Professional Documents
Culture Documents
WELCOME
20 December 2012
DIGITAL WATERMARKING
FOR DOCUMENTS
CONTENTS
Introduction
Literature
20 December 2012
INTRODUCTION
20 December 2012
Watermark :- Recognizable image or pattern in paper. Digital watermark :- Encoding an identifying code into digitized music, video, picture, or other file. Watermarking :- Techniques that allow secret communication , usually by embedding or hiding the secret information
20 December 2012
LITERATURE REVIEW
HISTORY OF WATERMARKS
20 December 2012
The first watermark was invented in 1826 by John Marshall. A watermark is made by impressing a watercoated metal stamp or dandy roll onto the paper during manufacturing.
Another type of watermark is called the cylinder mould watermark. A shaded watermark, first used in 1848, incorporates tonal depth and creates a greyscale image.
The first stamp on watermarked paper was issued in April of 1895.
20 December 2012
The term "digital watermark" was first coined in 1992 by Andrew Tirkel and Charles Osborne in their paper A.Z.Tirkel, G.A. Rankin, R.M. Van Schyndel, W.J.Ho, N.R.A.Mee, C.F.Osborne. Electronic Water Mark. DICTA 93, Macquarie University. p.666-673.
The term used by Tirkel and Osborne was originally used in Japan-- from the Japanese-- "denshi sukashi" -- literally, an "electronic watermark".
7
The public or secret key is used to enforce security Many watermarking schemes use spread-spectrum methods , they add a PN signal with low amplitude to the host data. Correlator is used for watermark detection.
WATERMARKING REQUIREMENTS
20 December 2012
Capacity :- As much information as possible. Security :- Only be accessible by authorized parties by means of cryptographic key. Robusteness :- Resist against hostile. Invisibility.
9
::-
A digital watermark is called perceptible if its presence in the marked signal is noticeable. Capacity :-The length of the embedded message .
Embedding
method :10
20 December 2012
11
12
20 December 2012
20 December 2012
Assertion to establish ownership of the content (i.e. image) Fingerprinting to avoid unauthorized duplication and distribution of publicly available multimedia content Authentication and integrity verification the authenticator is inseparably bound to the content whereby the author has a unique key associated with the content and can verify integrity of that content by extracting the watermark.
13
CONTD.
Usage
control added to limit the number of copies created whereas the watermarks are modified by the hardware and at some point would not create any more copies (i.e. DVD) Content protection content stamped with a visible watermark that is very difficult to remove so that it can be publicly and freely distributed Content labeling bits embedded into the data that gives further information about the content such as a graphic image with time and place information.
14
20 December 2012
ATTACKS ON WATERMARK
Active Attacks hacker tries to remove the watermark or make it undetectable. An example is to crop it out. Passive Attacks hacker tries to determine whether there is a watermark and identify it. However, no damage or removal is done. Collusion Attacks hacker uses several copies of one piece of media, each with a different watermark, to construct a copy with no watermark. Forgery Attacks hacker tries to embed a valid watermark of their own rather than remove one.
15
20 December 2012
APPLICATIONS
Copyright
20 December 2012
Protection Invisibly mark products. Authentication (temper detection, monitoring). Manage distribution of assets Apply unique watermark key to each copy of a distributed video/image. Embed all necessary data in a single image. Many more, including -(Multi-level) secure data systems in military, -medical and law enforcement fields. -Digital notarization.. -On-line identity verification.
16
PROPOSED WORK
20 December 2012
In this paper, we present a novel and simple optical watermarking system aiming at overriding some practical problems when digital watermarking techniques are applied to authenticate the printed documents. Optical watermarking differing from traditional digital watermarking in a sense that the watermark extraction is done by some optical and visual means like photocopier. While no any digitization is required.
The system security is guaranteed by adopting contentbased key share scheme originated from visual cryptography.
17
20 December 2012
18
VISUAL CRYPTOGRAPHY
The idea of visual cryptography was independently invented by G.R. Blakley and A. Schamir which originated from traditional topic in cryptography: secret sharing. In general, a n-out-of-m threshold scheme is a method of sharing a secret K among a set of m participants a way in such that - Any n participants can compute the value of K, and - No group of n-1 (or fewer) participants can compute information about the value of K.
19
20 December 2012
CONTD.
20
20 December 2012
FREQUENCY MODULATION
For images with a limited bandwidth, it is possible to completely reconstruct the original image if the sampling frequency Ws> 2Wm, where Wm is the highest frequency present in the image.
21
20 December 2012
WATERMARK EMBEDDING
20 December 2012
Two main kinds of modulation methods are employed here :Line modulation Dot modulation. The strength of modulation is actually controlling the line width or doc size. If the value of watermark seed is 1 (black), after zooming in, the corresponding block pixel values should be all 1s. Thus we can modify these 1s by replacing some of them with 0s to form a thin directional line or to form a large dot. If the value of watermark seed is 0 (white), we can modify all those 0s by replacing some of them with 1 to form a thin line with another direction or to form a small dot. By carefully selecting the zoom in resolution and the direction of the line or the size of the dot, a good visual quality can be still kept after watermark embedding.
22
SYSTEM DESCRIPTION
23
20 December 2012
KEY FORMATION
24
20 December 2012
20 December 2012
25
CONCLUSION
An optical watermarking solution authentication has been given . for document
20 December 2012
We introduced a concept of optical watermarking by conducting document authenticity verification with human eyes. The system security is guaranteed by adopting visual cryptography in key set generation.
26
REFERENCES
20 December 2012
A.Z.Tirkel, G.A. Rankin, R.M. Van Schyndel, W.J.Ho, N.R.A.Mee, C.F.Osborne. Electronic Water Mark. DICTA 93, Macquarie University. p.666-673. Meggs, Philip B. (1998). A History of Graphic Design (Third ed.). John Wiley & Sons, Inc.. pp. 58. ISBN 978-0-471-29198-5. Biermann, Christopher J. (1996). "7". Handbook of Pulping and Papermaking (2 ed.). San Diego, California, USA: Academic Press. p. 171. ISBN 0-12-097362-6. M. Yeung and F. Mintzer, An invisible watermarking techniques for image verification,IEEE ICIP97,Santa Barbara, USA, Oct., 1997. Doug Stinson, Visual cryptography and thresholdscheme,IEEE Potential, pp.13-19, Feb./Mar., 1998. Q.B. Sun, P.R. Feng and R. Deng, An Optical Watermarking Solution for AuthenticatingPrinted Documents, verification,IEEE ITCC2001.
27
THANKS
28
20 December 2012