SlideShare une entreprise Scribd logo
1  sur  34
Digital Watermarking




           By,
                 Ankush K R

                 ankush.k.r.007@gmail.com
                 +91-9739317537
INTRODUCTION
Information Hiding Techniques



                      Information
                         Hiding




      Steganography   Cryptography   Watermarking


                                                    2
WHAT IS A WATERMARK?
• A watermark is a form, image or text that is impressed onto
  paper, which provides evidence of its authenticity.

• A distinguishing mark impressed on paper during
  manufacture; visible when paper is held up to the light (e.g. $
  Bill)




Visible Watermarking                    Invisible Watermarking
                                                                 3
WHAT IS DIGITAL WATERMARKING?
• Digital watermarking is an extension of watermarking
  concept in the digital world.

• A digital watermark is a pattern of bits inserted into a digital
  image, audio or video file that identifies the file's copyright
  information (author, rights, etc.).




  Image                       Video                      Audio


                                                                 4
How Watermarking is Different from
Steganography and Cryptography.

     Steganography vs. Watermarking

   • The main goal of steganography is to hide a message m in some audio
     or video (cover) data d, to obtain            new data d', practically
     indistinguishable from d, by people, in such a way that an eavesdropper
     cannot detect the presence of m in d'.

   • The main goal of watermarking is to hide a message m in some audio
     or video (cover) data d, to obtain           new data d', practically
     indistinguishable from d, by people, in such a way that an eavesdropper
     cannot remove or replace m in d'.
                                                                               5
Cryptography vs. Watermarking
 • Cryptography is the most common method of protecting digital content
   and is one of the best developed science.

 • However, encryption cannot help the seller monitor how a legitimate
   customer handles the content after decryption.

 • Digital watermarking can protect content even after it is decrypted.




           Encryption         ?       Decryption


                     Under Protection
                                                                          6
Importance of Digital Watermarking




• As seen above in Fig, Alice creates an original image and watermarks it before
  passing it to Bob. If Bob claims the image and sells copies to other people Alice
  can extract her watermark from the image proving her copyright to it.

• The caveat here is that Alice will only be able to prove her copyright of the
  image if Bob hasn’t managed to modify the image such that the watermark is
  damaged enough to be undetectable or added his own watermark such that it
  is impossible to discover which watermark was embedded first.
                                                                               7
WATERMARKING CLASSIFICATION


Visible & Invisible Watermarking


Robust & Fragile Watermarking


Asymmetric & Symmetric Watermarking


Public & Private Watermarking


Steganographic & Non-steganographic
Watermarking

                                      8
Visible Watermarking

• Visible watermark is a translucent overlaid into an image and is visible to
  the viewer. Visible watermarking is used to indicate ownership and for
  copyright protection.




                                                Ankush Watermark


          Original Image                        Watermarked Image
                                                                           9
Invisible Watermarking
• Invisible watermark is embedded into the data in such a way that the changes
  made to the pixel values are perceptually not noticed. Invisible watermark is
  used as evidence of ownership and to detect misappropriated images.




         Original Image                       Watermarked Image

 Dual Watermarking
 • Dual watermark is the combination of visible and invisible watermark. An
   invisible watermark is used as a backup for the visible watermark.    10
WATERMARKING TECHNIQUES
                  (According to Working Domain )




                              Watermarking




                                                 Frequency
          Spatial Domain
                                                  Domain
          Watermarking
                                                Watermarking



                                                           Discrete
    Least                             Discrete Cosine
                      Patch Work                           Wavelet
Significant Bit                       Transformation
                                                        Transformation




                                                                    11
Digital Watermarking Life Cycle Phases
  A watermarking system is usually divided into three distinct steps.
 • Embedding
 • Attack
 • Detection




                                                                 12
Embedding
In embedding, an algorithm accepts the host and the data to be embedded,
and produces a watermarked signal.




Inputs to the scheme are the watermark, the cover data and an optional
public or secret key. The output are watermarked data. The key is used to
enforce security.




                                                                       13
Attacks
The watermarked digital signal is transmitted or stored, usually transmitted to
another person. If this person makes a modification, this is called an attack.

Few Possible Attacks

• Robustness attacks :Which are intended to remove the watermark such as…
  JPEG compression, cropping, etc.

• Presentation Attacks :Under watermark detection failure they come into play.
  Geometric transformation, rotation, scaling, translation, change aspect ratio,
  affine transformation etc.

• Counterfeiting attacks :Rendering the original image, generate fake original.

                                                                              14
Extraction/Detection
Detection (often called extraction) is an algorithm which is applied to the
attacked signal to attempt to extract the watermark from it. If the signal was
unmodified during transmission, then the watermark still is present and it may
be extracted.




Inputs to the scheme are the watermarked data, the secret or public key and,
depending on the method, the original data and/or the original watermark.
The output is the recovered watermarked W or some kind of confidence
measure indicating how likely it is for the given watermark at the input to be
present in the data under inspection.

                                                                          15
ALGORITHM

FAST HADAMARD TRANSFORM(FHT)



Advantages of FHT


• Shorter processing time

• Invisibility of the watermark guaranteed

• Increased watermark energy leads to higher robustness




                                                          16
Sequence diagram1 (Insertion):




                                 17
Sequence diagram2 (Extraction):




                                  18
Use case diagrams1 (Insertion):




                                  19
Use case diagrams2 (Extraction):




                                   20
WATERMARKING IN FHT DOMAIN

 FAST HADAMARD TRANSFORM(FHT)




    V        Transformed image

    U        Actual image

    Hn       N x N Hadamard matrix, N=2n, n=1,2,3…with
             element values either +1 or -1         21
The Hadamard matrix of the order n is generated in terms of
   Hadamard matrix of order n-1 using Kronecker product, ⊗, as




Considering 8×8 sub-blocks of the whole image, the third order
Hadamard transform matrix H3 becomes:




                                                         22
Original image pixel portions being taken into
matrix “U”




                                                 23
The process of Insertion




                           24
Processing the original image…




                                 25
Inverse Fast Hadamard Transformation




V         Transformed image

U          Actual image

Hn         N x N Hadamard matrix

Hn-1        Inverse Hadamard matrix
                                       26
The process of Extraction




                            27
Processing the original image…




                                 28
Attacks on the Watermarked image




                                   29
Experiment Results




                     30
Conclusion


• The experimental results show that the proposed method is robust
  against approximately 70% of attacks.

• For sure when compared with previous, it is found to be more robust
  against various attacks. It also refers significant advantage in terms of
  shorter processing time and the ease of hardware implementation than
  many common transform techniques.




                                                                         31
REFERENCES

[1]   M. Swanson, B. Zhu, A. Tewfik, and L. Boney, “Robust audio watermarking
      using perceptual masking,” Signal Process., Special Issue on Watermarking,
      1997, pp. 337-355.

[2]    L. Boney, A. Tewfik, and K. Hamdy, “Digital watermarks for audio signals,” in
      IEEE Proc. Multimedia, 1996, pp. 473-480.


[5]   Keshav S Rawat, Dheerendra S Tomar, “Digital watermarking schemes for
      authorization Against copying or piracy of color images” in IEEE, Vol. 1 No. 4
      295-300

[6]   Anthony T.S.Ho, Jun Shen, Soon Hie Tan “A Robust Digital Image-in-Image
      Watermarking Algorithm Using the Fast Hadamard Transform” Proceedings of
      SPIE Vol. 4793 (2003) © 2003 SPIE · 0277-786X/03/$15.00               32
33
Any Queries

              34

Contenu connexe

Tendances

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingnafees321
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detectionAB Rizvi
 
Image degradation and noise by Md.Naseem Ashraf
Image degradation and noise by Md.Naseem AshrafImage degradation and noise by Md.Naseem Ashraf
Image degradation and noise by Md.Naseem AshrafMD Naseem Ashraf
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slideSanjoy Dutta
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation pptGichelle Amon
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 
Fundamentals and image compression models
Fundamentals and image compression modelsFundamentals and image compression models
Fundamentals and image compression modelslavanya marichamy
 

Tendances (20)

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
face recognition
face recognitionface recognition
face recognition
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detection
 
Image degradation and noise by Md.Naseem Ashraf
Image degradation and noise by Md.Naseem AshrafImage degradation and noise by Md.Naseem Ashraf
Image degradation and noise by Md.Naseem Ashraf
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Image compression models
Image compression modelsImage compression models
Image compression models
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation ppt
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Steganography
SteganographySteganography
Steganography
 
Fundamentals and image compression models
Fundamentals and image compression modelsFundamentals and image compression models
Fundamentals and image compression models
 
Stegnography
StegnographyStegnography
Stegnography
 
Region based segmentation
Region based segmentationRegion based segmentation
Region based segmentation
 

En vedette

DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
 
Discrete cosine transform
Discrete cosine transform   Discrete cosine transform
Discrete cosine transform Rashmi Karkra
 
Discrete cosine transform
Discrete cosine transformDiscrete cosine transform
Discrete cosine transformaniruddh Tyagi
 
discrete wavelet transform
discrete wavelet transformdiscrete wavelet transform
discrete wavelet transformpiyush_11
 
Introduction to wavelet transform
Introduction to wavelet transformIntroduction to wavelet transform
Introduction to wavelet transformRaj Endiran
 

En vedette (7)

Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking ...
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Discrete cosine transform
Discrete cosine transform   Discrete cosine transform
Discrete cosine transform
 
Discrete cosine transform
Discrete cosine transformDiscrete cosine transform
Discrete cosine transform
 
discrete wavelet transform
discrete wavelet transformdiscrete wavelet transform
discrete wavelet transform
 
Introduction to wavelet transform
Introduction to wavelet transformIntroduction to wavelet transform
Introduction to wavelet transform
 

Similaire à Digital watermarking

digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfMekalaSamayochitha
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingNawin Kumar Sharma
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 
Watermark
WatermarkWatermark
Watermarkravi33s
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniquestheijes
 
A Robust Watermarking Technique Based On Dwt on Digital Images
A Robust Watermarking Technique Based On Dwt on Digital  ImagesA Robust Watermarking Technique Based On Dwt on Digital  Images
A Robust Watermarking Technique Based On Dwt on Digital ImagesIJMER
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageIOSR Journals
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET Journal
 

Similaire à Digital watermarking (20)

digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdf
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermark
WatermarkWatermark
Watermark
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
Digital Water marking
Digital Water markingDigital Water marking
Digital Water marking
 
Watermark
WatermarkWatermark
Watermark
 
Vidhi's ppt
Vidhi's pptVidhi's ppt
Vidhi's ppt
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
Ki2417591763
Ki2417591763Ki2417591763
Ki2417591763
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
A Robust Watermarking Technique Based On Dwt on Digital Images
A Robust Watermarking Technique Based On Dwt on Digital  ImagesA Robust Watermarking Technique Based On Dwt on Digital  Images
A Robust Watermarking Technique Based On Dwt on Digital Images
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
ieee title
ieee titleieee title
ieee title
 
Iw2415551560
Iw2415551560Iw2415551560
Iw2415551560
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud Computing
 

Dernier

Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 

Dernier (20)

Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 

Digital watermarking

  • 1. Digital Watermarking By, Ankush K R ankush.k.r.007@gmail.com +91-9739317537
  • 2. INTRODUCTION Information Hiding Techniques Information Hiding Steganography Cryptography Watermarking 2
  • 3. WHAT IS A WATERMARK? • A watermark is a form, image or text that is impressed onto paper, which provides evidence of its authenticity. • A distinguishing mark impressed on paper during manufacture; visible when paper is held up to the light (e.g. $ Bill) Visible Watermarking Invisible Watermarking 3
  • 4. WHAT IS DIGITAL WATERMARKING? • Digital watermarking is an extension of watermarking concept in the digital world. • A digital watermark is a pattern of bits inserted into a digital image, audio or video file that identifies the file's copyright information (author, rights, etc.). Image Video Audio 4
  • 5. How Watermarking is Different from Steganography and Cryptography. Steganography vs. Watermarking • The main goal of steganography is to hide a message m in some audio or video (cover) data d, to obtain new data d', practically indistinguishable from d, by people, in such a way that an eavesdropper cannot detect the presence of m in d'. • The main goal of watermarking is to hide a message m in some audio or video (cover) data d, to obtain new data d', practically indistinguishable from d, by people, in such a way that an eavesdropper cannot remove or replace m in d'. 5
  • 6. Cryptography vs. Watermarking • Cryptography is the most common method of protecting digital content and is one of the best developed science. • However, encryption cannot help the seller monitor how a legitimate customer handles the content after decryption. • Digital watermarking can protect content even after it is decrypted. Encryption ? Decryption Under Protection 6
  • 7. Importance of Digital Watermarking • As seen above in Fig, Alice creates an original image and watermarks it before passing it to Bob. If Bob claims the image and sells copies to other people Alice can extract her watermark from the image proving her copyright to it. • The caveat here is that Alice will only be able to prove her copyright of the image if Bob hasn’t managed to modify the image such that the watermark is damaged enough to be undetectable or added his own watermark such that it is impossible to discover which watermark was embedded first. 7
  • 8. WATERMARKING CLASSIFICATION Visible & Invisible Watermarking Robust & Fragile Watermarking Asymmetric & Symmetric Watermarking Public & Private Watermarking Steganographic & Non-steganographic Watermarking 8
  • 9. Visible Watermarking • Visible watermark is a translucent overlaid into an image and is visible to the viewer. Visible watermarking is used to indicate ownership and for copyright protection. Ankush Watermark Original Image Watermarked Image 9
  • 10. Invisible Watermarking • Invisible watermark is embedded into the data in such a way that the changes made to the pixel values are perceptually not noticed. Invisible watermark is used as evidence of ownership and to detect misappropriated images. Original Image Watermarked Image Dual Watermarking • Dual watermark is the combination of visible and invisible watermark. An invisible watermark is used as a backup for the visible watermark. 10
  • 11. WATERMARKING TECHNIQUES (According to Working Domain ) Watermarking Frequency Spatial Domain Domain Watermarking Watermarking Discrete Least Discrete Cosine Patch Work Wavelet Significant Bit Transformation Transformation 11
  • 12. Digital Watermarking Life Cycle Phases A watermarking system is usually divided into three distinct steps. • Embedding • Attack • Detection 12
  • 13. Embedding In embedding, an algorithm accepts the host and the data to be embedded, and produces a watermarked signal. Inputs to the scheme are the watermark, the cover data and an optional public or secret key. The output are watermarked data. The key is used to enforce security. 13
  • 14. Attacks The watermarked digital signal is transmitted or stored, usually transmitted to another person. If this person makes a modification, this is called an attack. Few Possible Attacks • Robustness attacks :Which are intended to remove the watermark such as… JPEG compression, cropping, etc. • Presentation Attacks :Under watermark detection failure they come into play. Geometric transformation, rotation, scaling, translation, change aspect ratio, affine transformation etc. • Counterfeiting attacks :Rendering the original image, generate fake original. 14
  • 15. Extraction/Detection Detection (often called extraction) is an algorithm which is applied to the attacked signal to attempt to extract the watermark from it. If the signal was unmodified during transmission, then the watermark still is present and it may be extracted. Inputs to the scheme are the watermarked data, the secret or public key and, depending on the method, the original data and/or the original watermark. The output is the recovered watermarked W or some kind of confidence measure indicating how likely it is for the given watermark at the input to be present in the data under inspection. 15
  • 16. ALGORITHM FAST HADAMARD TRANSFORM(FHT) Advantages of FHT • Shorter processing time • Invisibility of the watermark guaranteed • Increased watermark energy leads to higher robustness 16
  • 19. Use case diagrams1 (Insertion): 19
  • 20. Use case diagrams2 (Extraction): 20
  • 21. WATERMARKING IN FHT DOMAIN FAST HADAMARD TRANSFORM(FHT) V Transformed image U Actual image Hn N x N Hadamard matrix, N=2n, n=1,2,3…with element values either +1 or -1 21
  • 22. The Hadamard matrix of the order n is generated in terms of Hadamard matrix of order n-1 using Kronecker product, ⊗, as Considering 8×8 sub-blocks of the whole image, the third order Hadamard transform matrix H3 becomes: 22
  • 23. Original image pixel portions being taken into matrix “U” 23
  • 24. The process of Insertion 24
  • 25. Processing the original image… 25
  • 26. Inverse Fast Hadamard Transformation V Transformed image U Actual image Hn N x N Hadamard matrix Hn-1 Inverse Hadamard matrix 26
  • 27. The process of Extraction 27
  • 28. Processing the original image… 28
  • 29. Attacks on the Watermarked image 29
  • 31. Conclusion • The experimental results show that the proposed method is robust against approximately 70% of attacks. • For sure when compared with previous, it is found to be more robust against various attacks. It also refers significant advantage in terms of shorter processing time and the ease of hardware implementation than many common transform techniques. 31
  • 32. REFERENCES [1] M. Swanson, B. Zhu, A. Tewfik, and L. Boney, “Robust audio watermarking using perceptual masking,” Signal Process., Special Issue on Watermarking, 1997, pp. 337-355. [2] L. Boney, A. Tewfik, and K. Hamdy, “Digital watermarks for audio signals,” in IEEE Proc. Multimedia, 1996, pp. 473-480. [5] Keshav S Rawat, Dheerendra S Tomar, “Digital watermarking schemes for authorization Against copying or piracy of color images” in IEEE, Vol. 1 No. 4 295-300 [6] Anthony T.S.Ho, Jun Shen, Soon Hie Tan “A Robust Digital Image-in-Image Watermarking Algorithm Using the Fast Hadamard Transform” Proceedings of SPIE Vol. 4793 (2003) © 2003 SPIE · 0277-786X/03/$15.00 32
  • 33. 33