You are on page 1of 16

DIGITAL WATERMARKING TOOL

MAJOR PROJECT

SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR


THE AWARD OF THE DEGREE OF

B-Tech
(Computer Science)

SUBMITTED BYGAURAV KUMAR


August 2015

GGS College of Modern Technology,


Kharar

NAME-GAURAV KUMAR
PTU REGISTRATION No cum Roll No-1242787
ADDRESS: - Omega city, Flat no-407D, Near Chandigarh Ludhiana highway
CONTACT:-9569991123
E-MAIL:-kgaurav776@gmail.com
BRANCH-COMPUTER SCIENCE
YEAR OF ADMISSION-2012
NO.OF SUBJECTS PASS TILL DATE-26
PROPOSED TOPIC DIGITAL WATERMARKING TOOL

ABSTRACT
The enormous popularity of the World Wide Web in the early 1990s demonstrated the
commercial potential of offering multimedia resources through the digital networks. Since
commercial interests seek to use the digital networks to offer digital media for profit, they have
a strong interest in protecting their ownership rights. Digital watermarking has been proposed as
one way to accomplish this.
A digital watermark is a digital signal or pattern inserted into a digital image. Since this signal
or pattern is present in each unaltered copy of the original image, the digital watermark may also
serve as a digital signature for the copies. A given watermark may be unique to each copy (e.g.
to identify the intended recipient), or be common to multiple copies (e.g. to identify the document
source). In either case, the watermarking of the document involves the transformation of the
original into another form. This distinguishes digital watermarking from digital fingerprinting
where the original file remains intact, but another file is created that "describes" the original file's
content. For example, the checksum field for a disk sector would be a fingerprint of the preceding
block of data. Similarly, hash algorithms produce fingerprint files.

AKNOWLEDGEMENT

At first I would like to thank the most gracious, the merciful Almighty GOD for providing us
enough strength and patience that carried through the work and enable me to complete this work.
I would like to express my gratitude to all those who gave me helping hand in completing this
major project. I want to thank my Class In-charge Mr. Pradeep Kumar for helping me whenever
I needed it the most. My friends have also supported me in my work. I want to thank them all for
their help, support, interest and valuable hints.

Table of Content

Contents

Page no

Introduction

6-7

Brief Literature survey

8-9

Problem formulation

10

Objectives

11-12

Methodology/ Planning of work

13

Facilities required for proposed work

14

Proposed Place of work

15

Conclusion

16

References

17

INTRODUCTION
The so-called digital watermarking are also referred to as simply watermarking, a pattern of
bits inserted into a digital image, audio or video file that identifies the file's copyright information
(author, rights, etc.), it's digital watermark. The name comes from the faintly visible digital
watermarks imprinted on stationery that identify the manufacturer of the stationery. The purpose
of digital watermarking is to provide copyright protection for intellectual property that's in digital
format.
Digital watermarking is designed to add some digital information to the multimedia data, such
as images (digital watermarking images), voice and video signal (digital watermarking video)
and so on. It aims to distinguish the authority of documents, protect copyright functions and some
other functions. Digital image watermarking usually embeds visible or invisible digital
watermarking in the main document, without affecting the appearance and integrity of original
document.
Digital watermark can embed some information that can protect copyright or track infringing
behaviors in the protected digital data(such as images, video, audio, etc.) .The embedded
information can be the author's serial number, company logo, meaningful text and so on.
The project presented exists in a program, developed in Matlab, which provides the possibility
of inserting a watermark within an image.
Wikipedia gives the following definition of watermarking: "'inclusion of information within a
multimedia file, or other, that can then be detected or extracted"; basically it is a technique used
in various fields (the protection of content -digital signatures or trademarks of Copyright- data
encryption), used even by terrorism (stenographic watermarking).

HISTORY
The term "digital watermark" was first coined in 1992 by Andrew Tirkel and Charles Osborne.
Watermarks are identification marks produced during the paper making process. The first
watermarks appeared in Italy during the 13th century, but their use rapidly spread across Europe.
They were used as a means to identify the papermaker or the trade guild that manufactured the
paper. The marks often were created by a wire sewn onto the paper mold. Watermarks continue
to be used today as manufacturer's marks and to prevent forgery

Fig. Digital watermarking


Also referred to as simply watermarking, a pattern of bits inserted into a digital image, audio or
video file that identifies the file's copyright information (author, rights, etc.). The name comes
from the faintly visible watermarks imprinted on stationery that identify the manufacturer of the
stationery. The purpose of digital watermarks is to provide copyright protection for intellectual
property that's in digital format.
Unlike printed watermarks, which are intended to be somewhat visible, digital watermarks are
designed to be completely invisible, or in the case of audio clips, inaudible. Moreover, the actual

bits representing the watermark must be scattered throughout the file in such a way that they
cannot be identified and manipulated. And finally, the digital watermark must be robust enough
so that it can withstand normal changes to the file, such as reductions from lossy
compression algorithms.
Satisfying all these requirements is no easy feat, but there are a number of companies offering
competing technologies. All of them work by making the watermark appear as noise - that is,
random data that exists in most digital files anyway. To view a watermark, you need a special
program that knows how to extract the watermark data.
Watermarking is also called data embedding and information hiding

BRIEF LITERATURE SURVEY


The increasing amount of research on watermarking over the past decade has been largely driven
by its important applications in digital copyrights management and protection. One of the first
applications for watermarking was broadcast monitoring. It is often crucially important that we
are able to track when a specific video is being broadcast by a TV station. This is important to
advertising agencies that want to ensure that their commercials are getting the air time they paid
for. Watermarking can be used for this purpose. Information used to identify individual videos
could be embedded in the videos themselves using watermarking, making broadcast monitoring
easier. Another very important application is owner identification. Being able to identify the
owner of a specific digital work of art, such as a video or image can be quite difficult.
Nevertheless, it is a very important task, especially in cases related to copyright infringement.
So, instead of including copyright notices with every image or song, we could use watermarking
to embed the copyright in the image or the song itself. Transaction tracking is another interesting
application of watermarking. In this case the watermark embedded in a digital work can be used
to record one or more transactions taking place in the history of a copy of this work. For example,
watermarking could be used to record the recipient of every legal copy of a movie by embedding
a different watermark in each copy. If the movie is then leaked to the Internet, the movie
producers could identify which recipient of the movie was the source of the leak. Finally, copy
control is a very promising application for watermarking. In this application, watermarking can
be used to prevent the illegal copying of songs, images of movies, by embedding a watermark in
them that would instruct a watermarking compatible DVD or CD writer to not write the song or
movie because it is an illegal copy.
Added Protection
Digital watermarks cannot be removed or altered, making them a very important tool when
fighting copyright infringement on the Web. Digital watermarks allow users to legally use
9

content, while adding security to the content to prevent illegal usage. Digital watermarks are
"robust," meaning they are able to survive attacks from potential hackers or any type of
manipulation, in addition to providing information about the original owner.

Visible or Invisible?
Invisible digital watermarks are generally undetectable to the human eye and ear, but can be
detected by computers, DVD recorders, digital cameras or other devices that are equipped with
the appropriate software. If an image is used illegally, an invisible watermark not only notifies
the user of the legal copyright owner, but may also show the prosecution methods the owner will
use if the image is used or copied illegally. To combat the estimated 500,000 movies illegally
downloaded every day, the movie industry frequently uses invisible watermarks causing the
words "do not copy" to appear on illegal copies.

Applications :-

Content protection for audio and video content

Forensics and piracy deterrence

Content filtering (includes blocking and triggering of actions)

Communication of ownership and copyrights

Document and image security

Authentication of content and objects (includes government IDs)

Broadcast monitoring

Locating content online

Rich media enhancement for mobile phones

10

PROBLEM FORMULATION

Digital watermarking relates to a technology known as steganography, which literally means


"covered writing." It is a technique designed to secure a message by hiding that message within
another object so that it can be kept secret from everyone except the intended recipient. This is
quite different from cryptography that renders the message (which is typically visible or audible)
unintelligible to unauthorized viewers to prevent access.

Requirements of watermarks

To be effective in the protection of the ownership of intellectual property, the invisibly


watermarked document should satisfy several criteria:

The watermark must be difficult or impossible to remove, at least without visibly


degrading the original image

The watermark must survive image modifications that are common to typical imageprocessing applications (e.g. scaling, colour requantisation, dithering, cropping and
image compression)

An invisible watermark should be imperceptible so that the view of the image is


unaffected

For some invisible watermarking applications, watermarks should be readily detectable


by the proper authorities, even if imperceptible to the average observer. Such decodability
without requiring the original, un-watermarked image would be necessary for efficient
recovery of property and subsequent prosecution.

One can understand the challenge of researchers in this field since the above requirements
are stringent and sometimes clash with one another. The litmus test of a watermarking
method would be that it is accepted and used on a large, commercial scale, and that it
stands up in a court of law. None of the digital techniques have yet to meet these tests.
11

OBJECTIVES
The main characteristics of digital watermark:-

Robustness: The watermark should be able to withstand after normal signal processing
operations

such

as

image

cropping,

transformation,

compression

etc.

Imperceptibility: The watermarked image should look like same as the original image to the
normal

eye.

The

viewer

cannot

detect

that

watermark

is

embedded

in

it.

Security: An unauthorized person cannot detect, retrieve or modify the embedded watermark.
Depending on the ability of the watermark to withstand normal signal processing operations,
digital watermarking can be categorized as robust, fragile and semi-fragile watermarking. Robust
watermarks are detectable even after some image processing operations has been performed on
the watermarked image such as image scaling, bending, cropping, and so on. Robust watermarks
are mainly used for copyright protection. Fragile watermarks became invalid even if a slight
modification is done to the watermarked image. Fragile watermarks are mainly used for
authentication purpose. Semi-fragile watermarks allow some acceptable distortion to the
watermarked image. Beyond this acceptance level if any modification is done to the watermarked
image, the watermark will not be detected.

12

METHODOLOGY/PLANNING OF WORK

Fig. Working of watermark tool

Cover work

Watermark
Embedder

Watermarked

Watermark
Detector

work

Watermark Message
Fig. A watermark system

13

Detected
watermarked
work

FACILITIES REQUIRED FOR PROPOSED WORK


Hardware requirements: Processor

: Intel Pentium 1.60ghz

Hard disk

: 40 GB

Ram

: 1 GB

Cache memory

: 3 MB

Monitor

: 15 color monitor

Keyboard
Mouse
Software requirements: Operating System

Windows XP

Software

MATLAB

14

PROPOSED PLACE OF WORK

At home
At college

15

CONCLUSION
The Future of Digital Watermarking
A number of companies, such as the Digimarc Corporation, Sony and IBM have introduced
digital watermarking software applications that allow individuals to imbed watermarks within
image, audio and video files to protect them from copyright infringement. The watermarks may
be viewed with software and can reveal either a unique identification code that can be traced to
the copyright owner or specific information about the copyright owner.

Though publishers have been clamoring for some means to protect their material on electronic
networks, there has been no rush yet to embrace any of the current schemes. This could be just
due to a period of inspection and appraisal, but our opinion is that publishers and scientists have
yet to fully understand the practical specifications associated with the problem. Should the
watermarks be visible or invisible? What constitutes invisibility? How difficult should it be to
remove watermarks from images? How might one characterize "good-enough watermarking" for
different commercial and non-commercial applications? What constitutes a "reasonable" level of
photo-editing? Or, of degradation? Can the original image be required for decoding? Is transferal
of the watermark from the electronic medium to the printed medium important? How are the
watermarks to be policed?
As scientists propose solutions and publishers experiment with them and debate their merits,
some methods of watermarking will emerge as useful and be widely used. When that happens,
there will also be the emergence of external agencies for monitoring electronic copyright
infringement (much the same as there are agencies for music and print copyright management).
In the meantime, the challenge is for the scientists to develop ever more invisible, decodable and
permanent watermarking methods, and perhaps to meet even more specifications as they are
demanded.

16

You might also like