SlideShare una empresa de Scribd logo
1 de 23
1
Outline
  Introduction, Applications
  Characteristics and classification
  Popular techniques for watermarking




                                         2
Definition: A digital watermark is a
digital signal or pattern inserted into a
digital document such as text, graphics
or multimedia, and carries information
unique to the copyright owner, the
creator of the document or the
authorized consumer.


                                            3
Example




          4
Watermarking Vs Encryption
 Encryption involves document transformation so that
  the contents of the document are not visible without
  a decryption key
 Watermarking leaves the original file/image intact
  and recognizable




                                                         5
6
Digital Watermarking Applications
 Ownership Assertion
    ‘A’ uses a private key to generate a watermark and embeds it in the
     document
    ‘A’ makes the watermarked image publicly available
    ‘B’ claims that he owns the image derived from the public image
    ‘A’ produces the unmarked original and establishes the presence of ‘A’s
     watermark

 Fingerprinting
    Used to avoid unauthorized duplication and distribution.
    A distinct watermark (a fingerprint) is embedded in each copy of the data.
    If unauthorized copies are found, the origin of the copy can be determined
     by retrieving the fingerprint.



                                                                                  7
Digital Watermarking Applications (2)
 Authentication & integrity verification
    Watermarks should be able to detect even the slightest
     change in the document.
    A unique key associated with the source is used the
     create the watermark and then embed in the document.
    This key is then used to extract the watermark and the
     integrity of the document verified on the basis of the
     integrity of the watermark.




                                                              8
Digital Watermarking Applications (3)
 Content labeling
    Bits embedded in the data, comprise an annotation,
     giving some more information about the data.
    Digital cameras annotate images with the time and
     date, when the photograph was taken.
    Medical imaging machines annotate images (X-Rays)
     with patients name, ID.




                                                          9
Digital Watermarking Applications (4)
 Usage control & Copy protection
    Digital watermark inserted to indicate the number of
     copies permitted.
    Every time a copy is made the hardware modifies the
     watermark and at the same time it would not create any
     more copies of the data.
    Commonly used in DVD technology.
 Content Protection
    Content owner might want to publicly and freely
     provide a preview of multimedia content being sold.
    To make the preview commercially useless, content is
     stamped with visible watermarks.

                                                          10
Characteristics of Digital Watermarks
  Readily Detectable: the data owner or an independent control authority
   should easily detect it.
  Unambiguous: retrieval of it should unambiguously identify the data
   owner.
  Robust: difficult to remove for an attacker, who would like to
   destroy it in order to counterfeit the copyright of the data.
   Moreover, removal of it should cause a considerable degradation
   in the quality of the data.
  Visible watermarks should be visible enough to discourage theft.




                                                                            11
Digital Watermark
Classification
 Based on visibility of watermarks
  - Visible Watermarks

  - Invisible Watermarks

 Based on the content to be watermarked
  - Text Watermarking

  - Image, Audio, Video Watermarking


                                           12
Techniques for Texts

Text Line Coding: Change the spacing
between lines.
Word-shift Coding: Change the spacing
between words.
Character Encoding: Alter the shapes of
characters.


                                          13
14
Word-shift coding example




                            15
Easily defeated…
  Retyping the text destroys the watermark
  Word processors change the spacing between
   words and lines
  Character encoding can be defeated by changing
   the font




                                                    16
Techniques for Images
  Spatial Watermarking: Just change some of the values of the
   pixels in the lower bit plane; e.g., Change some of the bits from 1
   to 0 or 0 to 1.
  Frequency Domain Watermarking: First convert the image to the
   frequency domain and then apply the watermark in the low
   frequency regions.




                                                                         17
Checksum Technique for images
 Watermark is formed from the 7 most significant bits of each pixel.
 Eight 7-bit segments (from eight different pixels) are concatenated
  and the final checksum is thus 56-bit.
 Locations of the pixels that are to contain one bit each of the
  checksum are randomly chosen.
 These pixel locations along with the checksum form the watermark,
  W.
 Last bit of each pixel is then changed to the corresponding checksum
  bit.




                                                                         18
19
Bavarian couple




Original      Watermarked Version

                                    20
Advantages/Disadvantages
 Embedding the checksum only changes (on average) half the number
    of pixel. So less visual distortion.
   Can hold multiple watermarks as long as they don’t overlap.
   Extremely simple and fast.
   Extremely fragile. Any change to the checksum causes the failure of
    the verification procedure.
   Forger could replace a section with another one of equal size and
    checksum.
   Entire watermark can be removed by removing the LSB plane. Can’t
    survive lossy compression.




                                                                          21
Conclusion
 First generation of copyright marking schemes is not
  strong enough
 Existing schemes provide only limited measures of
  marking
 Can only meet few requirements at a time
   Tradeoff - Bandwidth vs. robustness
   No single problem but a constellation!
 Real problem: watermark restoration



                                                         22
Q&A

      23

Más contenido relacionado

La actualidad más candente

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
Ankush Kr
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
ncct
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
divya sri
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Ankush Kr
 

La actualidad más candente (20)

Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking Report
Digital Watermarking ReportDigital Watermarking Report
Digital Watermarking Report
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
The Audio watermarking
The Audio watermarkingThe Audio watermarking
The Audio watermarking
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking Techniques
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Steganography
SteganographySteganography
Steganography
 

Destacado

Destacado (16)

Watermark
WatermarkWatermark
Watermark
 
digital steganography
digital steganographydigital steganography
digital steganography
 
Justlook presentation
Justlook presentationJustlook presentation
Justlook presentation
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Ready to Rise! Watermark Webinar August 2016
Ready to Rise! Watermark Webinar August 2016 Ready to Rise! Watermark Webinar August 2016
Ready to Rise! Watermark Webinar August 2016
 
Hardware implementation of 3 d dct compressed and digitally watermarked video
Hardware implementation of 3 d dct compressed and digitally watermarked videoHardware implementation of 3 d dct compressed and digitally watermarked video
Hardware implementation of 3 d dct compressed and digitally watermarked video
 
RNS sample student projects
RNS sample student projectsRNS sample student projects
RNS sample student projects
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubi
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recogntion
Face recogntionFace recogntion
Face recogntion
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)
 
FPL15 talk: Deep Convolutional Neural Network on FPGA
FPL15 talk: Deep Convolutional Neural Network on FPGAFPL15 talk: Deep Convolutional Neural Network on FPGA
FPL15 talk: Deep Convolutional Neural Network on FPGA
 
Nested RNSを用いたディープニューラルネットワークのFPGA実装
Nested RNSを用いたディープニューラルネットワークのFPGA実装Nested RNSを用いたディープニューラルネットワークのFPGA実装
Nested RNSを用いたディープニューラルネットワークのFPGA実装
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 

Similar a Watermark

Similar a Watermark (20)

A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
B011110614
B011110614B011110614
B011110614
 
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...
 
Ki2417591763
Ki2417591763Ki2417591763
Ki2417591763
 
Friend MTS Attacks on Subscriber Watermarking Technologies v1.2 (March 2021)
Friend MTS Attacks on Subscriber Watermarking Technologies v1.2 (March 2021)Friend MTS Attacks on Subscriber Watermarking Technologies v1.2 (March 2021)
Friend MTS Attacks on Subscriber Watermarking Technologies v1.2 (March 2021)
 
Iw2415551560
Iw2415551560Iw2415551560
Iw2415551560
 
50120130406038
5012013040603850120130406038
50120130406038
 
50120140504020 2
50120140504020 250120140504020 2
50120140504020 2
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...
 
Static Software Watermarking
Static Software WatermarkingStatic Software Watermarking
Static Software Watermarking
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Watermark

  • 1. 1
  • 2. Outline  Introduction, Applications  Characteristics and classification  Popular techniques for watermarking 2
  • 3. Definition: A digital watermark is a digital signal or pattern inserted into a digital document such as text, graphics or multimedia, and carries information unique to the copyright owner, the creator of the document or the authorized consumer. 3
  • 5. Watermarking Vs Encryption  Encryption involves document transformation so that the contents of the document are not visible without a decryption key  Watermarking leaves the original file/image intact and recognizable 5
  • 6. 6
  • 7. Digital Watermarking Applications  Ownership Assertion  ‘A’ uses a private key to generate a watermark and embeds it in the document  ‘A’ makes the watermarked image publicly available  ‘B’ claims that he owns the image derived from the public image  ‘A’ produces the unmarked original and establishes the presence of ‘A’s watermark  Fingerprinting  Used to avoid unauthorized duplication and distribution.  A distinct watermark (a fingerprint) is embedded in each copy of the data.  If unauthorized copies are found, the origin of the copy can be determined by retrieving the fingerprint. 7
  • 8. Digital Watermarking Applications (2)  Authentication & integrity verification  Watermarks should be able to detect even the slightest change in the document.  A unique key associated with the source is used the create the watermark and then embed in the document.  This key is then used to extract the watermark and the integrity of the document verified on the basis of the integrity of the watermark. 8
  • 9. Digital Watermarking Applications (3)  Content labeling  Bits embedded in the data, comprise an annotation, giving some more information about the data.  Digital cameras annotate images with the time and date, when the photograph was taken.  Medical imaging machines annotate images (X-Rays) with patients name, ID. 9
  • 10. Digital Watermarking Applications (4)  Usage control & Copy protection  Digital watermark inserted to indicate the number of copies permitted.  Every time a copy is made the hardware modifies the watermark and at the same time it would not create any more copies of the data.  Commonly used in DVD technology.  Content Protection  Content owner might want to publicly and freely provide a preview of multimedia content being sold.  To make the preview commercially useless, content is stamped with visible watermarks. 10
  • 11. Characteristics of Digital Watermarks  Readily Detectable: the data owner or an independent control authority should easily detect it.  Unambiguous: retrieval of it should unambiguously identify the data owner.  Robust: difficult to remove for an attacker, who would like to destroy it in order to counterfeit the copyright of the data. Moreover, removal of it should cause a considerable degradation in the quality of the data.  Visible watermarks should be visible enough to discourage theft. 11
  • 12. Digital Watermark Classification  Based on visibility of watermarks - Visible Watermarks - Invisible Watermarks  Based on the content to be watermarked - Text Watermarking - Image, Audio, Video Watermarking 12
  • 13. Techniques for Texts Text Line Coding: Change the spacing between lines. Word-shift Coding: Change the spacing between words. Character Encoding: Alter the shapes of characters. 13
  • 14. 14
  • 16. Easily defeated…  Retyping the text destroys the watermark  Word processors change the spacing between words and lines  Character encoding can be defeated by changing the font 16
  • 17. Techniques for Images  Spatial Watermarking: Just change some of the values of the pixels in the lower bit plane; e.g., Change some of the bits from 1 to 0 or 0 to 1.  Frequency Domain Watermarking: First convert the image to the frequency domain and then apply the watermark in the low frequency regions. 17
  • 18. Checksum Technique for images  Watermark is formed from the 7 most significant bits of each pixel.  Eight 7-bit segments (from eight different pixels) are concatenated and the final checksum is thus 56-bit.  Locations of the pixels that are to contain one bit each of the checksum are randomly chosen.  These pixel locations along with the checksum form the watermark, W.  Last bit of each pixel is then changed to the corresponding checksum bit. 18
  • 19. 19
  • 20. Bavarian couple Original Watermarked Version 20
  • 21. Advantages/Disadvantages  Embedding the checksum only changes (on average) half the number of pixel. So less visual distortion.  Can hold multiple watermarks as long as they don’t overlap.  Extremely simple and fast.  Extremely fragile. Any change to the checksum causes the failure of the verification procedure.  Forger could replace a section with another one of equal size and checksum.  Entire watermark can be removed by removing the LSB plane. Can’t survive lossy compression. 21
  • 22. Conclusion  First generation of copyright marking schemes is not strong enough  Existing schemes provide only limited measures of marking  Can only meet few requirements at a time  Tradeoff - Bandwidth vs. robustness  No single problem but a constellation!  Real problem: watermark restoration 22
  • 23. Q&A 23