You are on page 1of 24

Digital Watermarking

By,
PRATHYUSHA S
12012D0519
INTRODUCTION
Information Hiding Techniques
Information
Hiding
Steganography Cryptography Watermarking
WHAT IS A WATERMARK?
A watermark is a form, image or text that is impressed onto paper,
which provides evidence of its authenticity.

A distinguishing mark impressed on paper during manufacture; visible
when paper is held up to the light (e.g. $ Bill)

Visible Watermarking
Invisible Watermarking
Digital Watermarking?

Allows users to embed SPECIAL PATTERN or SOME
DATA into digital contents without changing its
perceptual quality.
When data is embedded, it is not written at HEADER
PART but embedded directly into digital media itself
by changing media contents data
Watermarking is a key process for the PROTECTION
of copyright ownership of electronic data.


Features of Watermarking
Invisible/Inaudible
Information is embedded without digital content
degradation, because of the level of embedding operation is
too small for human to notice the change.
Inseparable
The embedded information can survive after some
processing, compression and format transformation.
Unchanging data file size
Data size of the media is not changed before and after
embedding operation because information is embedded
directly into the media.


How It Works
CLASSIFICATION OF
WATERMARK

According to Human Perception
(a)invisible(b)visible

According to Robustness
(a)fragile(b)semi fragile(c)robust

According to types of Document
(a)text(b)image(c)audio(d)video


CLASSIFICATION BY
HUMAN
PERCEPTION
Visible Watermark
Logo or seal of the organization which holds the
rights to the primary image, it allows the primary
image to be viewed, but still visible it clearly as the
property of the owning organization.

Overlay the watermark in such a way that makes it
difficult to remove, if the goal of indicating property
rights is to be achieved.
Visible Watermark
Invisible Watermark
Embedding level is too small to notice
Can be retrieved by extraction software
Applications:
Authentication
Copyrighting
Etc

Invisible Watermark
CLASSIFICATION BY
ROBUSTNESS
Fragile/SemiFragile/Robust
A watermark is called fragile if it fails to be
detected after the slightest modification.
A watermark is called semi-fragile if it resists
begining transformations but fails detection
after malignant transformations.
A watermark is called robust if it resists a
designated class of transformations.
CLASSIFICATION BY
DOCUMENT
Text/Image/Audio watermarking
Text/Image/Audio watermarking refers to
embedding watermarks in an text/image/audio
in order to protect the image from illegal
copying and identify manipulation.
Video Watermarking


Algorithm for video watermarking
DFT
DCT
DWT

Watermarking in I-frame.
Video watermarking refers to embedding watermarks in
a video sequence in order to protect the video from
illegal copying and identify manipulation
Discrete Cosine Transformation
DCT convert images from spatial-domain to frequency-
domain to decorrelate pixels
The discrete cosine transform (DCT) helps to separate the
image into parts of differing importance (with respect to the
image's visual quality). The DCT is similar to the discrete
Fourier transform
Remember that JPEG breaks an image into 8x8 units
So for DCT n = 8
For example
256 gray-scale image each pixel is stored as a value between 0
255
0 = black pixel
255 = white pixel
Value between are shades of gray

Wave Transforms
Frequency
DCT: One Dimensional
where

|
|
.
|

\
|
+
=

=
1
0
) (
2
) 1 2 (
cos
2
) ( ) (
n
i
i f
n
u i
p
n
u F i
t
n = total no. of data item
p = pixel
F = coefficients
f(i)= is the intensity of the i th pixel
The general equation for a 1D (n data items) DCT is defined
by the following equation:
Watermarking in Video(DCT)
Purpose of Watermarking

Copyright Protection
Fingerprinting
Copy Protection
Broadcasting Monitoring
Data Authentication

CONCLUSION
Digital watermarking has emerged as an essential security
technology, fully complementary to encryption-based secure
transmission and copy protection.
This technology is widely applicable to almost all electronic
information services and systems where data protection,
security, and intellectual property rights are needed.
However, effective uses in fields such as digital camera,
DVD, digital broadcasting, electronic commerce, and law
enforcement have not been explored.
Thank you !!!

You might also like