Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Brodatz Textures Vistex Textures What is texture ? Texture can be considered to be repeating patterns of local variation of pixel intensities.
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Digital watermarking technique for protecting digital images
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Secure Spread Spectrum Watermarking for Multimedia Ishani Vyas CS590 Winter 2008.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
By Elo Leung and Wing Wong CS 265 Section 2 Spring 2004.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Digital Signal Processing Final Project Proposal R 資工碩一 馬智釗 Reference : “Rotation, scale, and translation resilient digital watermarking based.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital Watermarking
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
DEPARTMENT OF ECE, BEC, BAGALKOT
DCT watermarking Speaker: Paul 1.
IMAGE PROCESSING IMAGE WATERMARKING
Visible Watermarking of An Image Using DCT Technique
Technical Aspects of Digital Rights Management
DONE BY S.MURALIRAJAN M.NIRMAL
Watermarking for Image Authentication ( Fragile Watermarking )
A User Attention Based Visible Watermarking Scheme
Dept. of Elec. & Comp. Engineering
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Authors: J.J. Murillo-Fuentes
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking technique Under the supervision of: Eng.hadeel kasaymeh Prepared by: Hussain al-afeef Abd alkareem al-rabbae Saif bni-easa Osama shatnawe Ismael al-sheiab

outlines 1- introduction about document security.. 2- watermarking technique????? 3- watermarking types…. 4- practical application on the pixels in some image… some image… 5- conclusion…

Introduction Powerful signal processing techniques and ease of modification have made the world shift towards digital representation of multimedia signals such as image, audio and video. The rapid growth of Internet is also fuelling this process. The vendors fear to put their multimedia data over the Internet, because there is no way to track the illegal distribution and violation of copyright protection. Watermarking comes into the scenario as a powerful solution to this problem.

What is the DIGITAL WATERMARKING? Digital watermarking is the process of possibly irreversibly embedding information into a digital signal. The signal may be audio, pictures or video. for example, If the signal is copied, then the information is also carried in the copy. It is the process of altering the original data file. Depending on the specific method used, and we will present it later which is called adjusted purpose watermarking technique …

An advantage of the digital watermarking:- Is to detect the images that may contain unauthorized changes and even help in recovering some of the lost data. A disadvantage of digital watermarking:- Is that a subscriber cannot significantly alter some files without sacrificing the quality or utility of the data. This can be true of various files including image data, audio data, and computer code.

Watermark can be divided into tow types: 1-visible watermarking: The information is text or a logo which identifies the owner of the media. 2-invisible watermarking: Information is added as digital data to audio, picture or video, but it cannot be perceived as such (although it is possible to detect the hidden information).

Adjusted purpose (AP) for digital watermarking technique There are two categories in image watermarking according to its embedding domains: Spatial domain:- In spatial domain, we can simply insert a watermark into a host image by changing gray levels of some pixels in the host image. In spatial domain, we can simply insert a watermark into a host image by changing gray levels of some pixels in the host image.Advantage: Simple, easy and fast. Simple, easy and fast. Disadvantage: The inserted information could be easily detected by computer analysis. The inserted information could be easily detected by computer analysis.

Frequency domain:- In frequency domain, we can insert a watermark into coefficients of a transformed image, for example: In frequency domain, we can insert a watermark into coefficients of a transformed image, for example: The Discrete Fourier Transforms (DFT). The Discrete Fourier Transforms (DFT). The Discrete Cosine Transforms (DCT). The Discrete Cosine Transforms (DCT). The Discrete Wavelet Transforms (DWT). The Discrete Wavelet Transforms (DWT).

Advantage: The inserted information is generally difficult to be detected. Disadvantages: We cannot embed large amounts of data in the frequency domain; because quality of the host image will be distorted significantly. The data embedded in coefficients of a transformed image will be somewhat distorted in the transformation from frequency to spatial domain due to conversion from real numbers into integers.

Watermarks can be categorized into two types According to embedding purposes: 1-Robust:- They are usually used for copyright protection to declare the rightful ownership. They are usually used for copyright protection to declare the rightful ownership. 2-Fragile:- For the purpose of authentication, fragile watermarks are adopted to detect any unauthorized modification. For the purpose of authentication, fragile watermarks are adopted to detect any unauthorized modification.

We can adjust the approach of performing watermarking from spatial to frequency domain by adjusting the size of (VSTW) varying sized transform window. Performing of watermarking will become the spatial-domain approach when VSTW = 1×1, and the frequency- domain approach for other sizes. VSTW = 1×1, and the frequency- domain approach for other sizes.

Also we can adjust the purpose of watermarking from fragile to robust by adjusting the value of (QF) quantity factor. The embedded watermarks will become robust if QF is large, and become fragile if QF is 1. The strategies for adjusting VSTW and QF are described later.

The strategies for adjusting VSTW and QF The size of VSTW can determine whether the spatial or frequency domain is adopted. For example, if the size is 1×1, it is equivalent to the spatial-domain approach. If the size is 2×2, 4× 4, or 8 ×8, It belongs to the frequency-domain approach. Note that, the size of VSTW could be arbitrary, not necessarily a square of power of 2.

In principle, fragile watermarks are embedded into LSB, and robust watermarks are into HSB. In order to integrate both watermarks, the quantity factor (QF) is developed based on the spread spectrum. We know that shifting the binary bits of x to left (denoted as shl) or right (denoted as shr) by y bits is equivalent to multiplying or dividing x by 2^y. The position for embedding the watermark can be determined based on the QF as shown in Table bellow. For example, if the watermark is embedded into the fourth bit (i.e., QF = 8) of a pixel, we will divide the pixel value by 8, and then replace the resulting LSB by the watermark. Finally, we multiply the result by 8 to obtain the watermarked value.

Table: The relation between QF and the embedded position of the watermark Int. Binary Embedded watermark Embedded position QF After embedding New int (LSB)

The watermarks should not be embedded into insignificant regions of an image or its spectrum since many signal and geometric processes could affect these components. For robustness, they suggested that watermarks should be embedded into regions with large magnitudes in coefficients of a transformed image. If the watermarks embedded in insignificant regions, the original image will have huge degradations; therefore, the size of embedded watermarks is quite limited In order to enlarging the capacity of watermarks; small size of VSTW is selected.considering robustness the watermark is embedded into the higher significant bits; therefore, by the VSTW, we can determine the size of each sub-image to enlarge the capacity of the Watermarks.

Conclusion:- Digital watermarking has been demonstrated to be very useful in identifying the source, creator, owner, distributor, or authorized consumer of a document or an image. It can be used for tracking the images that were illegally distributed.

There are many purpose-oriented watermarking techniques. For example, robust watermarks are used to withstand malicious attacks, fragile watermarks are applied for ownership authentication. Further examples are the embedding strategies, some in spatial or frequency domain, and some in the combination of both. Further examples are the embedding strategies, some in spatial or frequency domain, and some in the combination of both.

To integrate all of these, we have presented an adjusted-purpose digital watermarking technique that uses two parameters, VSTW and QF, to choose the desired one particular watermarking. Therefore, when users design their own watermarking approaches, they can adopt our technique as a platform to make a suitable adjustment.

Before the end We want to thank our colleagues Good for listening

The end The end