SlideShare uma empresa Scribd logo
1 de 17
CONTENTS
Background
Terminology
Characteristics
Applications
Techniques
References
Information Hiding
Information Hiding…..started with

Steganography (art of hidden writing):
The art and science of writing hidden messages in
such a way that no one apart from the intended
recipient knows of the existence of the message.
The existence of information is secret.
What is a watermark ?
What is a watermark ? A distinguishing mark
impressed on paper during manufacture;
visible when paper is held up to the light (e.g.
$ Bill)
What is a watermark ?
Digital Watermarking: Application of Information
hiding (Hiding Watermarks in digital Media, such
as images,audio file)
Digital Watermarking is a process of embedding
digital signals or pattern into a multimedia object
without affecting in any way the quality of the
original file.
CHARACTERISTICS


Transparency: watermark is not detectable



Robustness: survives digital processing (e.g., compression) and
malicious analytical attacks.



Efficiency: low cost implementation using minimal resources



Independence: of both the type and format of multimedia data (e.g.,
music, speech, video, sample rates, coding scheme, ...)
Applications
Copyright Protecton:To prove the ownership
of digital media

Eg. Cut paste of images

Hidden Watermarks represent
the copyright information
Applications
Tamper proofing: To find out if data was tampered.

Eg. Change meaning of images

Hidden Watermarks track
change in meaning
Applications
Quality Assessment: Degradation of Visual Quality

Loss of Visual Quality

Hidden Watermarks track change in visual quality
Watermarking Process
Data (D), Watermark (W), Stego Key (K),

Watermarked Data (Dw)

Embed (D, W, K) = Dw
Extract (Dw) = W’ and compare with W
Watermarking Process
Figure 2 shows the basic scheme of the
watermarks embedding systems.

Figure 2: Watermark embedding scheme

Inputs to the scheme are the watermark, the
cover data and an optional public or secret key.
The output are watermarked data. The key is
used to enforce security.
Watermarking Process
Figure 3 shows the basic scheme for
watermark recovery system.

Figure 3: Watermark recovery scheme

Inputs to the scheme are the watermarked data, the
secret or public key and, depending on the method,
the original data and/or the original watermark.
The output is the recovered watermarked W or some
kind of confidence measure indicating how likely it
is for the given watermark at the input to be present
in the data under inspection.
TYPES OF WATERMARKING SCHEMES
Private (non-blind) watermarking systems use the original
cover-data to extract the watermark from stego-data and
use original cover-data to determine where the watermark is.
Extract using {D, K, W}
Semi-private (semi-blind) watermarking does not use the
original cover-data for detection, but tries to answer the
same question. (Potential application of blind and semiblind watermarking is for evidence in court ownership,....)
Extract using { K, W}
Public (blind) watermarking - neither cover-data nor
embedded watermarks are required for extraction - this is
the most challenging problem.
Extract using {K}
ATTACKS ON DIGITAL WATERMARKING:
•Active Attacks – hacker tries to remove the watermark or

make it undetectable. An example is to crop it out.
•Passive Attacks – hacker tries to determine whether there is a
watermark and identify it. However, no damage or removal is
done.
•Forgery Attacks – hacker tries to embed a valid watermark of
their own rather than remove one.
•Decorative Attacks – hacker applies some distorted
transformation uniformly over the object in order to degrade
the watermark so that it becomes undetectable / unreadable.
Security
In case the key used during watermark is lost anyone

can read the watermark and remove it.

In case the watermark is public, it can be encoded

and copyright information is lost.
References
http://en.wikipedia.org/wiki/Steganography

http://en.wikipedia.org/wiki/Digital_watermark

http://www.cypak.com/pictures/med/Cypak
Digital watermarking

Mais conteúdo relacionado

Mais procurados

Watermark
WatermarkWatermark
Watermarkravi33s
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingNawin Kumar Sharma
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applicationsKannekanti Utthej
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesPrashant Singh
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessingQaisar Ayub
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology vijay rastogi
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 

Mais procurados (20)

Watermark
WatermarkWatermark
Watermark
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Image authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarkingImage authentication techniques based on Image watermarking
Image authentication techniques based on Image watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Steganography
Steganography Steganography
Steganography
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Signature recognition
Signature recognitionSignature recognition
Signature recognition
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
digital steganography
digital steganographydigital steganography
digital steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 

Destaque

12205451 pss7
12205451 pss712205451 pss7
12205451 pss7yuti_3011
 
TLA Presentation on QR-codes
TLA Presentation on QR-codesTLA Presentation on QR-codes
TLA Presentation on QR-codesDustin Haisler
 
QR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearningQR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearningGraham Clark
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubimishrasubrat
 
2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?Delvinia
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
 
10 Things Money Can´t Buy
10 Things Money Can´t Buy10 Things Money Can´t Buy
10 Things Money Can´t BuyAbhishek Shah
 
Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Arif Ahmed
 
Qrcodequickresponsecode presentation
Qrcodequickresponsecode presentationQrcodequickresponsecode presentation
Qrcodequickresponsecode presentationUmsh23
 
Artikel Pt Industrieel Management Maart 2011
Artikel Pt Industrieel Management Maart 2011Artikel Pt Industrieel Management Maart 2011
Artikel Pt Industrieel Management Maart 2011Henk Wiersema
 
Method of solving multi objective optimization problem in the presence of unc...
Method of solving multi objective optimization problem in the presence of unc...Method of solving multi objective optimization problem in the presence of unc...
Method of solving multi objective optimization problem in the presence of unc...eSAT Journals
 
Final year ece projects in vijayawada
Final year ece projects in vijayawadaFinal year ece projects in vijayawada
Final year ece projects in vijayawadaThirumal Krishnan
 
Laymans Guide To Multi Obj Opt[1]
Laymans Guide To Multi Obj Opt[1]Laymans Guide To Multi Obj Opt[1]
Laymans Guide To Multi Obj Opt[1]rogerbeatty
 

Destaque (19)

Vidhi's ppt
Vidhi's pptVidhi's ppt
Vidhi's ppt
 
QR Code Introduction
QR Code IntroductionQR Code Introduction
QR Code Introduction
 
12205451 pss7
12205451 pss712205451 pss7
12205451 pss7
 
TLA Presentation on QR-codes
TLA Presentation on QR-codesTLA Presentation on QR-codes
TLA Presentation on QR-codes
 
QR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearningQR Codes and the Future of Next Generation mLearning
QR Codes and the Future of Next Generation mLearning
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubi
 
2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?2D Barcodes are Here. Are You and Your Audience Ready?
2D Barcodes are Here. Are You and Your Audience Ready?
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
QR code
QR codeQR code
QR code
 
10 Things Money Can´t Buy
10 Things Money Can´t Buy10 Things Money Can´t Buy
10 Things Money Can´t Buy
 
Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....
 
60 312-318
60 312-31860 312-318
60 312-318
 
Digital Water marking
Digital Water markingDigital Water marking
Digital Water marking
 
Qrcodequickresponsecode presentation
Qrcodequickresponsecode presentationQrcodequickresponsecode presentation
Qrcodequickresponsecode presentation
 
Artikel Pt Industrieel Management Maart 2011
Artikel Pt Industrieel Management Maart 2011Artikel Pt Industrieel Management Maart 2011
Artikel Pt Industrieel Management Maart 2011
 
Method of solving multi objective optimization problem in the presence of unc...
Method of solving multi objective optimization problem in the presence of unc...Method of solving multi objective optimization problem in the presence of unc...
Method of solving multi objective optimization problem in the presence of unc...
 
major 2
major 2major 2
major 2
 
Final year ece projects in vijayawada
Final year ece projects in vijayawadaFinal year ece projects in vijayawada
Final year ece projects in vijayawada
 
Laymans Guide To Multi Obj Opt[1]
Laymans Guide To Multi Obj Opt[1]Laymans Guide To Multi Obj Opt[1]
Laymans Guide To Multi Obj Opt[1]
 

Semelhante a Digital watermarking

Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
Digital water marking
Digital water markingDigital water marking
Digital water markingMd Aktar
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyAlexander Decker
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
Cryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking AlgorithmCryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking AlgorithmCSCJournals
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio SignalsGufran karim
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYIRJET Journal
 
Secure communication
Secure communicationSecure communication
Secure communicationTushar Swami
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000authority12
 
digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfMekalaSamayochitha
 

Semelhante a Digital watermarking (20)

Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
Dz31840846
Dz31840846Dz31840846
Dz31840846
 
Cryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking AlgorithmCryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking Algorithm
 
50120130406038
5012013040603850120130406038
50120130406038
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio Signals
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
Secure communication
Secure communicationSecure communication
Secure communication
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdf
 

Mais de Govind Raj

INFRA_PPP_FewControl points for growth.ppt
INFRA_PPP_FewControl points for growth.pptINFRA_PPP_FewControl points for growth.ppt
INFRA_PPP_FewControl points for growth.pptGovind Raj
 
Project and Infrastructure Finance slides Module1_Ver3.ppt
Project and Infrastructure Finance slides Module1_Ver3.pptProject and Infrastructure Finance slides Module1_Ver3.ppt
Project and Infrastructure Finance slides Module1_Ver3.pptGovind Raj
 
Automation Anxiety
Automation AnxietyAutomation Anxiety
Automation AnxietyGovind Raj
 
Optical Camouflage
Optical CamouflageOptical Camouflage
Optical CamouflageGovind Raj
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technologyGovind Raj
 
Blu ray technology
Blu ray technologyBlu ray technology
Blu ray technologyGovind Raj
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing Govind Raj
 

Mais de Govind Raj (12)

INFRA_PPP_FewControl points for growth.ppt
INFRA_PPP_FewControl points for growth.pptINFRA_PPP_FewControl points for growth.ppt
INFRA_PPP_FewControl points for growth.ppt
 
Project and Infrastructure Finance slides Module1_Ver3.ppt
Project and Infrastructure Finance slides Module1_Ver3.pptProject and Infrastructure Finance slides Module1_Ver3.ppt
Project and Infrastructure Finance slides Module1_Ver3.ppt
 
Automation Anxiety
Automation AnxietyAutomation Anxiety
Automation Anxiety
 
Webcrawler
Webcrawler Webcrawler
Webcrawler
 
Smartquill
SmartquillSmartquill
Smartquill
 
Wibree
Wibree Wibree
Wibree
 
Android ppt
Android pptAndroid ppt
Android ppt
 
Optical Camouflage
Optical CamouflageOptical Camouflage
Optical Camouflage
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
 
Blu ray technology
Blu ray technologyBlu ray technology
Blu ray technology
 
Wordnet
WordnetWordnet
Wordnet
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Digital watermarking

  • 1.
  • 3. Information Hiding Information Hiding…..started with Steganography (art of hidden writing): The art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. The existence of information is secret.
  • 4. What is a watermark ? What is a watermark ? A distinguishing mark impressed on paper during manufacture; visible when paper is held up to the light (e.g. $ Bill)
  • 5. What is a watermark ? Digital Watermarking: Application of Information hiding (Hiding Watermarks in digital Media, such as images,audio file) Digital Watermarking is a process of embedding digital signals or pattern into a multimedia object without affecting in any way the quality of the original file.
  • 6. CHARACTERISTICS  Transparency: watermark is not detectable  Robustness: survives digital processing (e.g., compression) and malicious analytical attacks.  Efficiency: low cost implementation using minimal resources  Independence: of both the type and format of multimedia data (e.g., music, speech, video, sample rates, coding scheme, ...)
  • 7. Applications Copyright Protecton:To prove the ownership of digital media Eg. Cut paste of images Hidden Watermarks represent the copyright information
  • 8. Applications Tamper proofing: To find out if data was tampered. Eg. Change meaning of images Hidden Watermarks track change in meaning
  • 9. Applications Quality Assessment: Degradation of Visual Quality Loss of Visual Quality Hidden Watermarks track change in visual quality
  • 10. Watermarking Process Data (D), Watermark (W), Stego Key (K), Watermarked Data (Dw) Embed (D, W, K) = Dw Extract (Dw) = W’ and compare with W
  • 11. Watermarking Process Figure 2 shows the basic scheme of the watermarks embedding systems. Figure 2: Watermark embedding scheme Inputs to the scheme are the watermark, the cover data and an optional public or secret key. The output are watermarked data. The key is used to enforce security.
  • 12. Watermarking Process Figure 3 shows the basic scheme for watermark recovery system. Figure 3: Watermark recovery scheme Inputs to the scheme are the watermarked data, the secret or public key and, depending on the method, the original data and/or the original watermark. The output is the recovered watermarked W or some kind of confidence measure indicating how likely it is for the given watermark at the input to be present in the data under inspection.
  • 13. TYPES OF WATERMARKING SCHEMES Private (non-blind) watermarking systems use the original cover-data to extract the watermark from stego-data and use original cover-data to determine where the watermark is. Extract using {D, K, W} Semi-private (semi-blind) watermarking does not use the original cover-data for detection, but tries to answer the same question. (Potential application of blind and semiblind watermarking is for evidence in court ownership,....) Extract using { K, W} Public (blind) watermarking - neither cover-data nor embedded watermarks are required for extraction - this is the most challenging problem. Extract using {K}
  • 14. ATTACKS ON DIGITAL WATERMARKING: •Active Attacks – hacker tries to remove the watermark or make it undetectable. An example is to crop it out. •Passive Attacks – hacker tries to determine whether there is a watermark and identify it. However, no damage or removal is done. •Forgery Attacks – hacker tries to embed a valid watermark of their own rather than remove one. •Decorative Attacks – hacker applies some distorted transformation uniformly over the object in order to degrade the watermark so that it becomes undetectable / unreadable.
  • 15. Security In case the key used during watermark is lost anyone can read the watermark and remove it. In case the watermark is public, it can be encoded and copyright information is lost.