SlideShare a Scribd company logo
1 of 32
Priyanka Sharma
Introduction
•The process of embedding information into
a digital signal in a way that is difficult to
remove.
•The signal may be text, images, audio, video.
•The information is also carried in the copy if
the signal is copied.
Example:
GENERAL APPLICATIONS
Copyright Protection
 To prove the ownership of digital media.
Tamper proofing
 To find out if data was tampered.
GENERAL APPLICATIONS
Quality Assessment
 Degradation of Visual Quality
Loss of Visual Quality
GENERAL APPLICATIONS
LIFE-CYCLE PHASES
Attemp to
extract
watermark
from signal
The marked
signal is
modified
Produce
watermarke
d signal
CLASSIFICATION
Digital watermarking techniques can be
classified in many ways :
• Visibility
• Robustness
• Perceptibility
• Capacity
• Embedding method
VISIBILITY
• Visible
– Text or a logo which identifies the owner of
the media.
• Invisible
– Information is added as digital data to audio,
picture or video, but it cannot be perceived.
– May be a form of Steganography.
ROBUSTNESS
• Robust
– Resisted a designated a class of
transformations.
– Against adversary based attack.
(e.g. noise addition to images)
– Used in copy protection application.
Example: Robust Private Spatial Watermarks
SPECIFIC WATERMARKING
TECHNIQUES ON IMAGES
 A very simple yet widely used technique for
watermarking images is to add a pattern on top of
an existing image.
 Usually this pattern is an image itself - a logo or
something similar.
SIMPLE WATERMARKING
Bit Plane Slicing
 Examine the contribution of each bit
 For PGM images each pixel is an eight
bit value
 A bit plane is a binary image representing
each bit
 Watermarking in the frequency domain involves
selecting the pixels to be modified based on the
frequency of occurrence of that particular pixel.
 Transform an image into the frequency domain.
 A block-based DCT watermarking approach is
implemented.
 An image is first divided into blocks and DCT is
performed on each block. The watermark is then
embedded by selectively modifying the middle-
frequency DCT coefficients.
FREQUENCY-BASED
TECHNIQUES
What is DCT ?
 Formally, the discrete cosine transform (DCT)
is a linear, invertible function
F : RN -> RN (where R denotes the set of real
numbers), or equivalently an invertible N × N square
matrix
FREQUENCY-BASED
TECHNIQUES
FREQUENCY-BASED
TECHNIQUES
Discrete wavelet transform (DWT)
 The image is separated into different resolution
 The original image is high-pass filtered, yielding
the three large images, each describing local
changes details in the original image
 It is then low-pass filtered and downscaled,
yielding an approximation image.
 This image is high-pass filtered to produce the
three smaller detail images.
 And low-pass filtered to produce the final
approximation image in the upper-left.
WAVELET WATERMARKING
TECHNIQUES
WAVELET WATERMARKING
TECHNIQUES
Embedding the watermark
 The host image and watermark are transformed
into wavelet domain.
 The transformed watermark coefficients were
embedded into those of host image at each
resolution level with a secret key.
WAVELET WATERMARKING
TECHNIQUES
WAVELET WATERMARKING
TECHNIQUES
Attacking Methods
Attacks on Watermark
Transmission
Lossy Other
Compression International
TamperingsProcessing
I
I'
Watermarked Object
Corrupted Object
Transmission
Typical Distortions and International Tampering
Geometrical
Distortion
Common
Signal
Figure provided by Cox et al. [1].
Attacks on Watermark
Transmission
Lossy Other
Compression International
TamperingsProcessing
I
I'
Watermarked Object
Corrupted Object
Transmission
Typical Distortions and International Tampering
Geometrical
Distortion
Common
Signal
Irreversible Data Loss
Quality Degradation
e.g. JPEG/MPEG
Attacks on Watermark
Transmission
Lossy Other
Compression International
TamperingsProcessing
I
I'
Watermarked Object
Corrupted Object
Transmission
Typical Distortions and International Tampering
Geometrical
Distortion
Common
Signal
Specific for images/videos
rotation, translation,
scaling, and cropping operations
Attacks on Watermark
Transmission
Lossy Other
Compression International
TamperingsProcessing
I
I'
Watermarked Object
Corrupted Object
Transmission
Typical Distortions and International Tampering
Geometrical
Distortion
Common
Signal
analog-to-digital,
digital-to-analog
conversion, etc.
Attacks on Watermark
Transmission
Lossy Other
Compression International
TamperingsProcessing
I
I'
Watermarked Object
Corrupted Object
Transmission
Typical Distortions and International Tampering
Geometrical
Distortion
Common
Signal
Rewatermarking
Desired Characteristics of
Invisible Watermarks
1. Perceptually unnoticeable
2. Robust to common watermark attacks
3. Quality degradation upon removal of watermarks
4. Unambiguously identifies the owner of the digitized
medium (audio, video, or image).
Example
(1) Original (2) Watermarked Differences of
(1) & (2)
Advantages & Disadvantages
Advantages:
• Not noticeable since the watermarks are spread out.
• Can’t be removed without severe quality degradation
since watermarks are inserted at perceptually
significant regions.
Disadvantages:
• Original watermark is required in the extraction process.
References:
[1]Ingemar J. Cox, et al., “Secure Spread Spectrum Watermarking for Multimedia”,
IEEE Trans. on Image Processing, Vol. 6, No.12, Dec 1997, pp.1673-1687.
[2] Saraju P. Mohanty, “Digital Watermarking: A Tutorial Review”,
Department of Computer Science and Engineering, University of South Florida.
[3] Peter Meerwald, “Digital Image Watermarking in the Wavelet Transform Domain”,
Master’s Thesis, Department of Scientific Computing, University of Salzburg,
Austria, January 2001.
[4] http://www.cosy.sbg.ac.at/~pmeerw/Watermarking/source/
The End

More Related Content

What's hot

Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and SteganographyPratik Poddar
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingnafees321
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking TechniquesNazeera Sheth
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwtIAEME Publication
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applicationsKannekanti Utthej
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingGovind Raj
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Samarth Godara
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Sandeep Kumar Panda
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingNawin Kumar Sharma
 

What's hot (20)

Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking Techniques
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwt
 
digital steganography
digital steganographydigital steganography
digital steganography
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Watermark
WatermarkWatermark
Watermark
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarking
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 

Similar to invisible watermarking

Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionAdvance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionIJERA Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Hybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video WatermarkingHybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video WatermarkingIJSRD
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
 
Adaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality EstimationAdaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality Estimationpaperpublications3
 
Watermarking in digital images
Watermarking in digital imagesWatermarking in digital images
Watermarking in digital imagesRabin BK
 
Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...eSAT Publishing House
 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital mediaijctet
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniquestheijes
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
A Robust Watermarking Technique Based On Dwt on Digital Images
A Robust Watermarking Technique Based On Dwt on Digital  ImagesA Robust Watermarking Technique Based On Dwt on Digital  Images
A Robust Watermarking Technique Based On Dwt on Digital ImagesIJMER
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET Journal
 
Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image WatermarkingIJERA Editor
 
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...IJERA Editor
 

Similar to invisible watermarking (20)

G0523444
G0523444G0523444
G0523444
 
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionAdvance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Ppt
PptPpt
Ppt
 
Hybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video WatermarkingHybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video Watermarking
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
Adaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality EstimationAdaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality Estimation
 
Watermarking in digital images
Watermarking in digital imagesWatermarking in digital images
Watermarking in digital images
 
Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...Digital video watermarking scheme using discrete wavelet transform and standa...
Digital video watermarking scheme using discrete wavelet transform and standa...
 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital media
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
A Robust Watermarking Technique Based On Dwt on Digital Images
A Robust Watermarking Technique Based On Dwt on Digital  ImagesA Robust Watermarking Technique Based On Dwt on Digital  Images
A Robust Watermarking Technique Based On Dwt on Digital Images
 
B010510613
B010510613B010510613
B010510613
 
E04122330
E04122330E04122330
E04122330
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud Computing
 
Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image Watermarking
 
50120140506015
5012014050601550120140506015
50120140506015
 
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
 

Recently uploaded

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 

Recently uploaded (20)

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 

invisible watermarking

  • 2. Introduction •The process of embedding information into a digital signal in a way that is difficult to remove. •The signal may be text, images, audio, video. •The information is also carried in the copy if the signal is copied.
  • 4. GENERAL APPLICATIONS Copyright Protection  To prove the ownership of digital media.
  • 5. Tamper proofing  To find out if data was tampered. GENERAL APPLICATIONS
  • 6. Quality Assessment  Degradation of Visual Quality Loss of Visual Quality GENERAL APPLICATIONS
  • 7. LIFE-CYCLE PHASES Attemp to extract watermark from signal The marked signal is modified Produce watermarke d signal
  • 8. CLASSIFICATION Digital watermarking techniques can be classified in many ways : • Visibility • Robustness • Perceptibility • Capacity • Embedding method
  • 9. VISIBILITY • Visible – Text or a logo which identifies the owner of the media. • Invisible – Information is added as digital data to audio, picture or video, but it cannot be perceived. – May be a form of Steganography.
  • 10. ROBUSTNESS • Robust – Resisted a designated a class of transformations. – Against adversary based attack. (e.g. noise addition to images) – Used in copy protection application. Example: Robust Private Spatial Watermarks
  • 12.  A very simple yet widely used technique for watermarking images is to add a pattern on top of an existing image.  Usually this pattern is an image itself - a logo or something similar. SIMPLE WATERMARKING
  • 13. Bit Plane Slicing  Examine the contribution of each bit  For PGM images each pixel is an eight bit value  A bit plane is a binary image representing each bit
  • 14.
  • 15.  Watermarking in the frequency domain involves selecting the pixels to be modified based on the frequency of occurrence of that particular pixel.  Transform an image into the frequency domain.  A block-based DCT watermarking approach is implemented.  An image is first divided into blocks and DCT is performed on each block. The watermark is then embedded by selectively modifying the middle- frequency DCT coefficients. FREQUENCY-BASED TECHNIQUES
  • 16. What is DCT ?  Formally, the discrete cosine transform (DCT) is a linear, invertible function F : RN -> RN (where R denotes the set of real numbers), or equivalently an invertible N × N square matrix FREQUENCY-BASED TECHNIQUES
  • 18. Discrete wavelet transform (DWT)  The image is separated into different resolution  The original image is high-pass filtered, yielding the three large images, each describing local changes details in the original image  It is then low-pass filtered and downscaled, yielding an approximation image.  This image is high-pass filtered to produce the three smaller detail images.  And low-pass filtered to produce the final approximation image in the upper-left. WAVELET WATERMARKING TECHNIQUES
  • 20. Embedding the watermark  The host image and watermark are transformed into wavelet domain.  The transformed watermark coefficients were embedded into those of host image at each resolution level with a secret key. WAVELET WATERMARKING TECHNIQUES
  • 23. Attacks on Watermark Transmission Lossy Other Compression International TamperingsProcessing I I' Watermarked Object Corrupted Object Transmission Typical Distortions and International Tampering Geometrical Distortion Common Signal Figure provided by Cox et al. [1].
  • 24. Attacks on Watermark Transmission Lossy Other Compression International TamperingsProcessing I I' Watermarked Object Corrupted Object Transmission Typical Distortions and International Tampering Geometrical Distortion Common Signal Irreversible Data Loss Quality Degradation e.g. JPEG/MPEG
  • 25. Attacks on Watermark Transmission Lossy Other Compression International TamperingsProcessing I I' Watermarked Object Corrupted Object Transmission Typical Distortions and International Tampering Geometrical Distortion Common Signal Specific for images/videos rotation, translation, scaling, and cropping operations
  • 26. Attacks on Watermark Transmission Lossy Other Compression International TamperingsProcessing I I' Watermarked Object Corrupted Object Transmission Typical Distortions and International Tampering Geometrical Distortion Common Signal analog-to-digital, digital-to-analog conversion, etc.
  • 27. Attacks on Watermark Transmission Lossy Other Compression International TamperingsProcessing I I' Watermarked Object Corrupted Object Transmission Typical Distortions and International Tampering Geometrical Distortion Common Signal Rewatermarking
  • 28. Desired Characteristics of Invisible Watermarks 1. Perceptually unnoticeable 2. Robust to common watermark attacks 3. Quality degradation upon removal of watermarks 4. Unambiguously identifies the owner of the digitized medium (audio, video, or image).
  • 29. Example (1) Original (2) Watermarked Differences of (1) & (2)
  • 30. Advantages & Disadvantages Advantages: • Not noticeable since the watermarks are spread out. • Can’t be removed without severe quality degradation since watermarks are inserted at perceptually significant regions. Disadvantages: • Original watermark is required in the extraction process.
  • 31. References: [1]Ingemar J. Cox, et al., “Secure Spread Spectrum Watermarking for Multimedia”, IEEE Trans. on Image Processing, Vol. 6, No.12, Dec 1997, pp.1673-1687. [2] Saraju P. Mohanty, “Digital Watermarking: A Tutorial Review”, Department of Computer Science and Engineering, University of South Florida. [3] Peter Meerwald, “Digital Image Watermarking in the Wavelet Transform Domain”, Master’s Thesis, Department of Scientific Computing, University of Salzburg, Austria, January 2001. [4] http://www.cosy.sbg.ac.at/~pmeerw/Watermarking/source/