You are on page 1of 12

•Digital Watermarking describes methods and

technologies that hide information in digital media.


•Embedding takes place by manipulating the content of
the digital data.
•Modifications of the media are to be imperceptible.
•Application
Copyright protection
Covert protection
Content authentication
PROCEDURE
DIGITAL WATERMARKING GENERATION ALGORITHM

Phase 1:-Generating Scaled image


• Divide O={o(i,j)|1≤i≤M,1≤j≤M} into 4×4 non overlapping blocks, namely
O={o1, o2, …o(M/4)×(M/4)}.

• Generate a scaled image by calculating the mean value  mi

Phase 2:-Extracting quantitative feature information


• C={m'i | m'i Є{0,1},i=1,2,…,(M/4)×(M/4)}
Phase 3:-Modulating quantitative feature information
• Generate real valued chaotic sequence X={x(i)|i=1,2,…}
• Binarize X to get P={p(i)|p(i) Є{0,1}, 1≤i≤(M/4)×(M/4)}
• Modulate C using P to get S,S={s(i)|s(i)=p(i) m'i , 1≤i≤(M/4)×(M/4)}

Asymmetric Encrypting modulation sequence


Use RSA algorithm to encrypt S to get watermark information W=E(S, Pri )
Digital watermarking embedding algorithm

 Step1:Quantifying
• Quantify each of the wavelet coefficients by
 Step 2:Classifying
• Wavelet coefficients are divided into 2 steps
• If mod(q(i,j),2)=0,type 0 else type 1

 Step 3:Embedding
• If mod (q(i,j),2)!=w(i,j), adjust

 Step 4:Inverse wavelet transforming


DIGITAL WATERMARK EXTRACTION AND
AUTHENTICATION ALGORITHM

RST restoring algorithm


• Geometric moment,

• Rotation angle estimation


m'10 and m'01 -geometric moment of rotated image
 Scaling factor estimation
• Let f(x‘,y’) be the scaled image with scaling factors a & b.

Translation parameter estimation


•Let α and β be the translation parameters
Digital watermark extraction algorithm

 Step 1:Quantifying
• Quantify the wavelet coefficient of sub band

 Step 2:Extracting
Digital watermark authentication algorithm
 Step 1:Tampering localization
• Decrypt W' to get modulated sequence S'=D( W', Pub )
• Demodulate S' with P to get C'
• Construct tampering matrix W*=C' C1
• Use 2×2 median filter

 Step 2:Tampering authentication


• Divide W* into n×n sub-blocks and calculate tampering rate, R*(u,v)
•Find maximum tampering rates

•Set the detection threshold T.

•If , watermark has not suffered any attack.

•If image is modified by common operations.

•If it has tampered by malicious processing.

You might also like