SlideShare une entreprise Scribd logo
1  sur  30
1    DIGITAL WATERMARKING


          VISVESVARAYA TECHNOLOGICAL UNIVERSITY
                     JnanaSangama, Machche, Belgaum – 590 014




                                  A seminar report on

                         DIGITAL WATERMARKING


                                     Submitted by

                              MOHAMMED JASHIM
                                   1NH08EC034
                            VIII SEMESTER, Section ”A”




             Department of Electronics & Communication Engineering

                          NEW HORIZON
                        COLLEGE OF ENGINEERING
                    (Accredited by NBA, Permanently affiliated to VTU)
                     Outer Ring Road, Bellandur Post, Near Marathalli,
                                   Bengaluru – 560 103

                                        2011 – 12


    Department of Electronics & Communication, NHCE                      2011-12
2    DIGITAL WATERMARKING


                  NEW HORIZON COLLEGE OF ENGINEERING
                         Outer Ring Road, Bellandur Post, Near Marathalli,
                                      Bengaluru – 560 103




           DEPARTMENT OF ELECTRONICS AND COMMUNICATION



                                       Certificate

    This is to certify that the seminar entitled “DIGITAL WATERMARKING”is a bonafide
    work carried out by Mr.MOHAMMED JASHIMbearing the USN1NH08EC034, in partial
    fulfillment for the award of the degree of Bachelor of Engineering in Electronics &
    Communicationof the Visvesvaraya Technological University, Belgaum during the
    academic year 2011 - 12. This seminar report has been approved as it satisfies the academic
    requirements in respect of the Seminar Work (bearing the subject code 06EC86, for the VIII
    semester during February-June 2012) prescribed for the Bachelor of Engineering Degree.




    ……………………………..                                                 ……………………………..
    Signature of the Coordinator   Signature of the HOD
    Mr. Aravinda K.                                           Dr. T.N. Basavaraj
    Assistant Professor,                              Professor,
    Dept. of E&C, NHCE,                       Dept. of E&C, NHCE,
    Bengaluru – 560 103                 Bengaluru – 560 103




    Department of Electronics & Communication, NHCE                                  2011-12
3    DIGITAL WATERMARKING




                                       ABSTRACT

           As more and more analogue systems are replaced by digital ones, the question of how
    to deal with piracy of copyrighted digital content is turning into a serious problem. For
    example, the speed with which the “Content Scrambling System” – the encryption standard
    used for DVD video – was broken, clearly shows, that encryption on its own is insufficient
    for many systems in protecting copyrighted material from misuse. Digital Watermarking, on
    the other hand, relies on the shortcomings of the “human visual system” (HVS) and is about
    embedding copyright information in a way that it is imperceivable by humans, while still
    being resistant to modifications of the cover media. Thus, digital watermarking can be
    considered to be a supplementary technique to well established encryption schemes.




                           (i)

    Department of Electronics & Communication, NHCE                                 2011-12
4    DIGITAL WATERMARKING


                           ACKNOWLEDGMENT

    I express my sincere thanks to Prof.Dr. T.N. Basavaraj(HOD E&C, NHCE).


    Mr. AravindaK(Assistant Professor,E&C,NHCE) for their kind co-operation for presenting
    the seminar.


           I also extend my sincere thanks to all other members of the faculty of Electronics
       and Communication Department and my friends for their co-operation and
       encouragement.




    (ii)


    Department of Electronics & Communication, NHCE                                   2011-12
5    DIGITAL WATERMARKING




                           TABLE OF CONTENTS

      SI no                    DESCRIPTION                  PAGE NO :

         1                        INTRODUCTION                  6

         2            DIGITAL WATERMARKING TECHNOLOGY          10
                                    OVERVIEW

         3                         CLASSIFICATION              11

         4              DIGITAL WATERMARKING TECHNICAL         14
                                    DETAILS
         5              WATERMARKING AS COMMUNICATION          17

         6          DIGITAL WATERMARKING METHODS               19

         7                   DISTORTION AND ATTACKS            23

         8            APPLICATION OF DIGITAL WATERMARKING      25

         9                         CONCLUSION                  29

        10                         REFERENCES                  30




    Department of Electronics & Communication, NHCE                 2011-12
6    DIGITAL WATERMARKING


      CHAPTER 1
                                     INTRODUCTION


      Along with the explosive growth of the Internet not only desirable new possibilities -
      like publicly available access to information databases around the world, distributed
      project work across different countries, or fast and reliable means of electronic
      communication - emerged, but the ease with which digital media can be duplicated and
      modified, or the fact that legislation is seemingly unable to cope with its rapid rate of
      change makes it also very attractive to people with dishonourable motives. The advent
      of the Internet has resulted in many new opportunities for the creation and delivery of
      content in digital form. Applications include electronic advertising, realtime video and
      audio delivery, digital repositories and libraries, and Web publishing. An important
      issue that arises in these applications is the protection of the rights of all participants. It
      has been recognized for quite some time that current copyright laws are inadequate for
      dealing with digital data. This has led to an interest towards developing new copy
      deterrence and protection mechanisms. One such effort that has been attracting
      increasing interest is based on digital watermarking techniques. Digital watermarking is
      the process of embedding information into digital multimedia content such that the
      information (which we call the watermark) can later be extracted or detected for a
      variety of purposes including copy prevention and control. Digital watermarking has
      become an active and important area of research, and development and
      commercialization of watermarking techniques is being deemed essential to help
      address some of the challenges faced by the rapid proliferation of digital content.

    With these drawbacks of the “digital age” in mind, creators of multimedia content may wish
    for a digital analogy to the watermarks that have been used in bookmaking since the 13th
    Century .This need for methods and tools to protect ones intellectual property rights initiated
    the relatively new research field of “digital watermarks”. Someone familiar with encryption
    techniques might be tempted to ask why there is such an amount of interest in the research
    community to develop robust watermarking techniques, if numerous secure encryption
    algorithms are readily available. There are several reasons for this:

         1.    Encryption alone often is insufficient to protect digital content, since
              unconsidered and erroneoususage by human operators often renders it useless.

         2. If somebody breaks the encryption (e.g. breaking the “content scrambling system”
            used on DVDswith tools like “DeCSS”, “VobDec” or “SmartRipper”), copyright
            infringements can still be provenusing the embedded watermark.


    Department of Electronics & Communication, NHCE                                            2011-12
7    DIGITAL WATERMARKING

         3.     The decryption process usually depends on the data being unmodified.

         4.     Since rightful owners are to be allowed to access the data they paid for, the
               encryption needs tobe undone at some point. As the unencrypted data is normally
               being held in the main memory ofcomputers, it’s not too difficult to devise tools for
               storing it onto a local hard disk (e.g. many DVDplayers for the Windows OS use
               DirectShow for video output. This proves to be useful for multiangleDVDs, where
               applications like “DeCSS” fail. By using tools that implement appropriate
               DirectShowfilters to write the decoded images to a user-specified file instead of
               displaying them onthe screen (e.g. “DVDRip”), the raw video data is still
               accessible.

               Because of these shortcomings, digital watermarking is sometimes referred to as
               being “the last lineof defence”. Consequently, an effective watermark should
               normally have several properties, whoseimportance will vary depending upon the
               application.

              Robustness
                        o Fragile Watermarks are highly sensitive to any modifications, their
                          sole purpose beingto prove the authenticity of a document.

                         o Robust Watermarks should be embedded in a way, that they cannot
                             be removedfrom the data without introducing noticeable defects.
              Perceptibility

              oVisible Watermarks are added as a perceivable additional layer to the
              original data

    oInvisible Watermarks should not be perceivable by human senses.
    ·
           Security Unauthorized parties should not be able to read or alter the watermark, even
           if theyhave detailed knowledge about the used algorithms (Kerckhoffs‟s maxim).

              Multiple Watermarks Does the watermarking algorithm allow for multiple
              watermarks to be detectedindependently of each other?

              Speed In video distribution systems it may be necessary to use asymmetric
              algorithms, which
               offer very fast embedding methods, whereas watermark detection can take arbitrarily
               longer.


     Digital watermarking is still a very young research area, with its first academic conference
    held in 1996 [Ande99]. Numerous algorithms have been proposed and dismissed since then.
    Therefore, this paper aims at describing one popular watermarking technique in detail
    (“Spread Spectrum Watermarking”), rather than providing a short and unsatisfactory
    explanation of a larger number of different methods.




    Department of Electronics & Communication, NHCE                                       2011-12
8    DIGITAL WATERMARKING




             INFORMATION HIDING: Steganography & Digital
                          Watermarking
    In addition to digital watermarking, the general idea of hiding some information in digital
    content has a wider class of applications that go beyond mere copyright protection and
    authentication.

    The techniques involved in such applications are collectively referred to as information
    hiding. It contains a large range of problem beyond that of embedding message in
    content,keeping the existence of information secret and imperceptible.

    For example, an image printed on a document could be annotated by information that could
    lead an user to its high resolution version

        STEGANOGRAPHY:

    Another topic that is related to watermarking is steganography. Steganography applications
    conceal information in other, seemingly innocent media. Steganographic results may
    masquerade as other file for data types, be concealed within various media, or even hidden in
    network traffic or disk space. We are only limited by our imagination in the many ways
    information and data can be exploited to conceal additional information. Although
    steganography has been studied as part of cryptography for many decades, the focus of
    steganography is secret communication. In fact, the modern formulation of the problem goes
    by the name of the prisoner’s problem.Here Alice and Bob are trying to hatch an escape plan
    while in prison. The problem is that all communication between them is examined by a
    warden, Wendy, who will place both of them in solitary confinement at the first hint of any
    suspicious communication. Hence, Alice and Bob must trade seemingly inconspicuous
    messages that actually contain hidden messages involving the escape plan. There are two
    versions of the problem that are usually discussed – one where the warden is passive, and
    only observes messages and the other where the warden is active and modifies messages in a
    limited manner to guard against hidden messages. Clearly the most important issue here is
    that the very presence of a hidden message must be concealed. Whereas in digital
    watermarking it is not clear that a good watermarking technique should also be
    steganographic.

        Digital Watermarking
     Digital information embedded within any digital media that can later be detected and
    extracted.Simply watermarking, a pattern of bits inserted into a digital image, audio or video
    file that identifies the file's copyright information (author, rights, etc.). The name comes from
    the faintly visible watermarks imprinted on stationery that identify the manufacturer of the
    stationery. The purpose of digital watermarks is to provide copyright protection for
    intellectual property that's in digital format.
    Unlike printed watermarks, which are intended to be somewhat visible, digital watermarks
    are designed to be completely invisible, or in the case of audio clips, inaudible. Moreover, the
    actual bits representing the watermark must be scattered throughout the file in such a way
    that they cannot be identified and manipulated. And finally, the digital watermark must be
    robust enough so that it can withstand normal changes to the file, such as reductions
    from lossy compression algorithms.

    Department of Electronics & Communication, NHCE                                        2011-12
9    DIGITAL WATERMARKING

    Satisfying all these requirements is no easy feat, but there are a number of companies offering
    competing technologies. All of them work by making the watermark appear as noise - that is,

    random data that exists in most digital files anyway. To view a watermark, you need a special
    program that knows how to extract the watermark data.
    Watermarking is also called data embedding and information hiding.

    Digital Watermarking describes methods and technologies that hide information, for
    example a number or text, in digital media, such as images, video or audio. The embedding
    takes place by manipulating the content of the digital data, which means the information is
    not embedded in the frame around the data. The hiding process has to be such that the
    modifications of the media are imperceptible. For images this means that the modifications
    of the pixel values have to be invisible. Furthermore, the watermark must be either robust or
    fragile, depending on the application. By "robust" we mean the capability of the watermark
    to resist manipulations of the media, such as lossy compression (where compressing data
    and then decompressing it retrieves data that may well be different from the original, but is
    close enough to be useful in some way), scaling, and cropping, just to enumerate some. In
    some cases the watermark may need to be fragile. "Fragile" means that the watermark
    should not resist tampering, or would resist only up to a certain, predetermined extent.




    CHAPTER 2


    Department of Electronics & Communication, NHCE                                      2011-12
10    DIGITAL WATERMARKING


            DIGITAL WATERMARKING TECHNOLOGY
                                          OVERVIEW



     A watermark is a pattern of bitsinserted into a digitalimage, audio or video file that identifies
     the file's copyright information (author, rights, etc.). The name “watermark” is derived from
     the faintly visible marks imprinted on organisational stationery.
     There are many types of digital information and data. The types concentrated on in this report
     are:

     • Digital Images

        • Digital Audio, and

        • Digital Videos

     Unlike printed watermarks, which are intended to be somewhat visible (like the very light
     compass stamp watermarking this report), digital watermarks are designed to be completely
     invisible, or in the case of audio clips, inaudible.In addition, the bits representing the
     watermark must be scattered throughout the file in such a way that they cannot be identified
     and manipulated. And finally, a digital watermark must be robust enough to survive changes
     to the file its embedded in, such as being saved using a lossy compression algorithm eg:
     JPEG.


     Satisfying all these requirements is no easy feat, but there are a number of companies offering
     competing technologies. All of them work by making the watermark appear as noise- that is,
     random data that exists in most digital files anyway. Digital Watermarking works by
     concealing information within digital data, such that it cannot be detected without special
     software with the purpose of making sure the concealed data is present in all copies of the
     data that are made whether legally or otherwise, regardless of attempts to damage/remove it.
                                          The purpose of digital watermarks is to provide copyright
     protection for intellectual property that is in digital format.




     CHAPTER 3

                                     CLASSIFICATION

     Department of Electronics & Communication, NHCE                                        2011-12
11    DIGITAL WATERMARKING



     Classification according to visibility:
            Visible digital watermarking

            Invisible digital watermarking



         VISIBLE DIGITAL WATERMARKING

     In visible digital watermarking, the information is visible in the picture or video. Typically,
     the information is text or a logo, which identifies the owner of the media. The image on the
     right has a visible watermark. When a television broadcaster adds its logo to the corner of
     transmitted video, this also is a visible watermark.


         INVISIBLE DIGITAL WATERMARKING

     In invisible digital watermarking, information is added as digital data to audio, picture, or
     video, but it cannot be perceived as such (although it may be possible to detect that some
     amount of information is hidden in the signal). The watermark may be intended for
     widespread use and thus, is made easy to retrieve or, it may be a form of steganography,
     where a party communicates a secret message embedded in the digital signal. In either case,
     as in visible watermarking, the objective is to attach ownership or other descriptive
     information to the signal in a way that is difficult to remove. It also is possible to use hidden
     embedded information as a means of covert communication between individuals.
            PURPOSE                                            VISIBLE             INVISIBLE
            Validation of intended recipient                   -                   Primary
            Non-repudiable transmission                        -                   Primary
            Deterrence against theft                            Primary            Secondary
            Diminish commercial value without utility          Primary             Primary
            Discourage unauthorized duplication                Primary             Secondary
            Digital notarization and authentication            Secondary           Primary

            Identify source                                    Primary             Secondary




     Department of Electronics & Communication, NHCE                                         2011-12
12    DIGITAL WATERMARKING



             Classification Based On Digital Watermarking techniques
             used :

                     Robustness
                     Perceptibility
                     Capacity
                     Embedded method



          ROBUSTNESS



     A digital watermark is called fragile if it fails to be detectable after the slightest modification.
     Fragile watermarks are commonly used for tamper detection (integrity proof). Modifications
     to an original work that clearly are noticeable, commonly are not referred to as watermarks,
     but as generalized barcodes.

     A digital watermark is called semi-fragile if it resists benign transformations, but fails
     detection after malignant transformations. Semi-fragile watermarks commonly are used to
     detect malignant transformations.

     A digital watermark is called robust if it resists a designated class of transformations. Robust
     watermarks may be used in copy protection applications to carry copy and no access control
     information to form correct order and get the digital water marking


          PERCEPTIBILITY


     A digital watermark is called imperceptible if the original cover signal and the marked signal
     are perceptually indistinguishable.

     A digital watermark is called perceptible if its presence in the marked signal is noticeable.


          CAPACITY


     The length of the embedded message determines two different main classes of digital
     watermarking schemes:

     Department of Electronics & Communication, NHCE                                           2011-12
13       DIGITAL WATERMARKING




         The message is conceptually zero-bit long and the system is designed in order to detect
          the presence or the absence of the watermark in the marked object. This kind of
          watermarking scheme is usually referred to as zero-bit or presence watermarking
          schemes. Sometimes, this type of watermarking scheme is called 1-bit watermark,
          because a 1 denotes the presence (and a 0 the absence) of a watermark.




         The message is a n-bit-long stream (                              , with           )
          or                   and is modulated in the watermark. These kinds of schemes usually
          are referred to as multiple-bit watermarking or non-zero-bit watermarking schemes.




           EMBEDDING METHOD


     A digital watermarking method is referred to as spread-spectrum if the marked signal is
     obtained by an additive modification. Spread-spectrum watermarks are known to be modestly
     robust, but also to have a low information capacity due to host interference.

     A digital watermarking method is said to be of quantization type if the marked signal is
     obtained by quantization. Quantization watermarks suffer from low robustness, but have a
     high information capacity due to rejection of host interference.

     A digital watermarking method is referred to as amplitude modulation if the marked signal is
     embedded by additive modification which is similar to spread spectrum method, but is
     particularly embedded in the spatial domain.




     CHAPTER 4

                       DIGITAL WATERMARKING TECHNICAL
                                   DETAILS

     Department of Electronics & Communication, NHCE                                      2011-12
14    DIGITAL WATERMARKING




     The above block diagram show the digital watermarking of a signal.Digital watermarking
     technology makes use of the fact that the human eye has only a limited ability to observe
     differences. Minor modifications in the colour values of an image are subconsciously corrected
     by the eye, so that the observer does not notice any difference.
                              While vendors of digital watermarking schemes do not publicly release
     the exact methods used to create their watermarks, they do admit to using the following basic
     procedure




                             A secret key (string or integer) produces a random number which
     determines the particular pixels, which will be protected by the watermarking. The watermark is
     embedded redundantly over the whole image, so that every part of the image is protected.
     One way of doing this is by “Patchwork”. This technique uses a random number generator to
     select n pairs of pixels and slightly increases or decrease their luminosity (brightness level).
     Thus the contrast of this set is increased without any change in the average luminosity of the
     image. With suitable parameters, Patchwork even survives compression using JPEG.
     Although the amount of secret information has no direct impact on the visual fidelity of the
     image or the robustness of the watermark, it plays an important role in the security of the
     system. The key space, that is the range of all possible values of the secret information, x
     must be large enough to make exhaustive search attacks impossible.
     In the process of extracting the watermark, the secret key is used to identify the manipulated
     pixels and finally to decode the watermark.

     The quality of digital watermarks can be judged in two ways; firstly it must be able to resist
     intentional and unintentional attacks and secondly the embedded watermark must not detract
     from the quality of the image.
     Department of Electronics & Communication, NHCE                                       2011-12
15    DIGITAL WATERMARKING

     The higher the resistance of a watermark against attacks, the higher the risk of the quality of
     the image being reduced, and the greater the chance of obvious visual artefacts being created.




     Every watermarking system consists at least of two different parts: watermark embedding
     unit and watermark detection and extraction unit.The above figure shows an example of
     embedding unit for still images. The unmarked image is passed through a perceptual analysis
     block that determines how much a certain pixel can be altered so that the resulting
     watermarked image is indistinguishable from the original. This takes into account the human
     eye sensitivity to changes in flat areas and its relatively high tolerance to small changes in
     edges. After this so-called perceptual-mask has been computed, the information to be hidden
     isshaped by this mask and spread all over the original image. This spreading technique is
     similar to the interleaving used in other applications involving coding, such as compact disc
     storage, to prevent damage of the information caused by scratches or dust. In our case, the
     main reason for this spreading is to ensure that the hidden information survives
     croppingof the image. Moreover, the way this spreading is performed depends on the secret
     key, so it is difficult to recover the hidden information if one is not in possession of this key. In fact,
     a similar technique is used in spread spectrum systems (more precisely, in Code-Division Multiple
     Access) to extract the desired information from noise or other users. Additional key-dependent
     uncertainty can be introduced in pixel amplitudes (recall that the perceptual mask imposes only an
     upper limit). Finally, watermark is added to the original image.




     Department of Electronics & Communication, NHCE                                                   2011-12
16    DIGITAL WATERMARKING




     The above figure shows the typical configuration of a watermark detection and extraction
     unit. Watermarkdetection involves deciding whether a certainimage has been watermarked
     with a given key.Note then that a watermark detector produces abinary output. Important
     considerations here arethe probability of correct detection PD (i.e., theprobability of correctly
     deciding that a watermarkis present) and the probability of false alarm PF(i.e., the probability
     of incorrectly deciding that animage has been watermarked with a certain key).
     These two measures allow us to compare different watermarking schemes: One method will
     be superior if achieves a higher PD for a fixed PF .Note also that for a watermarking
     algorithm to be useful it must work with extremely low probabilities of false alarm.
     Watermark detection is usually done by correlating the watermarked image with a locally
     generated version of the watermark at the receiver side. This correlation yields a high value
     when the watermark has been obtained with the proper key. As we have shown, it is possible
     to improve the performance of the detector by eliminating original image-induced noise
     with signal processing. It is worthy of remark that some authors propose using the original
     image in the detection process. Although this simplifies further treatment of the watermark in
     the reeiverend, it is quite unrealistic for most applications,particularly those related to E-
     commerce.
     Once the presence of the watermark has been correctly detected, it is possible to extract the
     hidden information. The procedure is also generally done by means of a cross-correlation but
     in this case, an independent decision has to be taken for
     every information bit with a sign slicer. In fact, wehave also shown that this correlation
     structure has not been well-founded and significant improvements are achievable when image
     statistics are available. For instance, the widely-used DCT coefficients used in the JPEG and
     MPEG-2 standards are well approximated by generalized gaussian probabilitydensity
     functions that yield a considerably different extraction scheme. Obviously, when extracting
     the information the most adequate parameter for comparison purposes is the probability of
     bit error Pb, identical to that used in digital communications. This is not surprising because
     watermarking creates a hidden (sometimes called steganographic)
     channel on which information is conveyed.



     Department of Electronics & Communication, NHCE                                        2011-12
17    DIGITAL WATERMARKING


     CHAPTER 5

                    WATERMARKING AS COMMUNICATION
                                It is quite common and popular to adapt techniques from standard
     communication theory to study and improve watermarking algorithms using models similar
     to the ones shown in Figure,below.And it shows how the information bits are first encoded
     (to suit the modulation type, error control etc.) followed by modulating a carrier signal that
     carries this information across a noisy channel. At the decoder side, this carrier is
     demodulated and then the information (possibly corrupted due to channel noise) is decoded.




     In a digital watermarking system the modulator is replaced by the watermark embedder that
     places the watermark in the media content. Distortions to the watermarked media is induced
     by known or unknown attacks or signal processing operations such as compression,
     decompression, cropping, scaling etc. The embedded watermark is finally retrieved by the
     watermarked decoder or detector. One major difference between the two models can be seen
     in the encoder side. While, in communication systems, the encoding is done in order to
     protect the information bits from channel distortion, in watermarking, emphasis is usually
     placed on techniques that minimize perceptual distortions to the watermarked content. Some
     analogies between the traditional communication system and the watermarking system are
     summarized.
     COMMUNICATION SYSTEM                            WATERMARKING SYSTEM
     Information                                     Watermark

     Communication channel                           Host signal(such as image,video etc.)

     Power constraint on transmitted signal due to   Power constraint on watermark due to
     physical limitations                            audio/visual quality limitations

     Interference                                    Host signal and watermark attacks

     Department of Electronics & Communication, NHCE                                         2011-12
18    DIGITAL WATERMARKING

     Side information at transmitter and/or receiver   Knowledge of host signal,watermarking
                                                       parameters such as key etc.at the encoder
                                                       and/or decoder.

     Channel capacity                                  Watermarking capacity




     Department of Electronics & Communication, NHCE                                               2011-12
19    DIGITAL WATERMARKING


     CHAPTER 6

                  DIGITAL WATERMARKING METHODS


         IMAGE

            These are some of the methods that can be used to test whether a watermark can survive
            different changes to the image it is embedded in.




     Compare this Original Image with the attacked images below, and see if you can spot any
     changes in quality.


     HORIZONTAL FLIPPING

     Many images can be flipped horizontally without losing quality. Few watermarks survive
     flipping, although resilience to flipping is easy to implement.




     ROTATION AND CROPPING

     A small rotation with cropping doesn‟t reduce image quality, but can make watermarks
     undetectable as rotation realigns horizontal features of an image used to check for the
     presence of a watermark. The example at left has been rotated 3 degrees to the right, and then
     had its edges cropped to make the sides straight again.




     JPEG COMPRESSION/RE-COMPRESSION




     Department of Electronics & Communication, NHCE                                      2011-12
20    DIGITAL WATERMARKING

                              JPEG is a widely used compression algorithms for images and any
     watermarking system should be resilient to some degree to compression or change of
     compression level e.g. from 71% to 70% in quality like the example at down.




     SCALING

     Uniform scaling increases/decreases an image by the same % rate in the horizontal and
     vertical directions. Non-uniform scaling like the example at left increases/decreases the
     image horizontally and vertically at different % rates. Digital watermarking methods are
     often resilient only to uniform scaling.




     DITHERING

     Dithering approximates colours not in the current palette by alternating two available similar
     colours from pixel to pixel. If done correctly this method can completely obliterate a
     watermark, however it can make an image appear to be “patchy” when the image is over-
     dithered (as in the elbow area of the image at left).




     MOSAIC

                                    A mosaic attack doesn‟t damage the watermarked image or
     make it lose quality in any way, but still enables the image to be viewed in eg: a web browser
     by chopping the image into subsections of equal size and putting it back together again.
     To the viewer a “mosaic” image appears to look the same as the original but a web crawler
     like DigiMarc‟sMarcSpidersees many separate images and doesn‟t detect that these separate
     images are parts of a watermarked image.

     Department of Electronics & Communication, NHCE                                      2011-12
21    DIGITAL WATERMARKING

               This means that the watermark cannot be detected, as a problem common to all
     image watermarking schemes is that they have trouble embedding watermarks into small
     images, (less than 256 pixels in height or width).




     STIRMARK

     StirMarkis the industry standard software used by researchers to automatically attempt to
     remove watermarks created by Digimarc, SysCoP, JK_PGS,Signum Technologies and
     EIKONAmark.
     Stirmark attacks a given watermarked image using all the techniques mentioned in this report
     as well as more esoteric techniques such as low pass filtering, gamma correction,
     sharpening/unsharpening etc.


         AUDIO
                                                                             th
     The most common method of watermarking audio is to mark every x bit in an audio file
     depending on the random generator seed calculated from the watermarking key applied to the
     audio.
            These are some of the ways watermarks can be removed from audio files.

     MPEG1 LAYER III (MP3) AUDIO COMPRESSION

     A digital audio compression algorithm that achieves a compression factor of about twelve
     while preserving sound quality. What this lossy compression does is remove the frequencies
     not heard by the human ear from the audio. If a raw audio file is converted to MP3 at a bit-
     rate of 128kbps than roughly 90% of the frequencies are removed. This means that a search
     for the watermark needs to find an unaltered length of samples that contains at least 2
     watermarked bits to prove the watermarks existence.



     AUDIO RESTORATION PROGRAMS

     Audio restoration programs are designed to remove hisses, crackles and pops from audio
     recordings. They do this by searching through the wavelength, removing samples that don‟t
     “fit in” amongst neighbouring samples, and replacing them with an average of the two
     neighbour samples. Although the removal of digital watermarks is obviously not a purpose of
     these programs, they work remarkably well at doing so as the sample bits inserted to
     watermark the audio don‟t fit in with their surrounding pixels, and are therefore removed.


     Department of Electronics & Communication, NHCE                                     2011-12
22    DIGITAL WATERMARKING

     ECHO HIDING REMOVAL

                               Echo hiding relies on the fact that we cannot perceive short echoes,
     eg: 1 millisecond(ms) and embeds data into a cover audio signal by introducing an echo
     characterised by its delay and its relative amplitude compared to surrounding samples. The
     echo delays are chosen between 0.5 ms and 2 ms and the best relative amplitude of the echo
     is around 0.8 ms.
     However specialised software which looks for echoes with a length between 0.5 ms and 2 ms
     (as seen below), can be used to detect and remove these echoes without effecting sound
     quality.




     JITTER

     The simplest and most effective attack on any audio watermarking scheme is to add jitter to
     the signal. In our first implementation, we split the signal into chunks of 500 samples, either
     duplicated or deleted a sample at random in each chunk (resulting in chunks of 499 or 501
     samples long) and stuck the chunks back together. This turned out to be almost imperceptible
     after altering, even in classical music; but the jitter prevents the marked bits from being
     located”, and therefore the watermark is obliterated.
     In his paper titled “Audio watermarking: Features, Applications and Algorithms“, Michael
     Arnold agrees with the Cambridge team stating that
     “one of the greatest challenges [of watermarking] is the robustness against the so-called jitter
     attack”.

         VIDEO
     At present there is no known method to remove a digital watermark from a stream of video.
     This is probably because those who trade in pirated video, (especially in DivX format), store
     their pirated movies locally on their hard disk drives or on CD-R disks where they cannot be
     checked for watermarks by anyone.




     CHAPTER 7


     Department of Electronics & Communication, NHCE                                       2011-12
23    DIGITAL WATERMARKING


                             DISTORTION AND ATTACKS

     In practice, a watermarked object may be altered either on purpose or accidentally, so the
     watermarking system should still be able to detect and extract the watermark. Obviously, the
     distorsions are limited to those that do not produce excessive degradations, since otherwise
     the transformed object would be unusable. These distorsions also introduce a degradation on
     the performance of the system as measured by the probabilities defined in the previous
     section (i.e., PD and Pbwould decrease for a fixed PF). For intentional attacks, the goal of the
     attacker is to maximize the reduction in these probabilities while minimizing the impact
     that his/her transformation produces on the object; this has to be done without knowing the
     value of the secret key used in the watermarking insertion process, which is where all the
     security of the algorithm lies.
     Next, we introduce some of the best known attacks. Some of them may be intentional or
     unintentional, depending on the application:

     Additive Noise. This may stem in certain applications from the use of D/A and A/D
     converters or from transmission errors. However, an attacker may introduce perceptually
     shaped noise (thus, imperceptible) with the maximum unnoticeable power. This will typically
     force to increase the threshold at which the correlation detector works.

     Filtering. Low-pass filtering, for instance, does not introduce considerable degradation in
     watermarked images or audio, but can dramatically affect the performance, since spread-
     spectrum-likewatermarks have a non negligible high-frequencyspectral contents.

     Cropping. This is a very common attack since in many cases the attacker is interested in a small
     portion of the watermarked object, such as parts of a certain picture or frames of a video sequence.
     With this in mind, in order to survive, the watermark needs to be spread over the dimensions
     where this attack takes place.

     Compression. This is generally an unintentional attack which appears very often in multimedia
     applications. Practically all the audio, video and images that are currently being distributed via
     Internet have been compressed. If the watermark is required to resist different levels of compression,
     it is usually advisable to perform the watermark insertion task in the same domain where
     the compression takes place. For instance, DCT domain image watermarking is more robust to JPEG
     compression than spatial-domain watermarking.

     Rotation and Scaling. This has been the true battle horse of digital watermarking, especially because
     of its success with still images. Correlation based detection and extraction fail when rotation or
     scaling are performed on the watermarked image because the embedded watermark and the locally
     generated version do not share the same spatial pattern anymore. Obviously, it would be possible to
     do exhaustive search on different rotation angles and scaling factors until a correlation peak
     is found, but this is prohibitively complex. Note that estimating the two parameters becomes simple
     when the original image is present, but we have argumented against this possibility in previous
     sections. The authors have shown that although the problem resembles synchronization for
     digital communications, the techniques applied there fail loudly. Some authors have recently proposed
     the use of rotation and scaling-invariant transforms (such as the Fourier-Mellin ) but this dramatically
     reduces the capacity for message hiding. In any case, publicly available programs like Strirmark
     break the uniform axes transformation by creating an imperceptible non-linear resampling of the
     image that renders invariant transforms unusable. In audio watermarking it is also quite simple to
     perform a non-linear transformation of the time axis that considerably difficults watermark detection.


     Statistical Averaging. An attacker may try to estimate the watermark and then „unwatermark‟

     Department of Electronics & Communication, NHCE                                              2011-12
24    DIGITAL WATERMARKING

     the object by substracting the estimate. This is dangerous if the watermark does not depend
     substantially on the data. Note that with different watermarked objects it would be possible to
     improve the estimate by simple averaging. This is a good reason for using perceptual masks to create
     the watermark.

     Multiple Watermarking. An attacker may watermark an already watermarked object and later
     make claims of ownership. The easiest solution is to timestamp the hidden information by a
     certification authority.

     Attacks at Other Levels. There are a number of attacks that are directed to the way the watermark
     is manipulated. For instance, it is possible to circumvent copy control mechanisms discussed
     below by super scrambling data so that the watermark is lost or to deceive web crawlers searching
     for certain watermarks by creating a presentation layer that alters they way data are ordered.
     The latter is sometimes called „mosaic attack‟ .




     CHAPTER 8


     Department of Electronics & Communication, NHCE                                            2011-12
25    DIGITAL WATERMARKING



            APPLICATION OF DIGITAL WATERMARKING

         VideoWatermarking. In this case, most considerations made in previous sections hold.
          However,now the temporal axis can be exploited to increase the redundancy of the
          watermark. As in the still images case, watermarks can be created either in the spatial or in
          the DCT domains. In the latter, the results can be directly extrapolated to MPEG-2 sequences,
          although different actions must be taken for I, P and B frames. Note that perhaps the set of
          attacks that can be performed intentionally is not smaller but definitely more expensive than
          for still images.


         Audio Watermarking. Again, previous considerations are valid. In this case, time and
          frequencymasking properties of the human ear are used to conceal the watermark and make it
          inaudible. The greatest difficulty lies in synchronizing the watermark and the watermarked
          audio file, buttechniques that overcome this problem have been proposed.


         Hardware/Software Watermarking. This is a good paradigm that allows us to understand
          how almost every kind of data can be copyright protected. If one is able to find two different
          waysof expressing the same information, then one bit of information can be concealed,
          something thatcan be easily generalized to any number of bits. This is why it is generally said
          that a perfect compression scheme does not leave room for watermarking. In the hardware
          context, Boolean equivalences can be exploited to yield instances that use different types of
          gates and that can be addressed by the hidden information bits. Software can be also protected
          not only by finding equivalences between instructions, variable names, or memory addresses,
          but also by altering the order of non-critical instructions. All this can be accomplished at
          compiler level.


         Text Watermarking. This problem, which in fact was one of the first that was studied within
          the information hiding area can be solved at two levels. At the printout level, information can
          be encodedin the way the textlines or words are separated (this facilitates the survival of the
          watermarkeven to photocopying). At the semantic level (necessary when raw text files are
          provided), equivalences between words or expressions can be used, although special care has
          to be taken not to destruct the possible intention of the author.


         Executable Watermarks. Once the hidden channel has been created it is possible to include
          even executable contents, provided that the corresponding applet is running on the end user
          side.


         Labeling. The hidden message could also contain labels that allow for example to annotate
          imagesor audio. Of course, the annotation may also been included in a separate file, but with
          watermarkingit results more difficult to destroy or loosethis label, since it becomes closely
          tied to the objectthat annotates. This is especially useful inmedical applications since it
          prevents dangerous errors.


         Fingerprinting. This is similar to the previous application and allows acquisition
          devices(such as video cameras, audio recorders, etc) to insert information about the specific
          device (e.g., an ID number) and date of creation. This can also be done with conventional


     Department of Electronics & Communication, NHCE                                           2011-12
26    DIGITAL WATERMARKING

            digital signature techniquesbut with watermarking it becomes considerably more difficult to
            excise or alter the signature.Some digital cameras already include this feature.


         Authentication. This is a variant of the previous application, in an area where
          cryptographictechniques have already made their way. However, there are two significant
          benefits that arisefrom using watermarking: first, as in the previous case, the signature
          becomes embedded in the message, second, it is possible to create „soft authentication‟
          algorithms that offer a multivalued „perceptual closeness‟ measure that accounts for different
          unintentional transformations that the datamay have suffered (an example is image
          compression with different levels), instead of the classicalyes/no answer given by
          cryptography-based authentication.Unfortunately, the major drawbackof watermarking-based
          authentication is the lack of public key algorithms that force either to putsecret keys in risk or
          to resort to trusted parties.


         Copy and Playback Control. The message carried by the watermark may also contain
          informationregarding copy and display permissions.Then, a secure module can be added in
          copy or playback equipment to automatically extract this permission information and block
          further processing if required. In order to be effective, this protection approach requires
          agreements between contentproviders and consumer electronics manufacturers to introduce
          compliant watermark detectorsin their video players and recorders. This approach is being
          taken in Digital Video Disc (DVD).


         Signalling. The imperceptibility constraint is helpful when transmitting signalling
          informationin the hidden channel. The advantage of using this channel is that no bandwidth
          increase is required.An interesting application in broadcasting


         copyright protection of digital media. In the past duplicating art work was quite
          complicated and required a high level of expertise for the counterfeit to look like the
          original. However, in the digital world this is not true. Now it is possible for almost
          anyone to duplicate or manipulate digital data and not lose data quality. Similar to the
          process when artists creatively signed their paintings with a brush to claim copyrights,
          artists of today can watermark their work by hiding their name within the image.
          Hence, the embedded watermark permits identification of the owner of the work. It is
          clear that this concept is also applicable to other media such as digital video and
          audio. Currently the unauthorized distribution of digital audio over the Internet in the
          MP3 format is a big problem. In this scenario digital watermarking may be useful to
          set up controlled audio distribution and to provide efficient means for copyright
          protection, usually in collaboration with international registration bodies.


     Are there any other applications where digital watermarking may
     be used?

     There are a number of possible applications for digital watermarking technologies and this
     number is increasing rapidly.
       In the field of data security, watermarks may be used for certification, authentication,
        and conditional access. Certification is an important issue for official documents, such
        as identity cards or passports.




     Department of Electronics & Communication, NHCE                                              2011-12
27    DIGITAL WATERMARKING

     Example on the left of a protected identity card. The identity number "123456789" is written
     in clear text on the card and hidden as a digital watermark in the identity photo. Therefore
     switching or manipulating the identity photo will be detected




       Digital watermarking permits linking information on documents.
     That means that key information is written twice on the document. For instance, the name of
     a passport owner is normally printed in clear text. But it would also be hidden as an invisible
     watermark in the passport photo. If anyone tries to tamper with the passport by replacing the
     photo it would be possible to detect the change by scanning the passport and verifying the
     name hidden in the photo.
     The picture shows a printing machine from Intercard for various types of plastic cards
     (Courtesy of Intercard, Switzerland).




       TAMPERING WITH IMAGES:
      Another application is the authentication of image content. The goal of this application is to
      detect any alterations and modifications in an image.
      The three pictures below illustrate this application. The picture on the left shows an original
      photo of a car that has been protected with a watermarking technology. In the center, the
      same picture is shown but with a small modification: the numbers on the license plate have
      been changed. The picture on the right shows the photo after running the digital watermark
      detection program on the tampered photo. The tampered areas are indicated in white. We
      can clearly see that the detected area corresponds to the modifications applied to the
      original photo.
      Using digital watermarks for integrity verification: the protected image is the image (a)
      above; a modified image is obtained by swapping the numbers 9 and 4 of the number plate
      (b); digital watermarking technology allows detecting and highlights the modified areas, as
      shown on (c).




     Department of Electronics & Communication, NHCE                                       2011-12
28    DIGITAL WATERMARKING




       Invisible marking on blank paper:Digital watermarks can also be adapted to mark white
        paper with the goal of authenticating the originator, verify the authenticity of the
        document content, or to date the document. Such applications are especially of interest
        for official documents, such as contracts. For example, the digital watermark can be
        used to embed the name of the lawyer or important information such as key monetary
        amounts. In the event of a dispute, the digital watermark is then read allowing
        authentication of key information in the contract. AlpVision developed genuine process
        to invisibly mark white blank paper with normal and visible ink. This patented
        technology is now known as Cryptoglyph.The image on the down shows blank paper
        marked by the invisible digital watermark using standard visible ink, with the
        Cryptoglyph technology.




        Digital Media Management: Beside applications in the fields of copyright protection,
         authentication and security, digital watermarks can also serve as invisible labels and
         content links. For example, photo development laboratories may insert a watermark
         into the picture to link the print to its negative. This way is very simple to find the
         negative for a given print. All one has to do is scan the print and extracted the
         information about the negative. In a completely different scenario digital watermarks
         may be used as a geometrical reference which may be useful for programs such as
         optical character recognition (OCR) software. The embedded calibration watermark
         may improve the detection reliability of the OCR software since it allows the
         determination of translation, rotation, and scaling.



                                       CONCLUSION
     Department of Electronics & Communication, NHCE                                    2011-12
29    DIGITAL WATERMARKING




     Digital watermarking is a rapidly evolving area of research and development.An exhaustive
     list of digital watermarking applications is of course impossible. However, it is interesting to
     note the increasing interest in fragile watermarking technologies. Especially promising are
     applications related to copy protection of printed media. Examples here include the protection
     of bills with digital watermarks. Various companies have projects in this direction and it is
     very likely that fully functioning solutions will soon be available.One key problem that we
     still face today is the development of truly robust, transparent and secure
     watermarking technique for different digital media including images, video and audio.
     Another key problem is the development of semi-fragile authentication techniques. The
     solution to these problem will require application of known results and development of new
     results in the fields of information and coding theory, adaptive signal processing, game
     theory, statistical decision theory, and cryptography.




                                        REFERENCES

     Department of Electronics & Communication, NHCE                                       2011-12
30    DIGITAL WATERMARKING




             http://www.10gea.org
             http://standards.ieee.org/resources/glance.html
             IEEE
             Digital watermarking,Rchandramauli,NasirMemon
             Wikipedia




     Department of Electronics & Communication, NHCE           2011-12

Contenu connexe

Tendances

digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubimishrasubrat
 
Watermark
WatermarkWatermark
Watermarkravi33s
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingnafees321
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar10e11a0545
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Samarth Godara
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking TechniquesNazeera Sheth
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Arif Ahmed
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applicationsKannekanti Utthej
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessingQaisar Ayub
 

Tendances (20)

Digital water marking
Digital water markingDigital water marking
Digital water marking
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubi
 
Watermark
WatermarkWatermark
Watermark
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Ppt nc
Ppt ncPpt nc
Ppt nc
 
Vidhi's ppt
Vidhi's pptVidhi's ppt
Vidhi's ppt
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking Techniques
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 

En vedette

Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewEditor IJCATR
 
Digital image protection using adaptive watermarking techniques
Digital image protection using adaptive watermarking techniquesDigital image protection using adaptive watermarking techniques
Digital image protection using adaptive watermarking techniquesanandk10
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
 
Digital Modulation Techniques ppt
Digital Modulation Techniques pptDigital Modulation Techniques ppt
Digital Modulation Techniques pptPankaj Singh
 
Digital modulation techniques
Digital modulation techniquesDigital modulation techniques
Digital modulation techniquessrkrishna341
 

En vedette (11)

Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
 
Digital image protection using adaptive watermarking techniques
Digital image protection using adaptive watermarking techniquesDigital image protection using adaptive watermarking techniques
Digital image protection using adaptive watermarking techniques
 
Chapter3
Chapter3Chapter3
Chapter3
 
Cryptography
CryptographyCryptography
Cryptography
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
 
BLAST
BLASTBLAST
BLAST
 
Classical Encryption
Classical EncryptionClassical Encryption
Classical Encryption
 
Digital Modulation Techniques ppt
Digital Modulation Techniques pptDigital Modulation Techniques ppt
Digital Modulation Techniques ppt
 
Digital modulation techniques
Digital modulation techniquesDigital modulation techniques
Digital modulation techniques
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
ASk,FSK,PSK
ASk,FSK,PSKASk,FSK,PSK
ASk,FSK,PSK
 

Similaire à Digitalwatermarking

SECURE TRANSMISSION IN WIRELESS SENSOR NETWORKS DATA USING LINEAR KOLMOGOROV ...
SECURE TRANSMISSION IN WIRELESS SENSOR NETWORKS DATA USING LINEAR KOLMOGOROV ...SECURE TRANSMISSION IN WIRELESS SENSOR NETWORKS DATA USING LINEAR KOLMOGOROV ...
SECURE TRANSMISSION IN WIRELESS SENSOR NETWORKS DATA USING LINEAR KOLMOGOROV ...cscpconf
 
Secure transmission in wireless sensor networks data using linear kolmogorov ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...Secure transmission in wireless sensor networks data using linear kolmogorov ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...csandit
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYIRJET Journal
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueIRJET Journal
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518IJRAT
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarkingijsrd.com
 
Approximation-based homomorphic encryption for secure and efficient blockcha...
Approximation-based homomorphic encryption for secure and  efficient blockcha...Approximation-based homomorphic encryption for secure and  efficient blockcha...
Approximation-based homomorphic encryption for secure and efficient blockcha...IJECEIAES
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET Journal
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingCSCJournals
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
 
Sample projectdocumentation
Sample projectdocumentationSample projectdocumentation
Sample projectdocumentationhlksd
 
A Robust Watermarking Technique Based On Dwt on Digital Images
A Robust Watermarking Technique Based On Dwt on Digital  ImagesA Robust Watermarking Technique Based On Dwt on Digital  Images
A Robust Watermarking Technique Based On Dwt on Digital ImagesIJMER
 

Similaire à Digitalwatermarking (20)

SECURE TRANSMISSION IN WIRELESS SENSOR NETWORKS DATA USING LINEAR KOLMOGOROV ...
SECURE TRANSMISSION IN WIRELESS SENSOR NETWORKS DATA USING LINEAR KOLMOGOROV ...SECURE TRANSMISSION IN WIRELESS SENSOR NETWORKS DATA USING LINEAR KOLMOGOROV ...
SECURE TRANSMISSION IN WIRELESS SENSOR NETWORKS DATA USING LINEAR KOLMOGOROV ...
 
Secure transmission in wireless sensor networks data using linear kolmogorov ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...Secure transmission in wireless sensor networks data using linear kolmogorov ...
Secure transmission in wireless sensor networks data using linear kolmogorov ...
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
 
B011110614
B011110614B011110614
B011110614
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
 
B010510613
B010510613B010510613
B010510613
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
A Quick Glance over the Digital Watermarking
A Quick Glance over the Digital WatermarkingA Quick Glance over the Digital Watermarking
A Quick Glance over the Digital Watermarking
 
Dz31840846
Dz31840846Dz31840846
Dz31840846
 
Approximation-based homomorphic encryption for secure and efficient blockcha...
Approximation-based homomorphic encryption for secure and  efficient blockcha...Approximation-based homomorphic encryption for secure and  efficient blockcha...
Approximation-based homomorphic encryption for secure and efficient blockcha...
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
Sample projectdocumentation
Sample projectdocumentationSample projectdocumentation
Sample projectdocumentation
 
A Robust Watermarking Technique Based On Dwt on Digital Images
A Robust Watermarking Technique Based On Dwt on Digital  ImagesA Robust Watermarking Technique Based On Dwt on Digital  Images
A Robust Watermarking Technique Based On Dwt on Digital Images
 
24 83-1-pb
24 83-1-pb24 83-1-pb
24 83-1-pb
 

Dernier

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Dernier (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Digitalwatermarking

  • 1. 1 DIGITAL WATERMARKING VISVESVARAYA TECHNOLOGICAL UNIVERSITY JnanaSangama, Machche, Belgaum – 590 014 A seminar report on DIGITAL WATERMARKING Submitted by MOHAMMED JASHIM 1NH08EC034 VIII SEMESTER, Section ”A” Department of Electronics & Communication Engineering NEW HORIZON COLLEGE OF ENGINEERING (Accredited by NBA, Permanently affiliated to VTU) Outer Ring Road, Bellandur Post, Near Marathalli, Bengaluru – 560 103 2011 – 12 Department of Electronics & Communication, NHCE 2011-12
  • 2. 2 DIGITAL WATERMARKING NEW HORIZON COLLEGE OF ENGINEERING Outer Ring Road, Bellandur Post, Near Marathalli, Bengaluru – 560 103 DEPARTMENT OF ELECTRONICS AND COMMUNICATION Certificate This is to certify that the seminar entitled “DIGITAL WATERMARKING”is a bonafide work carried out by Mr.MOHAMMED JASHIMbearing the USN1NH08EC034, in partial fulfillment for the award of the degree of Bachelor of Engineering in Electronics & Communicationof the Visvesvaraya Technological University, Belgaum during the academic year 2011 - 12. This seminar report has been approved as it satisfies the academic requirements in respect of the Seminar Work (bearing the subject code 06EC86, for the VIII semester during February-June 2012) prescribed for the Bachelor of Engineering Degree. …………………………….. …………………………….. Signature of the Coordinator Signature of the HOD Mr. Aravinda K. Dr. T.N. Basavaraj Assistant Professor, Professor, Dept. of E&C, NHCE, Dept. of E&C, NHCE, Bengaluru – 560 103 Bengaluru – 560 103 Department of Electronics & Communication, NHCE 2011-12
  • 3. 3 DIGITAL WATERMARKING ABSTRACT As more and more analogue systems are replaced by digital ones, the question of how to deal with piracy of copyrighted digital content is turning into a serious problem. For example, the speed with which the “Content Scrambling System” – the encryption standard used for DVD video – was broken, clearly shows, that encryption on its own is insufficient for many systems in protecting copyrighted material from misuse. Digital Watermarking, on the other hand, relies on the shortcomings of the “human visual system” (HVS) and is about embedding copyright information in a way that it is imperceivable by humans, while still being resistant to modifications of the cover media. Thus, digital watermarking can be considered to be a supplementary technique to well established encryption schemes. (i) Department of Electronics & Communication, NHCE 2011-12
  • 4. 4 DIGITAL WATERMARKING ACKNOWLEDGMENT I express my sincere thanks to Prof.Dr. T.N. Basavaraj(HOD E&C, NHCE). Mr. AravindaK(Assistant Professor,E&C,NHCE) for their kind co-operation for presenting the seminar. I also extend my sincere thanks to all other members of the faculty of Electronics and Communication Department and my friends for their co-operation and encouragement. (ii) Department of Electronics & Communication, NHCE 2011-12
  • 5. 5 DIGITAL WATERMARKING TABLE OF CONTENTS SI no DESCRIPTION PAGE NO : 1 INTRODUCTION 6 2 DIGITAL WATERMARKING TECHNOLOGY 10 OVERVIEW 3 CLASSIFICATION 11 4 DIGITAL WATERMARKING TECHNICAL 14 DETAILS 5 WATERMARKING AS COMMUNICATION 17 6 DIGITAL WATERMARKING METHODS 19 7 DISTORTION AND ATTACKS 23 8 APPLICATION OF DIGITAL WATERMARKING 25 9 CONCLUSION 29 10 REFERENCES 30 Department of Electronics & Communication, NHCE 2011-12
  • 6. 6 DIGITAL WATERMARKING CHAPTER 1 INTRODUCTION Along with the explosive growth of the Internet not only desirable new possibilities - like publicly available access to information databases around the world, distributed project work across different countries, or fast and reliable means of electronic communication - emerged, but the ease with which digital media can be duplicated and modified, or the fact that legislation is seemingly unable to cope with its rapid rate of change makes it also very attractive to people with dishonourable motives. The advent of the Internet has resulted in many new opportunities for the creation and delivery of content in digital form. Applications include electronic advertising, realtime video and audio delivery, digital repositories and libraries, and Web publishing. An important issue that arises in these applications is the protection of the rights of all participants. It has been recognized for quite some time that current copyright laws are inadequate for dealing with digital data. This has led to an interest towards developing new copy deterrence and protection mechanisms. One such effort that has been attracting increasing interest is based on digital watermarking techniques. Digital watermarking is the process of embedding information into digital multimedia content such that the information (which we call the watermark) can later be extracted or detected for a variety of purposes including copy prevention and control. Digital watermarking has become an active and important area of research, and development and commercialization of watermarking techniques is being deemed essential to help address some of the challenges faced by the rapid proliferation of digital content. With these drawbacks of the “digital age” in mind, creators of multimedia content may wish for a digital analogy to the watermarks that have been used in bookmaking since the 13th Century .This need for methods and tools to protect ones intellectual property rights initiated the relatively new research field of “digital watermarks”. Someone familiar with encryption techniques might be tempted to ask why there is such an amount of interest in the research community to develop robust watermarking techniques, if numerous secure encryption algorithms are readily available. There are several reasons for this: 1. Encryption alone often is insufficient to protect digital content, since unconsidered and erroneoususage by human operators often renders it useless. 2. If somebody breaks the encryption (e.g. breaking the “content scrambling system” used on DVDswith tools like “DeCSS”, “VobDec” or “SmartRipper”), copyright infringements can still be provenusing the embedded watermark. Department of Electronics & Communication, NHCE 2011-12
  • 7. 7 DIGITAL WATERMARKING 3. The decryption process usually depends on the data being unmodified. 4. Since rightful owners are to be allowed to access the data they paid for, the encryption needs tobe undone at some point. As the unencrypted data is normally being held in the main memory ofcomputers, it’s not too difficult to devise tools for storing it onto a local hard disk (e.g. many DVDplayers for the Windows OS use DirectShow for video output. This proves to be useful for multiangleDVDs, where applications like “DeCSS” fail. By using tools that implement appropriate DirectShowfilters to write the decoded images to a user-specified file instead of displaying them onthe screen (e.g. “DVDRip”), the raw video data is still accessible. Because of these shortcomings, digital watermarking is sometimes referred to as being “the last lineof defence”. Consequently, an effective watermark should normally have several properties, whoseimportance will vary depending upon the application. Robustness o Fragile Watermarks are highly sensitive to any modifications, their sole purpose beingto prove the authenticity of a document. o Robust Watermarks should be embedded in a way, that they cannot be removedfrom the data without introducing noticeable defects. Perceptibility oVisible Watermarks are added as a perceivable additional layer to the original data oInvisible Watermarks should not be perceivable by human senses. · Security Unauthorized parties should not be able to read or alter the watermark, even if theyhave detailed knowledge about the used algorithms (Kerckhoffs‟s maxim). Multiple Watermarks Does the watermarking algorithm allow for multiple watermarks to be detectedindependently of each other? Speed In video distribution systems it may be necessary to use asymmetric algorithms, which offer very fast embedding methods, whereas watermark detection can take arbitrarily longer. Digital watermarking is still a very young research area, with its first academic conference held in 1996 [Ande99]. Numerous algorithms have been proposed and dismissed since then. Therefore, this paper aims at describing one popular watermarking technique in detail (“Spread Spectrum Watermarking”), rather than providing a short and unsatisfactory explanation of a larger number of different methods. Department of Electronics & Communication, NHCE 2011-12
  • 8. 8 DIGITAL WATERMARKING INFORMATION HIDING: Steganography & Digital Watermarking In addition to digital watermarking, the general idea of hiding some information in digital content has a wider class of applications that go beyond mere copyright protection and authentication. The techniques involved in such applications are collectively referred to as information hiding. It contains a large range of problem beyond that of embedding message in content,keeping the existence of information secret and imperceptible. For example, an image printed on a document could be annotated by information that could lead an user to its high resolution version  STEGANOGRAPHY: Another topic that is related to watermarking is steganography. Steganography applications conceal information in other, seemingly innocent media. Steganographic results may masquerade as other file for data types, be concealed within various media, or even hidden in network traffic or disk space. We are only limited by our imagination in the many ways information and data can be exploited to conceal additional information. Although steganography has been studied as part of cryptography for many decades, the focus of steganography is secret communication. In fact, the modern formulation of the problem goes by the name of the prisoner’s problem.Here Alice and Bob are trying to hatch an escape plan while in prison. The problem is that all communication between them is examined by a warden, Wendy, who will place both of them in solitary confinement at the first hint of any suspicious communication. Hence, Alice and Bob must trade seemingly inconspicuous messages that actually contain hidden messages involving the escape plan. There are two versions of the problem that are usually discussed – one where the warden is passive, and only observes messages and the other where the warden is active and modifies messages in a limited manner to guard against hidden messages. Clearly the most important issue here is that the very presence of a hidden message must be concealed. Whereas in digital watermarking it is not clear that a good watermarking technique should also be steganographic.  Digital Watermarking Digital information embedded within any digital media that can later be detected and extracted.Simply watermarking, a pattern of bits inserted into a digital image, audio or video file that identifies the file's copyright information (author, rights, etc.). The name comes from the faintly visible watermarks imprinted on stationery that identify the manufacturer of the stationery. The purpose of digital watermarks is to provide copyright protection for intellectual property that's in digital format. Unlike printed watermarks, which are intended to be somewhat visible, digital watermarks are designed to be completely invisible, or in the case of audio clips, inaudible. Moreover, the actual bits representing the watermark must be scattered throughout the file in such a way that they cannot be identified and manipulated. And finally, the digital watermark must be robust enough so that it can withstand normal changes to the file, such as reductions from lossy compression algorithms. Department of Electronics & Communication, NHCE 2011-12
  • 9. 9 DIGITAL WATERMARKING Satisfying all these requirements is no easy feat, but there are a number of companies offering competing technologies. All of them work by making the watermark appear as noise - that is, random data that exists in most digital files anyway. To view a watermark, you need a special program that knows how to extract the watermark data. Watermarking is also called data embedding and information hiding. Digital Watermarking describes methods and technologies that hide information, for example a number or text, in digital media, such as images, video or audio. The embedding takes place by manipulating the content of the digital data, which means the information is not embedded in the frame around the data. The hiding process has to be such that the modifications of the media are imperceptible. For images this means that the modifications of the pixel values have to be invisible. Furthermore, the watermark must be either robust or fragile, depending on the application. By "robust" we mean the capability of the watermark to resist manipulations of the media, such as lossy compression (where compressing data and then decompressing it retrieves data that may well be different from the original, but is close enough to be useful in some way), scaling, and cropping, just to enumerate some. In some cases the watermark may need to be fragile. "Fragile" means that the watermark should not resist tampering, or would resist only up to a certain, predetermined extent. CHAPTER 2 Department of Electronics & Communication, NHCE 2011-12
  • 10. 10 DIGITAL WATERMARKING DIGITAL WATERMARKING TECHNOLOGY OVERVIEW A watermark is a pattern of bitsinserted into a digitalimage, audio or video file that identifies the file's copyright information (author, rights, etc.). The name “watermark” is derived from the faintly visible marks imprinted on organisational stationery. There are many types of digital information and data. The types concentrated on in this report are: • Digital Images • Digital Audio, and • Digital Videos Unlike printed watermarks, which are intended to be somewhat visible (like the very light compass stamp watermarking this report), digital watermarks are designed to be completely invisible, or in the case of audio clips, inaudible.In addition, the bits representing the watermark must be scattered throughout the file in such a way that they cannot be identified and manipulated. And finally, a digital watermark must be robust enough to survive changes to the file its embedded in, such as being saved using a lossy compression algorithm eg: JPEG. Satisfying all these requirements is no easy feat, but there are a number of companies offering competing technologies. All of them work by making the watermark appear as noise- that is, random data that exists in most digital files anyway. Digital Watermarking works by concealing information within digital data, such that it cannot be detected without special software with the purpose of making sure the concealed data is present in all copies of the data that are made whether legally or otherwise, regardless of attempts to damage/remove it. The purpose of digital watermarks is to provide copyright protection for intellectual property that is in digital format. CHAPTER 3 CLASSIFICATION Department of Electronics & Communication, NHCE 2011-12
  • 11. 11 DIGITAL WATERMARKING Classification according to visibility: Visible digital watermarking Invisible digital watermarking  VISIBLE DIGITAL WATERMARKING In visible digital watermarking, the information is visible in the picture or video. Typically, the information is text or a logo, which identifies the owner of the media. The image on the right has a visible watermark. When a television broadcaster adds its logo to the corner of transmitted video, this also is a visible watermark.  INVISIBLE DIGITAL WATERMARKING In invisible digital watermarking, information is added as digital data to audio, picture, or video, but it cannot be perceived as such (although it may be possible to detect that some amount of information is hidden in the signal). The watermark may be intended for widespread use and thus, is made easy to retrieve or, it may be a form of steganography, where a party communicates a secret message embedded in the digital signal. In either case, as in visible watermarking, the objective is to attach ownership or other descriptive information to the signal in a way that is difficult to remove. It also is possible to use hidden embedded information as a means of covert communication between individuals. PURPOSE VISIBLE INVISIBLE Validation of intended recipient - Primary Non-repudiable transmission - Primary Deterrence against theft Primary Secondary Diminish commercial value without utility Primary Primary Discourage unauthorized duplication Primary Secondary Digital notarization and authentication Secondary Primary Identify source Primary Secondary Department of Electronics & Communication, NHCE 2011-12
  • 12. 12 DIGITAL WATERMARKING Classification Based On Digital Watermarking techniques used : Robustness Perceptibility Capacity Embedded method  ROBUSTNESS A digital watermark is called fragile if it fails to be detectable after the slightest modification. Fragile watermarks are commonly used for tamper detection (integrity proof). Modifications to an original work that clearly are noticeable, commonly are not referred to as watermarks, but as generalized barcodes. A digital watermark is called semi-fragile if it resists benign transformations, but fails detection after malignant transformations. Semi-fragile watermarks commonly are used to detect malignant transformations. A digital watermark is called robust if it resists a designated class of transformations. Robust watermarks may be used in copy protection applications to carry copy and no access control information to form correct order and get the digital water marking  PERCEPTIBILITY A digital watermark is called imperceptible if the original cover signal and the marked signal are perceptually indistinguishable. A digital watermark is called perceptible if its presence in the marked signal is noticeable.  CAPACITY The length of the embedded message determines two different main classes of digital watermarking schemes: Department of Electronics & Communication, NHCE 2011-12
  • 13. 13 DIGITAL WATERMARKING  The message is conceptually zero-bit long and the system is designed in order to detect the presence or the absence of the watermark in the marked object. This kind of watermarking scheme is usually referred to as zero-bit or presence watermarking schemes. Sometimes, this type of watermarking scheme is called 1-bit watermark, because a 1 denotes the presence (and a 0 the absence) of a watermark.  The message is a n-bit-long stream ( , with ) or and is modulated in the watermark. These kinds of schemes usually are referred to as multiple-bit watermarking or non-zero-bit watermarking schemes.  EMBEDDING METHOD A digital watermarking method is referred to as spread-spectrum if the marked signal is obtained by an additive modification. Spread-spectrum watermarks are known to be modestly robust, but also to have a low information capacity due to host interference. A digital watermarking method is said to be of quantization type if the marked signal is obtained by quantization. Quantization watermarks suffer from low robustness, but have a high information capacity due to rejection of host interference. A digital watermarking method is referred to as amplitude modulation if the marked signal is embedded by additive modification which is similar to spread spectrum method, but is particularly embedded in the spatial domain. CHAPTER 4 DIGITAL WATERMARKING TECHNICAL DETAILS Department of Electronics & Communication, NHCE 2011-12
  • 14. 14 DIGITAL WATERMARKING The above block diagram show the digital watermarking of a signal.Digital watermarking technology makes use of the fact that the human eye has only a limited ability to observe differences. Minor modifications in the colour values of an image are subconsciously corrected by the eye, so that the observer does not notice any difference. While vendors of digital watermarking schemes do not publicly release the exact methods used to create their watermarks, they do admit to using the following basic procedure A secret key (string or integer) produces a random number which determines the particular pixels, which will be protected by the watermarking. The watermark is embedded redundantly over the whole image, so that every part of the image is protected. One way of doing this is by “Patchwork”. This technique uses a random number generator to select n pairs of pixels and slightly increases or decrease their luminosity (brightness level). Thus the contrast of this set is increased without any change in the average luminosity of the image. With suitable parameters, Patchwork even survives compression using JPEG. Although the amount of secret information has no direct impact on the visual fidelity of the image or the robustness of the watermark, it plays an important role in the security of the system. The key space, that is the range of all possible values of the secret information, x must be large enough to make exhaustive search attacks impossible. In the process of extracting the watermark, the secret key is used to identify the manipulated pixels and finally to decode the watermark. The quality of digital watermarks can be judged in two ways; firstly it must be able to resist intentional and unintentional attacks and secondly the embedded watermark must not detract from the quality of the image. Department of Electronics & Communication, NHCE 2011-12
  • 15. 15 DIGITAL WATERMARKING The higher the resistance of a watermark against attacks, the higher the risk of the quality of the image being reduced, and the greater the chance of obvious visual artefacts being created. Every watermarking system consists at least of two different parts: watermark embedding unit and watermark detection and extraction unit.The above figure shows an example of embedding unit for still images. The unmarked image is passed through a perceptual analysis block that determines how much a certain pixel can be altered so that the resulting watermarked image is indistinguishable from the original. This takes into account the human eye sensitivity to changes in flat areas and its relatively high tolerance to small changes in edges. After this so-called perceptual-mask has been computed, the information to be hidden isshaped by this mask and spread all over the original image. This spreading technique is similar to the interleaving used in other applications involving coding, such as compact disc storage, to prevent damage of the information caused by scratches or dust. In our case, the main reason for this spreading is to ensure that the hidden information survives croppingof the image. Moreover, the way this spreading is performed depends on the secret key, so it is difficult to recover the hidden information if one is not in possession of this key. In fact, a similar technique is used in spread spectrum systems (more precisely, in Code-Division Multiple Access) to extract the desired information from noise or other users. Additional key-dependent uncertainty can be introduced in pixel amplitudes (recall that the perceptual mask imposes only an upper limit). Finally, watermark is added to the original image. Department of Electronics & Communication, NHCE 2011-12
  • 16. 16 DIGITAL WATERMARKING The above figure shows the typical configuration of a watermark detection and extraction unit. Watermarkdetection involves deciding whether a certainimage has been watermarked with a given key.Note then that a watermark detector produces abinary output. Important considerations here arethe probability of correct detection PD (i.e., theprobability of correctly deciding that a watermarkis present) and the probability of false alarm PF(i.e., the probability of incorrectly deciding that animage has been watermarked with a certain key). These two measures allow us to compare different watermarking schemes: One method will be superior if achieves a higher PD for a fixed PF .Note also that for a watermarking algorithm to be useful it must work with extremely low probabilities of false alarm. Watermark detection is usually done by correlating the watermarked image with a locally generated version of the watermark at the receiver side. This correlation yields a high value when the watermark has been obtained with the proper key. As we have shown, it is possible to improve the performance of the detector by eliminating original image-induced noise with signal processing. It is worthy of remark that some authors propose using the original image in the detection process. Although this simplifies further treatment of the watermark in the reeiverend, it is quite unrealistic for most applications,particularly those related to E- commerce. Once the presence of the watermark has been correctly detected, it is possible to extract the hidden information. The procedure is also generally done by means of a cross-correlation but in this case, an independent decision has to be taken for every information bit with a sign slicer. In fact, wehave also shown that this correlation structure has not been well-founded and significant improvements are achievable when image statistics are available. For instance, the widely-used DCT coefficients used in the JPEG and MPEG-2 standards are well approximated by generalized gaussian probabilitydensity functions that yield a considerably different extraction scheme. Obviously, when extracting the information the most adequate parameter for comparison purposes is the probability of bit error Pb, identical to that used in digital communications. This is not surprising because watermarking creates a hidden (sometimes called steganographic) channel on which information is conveyed. Department of Electronics & Communication, NHCE 2011-12
  • 17. 17 DIGITAL WATERMARKING CHAPTER 5 WATERMARKING AS COMMUNICATION It is quite common and popular to adapt techniques from standard communication theory to study and improve watermarking algorithms using models similar to the ones shown in Figure,below.And it shows how the information bits are first encoded (to suit the modulation type, error control etc.) followed by modulating a carrier signal that carries this information across a noisy channel. At the decoder side, this carrier is demodulated and then the information (possibly corrupted due to channel noise) is decoded. In a digital watermarking system the modulator is replaced by the watermark embedder that places the watermark in the media content. Distortions to the watermarked media is induced by known or unknown attacks or signal processing operations such as compression, decompression, cropping, scaling etc. The embedded watermark is finally retrieved by the watermarked decoder or detector. One major difference between the two models can be seen in the encoder side. While, in communication systems, the encoding is done in order to protect the information bits from channel distortion, in watermarking, emphasis is usually placed on techniques that minimize perceptual distortions to the watermarked content. Some analogies between the traditional communication system and the watermarking system are summarized. COMMUNICATION SYSTEM WATERMARKING SYSTEM Information Watermark Communication channel Host signal(such as image,video etc.) Power constraint on transmitted signal due to Power constraint on watermark due to physical limitations audio/visual quality limitations Interference Host signal and watermark attacks Department of Electronics & Communication, NHCE 2011-12
  • 18. 18 DIGITAL WATERMARKING Side information at transmitter and/or receiver Knowledge of host signal,watermarking parameters such as key etc.at the encoder and/or decoder. Channel capacity Watermarking capacity Department of Electronics & Communication, NHCE 2011-12
  • 19. 19 DIGITAL WATERMARKING CHAPTER 6 DIGITAL WATERMARKING METHODS  IMAGE These are some of the methods that can be used to test whether a watermark can survive different changes to the image it is embedded in. Compare this Original Image with the attacked images below, and see if you can spot any changes in quality. HORIZONTAL FLIPPING Many images can be flipped horizontally without losing quality. Few watermarks survive flipping, although resilience to flipping is easy to implement. ROTATION AND CROPPING A small rotation with cropping doesn‟t reduce image quality, but can make watermarks undetectable as rotation realigns horizontal features of an image used to check for the presence of a watermark. The example at left has been rotated 3 degrees to the right, and then had its edges cropped to make the sides straight again. JPEG COMPRESSION/RE-COMPRESSION Department of Electronics & Communication, NHCE 2011-12
  • 20. 20 DIGITAL WATERMARKING JPEG is a widely used compression algorithms for images and any watermarking system should be resilient to some degree to compression or change of compression level e.g. from 71% to 70% in quality like the example at down. SCALING Uniform scaling increases/decreases an image by the same % rate in the horizontal and vertical directions. Non-uniform scaling like the example at left increases/decreases the image horizontally and vertically at different % rates. Digital watermarking methods are often resilient only to uniform scaling. DITHERING Dithering approximates colours not in the current palette by alternating two available similar colours from pixel to pixel. If done correctly this method can completely obliterate a watermark, however it can make an image appear to be “patchy” when the image is over- dithered (as in the elbow area of the image at left). MOSAIC A mosaic attack doesn‟t damage the watermarked image or make it lose quality in any way, but still enables the image to be viewed in eg: a web browser by chopping the image into subsections of equal size and putting it back together again. To the viewer a “mosaic” image appears to look the same as the original but a web crawler like DigiMarc‟sMarcSpidersees many separate images and doesn‟t detect that these separate images are parts of a watermarked image. Department of Electronics & Communication, NHCE 2011-12
  • 21. 21 DIGITAL WATERMARKING This means that the watermark cannot be detected, as a problem common to all image watermarking schemes is that they have trouble embedding watermarks into small images, (less than 256 pixels in height or width). STIRMARK StirMarkis the industry standard software used by researchers to automatically attempt to remove watermarks created by Digimarc, SysCoP, JK_PGS,Signum Technologies and EIKONAmark. Stirmark attacks a given watermarked image using all the techniques mentioned in this report as well as more esoteric techniques such as low pass filtering, gamma correction, sharpening/unsharpening etc.  AUDIO th The most common method of watermarking audio is to mark every x bit in an audio file depending on the random generator seed calculated from the watermarking key applied to the audio. These are some of the ways watermarks can be removed from audio files. MPEG1 LAYER III (MP3) AUDIO COMPRESSION A digital audio compression algorithm that achieves a compression factor of about twelve while preserving sound quality. What this lossy compression does is remove the frequencies not heard by the human ear from the audio. If a raw audio file is converted to MP3 at a bit- rate of 128kbps than roughly 90% of the frequencies are removed. This means that a search for the watermark needs to find an unaltered length of samples that contains at least 2 watermarked bits to prove the watermarks existence. AUDIO RESTORATION PROGRAMS Audio restoration programs are designed to remove hisses, crackles and pops from audio recordings. They do this by searching through the wavelength, removing samples that don‟t “fit in” amongst neighbouring samples, and replacing them with an average of the two neighbour samples. Although the removal of digital watermarks is obviously not a purpose of these programs, they work remarkably well at doing so as the sample bits inserted to watermark the audio don‟t fit in with their surrounding pixels, and are therefore removed. Department of Electronics & Communication, NHCE 2011-12
  • 22. 22 DIGITAL WATERMARKING ECHO HIDING REMOVAL Echo hiding relies on the fact that we cannot perceive short echoes, eg: 1 millisecond(ms) and embeds data into a cover audio signal by introducing an echo characterised by its delay and its relative amplitude compared to surrounding samples. The echo delays are chosen between 0.5 ms and 2 ms and the best relative amplitude of the echo is around 0.8 ms. However specialised software which looks for echoes with a length between 0.5 ms and 2 ms (as seen below), can be used to detect and remove these echoes without effecting sound quality. JITTER The simplest and most effective attack on any audio watermarking scheme is to add jitter to the signal. In our first implementation, we split the signal into chunks of 500 samples, either duplicated or deleted a sample at random in each chunk (resulting in chunks of 499 or 501 samples long) and stuck the chunks back together. This turned out to be almost imperceptible after altering, even in classical music; but the jitter prevents the marked bits from being located”, and therefore the watermark is obliterated. In his paper titled “Audio watermarking: Features, Applications and Algorithms“, Michael Arnold agrees with the Cambridge team stating that “one of the greatest challenges [of watermarking] is the robustness against the so-called jitter attack”.  VIDEO At present there is no known method to remove a digital watermark from a stream of video. This is probably because those who trade in pirated video, (especially in DivX format), store their pirated movies locally on their hard disk drives or on CD-R disks where they cannot be checked for watermarks by anyone. CHAPTER 7 Department of Electronics & Communication, NHCE 2011-12
  • 23. 23 DIGITAL WATERMARKING DISTORTION AND ATTACKS In practice, a watermarked object may be altered either on purpose or accidentally, so the watermarking system should still be able to detect and extract the watermark. Obviously, the distorsions are limited to those that do not produce excessive degradations, since otherwise the transformed object would be unusable. These distorsions also introduce a degradation on the performance of the system as measured by the probabilities defined in the previous section (i.e., PD and Pbwould decrease for a fixed PF). For intentional attacks, the goal of the attacker is to maximize the reduction in these probabilities while minimizing the impact that his/her transformation produces on the object; this has to be done without knowing the value of the secret key used in the watermarking insertion process, which is where all the security of the algorithm lies. Next, we introduce some of the best known attacks. Some of them may be intentional or unintentional, depending on the application: Additive Noise. This may stem in certain applications from the use of D/A and A/D converters or from transmission errors. However, an attacker may introduce perceptually shaped noise (thus, imperceptible) with the maximum unnoticeable power. This will typically force to increase the threshold at which the correlation detector works. Filtering. Low-pass filtering, for instance, does not introduce considerable degradation in watermarked images or audio, but can dramatically affect the performance, since spread- spectrum-likewatermarks have a non negligible high-frequencyspectral contents. Cropping. This is a very common attack since in many cases the attacker is interested in a small portion of the watermarked object, such as parts of a certain picture or frames of a video sequence. With this in mind, in order to survive, the watermark needs to be spread over the dimensions where this attack takes place. Compression. This is generally an unintentional attack which appears very often in multimedia applications. Practically all the audio, video and images that are currently being distributed via Internet have been compressed. If the watermark is required to resist different levels of compression, it is usually advisable to perform the watermark insertion task in the same domain where the compression takes place. For instance, DCT domain image watermarking is more robust to JPEG compression than spatial-domain watermarking. Rotation and Scaling. This has been the true battle horse of digital watermarking, especially because of its success with still images. Correlation based detection and extraction fail when rotation or scaling are performed on the watermarked image because the embedded watermark and the locally generated version do not share the same spatial pattern anymore. Obviously, it would be possible to do exhaustive search on different rotation angles and scaling factors until a correlation peak is found, but this is prohibitively complex. Note that estimating the two parameters becomes simple when the original image is present, but we have argumented against this possibility in previous sections. The authors have shown that although the problem resembles synchronization for digital communications, the techniques applied there fail loudly. Some authors have recently proposed the use of rotation and scaling-invariant transforms (such as the Fourier-Mellin ) but this dramatically reduces the capacity for message hiding. In any case, publicly available programs like Strirmark break the uniform axes transformation by creating an imperceptible non-linear resampling of the image that renders invariant transforms unusable. In audio watermarking it is also quite simple to perform a non-linear transformation of the time axis that considerably difficults watermark detection. Statistical Averaging. An attacker may try to estimate the watermark and then „unwatermark‟ Department of Electronics & Communication, NHCE 2011-12
  • 24. 24 DIGITAL WATERMARKING the object by substracting the estimate. This is dangerous if the watermark does not depend substantially on the data. Note that with different watermarked objects it would be possible to improve the estimate by simple averaging. This is a good reason for using perceptual masks to create the watermark. Multiple Watermarking. An attacker may watermark an already watermarked object and later make claims of ownership. The easiest solution is to timestamp the hidden information by a certification authority. Attacks at Other Levels. There are a number of attacks that are directed to the way the watermark is manipulated. For instance, it is possible to circumvent copy control mechanisms discussed below by super scrambling data so that the watermark is lost or to deceive web crawlers searching for certain watermarks by creating a presentation layer that alters they way data are ordered. The latter is sometimes called „mosaic attack‟ . CHAPTER 8 Department of Electronics & Communication, NHCE 2011-12
  • 25. 25 DIGITAL WATERMARKING APPLICATION OF DIGITAL WATERMARKING  VideoWatermarking. In this case, most considerations made in previous sections hold. However,now the temporal axis can be exploited to increase the redundancy of the watermark. As in the still images case, watermarks can be created either in the spatial or in the DCT domains. In the latter, the results can be directly extrapolated to MPEG-2 sequences, although different actions must be taken for I, P and B frames. Note that perhaps the set of attacks that can be performed intentionally is not smaller but definitely more expensive than for still images.  Audio Watermarking. Again, previous considerations are valid. In this case, time and frequencymasking properties of the human ear are used to conceal the watermark and make it inaudible. The greatest difficulty lies in synchronizing the watermark and the watermarked audio file, buttechniques that overcome this problem have been proposed.  Hardware/Software Watermarking. This is a good paradigm that allows us to understand how almost every kind of data can be copyright protected. If one is able to find two different waysof expressing the same information, then one bit of information can be concealed, something thatcan be easily generalized to any number of bits. This is why it is generally said that a perfect compression scheme does not leave room for watermarking. In the hardware context, Boolean equivalences can be exploited to yield instances that use different types of gates and that can be addressed by the hidden information bits. Software can be also protected not only by finding equivalences between instructions, variable names, or memory addresses, but also by altering the order of non-critical instructions. All this can be accomplished at compiler level.  Text Watermarking. This problem, which in fact was one of the first that was studied within the information hiding area can be solved at two levels. At the printout level, information can be encodedin the way the textlines or words are separated (this facilitates the survival of the watermarkeven to photocopying). At the semantic level (necessary when raw text files are provided), equivalences between words or expressions can be used, although special care has to be taken not to destruct the possible intention of the author.  Executable Watermarks. Once the hidden channel has been created it is possible to include even executable contents, provided that the corresponding applet is running on the end user side.  Labeling. The hidden message could also contain labels that allow for example to annotate imagesor audio. Of course, the annotation may also been included in a separate file, but with watermarkingit results more difficult to destroy or loosethis label, since it becomes closely tied to the objectthat annotates. This is especially useful inmedical applications since it prevents dangerous errors.  Fingerprinting. This is similar to the previous application and allows acquisition devices(such as video cameras, audio recorders, etc) to insert information about the specific device (e.g., an ID number) and date of creation. This can also be done with conventional Department of Electronics & Communication, NHCE 2011-12
  • 26. 26 DIGITAL WATERMARKING digital signature techniquesbut with watermarking it becomes considerably more difficult to excise or alter the signature.Some digital cameras already include this feature.  Authentication. This is a variant of the previous application, in an area where cryptographictechniques have already made their way. However, there are two significant benefits that arisefrom using watermarking: first, as in the previous case, the signature becomes embedded in the message, second, it is possible to create „soft authentication‟ algorithms that offer a multivalued „perceptual closeness‟ measure that accounts for different unintentional transformations that the datamay have suffered (an example is image compression with different levels), instead of the classicalyes/no answer given by cryptography-based authentication.Unfortunately, the major drawbackof watermarking-based authentication is the lack of public key algorithms that force either to putsecret keys in risk or to resort to trusted parties.  Copy and Playback Control. The message carried by the watermark may also contain informationregarding copy and display permissions.Then, a secure module can be added in copy or playback equipment to automatically extract this permission information and block further processing if required. In order to be effective, this protection approach requires agreements between contentproviders and consumer electronics manufacturers to introduce compliant watermark detectorsin their video players and recorders. This approach is being taken in Digital Video Disc (DVD).  Signalling. The imperceptibility constraint is helpful when transmitting signalling informationin the hidden channel. The advantage of using this channel is that no bandwidth increase is required.An interesting application in broadcasting  copyright protection of digital media. In the past duplicating art work was quite complicated and required a high level of expertise for the counterfeit to look like the original. However, in the digital world this is not true. Now it is possible for almost anyone to duplicate or manipulate digital data and not lose data quality. Similar to the process when artists creatively signed their paintings with a brush to claim copyrights, artists of today can watermark their work by hiding their name within the image. Hence, the embedded watermark permits identification of the owner of the work. It is clear that this concept is also applicable to other media such as digital video and audio. Currently the unauthorized distribution of digital audio over the Internet in the MP3 format is a big problem. In this scenario digital watermarking may be useful to set up controlled audio distribution and to provide efficient means for copyright protection, usually in collaboration with international registration bodies. Are there any other applications where digital watermarking may be used? There are a number of possible applications for digital watermarking technologies and this number is increasing rapidly.  In the field of data security, watermarks may be used for certification, authentication, and conditional access. Certification is an important issue for official documents, such as identity cards or passports. Department of Electronics & Communication, NHCE 2011-12
  • 27. 27 DIGITAL WATERMARKING Example on the left of a protected identity card. The identity number "123456789" is written in clear text on the card and hidden as a digital watermark in the identity photo. Therefore switching or manipulating the identity photo will be detected  Digital watermarking permits linking information on documents. That means that key information is written twice on the document. For instance, the name of a passport owner is normally printed in clear text. But it would also be hidden as an invisible watermark in the passport photo. If anyone tries to tamper with the passport by replacing the photo it would be possible to detect the change by scanning the passport and verifying the name hidden in the photo. The picture shows a printing machine from Intercard for various types of plastic cards (Courtesy of Intercard, Switzerland).  TAMPERING WITH IMAGES: Another application is the authentication of image content. The goal of this application is to detect any alterations and modifications in an image. The three pictures below illustrate this application. The picture on the left shows an original photo of a car that has been protected with a watermarking technology. In the center, the same picture is shown but with a small modification: the numbers on the license plate have been changed. The picture on the right shows the photo after running the digital watermark detection program on the tampered photo. The tampered areas are indicated in white. We can clearly see that the detected area corresponds to the modifications applied to the original photo. Using digital watermarks for integrity verification: the protected image is the image (a) above; a modified image is obtained by swapping the numbers 9 and 4 of the number plate (b); digital watermarking technology allows detecting and highlights the modified areas, as shown on (c). Department of Electronics & Communication, NHCE 2011-12
  • 28. 28 DIGITAL WATERMARKING  Invisible marking on blank paper:Digital watermarks can also be adapted to mark white paper with the goal of authenticating the originator, verify the authenticity of the document content, or to date the document. Such applications are especially of interest for official documents, such as contracts. For example, the digital watermark can be used to embed the name of the lawyer or important information such as key monetary amounts. In the event of a dispute, the digital watermark is then read allowing authentication of key information in the contract. AlpVision developed genuine process to invisibly mark white blank paper with normal and visible ink. This patented technology is now known as Cryptoglyph.The image on the down shows blank paper marked by the invisible digital watermark using standard visible ink, with the Cryptoglyph technology.  Digital Media Management: Beside applications in the fields of copyright protection, authentication and security, digital watermarks can also serve as invisible labels and content links. For example, photo development laboratories may insert a watermark into the picture to link the print to its negative. This way is very simple to find the negative for a given print. All one has to do is scan the print and extracted the information about the negative. In a completely different scenario digital watermarks may be used as a geometrical reference which may be useful for programs such as optical character recognition (OCR) software. The embedded calibration watermark may improve the detection reliability of the OCR software since it allows the determination of translation, rotation, and scaling. CONCLUSION Department of Electronics & Communication, NHCE 2011-12
  • 29. 29 DIGITAL WATERMARKING Digital watermarking is a rapidly evolving area of research and development.An exhaustive list of digital watermarking applications is of course impossible. However, it is interesting to note the increasing interest in fragile watermarking technologies. Especially promising are applications related to copy protection of printed media. Examples here include the protection of bills with digital watermarks. Various companies have projects in this direction and it is very likely that fully functioning solutions will soon be available.One key problem that we still face today is the development of truly robust, transparent and secure watermarking technique for different digital media including images, video and audio. Another key problem is the development of semi-fragile authentication techniques. The solution to these problem will require application of known results and development of new results in the fields of information and coding theory, adaptive signal processing, game theory, statistical decision theory, and cryptography. REFERENCES Department of Electronics & Communication, NHCE 2011-12
  • 30. 30 DIGITAL WATERMARKING http://www.10gea.org http://standards.ieee.org/resources/glance.html IEEE Digital watermarking,Rchandramauli,NasirMemon Wikipedia Department of Electronics & Communication, NHCE 2011-12