SlideShare une entreprise Scribd logo
1  sur  30
DR. TAMARA CHER R. MERCADO University of Southeastern Philippines Institute of Computing  《 Models of Watermarking 》
Contents 3.1 Communications 3.2 Communication-based models of    	watermarking 3.3 Geometric models of watermarking 3.4 Basics of Digital Image 3.5 Image Watermarking Example
3.1  》Communications  Components of Communication System Fig. 3.1 Standard model of a communication system m: the message we want to transmit x: the codeword encoded by the channel encoder n: the additive random noise  y: the received signal mn: the received message
3.1  》Communications  Components of Communication System source coder:  maps a message into a sequence of symbols drawn from some alphabet. ,[object Object],modulator:  converts a sequence of symbols into a physical signal that can travel over the channel. ,[object Object]
decoderreceives signal y ( x + n ), inverts the encoding process and attempts to correct transmission errors.,[object Object]
Cryptography 3.1  》Communications 》Secure Transmission  Fig. 3.2 Standard model of a communication channel with encryption ,[object Object]
The encrypted message (ciphertext) is transmitted over the channel
At the receiver, the ciphertext is received and decrypted using the related key to reveal the cleartext,[object Object]
prevent passive attacks in the form of unauthorized reading of the message.
 prevent active attacks in the form of unauthorized writing.
Downside:
does not necessarily prevent an adversary from knowing that a message is being transmitted.
provides no protection against an adversary intent on jamming or removing a message before it can be delivered to the receiver.,[object Object]
Modulation is done according to a secret code, which spreads the signal over a wider bandwidth than required
Frequency hopping - One of the earliest and simplest spread spectrum technologies,[object Object]
Spread spectrum guarantees delivery of signals. Cryptography guarantees secrecy of messages. It is thus common for both technologies to be used together.
Spread spectrum can be thought of as responsible for the transport layer, and cryptography as responsible for the messaging layer.,[object Object]
Ways to incorporate the cover Work into the traditional communications modelThe cover Work is considered purely as noise (Basic Model). The cover Work is still considered noise, but this noise is provided to the channel encoder as side information. Cover Work is not considered as noise, but rather as a second message that must be transmitted along with the watermark message in a form of multiplexing.
3.2  》Communication-Based Models of Watermarking 》Basic Model Informed Detector Watermark  Embedder Watermark  Detector Fig. 3.4 Watermarking system with a simple informed detector mapped into communications model (wa: Added pattern, Co: Original cover work, cw: watermarked version of the work, cwn: noisy watermarked work) ,[object Object]
Detection consists of two steps:Co is subtracted from the received Work,cwn, to obtain a received noisy watermark pattern, wn.  wn is then decoded by a watermark decoder, with a watermark key. ,[object Object],[object Object]
The received, watermarked Work,cwn, is now viewed as a corrupted version of the added pattern, wa, and the entire watermark detector is viewed as the channel decoder.,[object Object]
In authentication applications, the goal is not to communicate a message but to learn whether and how a Work has been modified since a watermark was embedded. For this reason, Informed and Blind Detector models are not typically used to study authentication systems.,[object Object]
A model of watermarking that allows wato be dependent on co.
The model is almost identical to Blind Detector, with the only difference being that co is provided as an additional input to the watermark encoder.
Allows the embedder to set cw to any desired value by simply letting wa =  cw  − co
3.2  》Communication-Based Models of Watermarking 》Multiplexed Communications Multiplexed Communications Fig. 3.7. Watermarking as simultaneous communications of two messages. (Pictured with a blind watermark detector. An informed detector would receive the original cover Work as additional input.) ,[object Object]
The two messages, co and m, will be detected and decoded by two very different receivers: a human being and a watermark detector, respectively.
The watermark embedder combines m and co into a single signal, cw.,[object Object]
Graphic/Image File Formats Graphic/Image Data Structures  Pixels: picture elements in digital images  Image Resolution:number of pixels in a digital image (Higher resolution always yields better quality.)  Bit-Map: a representation for the graphic/image data in the same manner as they are stored in video memory.  3.3  》Geometric Models of Watermarking
3.3  》Geometric Models of Watermarking Geometric Models of Watermarking ,[object Object]

Contenu connexe

Tendances (20)

Watermarking
WatermarkingWatermarking
Watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Steganography
SteganographySteganography
Steganography
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Steganography
SteganographySteganography
Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 

En vedette

bionanotechnology_calls
bionanotechnology_callsbionanotechnology_calls
bionanotechnology_callsNasreen Ahmad
 
An improved Spread Spectrum Watermarking technique to withstand Geometric Def...
An improved Spread Spectrum Watermarking technique to withstand Geometric Def...An improved Spread Spectrum Watermarking technique to withstand Geometric Def...
An improved Spread Spectrum Watermarking technique to withstand Geometric Def...IDES Editor
 
Applicability of-tracability-technologies-for-3 d-printing-robust-blind-water...
Applicability of-tracability-technologies-for-3 d-printing-robust-blind-water...Applicability of-tracability-technologies-for-3 d-printing-robust-blind-water...
Applicability of-tracability-technologies-for-3 d-printing-robust-blind-water...Sirris
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 

En vedette (7)

bionanotechnology_calls
bionanotechnology_callsbionanotechnology_calls
bionanotechnology_calls
 
An improved Spread Spectrum Watermarking technique to withstand Geometric Def...
An improved Spread Spectrum Watermarking technique to withstand Geometric Def...An improved Spread Spectrum Watermarking technique to withstand Geometric Def...
An improved Spread Spectrum Watermarking technique to withstand Geometric Def...
 
Applicability of-tracability-technologies-for-3 d-printing-robust-blind-water...
Applicability of-tracability-technologies-for-3 d-printing-robust-blind-water...Applicability of-tracability-technologies-for-3 d-printing-robust-blind-water...
Applicability of-tracability-technologies-for-3 d-printing-robust-blind-water...
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 

Similaire à Chapter3

International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
 
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...IOSR Journals
 
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Journals
 
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Publishing House
 
DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study ijcisjournal
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMijfcstjournal
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform ijfcstjournal
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...
MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...
MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...cscpconf
 
Mc cdma performance on single
Mc cdma performance on singleMc cdma performance on single
Mc cdma performance on singlecsandit
 
Error control techniques for video communications
Error control techniques for video communications Error control techniques for video communications
Error control techniques for video communications Shubhi Singh chauhan
 
ELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniques
ELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniquesELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniques
ELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniquesKuvempu University
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419IJRAT
 

Similaire à Chapter3 (20)

H3602056060
H3602056060H3602056060
H3602056060
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
 
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
 
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
 
DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...
MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...
MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...
 
Mc cdma performance on single
Mc cdma performance on singleMc cdma performance on single
Mc cdma performance on single
 
G010223035
G010223035G010223035
G010223035
 
Error control techniques for video communications
Error control techniques for video communications Error control techniques for video communications
Error control techniques for video communications
 
G0523444
G0523444G0523444
G0523444
 
ELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniques
ELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniquesELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniques
ELH – 3.1: ADVANCED DIGITAL COMMUNICATION UNIT – II Coding techniques
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Network
NetworkNetwork
Network
 
Ch1 v1
Ch1 v1Ch1 v1
Ch1 v1
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419
 

Chapter3

  • 1. DR. TAMARA CHER R. MERCADO University of Southeastern Philippines Institute of Computing 《 Models of Watermarking 》
  • 2. Contents 3.1 Communications 3.2 Communication-based models of watermarking 3.3 Geometric models of watermarking 3.4 Basics of Digital Image 3.5 Image Watermarking Example
  • 3. 3.1 》Communications Components of Communication System Fig. 3.1 Standard model of a communication system m: the message we want to transmit x: the codeword encoded by the channel encoder n: the additive random noise y: the received signal mn: the received message
  • 4.
  • 5.
  • 6.
  • 7. The encrypted message (ciphertext) is transmitted over the channel
  • 8.
  • 9. prevent passive attacks in the form of unauthorized reading of the message.
  • 10. prevent active attacks in the form of unauthorized writing.
  • 12. does not necessarily prevent an adversary from knowing that a message is being transmitted.
  • 13.
  • 14. Modulation is done according to a secret code, which spreads the signal over a wider bandwidth than required
  • 15.
  • 16. Spread spectrum guarantees delivery of signals. Cryptography guarantees secrecy of messages. It is thus common for both technologies to be used together.
  • 17.
  • 18. Ways to incorporate the cover Work into the traditional communications modelThe cover Work is considered purely as noise (Basic Model). The cover Work is still considered noise, but this noise is provided to the channel encoder as side information. Cover Work is not considered as noise, but rather as a second message that must be transmitted along with the watermark message in a form of multiplexing.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. A model of watermarking that allows wato be dependent on co.
  • 24. The model is almost identical to Blind Detector, with the only difference being that co is provided as an additional input to the watermark encoder.
  • 25. Allows the embedder to set cw to any desired value by simply letting wa = cw − co
  • 26.
  • 27. The two messages, co and m, will be detected and decoded by two very different receivers: a human being and a watermark detector, respectively.
  • 28.
  • 29. Graphic/Image File Formats Graphic/Image Data Structures Pixels: picture elements in digital images Image Resolution:number of pixels in a digital image (Higher resolution always yields better quality.) Bit-Map: a representation for the graphic/image data in the same manner as they are stored in video memory. 3.3 》Geometric Models of Watermarking
  • 30.
  • 31. Region of acceptable fidelity: a region in which all works appear essentially identical to a given cover work
  • 32. Detection region: describes the behavior of the detection algorithm
  • 33. Embedding distribution or embedding region: describes the effect of an embedding algorithm
  • 34.
  • 35. Types of Digital Image Binary Image Each pixel is stored as a single bit (0 or 1) A 512×512 monochrome image requires 32.768 kB of storage. 3.4 》Basics of Digital Image 1 0 0 1 0 1 0 0 0 1 1 0 1 0 0 1 0 1 1 1 1 0 0 1 1 1 0 0 0 1 0 1
  • 36. Graphic/Image File Formats Gray-scale Images Each pixel is a shade of gray, from 0 (black) to 255 (white). This range means that each pixel can be represented by eight bits, or exactly one byte. A 512×512 grayscale image requires 262.14 kB of storage. 3.4 》Basics of Digital Image 138 201 90 128 345 95 200 122 112 78 21 198 56 90 1 0 0 0 1 0 1 0
  • 37. Graphic/Image File Formats True Color or RGB (Red-Green-Blue) Each pixel has a color described by the amount of red, green and blue in it. Has a total of 256x256x256 = 16,777,216 different possible colors in the image 24 bit images: total number of bits required for each pixel. A 640×480 24-bit color image would require 921.6 kB of storage 3.4 》Basics of Digital Image
  • 38. Graphic/Image File Formats True Color or RGB (Red-Green-Blue) 3.4 》Basics of Digital Image
  • 39. Graphic/Image File Formats Indexed Each pixel has a value which does not give its color (as for an RGB image), but an index to the color in a color map. Color map or color palette is associated with the image which is simply a list of all the colousused in that image. Compuserve GIF allows only256 colors or fewer in each image and so its index values only requires one byte each. 3.4 》Basics of Digital Image
  • 40. Graphic/Image File Formats 3.4 》Basics of Digital Image Indexed Pixels labeled 5 correspond to 0.2627 0.2588 0.2549, which is a dark grayish color.
  • 41. The LSB Technique 3.5 》Image Watermarking Example LSB: Least Significant Bit Considered as the simplest technique for watermark insertion. For a 24-bit image, each pixel has 3 bytes and each color (RGB) has 1 byte or 8 bits in which the intensity of that color can be specified on a scale of 0 to 255. A bright purple in color would have full intensities of red and blue, but no green. This pixel can be shown as X0 = {R=255, G=0, B=255} Now let’s have a look at another pixel: X1 = {R=255, G=0, B=254}
  • 42. The LSB Technique 3.5 》Image Watermarking Example Since this difference does not matter much, when we replace the color intensity information in the LSB with watermarking information, the image will still look the same to the naked eye. Thus, for every pixel of 3 bytes (24 bits), we can hide 3 bits of watermarking information, in the LSBs. A simple algorithm for this technique would be: Let W be watermarking information For every pixel in the image, Xi Do Loop: Store the next bit from W in the LSB position of Xi [red] byte Store the next bit from W in the LSB position of Xi [green] byte Store the next bit from W in the LSB position of Xi [blue] byte End Loop
  • 43. The LSB Technique 3.5 》Image Watermarking Example W = TAMMY 01010100 01000001 01001101 01001101 01011001 49 – 110001  110000 64 – 1000000  1000001 66 – 1000010  1000010 55 – 110111  110111 76 – 1001100  1001100 80 – 1010000  1010001 56 – 111000  111000 82 – 1010010  1010010
  • 44. The LSB Technique 3.5 》Image Watermarking Example 49 – 110001  110000 (48) 64 – 1000000  1000001 (65) 66 – 1000010  1000010 (66) 55 – 110111  110111 (55) 76 – 1001100  1001100 (76) 80 – 1010000  1010001 (81) 56 – 111000  111000 (56) 82 – 1010010  1010010 (82) 48 55 56 65 76 82 66 81
  • 45. The LSB Technique 3.5 》Image Watermarking Example Watermark Extraction take all the data in the LSBs of the color bytes and combine them. This technique of watermarking is invisible, as changes are made to the LSB only, but is not robust. Image manipulations, such as resampling, rotation, format conversions and cropping, will in most cases result in the watermark information being lost.