Download - Steganography And Watermarking
![Page 1: Steganography And Watermarking](https://reader034.vdocuments.site/reader034/viewer/2022042614/55869c5cd8b42a66728b4577/html5/thumbnails/1.jpg)
STEGANOGRAPHY &WATERMARKING
CSG252 FINAL PROJECT
By Zina Saadi & Shivani Sahi
(Dec,2004)
![Page 2: Steganography And Watermarking](https://reader034.vdocuments.site/reader034/viewer/2022042614/55869c5cd8b42a66728b4577/html5/thumbnails/2.jpg)
Motivation for the Project
• Advanced application in internet
• Efficiency in protecting copyright and seals (watermarking)
• Efficient techniques for sending confidential information and messages .
![Page 3: Steganography And Watermarking](https://reader034.vdocuments.site/reader034/viewer/2022042614/55869c5cd8b42a66728b4577/html5/thumbnails/3.jpg)
What is Steganography?
• Information Hiding
• The communication itself is invisible
• Supplements Cryptography
![Page 4: Steganography And Watermarking](https://reader034.vdocuments.site/reader034/viewer/2022042614/55869c5cd8b42a66728b4577/html5/thumbnails/4.jpg)
Steganography vs. Cryptography
• Presence of communication is hiddenin Steganography
• In cryptography,the communication is made unintelligible to the people unaware of the required keys.
![Page 5: Steganography And Watermarking](https://reader034.vdocuments.site/reader034/viewer/2022042614/55869c5cd8b42a66728b4577/html5/thumbnails/5.jpg)
Diagrammatic representation
![Page 6: Steganography And Watermarking](https://reader034.vdocuments.site/reader034/viewer/2022042614/55869c5cd8b42a66728b4577/html5/thumbnails/6.jpg)
Mediums &Techniques
• Mediums –text, audio, video and digital images
• 4 methods-
• Least Significant Bit Insertion
• Algorithms and Transformations
• Redundant Pattern Encoding
• Spread Spectrum Method
![Page 7: Steganography And Watermarking](https://reader034.vdocuments.site/reader034/viewer/2022042614/55869c5cd8b42a66728b4577/html5/thumbnails/7.jpg)
General Applications of Steganography
• Copyright Protection and Owner Identification
• Data Authentication
• Data Hiding
• Medical Safety
![Page 8: Steganography And Watermarking](https://reader034.vdocuments.site/reader034/viewer/2022042614/55869c5cd8b42a66728b4577/html5/thumbnails/8.jpg)
What is Watermarking
• Information Hiding-methods that hide information in a data object .
• May or may not be apparent to a viewer.
• Should be impossible to remove a watermark without degrading the quality of the data object.
![Page 9: Steganography And Watermarking](https://reader034.vdocuments.site/reader034/viewer/2022042614/55869c5cd8b42a66728b4577/html5/thumbnails/9.jpg)
Requirements (Properties) of a watermark
• Unobstrusive
• Robust
Geometric Processes
Common Signal Processing
Collusion and Forgery
• Universal
• Unambiguous
![Page 10: Steganography And Watermarking](https://reader034.vdocuments.site/reader034/viewer/2022042614/55869c5cd8b42a66728b4577/html5/thumbnails/10.jpg)
Implementation
• Watermarking
• Extraction
![Page 11: Steganography And Watermarking](https://reader034.vdocuments.site/reader034/viewer/2022042614/55869c5cd8b42a66728b4577/html5/thumbnails/11.jpg)
Advantages of the implemented Technique
• Technique is immune to geometric processes such as rotation, scaling, translation .
• Size of the watermark image and the original image is not the same
![Page 12: Steganography And Watermarking](https://reader034.vdocuments.site/reader034/viewer/2022042614/55869c5cd8b42a66728b4577/html5/thumbnails/12.jpg)
Disadvantages of the implemented technique
• Value of alpha based on a comparative view of the color-scale of the original and the watermark.
• Values of alpha
0.1
0.01
0.001
![Page 13: Steganography And Watermarking](https://reader034.vdocuments.site/reader034/viewer/2022042614/55869c5cd8b42a66728b4577/html5/thumbnails/13.jpg)
Conclusion
• Supplement to Cryptography ,not a replacement
• Extensive use in hiding confidential information
• Internet usage in the current age.