By Samarth GodaraRoll no. 14223004
Mtech 1st sem. NITJ, Punjab
Summary of
A Survey of Digital Watermarking Techniques, Applications and Attacks
A paper by Prabhishek Singh, R S Chadha
By Samarth GodaraRoll no. 14223004
Mtech 1st sem. NITJ, Punjab
Summary of
A Survey of Digital Watermarking Techniques, Applications and Attacks
A paper by Prabhishek Singh, R S Chadha
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric● Definition● Need
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric● Definition● Need
● Classification● Features● Performance Factor● Architecture of Digital
Watermarking● Styles of Robust
Watermarks
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric● Definition● Need
● Classification● Features● Performance Factor● Architecture of Digital
Watermarking● Styles of Robust
Watermarks
● Spatial Domain● Additive Watermarking● LSB● SSM Modulation● Texture Mapping Coding● Patchwork Algo● Correlation Based
● Frequency Domain● DCT● DWT● DFT
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric● Definition● Need
● Classification● Features● Performance Factor● Architecture of Digital
Watermarking● Styles of Robust
Watermarks
● Spatial Domain● Additive Watermarking● LSB● SSM Modulation● Texture Mapping Coding● Patchwork Algo● Correlation Based
● Frequency Domain● DCT● DWT● DFT
● Copyright Protection● Copy Protection● Digital Right Management● Tamper Proofing● Broadcast Monitering● Fingerprinting● Access Control● Medical Application● Image and Content Authentication● Annotation and privacy control● Media Forensics● Communication Enhancement● Content Protection● Content Filtering● Communication of ownership
and objects● Document Security● Locating Content Online● Audience Measurement● Improved Auditing
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric● Definition● Need
● Classification● Features● Performance Factor● Architecture of Digital
Watermarking● Styles of Robust
Watermarks
● Spatial Domain● Additive Watermarking● LSB● SSM Modulation● Texture Mapping Coding● Patchwork Algo● Correlation Based
● Frequency Domain● DCT● DWT● DFT
● Copyright Protection● Copy Protection● Digital Right Management● Tamper Proofing● Broadcast Monitering● Fingerprinting● Access Control● Medical Application● Image and Content Authentication● Annotation and privacy control● Media Forensics● Communication Enhancement● Content Protection● Content Filtering● Communication of ownership
and objects● Document Security● Locating Content Online● Audience Measurement● Improved Auditing
● Removal Attack● Interference Attack● Geometric Attack● Low pass filtering attack● Forgery Attack● Security Attack● Protocol Attack● Cryptographic Attack● Active Attack● Passive Attack● Collusion Attacks● Image Degradation● Image Enhancement● Image Compression● Image Transformation
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric● Definition● Need
● Classification● Features● Performance Factor● Architecture of Digital
Watermarking● Styles of Robust
Watermarks
● Spatial Domain● Additive Watermarking● LSB● SSM Modulation● Texture Mapping Coding● Patchwork Algo● Correlation Based
● Frequency Domain● DCT● DWT● DFT
● Copyright Protection● Copy Protection● Digital Right Management● Tamper Proofing● Broadcast Monitering● Fingerprinting● Access Control● Medical Application● Image and Content Authentication● Annotation and privacy control● Media Forensics● Communication Enhancement● Content Protection● Content Filtering● Communication of ownership
and objects● Document Security● Locating Content Online● Audience Measurement● Improved Auditing
● Removal Attack● Interference Attack● Geometric Attack● Low pass filtering attack● Forgery Attack● Security Attack● Protocol Attack● Cryptographic Attack● Active Attack● Passive Attack● Collusion Attacks● Image Degradation● Image Enhancement● Image Compression● Image Transformation
● Properties of Visual Signal● Non Stationary● Periodicity
● Properties of HVS● Brightness Sensitivity
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric● Definition● Need
● Classification● Features● Performance Factor● Architecture of Digital
Watermarking● Styles of Robust
Watermarks
● Spatial Domain● Additive Watermarking● LSB● SSM Modulation● Texture Mapping Coding● Patchwork Algo● Correlation Based
● Frequency Domain● DCT● DWT● DFT
● Copyright Protection● Copy Protection● Digital Right Management● Tamper Proofing● Broadcast Monitering● Fingerprinting● Access Control● Medical Application● Image and Content Authentication● Annotation and privacy control● Media Forensics● Communication Enhancement● Content Protection● Content Filtering● Communication of ownership
and objects● Document Security● Locating Content Online● Audience Measurement● Improved Auditing
● Removal Attack● Interference Attack● Geometric Attack● Low pass filtering attack● Forgery Attack● Security Attack● Protocol Attack● Cryptographic Attack● Active Attack● Passive Attack● Collusion Attacks● Image Degradation● Image Enhancement● Image Compression● Image Transformation
● Properties of Visual Signal● Non Stationary● Periodicity
● Properties of HVS● Brightness Sensitivity
● MSE● SNR● PSNR● BER
Introduction✗ The success of the Internet, cost-effective and popular digital ✗ recording and storage devices, and the promise of higher bandwidth ✗ and quality of service for both wired and wireless networks have ✗ made it possible to create, replicate, transmit, and distribute digital✗ content in an effortless way. The protection and enforcement of ✗ intellectual property rights for digital media has become an ✗ important issue.
Introduction✗ The success of the Internet, cost-effective and popular digital ✗ recording and storage devices, and the promise of higher bandwidth ✗ and quality of service for both wired and wireless networks have ✗ made it possible to create, replicate, transmit, and distribute digital✗ content in an effortless way. The protection and enforcement of ✗ intellectual property rights for digital media has become an ✗ important issue. ● Digital watermarking is that
technology that provides and ensures security, data authentication and copyright protection to the digital media.
Introduction✗ The success of the Internet, cost-effective and popular digital ✗ recording and storage devices, and the promise of higher bandwidth ✗ and quality of service for both wired and wireless networks have ✗ made it possible to create, replicate, transmit, and distribute digital✗ content in an effortless way. The protection and enforcement of ✗ intellectual property rights for digital media has become an ✗ important issue. ● Digital watermarking is that
technology that provides and ensures security, data authentication and copyright protection to the digital media.
● Digital watermarking is the embedding of signal, secret information (i.e. Watermark) into the digital media such as image, audio and video. Later the embedded information is detected and extracted out to reveal the real owner/identity of the digital media.
Introduction✗ The success of the Internet, cost-effective and popular digital ✗ recording and storage devices, and the promise of higher bandwidth ✗ and quality of service for both wired and wireless networks have ✗ made it possible to create, replicate, transmit, and distribute digital✗ content in an effortless way. The protection and enforcement of ✗ intellectual property rights for digital media has become an ✗ important issue. ● Digital watermarking is that
technology that provides and ensures security, data authentication and copyright protection to the digital media.
● Digital watermarking is the embedding of signal, secret information (i.e. Watermark) into the digital media such as image, audio and video. Later the embedded information is detected and extracted out to reveal the real owner/identity of the digital media.
● Watermarking is used for following reasons, Proof of Ownership (copyrights and IP protection), Copying Prevention, Broadcast Monitoring, Authentication, Data Hiding.
IntroductionThe success of the Internet, cost-effective and popular digital recording and storage devices, and the promise of higher bandwidth and quality of service for both wired and wireless networks have made it possible to create, replicate, transmit, and distribute digital content in an effortless way. The protection and enforcement of intellectual property rights for digital media has become an important issue. ● Digital watermarking is that
technology that provides and ensures security, data authentication and copyright protection to the digital media.
● Digital watermarking is the embedding of signal, secret information (i.e. Watermark) into the digital media such as image, audio and video. Later the embedded information is detected and extracted out to reveal the real owner/identity of the digital media.
● Watermarking is used for following reasons, Proof of Ownership (copyrights and IP protection), Copying Prevention, Broadcast Monitoring, Authentication, Data Hiding.
● Watermarking consists of two modules watermark embedding module and watermark detection and extraction module.
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric● Definition● Need
● Classification● Features● Performance Factor● Architecture of Digital
Watermarking● Styles of Robust
Watermarks
● Spatial Domain● Additive Watermarking● LSB● SSM Modulation● Texture Mapping Coding● Patchwork Algo● Correlation Based
● Frequency Domain● DCT● DWT● DFT
● Copyright Protection● Copy Protection● Digital Right Management● Tamper Proofing● Broadcast Monitering● Fingerprinting● Access Control● Medical Application● Image and Content Authentication● Annotation and privacy control● Media Forensics● Communication Enhancement● Content Protection● Content Filtering● Communication of ownership
and objects● Document Security● Locating Content Online● Audience Measurement● Improved Auditing
● Removal Attack● Interference Attack● Geometric Attack● Low pass filtering attack● Forgery Attack● Security Attack● Protocol Attack● Cryptographic Attack● Active Attack● Passive Attack● Collusion Attacks● Image Degradation● Image Enhancement● Image Compression● Image Transformation
● Properties of Visual Signal● Non Stationary● Periodicity
● Propoerties of HVS● Brightness Sensitivity
● MSE● SNR● PSNR● BER
ClassificationRobustness1)Robust Ex- DCT2)Fragile Ex - LSB3)Semi-Fragile
According to Attached media1)Image Watermarking2)Video Watermarking3)Audio Watermarking4)Text Watermarking5)Graphic Watermarking
ClassificationRobustness1)Robust Ex- DCT2)Fragile Ex - LSB3)Semi-Fragile
According to Attached media1)Image Watermarking2)Video Watermarking3)Audio Watermarking4)Text Watermarking5)Graphic Watermarking
According to Perceptivity1)Visible Watermark2)Invisible Watermark
ClassificationRobustness1)Robust Ex- DCT2)Fragile Ex - LSB3)Semi-Fragile
According to Attached media1)Image Watermarking2)Video Watermarking3)Audio Watermarking4)Text Watermarking5)Graphic Watermarking
According to Perceptivity1)Visible Watermark2)Invisible Watermark
According to purpose1) Copyright Protection Watermark2) Tampering tip Watermarking3) Anti-Counterfieting Watermarking4) Anonymous Mark Watermarking
ClassificationRobustness1)Robust Ex- DCT2)Fragile Ex - LSB3)Semi-Fragile
According to Attached media1)Image Watermarking2)Video Watermarking3)Audio Watermarking4)Text Watermarking5)Graphic Watermarking
According to Perceptivity1)Visible Watermark2)Invisible Watermark
According to purpose1) Copyright Protection Watermark2) Tampering tip Watermarking3) Anti-Counterfieting Watermarking4) Anonymous Mark Watermarking
According to Watermark type1)Noise Type2)Image Type
ClassificationRobustness1)Robust Ex- DCT2)Fragile Ex - LSB3)Semi-Fragile
According to Attached media1)Image Watermarking2)Video Watermarking3)Audio Watermarking4)Text Watermarking5)Graphic Watermarking
According to Perceptivity1)Visible Watermark2)Invisible Watermark
According to purpose1) Copyright Protection Watermark2) Tampering tip Watermarking3) Anti-Counterfieting Watermarking4) Anonymous Mark Watermarking
According to Watermark type1)Noise Type2)Image Type
According to Domain1)Spatial Domain2)Frequency Domain
ClassificationRobustness1)Robust Ex- DCT2)Fragile Ex - LSB3)Semi-Fragile
According to Attached media1)Image Watermarking2)Video Watermarking3)Audio Watermarking4)Text Watermarking5)Graphic Watermarking
According to Perceptivity1)Visible Watermark2)Invisible Watermark
According to purpose1) Copyright Protection Watermark2) Tampering tip Watermarking3) Anti-Counterfieting Watermarking4) Anonymous Mark Watermarking
According to Watermark type1)Noise Type2)Image Type
According to Domain1)Spatial Domain2)Frequency Domain
According to Detection Process1)Visual Watermarking2)Semi-Blind Watermarking3)Blind Watermarking
ClassificationRobustness1)Robust Ex- DCT2)Fragile Ex - LSB3)Semi-Fragile
According to Attached media1)Image Watermarking2)Video Watermarking3)Audio Watermarking4)Text Watermarking5)Graphic Watermarking
According to Perceptivity1)Visible Watermark2)Invisible Watermark
According to purpose1) Copyright Protection Watermark2) Tampering tip Watermarking3) Anti-Counterfieting Watermarking4) Anonymous Mark Watermarking
According to Watermark type1)Noise Type2)Image Type
According to Domain1)Spatial Domain2)Frequency Domain
According to Detection Process1)Visual Watermarking2)Semi-Blind Watermarking3)Blind Watermarking
According to Use of keys1)Asymmetric Watermarking2)Symmetric Watermarking
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric● Definition● Need
● Classification● Features● Performance Factor● Architecture of Digital
Watermarking● Styles of Robust
Watermarks
● Spatial Domain● Additive Watermarking● LSB● SSM Modulation● Texture Mapping Coding● Patchwork Algo● Correlation Based
● Frequency Domain● DCT● DWT● DFT
● Copyright Protection● Copy Protection● Digital Right Management● Tamper Proofing● Broadcast Monitering● Fingerprinting● Access Control● Medical Application● Image and Content Authentication● Annotation and privacy control● Media Forensics● Communication Enhancement● Content Protection● Content Filtering● Communication of ownership
and objects● Document Security● Locating Content Online● Audience Measurement● Improved Auditing
● Removal Attack● Interference Attack● Geometric Attack● Low pass filtering attack● Forgery Attack● Security Attack● Protocol Attack● Cryptographic Attack● Active Attack● Passive Attack● Collusion Attacks● Image Degradation● Image Enhancement● Image Compression● Image Transformation
● Properties of Visual Signal● Non Stationary● Periodicity
● Propoerties of HVS● Brightness Sensitivity
● MSE● SNR● PSNR● BER
Features of Digital Watermarking
Robustness
Imperceptibility
Security
Verifiability
Capacity and data payload
Features of Digital Watermarking
Robustness
Imperceptibility
Security
Verifiability
Capacity and data payload
Computational Cost
Features of Digital Watermarking
Robustness
Imperceptibility
Security
Verifiability
Capacity and data payload
Computational Cost
Watermark Detection reliability
Features of Digital Watermarking
Robustness
Imperceptibility
Security
Verifiability
Capacity and data payload
Computational Cost
Watermark Detection reliability
Blind or Non-Blind Detection of watermark
Features of Digital Watermarking
Robustness
Imperceptibility
Security
Verifiability
Capacity and data payload
Computational Cost
Watermark Detection reliability
Blind or Non-Blind Detection of watermark
Tradeoff between performance factors
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric● Definition● Need
● Classification● Features● Requirements● Architecture of Digital
Watermarking● Styles of Robust
Watermarks
● Spatial Domain● Additive Watermarking● LSB● SSM Modulation● Texture Mapping Coding● Patchwork Algo● Correlation Based
● Frequency Domain● DCT● DWT● DFT
● Copyright Protection● Copy Protection● Digital Right Management● Tamper Proofing● Broadcast Monitering● Fingerprinting● Access Control● Medical Application● Image and Content Authentication● Annotation and privacy control● Media Forensics● Communication Enhancement● Content Protection● Content Filtering● Communication of ownership
and objects● Document Security● Locating Content Online● Audience Measurement● Improved Auditing
● Removal Attack● Interference Attack● Geometric Attack● Low pass filtering attack● Forgery Attack● Security Attack● Protocol Attack● Cryptographic Attack● Active Attack● Passive Attack● Collusion Attacks● Image Degradation● Image Enhancement● Image Compression● Image Transformation
● Properties of Visual Signal● Non Stationary● Periodicity
● Propoerties of HVS● Brightness Sensitivity
● MSE● SNR● PSNR● BER
Requirements of Digital Watermarking
Robustness
Security
Capacity
Perceptivity
Modification and Multiple watermarks
Requirements of Digital Watermarking
Robustness
Security
Capacity
Perceptivity
Modification and Multiple watermarks
Invertibility
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric● Definition● Need
● Classification● Features● Requirements● Architecture of Digital
Watermarking● Styles of Robust
Watermarks
● Spatial Domain● Additive Watermarking● LSB● SSM Modulation● Texture Mapping Coding● Patchwork Algo● Correlation Based
● Frequency Domain● DCT● DWT● DFT
● Copyright Protection● Copy Protection● Digital Right Management● Tamper Proofing● Broadcast Monitering● Fingerprinting● Access Control● Medical Application● Image and Content Authentication● Annotation and privacy control● Media Forensics● Communication Enhancement● Content Protection● Content Filtering● Communication of ownership
and objects● Document Security● Locating Content Online● Audience Measurement● Improved Auditing
● Removal Attack● Interference Attack● Geometric Attack● Low pass filtering attack● Forgery Attack● Security Attack● Protocol Attack● Cryptographic Attack● Active Attack● Passive Attack● Collusion Attacks● Image Degradation● Image Enhancement● Image Compression● Image Transformation
● Properties of Visual Signal● Non Stationary● Periodicity
● Propoerties of HVS● Brightness Sensitivity
● MSE● SNR● PSNR● BER
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric● Definition● Need
● Classification● Features● Requirements● Architecture of Digital
Watermarking● Styles of Robust
Watermarks
● Spatial Domain● Additive Watermarking● LSB● SSM Modulation● Texture Mapping Coding● Patchwork Algo● Correlation Based
● Frequency Domain● DCT● DWT● DFT
● Copyright Protection● Copy Protection● Digital Right Management● Tamper Proofing● Broadcast Monitering● Fingerprinting● Access Control● Medical Application● Image and Content Authentication● Annotation and privacy control● Media Forensics● Communication Enhancement● Content Protection● Content Filtering● Communication of ownership
and objects● Document Security● Locating Content Online● Audience Measurement● Improved Auditing
● Removal Attack● Interference Attack● Geometric Attack● Low pass filtering attack● Forgery Attack● Security Attack● Protocol Attack● Cryptographic Attack● Active Attack● Passive Attack● Collusion Attacks● Image Degradation● Image Enhancement● Image Compression● Image Transformation
● Properties of Visual Signal● Non Stationary● Periodicity
● Propoerties of HVS● Brightness Sensitivity
● MSE● SNR● PSNR● BER
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric● Definition● Need
● Classification● Features● Requirements● Architecture of Digital
Watermarking● Styles of Robust
Watermarks
● Spatial Domain● Additive Watermarking● LSB● SSM Modulation● Texture Mapping Coding● Patchwork Algo● Correlation Based
● Frequency Domain● DCT● DWT● DFT
● Copyright Protection● Copy Protection● Digital Right Management● Tamper Proofing● Broadcast Monitering● Fingerprinting● Access Control● Medical Application● Image and Content Authentication● Annotation and privacy control● Media Forensics● Communication Enhancement● Content Protection● Content Filtering● Communication of ownership
and objects● Document Security● Locating Content Online● Audience Measurement● Improved Auditing
● Removal Attack● Interference Attack● Geometric Attack● Low pass filtering attack● Forgery Attack● Security Attack● Protocol Attack● Cryptographic Attack● Active Attack● Passive Attack● Collusion Attacks● Image Degradation● Image Enhancement● Image Compression● Image Transformation
● Properties of Visual Signal● Non Stationary● Periodicity
● Propoerties of HVS● Brightness Sensitivity
● MSE● SNR● PSNR● BER
Spatial Domain
Additive Watermarking
Least Significant Bit
SSM Modulation Based Technique
Texture mappingtechnique
Spatial Domain
Additive Watermarking
Least Significant Bit
SSM Modulation Based Technique
Texture mappingtechnique
Patchwork Algorithm
Patchwork Algorithm
1 14 2 15 3
16 4 17 5 18
6 19 7 20 8
21 9 22 10 23
11 24 12 25 13
Image
0
1
1
Watermark
Patchwork Algorithm
1 14 2 15 3
16 4 17 5 18
6 19 7 20 8
21 9 22 10 23
11 24 12 25 13
Image
0
1
1
Watermark
3 1
3 2
5 3
4 2
1 1
5 4
Randomly Seleted Patches
Patch A Patch B
Patchwork Algorithm
1 14 2 15 3
16 4 17 5 18
6 19 7 20 8
21 9 22 10 23
11 24 12 25 13
Image
0
1
1
Watermark
3 1
3 2
5 3
4 2
1 1
5 4
Randomly Seleted Patches
Patch A Patch B
5-2 3
1-17 -16
23-8 15
Distances between the pixels
3
-16
15
Distances between the pixels
Distances between the pixels
Patchwork Algorithm
1 14 2 15 3
16 4 17 5 18
6 19 7 20 8
21 9 22 10 23
11 24 12 25 13
Image
0
1
1
Watermark
3 1
3 2
5 3
4 2
1 1
5 4
Randomly Seleted Patches
Patch A Patch B
5-2 3
1-17 -16
23-8 15
Distances between the pixels
3
-16
15
Distances between the pixels
Distances between the pixels
Swap 4,2 – 3,1Swap 1,1 – 3,2Don't Swap 5,4 – 5,3
Patchwork Algorithm
17 14 5 15 3
16 4 1 2 18
6 19 7 20 8
21 9 22 10 23
11 24 12 25 13
Watermarked Image
0
1
1
Watermark
3 1
3 2
5 3
4 2
1 1
5 4
Randomly Seleted Patches
Patch A Patch B
5-2 3
1-17 -16
23-8 15
Distances between the pixels
3
-16
15
Distances between the pixels
Distances between the pixels
Swap 4,2 – 3,1Swap 1,1 – 3,2Don't Swap 5,4 – 5,3
Spatial Domain
Additive Watermarking
Least Significant Bit
SSM Modulation Based Technique
Texture mappingtechnique
Patchwork Algorithm
Spatial Domain
Additive Watermarking
Least Significant Bit
SSM Modulation Based Technique
Texture mappingtechnique
Patchwork Algorithm
Correlation Based Technique
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric● Definition● Need
● Classification● Features● Requirements● Architecture of Digital
Watermarking● Styles of Robust
Watermarks
● Spatial Domain● Additive Watermarking● LSB● SSM Modulation● Texture Mapping Coding● Patchwork Algo● Correlation Based
● Frequency Domain● DCT● DWT● DFT
● Copyright Protection● Copy Protection● Digital Right Management● Tamper Proofing● Broadcast Monitering● Fingerprinting● Access Control● Medical Application● Image and Content Authentication● Annotation and privacy control● Media Forensics● Communication Enhancement● Content Protection● Content Filtering● Communication of ownership
and objects● Document Security● Locating Content Online● Audience Measurement● Improved Auditing
● Removal Attack● Interference Attack● Geometric Attack● Low pass filtering attack● Forgery Attack● Security Attack● Protocol Attack● Cryptographic Attack● Active Attack● Passive Attack● Collusion Attacks● Image Degradation● Image Enhancement● Image Compression● Image Transformation
● Properties of Visual Signal● Non Stationary● Periodicity
● Propoerties of HVS● Brightness Sensitivity
● MSE● SNR● PSNR● BER
Fourier Transform
● The Fourier transform is used to express an image in the spatial intensity domain as a sum of sine waves in the frequency domain.
● The spectrum consists of the frequency amplitudes of the sin waves that represent the image.
● The frequency spectrum image is symmetric about its center. The lowest or zero frequency wave amplitude found in an image is located at the center of the frequency spectrum image.
● Frequency increases from low to high as you move from the center to the corner of the spectrum image.
The yellow dot in the center of the spectrum is the amplitude of the zero frequency wave or direct current (DC) of the constant yellow image and is the average
color of the image.
A horizontal line profile shown on the left shows the sine wave with frequency 4. A vertical line profile is always a constant line with zero frequency.
Four pixels to the left and right of the bright center DC pixel are two bright pixels which are the amplitude of the sine wave of frequency 4 found in the image.
● A horizontal sine wave with 16 cycles shown on left again shows 3 bright pixels in its spectrum image on right but the bright pixels are further apart. In this case the two bright pixels are spaced 16 pixels to the left and right side of the bright center DC pixel.
● If the width of the image is divided by the frequency or distance of the two bright pixels from the center DC pixel you will get the wavelength or distance between peaks of the sin wave contained in the image.
● In the above example the image width of 128 pixels is divided by 16 cycles to yield a wavelength of 8 pixels between each vertical band.
If the horizontal sine wave image with frequency 16 is rotated 90 degrees then the two bright pixels are above and below the center bright DC pixel. In this case a vertical line profile shown on the left shows the sine wave with frequency 16.
● If the horizontal sine wave image with frequency 16 is rotated 45 degrees then the two bright pixels are on a 45 degree line through the center bright DC pixel.
● But now both a horizontal and vertical line profile show a sine wave of frequency 11. Since spectrum frequency amplitudes are computed and displayed with respect to the width and height the spectrum is a blend of the horizontal and vertical sine waves of frequency 11.
● The two bright pixels on the 45 degree line through the center DC pixel are now 11 pixels from the center of the spectrum.
The spectrum of an artificial star of radius 3 is shown above.
Below is the same star shifted to the lower right with its spectrum.
Note that the spectrum does not change when the position of the star is shifted since the frequency spectrum only contains frequency amplitude information and not position information.
The Fourier transform of the star image computed by the Frequency Filter actually computes a frequency amplitude spectrum and also a phase image that contains position information.
Discrete Wave TransformIn numerical analysis and functional analysis, a discrete wavelet transform (DWT) is any wavelet transform for which the wavelets are discretely sampled.
As with other wavelet transforms, a key advantage it has over Fourier transforms is temporal resolution: it captures both frequency and location information.
Discrete Cosine Transform
DCT like a Fourier image Transform, it represents data in terms of frequency space rather than an amplitude space.
DCT based watermarking techniques are robust compared to spatial domain techniques. Such algorithms are robust against simple image processing operations like low pass filtering, brightness and contrast adjustment, blurring etc.
However, they are difficult to implement and are computationally more expensive.
At the same time they are weak against geometric attacks like rotation, scaling, cropping etc.
DCT domain watermarking can be classified into Global DCT watermarking and Block based DCT watermarking.
Embedding in the perceptually significant portion of the image has its own advantages because most compression schemes remove the perceptually insignificant portion of the image.
Discrete Wavelet transform
In numerical analysis and functional analysis, a discrete wavelet transform (DWT) is any wavelet transform for which the wavelets are discretely sampled.
As with other wavelet transforms, a key advantage it has over Fourier transforms is temporal resolution: it captures both frequency and location information.
The wavelet transform decomposes the image into three spatial directions, i.e. horizontal, vertical and diagonal. Hence wavelet reflects the anistropic properties of Human visual system more precisely.
Advantage of DWT over DCT
- DWT understands the HVS more closely that the DCT.
- Image can be shown at different levelsof the resolution and processed from low level to high level.
Disadvantage of DWT over DCT
- Computational cost is more of DWT.
Discrete Fourier Transform
Transforms a continuous function into its frequency components
Robust against geometric attacksRotationScalingCroppingTranslation
Discrete Fourier Transform
Transforms a continuous function into its frequency components
Robust against geometric attacksRotationScalingCroppingTranslation
Advantage of DFT over DWT and DCT
- DFT is rotation, scaling and translation invariant.
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric● Definition● Need
● Classification● Features● Requirements● Architecture of Digital
Watermarking● Styles of Robust
Watermarks
● Spatial Domain● Additive Watermarking● LSB● SSM Modulation● Texture Mapping Coding● Patchwork Algo● Correlation Based
● Frequency Domain● DCT● DWT● DFT
● Copyright Protection● Copy Protection● Digital Right Management● Tamper Proofing● Broadcast Monitering● Fingerprinting● Access Control● Medical Application● Image and Content Authentication● Annotation and privacy control● Media Forensics● Communication Enhancement● Content Protection● Content Filtering● Communication of ownership
and objects● Document Security● Locating Content Online● Audience Measurement● Improved Auditing
● Removal Attack● Interference Attack● Geometric Attack● Low pass filtering attack● Forgery Attack● Security Attack● Protocol Attack● Cryptographic Attack● Active Attack● Passive Attack● Collusion Attacks● Image Degradation● Image Enhancement● Image Compression● Image Transformation
● Properties of Visual Signal● Non Stationary● Periodicity
● Propoerties of HVS● Brightness Sensitivity
● MSE● SNR● PSNR● BER
Digital Watermarking Applications
Copyright Protection
Copy Protection
Digital Right Management
Tamper Proofing
Digital Watermarking Applications
Copyright Protection
Copy Protection
Digital Right Management
Tamper Proofing
Broadcast Monitoring
Digital Watermarking Applications
Copyright Protection
Copy Protection
Digital Right Management
Tamper Proofing
Broadcast Monitoring
Fingerprinting
Digital Watermarking Applications
Copyright Protection
Copy Protection
Digital Right Management
Tamper Proofing
Broadcast Monitoring
Fingerprinting
Access control
Digital Watermarking Applications
Copyright Protection
Copy Protection
Digital Right Management
Tamper Proofing
Broadcast Monitoring
Fingerprinting
Access control
Medical Application
Digital Watermarking Applications
Copyright Protection
Copy Protection
Digital Right Management
Tamper Proofing
Broadcast Monitoring
Fingerprinting
Access control
Medical Application
Image and content Authentication
Digital Watermarking Applications
Annoation and privacy control
Media Forensics
Communicaiton Enhancement
Digital Watermarking Applications
Annoation and privacy control
Media Forensics
Communicaiton Enhancement
Content Protection
Digital Watermarking Applications
Annoation and privacy control
Media Forensics
Communicaiton Enhancement
Content Protection
Content Filtering
Digital Watermarking Applications
Annoation and privacy control
Media Forensics
Communicaiton Enhancement
Content Protection
Content Filtering
Communication of Ownership and contents
Digital Watermarking Applications
Annoation and privacy control
Media Forensics
Communicaiton Enhancement
Content Protection
Content Filtering
Communication of Ownership and contents
Document and image security
Digital Watermarking Applications
Annoation and privacy control
Media Forensics
Communicaiton Enhancement
Content Protection
Content Filtering
Communication of Ownership and contents
Document and image security
Locating content online
Digital Watermarking Applications
Annoation and privacy control
Media Forensics
Communicaiton Enhancement
Content Protection
Content Filtering
Communication of Ownership and contents
Document and image security
Locating content online
Audience Measurement
Digital Watermarking Applications
Annoation and privacy control
Media Forensics
Communicaiton Enhancement
Content Protection
Content Filtering
Communication of Ownership and contents
Document and image security
Locating content online
Audience Measurement
Imporved Auditing
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric● Definition● Need
● Classification● Features● Requirements● Architecture of Digital
Watermarking● Styles of Robust
Watermarks
● Spatial Domain● Additive Watermarking● LSB● SSM Modulation● Texture Mapping Coding● Patchwork Algo● Correlation Based
● Frequency Domain● DCT● DWT● DFT
● Copyright Protection● Copy Protection● Digital Right Management● Tamper Proofing● Broadcast Monitering● Fingerprinting● Access Control● Medical Application● Image and Content Authentication● Annotation and privacy control● Media Forensics● Communication Enhancement● Content Protection● Content Filtering● Communication of ownership
and objects● Document Security● Locating Content Online● Audience Measurement● Improved Auditing
● Removal Attack● Interference Attack● Geometric Attack● Low pass filtering attack● Forgery Attack● Security Attack● Protocol Attack● Cryptographic Attack● Active Attack● Passive Attack● Collusion Attacks● Image Degradation● Image Enhancement● Image Compression● Image Transformation
● Properties of Visual Signal● Non Stationary● Periodicity
● Propoerties of HVS● Brightness Sensitivity
● MSE● SNR● PSNR● BER
Watermarking Attacks
Removal Attack
Interference Attack
Geometric Attack
Low pass filtering attack
Forgery Attack
Watermarking Attacks
Removal Attack
Interference Attack
Geometric Attack
Low pass filtering attack
Forgery Attack
Security Attack
Watermarking Attacks
Protocol Attack
Cryptographic attack
Active Attack
Passive attack
Collusion Attack
Watermarking Attacks
Protocol Attack
Cryptographic attack
Active Attack
Passive attack
Collusion Attack
Image Degradation
Watermarking Attacks
Protocol Attack
Cryptographic attack
Active Attack
Passive attack
Collusion Attack
Image Degradation
Image Enhancement
Watermarking Attacks
Protocol Attack
Cryptographic attack
Active Attack
Passive attack
Collusion Attack
Image Degradation
Image Enhancement
Image Compression
Watermarking Attacks
Protocol Attack
Cryptographic attack
Active Attack
Passive attack
Collusion Attack
Image Degradation
Image Enhancement
Image Compression
Image Transformation
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric● Definition● Need
● Classification● Features● Requirements● Architecture of Digital
Watermarking● Styles of Robust
Watermarks
● Spatial Domain● Additive Watermarking● LSB● SSM Modulation● Texture Mapping Coding● Patchwork Algo● Correlation Based
● Frequency Domain● DCT● DWT● DFT
● Copyright Protection● Copy Protection● Digital Right Management● Tamper Proofing● Broadcast Monitering● Fingerprinting● Access Control● Medical Application● Image and Content Authentication● Annotation and privacy control● Media Forensics● Communication Enhancement● Content Protection● Content Filtering● Communication of ownership
and objects● Document Security● Locating Content Online● Audience Measurement● Improved Auditing
● Removal Attack● Interference Attack● Geometric Attack● Low pass filtering attack● Forgery Attack● Security Attack● Protocol Attack● Cryptographic Attack● Active Attack● Passive Attack● Collusion Attacks● Image Degradation● Image Enhancement● Image Compression● Image Transformation
● Properties of Visual Signal● Non Stationary● Periodicity
● Propoerties of HVS● Brightness Sensitivity
● MSE● SNR● PSNR● BER
Challenges and limitations of digital watermarking
Visual Signals are generally recognized as amplitude plots, intensity versus space displays of images information and intensity verses space and time display of video scenes.
Challenges and limitations of digital watermarking
Visual Signals are generally recognized as amplitude plots, intensity versus space displays of images information and intensity verses space and time display of video scenes.
Properties of Visual Signal
Non-stationary – preserve the edges, use the texture part to store additional information
Challenges and limitations of digital watermarking
Visual Signals are generally recognized as amplitude plots, intensity versus space displays of images information and intensity verses space and time display of video scenes.
Properties of Visual Signal
Non-stationary – preserve the edges, use the texture part to store additional information
Challenges and limitations of digital watermarking
Visual Signals are generally recognized as amplitude plots, intensity versus space displays of images information and intensity verses space and time display of video scenes.
Properties of Visual Signal
Non-stationary – preserve the edges, use the texture part to store additional information
Periodicity – Exploit the redundancy between the frames and lines to store the watermark information
Challenges and limitations of digital watermarking
Visual Signals are generally recognized as amplitude plots, intensity versus space displays of images information and intensity verses space and time display of video scenes.
Properties of Visual Signal
Non-stationary – preserve the edges, use the texture part to store additional information
Periodicity – Exploit the redundancy between the frames and lines to store the watermark information
Challenges and limitations of digital watermarking
The visibility of distortion depends on the background texture.
The distortion visibility is low when the background has a strong texture.
Challenges and limitations of digital watermarking
The visibility of distortion depends on the background texture.
The distortion visibility is low when the background has a strong texture.
Challenges and limitations of digital watermarking
The visibility of distortion depends on the background texture.
The distortion visibility is low when the background has a strong texture.
Weber's Law
If you lift up and hold a weight of 2.0 kg, you will notice that it takes some effort. If you add to this weight another 0.05 kg and lift, you may not notice any difference between the apparent or subjective weight between the 2.0 kg and the 2.1 kg weights. If you keep adding weight, you may find that you will only notice the difference when the additional weight is equal to 0.2 kg. The increment threshold for detecting the difference from a 2.0 kg weight is 0.2 kg. The just noticeable difference (jnd) is 0.2 kg.
Challenges and limitations of digital watermarking
The visibility of distortion depends on the background texture.
The distortion visibility is low when the background has a strong texture.
Weber's Law
If you lift up and hold a weight of 2.0 kg, you will notice that it takes some effort. If you add to this weight another 0.05 kg and lift, you may not notice any difference between the apparent or subjective weight between the 2.0 kg and the 2.1 kg weights. If you keep adding weight, you may find that you will only notice the difference when the additional weight is equal to 0.2 kg. The increment threshold for detecting the difference from a 2.0 kg weight is 0.2 kg. The just noticeable difference (jnd) is 0.2 kg.
Now start with a 5.0 kg weight. If you add weight to this, you will find that the just noticeable difference is 0.5 kg. It takes 0.5 kg added to the 5.0 kg weight for you to notice an apparent difference.
For the weight of magnitude, I, of 2.0 kg, the increment threshold for detecting a difference was a I (pronounces, delta I) of 0.2 kg.
For the weight of magnitude, I = 5.0 kg, the increment threshold I = 0.5 kg.
Challenges and limitations of digital watermarking
The visibility of distortion depends on the background texture.
The distortion visibility is low when the background has a strong texture.
Weber's Law
If you lift up and hold a weight of 2.0 kg, you will notice that it takes some effort. If you add to this weight another 0.05 kg and lift, you may not notice any difference between the apparent or subjective weight between the 2.0 kg and the 2.1 kg weights. If you keep adding weight, you may find that you will only notice the difference when the additional weight is equal to 0.2 kg. The increment threshold for detecting the difference from a 2.0 kg weight is 0.2 kg. The just noticeable difference (jnd) is 0.2 kg.
Now start with a 5.0 kg weight. If you add weight to this, you will find that the just noticeable difference is 0.5 kg. It takes 0.5 kg added to the 5.0 kg weight for you to notice an apparent difference.
For the weight of magnitude, I, of 2.0 kg, the increment threshold for detecting a difference was a I (pronounces, delta I) of 0.2 kg.
For the weight of magnitude, I = 5.0 kg, the increment threshold I = 0.5 kg.
The ratio of I/I for both instances (0.2/2.0 = 0.5/5.0 = 0.1) is the same. This is Weber's Law.
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric● Definition● Need
● Classification● Features● Requirements● Architecture of Digital
Watermarking● Styles of Robust
Watermarks
● Spatial Domain● Additive Watermarking● LSB● SSM Modulation● Texture Mapping Coding● Patchwork Algo● Correlation Based
● Frequency Domain● DCT● DWT● DFT
● Copyright Protection● Copy Protection● Digital Right Management● Tamper Proofing● Broadcast Monitering● Fingerprinting● Access Control● Medical Application● Image and Content Authentication● Annotation and privacy control● Media Forensics● Communication Enhancement● Content Protection● Content Filtering● Communication of ownership
and objects● Document Security● Locating Content Online● Audience Measurement● Improved Auditing
● Removal Attack● Interference Attack● Geometric Attack● Low pass filtering attack● Forgery Attack● Security Attack● Protocol Attack● Cryptographic Attack● Active Attack● Passive Attack● Collusion Attacks● Image Degradation● Image Enhancement● Image Compression● Image Transformation
● Properties of Visual Signal● Non Stationary● Periodicity
● Propoerties of HVS● Brightness Sensitivity
● MSE● SNR● PSNR● BER
Performance Evaluation Metric
Mean Square Error (MSE)
{ Each pixel [ (difference)^2) ] }----------------------------------------
Total Number of pixelsMSE =
Performance Evaluation Metric
Mean Square Error (MSE)
Signal to noise ratio (SNR)
SNR = 10 X Number of digits of (Ratio of original signal over the noise in it)
Performance Evaluation Metric
Mean Square Error (MSE)
Signal to noise ratio (SNR)
Peak Signal to Noise Ratio (PSNR)
PSNR = 10 log 10 (L*(L/MSE))L = peak signal
Ex -> L =255 for 8bit pixel
Performance Evaluation Metric
Mean Square Error (MSE)
Signal to noise ratio (SNR)
Peak Signal to Noise Ratio (PSNR)
PSNR = 10 log 10 (L*(L/MSE))L = peak signal
Ex -> L =255 for 8bit pixel
PSNR = 10 x Number of digits ( peak value X ( peak value / mean sq. error ))
Performance Evaluation Metric
Mean Square Error (MSE)
Signal to noise ratio (SNR)
Peak Signal to Noise Ratio (PSNR)
Bit Error Ratio (BER)
Performance Evaluation Metric
Mean Square Error (MSE)
Signal to noise ratio (SNR)
Peak Signal to Noise Ratio (PSNR)
Bit Error Ratio (BER)
BER = P/ (H*W)H and W are height and width of the watermarked image. P isthe count number initialized to zero and it increments by one
if there is any bit difference between cover and embed image.
Performance Evaluation Metric
Mean Square Error (MSE)
Signal to noise ratio (SNR)
Peak Signal to Noise Ratio (PSNR)
Bit Error Ratio (BER)
BER = P/ (H*W)H and W are height and width of the watermarked image. P isthe count number initialized to zero and it increments by one
if there is any bit difference between cover and embed image.
BER = number of changed bits / total size of the image
Performance Evaluation Metric
Mean Square Error (MSE)
Signal to noise ratio (SNR)
Peak Signal to Noise Ratio (PSNR)
Bit Error Ratio (BER)
PaperIntroduction
Digital Watermarking Technology
WatermarkingTechniques
Digital WatermarkingApplications
WatermarkingAttacks
Challenges and
LimitationsOf Digital
Watermarking
Performance Evaluation
Metric● Definition● Need
● Classification● Features● Requirements● Architecture of Digital
Watermarking● Styles of Robust
Watermarks
● Spatial Domain● Additive Watermarking● LSB● SSM Modulation● Texture Mapping Coding● Patchwork Algo● Correlation Based
● Frequency Domain● DCT● DWT● DFT
● Copyright Protection● Copy Protection● Digital Right Management● Tamper Proofing● Broadcast Monitering● Fingerprinting● Access Control● Medical Application● Image and Content Authentication● Annotation and privacy control● Media Forensics● Communication Enhancement● Content Protection● Content Filtering● Communication of ownership
and objects● Document Security● Locating Content Online● Audience Measurement● Improved Auditing
● Removal Attack● Interference Attack● Geometric Attack● Low pass filtering attack● Forgery Attack● Security Attack● Protocol Attack● Cryptographic Attack● Active Attack● Passive Attack● Collusion Attacks● Image Degradation● Image Enhancement● Image Compression● Image Transformation
● Properties of Visual Signal● Non Stationary● Periodicity
● Propoerties of HVS● Brightness Sensitivity
● MSE● SNR● PSNR● BER