SlideShare ist ein Scribd-Unternehmen logo
1 von 17
CONTENTS
Background
Terminology
Characteristics
Applications
Techniques
References
Information Hiding
Information Hiding…..started with

Steganography (art of hidden writing):
The art and science of writing hidden messages in
such a way that no one apart from the intended
recipient knows of the existence of the message.
The existence of information is secret.
What is a watermark ?
What is a watermark ? A distinguishing mark
impressed on paper during manufacture;
visible when paper is held up to the light (e.g.
$ Bill)
What is a watermark ?
Digital Watermarking: Application of Information
hiding (Hiding Watermarks in digital Media, such
as images,audio file)
Digital Watermarking is a process of embedding
digital signals or pattern into a multimedia object
without affecting in any way the quality of the
original file.
CHARACTERISTICS


Transparency: watermark is not detectable



Robustness: survives digital processing (e.g., compression) and
malicious analytical attacks.



Efficiency: low cost implementation using minimal resources



Independence: of both the type and format of multimedia data (e.g.,
music, speech, video, sample rates, coding scheme, ...)
Applications
Copyright Protecton:To prove the ownership
of digital media

Eg. Cut paste of images

Hidden Watermarks represent
the copyright information
Applications
Tamper proofing: To find out if data was tampered.

Eg. Change meaning of images

Hidden Watermarks track
change in meaning
Applications
Quality Assessment: Degradation of Visual Quality

Loss of Visual Quality

Hidden Watermarks track change in visual quality
Watermarking Process
Data (D), Watermark (W), Stego Key (K),

Watermarked Data (Dw)

Embed (D, W, K) = Dw
Extract (Dw) = W’ and compare with W
Watermarking Process
Figure 2 shows the basic scheme of the
watermarks embedding systems.

Figure 2: Watermark embedding scheme

Inputs to the scheme are the watermark, the
cover data and an optional public or secret key.
The output are watermarked data. The key is
used to enforce security.
Watermarking Process
Figure 3 shows the basic scheme for
watermark recovery system.

Figure 3: Watermark recovery scheme

Inputs to the scheme are the watermarked data, the
secret or public key and, depending on the method,
the original data and/or the original watermark.
The output is the recovered watermarked W or some
kind of confidence measure indicating how likely it
is for the given watermark at the input to be present
in the data under inspection.
TYPES OF WATERMARKING SCHEMES
Private (non-blind) watermarking systems use the original
cover-data to extract the watermark from stego-data and
use original cover-data to determine where the watermark is.
Extract using {D, K, W}
Semi-private (semi-blind) watermarking does not use the
original cover-data for detection, but tries to answer the
same question. (Potential application of blind and semiblind watermarking is for evidence in court ownership,....)
Extract using { K, W}
Public (blind) watermarking - neither cover-data nor
embedded watermarks are required for extraction - this is
the most challenging problem.
Extract using {K}
ATTACKS ON DIGITAL WATERMARKING:
•Active Attacks – hacker tries to remove the watermark or

make it undetectable. An example is to crop it out.
•Passive Attacks – hacker tries to determine whether there is a
watermark and identify it. However, no damage or removal is
done.
•Forgery Attacks – hacker tries to embed a valid watermark of
their own rather than remove one.
•Decorative Attacks – hacker applies some distorted
transformation uniformly over the object in order to degrade
the watermark so that it becomes undetectable / unreadable.
Security
In case the key used during watermark is lost anyone

can read the watermark and remove it.

In case the watermark is public, it can be encoded

and copyright information is lost.
References
http://en.wikipedia.org/wiki/Steganography

http://en.wikipedia.org/wiki/Digital_watermark

http://www.cypak.com/pictures/med/Cypak
Digital watermarking

Weitere ähnliche Inhalte

Was ist angesagt?

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingrupareliab14
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applicationsKannekanti Utthej
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology vijay rastogi
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
 
Watermark
WatermarkWatermark
Watermarkravi33s
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniquesprashant3535
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 

Was ist angesagt? (20)

Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Watermark
WatermarkWatermark
Watermark
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Watermark
WatermarkWatermark
Watermark
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 
digital steganography
digital steganographydigital steganography
digital steganography
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 

Andere mochten auch

12205451 pss7
12205451 pss712205451 pss7
12205451 pss7yuti_3011
 
TLA Presentation on QR-codes
TLA Presentation on QR-codesTLA Presentation on QR-codes
TLA Presentation on QR-codesDustin Haisler
 
QR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearningQR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearningGraham Clark
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubimishrasubrat
 
2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?Delvinia
 
10 Things Money Can´t Buy
10 Things Money Can´t Buy10 Things Money Can´t Buy
10 Things Money Can´t BuyAbhishek Shah
 
Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Arif Ahmed
 
Qrcodequickresponsecode presentation
Qrcodequickresponsecode presentationQrcodequickresponsecode presentation
Qrcodequickresponsecode presentationUmsh23
 
Artikel Pt Industrieel Management Maart 2011
Artikel Pt Industrieel Management Maart 2011Artikel Pt Industrieel Management Maart 2011
Artikel Pt Industrieel Management Maart 2011Henk Wiersema
 
Method of solving multi objective optimization problem in the presence of unc...
Method of solving multi objective optimization problem in the presence of unc...Method of solving multi objective optimization problem in the presence of unc...
Method of solving multi objective optimization problem in the presence of unc...eSAT Journals
 
Final year ece projects in vijayawada
Final year ece projects in vijayawadaFinal year ece projects in vijayawada
Final year ece projects in vijayawadaThirumal Krishnan
 
Laymans Guide To Multi Obj Opt[1]
Laymans Guide To Multi Obj Opt[1]Laymans Guide To Multi Obj Opt[1]
Laymans Guide To Multi Obj Opt[1]rogerbeatty
 

Andere mochten auch (18)

Vidhi's ppt
Vidhi's pptVidhi's ppt
Vidhi's ppt
 
QR Code Introduction
QR Code IntroductionQR Code Introduction
QR Code Introduction
 
12205451 pss7
12205451 pss712205451 pss7
12205451 pss7
 
TLA Presentation on QR-codes
TLA Presentation on QR-codesTLA Presentation on QR-codes
TLA Presentation on QR-codes
 
QR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearningQR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearning
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubi
 
2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?
 
QR code
QR codeQR code
QR code
 
10 Things Money Can´t Buy
10 Things Money Can´t Buy10 Things Money Can´t Buy
10 Things Money Can´t Buy
 
Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....
 
60 312-318
60 312-31860 312-318
60 312-318
 
Digital Water marking
Digital Water markingDigital Water marking
Digital Water marking
 
Qrcodequickresponsecode presentation
Qrcodequickresponsecode presentationQrcodequickresponsecode presentation
Qrcodequickresponsecode presentation
 
Artikel Pt Industrieel Management Maart 2011
Artikel Pt Industrieel Management Maart 2011Artikel Pt Industrieel Management Maart 2011
Artikel Pt Industrieel Management Maart 2011
 
Method of solving multi objective optimization problem in the presence of unc...
Method of solving multi objective optimization problem in the presence of unc...Method of solving multi objective optimization problem in the presence of unc...
Method of solving multi objective optimization problem in the presence of unc...
 
major 2
major 2major 2
major 2
 
Final year ece projects in vijayawada
Final year ece projects in vijayawadaFinal year ece projects in vijayawada
Final year ece projects in vijayawada
 
Laymans Guide To Multi Obj Opt[1]
Laymans Guide To Multi Obj Opt[1]Laymans Guide To Multi Obj Opt[1]
Laymans Guide To Multi Obj Opt[1]
 

Ähnlich wie Digital watermarking

Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingNawin Kumar Sharma
 
Digital water marking
Digital water markingDigital water marking
Digital water markingMd Aktar
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyAlexander Decker
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
Cryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking AlgorithmCryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking AlgorithmCSCJournals
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio SignalsGufran karim
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYIRJET Journal
 
Secure communication
Secure communicationSecure communication
Secure communicationTushar Swami
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000authority12
 
digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfMekalaSamayochitha
 

Ähnlich wie Digital watermarking (20)

Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarking
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
Dz31840846
Dz31840846Dz31840846
Dz31840846
 
Cryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking AlgorithmCryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking Algorithm
 
50120130406038
5012013040603850120130406038
50120130406038
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio Signals
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
Secure communication
Secure communicationSecure communication
Secure communication
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdf
 

Mehr von Govind Raj

INFRA_PPP_FewControl points for growth.ppt
INFRA_PPP_FewControl points for growth.pptINFRA_PPP_FewControl points for growth.ppt
INFRA_PPP_FewControl points for growth.pptGovind Raj
 
Project and Infrastructure Finance slides Module1_Ver3.ppt
Project and Infrastructure Finance slides Module1_Ver3.pptProject and Infrastructure Finance slides Module1_Ver3.ppt
Project and Infrastructure Finance slides Module1_Ver3.pptGovind Raj
 
Automation Anxiety
Automation AnxietyAutomation Anxiety
Automation AnxietyGovind Raj
 
Optical Camouflage
Optical CamouflageOptical Camouflage
Optical CamouflageGovind Raj
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technologyGovind Raj
 
Blu ray technology
Blu ray technologyBlu ray technology
Blu ray technologyGovind Raj
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing Govind Raj
 

Mehr von Govind Raj (12)

INFRA_PPP_FewControl points for growth.ppt
INFRA_PPP_FewControl points for growth.pptINFRA_PPP_FewControl points for growth.ppt
INFRA_PPP_FewControl points for growth.ppt
 
Project and Infrastructure Finance slides Module1_Ver3.ppt
Project and Infrastructure Finance slides Module1_Ver3.pptProject and Infrastructure Finance slides Module1_Ver3.ppt
Project and Infrastructure Finance slides Module1_Ver3.ppt
 
Automation Anxiety
Automation AnxietyAutomation Anxiety
Automation Anxiety
 
Webcrawler
Webcrawler Webcrawler
Webcrawler
 
Smartquill
SmartquillSmartquill
Smartquill
 
Wibree
Wibree Wibree
Wibree
 
Android ppt
Android pptAndroid ppt
Android ppt
 
Optical Camouflage
Optical CamouflageOptical Camouflage
Optical Camouflage
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
 
Blu ray technology
Blu ray technologyBlu ray technology
Blu ray technology
 
Wordnet
WordnetWordnet
Wordnet
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
 

Kürzlich hochgeladen

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Kürzlich hochgeladen (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Digital watermarking

  • 1.
  • 3. Information Hiding Information Hiding…..started with Steganography (art of hidden writing): The art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. The existence of information is secret.
  • 4. What is a watermark ? What is a watermark ? A distinguishing mark impressed on paper during manufacture; visible when paper is held up to the light (e.g. $ Bill)
  • 5. What is a watermark ? Digital Watermarking: Application of Information hiding (Hiding Watermarks in digital Media, such as images,audio file) Digital Watermarking is a process of embedding digital signals or pattern into a multimedia object without affecting in any way the quality of the original file.
  • 6. CHARACTERISTICS  Transparency: watermark is not detectable  Robustness: survives digital processing (e.g., compression) and malicious analytical attacks.  Efficiency: low cost implementation using minimal resources  Independence: of both the type and format of multimedia data (e.g., music, speech, video, sample rates, coding scheme, ...)
  • 7. Applications Copyright Protecton:To prove the ownership of digital media Eg. Cut paste of images Hidden Watermarks represent the copyright information
  • 8. Applications Tamper proofing: To find out if data was tampered. Eg. Change meaning of images Hidden Watermarks track change in meaning
  • 9. Applications Quality Assessment: Degradation of Visual Quality Loss of Visual Quality Hidden Watermarks track change in visual quality
  • 10. Watermarking Process Data (D), Watermark (W), Stego Key (K), Watermarked Data (Dw) Embed (D, W, K) = Dw Extract (Dw) = W’ and compare with W
  • 11. Watermarking Process Figure 2 shows the basic scheme of the watermarks embedding systems. Figure 2: Watermark embedding scheme Inputs to the scheme are the watermark, the cover data and an optional public or secret key. The output are watermarked data. The key is used to enforce security.
  • 12. Watermarking Process Figure 3 shows the basic scheme for watermark recovery system. Figure 3: Watermark recovery scheme Inputs to the scheme are the watermarked data, the secret or public key and, depending on the method, the original data and/or the original watermark. The output is the recovered watermarked W or some kind of confidence measure indicating how likely it is for the given watermark at the input to be present in the data under inspection.
  • 13. TYPES OF WATERMARKING SCHEMES Private (non-blind) watermarking systems use the original cover-data to extract the watermark from stego-data and use original cover-data to determine where the watermark is. Extract using {D, K, W} Semi-private (semi-blind) watermarking does not use the original cover-data for detection, but tries to answer the same question. (Potential application of blind and semiblind watermarking is for evidence in court ownership,....) Extract using { K, W} Public (blind) watermarking - neither cover-data nor embedded watermarks are required for extraction - this is the most challenging problem. Extract using {K}
  • 14. ATTACKS ON DIGITAL WATERMARKING: •Active Attacks – hacker tries to remove the watermark or make it undetectable. An example is to crop it out. •Passive Attacks – hacker tries to determine whether there is a watermark and identify it. However, no damage or removal is done. •Forgery Attacks – hacker tries to embed a valid watermark of their own rather than remove one. •Decorative Attacks – hacker applies some distorted transformation uniformly over the object in order to degrade the watermark so that it becomes undetectable / unreadable.
  • 15. Security In case the key used during watermark is lost anyone can read the watermark and remove it. In case the watermark is public, it can be encoded and copyright information is lost.