attacks: In this type of attack, unauthorized user
simply tries to find out that the particular data contain the
watermark or not
• Image Degradation: In these types of attacks, the parts of
the image are removed, resulting in damage of robust
watermarks. Examples of these attacks are partial cropping,
row removal and column removal, insertion of Gaussian
noise.
Thank you

More Related Content

What's hot

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
nafees321
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Mohamed Talaat
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
vijay rastogi
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
Jaykrishna Thakkar
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
Shiraz University
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
vasanthimuniasamy
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Watermark
WatermarkWatermark
Watermark
ravi33s
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingrupareliab14
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
ncct
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
Priyanka Sharma
 
Information hiding
Information hidingInformation hiding
Information hiding
TabassumSaifi2
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
Abdelhamid Limami
 

What's hot (20)

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Watermark
WatermarkWatermark
Watermark
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Steganography
SteganographySteganography
Steganography
 
Information hiding
Information hidingInformation hiding
Information hiding
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Chapter3
Chapter3Chapter3
Chapter3
 

Similar to Digital watermarking techniques for security applications

STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
IJNSA Journal
 
Review on Quantum Watermarking Techniques
Review on Quantum Watermarking TechniquesReview on Quantum Watermarking Techniques
Review on Quantum Watermarking Techniques
IRJET Journal
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
IJERA Editor
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
prdpgpt
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking Techniques
Nazeera Sheth
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar10e11a0545
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET Journal
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
IJERA Editor
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
theijes
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))
IAESIJEECS
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
Editor IJCATR
 
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication Methods
IRJET Journal
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking
Editor IJMTER
 
Dz31840846
Dz31840846Dz31840846
Dz31840846
IJERA Editor
 
B010510613
B010510613B010510613
B010510613
IOSR Journals
 
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
IRJET Journal
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Editor IJCATR
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarking
ijsrd.com
 

Similar to Digital watermarking techniques for security applications (20)

STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
Review on Quantum Watermarking Techniques
Review on Quantum Watermarking TechniquesReview on Quantum Watermarking Techniques
Review on Quantum Watermarking Techniques
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking Techniques
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
 
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication Methods
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking
 
Dz31840846
Dz31840846Dz31840846
Dz31840846
 
B010510613
B010510613B010510613
B010510613
 
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarking
 

Recently uploaded

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 

Digital watermarking techniques for security applications

  • 1. Digital watermarking techniques for security applications Technical seminar on
  • 2. Overview • Abstract • What is Digital Watermarking? • Digital watermarking system • Qualities of Digital Watermarking • Types of Watermarking Techniques • Applications of Digital Watermarking • Watermarking Attacks
  • 3. Abstract • Nowadays, the success of internet technology, made our life very much easy and convenient. But the major problem is to secure the data from duplication and unauthorized use. So the digital watermarking is used. With this technology, we embed the secret information into the actual information for protecting it from unauthorized use. By using this technique only authorized user can access the data. It may be classified into two domains that are spatial domain and frequency domain. In this paper, we have briefly discussed about these technologies and their pros and cons.
  • 4. What is Digital Watermarking?  Digital watermarking is that technology which is used for protection of digital media such as video, audio and image.  In this technique, watermark i.e. secret information is embedded in digital media using some algorithms and the watermarked media is processed. After that, watermark i.e. secret information is extracted using the particular algorithm.  This technique, i.e. digital watermarking is used for authentication of data and protection of copyright. Here two phases are used which are embedding of the watermark and detection and extraction of watermark
  • 6. Qualities of Digital Watermarking  Robustness: When we transmit a watermarked data, then there are various attacks on that and that information may undergo different types of operations. So in these conditions, watermark must not degrade its quality  Security: It means that, the watermark must be such that only authorized users can access it. If any user has no embedding information, he must be unable to detect the watermark. This is termed as security of watermark  Computational Cost: It depends on the method which is used for watermarking. If the watermarking method is more complex, then it contains complex algorithm, requirement of more software and hardware, so computational cost increases and vice versa.
  • 7. Types of Watermarking Techniques  spatial domain watermarking  frequency domain watermarking
  • 8. Spatial Domain Watermarking  In the spatial domain techniques, we embed the watermark by modifying the pixel values.  We know that the image is made up of pixels.  In this method of watermarking, we embed the watermark in some specific pixels of image.  In the extraction phase, we extract the watermark from these specific pixels.  This technique is very much easy to use, less complex and also takes less time.  But on the other hand, it is not robust for various types of attacks.
  • 9. Transform Domain Watermarking  The transform domain watermarking is better as compared to the spatial domain watermarking.  The image is represented in the form of frequency in the transform domain watermarking.  In the transform domain watermarking techniques, firstly conversion of the original image is done by a predefined transformation.  Then we embed the watermark in the transform image or in the transformation coefficients.  Finally, we take the inverse transform to get the watermarked image.
  • 10. Applications of Digital Watermarking Copyright Protection: Digital watermarking is used to identify and protect copyright ownership. Digital data is embedded with watermarks to identify the copyright owners Medical Application: For any treatment, medical reports are very much important. If the reports get mixed, it proves very much dangerous for the patients. So by using digital watermarking, we embed the name of the patients on the reports such as an MRI scan and X-Ray reports . Annotation and Privacy Control: To annotate an image multi-bit watermarking can be used. For example, imaging details and patient records related to a medical image can be carefully embedded into the image.
  • 11. Watermarking Attacks • Removal Attack: In this, the unauthorized user tries to remove the watermark i.e. secret information from the watermarked data • Interference Attack: In these types of attacks, the noise is inserted to the watermarked media. Some examples of this category are averaging, quantization, compression etc. • Active Attack: It is the most important attack. Here the unauthorized user tries to extract the watermark or simply makes the watermark such that it cannot be detected by any operation.
  • 12. • Passive Attacks: In this type of attack, unauthorized user simply tries to find out that the particular data contain the watermark or not • Image Degradation: In these types of attacks, the parts of the image are removed, resulting in damage of robust watermarks. Examples of these attacks are partial cropping, row removal and column removal, insertion of Gaussian noise.