SlideShare a Scribd company logo
1 of 30
OBJECTIVE
 To provide authenticity or the identity of ownership
   on images.

 Protecting digital images against un-authorized use,
  i.e. duplication, mis-representation and mis-
 distribution or illegal usage.

 main focus is to embed a color watermark image in
 to a color host image.
Introduction
  Digital watermarking

  The process of embedding digital information into a
   digital signal.
      - Purpose
      - Various types of Watermarking
      - Basic requirements

  Invisible Fragile Image Watermarking.
  Embed a color watermark image in a color Host
    Image.
Classification
Requirements :

  The extracted watermark remains intact. i.e., image
    authentication is guaranteed.

  Quality of generated watermarked image should
   improved. w.r.t. others.

  The security issues related to the watermark are
   provided using a secret key and a hash function.
Ideal Properties
 perceptually invisible to prevent obstruction of
   original image.
 statistically invisible, so it can’t be detected or
  erased.
 extraction should be simple and accurate.
 the watermark should be able to determine the
  true ownership of the Image.
Features:
    Transparency : Perceptual quality of data
                    being protected.
    Robustness : with stand against any
                    intentional transformations.
    Capacity : the ability to detect the watermarks
                with a low probability of error.
Process:

 Host image is divided in to some blocks.
 Embed watermark at LSB of Blue values of all
   such blocks .
 Manipulating only the ‘Blue values’(HVS).
 No. of host image blocks should be equal to the
   no. of bit embedded multiplied by the bit size of
    RGB.
Technique: 2-bit scheme




              Fig: Block diagram
Process diagram: 2-bit scheme
Technique : 1-bit scheme




              Fig: Block diagram
Process Diagram: 1-bit scheme
Algorithm: Embedding

    get_blue pixel_info (Yi)

    onebit_to_zero (Yip)

    hash_for_mesg_digest (Li , K)

    extract_onebit (A)

    compute_XOR (Hi , Ai)

    replace_(Yip , Xi )
Execution of Algorithm for Embedding watermark
      HOST IMAGE (Y)

                              WATERMARK IMAGE (A)
H         WATERMARK (A)
            O
            S
            T
            (Y)




                  R     G             B



R
    G
        B
get_blue pixel_info (Yi)
               B
               L
               U
               E

               P
               L
               A
               N
               E    LSB-0 BLUE BIT PLANE (Ybi )
                        Dividing into Blocks




8 BIT-PLANES            ONEBIT_TO_ZERO (Li)
hash_for_mesg_digest (Li , K)
Li

                           Secret Key (K)
               MD5      1111000010101100


             Applying
            HASH (Li ,K)
C
O                                H
M
P
                                 A
U                                S
T                                H
E

X
O                                    XOR
R
    R   LSB-0 BLUE BIT PLANE B
            G
replace_(Yip , Xi )   LSB-0 Blue bit-plane




                      LSB-1
                              LSB-2
                                  LSB-3           BLUE PLANE
                                          LSB-4
                                                  LSB-5
                                                          LSB-6
                                                                  LSB-7
WATERMARKED IMAGE



                    GREEN PLANE

                           RED PLANE



                                  BLUE PLANE
Execution of Algorithm for Extracting watermark


   onebit_to_zero (Wi)
   hash_for_mesg_digest (L’i , K)
   retrieve Wi
   compute_XOR
Execution of Algorithm for Extracting watermark
                  WATERMARKED




         R
              G
                       B
B
               L
               U
               E

               P
               L
               A
               N
               E   LSB-0 BLUE BIT PLANE (Wdbi )
                        Dividing into Blocks




8 BIT-PLANES
                         ONEBIT_TO_ZERO (Li)
L’i    hash_for_mesg_digest (L’i , K)

                      Secret Key (K)
        MD5       1111000010101100


       Applying
      HASH (L’i ,K)
HASH




          XOR
LSB-0 BLUE BIT PLANE (Ri)
R   G     B




        Extracted watermark (A’i)
Observation : We can easily see that A'i= Ai. So our watermark
   image is retained intact (complete) after extraction, by combining
   all bit-planes from all blocks.


Advantages:
   Security
   Persistency of Image Quality
   At the time of extraction neither the host image nor the
    watermark image is needed.



   Copyright Protection
   Tamper Proof verification
CONCLUSION AND FUTURE SCOPE

   Among large variety of watermarking techniques, an attempt has

    been made to develop color image watermarking scheme for color

    images.

 Both host image and watermark images are color images.

 The extracted watermark remains intact, i.e. image authentication is

    guaranteed.

 As a future research scope attempt will be make to develop the

    framework to semi-fragile watermarking, to detect malicious

    manipulations on an image, while allowing acceptable manipulations.
Thank you

More Related Content

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

color image watermarking

  • 1. OBJECTIVE  To provide authenticity or the identity of ownership on images.  Protecting digital images against un-authorized use, i.e. duplication, mis-representation and mis- distribution or illegal usage.  main focus is to embed a color watermark image in to a color host image.
  • 2. Introduction  Digital watermarking  The process of embedding digital information into a digital signal. - Purpose - Various types of Watermarking - Basic requirements  Invisible Fragile Image Watermarking.  Embed a color watermark image in a color Host Image.
  • 4. Requirements :  The extracted watermark remains intact. i.e., image authentication is guaranteed.  Quality of generated watermarked image should improved. w.r.t. others.  The security issues related to the watermark are provided using a secret key and a hash function.
  • 5. Ideal Properties  perceptually invisible to prevent obstruction of original image.  statistically invisible, so it can’t be detected or erased.  extraction should be simple and accurate.  the watermark should be able to determine the true ownership of the Image.
  • 6. Features:  Transparency : Perceptual quality of data being protected.  Robustness : with stand against any intentional transformations.  Capacity : the ability to detect the watermarks with a low probability of error.
  • 7. Process:  Host image is divided in to some blocks.  Embed watermark at LSB of Blue values of all such blocks .  Manipulating only the ‘Blue values’(HVS).  No. of host image blocks should be equal to the no. of bit embedded multiplied by the bit size of RGB.
  • 8. Technique: 2-bit scheme Fig: Block diagram
  • 10. Technique : 1-bit scheme Fig: Block diagram
  • 12. Algorithm: Embedding  get_blue pixel_info (Yi)  onebit_to_zero (Yip)  hash_for_mesg_digest (Li , K)  extract_onebit (A)  compute_XOR (Hi , Ai)  replace_(Yip , Xi )
  • 13. Execution of Algorithm for Embedding watermark HOST IMAGE (Y) WATERMARK IMAGE (A)
  • 14. H WATERMARK (A) O S T (Y) R G B R G B
  • 15. get_blue pixel_info (Yi) B L U E P L A N E LSB-0 BLUE BIT PLANE (Ybi ) Dividing into Blocks 8 BIT-PLANES ONEBIT_TO_ZERO (Li)
  • 16. hash_for_mesg_digest (Li , K) Li Secret Key (K) MD5 1111000010101100 Applying HASH (Li ,K)
  • 17. C O H M P A U S T H E X O XOR R R LSB-0 BLUE BIT PLANE B G
  • 18. replace_(Yip , Xi ) LSB-0 Blue bit-plane LSB-1 LSB-2 LSB-3 BLUE PLANE LSB-4 LSB-5 LSB-6 LSB-7
  • 19. WATERMARKED IMAGE GREEN PLANE RED PLANE BLUE PLANE
  • 20.
  • 21. Execution of Algorithm for Extracting watermark  onebit_to_zero (Wi)  hash_for_mesg_digest (L’i , K)  retrieve Wi  compute_XOR
  • 22. Execution of Algorithm for Extracting watermark WATERMARKED R G B
  • 23. B L U E P L A N E LSB-0 BLUE BIT PLANE (Wdbi ) Dividing into Blocks 8 BIT-PLANES ONEBIT_TO_ZERO (Li)
  • 24. L’i hash_for_mesg_digest (L’i , K) Secret Key (K) MD5 1111000010101100 Applying HASH (L’i ,K)
  • 25. HASH XOR LSB-0 BLUE BIT PLANE (Ri)
  • 26. R G B Extracted watermark (A’i)
  • 27.
  • 28. Observation : We can easily see that A'i= Ai. So our watermark image is retained intact (complete) after extraction, by combining all bit-planes from all blocks. Advantages:  Security  Persistency of Image Quality  At the time of extraction neither the host image nor the watermark image is needed.  Copyright Protection  Tamper Proof verification
  • 29. CONCLUSION AND FUTURE SCOPE  Among large variety of watermarking techniques, an attempt has been made to develop color image watermarking scheme for color images.  Both host image and watermark images are color images.  The extracted watermark remains intact, i.e. image authentication is guaranteed.  As a future research scope attempt will be make to develop the framework to semi-fragile watermarking, to detect malicious manipulations on an image, while allowing acceptable manipulations.