Professional Documents
Culture Documents
Prashant kawale
2008H103034
Agenda
• Background
• Terminology
• Applications
• Techniques
• Research topics
• References
Information Hiding
• Information Hiding…..started with
Embed (D, W, K) = Dw
1 2 3 4
5 6 7 8
9 10 11 12
Watermarking Process
Example – Extraction
• The Watermark can be identified by generating the
random numbers using the seed K
6 8
10
Data Domain Categorization
• Spatial Watermarking
Direct usage of data to embed and extract Watermark
e.g. voltage values for audio data
Watermarking
Watermarking
0 1 1 1 1 0
Attack
1 2 3 3 2 1
Capacity
Only be accessible by authorized parties
Security
Resistance against hostile/user dependent
changes
Robustness
Invisibility
Imperceptibility
Tamper proofing
• Robustness against user related
operations – compression, format
conversion
THANK YOU !