A complete introduction and comparison of various watermarking techniques along with applications, architecture, features, attacks and an implemented example.
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
Digital watermarking Techniques
1. Digital WatermarkingDigital Watermarking
Guided by:
Prof. M.M Goyani
Department of Computer Engineering
Government Engineering College, Modasa
Presented by:
Nazeerah A. Sheth
Enrolment no. :160160702006
Department of Computer Engineering
Government Engineering College, Modasa
3. Digital watermarking is the embedding of a signal or secret into a digital
media such as an image, audio or video
A technology developed to facilitate data authentication, security and
copyright protection of digital media
IntroductionIntroduction
7. ◦ Robust:
Can resist the common geometric transformations, image processing and
lossy compression
Fragile:
Fails to be detectable after the slightest modification, mainly used for
integrity purposes
◦ Semi Fragile:
Capable of tolerating some degree of the change to a watermarked image
Classification Of Digital WatermarkingClassification Of Digital Watermarking
According to Robustness:
8. Classification Of Digital WatermarkingClassification Of Digital Watermarking
According to Perceptivity:
Visible Watermark Invisible Watermark
9. Image watermarking
Classification Of Digital WatermarkingClassification Of Digital Watermarking
According to Attached Host:
Video watermarking
Audio watermarking
Text watermarking
10. Features of Digital WatermarkingFeatures of Digital Watermarking
o Robustness
o Imperceptibility
o Security
o Verifiability
o Capacity and Data Payload
o Computational Cost
14. Spatial Domain Watermarking TechniquesSpatial Domain Watermarking Techniques
o Patchwork Algorithm
It is based on a pseudorandom, statistical model which works by embedding a
specific statistic into the cover image based on patches
A = A - d
B = B + d
16. Frequency Domain TechniquesFrequency Domain Techniques
o Discrete Cosine Transform
Represents data in terms of frequency space rather than amplitude space
18. Frequency Domain TechniquesFrequency Domain Techniques
o Discrete Wavelet Transform
The DWT decomposes a signal into a set of basis functions called wavelets
which analysis the signal at multi resolution and frequencies
19. Comparison of Different Techniques:Comparison of Different Techniques:
Technique Advantages Disadvantages
LSB • Easy to implement and understand
• Low degradation of image quality
• High perceptual transparency
• Lacks basic robustness
• Vulnerable to noise
• Vulnerable to cropping, scaling, lossy
compression
Patchwork • High level of robustness against most
type of attacks
• Can hide only a very small amount of
information
Correlation • Gain factor can be increased resulting
in increased robustness
• Image quality gets deceased due to increased
gain factor
DCT • High transparency and robustness • Block wise DCT destroys the invariance
properties of the system
• Certain higher frequency components tend to
be suppressed
DFT • Invariant against geometric
distortions
• Complex computation and high implementation
cost
DWT • Allows good localization both in time
and spatial frequency domain
• Higher compression ratio which is
relevant to human perception
• Longer compression time
• Noise/blur near edges of images
20. Attacks On WatermarksAttacks On Watermarks
o Removal Attacks: These aim at the complete removal of the watermark
information from the watermarked data without cracking the security of the
watermarking algorithm. This category includes denoising, quantization and
collusion attacks.
Collusion attack type 1 Collusion attack type 2
21. Attacks On WatermarksAttacks On Watermarks
o Geometric Attacks: They do not actually remove the embedded watermark
itself, but intend to distort the watermark detector synchronization with the
embedded information. The detector could recover the embedded watermark
information when perfect synchronization is regained. This category incudes
rotation, scaling and various transformations.
Geometric Attacks
22. Attacks On WatermarksAttacks On Watermarks
oCryptographic Attacks: Cryptographic attacks aim at
cracking the security methods in watermarking schemes
and thus finding a way to remove the embedded watermark
information or to embed misleading watermarks.
Techniques used can vary from brute-force to oracle attack.
oProtocol Attacks: Protocol attacks aim at attacking the
entire concept of the watermarking application. This can
include invertible watermarks or copy attacks.
23. ConclusionsConclusions
o Digital watermarking technology can provide a new way to protect the
copyright of multimedia information and to ensure its safe use
o Attacks on digital watermarks must consider both watermark survival and the
distortion of the attacked document
o A truly robust, transparent and secure watermarking technique should be
focused to ensure complete security
25. [1] P. Singh and R. S. Chadha, “A Survey of Digital Watermarking Techniques, Applications and
Attacks,” International Journal of Engineering and Innovative Technology, vol. 2, no. 9, pp. 165-
175, 2013
[2] Voloshynovskiy, Sviatolsav, et al. "Attacks on digital watermarks: classification, estimation based
attacks, and benchmarks." IEEE communications Magazine 39.8 (2001): 118-126
[3] Potdar, Vidyasagar M., Song Han, and Elizabeth Chang. "A survey of digital image watermarking
techniques." Industrial Informatics, 2005. INDIN'05. 2005 3rd IEEE International Conference on.
IEEE, 2005
[4] Liu, Tong, and Zheng-ding Qiu. "The survey of digital watermarking-based image authentication
techniques." Signal Processing, 2002 6th International Conference on. Vol. 2. IEEE, 2002
[5] Lee, Sin-Joo, and Sung-Hwan Jung. "A survey of watermarking techniques applied to
multimedia." Industrial Electronics, 2001. Proceedings. ISIE 2001. IEEE International
Symposium on. Vol. 1. IEEE, 2001.
ReferencesReferences