SlideShare a Scribd company logo
1 of 16
SECURE SPREAD SPECTRUM
WATERMARKING FOR MULTIMEDIA

PRESENTERS :
Mahhek Tahir ,Khizra Samad
, Asma Shaheen
Authors :

Ingemar J.Cox – Senior Member IEEE
Joe Kilian – Member IEEE
F.Thomson Leighton – Member IEEE
Talal Shamoon – Member IEEE

IEEE TRANSATIONS ON IMAGE PROCESSING , VOL 6 - DECEMBER 1997
INTRODUCTION
This paper presents a secure algorithm for
watermarking images, and a methodology for digital
watermarking that may be generalized to audio, video
and multimedia data. A watermark should be
constructed as an independent and identically
distributed Gussain random vector that is imperceptibly
inserted in a spread spectrum like fashion into the
perceptually most significant spectral components of
data. It argue that insertion of a watermark under this
rule makes the watermark robust to signal processing
operations and common geometric transformation
provided that the original image is available and it can
be successfully registered against the transform image.
SPREAD SPECTRUM WATERMARK
The problem: how to insert watermark into
most perceptually significant region of
spectrum in a reliability protective manner.
 To solve: this problem, frequency domain of
the image or sound at hand is viewed as
communication channel, and the mark is
viewed as a signal that is transmitted through
it

SECURE SPREAD SPECTRUM WATERMARKS
FOR MULTIMEDIA
 Spread spectrum watermark based on DCT
 In order for a watermark to be robust, it
needs to be placed in the most significant
part of the image.
 The watermark will be composed of random
numbers drawn from a Gaussian N(0,1)
distribution
 Inserting the watermark to the image.
 Inverse DCT
Image and Watermarked Image
METHODOLOGY
Embedding
 Detection and Comparison

EMBEDDING
YCrCb

Reshape back

Y

Descending order of DCT
values

DC
T

Convert to vector
EXTRACTION
YCrCb

Y

DC
T

Convert to vector

Descending order of DCT values

X=
COMPARISON
Watermark detected

Watermark not detected
EXPERIMENTS

Uniqueness of Watermark
Scaling
Crop
Print Xerox and Scan
Collision Attack
IMPLEMENTED EXPERIMENT - SCALING
Half size

Double size
IMPLEMENTED EXPERIMENT - COPPING
Secure Spread Spectrum

More Related Content

What's hot

Enhanced bandwidth slotted microstrip patch antenna
Enhanced bandwidth slotted microstrip patch antennaEnhanced bandwidth slotted microstrip patch antenna
Enhanced bandwidth slotted microstrip patch antenna
IAEME Publication
 
Smart antennas for next generation wireless systems eurasip
Smart antennas for next generation wireless systems eurasipSmart antennas for next generation wireless systems eurasip
Smart antennas for next generation wireless systems eurasip
villa1451
 
Extended summery of performance limits of network densification
Extended summery of performance limits of network densificationExtended summery of performance limits of network densification
Extended summery of performance limits of network densification
MassimilianoBarp
 

What's hot (10)

Phi shape uwb antenna with band notch characteristics
Phi shape uwb antenna with band notch characteristicsPhi shape uwb antenna with band notch characteristics
Phi shape uwb antenna with band notch characteristics
 
Enhanced bandwidth slotted microstrip patch antenna
Enhanced bandwidth slotted microstrip patch antennaEnhanced bandwidth slotted microstrip patch antenna
Enhanced bandwidth slotted microstrip patch antenna
 
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNBOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
 
Smart antennas for next generation wireless systems eurasip
Smart antennas for next generation wireless systems eurasipSmart antennas for next generation wireless systems eurasip
Smart antennas for next generation wireless systems eurasip
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!
 
Extended summery of performance limits of network densification
Extended summery of performance limits of network densificationExtended summery of performance limits of network densification
Extended summery of performance limits of network densification
 
Sw
SwSw
Sw
 
Link & Match Program
Link & Match ProgramLink & Match Program
Link & Match Program
 
Seminar pressentation
Seminar pressentationSeminar pressentation
Seminar pressentation
 
Joint DoA and Offset Frequency estimator
Joint DoA and Offset Frequency estimatorJoint DoA and Offset Frequency estimator
Joint DoA and Offset Frequency estimator
 

Similar to Secure Spread Spectrum

Visible watermarking using spread spectrum
Visible watermarking using spread spectrumVisible watermarking using spread spectrum
Visible watermarking using spread spectrum
IAEME Publication
 
International Journal of Computer Science and Security (IJCSS) Volume (3) Iss...
International Journal of Computer Science and Security (IJCSS) Volume (3) Iss...International Journal of Computer Science and Security (IJCSS) Volume (3) Iss...
International Journal of Computer Science and Security (IJCSS) Volume (3) Iss...
CSCJournals
 
Hybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaHybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pca
IAEME Publication
 

Similar to Secure Spread Spectrum (20)

A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...
 
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptx
 
Visible watermarking using spread spectrum
Visible watermarking using spread spectrumVisible watermarking using spread spectrum
Visible watermarking using spread spectrum
 
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
 
50120140506015
5012014050601550120140506015
50120140506015
 
International Journal of Computer Science and Security (IJCSS) Volume (3) Iss...
International Journal of Computer Science and Security (IJCSS) Volume (3) Iss...International Journal of Computer Science and Security (IJCSS) Volume (3) Iss...
International Journal of Computer Science and Security (IJCSS) Volume (3) Iss...
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
dwm
dwmdwm
dwm
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
 
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
 
PCS 2016 presentation
PCS 2016 presentationPCS 2016 presentation
PCS 2016 presentation
 
IRJET- Wavelet Transform based Steganography
IRJET- Wavelet Transform based SteganographyIRJET- Wavelet Transform based Steganography
IRJET- Wavelet Transform based Steganography
 
Hybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaHybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pca
 
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet Transforms
 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
 

More from Khizra Sammad

Pet positron emission tomography (pet)
Pet positron emission tomography (pet)Pet positron emission tomography (pet)
Pet positron emission tomography (pet)
Khizra Sammad
 

More from Khizra Sammad (20)

A PRACTITIONER'S GUIDE TO SOFTWARE TEST DESIGN [Summary]
A PRACTITIONER'S GUIDE TO SOFTWARE TEST DESIGN [Summary]A PRACTITIONER'S GUIDE TO SOFTWARE TEST DESIGN [Summary]
A PRACTITIONER'S GUIDE TO SOFTWARE TEST DESIGN [Summary]
 
Peoplware slides tech session
Peoplware slides  tech sessionPeoplware slides  tech session
Peoplware slides tech session
 
Security testing
Security testingSecurity testing
Security testing
 
Test case execution
Test case execution Test case execution
Test case execution
 
Way toward Manager role
Way toward Manager roleWay toward Manager role
Way toward Manager role
 
Cloud testing
Cloud testingCloud testing
Cloud testing
 
Qualys lab
Qualys labQualys lab
Qualys lab
 
Ob final friday
Ob final fridayOb final friday
Ob final friday
 
Freelancing article
Freelancing articleFreelancing article
Freelancing article
 
Tag presentation
Tag presentationTag presentation
Tag presentation
 
Test studio
Test studioTest studio
Test studio
 
Ultasound
UltasoundUltasound
Ultasound
 
Radar
RadarRadar
Radar
 
Pet positron emission tomography (pet)
Pet positron emission tomography (pet)Pet positron emission tomography (pet)
Pet positron emission tomography (pet)
 
Nuclear mri
Nuclear mriNuclear mri
Nuclear mri
 
Infrared
InfraredInfrared
Infrared
 
Electron microscope
Electron microscopeElectron microscope
Electron microscope
 
Computed tomography
Computed tomographyComputed tomography
Computed tomography
 
X rays
X raysX rays
X rays
 
Astronomy
AstronomyAstronomy
Astronomy
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

Secure Spread Spectrum