digital water marking

42
DIGITAL WATERMARKING Shashwat Shriparv [email protected] InfinitySoft

Upload: shashwat-shriparv

Post on 21-Jan-2015

9.320 views

Category:

Technology


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Digital water marking

DIGITAL WATERMARKING

Shashwat [email protected]

InfinitySoft

Page 2: Digital water marking

Overview

Introduction What is Watermarking? What is Digital Watermarking? Behind the Technology. Importance Types of Watermarking. Digital Watermarking Techniques. Features of Digital Watermarking. Applications Attacks to Digital Watermarking. Conclusion.

Page 3: Digital water marking

Introduction

Advantages of Digital DataCopy right problems with digital dataEncryption & DecryptionProblems with Encryption & Decryption

Page 4: Digital water marking

Conventional Encryption System

Page 5: Digital water marking

Watermark

“ Watermarking can be considered as a special

technique of steganography where one message is embedded in another and the two messages are related to each other in some way. “

Example :-

The presence of specific patterns in currency notes which are visible only when the note is held to light is a well known example for watermark.

What is Watermarking?

Page 6: Digital water marking

Example of a conventional watermark

Courtesy of Blue Spike, Inc.

Page 7: Digital water marking

Digital Watermarking is originated from Steganography

Page 8: Digital water marking

What is Digital Watermarking?

“ Digital watermarking is similar to watermarking physical objects, except that the watermarking technique is used for digital content instead of physical objects. “

Digital Watermark

Page 9: Digital water marking

Digital Watermark (Contn..)

In digital watermarking a low-energy signal is imperceptibly embedded in another signal. The low-energy signal is called watermark.

The main signal in which the watermark is embedded is referred to as cover signal since it covers the watermark.

An entity called watermark key used for embedding and detecting watermark signal

Watermark key is private

Page 10: Digital water marking

Behind The Technology

Sending Side …

Watermark Embedding process Water mark Original message Key Water marked image

Page 11: Digital water marking

Behind The Technology

Watermark retrieval process Water marked image Key Confidential message

Receiving Side …

Page 12: Digital water marking

The Overall SystemThe Technology

Roars…

Page 13: Digital water marking

Importance Of Digital Watermarking

© Copyright Information© On-line music industry© News gathering using digital cameras

Page 14: Digital water marking

Types of Digital Watermarking.

Robust & Fragile Watermarking Visible & Invisible Watermarking Public & Private Watermarking Asymmetric & Symmetric

Watermarking Steganograhic & Non-

Steganographic watermarking

Variety Adds…

Page 15: Digital water marking

Robust & Fragile Watermarking

Robust Watermarking:-Modification of watermarked content will not affect watermark

Fragile Watermarking:-Watermark get destroyed when watermarked content is modified or tampered with

Page 16: Digital water marking

Visible & Invisible Watermarking

On Visible watermarking, contents are visible

Page 17: Digital water marking

Visible & Invisible Watermarking (Contn..)

Invisible watermarking are not viewed on just looking

Page 18: Digital water marking

Public & Private Watermarking

• Public Watermarking

Users of content are authorized to detect watermark

• Private Watermarking

Users not authorized to detect watermark

Page 19: Digital water marking

Asymmetric & Symmetric watermarking

In Asymmetric watermarking different keys used for embedding and detecting watermark

Page 20: Digital water marking

Asymmetric & Symmetric watermarking (Contn..)

In symmetric watermarking same keys are used for embedding and detecting watermarks

Page 21: Digital water marking

Steganographic & Non-Steganographic Watermarking

Steganographic Watermarking

User unaware of the presence of a watermark

eg:-Used in finger printing applicationsNon-Steganographic WM:-

User aware of the presence of a watermark.

e.g.:-User to detect piracy

Page 22: Digital water marking

Digital Watermarking Techniques

LSB Watermarking Color Separation Technique Bit Stream Watermarking Word Space Coding, Line Space Coding

&Character Coding

Page 23: Digital water marking

LSB Watermarking

Lower order bits of selected pixels in the image are used to store watermarks

Replacing lower order bits of each pixel with higher order bit of different image

Page 24: Digital water marking

Color Separation Technique

Watermark appears only in one of the color bands

Used to watermark in still images Can be extended to moving images

Page 25: Digital water marking

Bit Stream Watermarking

Used in audio watermarking Data is directly inserted into compressed

audio files

Page 26: Digital water marking

Word Space Coding, Line Space Coding &Character Coding

Used for watermarking in text documents In word space coding, the spaces between

words are altered to embed watermark code. In line space coding the space between the lines are altered and in character coding some of the characters are imperceptibly modified (i.e., made larger, serifs enhanced, etc).

Page 27: Digital water marking

Features of Digital Watermarking

Imperceptibility Robustness Security

Page 28: Digital water marking

Applications of Digital Watermarking.

Copy ProtectionContent AuthenticationCopyright ProtectionMetadata Tagging

Page 29: Digital water marking

Copy Protection

It limits the access to copyrighted material and inhibit the copy process

Page 30: Digital water marking

Content Authentication

Robust watermarks are used in this area

Example:-A photographic information that may be presented as evidence in court. Since digital images can be easily manipulated, there is a need to provide proof that an image has not been altered.

Page 31: Digital water marking

Content Authentication

Page 32: Digital water marking

Copyright Protection

One of the main application Embedding watermarks in digital

photographs

Page 33: Digital water marking

Metadata Tagging

Watermarks convey object specific information to users of the object.

Used to attach patient identification data to medical images, or to highlight regions of diagnostic significance.

Page 34: Digital water marking

Attacks to Digital Watermarking

Stirmark Mosaic Attack

Page 35: Digital water marking

Stirmark

It is tool developed to test the robustness of image marking system

Stirmark is commonly produced by printers and scanners

IBM researchers have recently announced a technique that defeats the stir mark attack.

Detects and measures the geometric distortions in images, and removes the distortion to restore image geometry

Page 36: Digital water marking

StirmarkExample

Page 37: Digital water marking

Mosaic Attack

Use of a web crawler Dividing into sub images with rendition

instructions Browser will be rearranging the sub images to

appear as the original Sub images will be sufficiently small that no

single image on its own will contain a recognizable mark.

Page 38: Digital water marking

Mosaic AttackExample

Page 39: Digital water marking

Conclusion

DRM systems and content management are important for protection of rights of digital multimedia creations that are distributed on the Internet. Digital watermarking is an effective technique for embedding rights information in digital multimedia data.

Digital watermark technology can be used in consumer electronic devices like digital still camera, digital video camera, DVD players, MP3 players, etc., for various applications like providing controlled access, preventing illegal replication and watermark embedding

Page 40: Digital water marking

Conclusion (Contd..)

Digital information can easily be disseminated and copied via global networks.

The future of digital watermarking relies on setting standards and creating applications so that creators of digital content can easily implement it.

Page 41: Digital water marking

References

www.watermarkingworld.org www.digital-watermark.com

Page 42: Digital water marking

Shashwat [email protected]

InfinitySoft