SlideShare a Scribd company logo
1 of 29
WATERMARKING
Content
 What is watermarking
 History
 Digital Watermarking
 Classification
 Visible And Invisible Watermarking
 Text And Image Watermarking
 Examples, Techniques And Applications

                                          2
What is Watermarking
   A watermark is a recognizable image or
    pattern in paper that appears as various shades
    of lightness/darkness when viewed by
    transmitted light (or when viewed by reflected
    light, a top a dark background), caused by
    thickness variations in the paper.



                                                      3
Watermarking History
   More than 700 years ago, watermarks were used in Italy to
    indicate the paper brand and the mill that produced it.
   By the 18th century watermarks began to be used as
    anticounterfeiting measures on money and other documents.
   The term watermark was introduced near the end of the 18th
    century.
   It was probably given because the marks resemble the effects
    of water on paper
   The first example of a technology similar to digital
    watermarking is a patent filed in 1954 by Emil Hembrooke for
    identifying music works.
   In 1988, Komatsu and Tominaga appear to be the first to use
                                                                 4
    the term “digital watermarking”.
Paper Watermarks

Paper Watermarks: Formed during the manufacturing

process of the paper when the paper is wet, so that fibers

can be disturbed according to the design of the watermark.


Used mainly for identification and authentication




                                                             5
Digital Watermarking

Definition: A digital watermark is a digital signal or pattern

inserted into a digital document such as text, graphics or

multimedia, and carries information unique to the copyright

owner, the creator of the document or the authorized

consumer.



                                                                 6
Common Examples
   Currency Notes
   Stamps
   Passports
   Legal Documents
   Logos used by cable TV channels

                                      7
Currency Notes




                 8
Watermark Example




                    9
Watermark Example




                    10
Example




          11
Digital Watermark Classification
   Based on visibility of watermarks
    -   Visible Watermarks
    -   Invisible Watermarks
   Based on the content to be watermarked
    -   Text Watermarking
    -   Image, Audio, Video Watermarking

                                             12
Visible Watermarking
 In visible watermarking, the information is
  visible in the picture or video.
 Typically, the information is text or a logo
  which identifies the owner of the media.
 When a television broadcaster adds its logo to
  the corner of transmitted video, this is also a
  visible watermark.

                                                13
Visible Watermarking



       +         =



                       14
Invisible Watermarking
 In invisible watermarking, information is
  added as digital data to audio, picture or video,
  but it cannot be perceived as such (although it
  may be possible to detect that some amount of
  information is hidden).
 It is also possible to use hidden embedded
  information as a means of covert
  communication between individuals.
                                                 15
Small changes in brightness,
contrast, etc.




                               (sail_e.jpg): Signed image. Verify
 (sail.jpg): Original image.   with secret key 100001.



                                                                    16
Watermarking Process




                       17
Basic Principle




                  18
Techniques for Texts

   Text Line Coding: Change the spacing
    between lines.
   Word-shift Coding: Change the spacing
    between words.
   Character Encoding: Alter the shapes of
    characters.

                                              19
Text line coding example




                           20
Word-shift coding example




                            21
Techniques for Images
   Spatial Watermarking: Just change some of the
    values of the pixels in the lower bit plane; e.g.,
    Change some of the bits from 1 to 0 or 0 to 1.
   Frequency Domain Watermarking: First
    convert the image to the frequency domain and
    then apply the watermark in the low frequency
    regions.

                                                    22
Example




          23
Example




   Original   Watermarked Version

                                    24
Watermarking Attacks
    Signal enhancement (sharpening, contrast enhancement,
    etc.)
    Additive and multiplicative noise (gaussian, uniform, etc.)
    Filtering (High pass, low pass, linear, nonlinear, etc.)
    Lossy compression (JPEG, MPEG-x, H.26x, etc.)
    Geometric transforms (translation, rotation, etc.)
    Data reduction (cropping, clipping, etc.)
    Transcoding (MPEG2 ⇒ H.263, etc.)
    D/A and A/D conversion (print-scan, etc.)
    Multiple watermarking
    Collusion attack

                                                                   25
Multiple watermarking




                        26
Characteristics of Digital Watermarks
   Unobtrusive: invisible enough not to degrade the data quality
    and to prevent an attacker from finding and deleting it.
   Readily Detectable: the data owner or an independent control
    authority should easily detect it.
   Unambiguous: retrieval of it should unambiguously identify
    the data owner.
   Innumerable: it should be possible to generate a large number
    of watermarks, all distinguishable.
   Robust: difficult to remove for an attacker, who would like to
    destroy it in order to counterfeit the copyright of the data.
    Moreover, removal of it should cause a considerable
    degradation in the quality of the data.
   Visible watermarks should be visible enough to discourage
    theft.
                                                                 27
Applications
   Embed information about the owner to prevent others
    from claiming copyright
   For example, a compliant DVD player will not
    playback or copy data that carry a “copy never”
    watermark
   This is useful to monitor or trace back illegally
    produced copies of the cover
   Used to avoid unauthorized duplication and
    distribution.
   Digital watermark inserted to indicate the number of
    copies permitted.
                                                       28
Thank You

More Related Content

What's hot

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingGovind Raj
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking TechniquesNazeera Sheth
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingNawin Kumar Sharma
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology vijay rastogi
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptographyAvinash Mishra
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessingQaisar Ayub
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 

What's hot (20)

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Watermark
WatermarkWatermark
Watermark
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
steganography
steganographysteganography
steganography
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking Techniques
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarking
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 

Viewers also liked

Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubimishrasubrat
 
12205451 pss7
12205451 pss712205451 pss7
12205451 pss7yuti_3011
 
TLA Presentation on QR-codes
TLA Presentation on QR-codesTLA Presentation on QR-codes
TLA Presentation on QR-codesDustin Haisler
 
QR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearningQR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearningGraham Clark
 
2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?Delvinia
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
 
10 Things Money Can´t Buy
10 Things Money Can´t Buy10 Things Money Can´t Buy
10 Things Money Can´t BuyAbhishek Shah
 
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHM
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHMDIGITAL IMAGE WATERMARKING USING DFT ALGORITHM
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHMacijjournal
 
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social NetworksA Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social NetworksOresti Banos
 

Viewers also liked (15)

Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
Ppt nc
Ppt ncPpt nc
Ppt nc
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubi
 
QR Code Introduction
QR Code IntroductionQR Code Introduction
QR Code Introduction
 
Vidhi's ppt
Vidhi's pptVidhi's ppt
Vidhi's ppt
 
12205451 pss7
12205451 pss712205451 pss7
12205451 pss7
 
TLA Presentation on QR-codes
TLA Presentation on QR-codesTLA Presentation on QR-codes
TLA Presentation on QR-codes
 
QR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearningQR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearning
 
2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
QR code
QR codeQR code
QR code
 
10 Things Money Can´t Buy
10 Things Money Can´t Buy10 Things Money Can´t Buy
10 Things Money Can´t Buy
 
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHM
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHMDIGITAL IMAGE WATERMARKING USING DFT ALGORITHM
DIGITAL IMAGE WATERMARKING USING DFT ALGORITHM
 
A Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social NetworksA Novel Watermarking Scheme for Image Authentication in Social Networks
A Novel Watermarking Scheme for Image Authentication in Social Networks
 

Similar to Watermark

A108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxA108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxVaibhavKale80
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 
Different kinds of watermarks
Different kinds of watermarksDifferent kinds of watermarks
Different kinds of watermarksDeftPDF
 
digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfMekalaSamayochitha
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar10e11a0545
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsYogeshIJTSRD
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniquestheijes
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewEditor IJCATR
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000authority12
 

Similar to Watermark (20)

A108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxA108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptx
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Different kinds of watermarks
Different kinds of watermarksDifferent kinds of watermarks
Different kinds of watermarks
 
digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdf
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and Applications
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
B011110614
B011110614B011110614
B011110614
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
Iw2415551560
Iw2415551560Iw2415551560
Iw2415551560
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
50120130406038
5012013040603850120130406038
50120130406038
 
Digital Watermarking.pptx
Digital Watermarking.pptxDigital Watermarking.pptx
Digital Watermarking.pptx
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Watermark

  • 2. Content  What is watermarking  History  Digital Watermarking  Classification  Visible And Invisible Watermarking  Text And Image Watermarking  Examples, Techniques And Applications 2
  • 3. What is Watermarking  A watermark is a recognizable image or pattern in paper that appears as various shades of lightness/darkness when viewed by transmitted light (or when viewed by reflected light, a top a dark background), caused by thickness variations in the paper. 3
  • 4. Watermarking History  More than 700 years ago, watermarks were used in Italy to indicate the paper brand and the mill that produced it.  By the 18th century watermarks began to be used as anticounterfeiting measures on money and other documents.  The term watermark was introduced near the end of the 18th century.  It was probably given because the marks resemble the effects of water on paper  The first example of a technology similar to digital watermarking is a patent filed in 1954 by Emil Hembrooke for identifying music works.  In 1988, Komatsu and Tominaga appear to be the first to use 4 the term “digital watermarking”.
  • 5. Paper Watermarks Paper Watermarks: Formed during the manufacturing process of the paper when the paper is wet, so that fibers can be disturbed according to the design of the watermark. Used mainly for identification and authentication 5
  • 6. Digital Watermarking Definition: A digital watermark is a digital signal or pattern inserted into a digital document such as text, graphics or multimedia, and carries information unique to the copyright owner, the creator of the document or the authorized consumer. 6
  • 7. Common Examples  Currency Notes  Stamps  Passports  Legal Documents  Logos used by cable TV channels 7
  • 11. Example 11
  • 12. Digital Watermark Classification  Based on visibility of watermarks - Visible Watermarks - Invisible Watermarks  Based on the content to be watermarked - Text Watermarking - Image, Audio, Video Watermarking 12
  • 13. Visible Watermarking  In visible watermarking, the information is visible in the picture or video.  Typically, the information is text or a logo which identifies the owner of the media.  When a television broadcaster adds its logo to the corner of transmitted video, this is also a visible watermark. 13
  • 15. Invisible Watermarking  In invisible watermarking, information is added as digital data to audio, picture or video, but it cannot be perceived as such (although it may be possible to detect that some amount of information is hidden).  It is also possible to use hidden embedded information as a means of covert communication between individuals. 15
  • 16. Small changes in brightness, contrast, etc. (sail_e.jpg): Signed image. Verify (sail.jpg): Original image. with secret key 100001. 16
  • 19. Techniques for Texts  Text Line Coding: Change the spacing between lines.  Word-shift Coding: Change the spacing between words.  Character Encoding: Alter the shapes of characters. 19
  • 20. Text line coding example 20
  • 22. Techniques for Images  Spatial Watermarking: Just change some of the values of the pixels in the lower bit plane; e.g., Change some of the bits from 1 to 0 or 0 to 1.  Frequency Domain Watermarking: First convert the image to the frequency domain and then apply the watermark in the low frequency regions. 22
  • 23. Example 23
  • 24. Example Original Watermarked Version 24
  • 25. Watermarking Attacks  Signal enhancement (sharpening, contrast enhancement, etc.)  Additive and multiplicative noise (gaussian, uniform, etc.)  Filtering (High pass, low pass, linear, nonlinear, etc.)  Lossy compression (JPEG, MPEG-x, H.26x, etc.)  Geometric transforms (translation, rotation, etc.)  Data reduction (cropping, clipping, etc.)  Transcoding (MPEG2 ⇒ H.263, etc.)  D/A and A/D conversion (print-scan, etc.)  Multiple watermarking  Collusion attack 25
  • 27. Characteristics of Digital Watermarks  Unobtrusive: invisible enough not to degrade the data quality and to prevent an attacker from finding and deleting it.  Readily Detectable: the data owner or an independent control authority should easily detect it.  Unambiguous: retrieval of it should unambiguously identify the data owner.  Innumerable: it should be possible to generate a large number of watermarks, all distinguishable.  Robust: difficult to remove for an attacker, who would like to destroy it in order to counterfeit the copyright of the data. Moreover, removal of it should cause a considerable degradation in the quality of the data.  Visible watermarks should be visible enough to discourage theft. 27
  • 28. Applications  Embed information about the owner to prevent others from claiming copyright  For example, a compliant DVD player will not playback or copy data that carry a “copy never” watermark  This is useful to monitor or trace back illegally produced copies of the cover  Used to avoid unauthorized duplication and distribution.  Digital watermark inserted to indicate the number of copies permitted. 28