0% found this document useful (0 votes)
2 views

EC462

The document discusses digital watermarking, a technique for embedding information in digital signals to verify authenticity and ownership. It outlines various watermarking techniques, including spatial and frequency domain methods, along with their requirements such as robustness and imperceptibility. Applications of watermarking include copyright identification, copy protection, and authenticity determination, highlighting its importance in protecting intellectual property rights.

Uploaded by

Ashish Ravipati
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

EC462

The document discusses digital watermarking, a technique for embedding information in digital signals to verify authenticity and ownership. It outlines various watermarking techniques, including spatial and frequency domain methods, along with their requirements such as robustness and imperceptibility. Applications of watermarking include copyright identification, copy protection, and authenticity determination, highlighting its importance in protecting intellectual property rights.

Uploaded by

Ashish Ravipati
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

EC462: FORENSICS SIGNAL AND

IMAGE PROCESSING

WATERMARK
ING
Course Instructor : Mr. Maddimsetti -RAVIPATI ASHISH(62
Introduction
Digital watermarking is the process of embedding information into a
digital signal which may be used to verify its authenticity or the
identity of its owners, In digital watermarking, the signal may be
audio, pictures, or video. If the signal is copied, then the information
also is carried in the copy. A signal may carry several different
watermarks at the same time.
■ Watermark should appear random, noise-like sequence and has
high correlation with signals similar to watermark and low
correlation with other watermarks or random noise

Watermarking Techniques

Figure 2: Classification of watermarking


Spatial Domain Watermarking :
A technique in which the watermark is directly embedded into the pixel
values of an image. This is usually done by modifying the least
significant bits (LSBs) or adjusting the intensity of certain pixels.
 Spatial domain techniques are simple and computationally efficient
but are more vulnerable to attacks such as compression, filtering, and
noise addition.
Example Techniques :
1. LSB modification
2. Visible Watermarking

Frequency Domain Watermarking :


Frequency domain watermarking embeds the watermark into the
transformed coefficients of an image rather than modifying the pixel values
directly.
 Frequency domain watermarking is more robust against compression,
Example Techniques :
1. DCT-based watermarking (e.g., embedding in JPEG compression
coefficients)
2. DWT-based watermarking (multi-resolution watermarking)

Requirements of Watermarking
1) Robustness
- Resistance ability of the watermark against modification made to the
original file. The embedded information can survive after different types
of attack.
2) Imperceptibility
- The watermarked and original image cannot be distinguished from each
other.
3) Non-detectable
- It should be consistent with the original data.
- Attacker difficult to manipulate the watermark information.
5) Capacity
- Embedding capacity that can be embedded into the host image.
6) Unchanging image size
- Image size is not changed after embedding watermark.

Visible Watermarking
A visible watermark is a visible translucent image which is overlaid on
the primary image. Perhaps consisting of the logo or seal of the
organization which holds the rights to the primary image, it allows the
primary image to be viewed, but still marks it clearly as the property
of the owning organization.
 In simple terms, visible watermarking means placing an extra image,
text, or logo on top of another image. This watermark is semi-
transparent or solid so that people can see it but still view the original
image.
Figure 3: Example of Visible Watermarking (Spatial Domain
Based)

Invisible Watermarking
Invisible watermarking embeds information into an image using parts of the
image that the human visual system does not notice. One of the most
common methods is modifying the Least Significant Bits (LSB) of an
image’s pixel values.
 A watermark which is destroyed when the image is manipulated digitally in
way may be useful in proving authenticity of an image. If the
watermark is still intact, then the image has not been "doctored."
If the watermark has been destroyed, then the image has been
tampered with.

Figure 4: Example of Invisible Watermarking

Important points
 The difference between steganography and watermarking is
steganography is used to hide information so that it cannot be
detected whereas in watermarking unable to remove or
replace information
 Dual watermarking is the combination of visible and invisible
watermark, here invisible watermarking is used as a backup for
the visible watermark
 There are also different types of classifications in watermarking
such as :
1) Robust & Fragile Watermarking
2) Public & Private Watermarking
3) Steganographic & Non Steganographic Watermarking
 A watermarking scheme which uses frequency based should
embed a watermark on low or medium order frequencies
 Embedding a watermark on high frequency makes less robust
Figure 5: Watermarking System

Applications
1. Copyright identification: - Watermarks can provide information
that serves as proof of ownership when the rights of the owner
have been infringed.
2. Copy protection: - Watermarks can specify rules of image usage
and copying (e.g., to DVD players)
3. User identification or fingerprinting: - The identity of
legal users can be encoded in watermarks and used to
identify sources of illegal copies.
4. Authenticity determination: - The presence of a
watermark can guarantee that an image has not been
altered, assuming the watermark is designed to be destroyed
by any modification of the image.
5. Automated monitoring: - Watermarks can be monitored by
systems that track when and where images are used (e.g.,
programs that search the Web for images placed on Web
pages). Monitoring is useful for royalty collection and/or the
location of illegal users.
Conclusion
Digital watermarking is a crucial technique for protecting
intellectual property rights in the digital era. It provides a means to
embed hidden or visible information into images, ensuring
ownership authentication, copyright protection, and traceability.
The choice of watermarking method depends on the application,
whether it is for copyright enforcement, tamper detection, or secure
image distribution.
References
■ Rafael C. Gonzalez, Richard E. Woods, Digital Image Processing,
4th Edition, Pearson, 2018.
■ Cox, I. J., Miller, M. L., Bloom, J. A., Digital Watermarking, Morgan
Kaufmann, 2001.
■ Potdar, V., Han, S., Chang, E., A Survey of Digital Image
Watermarking Techniques, IEEE International Conference on Industrial
Informatics, 2005.
■ Potdar, V., Han, S., & Chang, E., A Survey of Digital Image
Watermarking Techniques, IEEE International Conference on Industrial
Informatics, 2005
THANK YOU

You might also like