You are on page 1of 17

DIGITAL WATERMARKING: An IMAGE AUTHENTICATION TECHNIQUES

A TECHNOLOGY OVERVEIW

Introduction Digital Watermarking Watermarking vs. Cryptography Structure and Working of Typical Watermarking System

CONTENTS

Insertion Unit Detection and Extraction Unit

Types Issues Applications & Reference Model for Copyright Mgmt. Conclusion Bibliography
IMAGE AUTHENTICATION TECHNIQUES 2

3/1/2008

INTRODUCTION
TO IMAGE AUTHENTICATION TECHNIQUES

Digital Watermarking Definition Watermarking vs. Encryption MORPHING Origin of the data Internet Digital copyrights

3/1/2008

IMAGE AUTHENTICATION TECHNIQUES

Digital Watermarking
Definition: A digital watermark is a digital signal or pattern inserted into a digital document such as text, graphics or multimedia, and carries information unique to the copyright owner, the creator of the document or the authorized consumer.
1/19/00 EMTM 553 4

Watermarking Vs. Encryption


Encryption

involves document transformation so that the contents of the document are not visible without a decryption key Watermarking leaves the original file/image intact and recognizable

1/19/00

EMTM 553

DIGITAL WATERMARKING
FOR IMAGE AUTHENTICATION

Technique of embedding some information (Watermark) into multimedia contents (Video, Images, or Audio)

Watermarks can be later extracted to authenticate the content

Cryptography is the principle behind Watermarking

3/1/2008

IMAGE AUTHENTICATION TECHNIQUES

STRUCTURE OF A TYPICAL WATERMARKING SYSTEM

WATERMARK INSERTION UNIT

3/1/2008

IMAGE AUTHENTICATION TECHNIQUES

WATERMARK DETECTION AND EXTRACTION UNIT

3/1/2008

IMAGE AUTHENTICATION TECHNIQUES

WORKING
BASIC BLOCK DIAGRAM

Watermar k Key Original Image X K Watermark Embedder


X

Noise

Attacks Watermar k Key K

Communication Communication Channel Channel

Watermark Watermar k Detector/Extractor W

Watermar k Image W

X=Ek(X,W)
Digital Watermarking Systems
3/1/2008 IMAGE AUTHENTICATION TECHNIQUES

W=Dk(X)

Original Image

Image used as watermark

Watermarked Image-A
3/1/2008 IMAGE AUTHENTICATION TECHNIQUES

Watermarked Image-B
10

TYPES OF WATERMARKS

Visible and Invisible Watermarks Robust and Fragile Watermarks Informed and Blind Watermarks

3/1/2008

IMAGE AUTHENTICATION TECHNIQUES

11

WATERMARKING ISSUES

Security Robustness Capacity Imperceptibility

3/1/2008

IMAGE AUTHENTICATION TECHNIQUES

12

APPLICATIONS
OF WATERMARKS

Ownership Assertion Fingerprinting Copy prevention Tamper Detection

3/1/2008

IMAGE AUTHENTICATION TECHNIQUES

13

A REFERENCE MODEL FOR COPYRIGHT MANAGEMENT

Copyright Management Model


3/1/2008 IMAGE AUTHENTICATION TECHNIQUES 14

CONCLUSION
The watermarking research is progressing very fast and numerous researcher from various fields are focusing to develop some workable scheme. Different companies also working to get commercial products. Digital watermarking is a rapidly evolving area of research and development

3/1/2008

IMAGE AUTHENTICATION TECHNIQUES

15

BIBLIOGRAPHY
www.dh.aist.go.jp www.elsevier.com www.wikipedia.com www.arnab.com

3/1/2008

IMAGE AUTHENTICATION TECHNIQUES

16

THANK YOU
3/1/2008 IMAGE AUTHENTICATION TECHNIQUES 17

You might also like