You are on page 1of 18

Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital

signal processing.

Basic Types of Images Binary images Indexed images Grayscale images. True color images.

What is Digital Watermarking?


The process of embedding information into another object/signal is termed as watermarking. The signal can be audio, text , picture or a video.

Types of Watermarks
Visible watermark
The information is visible which is a text or a logo which identifies the owner of the media.

Invisible watermark
An invisible watermark is an embedded image which cannot be perceived with humans eyes and are intended to prevent or deter unauthorized copying of digital media.

Visible Watermark
Original Image Watermarked image

Invisible Watermark
Original image Watermarked image

Detection of modification of an image using Watermarking Technology.

(a)Image protected with Watermarking technology. (b)Tampered image. (c) Image after running the Watermark Detection Technology.

Watermarking, Steganography and Cryptography


Cryptography is secret writing In cryptography the message will be encrypted and cannot be decoded without knowing the proper key. Steganography is the act of adding a hidden message to an image or other media file. It is similar to encrypting a document, but instead of running it through a cypher, the document is broken up and stored in unused, or unnoticable, bits within the overall image.
Watermarking attempts to hide a message as it is to tag a document for later identification. Watermarking is used to protect the copyright of the original owner

Watermarking life-cycle phases

Steps in the watermarking system


Embedding
The information to be embedded is called a digital watermark whereas the signal where the watermark is to be embedded is called the host signal In embedding, an algorithm accepts the host and the data to be embedded and produces a watermarked signal.

Attack During transmission of the signal to a person, If this person makes a modification, this is called an attack.
Detection It is an algorithm which is applied to the attacked or unmodified signal to attempt to extract the watermark from it.

How can an image be watermarked ?


Visible watermarks on images can be easily achieved thorough image editing software. Invisible watermarks implements several different watermarking algorithms which can be done in two ways. 1. Spatial domain. 2. Frequency domain

Spatial Domain
Spatial domain watermarking methods use blockxblock based watermarking. e.g. they embed the watermarks on a randomly selected 8x8 blocks of pixels of the image.

Frequency domain To embed a watermark, a frequency transformation is applied to the host data. Then, modifications are made to the transform coefficients. Possible frequency image transformations include the Discrete Fourier Transform

Algorithms based on spatial domain


1. Correlation based Watermarking.

2. CDMA Watermarking.

Algorithms based on frequency domain


Discrete Cosine transform PN sequence watermarking Mid-Band coefficient Exchange Watermarking

Attributes associated with watermarking


Imperceptibility :In watermarking, we traditionally seek high fidelity, i.e. the watermarked work must look or sound like the original. Robustness: It is more a property and not a requirement of watermarking. The watermark should be able to survive any resonable processing inflicted on the carrier. Security: The watermarked image should not reveal any clues of the presence of the watermark, with respect to un-authorized detection.

Current main applications of watermarking


1. 2. 3. 4. Copyright protection Fingerprinting Copy protection Image authentication

Purpose of the Project


Implementing different watermarking algorithms and observed the imperceptibility of the watermark embedded using each algorithm

SOFTWARE: MATLAB 7.0 PLATFORM: WINDOWS 98/ 2000 /XP/ Vista

Conclusion

Digital watermarking focuses on embedding information inside a digital object such that the embedded information is in separable bound to the object.

Any Queries?

You might also like