Digital image protection using adaptive watermarking techniques
1. Presented by :
Anand Karandikar
Guided by:
Prof. G. G. Chiddarwar
Digital Image Protection Using
Adaptive Watermarking Techniques
3 May 20141
Digital Image Protection UsingAdaptive
WatermarkingTechniques
3. Digital Watermarking: The concept
3 May 20143
Digital Image Protection UsingAdaptive
WatermarkingTechniques
4. Digital Watermarking: Types
Visible watermark:
3 May 20144
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Fig.1.VisibleWatermark
5. Digital Watermarking: Types (cont.)
Invisible watermark:
3 May 20145
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Fig.2.InvisibleWatermark
6. Digital Watermarking: Classification
3 May 20146
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Fig.3.Classification ofWatermarking techniques
7. Least Significant Bit Technique
10110101 01001101 11001101
00010011 00010100 01001010
10110100 01001100 11001101
00010010 00010100 01001011
3 May 20147
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Fig.4.The LSB Substitution technique
Embed 001001
Secret Data
Original Image
encoded
format
Embedded
data
8. 8
Secret
data
Convert to bit stream
Conversion of data
Encode Data
Embedding
Extract
Decode Data
Original Source
Image
Load Source image
Convert to
stego image
Extracted
secret data
Digital Image Protection UsingAdaptive
WatermarkingTechniques
3 May 2014
Fig.5.The LSB Substitution procedure
9. Discrete Cosine Transform Algorithm
3 May 20149
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Fig.6.The DCT algorithm
Fragment
Use DCT
Block selection
Coefficient selection
EmbedWatermarks
Apply inverse DCT
10. Discrete Cosine Transform Algorithm
3 May 201410
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Fig.7.The DCT region
Low band
frequency region
Middle band
frequency region
High band
frequency region
11. 3 May 201411
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Fig.8.The MBEC algorithm
Select the FM region
Select two points
say Pi(u1,v1) & Pi(u2,v2)
Pi(u1,v1)>=
Pi(u2,v2)
Encode 0 Encode 1
A
A
True False
14. Metrics for quality:
Peak Signal to Noise Ratio(PSNR) PSNR> 0.35 dB
PSNR = 10 log10 . A2
1
N x M [f(i,j) – f’(i,j)]2
Normalized Cross-correlation(NC) NC>0.75
3 May 201414
Digital Image Protection UsingAdaptive
WatermarkingTechniques
15. LSB & DCT : Comparison
LSB Substitution
technique
DCT technique
Spatial domain technique Frequency domain technique
Provides limited ROBUSTNESS Provides better ROBUSTNESS
Embeds little INFORMATION Embeds more INFORMATION
Lesser NOISE immunity Highly immune to NOISE
SIMPLE implementation COMPLEX implementation
3 May 201415
Digital Image Protection UsingAdaptive
WatermarkingTechniques
Table.1.LSB and DCT technique comparison
16. Conclusion
DigitalWatermarking proves crucial.
A combination of more than one technique is
required.
DCT proves to be advantageous.
3 May 201416
Digital Image Protection UsingAdaptive
WatermarkingTechniques
17. References
[1].Yusuf Perwej, Firoj Parwej ,Asif Perwej -The International
Journal of Multimedia & Its Applications (IJMA)Vol.4, No.2,
April 2012,An AdaptiveWatermarkingTechnique for the
copyright of digital images and Digital Image Protection.
[2] Lin Liu -A Survey of DigitalWatermarkingTechnologies.
[3]. Petitcolas, F.A. P.,Anderson, R. J.: Kuhn, M. G.,
Information Hiding –A Survey, Proceedings of the IEEE,
Special Issue on Protection of Multimedia Content.
3 May 201417
Digital Image Protection UsingAdaptive
WatermarkingTechniques