SlideShare ist ein Scribd-Unternehmen logo
1 von 22
DIGITAL

WATERMARKING
Contents

   What is DWM ?

   Applications

   Classification

   Working

   Attacks

   Advantages and Disadvantages

   Techniques
Digital Watermarking

   We add ‘Visible’ or ‘Invisible’ structure called ‘Watermarks’
    to digital media. The process of adding watermarks is called
    ‘Digital Watermarking’.

   Adaptation of Paper Watermarks.

   Describes methods and technologies that allow to hide/embed
    various types of information to digital document.

   In general Digital Watermarking means “Author Signature”.
Applications

   Copyright Protection

   Owner Identification

   Content Authentification

   Proof of Ownership
Classification

   Perceptible Watermarks and Imperceptible Watermarks

   Robust Watermarks and Fragile Watermarks

   Private Watermarks and Public Watermarks
Classification (contd.)

   Perceptible Watermarks and Imperceptible Watermarks

   Perceptible Watermarks are visible to human eye

   Useful for primary Applications.
       E.g. of watermark in a video
       E.g.. Of watermark in a image

   Imperceptible watermarks are Invisible to human eye.

   Used in the places where the content being watermarked must
    appear in unchanged form.

   Remains hidden in content and can be detected only by authorized
    agencies.
Classification (contd.)

   Robust Watermarks and Fragile Watermarks

   Degree to which watermarks can withstand any modification of any
    type (Accidental or Intentional ).

   Robust Watermarks are difficult to remove from the object in which
    they are embedded.

   Perceptible Watermarks are more Robust.

   Fragile Watermarks can be easily destroyed by any attempt to
    temper with them.
Classification (contd.)

   Private Watermarks and Public Watermarks

   Private Watermark requires at least original data to recover
    watermark.

   They are also known as ‘Secure Watermarks’.

   Public Watermark requires neither original data nor embedded
    watermark to recover watermark information.
Working

   Typical DWM system consists of mainly 3 parts / process

   Watermark Insertion
   Watermark Extraction
   Watermark Detection
A Generic Watermarking System



   Cover Work




                    Watermarked                  Detected
   Watermark                      Watermark
                                                Watermark
   Embedder            Work        Detector
                                                 Message




Watermark Message
User Key
                                         Watermarked
 Input Image      Watermark Insertion
                                            Image

  Watermark


    User Key
                                         Extracted
                  Watermark Extraction
 Watermarked                             Watermark
    Image



    User Key

Watermarked                                Decision
                  Watermark Detection
   Image                                 ( Yes or No )

   Specified ID
 ( Watermark )
General Digital Watermarking Process

(a) Watermark Embedding



                   Digital Watermark
                     0101 …. . . .. . .

 Original Data                            Watermarked Data


                       Embedding
                       Algorithm              0101 …. .

                                                             Distribution
General Digital Watermarking Process (contd.)

(b) Watermark Extraction



                       Original
                        Data

Watermarked Data
                                     Extracted Watermark

                       Extraction
  0101 …. .                            0101 …. . . .. . .
                       Algorithm
Attacks

   Mosaic Attack

   Stir mark Attack

   Geometric Attack
       Subtractive
       Distortive

   Forgery Attack
Attacks (contd.)

Mosaic Attack
Attacks (contd.)

Stirmark
Attacks (contd.)

   Geometric Attack

   Subtractive Attack involves ‘removing’ the mark by cropping or
    digital editing.

   Distortive Attack attempts to make some ‘uniform distortive
    changes’ in the image such that mark becomes ‘unrecognizable’.
Attacks (contd.)

   Forgery Attack

   Also known as ‘Additive Attack’.

   The attacker include his/her own watermark overlaying the original
    image and marking the content as their own.
Advantages

   Uniquely identifies the author of copyrighted work.

   Implementation on PC platform is possible.

   Embedding watermark is easy

   Image Tampering Detection
Disadvantages

   Watermarking doesn’t prevent image copying but we can track
    down and detect ownership of copied images.

   Watermarks vanishes if someone manipulates the image.

   Resizing, compressing images from one file type to another
    may diminish the watermark and it becomes unreadable.
DWM Techniques

   Image Domain Encoding

   Also known as Least Significant Bit (LSB).

   LSB works by reducing the no of colors used by image itself and
    uses the rest of the palette to encode the information.

   If the colors in an image are less then more information can be
    stored without quality loss.
Thank you


 Question ??

Weitere ähnliche Inhalte

Was ist angesagt?

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingGovind Raj
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
Watermark
WatermarkWatermark
Watermarkravi33s
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingrupareliab14
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detectionncct
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesPrashant Singh
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingNawin Kumar Sharma
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Steganography
SteganographySteganography
Steganographysandeipz
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessingQaisar Ayub
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data Sanjay Bhoyar
 

Was ist angesagt? (20)

Watermark
WatermarkWatermark
Watermark
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Watermark
WatermarkWatermark
Watermark
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarking
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
The Audio watermarking
The Audio watermarkingThe Audio watermarking
The Audio watermarking
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data
 

Andere mochten auch

Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
 
Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarkingJasni Zain
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Digital Image Watermarking
Digital Image WatermarkingDigital Image Watermarking
Digital Image WatermarkingPralin Pavithran
 
Final bluejacking
Final bluejackingFinal bluejacking
Final bluejackingRahul Raj
 
iOS advanced architecture workshop 3h edition
iOS advanced architecture workshop 3h editioniOS advanced architecture workshop 3h edition
iOS advanced architecture workshop 3h editionJorge Ortiz
 
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...IDES Editor
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
 
P 9 Killer Halftone Effect
P 9  Killer Halftone EffectP 9  Killer Halftone Effect
P 9 Killer Halftone Effectsumidahilo
 

Andere mochten auch (13)

Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarking
 
Vidhi's ppt
Vidhi's pptVidhi's ppt
Vidhi's ppt
 
Steganography
Steganography Steganography
Steganography
 
Digital Image Watermarking
Digital Image WatermarkingDigital Image Watermarking
Digital Image Watermarking
 
Final bluejacking
Final bluejackingFinal bluejacking
Final bluejacking
 
60 312-318
60 312-31860 312-318
60 312-318
 
Digital Water marking
Digital Water markingDigital Water marking
Digital Water marking
 
iOS advanced architecture workshop 3h edition
iOS advanced architecture workshop 3h editioniOS advanced architecture workshop 3h edition
iOS advanced architecture workshop 3h edition
 
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
P 9 Killer Halftone Effect
P 9  Killer Halftone EffectP 9  Killer Halftone Effect
P 9 Killer Halftone Effect
 

Ähnlich wie Digital Watermarking

A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniquestheijes
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageIOSR Journals
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfMekalaSamayochitha
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET Journal
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
 
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...IDES Editor
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsYogeshIJTSRD
 
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...cscpconf
 

Ähnlich wie Digital Watermarking (20)

A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdf
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud Computing
 
Ki2417591763
Ki2417591763Ki2417591763
Ki2417591763
 
50120130406038
5012013040603850120130406038
50120130406038
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and Applications
 
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
 

Kürzlich hochgeladen

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Digital Watermarking

  • 2. Contents  What is DWM ?  Applications  Classification  Working  Attacks  Advantages and Disadvantages  Techniques
  • 3. Digital Watermarking  We add ‘Visible’ or ‘Invisible’ structure called ‘Watermarks’ to digital media. The process of adding watermarks is called ‘Digital Watermarking’.  Adaptation of Paper Watermarks.  Describes methods and technologies that allow to hide/embed various types of information to digital document.  In general Digital Watermarking means “Author Signature”.
  • 4. Applications  Copyright Protection  Owner Identification  Content Authentification  Proof of Ownership
  • 5. Classification  Perceptible Watermarks and Imperceptible Watermarks  Robust Watermarks and Fragile Watermarks  Private Watermarks and Public Watermarks
  • 6. Classification (contd.)  Perceptible Watermarks and Imperceptible Watermarks  Perceptible Watermarks are visible to human eye  Useful for primary Applications. E.g. of watermark in a video E.g.. Of watermark in a image  Imperceptible watermarks are Invisible to human eye.  Used in the places where the content being watermarked must appear in unchanged form.  Remains hidden in content and can be detected only by authorized agencies.
  • 7. Classification (contd.)  Robust Watermarks and Fragile Watermarks  Degree to which watermarks can withstand any modification of any type (Accidental or Intentional ).  Robust Watermarks are difficult to remove from the object in which they are embedded.  Perceptible Watermarks are more Robust.  Fragile Watermarks can be easily destroyed by any attempt to temper with them.
  • 8. Classification (contd.)  Private Watermarks and Public Watermarks  Private Watermark requires at least original data to recover watermark.  They are also known as ‘Secure Watermarks’.  Public Watermark requires neither original data nor embedded watermark to recover watermark information.
  • 9. Working  Typical DWM system consists of mainly 3 parts / process  Watermark Insertion  Watermark Extraction  Watermark Detection
  • 10. A Generic Watermarking System Cover Work Watermarked Detected Watermark Watermark Watermark Embedder Work Detector Message Watermark Message
  • 11. User Key Watermarked Input Image Watermark Insertion Image Watermark User Key Extracted Watermark Extraction Watermarked Watermark Image User Key Watermarked Decision Watermark Detection Image ( Yes or No ) Specified ID ( Watermark )
  • 12. General Digital Watermarking Process (a) Watermark Embedding Digital Watermark 0101 …. . . .. . . Original Data Watermarked Data Embedding Algorithm 0101 …. . Distribution
  • 13. General Digital Watermarking Process (contd.) (b) Watermark Extraction Original Data Watermarked Data Extracted Watermark Extraction 0101 …. . 0101 …. . . .. . . Algorithm
  • 14. Attacks  Mosaic Attack  Stir mark Attack  Geometric Attack  Subtractive  Distortive  Forgery Attack
  • 17. Attacks (contd.)  Geometric Attack  Subtractive Attack involves ‘removing’ the mark by cropping or digital editing.  Distortive Attack attempts to make some ‘uniform distortive changes’ in the image such that mark becomes ‘unrecognizable’.
  • 18. Attacks (contd.)  Forgery Attack  Also known as ‘Additive Attack’.  The attacker include his/her own watermark overlaying the original image and marking the content as their own.
  • 19. Advantages  Uniquely identifies the author of copyrighted work.  Implementation on PC platform is possible.  Embedding watermark is easy  Image Tampering Detection
  • 20. Disadvantages  Watermarking doesn’t prevent image copying but we can track down and detect ownership of copied images.  Watermarks vanishes if someone manipulates the image.  Resizing, compressing images from one file type to another may diminish the watermark and it becomes unreadable.
  • 21. DWM Techniques  Image Domain Encoding  Also known as Least Significant Bit (LSB).  LSB works by reducing the no of colors used by image itself and uses the rest of the palette to encode the information.  If the colors in an image are less then more information can be stored without quality loss.