13
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT

PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT

Embed Size (px)

Citation preview

Page 1: PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT

PRESENTED BY,

C.RESHMA –II CSE

S.POORNIMA –II IT

Page 2: PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT

watermarking is to protect one’s work from being hijacked.It also deals with various types of Watermark attacks. When unauthorized copies or forgeries of the image appear elsewhere on the network, the designer needs to prove his ownership of the image.

Page 3: PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT

Imperceptible: The watermark should be imperceptible so as not to affect the viewing experience of the image or the quality of the audio signal. Undetectable: The watermark must be difficult or even impossible to remove by a malicious cracker, at least without obviously degrading the host signal.

Page 4: PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT

Statistically undetectable: A pirate should not be able to detect the watermark by comparing several watermarked signals belonging to the same authorUnambiguous: Retrieval of the watermark should unambiguously identify the owner, and the accuracy of identification should degrade gradually in the face of attacks.

Page 5: PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT

VisibleFragileSpatialImage –adaptiveBlindPublic & privateAsymmetric&symmetri watermarkingSteganographic&non-stenographicImage watermarking

Page 6: PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT

Watermarking can be applied in the frequency domain by first applying a transform like the Fast Fourier Transform (FFT), Discrete Cosine Transform (DCT), Wavelet Transform etc.hi gh frequencies will be lost by compression or scaling, the watermark signal is applied to lower frequenciesfrequencies that contain important information of the original picture

Page 7: PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT

Frequency methods encode the data across the global frequencies of the image.

Two types of information hiding methods areFast Fourier Transform (FFT)Discrete Cosine Transform (DCT)

Page 8: PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT

FFT ISOLAT

FFT

+

This transformation is one that converts the time domain signal into a signal of frequency domain

IFFT

OUTPUT

WATERMARK

Page 9: PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT

Start the process.Get the text data to a binary row vector.Convert the text data to a binary row vector.Scale the binary vector.Create the data mark.Compute the FFT and decompose into the magnitude and phase.Create the ring of the data mark (using loops).Add the ring to the magnitude of the image.

Page 10: PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT

Reduce the magnitude points where the data bit is zero. Convert the matrix into an image (i.e. watermarked image). Output the watermarked image. Stop the process.

Page 11: PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT

APPLICATION: Audio watermarking Text watermarking Fingerprinting

Common attack techniques: Additive noise Cropping Rotation & Scaling

Page 12: PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT

Digital watermarking is an effective technique for protecting intellectual property (IP) It bears a huge commercial potential, used in consumer electronic devices. Digital watermark technology can be used in consumer electronic devices such as digital still cameras, digital video cameras, set top boxes, DVD players, and MP3 players. As a result it can protect information in controlled axes, prevent illegal replication and embedding ownership information in images captured in digital cameras.

Page 13: PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT

THANK YOU