Digital Watermarking_Lectures 1-6 Part A
Digital Watermarking_Lectures 1-6 Part A
Part of a digital image is copied and then pasted to another portion of the
same image.
Original Image Forge Image
In image (b) Lady with bag in red circle is copied from the same image and pasted. Above is the example of
copy move forgery.
Image Splicing
Image Splicing is a process of making a composite picture by cutting some
object from images.
and adding it to the other image.
In image 2(c) Tiger is copied from image (a) and pasted in the image 2(b). Above is the example of Image
splicing.
Definitions of Digital Watermarking
Watermarking is the practice of imperceptibly altering a work
(image, video, document etc.) to embed a message about that
work.
Original
work
Detected
message
Watermark Watermarked Watermark
embedder work detector
(looks like
Message original)
(regarding
work)
Definitions of watermarking: Other definitions
• Imperceptibility is not always considered essential (allows for visible
watermarking).
• Sometimes more narrowly defined as owner identification
(watermarks must indicate identity of owner).
“Watermarking is an art/ technique for embedding secret
message/information(watermark) into digital signal (Cover)which can
be later extracted or detected to verify the authenticity or identity of
its owner. ”
Basic Watermarking Model
Main Components of a Watermarking System
1. Cover/Host Work
• Cover or host works are those digital signals which must be protected
by the watermarking approach.
• A cover work may be either an image or audio or video or document.
• In image watermarking, Cover may be binary image, gray scale or
color image
• The complexity and performance of the image watermarking
approach depends on the type of image as well as the dimensions of
the cover image.
Main Components of a Watermarking System
2. Watermark/Message/Secret Information
• The watermark/message is the information that must be hidden in
the cover image.
• A watermark is used to protect the cover image and it may be
related/unrelated to the cover image in which it is going to be hidden.
• A watermark may be derived from the cover image itself. The
watermarking method in which watermark is derived from cover itself
known as self-embedding watermarking method/scheme.
• It may also be a random image or random pattern of bits.
Main Components of a Watermarking System
3. Embedding System: The embedding system is the one which
embeds the watermark into the cover image.
4. Watermarked Image: Watermarked images are nothing but the
cover images embedded with the watermark.
5. Transmission Channel: This is the medium by which the
watermarked image travels up to the receiver
6. Extraction or Retrieving System: This is the entity where the
watermark extraction algorithm is executed to extract the watermark
from the watermarked image.
Basic Image Processing
What is Digital Image ?
• An image may be defined as a two-dimensional function, f(x, y),
where x and y are spatial (plane) coordinates, and the
amplitude of f at any pair of coordinates (x,y) is called the
intensity or gray level of the image at that point.
• When x, y, and the intensity values of f are all finite, discrete
quantities, we call the image a digital image.
RGB vs Gray Scale Image
• RGB Image: It is three dimension(channel) image. It contains the Red
color , Green color and Blue color image in separate matrix.
• Gray Scale Image: It is one dimension (channel) image. It is
derived from RGB image.
• RGB Image to Gray Scale conversion formula
𝑌 = 0.299𝑅 + 0.587𝐺 + 0.114𝐵
RGB vs Gray Scale Image
RGB image representation
• An RGB image can be viewed as three different images(a red scale
image, a green scale image and a blue scale image) stacked on top of
each other.
• When fed into the red, green and blue inputs of a color monitor, it
produces a color image on the screen.
Colour planes of RGB image in MATLAB
• Symbols
✓Plaintext: M (for message) or P (for plaintext)
✓Ciphertext: C
✓Encryption function: E
✓Decryption function: D
• Formulations
✓E(M)=C, the encryption function operates on plaintext to produce
ciphertext
✓D(C)=M, the decryption function operates on ciphertext to produce
plaintext
Cryptosystem requirements
• Efficient enciphering/deciphering
• Systems must be easy to use
• The security of the system depends only on the keys, not the secrecy
of E or D
• The key (usually denoted by K ) may be any one of a large number of
values
• The range of possible values of the key is called the keyspace.
Why is Watermarking becoming the key
method for protecting Multimedia?
• The major drawback of cryptography is that once the data is
decrypted by an intruder/attacker, there is no way to protect the data
and track its illegal distribution.
➢In cryptography where the content is encrypted prior to delivery
and a decryption key is offered only to those who have purchased
legitimate copies of the content.
➢ Cryptography can protect content from manipulation only in
encrypted form but once decrypted, the content has no further
protection from illegal duplication.
Why is Watermarking becoming the key
method for protecting Multimedia?
• In other hands, digital watermarking is a technique that employs to
guard digital content from illegal copying and manipulation even after
it is in decrypted form.
• Therefore, digital watermarking has drawn much attention of
research community to resolve these problems due to its advantages.
Note:
1. Cryptography can protect content only in encrypted form
2. Cryptography can not help after decryption
History
• The Italians where the 1st to use watermarks in the manufacture of
paper in the 1270's.
• A term derived from the Greek words “steganos” and “graphia” (The
two words mean “covered” and “writing”, respectively).
• Writing hidden messages in such a way that no one, apart from the
sender and intended recipient, suspects the existence of the
message.
– The art of concealed communication.
– The very existence of a message is kept secret.
Watermarking v.s. Steganography