SlideShare ist ein Scribd-Unternehmen logo
1 von 40
Digital Water Marking By Sheikh Qaisar Ayub Advanced Topics in Image Processing [email_address] Qaisar Ayub & Sulma Rashid
Watermark Observe  image It is intellectual property Some one may spend a lot of time And thinking to compose this image
The image has been extended by any other person now he is owner of image
How to protect image ? P roblem Solution Watermark
[object Object],[object Object],[object Object],[object Object],[object Object],Watermarked image Image without watermark Watermark
[object Object],[object Object],[object Object],Watermark
[object Object],[object Object],1. Word Document Types of Digital Watermark
[object Object],[object Object],2. On Images Types of Digital Watermark
[object Object],2. Multimedia Files Types of Digital Watermark Click  on image to Play
[object Object],[object Object],[object Object],[object Object],[object Object],Types of Digital Watermark
[object Object],Types of Digital Watermark How to implement ? Step -1 Select randomly the area of image to obtain its pixel values A=
[object Object],Types of Digital Watermark How to implement ? Step -2 Convert into its binary values B= A=
[object Object],Types of Digital Watermark How to implement ? Step -3 Form a watermarking key Watermark Key A= C= B=
[object Object],Types of Digital Watermark How to implement ? Step -4 The OR Operation is used B= D= B + C 01100101 00000011 01101000 01100100 00000001 01100101 01100110 00000010 01101000 01100111 00000000 01100111
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Types of Digital Watermark A= B= C=
Types of Digital Watermark 01100101 00000011 01101000 Encoder Key Data ENCODING Algorithm Note Watermark will not effect the composition of image
[object Object],[object Object],[object Object],Achievement
[object Object],[object Object],[object Object],Types of Digital Watermark The Answer is yes What is the function of watermark ?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Types of Digital Watermark 01101000 Extract the encoded data from image Input to Decoding Algorithm Detect watermark Algorithm 01100101
Example Extract Watermark Algorithm Watermark detected by the Algorithm and hence intellectual property can be saved.
Encoding & Decoding 01100101 00000011 01101000 Encoder Key Data ENCODING Algorithm Extract Watermark Algorithm DECODING Algorithm Communication Media 01101000
Mathematically Encoding X’ = EK (X,W) Hence X = Original Image W= watermark information being embedded K= user insertion key E= watermark insertion function X’ = Watermarked  Image Mathematically Decoding W = DK’ (X’) Hence X’ = Watermarked image K’= extraction key D= watermark extraction function W= Extracted watermarked information
[object Object],[object Object],[object Object],Achievement
Application of watermark ,[object Object]
Application of watermark Finger Print IS File save ?
Application of watermark Finger Print Data Center-01 Data Center-02 Data Center-03 Network
Application of watermark Finger Print A invalid copy is found at any location Extract the embedded figure print From file A figure print is unique value form each data center Can identify the data center
Application of watermark Embed the number of copies to be allowed for copying embed in the hardware 4 4 3 2 1 Copy not allowed Click  on image to Play
Application of watermark Fraud  Detection Data Center-01 Data Center-02 Data Center-03 Network
[object Object],Application of watermark Muhammad Ishfaque Karim Ahmad Observe ID card WHAT IS THE PROBLEM ?
[object Object],Application of watermark Muhammad Ishfaque Muhammad Ishfaque Extract name using watermarked algorithm Muhammad Ishfaque Compare the to validate ID CARD. M Jamil M.jamil M.jamil Muhammad Ishfaque
[object Object],[object Object],Achievement
[object Object],[object Object],[object Object],[object Object],Original Image Properties of Watermark Resize Rotation & Compression
[object Object],[object Object],[object Object],[object Object],Original Image Properties of Watermark Watermarked image
[object Object],[object Object],[object Object],[object Object],Properties of Watermark
[object Object],Achievement
Methods of Water Marking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Methods of Water Marking ,[object Object],[object Object],[object Object],Image:   11001010 00110101 00011010 00000000... Watermark:   01  01  10  11... Watermarked   Image: 110010 11  001100 10  00011 100  000000 11 ...
[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
Ankush Kr
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
divya sri
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
ncct
 

Was ist angesagt? (20)

digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermark
WatermarkWatermark
Watermark
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Digital Image Watermarking
Digital Image WatermarkingDigital Image Watermarking
Digital Image Watermarking
 
digital steganography
digital steganographydigital steganography
digital steganography
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 

Andere mochten auch (10)

Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
discrete wavelet transform
discrete wavelet transformdiscrete wavelet transform
discrete wavelet transform
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
 
Image processing research proposal
Image processing research proposalImage processing research proposal
Image processing research proposal
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
 
watermarking
watermarkingwatermarking
watermarking
 

Ähnlich wie Watermarking in-imageprocessing

Aw2419401943
Aw2419401943Aw2419401943
Aw2419401943
IJMER
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
10e11a0545
 
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
IDES Editor
 
Ch31354359
Ch31354359Ch31354359
Ch31354359
IJMER
 

Ähnlich wie Watermarking in-imageprocessing (20)

Vidhi's ppt
Vidhi's pptVidhi's ppt
Vidhi's ppt
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdf
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
Survey on Reversible Watermarking
Survey on Reversible Watermarking Survey on Reversible Watermarking
Survey on Reversible Watermarking
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwt
 
Aw2419401943
Aw2419401943Aw2419401943
Aw2419401943
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
HTC Developer - 2012
HTC Developer - 2012HTC Developer - 2012
HTC Developer - 2012
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarking
 
Ch31354359
Ch31354359Ch31354359
Ch31354359
 

Kürzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

Watermarking in-imageprocessing

  • 1. Digital Water Marking By Sheikh Qaisar Ayub Advanced Topics in Image Processing [email_address] Qaisar Ayub & Sulma Rashid
  • 2. Watermark Observe image It is intellectual property Some one may spend a lot of time And thinking to compose this image
  • 3. The image has been extended by any other person now he is owner of image
  • 4. How to protect image ? P roblem Solution Watermark
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Types of Digital Watermark 01100101 00000011 01101000 Encoder Key Data ENCODING Algorithm Note Watermark will not effect the composition of image
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Example Extract Watermark Algorithm Watermark detected by the Algorithm and hence intellectual property can be saved.
  • 22. Encoding & Decoding 01100101 00000011 01101000 Encoder Key Data ENCODING Algorithm Extract Watermark Algorithm DECODING Algorithm Communication Media 01101000
  • 23. Mathematically Encoding X’ = EK (X,W) Hence X = Original Image W= watermark information being embedded K= user insertion key E= watermark insertion function X’ = Watermarked Image Mathematically Decoding W = DK’ (X’) Hence X’ = Watermarked image K’= extraction key D= watermark extraction function W= Extracted watermarked information
  • 24.
  • 25.
  • 26. Application of watermark Finger Print IS File save ?
  • 27. Application of watermark Finger Print Data Center-01 Data Center-02 Data Center-03 Network
  • 28. Application of watermark Finger Print A invalid copy is found at any location Extract the embedded figure print From file A figure print is unique value form each data center Can identify the data center
  • 29. Application of watermark Embed the number of copies to be allowed for copying embed in the hardware 4 4 3 2 1 Copy not allowed Click on image to Play
  • 30. Application of watermark Fraud Detection Data Center-01 Data Center-02 Data Center-03 Network
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.