Professional Documents
Culture Documents
on
“DIGITAL WATERMARKING”
Submitted to partial fulfilment of the requirements for the award of the degree of
BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE AND ENGINEERING
By
CH.SATHWIKA
20911A0551
2023-2024
VIDYA JYOTHI INSTITUTE OF TECHNOLOGY
(An Autonomous Institution)
(Approved by AICTE,New Delhi Affiliated to JNTU ,Hyderabad)
Aziz Nagar gate,C.B.Post,,Hyderabad-500075
CERTIFICATE
This is to certify that the technical seminar report titled “ DIGITAL WATERMARKING” is
being submitted by CH.SATHWIKA (20911A0551) in partial fulfilment for the award of the
Degree of Bachelor of Technology in “Computer Science & Engineering” ,is a record of
Bonafide work carried out by her under my guidance and supervision. These results embodied
in this technical report have not been submitted to any other University or Institute for the
award of any degree of diploma.
CH. SATHWIKA
20911A0551
ACKNOWLEDGEMENT
CH.SATHWIKA
(20911A0551)
ABSTRACT
Digital watermarking is the method of hiding digital data in any form of
multimedia data such as image, audio, video, etc. Digital watermarks are used for
verifying the integrity and authenticity of multimedia data and also used to prevent
fraud and forgery. A digital watermark is a digital signal or pattern inserted into
digital content. The digital content could be a still image, an audio clip, a video clip,
a text document, or some form of digital data that the creator or owner would like to
protect. The main purpose of the watermark is to identify who the owner of the digital
data is, but it can also identify the intended recipient.
Page no
LIST OF FIGURES
CHAPTER 1 INTRODUCTION 1
CHAPTER 2 WHAT IS DIGITAL WATERMARKING? 2
INVISIBILITY 3
ROBUSTNESS 3
AUTHENTICATION 3
COPYRIGHT PROTECTION 3
OWNERSHIP TRACKING 3
TAMPER DETECTION 3
FILE SHARING 4
VISIBILITY OPTION 4
AUTHENTICATION KEY 4
ADAPTABILITY 4
VISIBLE WATERMARKING 6
INVISIBLE WATERMARKING 6
PUBLIC WATERMARKING 7
FRAGILE WATERMARKING 7
WATERMARKING PROPERTIES 9
CHAPTER 7 PROCEDURE 11
CHAPTER 8 RISKS OF DIGITAL WATERMARKING 17
CHAPTER 9 ADVANTAGES AND DISADVANTAGES 19
ADVANTAGES 19
DISADVANTAGES 21
CHAPTER 10 CONCLUSION 23
CHAPTER 11 BIBLIOGRAPHY 24
LIST OF FIGURES PAGE NO.
1
CHAPTER-2
2
CHAPTER-3
3
7. Variable Strength: Watermarks can be designed with varying levels of
strength. Some may be strong and resistant to all but the most sophisticated
attacks, while others are more lightweight and suitable for less security-sensitive
applications.
4
CHAPTER-4
5
CHAPTER-5
1. Visible Watermarking:
- Overlay Watermarking: This is the most common type of visible watermarking.
It involves adding a semitransparent or opaque watermark, often containing text or a
logo, on top of the original content. It's easy to notice but doesn't interfere significantly
with the content itself. It's often used for branding, copyright protection, and ownership
attribution.
2. Invisible Watermarking:
- Spatial Domain Watermarking: In this technique, the watermark information is
directly embedded into the pixel values of the media. The original media and the
watermarked version look nearly identical to the human eye. Detecting the watermark
requires special software or algorithms that can analyze the subtle changes made to the
pixel values.
- Frequency Domain Watermarking: Watermarks are embedded in the frequency
domain, often using techniques like discrete cosine transform (DCT) or wavelet
transform. This method makes watermarks less susceptible to common image
processing operations.
- Spread Spectrum Watermarking: It spreads the watermark signal across a wide
range of frequencies in the media, making it robust against various signal processing
and compression attacks.
- Quantization-Based Watermarking: Watermarks are embedded by slightly
adjusting the quantization levels of the media, such as in JPEG compression. This
method is commonly used in audio and image watermarking.
3. Geometric Watermarking:
- Geometric watermarking involves embedding watermarks by introducing geometric
transformations like scaling, rotation, translation, and shearing. This technique is often
applied to images for copyright protection and authentication.
6
4. Fragile Watermarking:
- Fragile watermarks are highly sensitive to any modifications or tampering with the
content. If even minor changes occur, the watermark detection process will reveal that
the content has been altered. This is used for ensuring the integrity and authenticity of
digital documents, such as legal contracts and digital forensics.
5. Robust Watermarking:
- Robust watermarks are designed to withstand common signal processing operations
and compression techniques. They are commonly used in scenarios where copyright
protection or content tracking is essential, and the content may undergo various
transformations.
6. Blind Watermarking:
- Blind watermarking techniques do not require knowledge of the original,
unwatermarked content during the watermark extraction process. They are useful when
access to the original content is restricted or impractical.
7. Non-Blind Watermarking:
- Non-blind watermarking relies on knowledge of the original, unwatermarked
content during watermark embedding and extraction. This often leads to higher
detection accuracy.
9. Audio Watermarking:
- Audio watermarking techniques are designed specifically for embedding
information into audio signals, which can be music, speech, or other audio content. This
is useful for copyright protection and content identification in audio streams.
7
10. Video Watermarking:
- Video watermarking techniques are tailored to video content and often take into
account both spatial and temporal considerations. They are used in applications like
video authentication and broadcast monitoring.
12. Steganography:
- Steganography is not exactly watermarking but involves hiding information within
digital media in a covert manner. Unlike watermarks, which are designed to be detected,
steganographic techniques aim to keep the presence of hidden data secret.
Steganography can be used for various purposes, including secret communication and
data hiding.
8
CHAPTER-6
10
CHAPTER-7
PROCEDURE
11
example a 512 X 512 image would be described as a 262144 elements vector in a
262144-dimensional space. Geometric models can be very useful to better
visualize the watermarking process using a number of regions based on the
desirable properties of watermarking. One of these regions is the embedding
region, which is the region that contains all the possible images resulting from the
embedding of a message inside an unwatermarked image using some watermark
embedding algorithm. Another very important region is the detection region,
which is the region containing all the possible images from which a watermark
can be successfully extracted using a watermark detection algorithm. Lastly, the
region of acceptable fidelity contains all the possible images resulting from the
embedding of a message into an unwatermarked image, which essentially look
identical to the original image. The embedding region for a given watermarking
system should ideally lie inside the intersection of the detection region and the
region of acceptable fidelity, in order to produce successfully detected watermarks
that do not alter the image quality very much. An example of a geometric model
can be seen in Figure 2. Here we can see that if mean square error (MSE) is used
as a measure of fidelity, the region of acceptable fidelity would be an n-
dimensional sphere centered on the original unwatermarked image (co), with a
radius defined by the largest MSE we are willing to accept for images with
acceptable fidelity. The detection region for a detection algorithm based on linear
correlation would be defined as a half space, based on the threshold used to decide
whether an image has a watermark embedded or not. Note that the diagram is
merely a projection of an n-dimensional space into a 2d space.
12
1]. The watermarking key is the seed that is used to initiate the pseudo-random
number generator that creates the random reference pattern. 2. Calculate a message
pattern depending on whether we are embedding a 1 or a 0. For a 1, leave the
random reference pattern as it is. For a 0, take its negative to get the message
pattern. 3. Scale the message pattern by a constant α which is used to control the
embedding strength. For higher values of α we have more robust embedding, at the
expense of loosing image quality.
Detector:
1.Calculate the linear correlation between the watermarked image that was
received and the initial reference pattern that can be recreated using the initial seed
which acted as the watermarking key.
2. Decide what the watermark message was, according to the result of the
correlation. If the linear correlation value was above a threshold, we say that the
message was a 1. If the linear correlation was below the negative of the threshold
we say that the message was a 0. If the linear correlation was between the negative
and the positive threshold we say that no message was embedded.
Embedder:
1. Choose a random reference pattern. This is simply an array with the same
dimensions as the original image, whose elements are drawn from a random
Gaussian distribution in the interval [-1, 1]. The watermarking key is the seed that
is used to initiate the pseudorandom number generator that creates the random
reference pattern.
13
4. Scale the message pattern by α which is used to control the embedding strength.
5. Add the scaled message pattern to the original image to get the watermarked
image.
14
into an image. It uses block-based embedding, which means that the watermarking
process is done on smaller dimensionality vectors extracted by using blocks instead
of pixels in the image. It also uses fixed robustness embedding, which means that
the maximum amount of noise the watermark embedded into the cover image can
withstand is kept constant rather than keeping the correlation value constant as in
the informed embedding system. The detector uses the correlation coefficient
instead of linear correlation to decide what message was embedded into an image.
The algorithm for the embedder and detector of this system follows:
Embedder:
3.Find the correlation coefficient of the vector extracted from the original image
and each of the reference patterns in the set corresponding to the message we want
to embed. If we want to embed a 1, we only check the reference patterns created
for 1, not those created for 0.
4. Choose the reference pattern with the highest correlation coefficient (most
similar to the image) and embed it into the image using a fixed robustness algorithm
and reprojecting it into the same dimensions as the original image. The fixed
robustness algorithm is not relevant in this discussion and is therefore not described.
Detector:
2. Find the correlation coefficient of the vector extracted from the watermarked
image and each of the reference patterns in the two sets corresponding to 1 and 0.
3. The reference pattern with the highest correlation coefficient then classifies the
watermark message. If the correlation coefficient of this reference pattern is below
a give threshold, then the image has no watermark embedded. If this reference
pattern belongs to the set of reference patterns corresponding to 1 and its correlation
15
coefficient is above the given threshold, then the original message was a 1. If this
reference pattern belongs to the set of reference patterns corresponding to 0 and its
correlation coefficient is above the given threshold, then the original message was
a 0. An example of the result of the embedder.
MSE between the original image and the resulting watermarked image for 400small
images (112 x 92 pixels). I embedded a 1 as well as a 0 in each of these images,
result in gin 800 watermarked images and consequently 800 MSE values for a given
reference pattern set size. Then I plotted the average of this MSE value for reference
pattern set sizes ranging from1 to 40.
Average MSE for watermarked images with respect to the reference pattern set size
The x axis represents the number of reference patterns for each run of the
experiment, ranging from 1 to40. The y axis is the average MSE resulting from
each run of the experiment. As we can see, although the MSE starts at a quite high
value of 17.5 for only one reference pattern, it gradually falls to less than 15.5 for
40 reference patterns. This indicates the fact that using more reference patterns to
encode a message results in increased fidelity because there is a higher chance to
find a reference pattern closer to the original image. The effectiveness of this system
was also investigated in the same way as in the previous two systems. I used 400
small images (112 x 92 pixels). I ran the embedding algorithm with a reference
pattern set size of 40, to embed a 1 and a 0 in each of these images, resulting in 800
watermarked images. I then calculated the correlation coefficient (as in the detector)
for each one of those images and plotted the result. This can be seen in Figure 16.
The x-axis is the linear correlation value, while the y axis is the number of images
that had a specific correlation coefficient value. The red graph represents the images
that had a 0 embedded and the blue graph represents the images that had a 1
embedded
16
CHAPTER-8
Digital watermarking, while a useful technology, comes with certain risks and potential
drawbacks that should be considered when implementing it. These risks include:
4. Interference with Content: In some cases, watermarks can interfere with the
content itself, causing artifacts that are visible or audible to users. This can negatively
affect the viewing or listening experience.
11. Limited Tracking: Watermarks primarily track the existence of content but not
its actual usage or distribution. They may not provide complete visibility into how,
when, and where content is being consumed.
18
CHAPTER-9
19
Covert Communication: Watermarking can be used for covert communication
in certain scenarios, where information is hidden within digital media for secret
or confidential purposes. This is often seen in military, intelligence, and security
applications.
21
Complexity and Cost: Implementing a digital watermarking system, especially
one with high security and robustness, can be complex and costly. This includes
the development of watermarking algorithms, integration into software or
hardware, and ongoing maintenance.
Legal and Ethical Considerations: The use of digital watermarks can lead to
legal and ethical debates, especially if they are perceived as invasive or used for
tracking and surveillance purposes.
22
CHAPTER-10
CONCLUSION
23
CHAPTER-11
BIBLIOGRAPHY
[2] Aque, A. J. A., Madronero, I. M., Nabasca, R. B., Edig, M. M. N., & Buladaco,
M. V. M.(2021). Relationship between Digital Marketing and Economic Stability
of Online Sellers inPanabo City. International Journal of Scientific Research and
Engineering Development, 4(1),805-815.
[4] Bizhanova, K., Mamyrbekov, A., Umarov, I., Orazymbetova, A., &
Khairullaeva, A.(2019). Impact of digital marketing development on
entrepreneurship. In E3S web ofconferences, 135, 04023. EDP Sciences.
24