2. TABLE OF CONTENTS
Introduction to DW
Information Hiding
Process of DW
Watermarking issues
Types of DW
Watermark attack
Application of DW
Limitations of DW
Conclusion
3. INTRODUCTION TO DW
Digital watermarking is the process of
embedding information into a digital signal.
The purpose of digital watermarking is to
provide copyright protection.
4. INFORMATION HIDING
The process of secretly embedding inside a
data source without changing its perceptual
quality.
DW and steganography are the
implementations of information hiding.
8. DETECTIONS OF WATERMARK
Fig . Using digital watermarks for integrity verification: the
protected image is the image (a) above; a modified image is
obtained by swapping the numbers 9 and 4 of the number plate
(b); digital watermarking technology allows detecting and
highlights the modified areas, as shown on (c).
13. WATERMARK ATTACKS
Active Attacks.
Hacker attempts to remove or destroy the
watermark.
Passive Attacks.
Hacker tries to find if a watermark is present.
Removal of watermark is not an aim.
14. CONTINUED…
Collusion Attacks.
Hacker uses several copies of watermarked
data (images, video etc.) to construct a copy
with no watermark.
Forgery Attacks.
Hacker tries to embed a valid watermark
15. APPLICATIONS OF DW
ID card security.
Ownership assertion.
Copy prevention or control.
Fraud and tamper detection.
16. LIMITATIONS OF DW
Digital watermarking does not prevent
copying or distribution.
Digital watermarks cannot survive every
possible attack.
17. CONCLUSION
Digital watermarking is a rapidly evolving
area of research and development.
One key research problem that we still face
today is the development of truly robust,
transparent and secure watermarking technique
for different digital media including images,
video and audio.