SlideShare une entreprise Scribd logo
1  sur  23
1
Outline
  Introduction, Applications
  Characteristics and classification
  Popular techniques for watermarking




                                         2
Definition: A digital watermark is a
digital signal or pattern inserted into a
digital document such as text, graphics
or multimedia, and carries information
unique to the copyright owner, the
creator of the document or the
authorized consumer.


                                            3
Example




          4
Watermarking Vs Encryption
 Encryption involves document transformation so that
  the contents of the document are not visible without
  a decryption key
 Watermarking leaves the original file/image intact
  and recognizable




                                                         5
6
Digital Watermarking Applications
 Ownership Assertion
    ‘A’ uses a private key to generate a watermark and embeds it in the
     document
    ‘A’ makes the watermarked image publicly available
    ‘B’ claims that he owns the image derived from the public image
    ‘A’ produces the unmarked original and establishes the presence of ‘A’s
     watermark

 Fingerprinting
    Used to avoid unauthorized duplication and distribution.
    A distinct watermark (a fingerprint) is embedded in each copy of the data.
    If unauthorized copies are found, the origin of the copy can be determined
     by retrieving the fingerprint.



                                                                                  7
Digital Watermarking Applications (2)
 Authentication & integrity verification
    Watermarks should be able to detect even the slightest
     change in the document.
    A unique key associated with the source is used the
     create the watermark and then embed in the document.
    This key is then used to extract the watermark and the
     integrity of the document verified on the basis of the
     integrity of the watermark.




                                                              8
Digital Watermarking Applications (3)
 Content labeling
    Bits embedded in the data, comprise an annotation,
     giving some more information about the data.
    Digital cameras annotate images with the time and
     date, when the photograph was taken.
    Medical imaging machines annotate images (X-Rays)
     with patients name, ID.




                                                          9
Digital Watermarking Applications (4)
 Usage control & Copy protection
    Digital watermark inserted to indicate the number of
     copies permitted.
    Every time a copy is made the hardware modifies the
     watermark and at the same time it would not create any
     more copies of the data.
    Commonly used in DVD technology.
 Content Protection
    Content owner might want to publicly and freely
     provide a preview of multimedia content being sold.
    To make the preview commercially useless, content is
     stamped with visible watermarks.

                                                          10
Characteristics of Digital Watermarks
  Readily Detectable: the data owner or an independent control authority
   should easily detect it.
  Unambiguous: retrieval of it should unambiguously identify the data
   owner.
  Robust: difficult to remove for an attacker, who would like to
   destroy it in order to counterfeit the copyright of the data.
   Moreover, removal of it should cause a considerable degradation
   in the quality of the data.
  Visible watermarks should be visible enough to discourage theft.




                                                                            11
Digital Watermark
Classification
 Based on visibility of watermarks
  - Visible Watermarks

  - Invisible Watermarks

 Based on the content to be watermarked
  - Text Watermarking

  - Image, Audio, Video Watermarking


                                           12
Techniques for Texts

Text Line Coding: Change the spacing
between lines.
Word-shift Coding: Change the spacing
between words.
Character Encoding: Alter the shapes of
characters.


                                          13
14
Word-shift coding example




                            15
Easily defeated…
  Retyping the text destroys the watermark
  Word processors change the spacing between
   words and lines
  Character encoding can be defeated by changing
   the font




                                                    16
Techniques for Images
  Spatial Watermarking: Just change some of the values of the
   pixels in the lower bit plane; e.g., Change some of the bits from 1
   to 0 or 0 to 1.
  Frequency Domain Watermarking: First convert the image to the
   frequency domain and then apply the watermark in the low
   frequency regions.




                                                                         17
Checksum Technique for images
 Watermark is formed from the 7 most significant bits of each pixel.
 Eight 7-bit segments (from eight different pixels) are concatenated
  and the final checksum is thus 56-bit.
 Locations of the pixels that are to contain one bit each of the
  checksum are randomly chosen.
 These pixel locations along with the checksum form the watermark,
  W.
 Last bit of each pixel is then changed to the corresponding checksum
  bit.




                                                                         18
19
Bavarian couple




Original      Watermarked Version

                                    20
Advantages/Disadvantages
 Embedding the checksum only changes (on average) half the number
    of pixel. So less visual distortion.
   Can hold multiple watermarks as long as they don’t overlap.
   Extremely simple and fast.
   Extremely fragile. Any change to the checksum causes the failure of
    the verification procedure.
   Forger could replace a section with another one of equal size and
    checksum.
   Entire watermark can be removed by removing the LSB plane. Can’t
    survive lossy compression.




                                                                          21
Conclusion
 First generation of copyright marking schemes is not
  strong enough
 Existing schemes provide only limited measures of
  marking
 Can only meet few requirements at a time
   Tradeoff - Bandwidth vs. robustness
   No single problem but a constellation!
 Real problem: watermark restoration



                                                         22
Q&A

      23

Contenu connexe

Tendances

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingGovind Raj
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingrupareliab14
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applicationsKannekanti Utthej
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesPrashant Singh
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingNawin Kumar Sharma
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detectionncct
 
Steganography
SteganographySteganography
Steganographysandeipz
 
Survey on Deep Neural Network Watermarking techniques
Survey on Deep Neural Network Watermarking techniquesSurvey on Deep Neural Network Watermarking techniques
Survey on Deep Neural Network Watermarking techniquesPrincy Joy
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 

Tendances (20)

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarking
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Steganography
SteganographySteganography
Steganography
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Steganography
SteganographySteganography
Steganography
 
Info hiding
Info hidingInfo hiding
Info hiding
 
Chapter3
Chapter3Chapter3
Chapter3
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Survey on Deep Neural Network Watermarking techniques
Survey on Deep Neural Network Watermarking techniquesSurvey on Deep Neural Network Watermarking techniques
Survey on Deep Neural Network Watermarking techniques
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 

En vedette

Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessingQaisar Ayub
 
Ready to Rise! Watermark Webinar August 2016
Ready to Rise! Watermark Webinar August 2016 Ready to Rise! Watermark Webinar August 2016
Ready to Rise! Watermark Webinar August 2016 Wendy Wallbridge
 
Hardware implementation of 3 d dct compressed and digitally watermarked video
Hardware implementation of 3 d dct compressed and digitally watermarked videoHardware implementation of 3 d dct compressed and digitally watermarked video
Hardware implementation of 3 d dct compressed and digitally watermarked videoIAEME Publication
 
RNS sample student projects
RNS sample student projectsRNS sample student projects
RNS sample student projectsuvcsdms
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubimishrasubrat
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710BioEnable
 
FPL15 talk: Deep Convolutional Neural Network on FPGA
FPL15 talk: Deep Convolutional Neural Network on FPGAFPL15 talk: Deep Convolutional Neural Network on FPGA
FPL15 talk: Deep Convolutional Neural Network on FPGAHiroki Nakahara
 
Nested RNSを用いたディープニューラルネットワークのFPGA実装
Nested RNSを用いたディープニューラルネットワークのFPGA実装Nested RNSを用いたディープニューラルネットワークのFPGA実装
Nested RNSを用いたディープニューラルネットワークのFPGA実装Hiroki Nakahara
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 

En vedette (16)

Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
digital steganography
digital steganographydigital steganography
digital steganography
 
Justlook presentation
Justlook presentationJustlook presentation
Justlook presentation
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Ready to Rise! Watermark Webinar August 2016
Ready to Rise! Watermark Webinar August 2016 Ready to Rise! Watermark Webinar August 2016
Ready to Rise! Watermark Webinar August 2016
 
Hardware implementation of 3 d dct compressed and digitally watermarked video
Hardware implementation of 3 d dct compressed and digitally watermarked videoHardware implementation of 3 d dct compressed and digitally watermarked video
Hardware implementation of 3 d dct compressed and digitally watermarked video
 
RNS sample student projects
RNS sample student projectsRNS sample student projects
RNS sample student projects
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubi
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recogntion
Face recogntionFace recogntion
Face recogntion
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)
 
FPL15 talk: Deep Convolutional Neural Network on FPGA
FPL15 talk: Deep Convolutional Neural Network on FPGAFPL15 talk: Deep Convolutional Neural Network on FPGA
FPL15 talk: Deep Convolutional Neural Network on FPGA
 
Nested RNSを用いたディープニューラルネットワークのFPGA実装
Nested RNSを用いたディープニューラルネットワークのFPGA実装Nested RNSを用いたディープニューラルネットワークのFPGA実装
Nested RNSを用いたディープニューラルネットワークのFPGA実装
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 

Similaire à Watermark

A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniquestheijes
 
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...IDES Editor
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
 
Friend MTS Attacks on Subscriber Watermarking Technologies v1.2 (March 2021)
Friend MTS Attacks on Subscriber Watermarking Technologies v1.2 (March 2021)Friend MTS Attacks on Subscriber Watermarking Technologies v1.2 (March 2021)
Friend MTS Attacks on Subscriber Watermarking Technologies v1.2 (March 2021)kyLwGPEmZxenBjUJn
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...Editor IJCATR
 
Static Software Watermarking
Static Software WatermarkingStatic Software Watermarking
Static Software WatermarkingJames Hamilton
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 

Similaire à Watermark (20)

A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
B011110614
B011110614B011110614
B011110614
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
Ki2417591763
Ki2417591763Ki2417591763
Ki2417591763
 
Friend MTS Attacks on Subscriber Watermarking Technologies v1.2 (March 2021)
Friend MTS Attacks on Subscriber Watermarking Technologies v1.2 (March 2021)Friend MTS Attacks on Subscriber Watermarking Technologies v1.2 (March 2021)
Friend MTS Attacks on Subscriber Watermarking Technologies v1.2 (March 2021)
 
Iw2415551560
Iw2415551560Iw2415551560
Iw2415551560
 
50120130406038
5012013040603850120130406038
50120130406038
 
50120140504020 2
50120140504020 250120140504020 2
50120140504020 2
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...
 
Static Software Watermarking
Static Software WatermarkingStatic Software Watermarking
Static Software Watermarking
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 

Dernier

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Dernier (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Watermark

  • 1. 1
  • 2. Outline  Introduction, Applications  Characteristics and classification  Popular techniques for watermarking 2
  • 3. Definition: A digital watermark is a digital signal or pattern inserted into a digital document such as text, graphics or multimedia, and carries information unique to the copyright owner, the creator of the document or the authorized consumer. 3
  • 5. Watermarking Vs Encryption  Encryption involves document transformation so that the contents of the document are not visible without a decryption key  Watermarking leaves the original file/image intact and recognizable 5
  • 6. 6
  • 7. Digital Watermarking Applications  Ownership Assertion  ‘A’ uses a private key to generate a watermark and embeds it in the document  ‘A’ makes the watermarked image publicly available  ‘B’ claims that he owns the image derived from the public image  ‘A’ produces the unmarked original and establishes the presence of ‘A’s watermark  Fingerprinting  Used to avoid unauthorized duplication and distribution.  A distinct watermark (a fingerprint) is embedded in each copy of the data.  If unauthorized copies are found, the origin of the copy can be determined by retrieving the fingerprint. 7
  • 8. Digital Watermarking Applications (2)  Authentication & integrity verification  Watermarks should be able to detect even the slightest change in the document.  A unique key associated with the source is used the create the watermark and then embed in the document.  This key is then used to extract the watermark and the integrity of the document verified on the basis of the integrity of the watermark. 8
  • 9. Digital Watermarking Applications (3)  Content labeling  Bits embedded in the data, comprise an annotation, giving some more information about the data.  Digital cameras annotate images with the time and date, when the photograph was taken.  Medical imaging machines annotate images (X-Rays) with patients name, ID. 9
  • 10. Digital Watermarking Applications (4)  Usage control & Copy protection  Digital watermark inserted to indicate the number of copies permitted.  Every time a copy is made the hardware modifies the watermark and at the same time it would not create any more copies of the data.  Commonly used in DVD technology.  Content Protection  Content owner might want to publicly and freely provide a preview of multimedia content being sold.  To make the preview commercially useless, content is stamped with visible watermarks. 10
  • 11. Characteristics of Digital Watermarks  Readily Detectable: the data owner or an independent control authority should easily detect it.  Unambiguous: retrieval of it should unambiguously identify the data owner.  Robust: difficult to remove for an attacker, who would like to destroy it in order to counterfeit the copyright of the data. Moreover, removal of it should cause a considerable degradation in the quality of the data.  Visible watermarks should be visible enough to discourage theft. 11
  • 12. Digital Watermark Classification  Based on visibility of watermarks - Visible Watermarks - Invisible Watermarks  Based on the content to be watermarked - Text Watermarking - Image, Audio, Video Watermarking 12
  • 13. Techniques for Texts Text Line Coding: Change the spacing between lines. Word-shift Coding: Change the spacing between words. Character Encoding: Alter the shapes of characters. 13
  • 14. 14
  • 16. Easily defeated…  Retyping the text destroys the watermark  Word processors change the spacing between words and lines  Character encoding can be defeated by changing the font 16
  • 17. Techniques for Images  Spatial Watermarking: Just change some of the values of the pixels in the lower bit plane; e.g., Change some of the bits from 1 to 0 or 0 to 1.  Frequency Domain Watermarking: First convert the image to the frequency domain and then apply the watermark in the low frequency regions. 17
  • 18. Checksum Technique for images  Watermark is formed from the 7 most significant bits of each pixel.  Eight 7-bit segments (from eight different pixels) are concatenated and the final checksum is thus 56-bit.  Locations of the pixels that are to contain one bit each of the checksum are randomly chosen.  These pixel locations along with the checksum form the watermark, W.  Last bit of each pixel is then changed to the corresponding checksum bit. 18
  • 19. 19
  • 20. Bavarian couple Original Watermarked Version 20
  • 21. Advantages/Disadvantages  Embedding the checksum only changes (on average) half the number of pixel. So less visual distortion.  Can hold multiple watermarks as long as they don’t overlap.  Extremely simple and fast.  Extremely fragile. Any change to the checksum causes the failure of the verification procedure.  Forger could replace a section with another one of equal size and checksum.  Entire watermark can be removed by removing the LSB plane. Can’t survive lossy compression. 21
  • 22. Conclusion  First generation of copyright marking schemes is not strong enough  Existing schemes provide only limited measures of marking  Can only meet few requirements at a time  Tradeoff - Bandwidth vs. robustness  No single problem but a constellation!  Real problem: watermark restoration 22
  • 23. Q&A 23