SlideShare une entreprise Scribd logo
1  sur  36
DIGITAL WATERMARKING

Sejal Visawadia
Watermark
What is Watermarking?

“ Watermarking can be considered as a special technique
of steganography where one message is embedded in
another and the two messages are related to each other in
some way. “
Example :The presence of specific patterns in currency

notes

which are visible only when the note is held to light is
a well known example for watermark.
Example of a conventional
watermark

Courtesy of Blue Spike, Inc.
Digital Watermark
“ Digital watermarking is similar to
watermarking physical objects, except that
the watermarking technique is used for
digital content instead of physical objects.”
Digital Watermark (Cont..)
In digital watermarking a low-energy signal is
imperceptibly embedded in another signal. The
low-energy signal is called watermark.
The main signal in which the watermark is
embedded is referred to as cover signal since
it covers the watermark.
An entity called watermark key used for
embedding and detecting watermark signal
Watermark key is private
Behind The Technology
Sending Side …

Watermark Embedding process


Water mark
 Original message
 Key


Water marked image
Behind The Technology
Receiving Side …

Watermark retrieval process



Water marked image
Key

 Confidential

message
The Overall System
The Technology Roars…
Importance Of
Digital Watermarking
© Copyright

Information
© On-line music industry
© News gathering using digital cameras
Types of Digital Watermarking







Robust & Fragile Watermarking
Visible & Invisible Watermarking
Public & Private Watermarking
Asymmetric & Symmetric
Watermarking
Steganograhic & NonSteganographic watermarking
Robust & Fragile
Watermarking


Robust Watermarking:-Modification of
watermarked content will not affect
watermark



Fragile Watermarking:-Watermark get
destroyed when watermarked content is
modified or tampered with
Visible & Invisible
Watermarking
 On Visible watermarking, contents are

visible
Visible & Invisible
Watermarking (Cont..)


Invisible watermarking are not viewed
on just looking
Public & Private
Watermarking
•

Public Watermarking
Users of content are authorized to detect
watermark

•

Private Watermarking
Users not authorized to detect watermark
Asymmetric & Symmetric
watermarking


In Asymmetric watermarking different
keys used for embedding and detecting
watermark
Asymmetric & Symmetric
watermarking (Cont..)


In symmetric watermarking same keys
are used for embedding and detecting
watermarks
Steganographic & NonSteganographic Watermarking


Steganographic Watermarking
User unaware of the presence of a
watermark

eg:-Used in finger printing
applications
 Non-Steganographic WM:User aware of the presence of a
watermark.

e.g.:-User to detect piracy
Digital Watermarking
Techniques
 LSB

Watermarking
 Color Separation Technique
 Bit Stream Watermarking
 Word Space Coding, Line Space
Coding &Character Coding
LSB Watermarking


Lower order bits of selected pixels in
the image are used to store watermarks



Replacing lower order bits of each
pixel with higher order bit of different image
Color Separation Technique


Watermark appears only in one of the

color bands


Used to watermark in still images



Can be extended to moving images
Bit Stream Watermarking


Used in audio watermarking



Data is directly inserted into compressed
audio files
Word Space Coding, Line Space
Coding & Character Coding


Used for watermarking in text documents



In word space coding, the spaces
between words are altered to embed
watermark code. In line space coding the
space between the lines are altered and in
character coding some of the characters
are imperceptibly modified (i.e., made
larger, serifs enhanced, etc).
Applications of Digital
Watermarking
Copy Protection
 Content Authentication
 Copyright Protection
 Metadata Tagging

Copy Protection



It limits the access to copyrighted material and
inhibit the copy process
Content Authentication
 Robust

watermarks are used in this area

Example:-A photographic information that
may be presented as evidence in court.
Since digital images can be easily
manipulated, there is a need to provide
proof that an image has not been altered.
Content Authentication
Copyright Protection
 One

of the main application

 Embedding

watermarks in digital

photographs
Metadata Tagging
 Watermarks

convey object specific
information to users of the object.

 Used

to attach patient identification data to
medical images, or to highlight regions of
diagnostic significance.
Attacks to Digital
Watermarking



Stirmark
Mosaic Attack
Stirmark






It is tool developed to test the robustness
of image marking system
Stirmark is commonly produced by
printers and scanners
IBM researchers have recently
announced a technique that defeats the
stir mark attack.
Detects and measures the geometric
distortions in images, and removes the
distortion to restore image geometry
Stirmark Example
Mosaic Attack
Use of a web crawler
 Dividing into sub images with rendition
instructions
 Browser will be rearranging the sub images
to appear as the original
 Sub images will be sufficiently small that no
single image on its own will contain a
recognizable mark.

Mosaic Attack Example
Conclusion


DRM systems and content management are
important for protection of rights of digital
multimedia creations that are distributed on the
Internet. Digital watermarking is an effective
technique for embedding rights information in
digital multimedia data.



Digital watermark technology can be used in
consumer electronic devices like digital still
camera, digital video camera, DVD players, MP3
players, etc., for various applications like providing
controlled access, preventing illegal replication and
watermark embedding
Conclusion (Contd..)


Digital information can easily be
disseminated and copied via global
networks.



The future of digital watermarking relies on
setting standards and creating applications
so that creators of digital content can easily
implement it.
THANK YOU

Contenu connexe

Tendances

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingnafees321
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology vijay rastogi
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detectionncct
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessingQaisar Ayub
 
Watermark
WatermarkWatermark
Watermarkravi33s
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesPrashant Singh
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 

Tendances (20)

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Digital Watermarking Report
Digital Watermarking ReportDigital Watermarking Report
Digital Watermarking Report
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
 
Watermark
WatermarkWatermark
Watermark
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Watermark
WatermarkWatermark
Watermark
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 

En vedette

Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarkingJasni Zain
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubimishrasubrat
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Journals
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Samarth Godara
 
12205451 pss7
12205451 pss712205451 pss7
12205451 pss7yuti_3011
 
TLA Presentation on QR-codes
TLA Presentation on QR-codesTLA Presentation on QR-codes
TLA Presentation on QR-codesDustin Haisler
 

En vedette (11)

Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarking
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Vidhi's ppt
Vidhi's pptVidhi's ppt
Vidhi's ppt
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubi
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
 
QR Code Introduction
QR Code IntroductionQR Code Introduction
QR Code Introduction
 
Robust watermarking technique sppt
Robust watermarking technique spptRobust watermarking technique sppt
Robust watermarking technique sppt
 
12205451 pss7
12205451 pss712205451 pss7
12205451 pss7
 
TLA Presentation on QR-codes
TLA Presentation on QR-codesTLA Presentation on QR-codes
TLA Presentation on QR-codes
 

Similaire à Digitalwatermarking

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applicationsKannekanti Utthej
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniquestheijes
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsYogeshIJTSRD
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar10e11a0545
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET Journal
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyAlexander Decker
 
A108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxA108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxVaibhavKale80
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
 
Digital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingDigital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingIRJET Journal
 

Similaire à Digitalwatermarking (20)

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and Applications
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 
50120130406038
5012013040603850120130406038
50120130406038
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
A108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxA108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptx
 
B011110614
B011110614B011110614
B011110614
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
Digital Image Security using Digital Watermarking
Digital Image Security using Digital WatermarkingDigital Image Security using Digital Watermarking
Digital Image Security using Digital Watermarking
 

Plus de Sej Visawadia (11)

Natural pickles
Natural picklesNatural pickles
Natural pickles
 
Sez india
Sez indiaSez india
Sez india
 
Instagram
InstagramInstagram
Instagram
 
Content Marketing
Content MarketingContent Marketing
Content Marketing
 
Asian paints
Asian paintsAsian paints
Asian paints
 
Uttar pradesh tourism
Uttar pradesh tourismUttar pradesh tourism
Uttar pradesh tourism
 
Creativity
CreativityCreativity
Creativity
 
Nfc
NfcNfc
Nfc
 
QR codes
QR codesQR codes
QR codes
 
Augmented reality
Augmented realityAugmented reality
Augmented reality
 
Graphic design
Graphic designGraphic design
Graphic design
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 

Dernier (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Digitalwatermarking

  • 2. Watermark What is Watermarking? “ Watermarking can be considered as a special technique of steganography where one message is embedded in another and the two messages are related to each other in some way. “ Example :The presence of specific patterns in currency notes which are visible only when the note is held to light is a well known example for watermark.
  • 3. Example of a conventional watermark Courtesy of Blue Spike, Inc.
  • 4. Digital Watermark “ Digital watermarking is similar to watermarking physical objects, except that the watermarking technique is used for digital content instead of physical objects.”
  • 5. Digital Watermark (Cont..) In digital watermarking a low-energy signal is imperceptibly embedded in another signal. The low-energy signal is called watermark. The main signal in which the watermark is embedded is referred to as cover signal since it covers the watermark. An entity called watermark key used for embedding and detecting watermark signal Watermark key is private
  • 6. Behind The Technology Sending Side … Watermark Embedding process  Water mark  Original message  Key  Water marked image
  • 7. Behind The Technology Receiving Side … Watermark retrieval process   Water marked image Key  Confidential message
  • 8. The Overall System The Technology Roars…
  • 9. Importance Of Digital Watermarking © Copyright Information © On-line music industry © News gathering using digital cameras
  • 10. Types of Digital Watermarking      Robust & Fragile Watermarking Visible & Invisible Watermarking Public & Private Watermarking Asymmetric & Symmetric Watermarking Steganograhic & NonSteganographic watermarking
  • 11. Robust & Fragile Watermarking  Robust Watermarking:-Modification of watermarked content will not affect watermark  Fragile Watermarking:-Watermark get destroyed when watermarked content is modified or tampered with
  • 12. Visible & Invisible Watermarking  On Visible watermarking, contents are visible
  • 13. Visible & Invisible Watermarking (Cont..)  Invisible watermarking are not viewed on just looking
  • 14. Public & Private Watermarking • Public Watermarking Users of content are authorized to detect watermark • Private Watermarking Users not authorized to detect watermark
  • 15. Asymmetric & Symmetric watermarking  In Asymmetric watermarking different keys used for embedding and detecting watermark
  • 16. Asymmetric & Symmetric watermarking (Cont..)  In symmetric watermarking same keys are used for embedding and detecting watermarks
  • 17. Steganographic & NonSteganographic Watermarking  Steganographic Watermarking User unaware of the presence of a watermark eg:-Used in finger printing applications  Non-Steganographic WM:User aware of the presence of a watermark. e.g.:-User to detect piracy
  • 18. Digital Watermarking Techniques  LSB Watermarking  Color Separation Technique  Bit Stream Watermarking  Word Space Coding, Line Space Coding &Character Coding
  • 19. LSB Watermarking  Lower order bits of selected pixels in the image are used to store watermarks  Replacing lower order bits of each pixel with higher order bit of different image
  • 20. Color Separation Technique  Watermark appears only in one of the color bands  Used to watermark in still images  Can be extended to moving images
  • 21. Bit Stream Watermarking  Used in audio watermarking  Data is directly inserted into compressed audio files
  • 22. Word Space Coding, Line Space Coding & Character Coding  Used for watermarking in text documents  In word space coding, the spaces between words are altered to embed watermark code. In line space coding the space between the lines are altered and in character coding some of the characters are imperceptibly modified (i.e., made larger, serifs enhanced, etc).
  • 23. Applications of Digital Watermarking Copy Protection  Content Authentication  Copyright Protection  Metadata Tagging 
  • 24. Copy Protection  It limits the access to copyrighted material and inhibit the copy process
  • 25. Content Authentication  Robust watermarks are used in this area Example:-A photographic information that may be presented as evidence in court. Since digital images can be easily manipulated, there is a need to provide proof that an image has not been altered.
  • 27. Copyright Protection  One of the main application  Embedding watermarks in digital photographs
  • 28. Metadata Tagging  Watermarks convey object specific information to users of the object.  Used to attach patient identification data to medical images, or to highlight regions of diagnostic significance.
  • 30. Stirmark     It is tool developed to test the robustness of image marking system Stirmark is commonly produced by printers and scanners IBM researchers have recently announced a technique that defeats the stir mark attack. Detects and measures the geometric distortions in images, and removes the distortion to restore image geometry
  • 32. Mosaic Attack Use of a web crawler  Dividing into sub images with rendition instructions  Browser will be rearranging the sub images to appear as the original  Sub images will be sufficiently small that no single image on its own will contain a recognizable mark. 
  • 34. Conclusion  DRM systems and content management are important for protection of rights of digital multimedia creations that are distributed on the Internet. Digital watermarking is an effective technique for embedding rights information in digital multimedia data.  Digital watermark technology can be used in consumer electronic devices like digital still camera, digital video camera, DVD players, MP3 players, etc., for various applications like providing controlled access, preventing illegal replication and watermark embedding
  • 35. Conclusion (Contd..)  Digital information can easily be disseminated and copied via global networks.  The future of digital watermarking relies on setting standards and creating applications so that creators of digital content can easily implement it.