SlideShare a Scribd company logo
1 of 16
SECURE SPREAD SPECTRUM
WATERMARKING FOR MULTIMEDIA

PRESENTERS :
Mahhek Tahir ,Khizra Samad
, Asma Shaheen
Authors :

Ingemar J.Cox – Senior Member IEEE
Joe Kilian – Member IEEE
F.Thomson Leighton – Member IEEE
Talal Shamoon – Member IEEE

IEEE TRANSATIONS ON IMAGE PROCESSING , VOL 6 - DECEMBER 1997
INTRODUCTION
This paper presents a secure algorithm for
watermarking images, and a methodology for digital
watermarking that may be generalized to audio, video
and multimedia data. A watermark should be
constructed as an independent and identically
distributed Gussain random vector that is imperceptibly
inserted in a spread spectrum like fashion into the
perceptually most significant spectral components of
data. It argue that insertion of a watermark under this
rule makes the watermark robust to signal processing
operations and common geometric transformation
provided that the original image is available and it can
be successfully registered against the transform image.
SPREAD SPECTRUM WATERMARK
The problem: how to insert watermark into
most perceptually significant region of
spectrum in a reliability protective manner.
 To solve: this problem, frequency domain of
the image or sound at hand is viewed as
communication channel, and the mark is
viewed as a signal that is transmitted through
it

SECURE SPREAD SPECTRUM WATERMARKS
FOR MULTIMEDIA
 Spread spectrum watermark based on DCT
 In order for a watermark to be robust, it
needs to be placed in the most significant
part of the image.
 The watermark will be composed of random
numbers drawn from a Gaussian N(0,1)
distribution
 Inserting the watermark to the image.
 Inverse DCT
Image and Watermarked Image
METHODOLOGY
Embedding
 Detection and Comparison

EMBEDDING
YCrCb

Reshape back

Y

Descending order of DCT
values

DC
T

Convert to vector
EXTRACTION
YCrCb

Y

DC
T

Convert to vector

Descending order of DCT values

X=
COMPARISON
Watermark detected

Watermark not detected
EXPERIMENTS

Uniqueness of Watermark
Scaling
Crop
Print Xerox and Scan
Collision Attack
IMPLEMENTED EXPERIMENT - SCALING
Half size

Double size
IMPLEMENTED EXPERIMENT - COPPING
Secure Spread Spectrum

More Related Content

What's hot

Enhanced bandwidth slotted microstrip patch antenna
Enhanced bandwidth slotted microstrip patch antennaEnhanced bandwidth slotted microstrip patch antenna
Enhanced bandwidth slotted microstrip patch antenna
IAEME Publication
 
Smart antennas for next generation wireless systems eurasip
Smart antennas for next generation wireless systems eurasipSmart antennas for next generation wireless systems eurasip
Smart antennas for next generation wireless systems eurasip
villa1451
 
Extended summery of performance limits of network densification
Extended summery of performance limits of network densificationExtended summery of performance limits of network densification
Extended summery of performance limits of network densification
MassimilianoBarp
 

What's hot (10)

Phi shape uwb antenna with band notch characteristics
Phi shape uwb antenna with band notch characteristicsPhi shape uwb antenna with band notch characteristics
Phi shape uwb antenna with band notch characteristics
 
Enhanced bandwidth slotted microstrip patch antenna
Enhanced bandwidth slotted microstrip patch antennaEnhanced bandwidth slotted microstrip patch antenna
Enhanced bandwidth slotted microstrip patch antenna
 
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNBOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
 
Smart antennas for next generation wireless systems eurasip
Smart antennas for next generation wireless systems eurasipSmart antennas for next generation wireless systems eurasip
Smart antennas for next generation wireless systems eurasip
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!
 
Extended summery of performance limits of network densification
Extended summery of performance limits of network densificationExtended summery of performance limits of network densification
Extended summery of performance limits of network densification
 
Sw
SwSw
Sw
 
Link & Match Program
Link & Match ProgramLink & Match Program
Link & Match Program
 
Seminar pressentation
Seminar pressentationSeminar pressentation
Seminar pressentation
 
Joint DoA and Offset Frequency estimator
Joint DoA and Offset Frequency estimatorJoint DoA and Offset Frequency estimator
Joint DoA and Offset Frequency estimator
 

Similar to Secure Spread Spectrum

Visible watermarking using spread spectrum
Visible watermarking using spread spectrumVisible watermarking using spread spectrum
Visible watermarking using spread spectrum
IAEME Publication
 
International Journal of Computer Science and Security (IJCSS) Volume (3) Iss...
International Journal of Computer Science and Security (IJCSS) Volume (3) Iss...International Journal of Computer Science and Security (IJCSS) Volume (3) Iss...
International Journal of Computer Science and Security (IJCSS) Volume (3) Iss...
CSCJournals
 
Hybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaHybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pca
IAEME Publication
 

Similar to Secure Spread Spectrum (20)

A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...
 
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptx
 
Visible watermarking using spread spectrum
Visible watermarking using spread spectrumVisible watermarking using spread spectrum
Visible watermarking using spread spectrum
 
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
 
50120140506015
5012014050601550120140506015
50120140506015
 
International Journal of Computer Science and Security (IJCSS) Volume (3) Iss...
International Journal of Computer Science and Security (IJCSS) Volume (3) Iss...International Journal of Computer Science and Security (IJCSS) Volume (3) Iss...
International Journal of Computer Science and Security (IJCSS) Volume (3) Iss...
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
dwm
dwmdwm
dwm
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
 
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
 
PCS 2016 presentation
PCS 2016 presentationPCS 2016 presentation
PCS 2016 presentation
 
IRJET- Wavelet Transform based Steganography
IRJET- Wavelet Transform based SteganographyIRJET- Wavelet Transform based Steganography
IRJET- Wavelet Transform based Steganography
 
Hybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaHybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pca
 
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet Transforms
 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
 

More from Khizra Sammad

Pet positron emission tomography (pet)
Pet positron emission tomography (pet)Pet positron emission tomography (pet)
Pet positron emission tomography (pet)
Khizra Sammad
 

More from Khizra Sammad (20)

A PRACTITIONER'S GUIDE TO SOFTWARE TEST DESIGN [Summary]
A PRACTITIONER'S GUIDE TO SOFTWARE TEST DESIGN [Summary]A PRACTITIONER'S GUIDE TO SOFTWARE TEST DESIGN [Summary]
A PRACTITIONER'S GUIDE TO SOFTWARE TEST DESIGN [Summary]
 
Peoplware slides tech session
Peoplware slides  tech sessionPeoplware slides  tech session
Peoplware slides tech session
 
Security testing
Security testingSecurity testing
Security testing
 
Test case execution
Test case execution Test case execution
Test case execution
 
Way toward Manager role
Way toward Manager roleWay toward Manager role
Way toward Manager role
 
Cloud testing
Cloud testingCloud testing
Cloud testing
 
Qualys lab
Qualys labQualys lab
Qualys lab
 
Ob final friday
Ob final fridayOb final friday
Ob final friday
 
Freelancing article
Freelancing articleFreelancing article
Freelancing article
 
Tag presentation
Tag presentationTag presentation
Tag presentation
 
Test studio
Test studioTest studio
Test studio
 
Ultasound
UltasoundUltasound
Ultasound
 
Radar
RadarRadar
Radar
 
Pet positron emission tomography (pet)
Pet positron emission tomography (pet)Pet positron emission tomography (pet)
Pet positron emission tomography (pet)
 
Nuclear mri
Nuclear mriNuclear mri
Nuclear mri
 
Infrared
InfraredInfrared
Infrared
 
Electron microscope
Electron microscopeElectron microscope
Electron microscope
 
Computed tomography
Computed tomographyComputed tomography
Computed tomography
 
X rays
X raysX rays
X rays
 
Astronomy
AstronomyAstronomy
Astronomy
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Secure Spread Spectrum