EC462
EC462
IMAGE PROCESSING
WATERMARK
ING
Course Instructor : Mr. Maddimsetti -RAVIPATI ASHISH(62
Introduction
Digital watermarking is the process of embedding information into a
digital signal which may be used to verify its authenticity or the
identity of its owners, In digital watermarking, the signal may be
audio, pictures, or video. If the signal is copied, then the information
also is carried in the copy. A signal may carry several different
watermarks at the same time.
■ Watermark should appear random, noise-like sequence and has
high correlation with signals similar to watermark and low
correlation with other watermarks or random noise
Watermarking Techniques
Requirements of Watermarking
1) Robustness
- Resistance ability of the watermark against modification made to the
original file. The embedded information can survive after different types
of attack.
2) Imperceptibility
- The watermarked and original image cannot be distinguished from each
other.
3) Non-detectable
- It should be consistent with the original data.
- Attacker difficult to manipulate the watermark information.
5) Capacity
- Embedding capacity that can be embedded into the host image.
6) Unchanging image size
- Image size is not changed after embedding watermark.
Visible Watermarking
A visible watermark is a visible translucent image which is overlaid on
the primary image. Perhaps consisting of the logo or seal of the
organization which holds the rights to the primary image, it allows the
primary image to be viewed, but still marks it clearly as the property
of the owning organization.
In simple terms, visible watermarking means placing an extra image,
text, or logo on top of another image. This watermark is semi-
transparent or solid so that people can see it but still view the original
image.
Figure 3: Example of Visible Watermarking (Spatial Domain
Based)
Invisible Watermarking
Invisible watermarking embeds information into an image using parts of the
image that the human visual system does not notice. One of the most
common methods is modifying the Least Significant Bits (LSB) of an
image’s pixel values.
A watermark which is destroyed when the image is manipulated digitally in
way may be useful in proving authenticity of an image. If the
watermark is still intact, then the image has not been "doctored."
If the watermark has been destroyed, then the image has been
tampered with.
Important points
The difference between steganography and watermarking is
steganography is used to hide information so that it cannot be
detected whereas in watermarking unable to remove or
replace information
Dual watermarking is the combination of visible and invisible
watermark, here invisible watermarking is used as a backup for
the visible watermark
There are also different types of classifications in watermarking
such as :
1) Robust & Fragile Watermarking
2) Public & Private Watermarking
3) Steganographic & Non Steganographic Watermarking
A watermarking scheme which uses frequency based should
embed a watermark on low or medium order frequencies
Embedding a watermark on high frequency makes less robust
Figure 5: Watermarking System
Applications
1. Copyright identification: - Watermarks can provide information
that serves as proof of ownership when the rights of the owner
have been infringed.
2. Copy protection: - Watermarks can specify rules of image usage
and copying (e.g., to DVD players)
3. User identification or fingerprinting: - The identity of
legal users can be encoded in watermarks and used to
identify sources of illegal copies.
4. Authenticity determination: - The presence of a
watermark can guarantee that an image has not been
altered, assuming the watermark is designed to be destroyed
by any modification of the image.
5. Automated monitoring: - Watermarks can be monitored by
systems that track when and where images are used (e.g.,
programs that search the Web for images placed on Web
pages). Monitoring is useful for royalty collection and/or the
location of illegal users.
Conclusion
Digital watermarking is a crucial technique for protecting
intellectual property rights in the digital era. It provides a means to
embed hidden or visible information into images, ensuring
ownership authentication, copyright protection, and traceability.
The choice of watermarking method depends on the application,
whether it is for copyright enforcement, tamper detection, or secure
image distribution.
References
■ Rafael C. Gonzalez, Richard E. Woods, Digital Image Processing,
4th Edition, Pearson, 2018.
■ Cox, I. J., Miller, M. L., Bloom, J. A., Digital Watermarking, Morgan
Kaufmann, 2001.
■ Potdar, V., Han, S., Chang, E., A Survey of Digital Image
Watermarking Techniques, IEEE International Conference on Industrial
Informatics, 2005.
■ Potdar, V., Han, S., & Chang, E., A Survey of Digital Image
Watermarking Techniques, IEEE International Conference on Industrial
Informatics, 2005
THANK YOU