SlideShare una empresa de Scribd logo
1 de 40
Digital Water Marking By Sheikh Qaisar Ayub Advanced Topics in Image Processing [email_address] Qaisar Ayub & Sulma Rashid
Watermark Observe  image It is intellectual property Some one may spend a lot of time And thinking to compose this image
The image has been extended by any other person now he is owner of image
How to protect image ? P roblem Solution Watermark
[object Object],[object Object],[object Object],[object Object],[object Object],Watermarked image Image without watermark Watermark
[object Object],[object Object],[object Object],Watermark
[object Object],[object Object],1. Word Document Types of Digital Watermark
[object Object],[object Object],2. On Images Types of Digital Watermark
[object Object],2. Multimedia Files Types of Digital Watermark Click  on image to Play
[object Object],[object Object],[object Object],[object Object],[object Object],Types of Digital Watermark
[object Object],Types of Digital Watermark How to implement ? Step -1 Select randomly the area of image to obtain its pixel values A=
[object Object],Types of Digital Watermark How to implement ? Step -2 Convert into its binary values B= A=
[object Object],Types of Digital Watermark How to implement ? Step -3 Form a watermarking key Watermark Key A= C= B=
[object Object],Types of Digital Watermark How to implement ? Step -4 The OR Operation is used B= D= B + C 01100101 00000011 01101000 01100100 00000001 01100101 01100110 00000010 01101000 01100111 00000000 01100111
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Types of Digital Watermark A= B= C=
Types of Digital Watermark 01100101 00000011 01101000 Encoder Key Data ENCODING Algorithm Note Watermark will not effect the composition of image
[object Object],[object Object],[object Object],Achievement
[object Object],[object Object],[object Object],Types of Digital Watermark The Answer is yes What is the function of watermark ?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Types of Digital Watermark 01101000 Extract the encoded data from image Input to Decoding Algorithm Detect watermark Algorithm 01100101
Example Extract Watermark Algorithm Watermark detected by the Algorithm and hence intellectual property can be saved.
Encoding & Decoding 01100101 00000011 01101000 Encoder Key Data ENCODING Algorithm Extract Watermark Algorithm DECODING Algorithm Communication Media 01101000
Mathematically Encoding X’ = EK (X,W) Hence X = Original Image W= watermark information being embedded K= user insertion key E= watermark insertion function X’ = Watermarked  Image Mathematically Decoding W = DK’ (X’) Hence X’ = Watermarked image K’= extraction key D= watermark extraction function W= Extracted watermarked information
[object Object],[object Object],[object Object],Achievement
Application of watermark ,[object Object]
Application of watermark Finger Print IS File save ?
Application of watermark Finger Print Data Center-01 Data Center-02 Data Center-03 Network
Application of watermark Finger Print A invalid copy is found at any location Extract the embedded figure print From file A figure print is unique value form each data center Can identify the data center
Application of watermark Embed the number of copies to be allowed for copying embed in the hardware 4 4 3 2 1 Copy not allowed Click  on image to Play
Application of watermark Fraud  Detection Data Center-01 Data Center-02 Data Center-03 Network
[object Object],Application of watermark Muhammad Ishfaque Karim Ahmad Observe ID card WHAT IS THE PROBLEM ?
[object Object],Application of watermark Muhammad Ishfaque Muhammad Ishfaque Extract name using watermarked algorithm Muhammad Ishfaque Compare the to validate ID CARD. M Jamil M.jamil M.jamil Muhammad Ishfaque
[object Object],[object Object],Achievement
[object Object],[object Object],[object Object],[object Object],Original Image Properties of Watermark Resize Rotation & Compression
[object Object],[object Object],[object Object],[object Object],Original Image Properties of Watermark Watermarked image
[object Object],[object Object],[object Object],[object Object],Properties of Watermark
[object Object],Achievement
Methods of Water Marking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Methods of Water Marking ,[object Object],[object Object],[object Object],Image:   11001010 00110101 00011010 00000000... Watermark:   01  01  10  11... Watermarked   Image: 110010 11  001100 10  00011 100  000000 11 ...
[object Object]

Más contenido relacionado

La actualidad más candente

digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingrupareliab14
 
Watermark
WatermarkWatermark
Watermarkravi33s
 
Counterfeit Currency Detection using Image Processing
Counterfeit Currency Detection using Image ProcessingCounterfeit Currency Detection using Image Processing
Counterfeit Currency Detection using Image Processingkarthik0101
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applicationsKannekanti Utthej
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISShivam Porwal
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 

La actualidad más candente (20)

Digital water marking
Digital water markingDigital water marking
Digital water marking
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermark
WatermarkWatermark
Watermark
 
Counterfeit Currency Detection using Image Processing
Counterfeit Currency Detection using Image ProcessingCounterfeit Currency Detection using Image Processing
Counterfeit Currency Detection using Image Processing
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Chapter3
Chapter3Chapter3
Chapter3
 
Digital watermarking techniques for security applications
Digital watermarking techniques for security applicationsDigital watermarking techniques for security applications
Digital watermarking techniques for security applications
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 

Destacado

Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detectionncct
 
discrete wavelet transform
discrete wavelet transformdiscrete wavelet transform
discrete wavelet transformpiyush_11
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Samarth Godara
 
Image processing research proposal
Image processing research proposalImage processing research proposal
Image processing research proposalIftikhar Ahmad
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color imagesiaemedu
 

Destacado (12)

Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
discrete wavelet transform
discrete wavelet transformdiscrete wavelet transform
discrete wavelet transform
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
 
Image processing research proposal
Image processing research proposalImage processing research proposal
Image processing research proposal
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
 
watermarking
watermarkingwatermarking
watermarking
 

Similar a Watermarking in-imageprocessing

digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfMekalaSamayochitha
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessIRJET Journal
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniquestheijes
 
Survey on Reversible Watermarking
Survey on Reversible Watermarking Survey on Reversible Watermarking
Survey on Reversible Watermarking IOSR Journals
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyEditor IJCATR
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwtIAEME Publication
 
Aw2419401943
Aw2419401943Aw2419401943
Aw2419401943IJMER
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar10e11a0545
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageIOSR Journals
 
HTC Developer - 2012
HTC Developer - 2012HTC Developer - 2012
HTC Developer - 2012Bruce Jones
 
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...IDES Editor
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarkingijceronline
 

Similar a Watermarking in-imageprocessing (20)

Vidhi's ppt
Vidhi's pptVidhi's ppt
Vidhi's ppt
 
Jq3417501753
Jq3417501753Jq3417501753
Jq3417501753
 
digitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdfdigitalwatermarking-121202063739-phpapp01.pdf
digitalwatermarking-121202063739-phpapp01.pdf
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
Ah04605234238
Ah04605234238Ah04605234238
Ah04605234238
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
Survey on Reversible Watermarking
Survey on Reversible Watermarking Survey on Reversible Watermarking
Survey on Reversible Watermarking
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
 
Digital watermarking on medical images using dwt
Digital watermarking on medical images using dwtDigital watermarking on medical images using dwt
Digital watermarking on medical images using dwt
 
Aw2419401943
Aw2419401943Aw2419401943
Aw2419401943
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
HTC Developer - 2012
HTC Developer - 2012HTC Developer - 2012
HTC Developer - 2012
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarking
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Último (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

Watermarking in-imageprocessing

  • 1. Digital Water Marking By Sheikh Qaisar Ayub Advanced Topics in Image Processing [email_address] Qaisar Ayub & Sulma Rashid
  • 2. Watermark Observe image It is intellectual property Some one may spend a lot of time And thinking to compose this image
  • 3. The image has been extended by any other person now he is owner of image
  • 4. How to protect image ? P roblem Solution Watermark
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Types of Digital Watermark 01100101 00000011 01101000 Encoder Key Data ENCODING Algorithm Note Watermark will not effect the composition of image
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Example Extract Watermark Algorithm Watermark detected by the Algorithm and hence intellectual property can be saved.
  • 22. Encoding & Decoding 01100101 00000011 01101000 Encoder Key Data ENCODING Algorithm Extract Watermark Algorithm DECODING Algorithm Communication Media 01101000
  • 23. Mathematically Encoding X’ = EK (X,W) Hence X = Original Image W= watermark information being embedded K= user insertion key E= watermark insertion function X’ = Watermarked Image Mathematically Decoding W = DK’ (X’) Hence X’ = Watermarked image K’= extraction key D= watermark extraction function W= Extracted watermarked information
  • 24.
  • 25.
  • 26. Application of watermark Finger Print IS File save ?
  • 27. Application of watermark Finger Print Data Center-01 Data Center-02 Data Center-03 Network
  • 28. Application of watermark Finger Print A invalid copy is found at any location Extract the embedded figure print From file A figure print is unique value form each data center Can identify the data center
  • 29. Application of watermark Embed the number of copies to be allowed for copying embed in the hardware 4 4 3 2 1 Copy not allowed Click on image to Play
  • 30. Application of watermark Fraud Detection Data Center-01 Data Center-02 Data Center-03 Network
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.