You are on page 1of 19

SRI INDU COLLEGE OF ENGINEERING

AND TECHNOLOGY

DIGITAL WATERMARKING
DEPARTMENT OF INFORMATION TECHNOLOGY
TECHNICAL SEMINAR

V. Rohitha(18D41A1256)
Digital image processing is the use of computer
algorithms to perform image processing on digital images
which is a subfield of digital signal processing.

Basic Types of Images

• Binary images
• Indexed images
• Grayscale images.
• True color images.
The process of embedding information
into another object/signal is termed as watermarking.
The signal can be audio, text , picture or a video.
Types of Watermarks
Visible watermark
The information is visible which is a text or a logo which
identifies the owner of the media.

Invisible watermark
An invisible watermark is an embedded image which
cannot be perceived with human’s eyes and are intended to
prevent or deter unauthorized copying of digital media.
Visible Watermark
Original Image Watermarked image
Invisible Watermark
Original image Watermarked image
Detection of modification of an image using
Watermarking Technology.
(a)Image protected with Watermarking technology.
(b)Tampered image.
(c) Image after running the Watermark Detection Technology.
Cryptography :
In cryptography the message will be encrypted and cannot be decoded without
knowing the proper key.

Steganography:
The act of adding a hidden message to an image or other media file. It is similar to
encrypting a document, but instead of running it through a cypher, the document is
broken up and stored in unused, or unnoticable, bits within the overall image.

Watermarking attempts to hide a message as it is to tag a document for later


identification.Watermarking is used to protect the copyright of the original owner.
Watermarking life-cycle phases
Steps in the watermarking system
• Embedding
The information to be embedded is called a digital watermark whereas the
signal where the watermark is to be embedded is called the host signal In
embedding, an algorithm accepts the host and the data to be embedded and
produces a watermarked signal.

• Attack
During transmission of the signal to a person, If this person makes a
modification, this is called an attack.

• Detection
It is an algorithm which is applied to the attacked or unmodified signal to
attempt to extract the watermark from it.
How can an image be watermarked ?

• Visible watermarks on images can be easily achieved


thorough image editing software.

• Invisible watermarks implements several different


watermarking algorithms which can be done in two
ways.
1. Spatial domain.
2. Frequency domain
Spatial Domain

Spatial domain watermarking methods use blockxblock based watermarking.


e.g. they embed the watermarks on a randomly selected 8x8 blocks of pixels
of the image.

Frequency domain

To embed a watermark, a frequency transformation is applied to the host data.


Then, modifications are made to the transform coefficients. Possible
frequency image transformations include the Discrete Fourier Transform
• 1. Correlation based Watermarking.

• 2. CDMA Watermarking.
• Discrete Cosine transform PN sequence
watermarking

• Mid-Band coefficient Exchange Watermarking


• Imperceptibility :In watermarking, we traditionally seek high
fidelity, i.e. the watermarked work must look or sound like the
original.

• Robustness: It is more a property and not a requirement of


watermarking. The watermark should be able to survive any
resonable processing inflicted on the carrier.

• Security: The watermarked image should not reveal any clues of


the presence of the watermark, with respect to un-authorized
detection.
1. Copyright protection
2. Fingerprinting
3. Copy protection
4. Image authentication
Purpose of the Project

 
• Implementing different watermarking algorithms and observed
the imperceptibility of the watermark embedded using each
algorithm
 

• SOFTWARE: MATLAB 7.0


 
• PLATFORM: WINDOWS 98/ 2000 /XP/ Vista
Conclusion

Digital watermarking focuses on embedding information inside a


digital object such that the embedded information is in
separable bound to the object.

You might also like