SlideShare a Scribd company logo
1 of 25
Digital WatermarkingDigital Watermarking
Guided by:
Prof. M.M Goyani
Department of Computer Engineering
Government Engineering College, Modasa
Presented by:
Nazeerah A. Sheth
Enrolment no. :160160702006
Department of Computer Engineering
Government Engineering College, Modasa
OutlineOutline
Introduction
Applications
Classification
Features of Digital Watermarking
Architecture
Digital Watermarking Techniques
Comparison of Different Techniques
Watermarking Attacks
Conclusion
References
Digital watermarking is the embedding of a signal or secret into a digital
media such as an image, audio or video
A technology developed to facilitate data authentication, security and
copyright protection of digital media
IntroductionIntroduction
Related TermsRelated Terms
ApplicationsApplications
o Copyright Protection
o Tamper Proofing
o Broadcast Monitoring
o Content Authentication
o Annotation and Privacy Control
Classification Of Digital WatermarkingClassification Of Digital Watermarking
◦ Robust:
Can resist the common geometric transformations, image processing and
lossy compression
Fragile:
Fails to be detectable after the slightest modification, mainly used for
integrity purposes
◦ Semi Fragile:
Capable of tolerating some degree of the change to a watermarked image
Classification Of Digital WatermarkingClassification Of Digital Watermarking
 According to Robustness:
Classification Of Digital WatermarkingClassification Of Digital Watermarking
 According to Perceptivity:
Visible Watermark Invisible Watermark
Image watermarking
Classification Of Digital WatermarkingClassification Of Digital Watermarking
 According to Attached Host:
Video watermarking
Audio watermarking
Text watermarking
Features of Digital WatermarkingFeatures of Digital Watermarking
o Robustness
o Imperceptibility
o Security
o Verifiability
o Capacity and Data Payload
o Computational Cost
Basic Watermarking ArchitectureBasic Watermarking Architecture
Digital Watermarking TechniquesDigital Watermarking Techniques
Spatial Domain Watermarking TechniquesSpatial Domain Watermarking Techniques
o Least Significant Bit
130 - 10000010
123 - 01111011
117 - 01110101
Embed
101
10000011 - 131
01111010 - 122
01110101 - 117
Cover Image Watermarked Image
Watermark
Spatial Domain Watermarking TechniquesSpatial Domain Watermarking Techniques
o Patchwork Algorithm
It is based on a pseudorandom, statistical model which works by embedding a
specific statistic into the cover image based on patches
A = A - d
B = B + d
Spatial Domain Watermarking TechniquesSpatial Domain Watermarking Techniques
o Correlation Based Technique
Frequency Domain TechniquesFrequency Domain Techniques
o Discrete Cosine Transform
Represents data in terms of frequency space rather than amplitude space
Frequency Domain TechniquesFrequency Domain Techniques
o Discrete Wavelet Transform/Discrete Fourier Transform
Frequency Domain TechniquesFrequency Domain Techniques
o Discrete Wavelet Transform
The DWT decomposes a signal into a set of basis functions called wavelets
which analysis the signal at multi resolution and frequencies
Comparison of Different Techniques:Comparison of Different Techniques:
Technique Advantages Disadvantages
LSB • Easy to implement and understand
• Low degradation of image quality
• High perceptual transparency
• Lacks basic robustness
• Vulnerable to noise
• Vulnerable to cropping, scaling, lossy
compression
Patchwork • High level of robustness against most
type of attacks
• Can hide only a very small amount of
information
Correlation • Gain factor can be increased resulting
in increased robustness
• Image quality gets deceased due to increased
gain factor
DCT • High transparency and robustness • Block wise DCT destroys the invariance
properties of the system
• Certain higher frequency components tend to
be suppressed
DFT • Invariant against geometric
distortions
• Complex computation and high implementation
cost
DWT • Allows good localization both in time
and spatial frequency domain
• Higher compression ratio which is
relevant to human perception
• Longer compression time
• Noise/blur near edges of images
Attacks On WatermarksAttacks On Watermarks
o Removal Attacks: These aim at the complete removal of the watermark
information from the watermarked data without cracking the security of the
watermarking algorithm. This category includes denoising, quantization and
collusion attacks.
Collusion attack type 1 Collusion attack type 2
Attacks On WatermarksAttacks On Watermarks
o Geometric Attacks: They do not actually remove the embedded watermark
itself, but intend to distort the watermark detector synchronization with the
embedded information. The detector could recover the embedded watermark
information when perfect synchronization is regained. This category incudes
rotation, scaling and various transformations.
Geometric Attacks
Attacks On WatermarksAttacks On Watermarks
oCryptographic Attacks: Cryptographic attacks aim at
cracking the security methods in watermarking schemes
and thus finding a way to remove the embedded watermark
information or to embed misleading watermarks.
Techniques used can vary from brute-force to oracle attack.
oProtocol Attacks: Protocol attacks aim at attacking the
entire concept of the watermarking application. This can
include invertible watermarks or copy attacks.
ConclusionsConclusions
o Digital watermarking technology can provide a new way to protect the
copyright of multimedia information and to ensure its safe use
o Attacks on digital watermarks must consider both watermark survival and the
distortion of the attacked document
o A truly robust, transparent and secure watermarking technique should be
focused to ensure complete security
Thank youThank you
[1] P. Singh and R. S. Chadha, “A Survey of Digital Watermarking Techniques, Applications and
Attacks,” International Journal of Engineering and Innovative Technology, vol. 2, no. 9, pp. 165-
175, 2013
[2] Voloshynovskiy, Sviatolsav, et al. "Attacks on digital watermarks: classification, estimation based
attacks, and benchmarks." IEEE communications Magazine 39.8 (2001): 118-126
[3] Potdar, Vidyasagar M., Song Han, and Elizabeth Chang. "A survey of digital image watermarking
techniques." Industrial Informatics, 2005. INDIN'05. 2005 3rd IEEE International Conference on.
IEEE, 2005
[4] Liu, Tong, and Zheng-ding Qiu. "The survey of digital watermarking-based image authentication
techniques." Signal Processing, 2002 6th International Conference on. Vol. 2. IEEE, 2002
[5] Lee, Sin-Joo, and Sung-Hwan Jung. "A survey of watermarking techniques applied to
multimedia." Industrial Electronics, 2001. Proceedings. ISIE 2001. IEEE International
Symposium on. Vol. 1. IEEE, 2001.
ReferencesReferences

More Related Content

What's hot

Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 
Seminar PPT on Crypto Watermarking B.Tech
Seminar PPT on Crypto Watermarking B.TechSeminar PPT on Crypto Watermarking B.Tech
Seminar PPT on Crypto Watermarking B.Techsagarkumawat961
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology vijay rastogi
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessingQaisar Ayub
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 
An analysis of digital watermarking in frequency domain
An analysis of digital watermarking in frequency domainAn analysis of digital watermarking in frequency domain
An analysis of digital watermarking in frequency domainLikan Patra
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesPrashant Singh
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingnafees321
 

What's hot (20)

Watermarking
WatermarkingWatermarking
Watermarking
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Seminar PPT on Crypto Watermarking B.Tech
Seminar PPT on Crypto Watermarking B.TechSeminar PPT on Crypto Watermarking B.Tech
Seminar PPT on Crypto Watermarking B.Tech
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Steganography
SteganographySteganography
Steganography
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Cryptography
CryptographyCryptography
Cryptography
 
Steganography
SteganographySteganography
Steganography
 
An analysis of digital watermarking in frequency domain
An analysis of digital watermarking in frequency domainAn analysis of digital watermarking in frequency domain
An analysis of digital watermarking in frequency domain
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 

Similar to Digital watermarking Techniques

A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...Editor IJCATR
 
Digital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingDigital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingIRJET Journal
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET Journal
 
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionAdvance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionIJERA Editor
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniquestheijes
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))IAESIJEECS
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applicationsKannekanti Utthej
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueIRJET Journal
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarkingijsrd.com
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 
Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...eSAT Publishing House
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518IJRAT
 

Similar to Digital watermarking Techniques (20)

A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...
 
B010510613
B010510613B010510613
B010510613
 
Digital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingDigital Image Security using Digital Watermarking
Digital Image Security using Digital Watermarking
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud Computing
 
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionAdvance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))
 
E04122330
E04122330E04122330
E04122330
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...
 
I43014752
I43014752I43014752
I43014752
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518
 

Recently uploaded

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 

Digital watermarking Techniques

  • 1. Digital WatermarkingDigital Watermarking Guided by: Prof. M.M Goyani Department of Computer Engineering Government Engineering College, Modasa Presented by: Nazeerah A. Sheth Enrolment no. :160160702006 Department of Computer Engineering Government Engineering College, Modasa
  • 2. OutlineOutline Introduction Applications Classification Features of Digital Watermarking Architecture Digital Watermarking Techniques Comparison of Different Techniques Watermarking Attacks Conclusion References
  • 3. Digital watermarking is the embedding of a signal or secret into a digital media such as an image, audio or video A technology developed to facilitate data authentication, security and copyright protection of digital media IntroductionIntroduction
  • 5. ApplicationsApplications o Copyright Protection o Tamper Proofing o Broadcast Monitoring o Content Authentication o Annotation and Privacy Control
  • 6. Classification Of Digital WatermarkingClassification Of Digital Watermarking
  • 7. ◦ Robust: Can resist the common geometric transformations, image processing and lossy compression Fragile: Fails to be detectable after the slightest modification, mainly used for integrity purposes ◦ Semi Fragile: Capable of tolerating some degree of the change to a watermarked image Classification Of Digital WatermarkingClassification Of Digital Watermarking  According to Robustness:
  • 8. Classification Of Digital WatermarkingClassification Of Digital Watermarking  According to Perceptivity: Visible Watermark Invisible Watermark
  • 9. Image watermarking Classification Of Digital WatermarkingClassification Of Digital Watermarking  According to Attached Host: Video watermarking Audio watermarking Text watermarking
  • 10. Features of Digital WatermarkingFeatures of Digital Watermarking o Robustness o Imperceptibility o Security o Verifiability o Capacity and Data Payload o Computational Cost
  • 11. Basic Watermarking ArchitectureBasic Watermarking Architecture
  • 12. Digital Watermarking TechniquesDigital Watermarking Techniques
  • 13. Spatial Domain Watermarking TechniquesSpatial Domain Watermarking Techniques o Least Significant Bit 130 - 10000010 123 - 01111011 117 - 01110101 Embed 101 10000011 - 131 01111010 - 122 01110101 - 117 Cover Image Watermarked Image Watermark
  • 14. Spatial Domain Watermarking TechniquesSpatial Domain Watermarking Techniques o Patchwork Algorithm It is based on a pseudorandom, statistical model which works by embedding a specific statistic into the cover image based on patches A = A - d B = B + d
  • 15. Spatial Domain Watermarking TechniquesSpatial Domain Watermarking Techniques o Correlation Based Technique
  • 16. Frequency Domain TechniquesFrequency Domain Techniques o Discrete Cosine Transform Represents data in terms of frequency space rather than amplitude space
  • 17. Frequency Domain TechniquesFrequency Domain Techniques o Discrete Wavelet Transform/Discrete Fourier Transform
  • 18. Frequency Domain TechniquesFrequency Domain Techniques o Discrete Wavelet Transform The DWT decomposes a signal into a set of basis functions called wavelets which analysis the signal at multi resolution and frequencies
  • 19. Comparison of Different Techniques:Comparison of Different Techniques: Technique Advantages Disadvantages LSB • Easy to implement and understand • Low degradation of image quality • High perceptual transparency • Lacks basic robustness • Vulnerable to noise • Vulnerable to cropping, scaling, lossy compression Patchwork • High level of robustness against most type of attacks • Can hide only a very small amount of information Correlation • Gain factor can be increased resulting in increased robustness • Image quality gets deceased due to increased gain factor DCT • High transparency and robustness • Block wise DCT destroys the invariance properties of the system • Certain higher frequency components tend to be suppressed DFT • Invariant against geometric distortions • Complex computation and high implementation cost DWT • Allows good localization both in time and spatial frequency domain • Higher compression ratio which is relevant to human perception • Longer compression time • Noise/blur near edges of images
  • 20. Attacks On WatermarksAttacks On Watermarks o Removal Attacks: These aim at the complete removal of the watermark information from the watermarked data without cracking the security of the watermarking algorithm. This category includes denoising, quantization and collusion attacks. Collusion attack type 1 Collusion attack type 2
  • 21. Attacks On WatermarksAttacks On Watermarks o Geometric Attacks: They do not actually remove the embedded watermark itself, but intend to distort the watermark detector synchronization with the embedded information. The detector could recover the embedded watermark information when perfect synchronization is regained. This category incudes rotation, scaling and various transformations. Geometric Attacks
  • 22. Attacks On WatermarksAttacks On Watermarks oCryptographic Attacks: Cryptographic attacks aim at cracking the security methods in watermarking schemes and thus finding a way to remove the embedded watermark information or to embed misleading watermarks. Techniques used can vary from brute-force to oracle attack. oProtocol Attacks: Protocol attacks aim at attacking the entire concept of the watermarking application. This can include invertible watermarks or copy attacks.
  • 23. ConclusionsConclusions o Digital watermarking technology can provide a new way to protect the copyright of multimedia information and to ensure its safe use o Attacks on digital watermarks must consider both watermark survival and the distortion of the attacked document o A truly robust, transparent and secure watermarking technique should be focused to ensure complete security
  • 25. [1] P. Singh and R. S. Chadha, “A Survey of Digital Watermarking Techniques, Applications and Attacks,” International Journal of Engineering and Innovative Technology, vol. 2, no. 9, pp. 165- 175, 2013 [2] Voloshynovskiy, Sviatolsav, et al. "Attacks on digital watermarks: classification, estimation based attacks, and benchmarks." IEEE communications Magazine 39.8 (2001): 118-126 [3] Potdar, Vidyasagar M., Song Han, and Elizabeth Chang. "A survey of digital image watermarking techniques." Industrial Informatics, 2005. INDIN'05. 2005 3rd IEEE International Conference on. IEEE, 2005 [4] Liu, Tong, and Zheng-ding Qiu. "The survey of digital watermarking-based image authentication techniques." Signal Processing, 2002 6th International Conference on. Vol. 2. IEEE, 2002 [5] Lee, Sin-Joo, and Sung-Hwan Jung. "A survey of watermarking techniques applied to multimedia." Industrial Electronics, 2001. Proceedings. ISIE 2001. IEEE International Symposium on. Vol. 1. IEEE, 2001. ReferencesReferences