SlideShare a Scribd company logo
1 of 24
DIGITAL WATERMARKING



     LECTURE #4


     Presented By
Mrs.Vasanthi Muniasamy
Overview

   Introduction
   What is Watermarking?
   What is Digital Watermarking?
   Behind the Technology.
   Importance
   Types of Watermarking.
   Digital Watermarking Techniques.
   Applications
Conventional Encryption System
Watermark
What is Watermarking?

      “Watermarking can be considered as a special

       technique of Steganography where one message is
       embedded in another and the two messages are
       related to each other in some way. “
Example :-

     The presence of specific patterns in   currency notes
      which are visible only when the note is held to light is
      a well known example for watermark.
Example of a conventional watermark




         Courtesy of Blue Spike, Inc.
Digital Watermarking is originated from
            Steganography
Digital Watermark
What is Digital Watermarking?

     “Digital watermarking is similar to watermarking
 physical objects, except that the watermarking technique
 is used for digital content instead of physical objects. “
Digital Watermark

 In digital watermarking a low-energy signal is
  imperceptibly embedded in another signal. The
  low-energy signal is called watermark.
 The main signal in which the watermark is
  embedded is referred to as cover signal since it
  covers the watermark.
 An entity called watermark   key used for
 embedding and detecting watermark signal
 Watermark key is private
Behind The Technology


Sending Side …




  Watermark Embedding process
   Water mark
   Original Image
   Key
     Water marked image
Behind The Technology


Receiving Side …




   Watermark retrieval process
    Water marked image
    Key

      Confidential message
The Overall System
The Technology Roars…
Importance Of Digital Watermarking


© Copyright Information
© On-linemusic industry
© News gathering using digital cameras
Types of Digital Watermarking


   Robust & Fragile Watermarking
   Visible & Invisible Watermarking
   Public & Private Watermarking
   Asymmetric & Symmetric Watermarking
   Steganograhic & Non-Steganographic
    watermarking
Robust & Fragile
            Watermarking
   Robust Watermarking:-Modification of
    watermarked content will not affect watermark
   Fragile Watermarking:-Watermark get
    destroyed when watermarked content is
    modified or tampered with
Visible & Invisible
           Watermarking
 On Visible watermarking, contents are visible
Visible & Invisible
      Watermarking (Contn..)
    Invisible watermarking are not viewed on
    just looking
Public & Private
              Watermarking
•   Public Watermarking
    Users of content are authorized to detect
    watermark


•   Private Watermarking
    Users not authorized to detect watermark
Asymmetric & Symmetric
          watermarking
   In Asymmetric watermarking different keys
    used for embedding and detecting watermark
Asymmetric & Symmetric
       watermarking (Contn..)
   In symmetric watermarking same keys are
    used for embedding and detecting watermarks
Steganographic & Non-
          Steganographic
           Watermarking
   Steganographic Watermarking
    User unaware of the presence of a watermark
  eg:-Used in finger printing applications
 Non-Steganographic WM:-
    User aware of the presence of a watermark.
    e.g.:-User to detect piracy
Digital Watermarking
           Techniques
 LSB  Watermarking
 Color Separation Technique
 Bit Stream Watermarking
 Word Space Coding, Line Space Coding
  &Character Coding
Applications of Digital
        Watermarking.
 Copy Protection
 Content Authentication
 Copyright Protection
 Metadata Tagging
References

   www.watermarkingworld.org
   www.digital-watermark.com
Watermarking lecture #4

More Related Content

What's hot

Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology vijay rastogi
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingnafees321
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesPrashant Singh
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingNawin Kumar Sharma
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking TechniquesNazeera Sheth
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessingQaisar Ayub
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detectionAB Rizvi
 

What's hot (20)

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermark
WatermarkWatermark
Watermark
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Digital Watermarking Report
Digital Watermarking ReportDigital Watermarking Report
Digital Watermarking Report
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarking
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking Techniques
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detection
 

Similar to Watermarking lecture #4

A108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxA108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxVaibhavKale80
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsYogeshIJTSRD
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 
Seminar PPT on Crypto Watermarking B.Tech
Seminar PPT on Crypto Watermarking B.TechSeminar PPT on Crypto Watermarking B.Tech
Seminar PPT on Crypto Watermarking B.Techsagarkumawat961
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar10e11a0545
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applicationsKannekanti Utthej
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewEditor IJCATR
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniquestheijes
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueIRJET Journal
 
A robust fsm watermarking scheme for ip protection of sequential circuit desi...
A robust fsm watermarking scheme for ip protection of sequential circuit desi...A robust fsm watermarking scheme for ip protection of sequential circuit desi...
A robust fsm watermarking scheme for ip protection of sequential circuit desi...Ece Rljit
 
Thesis Topics on Digital Image Watermarking
Thesis Topics on Digital Image WatermarkingThesis Topics on Digital Image Watermarking
Thesis Topics on Digital Image WatermarkingPhdtopiccom
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYIRJET Journal
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyAlexander Decker
 
Digital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingDigital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingIRJET Journal
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET Journal
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET Journal
 

Similar to Watermarking lecture #4 (20)

A108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxA108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptx
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and Applications
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Seminar PPT on Crypto Watermarking B.Tech
Seminar PPT on Crypto Watermarking B.TechSeminar PPT on Crypto Watermarking B.Tech
Seminar PPT on Crypto Watermarking B.Tech
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
50120140504020 2
50120140504020 250120140504020 2
50120140504020 2
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
A robust fsm watermarking scheme for ip protection of sequential circuit desi...
A robust fsm watermarking scheme for ip protection of sequential circuit desi...A robust fsm watermarking scheme for ip protection of sequential circuit desi...
A robust fsm watermarking scheme for ip protection of sequential circuit desi...
 
Thesis Topics on Digital Image Watermarking
Thesis Topics on Digital Image WatermarkingThesis Topics on Digital Image Watermarking
Thesis Topics on Digital Image Watermarking
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 
Digital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingDigital Image Security using Digital Watermarking
Digital Image Security using Digital Watermarking
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud Computing
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 

More from vasanthimuniasamy

More from vasanthimuniasamy (20)

Lecture #1 - Introduction to Information System
Lecture #1 - Introduction to Information SystemLecture #1 - Introduction to Information System
Lecture #1 - Introduction to Information System
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
Encryption
EncryptionEncryption
Encryption
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Wi MAX Technology
Wi MAX TechnologyWi MAX Technology
Wi MAX Technology
 
WiFi Technology & IEEE
WiFi Technology & IEEEWiFi Technology & IEEE
WiFi Technology & IEEE
 
WAP Technology
WAP TechnologyWAP Technology
WAP Technology
 
I - Mode Technology
I - Mode TechnologyI - Mode Technology
I - Mode Technology
 
Cellular Communication
Cellular CommunicationCellular Communication
Cellular Communication
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Computer Network PDF - Course Material 2013
Computer Network PDF - Course Material 2013Computer Network PDF - Course Material 2013
Computer Network PDF - Course Material 2013
 
Computer Wireless Network Pdf - course material 2013
Computer Wireless Network Pdf - course material 2013Computer Wireless Network Pdf - course material 2013
Computer Wireless Network Pdf - course material 2013
 
Smartcard lecture #5
Smartcard lecture #5Smartcard lecture #5
Smartcard lecture #5
 
Lecture #5 Data Communication and Network
Lecture #5 Data Communication and NetworkLecture #5 Data Communication and Network
Lecture #5 Data Communication and Network
 
Database Management System Lecture #4
Database Management System Lecture #4Database Management System Lecture #4
Database Management System Lecture #4
 
Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
 
E - Commerce Lecture #3
E - Commerce Lecture #3 E - Commerce Lecture #3
E - Commerce Lecture #3
 
Lecture #2 - About MIS
Lecture #2 - About MISLecture #2 - About MIS
Lecture #2 - About MIS
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Watermarking lecture #4

  • 1. DIGITAL WATERMARKING LECTURE #4 Presented By Mrs.Vasanthi Muniasamy
  • 2. Overview  Introduction  What is Watermarking?  What is Digital Watermarking?  Behind the Technology.  Importance  Types of Watermarking.  Digital Watermarking Techniques.  Applications
  • 4. Watermark What is Watermarking? “Watermarking can be considered as a special technique of Steganography where one message is embedded in another and the two messages are related to each other in some way. “ Example :- The presence of specific patterns in currency notes which are visible only when the note is held to light is a well known example for watermark.
  • 5. Example of a conventional watermark Courtesy of Blue Spike, Inc.
  • 6. Digital Watermarking is originated from Steganography
  • 7. Digital Watermark What is Digital Watermarking? “Digital watermarking is similar to watermarking physical objects, except that the watermarking technique is used for digital content instead of physical objects. “
  • 8. Digital Watermark  In digital watermarking a low-energy signal is imperceptibly embedded in another signal. The low-energy signal is called watermark.  The main signal in which the watermark is embedded is referred to as cover signal since it covers the watermark.  An entity called watermark key used for embedding and detecting watermark signal  Watermark key is private
  • 9. Behind The Technology Sending Side … Watermark Embedding process  Water mark  Original Image  Key  Water marked image
  • 10. Behind The Technology Receiving Side … Watermark retrieval process  Water marked image  Key  Confidential message
  • 11. The Overall System The Technology Roars…
  • 12. Importance Of Digital Watermarking © Copyright Information © On-linemusic industry © News gathering using digital cameras
  • 13. Types of Digital Watermarking  Robust & Fragile Watermarking  Visible & Invisible Watermarking  Public & Private Watermarking  Asymmetric & Symmetric Watermarking  Steganograhic & Non-Steganographic watermarking
  • 14. Robust & Fragile Watermarking  Robust Watermarking:-Modification of watermarked content will not affect watermark  Fragile Watermarking:-Watermark get destroyed when watermarked content is modified or tampered with
  • 15. Visible & Invisible Watermarking  On Visible watermarking, contents are visible
  • 16. Visible & Invisible Watermarking (Contn..)  Invisible watermarking are not viewed on just looking
  • 17. Public & Private Watermarking • Public Watermarking Users of content are authorized to detect watermark • Private Watermarking Users not authorized to detect watermark
  • 18. Asymmetric & Symmetric watermarking  In Asymmetric watermarking different keys used for embedding and detecting watermark
  • 19. Asymmetric & Symmetric watermarking (Contn..)  In symmetric watermarking same keys are used for embedding and detecting watermarks
  • 20. Steganographic & Non- Steganographic Watermarking  Steganographic Watermarking User unaware of the presence of a watermark eg:-Used in finger printing applications  Non-Steganographic WM:- User aware of the presence of a watermark. e.g.:-User to detect piracy
  • 21. Digital Watermarking Techniques  LSB Watermarking  Color Separation Technique  Bit Stream Watermarking  Word Space Coding, Line Space Coding &Character Coding
  • 22. Applications of Digital Watermarking.  Copy Protection  Content Authentication  Copyright Protection  Metadata Tagging
  • 23. References  www.watermarkingworld.org  www.digital-watermark.com