0% found this document useful (0 votes)
41 views

Digital Image Watermarking For Protection Against Data Duplication

The document discusses digital image watermarking for protection against data duplication. It introduces watermarking, describes its use for copyright protection and preventing data alteration. It also explains the lifecycle phases of digital image watermarking and various types of watermarking attacks.

Uploaded by

Kripa Sindhu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views

Digital Image Watermarking For Protection Against Data Duplication

The document discusses digital image watermarking for protection against data duplication. It introduces watermarking, describes its use for copyright protection and preventing data alteration. It also explains the lifecycle phases of digital image watermarking and various types of watermarking attacks.

Uploaded by

Kripa Sindhu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

DIGITAL IMAGE WATERMARKING FOR

PROTECTION AGAINST DATA


DUPLICATION.
GUIDED BY:
NEETA THAKRE.
PRESENTED BY:
1. TRIDEEP.
2. AMIT JAY.
3. RADHIKESH KUMAR.
4. KRIPA SINDHU.
5. SUMAN SAURABH.

INTRODUCTION
1.The rapid advancement of internet has made it easier to
send data/image accurate and faster to the destination.

2.In the current trends of the world, due to the
advancement in technologies, most of the individuals prefer
to use the internet as the primary medium to transfer data
from one end to another across the world.

3.However,security threat is the main issue while sending
data over the internet. The private/confidential data can be
hacked in many ways.

4.Data security basically means protection of data from
unauthorized users or hackers and providing high security
to prevent data alteration.
WHAT IS
WATERMARKING?
1. Digital watermarking is the process of computer-aided
information hiding in a carrier signal; the hidden
information should, but does not need to contain a
relation to the carrier signal.

2. It is used to verify the authenticity or integrity of the
carrier signal or to show the identity of its owners.

3. Digital watermarks are only perceptible under certain
conditions, i.e. after using some algorithm, and
imperceptible anytime else.

WHY WATERMARKING IS
USED ?
1.Digital Image Watermarking is described as one of the
promising way to close the gap between copyright issues
and digital distribution of data.

2. It acts as a very good medium for copyright issues as it
embeds a symbol or a logo in the form of a Watermark,
which cannot be altered manually.

3. By digital watermarking, information like origin, legal
destination, and access rights, is embedded to the
multimedia data without introducing any perceptible
differences compared to the original.
DIGITAL IMAGE WATERMARKING
LIFECYCLE PHASES.
1. The information to be embedded in a signal is called a digital
watermark.

2. The signal where the watermark is to be embedded is called the
host signal.

3. A watermarking system is usually divided into three distinct
steps, embedding, attack, and detection.

4. In embedding, an algorithm accepts the host and the data to be
embedded, and produces a watermarked signal.

5. Then the watermarked digital signal is transmitted or stored,
usually transmitted to another person.

6. If this person makes a modification, this is called an attack.

7. Detection (often called extraction) is an technique which is
applied to the attacked signal to attempt to extract the
watermark from it.

VARIOUS WATERMARKING
ATTACKS
A robust watermark should survive a wide variety of
attacks both incidental and malicious.

These watermark attacks can be classified as follows:
TYPES OF ATTACKS EXAMPLES
SIMPLE ATTACKS Compression to
JPEG/MPEG,D/A or A/D
conversions;etc.
DETECTION-DISABLING
ATTACKS
Cropping,rotation;etc.
AMBIGUITY ATTACKS Inversion attacks.
REMOVAL ATTACKS Collusion attacks.de-
noising.

SOFTWARE AND HARDWARE REQUIREMENTS:

1. SOFTWARE REQUIREMENTS:

a) Microsoft Visual Studio
b) C#.net
c) Windows Xp/Vista.

2. HARDWARE REQUIREMENTS:

a) Minimum Pentium 1.x
Giga Hertz processor or
equivalent processor.
b) Minimum 1GB RAM.
c) Minimum 80 GB Hard
Disk with 2 GB Free space

You might also like