SlideShare a Scribd company logo
DIGITAL WATERMARKING

Sejal Visawadia
Watermark
What is Watermarking?

“ Watermarking can be considered as a special technique
of steganography where one message is embedded in
another and the two messages are related to each other in
some way. “
Example :The presence of specific patterns in currency

notes

which are visible only when the note is held to light is
a well known example for watermark.
Example of a conventional
watermark

Courtesy of Blue Spike, Inc.
Digital Watermark
“ Digital watermarking is similar to
watermarking physical objects, except that
the watermarking technique is used for
digital content instead of physical objects.”
Digital Watermark (Cont..)
In digital watermarking a low-energy signal is
imperceptibly embedded in another signal. The
low-energy signal is called watermark.
The main signal in which the watermark is
embedded is referred to as cover signal since
it covers the watermark.
An entity called watermark key used for
embedding and detecting watermark signal
Watermark key is private
Behind The Technology
Sending Side …

Watermark Embedding process


Water mark
 Original message
 Key


Water marked image
Behind The Technology
Receiving Side …

Watermark retrieval process



Water marked image
Key

 Confidential

message
The Overall System
The Technology Roars…
Importance Of
Digital Watermarking
© Copyright

Information
© On-line music industry
© News gathering using digital cameras
Types of Digital Watermarking







Robust & Fragile Watermarking
Visible & Invisible Watermarking
Public & Private Watermarking
Asymmetric & Symmetric
Watermarking
Steganograhic & NonSteganographic watermarking
Robust & Fragile
Watermarking


Robust Watermarking:-Modification of
watermarked content will not affect
watermark



Fragile Watermarking:-Watermark get
destroyed when watermarked content is
modified or tampered with
Visible & Invisible
Watermarking
 On Visible watermarking, contents are

visible
Visible & Invisible
Watermarking (Cont..)


Invisible watermarking are not viewed
on just looking
Public & Private
Watermarking
•

Public Watermarking
Users of content are authorized to detect
watermark

•

Private Watermarking
Users not authorized to detect watermark
Asymmetric & Symmetric
watermarking


In Asymmetric watermarking different
keys used for embedding and detecting
watermark
Asymmetric & Symmetric
watermarking (Cont..)


In symmetric watermarking same keys
are used for embedding and detecting
watermarks
Steganographic & NonSteganographic Watermarking


Steganographic Watermarking
User unaware of the presence of a
watermark

eg:-Used in finger printing
applications
 Non-Steganographic WM:User aware of the presence of a
watermark.

e.g.:-User to detect piracy
Digital Watermarking
Techniques
 LSB

Watermarking
 Color Separation Technique
 Bit Stream Watermarking
 Word Space Coding, Line Space
Coding &Character Coding
LSB Watermarking


Lower order bits of selected pixels in
the image are used to store watermarks



Replacing lower order bits of each
pixel with higher order bit of different image
Color Separation Technique


Watermark appears only in one of the

color bands


Used to watermark in still images



Can be extended to moving images
Bit Stream Watermarking


Used in audio watermarking



Data is directly inserted into compressed
audio files
Word Space Coding, Line Space
Coding & Character Coding


Used for watermarking in text documents



In word space coding, the spaces
between words are altered to embed
watermark code. In line space coding the
space between the lines are altered and in
character coding some of the characters
are imperceptibly modified (i.e., made
larger, serifs enhanced, etc).
Applications of Digital
Watermarking
Copy Protection
 Content Authentication
 Copyright Protection
 Metadata Tagging

Copy Protection



It limits the access to copyrighted material and
inhibit the copy process
Content Authentication
 Robust

watermarks are used in this area

Example:-A photographic information that
may be presented as evidence in court.
Since digital images can be easily
manipulated, there is a need to provide
proof that an image has not been altered.
Content Authentication
Copyright Protection
 One

of the main application

 Embedding

watermarks in digital

photographs
Metadata Tagging
 Watermarks

convey object specific
information to users of the object.

 Used

to attach patient identification data to
medical images, or to highlight regions of
diagnostic significance.
Attacks to Digital
Watermarking



Stirmark
Mosaic Attack
Stirmark






It is tool developed to test the robustness
of image marking system
Stirmark is commonly produced by
printers and scanners
IBM researchers have recently
announced a technique that defeats the
stir mark attack.
Detects and measures the geometric
distortions in images, and removes the
distortion to restore image geometry
Stirmark Example
Mosaic Attack
Use of a web crawler
 Dividing into sub images with rendition
instructions
 Browser will be rearranging the sub images
to appear as the original
 Sub images will be sufficiently small that no
single image on its own will contain a
recognizable mark.

Mosaic Attack Example
Conclusion


DRM systems and content management are
important for protection of rights of digital
multimedia creations that are distributed on the
Internet. Digital watermarking is an effective
technique for embedding rights information in
digital multimedia data.



Digital watermark technology can be used in
consumer electronic devices like digital still
camera, digital video camera, DVD players, MP3
players, etc., for various applications like providing
controlled access, preventing illegal replication and
watermark embedding
Conclusion (Contd..)


Digital information can easily be
disseminated and copied via global
networks.



The future of digital watermarking relies on
setting standards and creating applications
so that creators of digital content can easily
implement it.
THANK YOU

More Related Content

What's hot

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
Jaykrishna Thakkar
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
Govind Raj
 
Watermarking
WatermarkingWatermarking
Watermarking
Pushkar Dutt
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
Shiraz University
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
vasanthimuniasamy
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
Qaisar Ayub
 
Watermark
WatermarkWatermark
Watermark
ravi33s
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Mohamed Talaat
 
Digital Watermarking Report
Digital Watermarking ReportDigital Watermarking Report
Digital Watermarking Report
OECLIB Odisha Electronics Control Library
 
The Audio watermarking
The Audio watermarkingThe Audio watermarking
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
nafees321
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking Techniques
Nazeera Sheth
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
Prashant Singh
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
ncct
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
Priyanka Sharma
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
Kannekanti Utthej
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarking
Eslam Omar
 

What's hot (20)

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermarking
WatermarkingWatermarking
Watermarking
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Watermark
WatermarkWatermark
Watermark
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital Watermarking Report
Digital Watermarking ReportDigital Watermarking Report
Digital Watermarking Report
 
The Audio watermarking
The Audio watermarkingThe Audio watermarking
The Audio watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking Techniques
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarking
 

Viewers also liked

Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarking
Jasni Zain
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
Surit Datta
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubi
mishrasubrat
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
eSAT Journals
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Samarth Godara
 
QR Code Introduction
QR Code IntroductionQR Code Introduction
QR Code Introduction
Jeroen Steeman
 
12205451 pss7
12205451 pss712205451 pss7
12205451 pss7yuti_3011
 
TLA Presentation on QR-codes
TLA Presentation on QR-codesTLA Presentation on QR-codes
TLA Presentation on QR-codes
Dustin Haisler
 

Viewers also liked (11)

Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarking
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Vidhi's ppt
Vidhi's pptVidhi's ppt
Vidhi's ppt
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubi
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
 
QR Code Introduction
QR Code IntroductionQR Code Introduction
QR Code Introduction
 
Robust watermarking technique sppt
Robust watermarking technique spptRobust watermarking technique sppt
Robust watermarking technique sppt
 
12205451 pss7
12205451 pss712205451 pss7
12205451 pss7
 
TLA Presentation on QR-codes
TLA Presentation on QR-codesTLA Presentation on QR-codes
TLA Presentation on QR-codes
 

Similar to Digitalwatermarking

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
prdpgpt
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
IJERA Editor
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
IOSR Journals
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
IOSR Journals
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
theijes
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and Applications
YogeshIJTSRD
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar10e11a0545
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET Journal
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
Alexander Decker
 
50120130406038
5012013040603850120130406038
50120130406038
IAEME Publication
 
A108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxA108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptx
VaibhavKale80
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
iosrjce
 
B011110614
B011110614B011110614
B011110614
IOSR Journals
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
IJERA Editor
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
IJNSA Journal
 
Digital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingDigital Image Security using Digital Watermarking
Digital Image Security using Digital Watermarking
IRJET Journal
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
IRJET Journal
 

Similar to Digitalwatermarking (20)

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and Applications
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 
50120130406038
5012013040603850120130406038
50120130406038
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
A108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxA108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptx
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
B011110614
B011110614B011110614
B011110614
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
Digital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingDigital Image Security using Digital Watermarking
Digital Image Security using Digital Watermarking
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
 

More from Sej Visawadia

Natural pickles
Natural picklesNatural pickles
Natural pickles
Sej Visawadia
 
Sez india
Sez indiaSez india
Sez india
Sej Visawadia
 
Instagram
InstagramInstagram
Instagram
Sej Visawadia
 
Content Marketing
Content MarketingContent Marketing
Content Marketing
Sej Visawadia
 
Asian paints
Asian paintsAsian paints
Asian paints
Sej Visawadia
 
Uttar pradesh tourism
Uttar pradesh tourismUttar pradesh tourism
Uttar pradesh tourism
Sej Visawadia
 
Creativity
CreativityCreativity
Creativity
Sej Visawadia
 
Nfc
NfcNfc

More from Sej Visawadia (11)

Natural pickles
Natural picklesNatural pickles
Natural pickles
 
Sez india
Sez indiaSez india
Sez india
 
Instagram
InstagramInstagram
Instagram
 
Content Marketing
Content MarketingContent Marketing
Content Marketing
 
Asian paints
Asian paintsAsian paints
Asian paints
 
Uttar pradesh tourism
Uttar pradesh tourismUttar pradesh tourism
Uttar pradesh tourism
 
Creativity
CreativityCreativity
Creativity
 
Nfc
NfcNfc
Nfc
 
QR codes
QR codesQR codes
QR codes
 
Augmented reality
Augmented realityAugmented reality
Augmented reality
 
Graphic design
Graphic designGraphic design
Graphic design
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Digitalwatermarking

  • 2. Watermark What is Watermarking? “ Watermarking can be considered as a special technique of steganography where one message is embedded in another and the two messages are related to each other in some way. “ Example :The presence of specific patterns in currency notes which are visible only when the note is held to light is a well known example for watermark.
  • 3. Example of a conventional watermark Courtesy of Blue Spike, Inc.
  • 4. Digital Watermark “ Digital watermarking is similar to watermarking physical objects, except that the watermarking technique is used for digital content instead of physical objects.”
  • 5. Digital Watermark (Cont..) In digital watermarking a low-energy signal is imperceptibly embedded in another signal. The low-energy signal is called watermark. The main signal in which the watermark is embedded is referred to as cover signal since it covers the watermark. An entity called watermark key used for embedding and detecting watermark signal Watermark key is private
  • 6. Behind The Technology Sending Side … Watermark Embedding process  Water mark  Original message  Key  Water marked image
  • 7. Behind The Technology Receiving Side … Watermark retrieval process   Water marked image Key  Confidential message
  • 8. The Overall System The Technology Roars…
  • 9. Importance Of Digital Watermarking © Copyright Information © On-line music industry © News gathering using digital cameras
  • 10. Types of Digital Watermarking      Robust & Fragile Watermarking Visible & Invisible Watermarking Public & Private Watermarking Asymmetric & Symmetric Watermarking Steganograhic & NonSteganographic watermarking
  • 11. Robust & Fragile Watermarking  Robust Watermarking:-Modification of watermarked content will not affect watermark  Fragile Watermarking:-Watermark get destroyed when watermarked content is modified or tampered with
  • 12. Visible & Invisible Watermarking  On Visible watermarking, contents are visible
  • 13. Visible & Invisible Watermarking (Cont..)  Invisible watermarking are not viewed on just looking
  • 14. Public & Private Watermarking • Public Watermarking Users of content are authorized to detect watermark • Private Watermarking Users not authorized to detect watermark
  • 15. Asymmetric & Symmetric watermarking  In Asymmetric watermarking different keys used for embedding and detecting watermark
  • 16. Asymmetric & Symmetric watermarking (Cont..)  In symmetric watermarking same keys are used for embedding and detecting watermarks
  • 17. Steganographic & NonSteganographic Watermarking  Steganographic Watermarking User unaware of the presence of a watermark eg:-Used in finger printing applications  Non-Steganographic WM:User aware of the presence of a watermark. e.g.:-User to detect piracy
  • 18. Digital Watermarking Techniques  LSB Watermarking  Color Separation Technique  Bit Stream Watermarking  Word Space Coding, Line Space Coding &Character Coding
  • 19. LSB Watermarking  Lower order bits of selected pixels in the image are used to store watermarks  Replacing lower order bits of each pixel with higher order bit of different image
  • 20. Color Separation Technique  Watermark appears only in one of the color bands  Used to watermark in still images  Can be extended to moving images
  • 21. Bit Stream Watermarking  Used in audio watermarking  Data is directly inserted into compressed audio files
  • 22. Word Space Coding, Line Space Coding & Character Coding  Used for watermarking in text documents  In word space coding, the spaces between words are altered to embed watermark code. In line space coding the space between the lines are altered and in character coding some of the characters are imperceptibly modified (i.e., made larger, serifs enhanced, etc).
  • 23. Applications of Digital Watermarking Copy Protection  Content Authentication  Copyright Protection  Metadata Tagging 
  • 24. Copy Protection  It limits the access to copyrighted material and inhibit the copy process
  • 25. Content Authentication  Robust watermarks are used in this area Example:-A photographic information that may be presented as evidence in court. Since digital images can be easily manipulated, there is a need to provide proof that an image has not been altered.
  • 27. Copyright Protection  One of the main application  Embedding watermarks in digital photographs
  • 28. Metadata Tagging  Watermarks convey object specific information to users of the object.  Used to attach patient identification data to medical images, or to highlight regions of diagnostic significance.
  • 30. Stirmark     It is tool developed to test the robustness of image marking system Stirmark is commonly produced by printers and scanners IBM researchers have recently announced a technique that defeats the stir mark attack. Detects and measures the geometric distortions in images, and removes the distortion to restore image geometry
  • 32. Mosaic Attack Use of a web crawler  Dividing into sub images with rendition instructions  Browser will be rearranging the sub images to appear as the original  Sub images will be sufficiently small that no single image on its own will contain a recognizable mark. 
  • 34. Conclusion  DRM systems and content management are important for protection of rights of digital multimedia creations that are distributed on the Internet. Digital watermarking is an effective technique for embedding rights information in digital multimedia data.  Digital watermark technology can be used in consumer electronic devices like digital still camera, digital video camera, DVD players, MP3 players, etc., for various applications like providing controlled access, preventing illegal replication and watermark embedding
  • 35. Conclusion (Contd..)  Digital information can easily be disseminated and copied via global networks.  The future of digital watermarking relies on setting standards and creating applications so that creators of digital content can easily implement it.