Watermarking lecture #4

24
DIGITAL WATERMARKING LECTURE #4 Presented By Mrs.Vasanthi Muniasamy

description

This is my Lecture #4 about Basics about Watermarking

Transcript of Watermarking lecture #4

Page 1: Watermarking lecture #4

DIGITAL WATERMARKING

LECTURE #4

Presented ByMrs.Vasanthi Muniasamy

Page 2: Watermarking lecture #4

Overview

Introduction What is Watermarking? What is Digital Watermarking? Behind the Technology. Importance Types of Watermarking. Digital Watermarking Techniques. Applications

Page 3: Watermarking lecture #4

Conventional Encryption System

Page 4: Watermarking lecture #4

Watermark

“Watermarking can be considered as a special

technique of Steganography where one message is

embedded in another and the two messages are

related to each other in some way. “Example :-

The presence of specific patterns in currency notes

which are visible only when the note is held to light is

a well known example for watermark.

What is Watermarking?

Page 5: Watermarking lecture #4

Example of a conventional watermark

Courtesy of Blue Spike, Inc.

Page 6: Watermarking lecture #4

Digital Watermarking is originated from Steganography

Page 7: Watermarking lecture #4

What is Digital Watermarking?

“Digital watermarking is similar to watermarking

physical objects, except that the watermarking technique

is used for digital content instead of physical objects. “

Digital Watermark

Page 8: Watermarking lecture #4

Digital Watermark

In digital watermarking a low-energy signal is imperceptibly embedded in another signal. The low-energy signal is called watermark.

The main signal in which the watermark is embedded is referred to as cover signal since it covers the watermark.

An entity called watermark key used for embedding and detecting watermark signal

Watermark key is private

Page 9: Watermarking lecture #4

Behind The Technology

Sending Side …

Watermark Embedding process Water mark Original Image Key Water marked image

Page 10: Watermarking lecture #4

Behind The Technology

Watermark retrieval process Water marked image Key Confidential message

Receiving Side …

Page 11: Watermarking lecture #4

The Overall System

The Technology Roars…

Page 12: Watermarking lecture #4

Importance Of Digital Watermarking

© Copyright Information© On-line music industry© News gathering using digital cameras

Page 13: Watermarking lecture #4

Types of Digital Watermarking

Robust & Fragile Watermarking Visible & Invisible Watermarking Public & Private Watermarking Asymmetric & Symmetric Watermarking Steganograhic & Non-Steganographic

watermarking

Page 14: Watermarking lecture #4

Robust & Fragile Watermarking

Robust Watermarking:-Modification of watermarked content will not affect watermark

Fragile Watermarking:-Watermark get destroyed when watermarked content is modified or tampered with

Page 15: Watermarking lecture #4

Visible & Invisible Watermarking

On Visible watermarking, contents are visible

Page 16: Watermarking lecture #4

Visible & Invisible Watermarking (Contn..)

Invisible watermarking are not viewed on just looking

Page 17: Watermarking lecture #4

Public & Private Watermarking

• Public Watermarking

Users of content are authorized to detect watermark

• Private Watermarking

Users not authorized to detect watermark

Page 18: Watermarking lecture #4

Asymmetric & Symmetric watermarking

In Asymmetric watermarking different keys used for embedding and detecting watermark

Page 19: Watermarking lecture #4

Asymmetric & Symmetric watermarking (Contn..)

In symmetric watermarking same keys are used for embedding and detecting watermarks

Page 20: Watermarking lecture #4

Steganographic & Non-Steganographic Watermarking

Steganographic Watermarking

User unaware of the presence of a watermark

eg:-Used in finger printing applicationsNon-Steganographic WM:-

User aware of the presence of a watermark.

e.g.:-User to detect piracy

Page 21: Watermarking lecture #4

Digital Watermarking Techniques

LSB Watermarking Color Separation Technique Bit Stream Watermarking Word Space Coding, Line Space Coding

&Character Coding

Page 22: Watermarking lecture #4

Applications of Digital Watermarking.

Copy ProtectionContent AuthenticationCopyright ProtectionMetadata Tagging

Page 23: Watermarking lecture #4

References

www.watermarkingworld.org www.digital-watermark.com

Page 24: Watermarking lecture #4