Digital Watermarking
-
Upload
vinay-kumar -
Category
Technology
-
view
366 -
download
1
Transcript of Digital Watermarking
DIGITAL WATERMARKING
By Ch.Vinay kumar (10U31A0413)
AGENDA:WHAT IS DIGITAL WATER MARKING?WHY IS IT?WHY TO USE IT?PROPERTIESCLASSIFICATIONSGENERAL WATERMARKING SYSTEMDIGITAL WATERMARKING TECHNIQUESADVANTAGESDISADVANTAGESAPPLICATIONSCONCLUSIONBIBILOGRAPHY
What is Digital Watermarking?
Digital watermarking is a technique for inserting information (the watermark) into an image, which can be later extracted or detected for variety of purposes including identification and authentication purposes.
Why IS it?
Why because It describes methods and technology that allow to hide information.
PROPERTIES:
ROBUSTNESS
PERCEPTUAL TRANSPARENCY
CAPACITY
COMPLEXITY
SECURITY
CLASSIFICATION:
PERCEPTIABLE WATERMARKS & IMPERCEPTIABLE
ROBUST & FRAGILE
PUBLIC & PRIVATE
WATER MARKING SYSTEM:
DIGITAL WATERMARKING TECHNIQUES:
The techniques which are used to put digital watermarks onto the digital media are called as digital watermark techniques. They are: 1) Image domain encoding
2)Transform domain3)Masking
ADVANTAGES:
Embedded water mark is easy
Implementation on pc platform is possible
Uniquely identifies author
DISADVANTAGES:
Resizing,compression and converting images from one file to another may add noise to an image.Some watermarks vanish if some one manipulates the image in a program like photoshop .
APPLICATIONS:
Military applications: * Intelligence activities *Traitor tracing *Image tampering detection
Civilian applications: * Intelligent web browsers *Copy right protection of digital media in hard copy
CONCLUSION:
The large need of networked multimedia system has created the need of copy right protection .so, it is very important to protect intellectual properties of digital media . For this DIGITAL WATERMARKING is the great solution for the protection of legal rights of digital content.
BIBILOGRAPHY:
www.utd.edu/~bxt043000/cs4398_f7 http://cs.uccs.edu/~sasummer/cs591/SpreadSpectrum http://www-scf.usc.edu/~csci530l/slides/lab-steganography.p
df http://www.securityfocus.com/infocus/1684 http://www.garykessler.net/library/steganography.html http://home.comcast.net/~ebm.md/stego.html
THANK YOU
QUERIES ??