Presentation is loading. Please wait.

Presentation is loading. Please wait.

PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.

Similar presentations


Presentation on theme: "PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT."— Presentation transcript:

1 PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT

2  watermarking is to protect one’s work from being hijacked.  It also deals with various types of Watermark attacks.  When unauthorized copies or forgeries of the image appear elsewhere on the network, the designer needs to prove his ownership of the image.

3  Imperceptible: The watermark should be imperceptible so as not to affect the viewing experience of the image or the quality of the audio signal.  Undetectable: The watermark must be difficult or even impossible to remove by a malicious cracker, at least without obviously degrading the host signal.

4  Statistically undetectable: A pirate should not be able to detect the watermark by comparing several watermarked signals belonging to the same author  Unambiguous: Retrieval of the watermark should unambiguously identify the owner, and the accuracy of identification should degrade gradually in the face of attacks.

5  Visible  Fragile  Spatial  Image –adaptive  Blind  Public & private  Asymmetric&symmetri watermarking  Steganographic&non-stenographic  Image watermarking

6  Watermarking can be applied in the frequency domain by first applying a transform like the Fast Fourier Transform (FFT), Discrete Cosine Transform (DCT), Wavelet Transform etc.  hi gh frequencies will be lost by compression or scaling, the watermark signal is applied to lower frequencies  frequencies that contain important information of the original picture

7  Frequency methods encode the data across the global frequencies of the image. Two types of information hiding methods are  Fast Fourier Transform (FFT)  Discrete Cosine Transform (DCT)

8 FFT ISOLAT FFT +  This transformation is one that converts the time domain signal into a signal of frequency domain IFFT OUTPUT WATERMARK

9  Start the process.  Get the text data to a binary row vector.  Convert the text data to a binary row vector.  Scale the binary vector.  Create the data mark.  Compute the FFT and decompose into the magnitude and phase.  Create the ring of the data mark (using loops).  Add the ring to the magnitude of the image.

10  Reduce the magnitude points where the data bit is zero. Convert the matrix into an image (i.e. watermarked image). Output the watermarked image. Stop the process.

11 APPLICATION:  Audio watermarking  Text watermarking  Fingerprinting Common attack techniques:  Additive noise  Cropping  Rotation & Scaling

12  Digital watermarking is an effective technique for protecting intellectual property (IP)  It bears a huge commercial potential, used in consumer electronic devices.  Digital watermark technology can be used in consumer electronic devices such as digital still cameras, digital video cameras, set top boxes, DVD players, and MP3 players.  As a result it can protect information in controlled axes, prevent illegal replication and embedding ownership information in images captured in digital cameras.

13 THANK YOU


Download ppt "PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT."

Similar presentations


Ads by Google