Digital Watermarking Full Seminar Report Download
#53
PRESENTED BY:
Parag Agarwal

[attachment=12891]
Digital Watermarking
[attachment=12891]
Information Hiding
Information Hiding…..started with
Steganography (art of hidden writing):
The art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. The existence of information is secret.
Steganography (dates back to 440 BC)
Histaeus used his slaves (information tattooed on a slave’s shaved head )
Microchip - Application
Germans used Microchips in World War II
What is a watermark ?
What is a watermark ? A distinguishing mark impressed on paper during manufacture; visible when paper is held up to the light (e.g. $ Bill)
What is a watermark ?
Digital Watermarking: Application of Information hiding (Hiding Watermarks in digital Media, such as images)
Digital Watermarking can be ?
- Perceptible (e.g. author information in .doc)
- Imperceptible (e.g. author information in images)
Visibility is application dependent
Invisible watermarks are preferred ?
Applications
Applications
Tamper proofing: To find out if data was tampered.
Applications
Quality Assessment: Degradation of Visual Quality
Comparison
Watermarking Vs Cryptography
Watermark D  Hide information in D
Encrypt D  Change form of D
Watermarking Process
Data (D), Watermark (W), Stego Key (K), Watermarked Data (Dw)
Embed (D, W, K) = Dw
Extract (Dw) = W’ and compare with W
(e.g. find the linear correlation and compare it to a threshold)
Q. How do we make this system secure ?
A. K is secret (Use cryptography to make information hidden more secure)
Watermarking Process Example – Embedding (Dw = D + W)
Matrix representation (12 blocks – 3 x 4 matrix)
(Algorithm Used: Random number generator RNG), Seed for RNG = K, D = Matrix representation, W = Author’s name
Watermarking Process Example – Extraction
The Watermark can be identified by generating the random numbers using the seed K
Data Domain Categorization
Spatial Watermarking
Direct usage of data to embed and extract Watermark
e.g. voltage values for audio data
Transform Based Watermarking
Conversion of data to another format to embed and extract.
e.g. Conversion to polar co-ordinate systems of 3D models, makes it robust against scaling
Extraction Categorization
Informed (Private)
Extract using {D, K, W}
Semi - Blind (Semi-Private)
Extract using {K, W}
Blind (Public)
Extract using {K}
- Blind (requires less information storage)
- Informed techniques are more robust to tampering
Robustness Categorization
Fragile (for tamper proofing e.g. losing watermark implies tampering)
Semi-Fragile (robust against user level operations, e.g. image compression)
Robust (against adversary based attack, e.g. noise addition to images)
Categorization of Watermark
Eg1. Robust Private Spatial Watermarks
Eg2. Blind Fragile DCT based Watermarks
Eg3. Blind Semi-fragile Spatial Watermarks
Watermarking Example
Application: Copyright Protection
Design Requirements:
- Imperceptibility
- Capacity
- Robustness
- Security
Imperceptibility
Robustness

Adversaries can attack the data set and remove the watermark.
Attacks are generally data dependent
e.g. Compression that adds noise can be used as an attack to remove the watermark. Different data types can have different compression schemes.
Robustness
Value Change Attacks
- Noise addition e.g. lossy compression
- Uniform Affine Transformation e.g. 3D
model being rotated in 3D space OR
image being scaled
If encoding of watermarks are data value dependent 
Watermark is lost  Extraction process fails
Robustness
Sample loss Attacks

- Cropping e.g. Cropping in images
- Smoothing e.g. smoothing of audio
signals e.g. Change in Sample rates
in audio data change in sampling rat
results in loss of samples
If watermarks are encoded in parts of data set which are
lost  Watermark is lost  Extraction process fails
Robustness
Reorder Attack

- Reversal of sequence of data values e.g. reverse filter in audio signal reverses the order of data values in time
Capacity
Multiple Watermarks can be supported.
More capacity implies more robustness since watermarks can be replicated.
Spatial Methods are have higher capacity than transform techniques ?
Security
In case the key used during watermark is lost anyone can read the watermark and remove it.
In case the watermark is public, it can be encoded and copyright information is lost.
Watermarking Algorithm Design Requirements
As much information (watermarks) as possible
 Capacity
Only be accessible by authorized parties
 Security
Resistance against hostile/user dependent changes
 Robustness
Invisibility
 Imperceptibility
Tamper proofing
Robustness against user related operations – compression, format conversion
Accuracy of Detection – Only changes in meaning should be detected
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: digital watermarking seminar report,
Popular Searches: digital watermarking word presentation, fragile watermarking seminar topic, projects in watermarking survey, seminar report on digital wallets, watermarking projects in java, what is a watermark, seminar report on image watermarking on a digital camera,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Nano ring memory - by anudilip - 16-03-2011, 03:48 PM
RE: Digital Watermarking Full Seminar Report Download - by seminar class - 27-04-2011, 09:50 AM
Digital Watermarking - by gondaliyumarchu - 04-07-2011, 09:39 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 43,922 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,813 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 25,971 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,686 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,063 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 76,151 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,490 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,625 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,373 16-09-2015, 02:51 PM
Last Post: seminar report asees
  HOLOGRAPHIC VERSATILE DISC A SEMINAR REPORT Computer Science Clay 20 39,877 16-09-2015, 02:18 PM
Last Post: seminar report asees

Forum Jump: