digital watermarking by rocky
TRANSCRIPT
![Page 1: Digital Watermarking by Rocky](https://reader031.vdocuments.site/reader031/viewer/2022021415/58ed04b21a28ab166c8b45e7/html5/thumbnails/1.jpg)
By: SK GOLAM ROCKY BUL ECE13422
![Page 2: Digital Watermarking by Rocky](https://reader031.vdocuments.site/reader031/viewer/2022021415/58ed04b21a28ab166c8b45e7/html5/thumbnails/2.jpg)
Digital watermarking is the process of embedding information into a digital signal which may be used to identify its owner,in the same manner as paper bearing watermark for visible identification.
![Page 3: Digital Watermarking by Rocky](https://reader031.vdocuments.site/reader031/viewer/2022021415/58ed04b21a28ab166c8b45e7/html5/thumbnails/3.jpg)
Mainly it is used for copyright protection of digital media.Currently the unauthorized distribution of digital audio & video over the internet is the big problem.In this scenario,digital watermarking may be useful to setup controlled audio distribution & to provide efficient means for copyright protection.
![Page 4: Digital Watermarking by Rocky](https://reader031.vdocuments.site/reader031/viewer/2022021415/58ed04b21a28ab166c8b45e7/html5/thumbnails/4.jpg)
Invisible/Inaudible Information is embedded without digital content
degradation, because of the level of embedding operation is too small for human to notice the change.
Inseparable The embedded information can survive after some
processing, compression and format transformation.
Unchanging data file size Data size of the media is not changed before and
after embedding operation because information is embedded directly into the media.
![Page 5: Digital Watermarking by Rocky](https://reader031.vdocuments.site/reader031/viewer/2022021415/58ed04b21a28ab166c8b45e7/html5/thumbnails/5.jpg)
![Page 6: Digital Watermarking by Rocky](https://reader031.vdocuments.site/reader031/viewer/2022021415/58ed04b21a28ab166c8b45e7/html5/thumbnails/6.jpg)
Perform 2D-DWT to divide image into LL, HL, LH and HH sub-bands.
Select coefficients from the LL, HL, LH and HH sub-bands that exceed a particular threshold T1
Embed watermarking data via additive modification
t’i = ti + α|ti|xi xi = watermark α = weighting constant
Perform 2D-IDWT to create “watermarked image”
![Page 7: Digital Watermarking by Rocky](https://reader031.vdocuments.site/reader031/viewer/2022021415/58ed04b21a28ab166c8b45e7/html5/thumbnails/7.jpg)
According to Human Perception Visible Invisible
According to Robustness Fragile Semi fragile Robust
According to Document Text Image
![Page 8: Digital Watermarking by Rocky](https://reader031.vdocuments.site/reader031/viewer/2022021415/58ed04b21a28ab166c8b45e7/html5/thumbnails/8.jpg)
![Page 9: Digital Watermarking by Rocky](https://reader031.vdocuments.site/reader031/viewer/2022021415/58ed04b21a28ab166c8b45e7/html5/thumbnails/9.jpg)
Logo or seal of the organization which holds the rights to the primary image, it allows the primary image to be viewed, but still visible it clearly as the property of the owning organization.
Overlay the watermark in such a way that makes it difficult to remove, if the goal of indicating property rights is to be achieved.
![Page 10: Digital Watermarking by Rocky](https://reader031.vdocuments.site/reader031/viewer/2022021415/58ed04b21a28ab166c8b45e7/html5/thumbnails/10.jpg)
WatermarkImage with watermark
![Page 11: Digital Watermarking by Rocky](https://reader031.vdocuments.site/reader031/viewer/2022021415/58ed04b21a28ab166c8b45e7/html5/thumbnails/11.jpg)
Embedding level is too small to notice Can be retrieved by extraction software Applications:
Authentication Copyrighting Etc…
![Page 12: Digital Watermarking by Rocky](https://reader031.vdocuments.site/reader031/viewer/2022021415/58ed04b21a28ab166c8b45e7/html5/thumbnails/12.jpg)
![Page 13: Digital Watermarking by Rocky](https://reader031.vdocuments.site/reader031/viewer/2022021415/58ed04b21a28ab166c8b45e7/html5/thumbnails/13.jpg)
![Page 14: Digital Watermarking by Rocky](https://reader031.vdocuments.site/reader031/viewer/2022021415/58ed04b21a28ab166c8b45e7/html5/thumbnails/14.jpg)
A watermark is called fragile if it fails to be detected after the slightest modification.
A watermark is called semi-fragile if it resists beginning transformations but fails detection after malignant transformations.
A watermark is called robust if it resists a designated class of transformations.
![Page 15: Digital Watermarking by Rocky](https://reader031.vdocuments.site/reader031/viewer/2022021415/58ed04b21a28ab166c8b45e7/html5/thumbnails/15.jpg)
![Page 16: Digital Watermarking by Rocky](https://reader031.vdocuments.site/reader031/viewer/2022021415/58ed04b21a28ab166c8b45e7/html5/thumbnails/16.jpg)
Text/Image/Audio watermarking refers to embedding watermarks in an text/image/audio in order to protect the image from illegal copying and identify manipulation.
![Page 17: Digital Watermarking by Rocky](https://reader031.vdocuments.site/reader031/viewer/2022021415/58ed04b21a28ab166c8b45e7/html5/thumbnails/17.jpg)
1-
![Page 18: Digital Watermarking by Rocky](https://reader031.vdocuments.site/reader031/viewer/2022021415/58ed04b21a28ab166c8b45e7/html5/thumbnails/18.jpg)