You are on page 1of 16

Technical Seminar Presentation

NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

WATERMARKING
PRESENTED
BY

ANSHUMAN MISHRA
ROLL-CS200118090
UNDER THE GUIDANCE
OF
Mr.Anisur Rahman

ANSHUMAN MISHRA
[1]
Technical Seminar Presentation
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

1.INTRODUCTION
•More information transmitted on digitally than in the past.
•Extremely easy to duplicate digital information and that
too without loss of quality especially MP3 formats.
•Artist artistically signed their paintings with a brush to
claim their copyrights but they can be forged.
•So how to authenticate their works?
•The answer to this digital watermarking.

ANSHUMAN MISHRA
[2]
Technical Seminar Presentation
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

Definition:A watermark is 2A pattern of bits inserted


into a digital image, audio or video file that identifies
the file's copyright information.
•Unlike printed watermarks, digital watermarks
are designed to be completely invisible, or in
the case of audio clips, inaudible.
•The bits representing the watermark must
be scattered throughout the file in such a
way that they cannot be identified and
manipulated
ANSHUMAN MISHRA
[3]
Technical Seminar Presentation
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

•A digital watermark must be robust enough to survive


changes to the file its embedded in, such as being saved
using a lossy compression algorithm eg: JPEG.

ANSHUMAN MISHRA
[4]
Technical Seminar Presentation
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

•Purpose of digital watermarks is to provide copyright


protection for intellectual property that is in digital format.
• I am going to discuss upon the following two things
(1) Data binding in the binary images.
(2) Data hiding for image authentication

ANSHUMAN MISHRA
[5]
Technical Seminar Presentation

2.Data Binding In Binary Images


NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

• Unauthorized use of signature is of great concern


nowadays because easy to edit and authenticate images
with software tools.
•Annotation and authentication of binary images along
with detection of tampering is very important for
security.
•By changing the values of individual pixels we can
manipulate the binary images.

ANSHUMAN MISHRA
[6]
Technical Seminar Presentation
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

•Shows embedding and extraction for authentication and


annotating
ANSHUMAN MISHRA
[7]
Technical Seminar Presentation
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

2.1 MECHANICS OF EMBEDDING


•While embedding it is important to extract the
embedded data without the original image.
•We embed the data by
manipulating flippable
pixels so that a certain
relationship on features of a
group of pixels is enforced .

ANSHUMAN MISHRA
[8]
Technical Seminar Presentation
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

2.2 APPLICATIONS: “Signature in Signature”

ANSHUMAN MISHRA
[9]
Technical Seminar Presentation
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

3.0 Data Hiding For Image Authentication


•“Picture never lies” has been challenged in today's world
of digital multimedia.
•Following features mark the good DW:
1. to determine whether an image has been altered or not
2. to be able to integrate authentication data with host image
3. the embedded authentication data be invisible under normal
viewing conditions and locate alteration made on image.
5. to store the watermarked image stored in lossy-compression.

ANSHUMAN MISHRA
[10]
Technical Seminar Presentation

3.1 Framework for authentication watermark


NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

•Following elements for authentication watermark:


1. What to authenticate?
2. What data to be embedded for authentication
purpose?
3. How to embed data into an image ?
•Explained in the next is what to embed and how to
embed them.

ANSHUMAN MISHRA
[11]
Technical Seminar Presentation
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

•What is LUT & what is its purpose?

bi is the
extracted bit.

ANSHUMAN MISHRA
[12]
Technical Seminar Presentation
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

•Zeros are embedded to two quantized DCT coefficients


“-73” and “24” by enforcing relationship according to a
look-up table. After embedding, the coefficients in the
watermarked image are“-74” and “24”.
ANSHUMAN MISHRA
[13]
Technical Seminar Presentation
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

3.2 Design of embedded data:


(i)Visually meaningful pattern and
(ii)Content based features.

4 General applications:
(i)identity protection (iv)conditional access and
(ii)watermark white paper copy control &

(iii) Authentication of image (v)copyright protection.


content

ANSHUMAN MISHRA
[14]
Technical Seminar Presentation
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

CONCLUSION:
•Applications related to copy protection of printed media
very promising.
•In addition to technological developments, marketing
and business issues are extremely important and require
in-depth analysis and strategic planning .
•It is very important to prepare the industry to the usage
of digital watermarks and to convince them of the added
value their products can gain if they employ digital
watermarking technologies.
ANSHUMAN MISHRA
• [15]
Technical Seminar Presentation
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY

THANK YOU

ANSHUMAN MISHRA
[16]

You might also like