DIGITAL WATERMARKING     LECTURE #4     Presented ByMrs.Vasanthi Muniasamy
Overview   Introduction   What is Watermarking?   What is Digital Watermarking?   Behind the Technology.   Importance...
Conventional Encryption System
WatermarkWhat is Watermarking?      “Watermarking can be considered as a special       technique of Steganography where on...
Example of a conventional watermark         Courtesy of Blue Spike, Inc.
Digital Watermarking is originated from            Steganography
Digital WatermarkWhat is Digital Watermarking?     “Digital watermarking is similar to watermarking physical objects, exce...
Digital Watermark In digital watermarking a low-energy signal is  imperceptibly embedded in another signal. The  low-ener...
Behind The TechnologySending Side …  Watermark Embedding process   Water mark   Original Image   Key     Water marked ...
Behind The TechnologyReceiving Side …   Watermark retrieval process    Water marked image    Key      Confidential mess...
The Overall SystemThe Technology Roars…
Importance Of Digital Watermarking© Copyright Information© On-linemusic industry© News gathering using digital cameras
Types of Digital Watermarking   Robust & Fragile Watermarking   Visible & Invisible Watermarking   Public & Private Wat...
Robust & Fragile            Watermarking   Robust Watermarking:-Modification of    watermarked content will not affect wa...
Visible & Invisible           Watermarking On Visible watermarking, contents are visible
Visible & Invisible      Watermarking (Contn..)    Invisible watermarking are not viewed on    just looking
Public & Private              Watermarking•   Public Watermarking    Users of content are authorized to detect    watermar...
Asymmetric & Symmetric          watermarking   In Asymmetric watermarking different keys    used for embedding and detect...
Asymmetric & Symmetric       watermarking (Contn..)   In symmetric watermarking same keys are    used for embedding and d...
Steganographic & Non-          Steganographic           Watermarking   Steganographic Watermarking    User unaware of the...
Digital Watermarking           Techniques LSB  Watermarking Color Separation Technique Bit Stream Watermarking Word Sp...
Applications of Digital        Watermarking. Copy Protection Content Authentication Copyright Protection Metadata Tagg...
References   www.watermarkingworld.org   www.digital-watermark.com
Watermarking lecture #4
Upcoming SlideShare
Loading in …5
×

Watermarking lecture #4

2,368 views

Published on

This is my Lecture #4 about Basics about Watermarking

Published in: Education
  • Be the first to comment

Watermarking lecture #4

  1. 1. DIGITAL WATERMARKING LECTURE #4 Presented ByMrs.Vasanthi Muniasamy
  2. 2. Overview Introduction What is Watermarking? What is Digital Watermarking? Behind the Technology. Importance Types of Watermarking. Digital Watermarking Techniques. Applications
  3. 3. Conventional Encryption System
  4. 4. WatermarkWhat is Watermarking? “Watermarking can be considered as a special technique of Steganography where one message is embedded in another and the two messages are related to each other in some way. “Example :- The presence of specific patterns in currency notes which are visible only when the note is held to light is a well known example for watermark.
  5. 5. Example of a conventional watermark Courtesy of Blue Spike, Inc.
  6. 6. Digital Watermarking is originated from Steganography
  7. 7. Digital WatermarkWhat is Digital Watermarking? “Digital watermarking is similar to watermarking physical objects, except that the watermarking technique is used for digital content instead of physical objects. “
  8. 8. Digital Watermark In digital watermarking a low-energy signal is imperceptibly embedded in another signal. The low-energy signal is called watermark. The main signal in which the watermark is embedded is referred to as cover signal since it covers the watermark. An entity called watermark key used for embedding and detecting watermark signal Watermark key is private
  9. 9. Behind The TechnologySending Side … Watermark Embedding process  Water mark  Original Image  Key  Water marked image
  10. 10. Behind The TechnologyReceiving Side … Watermark retrieval process  Water marked image  Key  Confidential message
  11. 11. The Overall SystemThe Technology Roars…
  12. 12. Importance Of Digital Watermarking© Copyright Information© On-linemusic industry© News gathering using digital cameras
  13. 13. Types of Digital Watermarking Robust & Fragile Watermarking Visible & Invisible Watermarking Public & Private Watermarking Asymmetric & Symmetric Watermarking Steganograhic & Non-Steganographic watermarking
  14. 14. Robust & Fragile Watermarking Robust Watermarking:-Modification of watermarked content will not affect watermark Fragile Watermarking:-Watermark get destroyed when watermarked content is modified or tampered with
  15. 15. Visible & Invisible Watermarking On Visible watermarking, contents are visible
  16. 16. Visible & Invisible Watermarking (Contn..) Invisible watermarking are not viewed on just looking
  17. 17. Public & Private Watermarking• Public Watermarking Users of content are authorized to detect watermark• Private Watermarking Users not authorized to detect watermark
  18. 18. Asymmetric & Symmetric watermarking In Asymmetric watermarking different keys used for embedding and detecting watermark
  19. 19. Asymmetric & Symmetric watermarking (Contn..) In symmetric watermarking same keys are used for embedding and detecting watermarks
  20. 20. Steganographic & Non- Steganographic Watermarking Steganographic Watermarking User unaware of the presence of a watermark eg:-Used in finger printing applications Non-Steganographic WM:- User aware of the presence of a watermark. e.g.:-User to detect piracy
  21. 21. Digital Watermarking Techniques LSB Watermarking Color Separation Technique Bit Stream Watermarking Word Space Coding, Line Space Coding &Character Coding
  22. 22. Applications of Digital Watermarking. Copy Protection Content Authentication Copyright Protection Metadata Tagging
  23. 23. References www.watermarkingworld.org www.digital-watermark.com

×