SlideShare a Scribd company logo
By: Vladimir Novikov
Digital Watermarking?
 Allows users to embed SPECIAL PATTERN or
SOME DATA into digital contents without
changing its perceptual quality.
 When data is embedded, it is not written at
HEADER PART but embedded directly into
digital media itself by changing media contents
data
 Watermarking is a key process for the
PROTECTION of copyright ownership of
electronic data.
Features of Watermarking
 Invisible/Inaudible
 Information is embedded without digital content
degradation, because of the level of embedding
operation is too small for human to notice the
change.
 Inseparable
 The embedded information can survive after some
processing, compression and format transformation.
 Unchanging data file size
 Data size of the media is not changed before and
after embedding operation because information is
embedded directly into the media.
How It Works
CLASSIFICATION OF
WATERMARK
 According to Human Perception
 Invisible
 Visible
 According to Robustness
 Fragile
 Semi fragile
 Robust
 According to types of Document
 Text
 Image
 Audio
 Video
CLASSIFICATION BY
“HUMAN PERCEPTION”
Visible Watermark
 Logo or seal of the organization which holds
the rights to the primary image, it allows the
primary image to be viewed, but still visible it
clearly as the property of the owning
organization.
 Overlay the watermark in such a way that
makes it difficult to remove, if the goal of
indicating property rights is to be achieved.
Visible Watermark
Watermark
Image with watermark
Invisible Watermark
 Embedding level is too small to notice
 Can be retrieved by extraction software
 Applications:
 Authentication
 Copyrighting
 Etc…
Invisible Watermark
CLASSIFICATION BY
“ROBUSTNESS”
Fragile/Semi Fragile/Robust
 A watermark is called fragile if it fails to be
detected after the slightest modification.
 A watermark is called semi-fragile if it
resists beginning transformations but fails
detection after malignant transformations.
 A watermark is called robust if it resists a
designated class of transformations.
CLASSIFICATION BY
“DOCUMENT”
Text/Image/Audio watermarking
 Text/Image/Audio watermarking refers to
embedding watermarks in an
text/image/audio in order to protect the
image from illegal copying and identify
manipulation.
Video Watermarking
Algorithm for video watermarking
 DFT
 DCT
 DWT
 Watermarking in I-frame.
Video watermarking refers to embedding
watermarks in a video sequence in order to protect
the video from illegal copying and identify
manipulation
Discrete Cosine Transformation
 DCT convert images from spatial-domain to frequency-
domain to decorrelate pixels
 The discrete cosine transform (DCT) helps to separate
the image into parts of differing importance (with
respect to the image's visual quality). The DCT is
similar to the discrete Fourier transform
 Remember that JPEG breaks an image into 8x8 units
So for DCT n = 8
For example:
256 gray-scale image each pixel is stored as a value
between 0 – 255
0 = black pixel
255 = white pixel
Value between are shades of gray
Wave Transforms
Frequency
DCT: One Dimensional
where
 






 



1
0
)
(
2
)
1
2
(
cos
2
)
( )
(
n
i
i
f
n
u
i
p
n
u
F i

n = total no. of data item
p = pixel
F = coefficients
f(i)= is the intensity of the i th pixel
The general equation for a 1D (n data items) DCT is
defined by the following equation:
DCT: 2D
)
,
(
2
)
1
2
(
cos
2
)
1
2
(
cos
2
2
)
,
(
1
0
1
0
)
(
)
(
j
i
f
m
v
j
n
u
i
p
p
m
n
v
u
F
n
i
m
j
j
i





 






 
 






•The input image is of size n by m;
•f(i,j) is the intensity of the pixel in row i and column j;
•F(u,v) is the DCT coefficient in row k1 and column k2 of
the DCT matrix.
The general equation for a 2D (N by M image) DCT is
defined by the following equation:
Watermarking in Video(DCT)
Frequency Domain
 Watermarking signal to embed
 Host signal
 Frequency components(using DCT)
 Embedding
 Extraction
N
v
v
v
V ,...,
, 1
0

N
x
x
x
X ,...,
, 1
0

N
f
f
f
F ,...,
, 1
0

i
i
i x
f
f 


i
i
i f
f
x 


i
f = watermared singal
Purpose of Watermarking
 Copyright Protection
 Fingerprinting
 Copy Protection
 Broadcasting Monitoring
 Data Authentication
VladimirNovikovSlides.ppt

More Related Content

Similar to VladimirNovikovSlides.ppt

Video
VideoVideo
B010510613
B010510613B010510613
B010510613
IOSR Journals
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
IJSRD
 
Mm video
Mm videoMm video
Mm video
maaz hamed
 
Implementation Of Video Digital Watermarking Based on Python
Implementation Of Video Digital Watermarking Based on PythonImplementation Of Video Digital Watermarking Based on Python
Implementation Of Video Digital Watermarking Based on Python
IRJET Journal
 
Discovering the power of metadata
Discovering the power of metadataDiscovering the power of metadata
Discovering the power of metadata
Paul Hightower
 
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATDATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
alphin jose
 
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Adaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality EstimationAdaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality Estimation
paperpublications3
 
Module 2 3
Module 2 3Module 2 3
Module 2 3
ryanette
 
Hybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video WatermarkingHybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video Watermarking
IJSRD
 
Digital video
Digital videoDigital video
Digital video
Muhammad King
 
Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
Serious_SamSoul
 
Hardware implementation of 3 d dct compressed and digitally watermarked video
Hardware implementation of 3 d dct compressed and digitally watermarked videoHardware implementation of 3 d dct compressed and digitally watermarked video
Hardware implementation of 3 d dct compressed and digitally watermarked video
IAEME Publication
 
G0523444
G0523444G0523444
G0523444
IOSR Journals
 
[IJET-V1I6P5] Authors: Tawde Priyanka, Londhe Archana, Nazirkar Sandhya, Khat...
[IJET-V1I6P5] Authors: Tawde Priyanka, Londhe Archana, Nazirkar Sandhya, Khat...[IJET-V1I6P5] Authors: Tawde Priyanka, Londhe Archana, Nazirkar Sandhya, Khat...
[IJET-V1I6P5] Authors: Tawde Priyanka, Londhe Archana, Nazirkar Sandhya, Khat...
IJET - International Journal of Engineering and Techniques
 
Ch07_-_Multimedia_Element-Video_1_.ppt
Ch07_-_Multimedia_Element-Video_1_.pptCh07_-_Multimedia_Element-Video_1_.ppt
Ch07_-_Multimedia_Element-Video_1_.ppt
djempol
 
DVI,FRACTAL IMAGE,SUB BAND IMAGE,VIDEO CODING AND WAVELET BASED COMPRESSION
DVI,FRACTAL IMAGE,SUB BAND IMAGE,VIDEO CODING AND WAVELET BASED COMPRESSIONDVI,FRACTAL IMAGE,SUB BAND IMAGE,VIDEO CODING AND WAVELET BASED COMPRESSION
DVI,FRACTAL IMAGE,SUB BAND IMAGE,VIDEO CODING AND WAVELET BASED COMPRESSION
kirupasuchi1996
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 

Similar to VladimirNovikovSlides.ppt (20)

Video
VideoVideo
Video
 
B010510613
B010510613B010510613
B010510613
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
Mm video
Mm videoMm video
Mm video
 
Implementation Of Video Digital Watermarking Based on Python
Implementation Of Video Digital Watermarking Based on PythonImplementation Of Video Digital Watermarking Based on Python
Implementation Of Video Digital Watermarking Based on Python
 
Discovering the power of metadata
Discovering the power of metadataDiscovering the power of metadata
Discovering the power of metadata
 
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATDATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
 
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
IRJET- A Hybrid Image and Video Compression of DCT and DWT Techniques for H.2...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Adaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality EstimationAdaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality Estimation
 
Module 2 3
Module 2 3Module 2 3
Module 2 3
 
Hybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video WatermarkingHybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video Watermarking
 
Digital video
Digital videoDigital video
Digital video
 
Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
 
Hardware implementation of 3 d dct compressed and digitally watermarked video
Hardware implementation of 3 d dct compressed and digitally watermarked videoHardware implementation of 3 d dct compressed and digitally watermarked video
Hardware implementation of 3 d dct compressed and digitally watermarked video
 
G0523444
G0523444G0523444
G0523444
 
[IJET-V1I6P5] Authors: Tawde Priyanka, Londhe Archana, Nazirkar Sandhya, Khat...
[IJET-V1I6P5] Authors: Tawde Priyanka, Londhe Archana, Nazirkar Sandhya, Khat...[IJET-V1I6P5] Authors: Tawde Priyanka, Londhe Archana, Nazirkar Sandhya, Khat...
[IJET-V1I6P5] Authors: Tawde Priyanka, Londhe Archana, Nazirkar Sandhya, Khat...
 
Ch07_-_Multimedia_Element-Video_1_.ppt
Ch07_-_Multimedia_Element-Video_1_.pptCh07_-_Multimedia_Element-Video_1_.ppt
Ch07_-_Multimedia_Element-Video_1_.ppt
 
DVI,FRACTAL IMAGE,SUB BAND IMAGE,VIDEO CODING AND WAVELET BASED COMPRESSION
DVI,FRACTAL IMAGE,SUB BAND IMAGE,VIDEO CODING AND WAVELET BASED COMPRESSIONDVI,FRACTAL IMAGE,SUB BAND IMAGE,VIDEO CODING AND WAVELET BASED COMPRESSION
DVI,FRACTAL IMAGE,SUB BAND IMAGE,VIDEO CODING AND WAVELET BASED COMPRESSION
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

Recently uploaded

Zener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and ApplicationsZener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and Applications
Shiny Christobel
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
MuhammadJazib15
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
DharmaBanothu
 
Assistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdfAssistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdf
Seetal Daas
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
PreethaV16
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
mahaffeycheryld
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
pvpriya2
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
DharmaBanothu
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
uqyfuc
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Levelised Cost of Hydrogen (LCOH) Calculator Manual
Levelised Cost of Hydrogen  (LCOH) Calculator ManualLevelised Cost of Hydrogen  (LCOH) Calculator Manual
Levelised Cost of Hydrogen (LCOH) Calculator Manual
Massimo Talia
 
Bituminous road construction project based learning report
Bituminous road construction project based learning reportBituminous road construction project based learning report
Bituminous road construction project based learning report
CE19KaushlendraKumar
 

Recently uploaded (20)

Zener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and ApplicationsZener Diode and its V-I Characteristics and Applications
Zener Diode and its V-I Characteristics and Applications
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
 
Assistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdfAssistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdf
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Levelised Cost of Hydrogen (LCOH) Calculator Manual
Levelised Cost of Hydrogen  (LCOH) Calculator ManualLevelised Cost of Hydrogen  (LCOH) Calculator Manual
Levelised Cost of Hydrogen (LCOH) Calculator Manual
 
Bituminous road construction project based learning report
Bituminous road construction project based learning reportBituminous road construction project based learning report
Bituminous road construction project based learning report
 

VladimirNovikovSlides.ppt

  • 2. Digital Watermarking?  Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual quality.  When data is embedded, it is not written at HEADER PART but embedded directly into digital media itself by changing media contents data  Watermarking is a key process for the PROTECTION of copyright ownership of electronic data.
  • 3. Features of Watermarking  Invisible/Inaudible  Information is embedded without digital content degradation, because of the level of embedding operation is too small for human to notice the change.  Inseparable  The embedded information can survive after some processing, compression and format transformation.  Unchanging data file size  Data size of the media is not changed before and after embedding operation because information is embedded directly into the media.
  • 5. CLASSIFICATION OF WATERMARK  According to Human Perception  Invisible  Visible  According to Robustness  Fragile  Semi fragile  Robust  According to types of Document  Text  Image  Audio  Video
  • 7. Visible Watermark  Logo or seal of the organization which holds the rights to the primary image, it allows the primary image to be viewed, but still visible it clearly as the property of the owning organization.  Overlay the watermark in such a way that makes it difficult to remove, if the goal of indicating property rights is to be achieved.
  • 9. Invisible Watermark  Embedding level is too small to notice  Can be retrieved by extraction software  Applications:  Authentication  Copyrighting  Etc…
  • 12. Fragile/Semi Fragile/Robust  A watermark is called fragile if it fails to be detected after the slightest modification.  A watermark is called semi-fragile if it resists beginning transformations but fails detection after malignant transformations.  A watermark is called robust if it resists a designated class of transformations.
  • 14. Text/Image/Audio watermarking  Text/Image/Audio watermarking refers to embedding watermarks in an text/image/audio in order to protect the image from illegal copying and identify manipulation.
  • 15. Video Watermarking Algorithm for video watermarking  DFT  DCT  DWT  Watermarking in I-frame. Video watermarking refers to embedding watermarks in a video sequence in order to protect the video from illegal copying and identify manipulation
  • 16. Discrete Cosine Transformation  DCT convert images from spatial-domain to frequency- domain to decorrelate pixels  The discrete cosine transform (DCT) helps to separate the image into parts of differing importance (with respect to the image's visual quality). The DCT is similar to the discrete Fourier transform  Remember that JPEG breaks an image into 8x8 units So for DCT n = 8 For example: 256 gray-scale image each pixel is stored as a value between 0 – 255 0 = black pixel 255 = white pixel Value between are shades of gray
  • 18. DCT: One Dimensional where              1 0 ) ( 2 ) 1 2 ( cos 2 ) ( ) ( n i i f n u i p n u F i  n = total no. of data item p = pixel F = coefficients f(i)= is the intensity of the i th pixel The general equation for a 1D (n data items) DCT is defined by the following equation:
  • 19. DCT: 2D ) , ( 2 ) 1 2 ( cos 2 ) 1 2 ( cos 2 2 ) , ( 1 0 1 0 ) ( ) ( j i f m v j n u i p p m n v u F n i m j j i                        •The input image is of size n by m; •f(i,j) is the intensity of the pixel in row i and column j; •F(u,v) is the DCT coefficient in row k1 and column k2 of the DCT matrix. The general equation for a 2D (N by M image) DCT is defined by the following equation:
  • 21. Frequency Domain  Watermarking signal to embed  Host signal  Frequency components(using DCT)  Embedding  Extraction N v v v V ,..., , 1 0  N x x x X ,..., , 1 0  N f f f F ,..., , 1 0  i i i x f f    i i i f f x    i f = watermared singal
  • 22. Purpose of Watermarking  Copyright Protection  Fingerprinting  Copy Protection  Broadcasting Monitoring  Data Authentication