Digital Watermarking

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 18

•Digital image processing is the use of computer algorithms to

perform image processing on digital images which is a subfield of


digital signal processing.

•Basic Types of Images

• Binary images
•Indexed images
•Grayscale images.
•True color images.
The process of embedding
information into another object/signal
is termed as watermarking.
The signal can be audio, text , picture
or a video.
Types of Watermarks
Visible watermark
The information is visible which is a text or a logo which
identifies the owner of the media.

Invisible watermark
An invisible watermark is an embedded image which cannot
be perceived with human’s eyes and are intended to prevent
or deter unauthorized copying of digital media.
Visible Watermark
Original Image Watermarked image
Invisible Watermark
Original image Watermarked image
Detection of modification of an image using
Watermarking Technology.

(a)Image protected with Watermarking technology.


(b)Tampered image.
(c) Image after running the Watermark Detection
Technology.
Cryptography is secret writing
In cryptography the message will be encrypted and cannot be decoded without
knowing the proper key.

Steganography is the act of adding a hidden message to an image or other media


file. It is similar to encrypting a document, but instead of running it through a
cypher, the document is broken up and stored in unused, or unnoticable, bits
within the overall image.

Watermarking attempts to hide a message as it is to tag a document for later


identification. Watermarking is used to protect the copyright of the original
owner
Watermarking life-cycle phases
Steps in the watermarking system
• Embedding
The information to be embedded is called a digital watermark whereas the
signal where the watermark is to be embedded is called the host signal In
embedding, an algorithm accepts the host and the data to be embedded and
produces a watermarked signal.

• Attack
During transmission of the signal to a person, If this person makes a
modification, this is called an attack.

• Detection
It is an algorithm which is applied to the attacked or unmodified signal to
attempt to extract the watermark from it.
How can an image be watermarked ?

• Visible watermarks on images can be easily achieved


thorough image editing software.

• Invisible watermarks implements several different


watermarking algorithms which can be done in two
ways.
1. Spatial domain.
2. Frequency domain
Spatial Domain

Spatial domain watermarking methods use blockxblock based


watermarking.
e.g. they embed the watermarks on a randomly selected 8x8 blocks of
pixels of the image.

Frequency domain

To embed a watermark, a frequency transformation is applied to the


host data. Then, modifications are made to the transform coefficients.
Possible frequency image transformations include the Discrete Fourier
Transform
• 1. Correlation based Watermarking.

• 2. CDMA Watermarking.
• Discrete Cosine transform PN sequence
watermarking

• Mid-Band coefficient Exchange Watermarking


• Imperceptibility :In watermarking, we traditionally seek high
fidelity, i.e. the watermarked work must look or sound like the
original.

• Robustness: It is more a property and not a requirement of


watermarking. The watermark should be able to survive any
resonable processing inflicted on the carrier.

• Security: The watermarked image should not reveal any clues of


the presence of the watermark, with respect to un-authorized
detection.
1. Copyright protection
2. Fingerprinting
3. Copy protection
4. Image authentication
Purpose of the Project

 
• Implementing different watermarking algorithms and observed the
imperceptibility of the watermark embedded using each algorithm

• SOFTWARE: MATLAB 7.0

• PLATFORM: WINDOWS 98/ 2000 /XP/ Vista


Conclusion

Digital watermarking focuses on embedding information inside a


digital object such that the embedded information is in
separable bound to the object.
Any Queries?

You might also like