0% found this document useful (0 votes)
65 views22 pages

Digital Watermaking

This document discusses digital watermarking for images. It begins with an introduction comparing watermarking to cryptography and steganography. The main criteria for watermarking are then described: capacity, payload, computational complexity, transparency, and robustness. Frequency-domain and color image watermarking techniques are briefly outlined. The document concludes with examples of watermarking applications such as copyright protection, digital rights management, information hiding, and metadata tagging.

Uploaded by

shreyas1022
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views22 pages

Digital Watermaking

This document discusses digital watermarking for images. It begins with an introduction comparing watermarking to cryptography and steganography. The main criteria for watermarking are then described: capacity, payload, computational complexity, transparency, and robustness. Frequency-domain and color image watermarking techniques are briefly outlined. The document concludes with examples of watermarking applications such as copyright protection, digital rights management, information hiding, and metadata tagging.

Uploaded by

shreyas1022
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPSX, PDF, TXT or read online on Scribd
You are on page 1/ 22

ROBUST Digital Watermarking

PRITESHDICHOLKAR SANKET SHIRKE ANUJ JETWA

Introduction
Relation to Cryptography
Cryptography is
Reversibility (no evidence) Established

Watermarking (1990s)
Non-reversible (noise)

Information Hiding
Covert communication channel (steganography)

Digital Watermarking Media


Video Audio Images
Our discussion will focus on this.
Block Diagram of image watermarking Original Image Watermarking Algorithm Watermarked Image Watermark

Criteria
Main Criteria
Capacity Payload Computational Complexity Transparency Require optimum relationship Robustness

Capacity
The ability to detect watermarks with a low probability of error as the number of watermarks in a single image increases.

Payload
The amount of information that can be legitimately stored within a data stream
Dependent on host medium JPEG example

Computational Complexity
Difficulty in process of watermark extraction
Realtime?

Transparency
Transparency refers to the perceptual quality of the data being protected.
Watermark should be invisible over all image types as well as local image characteristics.

Need to consider perceptually insignificant portion of host image for insertion for maximum transparency

Robustness
Resistance to attacks on the watermark
Attack an operation performed on the image that compromises the watermark Active, Passive, Collusion, Forgery Blind vs. Nonblind

Use of non-robust watermarks


eg. tamper detection

Frequency-Domain Implementation
(Wavelet Transform Algorithm - Overview)

Encoded Watermark

Watermarked Image

Color Images
Scheme nearly identical to grayscale
R/G/B channels
Each color plane treated as a separate image

Luminance/Chrominance channels
Luminance = intensity Chrominance = color

Applications
Copyright
The objective is to permanently and unalterably mark the image so that the credit or assignment is beyond dispute.

Digital Rights
A file may only be used by users with a license that matches the watermarked signature.

Information Hiding
Foil counterfeiters

Revision History
Tamper detection

Meta-tagging
Store keywords, descriptions, time along with images.

You might also like