CSE digital Watermarking report

26
Presented by: M.DIVYASRI Roll No:13701A0518

Transcript of CSE digital Watermarking report

Page 1: CSE digital Watermarking report

DIGITAL WATERMARKING

Presented by: M.DIVYASRI Roll No:13701A0518

Page 2: CSE digital Watermarking report
Page 3: CSE digital Watermarking report

ContentsIntroductionHistoryTypes of watermarkAttributes associated with watermarking Techniques ApplicationsAdvantagesDisadvantagesConclusionReferences

Page 4: CSE digital Watermarking report

IntroductionA digital watermark is a message which is embedded

into digital content (video, images or text) that can be detected or extracted later.

Digital Watermarking describes methods and technologies that hide information.

Image Video Audio

Page 5: CSE digital Watermarking report

General Watermarking

Procedure

Page 6: CSE digital Watermarking report

History More than 700 years ago, watermarks were used in

Italy to indicate the paper brand and the mill that produced it.

The term watermark was introduced near the end of the 18th century. It was probably given because the marks resemble the effects of water on paper.

In 1988, Komatsu and Tominaga appear to be the first to use the term “digital watermarking”.

Page 7: CSE digital Watermarking report

Types of Watermark

VisibleInvisiblePublicFragile

Page 8: CSE digital Watermarking report

Visible watermarkVisible watermark is a translucent overlaid

into an image and is visible to the viewer. Visible watermarking is used to indicate ownership and for copyright protection.

Original image Watermarked image

Page 9: CSE digital Watermarking report

Invisible WatermarkAn invisible watermarked image appears very

similar to the original. The existence of an invisible watermark can only be determined using an appropriate watermark extraction or detection algorithm.

Original image watermarked image

Page 10: CSE digital Watermarking report

Public WatermarkPublic watermark such a watermark

can be read or retrieved by anyone using the specialized algorithm.

Page 11: CSE digital Watermarking report

Fragile WatermarkFragile watermarks are also

known as tamperproof watermarks. Such watermarks are destroyed by data manipulation

Page 12: CSE digital Watermarking report

Attributes Associated With Watermarking

Imperceptibility Robustness Security Complexity Verification

Page 13: CSE digital Watermarking report

Watermarking Techniques

Watermarking for text Word space coding Line shift coding

Page 14: CSE digital Watermarking report

Watermarking Techniques…

Watermarking for text Feature coding

Page 15: CSE digital Watermarking report

Watermarking Techniques… watermarking for images

spatial domain watermarking Frequency domain watermarking

Page 16: CSE digital Watermarking report

AttacksRobustness attacks :Which are intended to remove the

watermark such as… JPEG compression, cropping, etc.

Presentation Attacks :Under watermark detection failure they come into play. Geometric transformation, rotation, scaling, translation, change aspect ratio, affine transformation etc.

Counterfeiting attacks :Rendering the original image, generate fake original.

Page 17: CSE digital Watermarking report

Attacks on watermarked image

Page 18: CSE digital Watermarking report

Detection of watermarksIt needs to be emphasized that a watermark can be

defeated in two ways – one, by removing the watermark from the original data and two, by proving it to be unreliable i.e. identifying a watermark when there is none.

Page 19: CSE digital Watermarking report

ApplicationsCopy prevention or control In the field of data security

Page 20: CSE digital Watermarking report

Applications………Tampering with images

Page 21: CSE digital Watermarking report

Embedded watermark is easy Higher level of security Digital Watermarking is non-restrictive

only misuse is detectable and traceable.

Implementation on pc platform is possible Uniquely identifies author

Advantages

Page 22: CSE digital Watermarking report

Disadvantages Visible watermark can be easily removed. Some watermarks vanish if some one manipulates

the image in a program like photoshop. Resizing , compression and converting images from

one file to another may add noise to an image. Owners can erase the mark

Page 23: CSE digital Watermarking report

Conclusion The large need of networked multimedia system has

created the need of copy right protection .so, it is very important to protect intellectual properties of digital media . For this DIGITAL WATERMARKING is the great solution for the protection of legal rights of digital content.

Page 24: CSE digital Watermarking report

Referenceswww.ieeexplore.ieee.orgwww.watermarkingworld.comwww.wikipedia.com

Page 25: CSE digital Watermarking report
Page 26: CSE digital Watermarking report

Any Queries