Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
293 views

Digital Water Marking: by Sheikh Qaisar Ayub

An easy to understand the basic and advanced concepts of watermarking with Interesting examples and animation.
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
293 views

Digital Water Marking: by Sheikh Qaisar Ayub

An easy to understand the basic and advanced concepts of watermarking with Interesting examples and animation.
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 40

Qaisar Ayub & Sulma Rashid

Advanced Topics in Image Processing

Digital Water Marking

By
Sheikh Qaisar Ayub
sheikhqaisar@gmail.com
Watermark

Observe image It is intellectual property

Some one may spend a lot of time And thinking to compose this image
The image has been extended by any other person now he is owner of image
Problem How to protect image ?

Solution Watermark
Watermark

What ?
The term watermark is derived from the German term “Wessmark”
Basic Idea
The basic idea of watermark is to embed some information in digital
images so that it can not be miss used or owned by others

Image without watermark Watermarked image


Watermark
Visible watermark
- The visible watermark consist of visible message of company logo
indicating the ownership of image.
Types of Digital Watermark

Visible watermark
The implementation of visible watermarks can be applied in following areas

1. Word Document
Types of Digital Watermark

Visible watermark
The implementation of visible watermarks can be applied in following areas

2. On Images
Types of Digital Watermark

Visible watermark
2. Multimedia Files

Click on image to Play


Types of Digital Watermark

Invisible watermark
- The watermark will not appear on the image and its existence can be determined
using appropriate watermark extraction or detection algorithm.
Explanation
An invisible watermark technique consist of an encoding process and a decoding
process.
Types of Digital Watermark

Invisible watermark
How to implement ?
Step -1
Select randomly the area of image to obtain its pixel values

A=
Types of Digital Watermark

Invisible watermark
How to implement ?
Step -2
Convert into its binary values

A=

B=
Types of Digital Watermark

Invisible watermark
How to implement ?
Step -3
Form a watermarking key
A=

B=

C=

Watermark Key
Types of Digital Watermark

Invisible watermark
How to implement ?
Step -4
The OR Operation is used
B=

01100101 01100100
00000011 00000001

D= B + C 01101000 01100101
01100111 01100110
00000000 00000010

01100111 01101000
Types of Digital Watermark

Summery

1. Select randomly area of image and get its pixel values

2. Obtain its digital values A=

B=
3. Convert to binary

4. Get a key matrix consisting binary values

C=

5. Embed watermark using D:= B OR C


Types of Digital Watermark

ENCODING Algorithm

Data
01100101 01101000

00000011
Encoder Key

Note
Watermark will not effect the composition of image
Achievement
We have add a invisible water mark in the image

The process of embedding the invisible watermark in image


is called ENCODING
Types of Digital Watermark

Invisible watermark
We have embed the watermark in image

Can this image be owned by others?


The Answer is yes

What is the function of watermark ?


Example
1. Mr. Ali Compose a image

2. He then embed a watermark in it

3. Later on Mr.Jamil access this image and modify it and clam its ownership

4. Mr.Ali can detect his image by extracting the embedded watermark and can reclaim the
ownership
Types of Digital Watermark

Invisible watermark Decoding


- The process of extracting the embedded watermark from image is called Decoding.

- The image can only be decoded by using the decoded algrothem with the key which was used for
encoding.

Extract the encoded data from image

Detect watermark Algorithm

01101000 01100101
Input to Decoding Algorithm
Example

Watermark detected by the Algorithm and hence intellectual property can be saved.

Extract Watermark Algorithm


Encoding & Decoding

ENCODING Algorithm DECODING Algorithm

Data 01101000
01100101 01101000

Communication Media

00000011
Encoder Key

Extract Watermark Algorithm


Mathematically Encoding

X’ = EK (X,W)
Hence
X = Original Image
W= watermark information being
embedded
K= user insertion key
E= watermark insertion function
X’ = Watermarked Image

Mathematically Decoding

W = DK’ (X’)
Hence
X’ = Watermarked image
K’= extraction key
D= watermark extraction function
W= Extracted watermarked information
Achievement
We have understand the process of extracting the
watermarked key from image

Encoding and Decoding Mathematically


Application of watermark

1. Ownership Declaration
Application of watermark
Finger Print IS File save ?
Application of watermark
Finger Print
Data Center-01

Data Center-02
Network

Data Center-03
Application of watermark
Finger Print

A invalid copy is found at any location

Extract the embedded figure print From file

A figure print is unique value form each data center

Can identify the data center


Application of watermark

Click on image to Play

4
Embed the number of copies to be allowed for copying embed in the hardware

4 3 2 1
Copy not allowed
Application of watermark
Fraud Detection
Data Center-01

Data Center-02
Network

Data Center-03
Application of watermark
5. ID Card & Security

Observe ID card

Karim Ahmad
Muhammad Ishfaque

WHAT IS THE PROBLEM ?


Application of watermark
5. ID Card & Security

Muhammad Ishfaque
M.jamil Ishfaque
Muhammad

Extract name using watermarked algorithm


Muhammad Ishfaque

Compare the to validate ID CARD. M.jamil

M Jamil Muhammad Ishfaque


Achievement

We have understand the application of water


mark
Properties of Watermark

Robustness
The ability of watermark to provide the resistance against the modification of image is
called robustness
Modification
Original Image Resize Rotation & Compression
Properties of Watermark

No perceptibility
“ When we embed a invisible watermark by changing it bits it will not effect Human visual
system”
Modification

Original Image Watermarked image


Properties of Watermark

Non Detectable
Design a watermark that is not detectable by the outer attacks
Complexicity
The amount of time required to encode & decode a image is called complexicity
Achievement

We have understand the properties of watermarks


Methods of Water Marking
Water Marking in Spatial domain
The values of the image pixels are directly modified based on the
water mark that has to be embedded.
Advantage
- Simple
- Less computational required
Drawback
- No security against modification
Methods of Water Marking
Water marking in frequency domain
A distributed sequence inserted into the perceptually most significant
frequency components.

Image: 11001010 00110101 00011010 00000000...

Watermark: 01 01 10 11...

Watermarked Image:
11001011 00110010 00011100 00000011...
Thanks

You might also like