Digital Image Watermarking For Protection Against Data Duplication
The document discusses digital image watermarking for protection against data duplication. It introduces watermarking, describes its use for copyright protection and preventing data alteration. It also explains the lifecycle phases of digital image watermarking and various types of watermarking attacks.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
41 views
Digital Image Watermarking For Protection Against Data Duplication
The document discusses digital image watermarking for protection against data duplication. It introduces watermarking, describes its use for copyright protection and preventing data alteration. It also explains the lifecycle phases of digital image watermarking and various types of watermarking attacks.
INTRODUCTION 1.The rapid advancement of internet has made it easier to send data/image accurate and faster to the destination.
2.In the current trends of the world, due to the advancement in technologies, most of the individuals prefer to use the internet as the primary medium to transfer data from one end to another across the world.
3.However,security threat is the main issue while sending data over the internet. The private/confidential data can be hacked in many ways.
4.Data security basically means protection of data from unauthorized users or hackers and providing high security to prevent data alteration. WHAT IS WATERMARKING? 1. Digital watermarking is the process of computer-aided information hiding in a carrier signal; the hidden information should, but does not need to contain a relation to the carrier signal.
2. It is used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners.
3. Digital watermarks are only perceptible under certain conditions, i.e. after using some algorithm, and imperceptible anytime else.
WHY WATERMARKING IS USED ? 1.Digital Image Watermarking is described as one of the promising way to close the gap between copyright issues and digital distribution of data.
2. It acts as a very good medium for copyright issues as it embeds a symbol or a logo in the form of a Watermark, which cannot be altered manually.
3. By digital watermarking, information like origin, legal destination, and access rights, is embedded to the multimedia data without introducing any perceptible differences compared to the original. DIGITAL IMAGE WATERMARKING LIFECYCLE PHASES. 1. The information to be embedded in a signal is called a digital watermark.
2. The signal where the watermark is to be embedded is called the host signal.
3. A watermarking system is usually divided into three distinct steps, embedding, attack, and detection.
4. In embedding, an algorithm accepts the host and the data to be embedded, and produces a watermarked signal.
5. Then the watermarked digital signal is transmitted or stored, usually transmitted to another person.
6. If this person makes a modification, this is called an attack.
7. Detection (often called extraction) is an technique which is applied to the attacked signal to attempt to extract the watermark from it.
VARIOUS WATERMARKING ATTACKS A robust watermark should survive a wide variety of attacks both incidental and malicious.
These watermark attacks can be classified as follows: TYPES OF ATTACKS EXAMPLES SIMPLE ATTACKS Compression to JPEG/MPEG,D/A or A/D conversions;etc. DETECTION-DISABLING ATTACKS Cropping,rotation;etc. AMBIGUITY ATTACKS Inversion attacks. REMOVAL ATTACKS Collusion attacks.de- noising.
SOFTWARE AND HARDWARE REQUIREMENTS:
1. SOFTWARE REQUIREMENTS:
a) Microsoft Visual Studio b) C#.net c) Windows Xp/Vista.
2. HARDWARE REQUIREMENTS:
a) Minimum Pentium 1.x Giga Hertz processor or equivalent processor. b) Minimum 1GB RAM. c) Minimum 80 GB Hard Disk with 2 GB Free space