You are on page 1of 28

20 December 2012

WELCOME

20 December 2012

DIGITAL WATERMARKING

FOR DOCUMENTS

CONTENTS
Introduction
Literature

20 December 2012

Review Proposed Work Conclusion References


3

INTRODUCTION

20 December 2012

Watermark :- Recognizable image or pattern in paper. Digital watermark :- Encoding an identifying code into digitized music, video, picture, or other file. Watermarking :- Techniques that allow secret communication , usually by embedding or hiding the secret information

20 December 2012

LITERATURE REVIEW

HISTORY OF WATERMARKS

20 December 2012

The first watermark was invented in 1826 by John Marshall. A watermark is made by impressing a watercoated metal stamp or dandy roll onto the paper during manufacturing.

Another type of watermark is called the cylinder mould watermark. A shaded watermark, first used in 1848, incorporates tonal depth and creates a greyscale image.
The first stamp on watermarked paper was issued in April of 1895.

HISTORY OF DIGITAL WATERMARKING

20 December 2012

The term "digital watermark" was first coined in 1992 by Andrew Tirkel and Charles Osborne in their paper A.Z.Tirkel, G.A. Rankin, R.M. Van Schyndel, W.J.Ho, N.R.A.Mee, C.F.Osborne. Electronic Water Mark. DICTA 93, Macquarie University. p.666-673.
The term used by Tirkel and Osborne was originally used in Japan-- from the Japanese-- "denshi sukashi" -- literally, an "electronic watermark".
7

BASIC WATERMARKING PRINCIPLES


20 December 2012

The public or secret key is used to enforce security Many watermarking schemes use spread-spectrum methods , they add a PN signal with low amplitude to the host data. Correlator is used for watermark detection.

WATERMARKING REQUIREMENTS

20 December 2012

Capacity :- As much information as possible. Security :- Only be accessible by authorized parties by means of cryptographic key. Robusteness :- Resist against hostile. Invisibility.
9

CLASSIFICATION OF DIGITAL WATERMARKING


20 December 2012

Digital watermarking techniques may be classified in several ways.


Robustness

::-

A digital watermark is called robust if it resists a designated class of transformations.


Perceptibility

A digital watermark is called perceptible if its presence in the marked signal is noticeable. Capacity :-The length of the embedded message .
Embedding

method :10

Spread spectrum , quantization and modulation.

TYPES OF WATERMARKING TECHNIQUES

20 December 2012

11

Fig 3. Watermarking Techniques

DIGITAL WATERMARKING SYSTEM

12

20 December 2012

Fig 4. Digital Watermarking system

PURPOSE OF DIGITAL WATERMARKING


Ownership

20 December 2012

Assertion to establish ownership of the content (i.e. image) Fingerprinting to avoid unauthorized duplication and distribution of publicly available multimedia content Authentication and integrity verification the authenticator is inseparably bound to the content whereby the author has a unique key associated with the content and can verify integrity of that content by extracting the watermark.

13

CONTD.
Usage

control added to limit the number of copies created whereas the watermarks are modified by the hardware and at some point would not create any more copies (i.e. DVD) Content protection content stamped with a visible watermark that is very difficult to remove so that it can be publicly and freely distributed Content labeling bits embedded into the data that gives further information about the content such as a graphic image with time and place information.

14

20 December 2012

ATTACKS ON WATERMARK
Active Attacks hacker tries to remove the watermark or make it undetectable. An example is to crop it out. Passive Attacks hacker tries to determine whether there is a watermark and identify it. However, no damage or removal is done. Collusion Attacks hacker uses several copies of one piece of media, each with a different watermark, to construct a copy with no watermark. Forgery Attacks hacker tries to embed a valid watermark of their own rather than remove one.

15

20 December 2012

APPLICATIONS
Copyright

20 December 2012

Protection Invisibly mark products. Authentication (temper detection, monitoring). Manage distribution of assets Apply unique watermark key to each copy of a distributed video/image. Embed all necessary data in a single image. Many more, including -(Multi-level) secure data systems in military, -medical and law enforcement fields. -Digital notarization.. -On-line identity verification.

16

PROPOSED WORK

20 December 2012

In this paper, we present a novel and simple optical watermarking system aiming at overriding some practical problems when digital watermarking techniques are applied to authenticate the printed documents. Optical watermarking differing from traditional digital watermarking in a sense that the watermark extraction is done by some optical and visual means like photocopier. While no any digitization is required.

The system security is guaranteed by adopting contentbased key share scheme originated from visual cryptography.

17

SYSTEM OVERVIEW AND SECURITY


Our proposed solution mainly originates from two different research fields:

20 December 2012

Visual cryptography Frequency modulation.

18

VISUAL CRYPTOGRAPHY
The idea of visual cryptography was independently invented by G.R. Blakley and A. Schamir which originated from traditional topic in cryptography: secret sharing. In general, a n-out-of-m threshold scheme is a method of sharing a secret K among a set of m participants a way in such that - Any n participants can compute the value of K, and - No group of n-1 (or fewer) participants can compute information about the value of K.

19

20 December 2012

CONTD.

20

20 December 2012

Fig 5. A 2-out-of-2 visual threshold scheme

FREQUENCY MODULATION
For images with a limited bandwidth, it is possible to completely reconstruct the original image if the sampling frequency Ws> 2Wm, where Wm is the highest frequency present in the image.

Fig 6. Watermark embedding and extracting (a) embedding (b) extracting

21

20 December 2012

WATERMARK EMBEDDING

20 December 2012

Two main kinds of modulation methods are employed here :Line modulation Dot modulation. The strength of modulation is actually controlling the line width or doc size. If the value of watermark seed is 1 (black), after zooming in, the corresponding block pixel values should be all 1s. Thus we can modify these 1s by replacing some of them with 0s to form a thin directional line or to form a large dot. If the value of watermark seed is 0 (white), we can modify all those 0s by replacing some of them with 1 to form a thin line with another direction or to form a small dot. By carefully selecting the zoom in resolution and the direction of the line or the size of the dot, a good visual quality can be still kept after watermark embedding.

22

SYSTEM DESCRIPTION

23

20 December 2012

Fig 7. System Diagram

KEY FORMATION

24

20 December 2012

Fig 8. Key formation

20 December 2012

Fig 10. Final watermark image

Fig 9.Watermark image

25

Fig 11.Extracted Watermark image

CONCLUSION
An optical watermarking solution authentication has been given . for document

20 December 2012

We introduced a concept of optical watermarking by conducting document authenticity verification with human eyes. The system security is guaranteed by adopting visual cryptography in key set generation.
26

REFERENCES

20 December 2012

A.Z.Tirkel, G.A. Rankin, R.M. Van Schyndel, W.J.Ho, N.R.A.Mee, C.F.Osborne. Electronic Water Mark. DICTA 93, Macquarie University. p.666-673. Meggs, Philip B. (1998). A History of Graphic Design (Third ed.). John Wiley & Sons, Inc.. pp. 58. ISBN 978-0-471-29198-5. Biermann, Christopher J. (1996). "7". Handbook of Pulping and Papermaking (2 ed.). San Diego, California, USA: Academic Press. p. 171. ISBN 0-12-097362-6. M. Yeung and F. Mintzer, An invisible watermarking techniques for image verification,IEEE ICIP97,Santa Barbara, USA, Oct., 1997. Doug Stinson, Visual cryptography and thresholdscheme,IEEE Potential, pp.13-19, Feb./Mar., 1998. Q.B. Sun, P.R. Feng and R. Deng, An Optical Watermarking Solution for AuthenticatingPrinted Documents, verification,IEEE ITCC2001.

27

THANKS

28

20 December 2012

You might also like