SlideShare une entreprise Scribd logo
1  sur  25
Digital
watermarking
By:-jaykrishna Thakkar
Fy Msc-it
wHat iS a watermark..?
 Watermarking is an important
mechanism applied to physical objects
like bills, papers, garment labels ,product
packing…
 Physical objects can be watermarked
using special dyes and inks or during
paper
manufacturing.
CHaraCteriStiCS of
watermarkS
 The watermark is hidden from view
during normal use, only become visible
by adopting a special viewing process.
– E.g. hold the bill up to light
 The watermark carries information
about the object in which it is hidden.
– E.g. the authenticity of the bill
– E.g. the trademark of the paper
manufacturer
HiStory of watermarking
 The term “watermark” was probably
originated from the German term
“wassermarke”. Since watermark is of
no importance in the creation of the
mark, the name is probably given
because the marks resemble the effects
of water on paper.
 Papers are invented in China over a
thousand years ago. However, the first
paper watermark did not appear until
1282, in Italy.
HiStory of watermarking
 By the 18th century, watermarks on
paper in Europe and America had been
used as trademarks, to record the
manufactured date, or to indicate the
size of original sheets.
 Watermarks are commonly used on bills
nowadays to avoid counterfeiting
wHat iS Digital watermarking?
 Watermarking can also be applied
to digital signals!
image video Audio
HiStory of Digital watermarking
 The first watermarking example similar to the
digital methods nowadays appeared in 1954.
The Muzak Corporation filed a patent for
“watermarking” musical Work. An identification
Work was inserted in music by intermittently
applying a narrow notch filter centred at 1KHz.
 About 1995, interest in digital watermarking
began to mushroom.
Definitions about Digital
watermarking
 Digital watermarking:
– The practice of imperceptibly alternating a
Work to embed a message about the Work.
 – Related terms
 Work: a specific copy of some electronic signal,
such as a song, a video sequence, or a picture
 Cover Work: the original un-watermarked work,
since it covers (hides) the watermark
 Watermark: the messages being embedded,
indicating some information about the work
How it works…
types of watermark
 Visible
 A visible translucent
image which is overlaid
on the primary image
 Invisible
 An overlaid image
which cannot be seen,
but which can be
detected
algorithmically
Visible watermark
 Logo or seal of the organization which
holds the rights to the primary image,
it allows the primary image to be
viewed, but still marks it clearly as the
property of the owning organization.
 Overlay the watermark in a way which
makes it difficult to remove, if the goal
of indicating property rights is to be
achieved.
Visible watermark
inVisible watermark
 Embedding level is too small to notice
 Can be retrieved by extraction software
 Applications:
Authentication
Copyrighting
Etc…
inVisible watermark
ApplicAtions of digitAl
wAtermArking
 Rights management
 Contents management
 Access/copy control
 Authentication
feAtures of wAtermArking
 Invisible/Inaudible
 Information is embedded without digital content
degradation, because of the level of embedding
operation is too small for human to notice the
change.
 Inseparable
 The embedded information can survive after some
processing, compression and format transformation.
 Unchanging data file size
 Data size of the media is not changed before and
after embedding operation because information is
embedded directly into the media.
technicAl requirements for
wAtermArking
Invisibility
Robustness Capacity
digitAl wAtermArking AlliAnce
Represents applications and solutions for:
 Audio and Music Content
 Video, Movies and TV Content
 Digital Imagery
 Identity Documents
 Value Documents
digitAl wAtermArking AlliAnce
members
digitAl wAtermArking exAmples
 Copyright Communication
 Copy Protection
 Monitoring
 Filtering/Classification
 Authentication/Integrity
 Product Serialization & Tracking
 Asset/Content Management
 Rights Management
 Remote Triggering
 Linking/E-Commerce
copyright digitAl
wAtermArk Architecture
Audio/Video Master
Embed Copyright
and Content ID DWM
Content Owner
Provider Index Database Location
(Centralized or Distributed)
User’s PC
Rip Software
Compressed Audio/Video
File (e.g. MP3 file)
User Software
Detect Copyright and Content ID
DWM for Secure and Enhanced
content
Rights & Info Database
Content ID linked to rights, information
and related content
Can be used to address P2P and social network content Identification needs as well
as providing identification of orphan works and access to metadata/networked
information
Digital MeDia Serialization &
tracking
 Identifies content owners and rights
while communicating copyright
information
 Awareness of watermarked content by
consumer creates deterrent against
unauthorized copying and distribution
 Provides accurate identification of source
of unauthorized content discovered on
the Internet and/or physical media
Protected for
privacy
Recordable Media
Embed
Serial # (2)
Embed
Serial # (1)
Content ID
Retail Content
Content Provider
Track and take
proper action Detect
Serial Number
any queStionS…
Digital watermarking

Contenu connexe

Tendances

Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology vijay rastogi
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingGovind Raj
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
Watermark
WatermarkWatermark
Watermarkravi33s
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detectionncct
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applicationsKannekanti Utthej
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessingQaisar Ayub
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingNawin Kumar Sharma
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 

Tendances (20)

Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Watermark
WatermarkWatermark
Watermark
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Watermark
WatermarkWatermark
Watermark
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Digital Watermarking Report
Digital Watermarking ReportDigital Watermarking Report
Digital Watermarking Report
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarking
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 

En vedette

12205451 pss7
12205451 pss712205451 pss7
12205451 pss7yuti_3011
 
TLA Presentation on QR-codes
TLA Presentation on QR-codesTLA Presentation on QR-codes
TLA Presentation on QR-codesDustin Haisler
 
QR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearningQR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearningGraham Clark
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubimishrasubrat
 
2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?Delvinia
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesPrashant Singh
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
 
10 Things Money Can´t Buy
10 Things Money Can´t Buy10 Things Money Can´t Buy
10 Things Money Can´t BuyAbhishek Shah
 
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic AlgorithmImage Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithmijsrd.com
 
Surveillance and Rescue Robot using Android Smartphone and the Internet
Surveillance and Rescue Robot using Android Smartphone and the InternetSurveillance and Rescue Robot using Android Smartphone and the Internet
Surveillance and Rescue Robot using Android Smartphone and the InternetSHOEB SHAH
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and futureblogzilla
 
Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Arif Ahmed
 

En vedette (17)

Vidhi's ppt
Vidhi's pptVidhi's ppt
Vidhi's ppt
 
QR Code Introduction
QR Code IntroductionQR Code Introduction
QR Code Introduction
 
12205451 pss7
12205451 pss712205451 pss7
12205451 pss7
 
TLA Presentation on QR-codes
TLA Presentation on QR-codesTLA Presentation on QR-codes
TLA Presentation on QR-codes
 
QR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearningQR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearning
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubi
 
2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
QR code
QR codeQR code
QR code
 
10 Things Money Can´t Buy
10 Things Money Can´t Buy10 Things Money Can´t Buy
10 Things Money Can´t Buy
 
watermarking
watermarkingwatermarking
watermarking
 
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic AlgorithmImage Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
 
Surveillance and Rescue Robot using Android Smartphone and the Internet
Surveillance and Rescue Robot using Android Smartphone and the InternetSurveillance and Rescue Robot using Android Smartphone and the Internet
Surveillance and Rescue Robot using Android Smartphone and the Internet
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and future
 
Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....
 
60 312-318
60 312-31860 312-318
60 312-318
 

Similaire à Digital watermarking

A108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxA108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxVaibhavKale80
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000authority12
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 
Different kinds of watermarks
Different kinds of watermarksDifferent kinds of watermarks
Different kinds of watermarksDeftPDF
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar10e11a0545
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsYogeshIJTSRD
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewEditor IJCATR
 
VladimirNovikovSlides.ppt
VladimirNovikovSlides.pptVladimirNovikovSlides.ppt
VladimirNovikovSlides.pptragsahao2
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingCSCJournals
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniquestheijes
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyAlexander Decker
 
digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfMekalaSamayochitha
 
Digital Asset Management
Digital Asset ManagementDigital Asset Management
Digital Asset Managementdibyendupaul
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.pptssuser4d4e5a
 

Similaire à Digital watermarking (20)

Digital Watermarking.pptx
Digital Watermarking.pptxDigital Watermarking.pptx
Digital Watermarking.pptx
 
A108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxA108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptx
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Different kinds of watermarks
Different kinds of watermarksDifferent kinds of watermarks
Different kinds of watermarks
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and Applications
 
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
 
VladimirNovikovSlides.ppt
VladimirNovikovSlides.pptVladimirNovikovSlides.ppt
VladimirNovikovSlides.ppt
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
 
Watermarking
WatermarkingWatermarking
Watermarking
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 
8-steg.ppt
8-steg.ppt8-steg.ppt
8-steg.ppt
 
digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdf
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
Digital Asset Management
Digital Asset ManagementDigital Asset Management
Digital Asset Management
 
8-steganography.ppt
8-steganography.ppt8-steganography.ppt
8-steganography.ppt
 

Dernier

8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...kalichargn70th171
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 

Dernier (20)

8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 

Digital watermarking

  • 2. wHat iS a watermark..?  Watermarking is an important mechanism applied to physical objects like bills, papers, garment labels ,product packing…  Physical objects can be watermarked using special dyes and inks or during paper manufacturing.
  • 3. CHaraCteriStiCS of watermarkS  The watermark is hidden from view during normal use, only become visible by adopting a special viewing process. – E.g. hold the bill up to light  The watermark carries information about the object in which it is hidden. – E.g. the authenticity of the bill – E.g. the trademark of the paper manufacturer
  • 4. HiStory of watermarking  The term “watermark” was probably originated from the German term “wassermarke”. Since watermark is of no importance in the creation of the mark, the name is probably given because the marks resemble the effects of water on paper.  Papers are invented in China over a thousand years ago. However, the first paper watermark did not appear until 1282, in Italy.
  • 5. HiStory of watermarking  By the 18th century, watermarks on paper in Europe and America had been used as trademarks, to record the manufactured date, or to indicate the size of original sheets.  Watermarks are commonly used on bills nowadays to avoid counterfeiting
  • 6. wHat iS Digital watermarking?  Watermarking can also be applied to digital signals! image video Audio
  • 7. HiStory of Digital watermarking  The first watermarking example similar to the digital methods nowadays appeared in 1954. The Muzak Corporation filed a patent for “watermarking” musical Work. An identification Work was inserted in music by intermittently applying a narrow notch filter centred at 1KHz.  About 1995, interest in digital watermarking began to mushroom.
  • 8. Definitions about Digital watermarking  Digital watermarking: – The practice of imperceptibly alternating a Work to embed a message about the Work.  – Related terms  Work: a specific copy of some electronic signal, such as a song, a video sequence, or a picture  Cover Work: the original un-watermarked work, since it covers (hides) the watermark  Watermark: the messages being embedded, indicating some information about the work
  • 10. types of watermark  Visible  A visible translucent image which is overlaid on the primary image  Invisible  An overlaid image which cannot be seen, but which can be detected algorithmically
  • 11. Visible watermark  Logo or seal of the organization which holds the rights to the primary image, it allows the primary image to be viewed, but still marks it clearly as the property of the owning organization.  Overlay the watermark in a way which makes it difficult to remove, if the goal of indicating property rights is to be achieved.
  • 13. inVisible watermark  Embedding level is too small to notice  Can be retrieved by extraction software  Applications: Authentication Copyrighting Etc…
  • 15. ApplicAtions of digitAl wAtermArking  Rights management  Contents management  Access/copy control  Authentication
  • 16. feAtures of wAtermArking  Invisible/Inaudible  Information is embedded without digital content degradation, because of the level of embedding operation is too small for human to notice the change.  Inseparable  The embedded information can survive after some processing, compression and format transformation.  Unchanging data file size  Data size of the media is not changed before and after embedding operation because information is embedded directly into the media.
  • 18. digitAl wAtermArking AlliAnce Represents applications and solutions for:  Audio and Music Content  Video, Movies and TV Content  Digital Imagery  Identity Documents  Value Documents
  • 20. digitAl wAtermArking exAmples  Copyright Communication  Copy Protection  Monitoring  Filtering/Classification  Authentication/Integrity  Product Serialization & Tracking  Asset/Content Management  Rights Management  Remote Triggering  Linking/E-Commerce
  • 21. copyright digitAl wAtermArk Architecture Audio/Video Master Embed Copyright and Content ID DWM Content Owner Provider Index Database Location (Centralized or Distributed) User’s PC Rip Software Compressed Audio/Video File (e.g. MP3 file) User Software Detect Copyright and Content ID DWM for Secure and Enhanced content Rights & Info Database Content ID linked to rights, information and related content Can be used to address P2P and social network content Identification needs as well as providing identification of orphan works and access to metadata/networked information
  • 22. Digital MeDia Serialization & tracking  Identifies content owners and rights while communicating copyright information  Awareness of watermarked content by consumer creates deterrent against unauthorized copying and distribution  Provides accurate identification of source of unauthorized content discovered on the Internet and/or physical media
  • 23. Protected for privacy Recordable Media Embed Serial # (2) Embed Serial # (1) Content ID Retail Content Content Provider Track and take proper action Detect Serial Number