Professional Documents
Culture Documents
MAJOR PROJECT
B-Tech
(Computer Science)
NAME-GAURAV KUMAR
PTU REGISTRATION No cum Roll No-1242787
ADDRESS: - Omega city, Flat no-407D, Near Chandigarh Ludhiana highway
CONTACT:-9569991123
E-MAIL:-kgaurav776@gmail.com
BRANCH-COMPUTER SCIENCE
YEAR OF ADMISSION-2012
NO.OF SUBJECTS PASS TILL DATE-26
PROPOSED TOPIC DIGITAL WATERMARKING TOOL
ABSTRACT
The enormous popularity of the World Wide Web in the early 1990s demonstrated the
commercial potential of offering multimedia resources through the digital networks. Since
commercial interests seek to use the digital networks to offer digital media for profit, they have
a strong interest in protecting their ownership rights. Digital watermarking has been proposed as
one way to accomplish this.
A digital watermark is a digital signal or pattern inserted into a digital image. Since this signal
or pattern is present in each unaltered copy of the original image, the digital watermark may also
serve as a digital signature for the copies. A given watermark may be unique to each copy (e.g.
to identify the intended recipient), or be common to multiple copies (e.g. to identify the document
source). In either case, the watermarking of the document involves the transformation of the
original into another form. This distinguishes digital watermarking from digital fingerprinting
where the original file remains intact, but another file is created that "describes" the original file's
content. For example, the checksum field for a disk sector would be a fingerprint of the preceding
block of data. Similarly, hash algorithms produce fingerprint files.
AKNOWLEDGEMENT
At first I would like to thank the most gracious, the merciful Almighty GOD for providing us
enough strength and patience that carried through the work and enable me to complete this work.
I would like to express my gratitude to all those who gave me helping hand in completing this
major project. I want to thank my Class In-charge Mr. Pradeep Kumar for helping me whenever
I needed it the most. My friends have also supported me in my work. I want to thank them all for
their help, support, interest and valuable hints.
Table of Content
Contents
Page no
Introduction
6-7
8-9
Problem formulation
10
Objectives
11-12
13
14
15
Conclusion
16
References
17
INTRODUCTION
The so-called digital watermarking are also referred to as simply watermarking, a pattern of
bits inserted into a digital image, audio or video file that identifies the file's copyright information
(author, rights, etc.), it's digital watermark. The name comes from the faintly visible digital
watermarks imprinted on stationery that identify the manufacturer of the stationery. The purpose
of digital watermarking is to provide copyright protection for intellectual property that's in digital
format.
Digital watermarking is designed to add some digital information to the multimedia data, such
as images (digital watermarking images), voice and video signal (digital watermarking video)
and so on. It aims to distinguish the authority of documents, protect copyright functions and some
other functions. Digital image watermarking usually embeds visible or invisible digital
watermarking in the main document, without affecting the appearance and integrity of original
document.
Digital watermark can embed some information that can protect copyright or track infringing
behaviors in the protected digital data(such as images, video, audio, etc.) .The embedded
information can be the author's serial number, company logo, meaningful text and so on.
The project presented exists in a program, developed in Matlab, which provides the possibility
of inserting a watermark within an image.
Wikipedia gives the following definition of watermarking: "'inclusion of information within a
multimedia file, or other, that can then be detected or extracted"; basically it is a technique used
in various fields (the protection of content -digital signatures or trademarks of Copyright- data
encryption), used even by terrorism (stenographic watermarking).
HISTORY
The term "digital watermark" was first coined in 1992 by Andrew Tirkel and Charles Osborne.
Watermarks are identification marks produced during the paper making process. The first
watermarks appeared in Italy during the 13th century, but their use rapidly spread across Europe.
They were used as a means to identify the papermaker or the trade guild that manufactured the
paper. The marks often were created by a wire sewn onto the paper mold. Watermarks continue
to be used today as manufacturer's marks and to prevent forgery
bits representing the watermark must be scattered throughout the file in such a way that they
cannot be identified and manipulated. And finally, the digital watermark must be robust enough
so that it can withstand normal changes to the file, such as reductions from lossy
compression algorithms.
Satisfying all these requirements is no easy feat, but there are a number of companies offering
competing technologies. All of them work by making the watermark appear as noise - that is,
random data that exists in most digital files anyway. To view a watermark, you need a special
program that knows how to extract the watermark data.
Watermarking is also called data embedding and information hiding
content, while adding security to the content to prevent illegal usage. Digital watermarks are
"robust," meaning they are able to survive attacks from potential hackers or any type of
manipulation, in addition to providing information about the original owner.
Visible or Invisible?
Invisible digital watermarks are generally undetectable to the human eye and ear, but can be
detected by computers, DVD recorders, digital cameras or other devices that are equipped with
the appropriate software. If an image is used illegally, an invisible watermark not only notifies
the user of the legal copyright owner, but may also show the prosecution methods the owner will
use if the image is used or copied illegally. To combat the estimated 500,000 movies illegally
downloaded every day, the movie industry frequently uses invisible watermarks causing the
words "do not copy" to appear on illegal copies.
Applications :-
Broadcast monitoring
10
PROBLEM FORMULATION
Requirements of watermarks
The watermark must survive image modifications that are common to typical imageprocessing applications (e.g. scaling, colour requantisation, dithering, cropping and
image compression)
One can understand the challenge of researchers in this field since the above requirements
are stringent and sometimes clash with one another. The litmus test of a watermarking
method would be that it is accepted and used on a large, commercial scale, and that it
stands up in a court of law. None of the digital techniques have yet to meet these tests.
11
OBJECTIVES
The main characteristics of digital watermark:-
Robustness: The watermark should be able to withstand after normal signal processing
operations
such
as
image
cropping,
transformation,
compression
etc.
Imperceptibility: The watermarked image should look like same as the original image to the
normal
eye.
The
viewer
cannot
detect
that
watermark
is
embedded
in
it.
Security: An unauthorized person cannot detect, retrieve or modify the embedded watermark.
Depending on the ability of the watermark to withstand normal signal processing operations,
digital watermarking can be categorized as robust, fragile and semi-fragile watermarking. Robust
watermarks are detectable even after some image processing operations has been performed on
the watermarked image such as image scaling, bending, cropping, and so on. Robust watermarks
are mainly used for copyright protection. Fragile watermarks became invalid even if a slight
modification is done to the watermarked image. Fragile watermarks are mainly used for
authentication purpose. Semi-fragile watermarks allow some acceptable distortion to the
watermarked image. Beyond this acceptance level if any modification is done to the watermarked
image, the watermark will not be detected.
12
METHODOLOGY/PLANNING OF WORK
Cover work
Watermark
Embedder
Watermarked
Watermark
Detector
work
Watermark Message
Fig. A watermark system
13
Detected
watermarked
work
Hard disk
: 40 GB
Ram
: 1 GB
Cache memory
: 3 MB
Monitor
: 15 color monitor
Keyboard
Mouse
Software requirements: Operating System
Windows XP
Software
MATLAB
14
At home
At college
15
CONCLUSION
The Future of Digital Watermarking
A number of companies, such as the Digimarc Corporation, Sony and IBM have introduced
digital watermarking software applications that allow individuals to imbed watermarks within
image, audio and video files to protect them from copyright infringement. The watermarks may
be viewed with software and can reveal either a unique identification code that can be traced to
the copyright owner or specific information about the copyright owner.
Though publishers have been clamoring for some means to protect their material on electronic
networks, there has been no rush yet to embrace any of the current schemes. This could be just
due to a period of inspection and appraisal, but our opinion is that publishers and scientists have
yet to fully understand the practical specifications associated with the problem. Should the
watermarks be visible or invisible? What constitutes invisibility? How difficult should it be to
remove watermarks from images? How might one characterize "good-enough watermarking" for
different commercial and non-commercial applications? What constitutes a "reasonable" level of
photo-editing? Or, of degradation? Can the original image be required for decoding? Is transferal
of the watermark from the electronic medium to the printed medium important? How are the
watermarks to be policed?
As scientists propose solutions and publishers experiment with them and debate their merits,
some methods of watermarking will emerge as useful and be widely used. When that happens,
there will also be the emergence of external agencies for monitoring electronic copyright
infringement (much the same as there are agencies for music and print copyright management).
In the meantime, the challenge is for the scientists to develop ever more invisible, decodable and
permanent watermarking methods, and perhaps to meet even more specifications as they are
demanded.
16