SlideShare a Scribd company logo
1 of 13
Digital watermarking techniques for
security applications
Technical seminar on
Overview
• Abstract
• What is Digital Watermarking?
• Digital watermarking system
• Qualities of Digital Watermarking
• Types of Watermarking Techniques
• Applications of Digital Watermarking
• Watermarking Attacks
Abstract
• Nowadays, the success of internet technology, made our life
very much easy and convenient. But the major problem is to
secure the data from duplication and unauthorized use. So
the digital watermarking is used. With this technology, we
embed the secret information into the actual information for
protecting it from unauthorized use. By using this technique
only authorized user can access the data. It may be classified
into two domains that are spatial domain and frequency
domain. In this paper, we have briefly discussed about these
technologies and their pros and cons.
What is Digital Watermarking?
 Digital watermarking is that technology which is used for
protection of digital media such as video, audio and image.
 In this technique, watermark i.e. secret information is embedded in
digital media using some algorithms and the watermarked media is
processed. After that, watermark i.e. secret information is extracted
using the particular algorithm.
 This technique, i.e. digital watermarking is used for authentication
of data and protection of copyright. Here two phases are used
which are embedding of the watermark and detection and
extraction of watermark
Digital watermarking system
Qualities of Digital Watermarking
 Robustness: When we transmit a watermarked data, then there are
various attacks on that and that information may undergo different
types of operations. So in these conditions, watermark must not degrade
its quality
 Security: It means that, the watermark must be such that only
authorized users can access it. If any user has no embedding
information, he must be unable to detect the watermark. This is termed
as security of watermark
 Computational Cost: It depends on the method which is used for
watermarking. If the watermarking method is more complex, then it
contains complex algorithm, requirement of more software and
hardware, so computational cost increases and vice versa.
Types of Watermarking Techniques
 spatial domain watermarking
 frequency domain watermarking
Spatial Domain Watermarking
 In the spatial domain techniques, we embed the watermark
by modifying the pixel values.
 We know that the image is made up of pixels.
 In this method of watermarking, we embed the watermark
in some specific pixels of image.
 In the extraction phase, we extract the watermark from
these specific pixels.
 This technique is very much easy to use, less complex and
also takes less time.
 But on the other hand, it is not robust for various types of
attacks.
Transform Domain Watermarking
 The transform domain watermarking is better as
compared to the spatial domain watermarking.
 The image is represented in the form of frequency in the
transform domain watermarking.
 In the transform domain watermarking techniques, firstly
conversion of the original image is done by a predefined
transformation.
 Then we embed the watermark in the transform image or
in the transformation coefficients.
 Finally, we take the inverse transform to get the
watermarked image.
Applications of Digital Watermarking
Copyright Protection: Digital watermarking is used to identify and
protect copyright ownership. Digital data is embedded with watermarks to
identify the copyright owners
Medical Application: For any treatment, medical reports are very much
important. If the reports get mixed, it proves very much dangerous for the
patients. So by using digital watermarking, we embed the name of the
patients on the reports such as an MRI scan and X-Ray reports .
Annotation and Privacy Control: To annotate an image multi-bit
watermarking can be used. For example, imaging details and patient
records related to a medical image can be carefully embedded into the
image.
Watermarking Attacks
• Removal Attack: In this, the unauthorized user tries to remove
the watermark i.e. secret information from the watermarked data
• Interference Attack: In these types of attacks, the noise is
inserted to the watermarked media. Some examples of this
category are averaging, quantization, compression etc.
• Active Attack: It is the most important attack. Here the
unauthorized user tries to extract the watermark or simply makes
the watermark such that it cannot be detected by any operation.
• Passive Attacks: In this type of attack, unauthorized user
simply tries to find out that the particular data contain the
watermark or not
• Image Degradation: In these types of attacks, the parts of
the image are removed, resulting in damage of robust
watermarks. Examples of these attacks are partial cropping,
row removal and column removal, insertion of Gaussian
noise.
Thank you

More Related Content

What's hot

What's hot (20)

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
The Audio watermarking
The Audio watermarkingThe Audio watermarking
The Audio watermarking
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Watermark
WatermarkWatermark
Watermark
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
 
Digital Watermarking Report
Digital Watermarking ReportDigital Watermarking Report
Digital Watermarking Report
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Steganography
SteganographySteganography
Steganography
 

Similar to Digital watermarking techniques for security applications

STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
 
Review on Quantum Watermarking Techniques
Review on Quantum Watermarking TechniquesReview on Quantum Watermarking Techniques
Review on Quantum Watermarking TechniquesIRJET Journal
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking TechniquesNazeera Sheth
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar10e11a0545
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET Journal
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniquestheijes
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))IAESIJEECS
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewEditor IJCATR
 
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET Journal
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingEditor IJMTER
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...IRJET Journal
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
 

Similar to Digital watermarking techniques for security applications (20)

STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
Review on Quantum Watermarking Techniques
Review on Quantum Watermarking TechniquesReview on Quantum Watermarking Techniques
Review on Quantum Watermarking Techniques
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking Techniques
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
 
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication Methods
 
A Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image WatermarkingA Survey on Features Combination for Image Watermarking
A Survey on Features Combination for Image Watermarking
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Dz31840846
Dz31840846Dz31840846
Dz31840846
 
B010510613
B010510613B010510613
B010510613
 
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 

Recently uploaded

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

Digital watermarking techniques for security applications

  • 1. Digital watermarking techniques for security applications Technical seminar on
  • 2. Overview • Abstract • What is Digital Watermarking? • Digital watermarking system • Qualities of Digital Watermarking • Types of Watermarking Techniques • Applications of Digital Watermarking • Watermarking Attacks
  • 3. Abstract • Nowadays, the success of internet technology, made our life very much easy and convenient. But the major problem is to secure the data from duplication and unauthorized use. So the digital watermarking is used. With this technology, we embed the secret information into the actual information for protecting it from unauthorized use. By using this technique only authorized user can access the data. It may be classified into two domains that are spatial domain and frequency domain. In this paper, we have briefly discussed about these technologies and their pros and cons.
  • 4. What is Digital Watermarking?  Digital watermarking is that technology which is used for protection of digital media such as video, audio and image.  In this technique, watermark i.e. secret information is embedded in digital media using some algorithms and the watermarked media is processed. After that, watermark i.e. secret information is extracted using the particular algorithm.  This technique, i.e. digital watermarking is used for authentication of data and protection of copyright. Here two phases are used which are embedding of the watermark and detection and extraction of watermark
  • 6. Qualities of Digital Watermarking  Robustness: When we transmit a watermarked data, then there are various attacks on that and that information may undergo different types of operations. So in these conditions, watermark must not degrade its quality  Security: It means that, the watermark must be such that only authorized users can access it. If any user has no embedding information, he must be unable to detect the watermark. This is termed as security of watermark  Computational Cost: It depends on the method which is used for watermarking. If the watermarking method is more complex, then it contains complex algorithm, requirement of more software and hardware, so computational cost increases and vice versa.
  • 7. Types of Watermarking Techniques  spatial domain watermarking  frequency domain watermarking
  • 8. Spatial Domain Watermarking  In the spatial domain techniques, we embed the watermark by modifying the pixel values.  We know that the image is made up of pixels.  In this method of watermarking, we embed the watermark in some specific pixels of image.  In the extraction phase, we extract the watermark from these specific pixels.  This technique is very much easy to use, less complex and also takes less time.  But on the other hand, it is not robust for various types of attacks.
  • 9. Transform Domain Watermarking  The transform domain watermarking is better as compared to the spatial domain watermarking.  The image is represented in the form of frequency in the transform domain watermarking.  In the transform domain watermarking techniques, firstly conversion of the original image is done by a predefined transformation.  Then we embed the watermark in the transform image or in the transformation coefficients.  Finally, we take the inverse transform to get the watermarked image.
  • 10. Applications of Digital Watermarking Copyright Protection: Digital watermarking is used to identify and protect copyright ownership. Digital data is embedded with watermarks to identify the copyright owners Medical Application: For any treatment, medical reports are very much important. If the reports get mixed, it proves very much dangerous for the patients. So by using digital watermarking, we embed the name of the patients on the reports such as an MRI scan and X-Ray reports . Annotation and Privacy Control: To annotate an image multi-bit watermarking can be used. For example, imaging details and patient records related to a medical image can be carefully embedded into the image.
  • 11. Watermarking Attacks • Removal Attack: In this, the unauthorized user tries to remove the watermark i.e. secret information from the watermarked data • Interference Attack: In these types of attacks, the noise is inserted to the watermarked media. Some examples of this category are averaging, quantization, compression etc. • Active Attack: It is the most important attack. Here the unauthorized user tries to extract the watermark or simply makes the watermark such that it cannot be detected by any operation.
  • 12. • Passive Attacks: In this type of attack, unauthorized user simply tries to find out that the particular data contain the watermark or not • Image Degradation: In these types of attacks, the parts of the image are removed, resulting in damage of robust watermarks. Examples of these attacks are partial cropping, row removal and column removal, insertion of Gaussian noise.