Digital Water Marking: by Sheikh Qaisar Ayub
Digital Water Marking: by Sheikh Qaisar Ayub
By
Sheikh Qaisar Ayub
sheikhqaisar@gmail.com
Watermark
Some one may spend a lot of time And thinking to compose this image
The image has been extended by any other person now he is owner of image
Problem How to protect image ?
Solution Watermark
Watermark
What ?
The term watermark is derived from the German term “Wessmark”
Basic Idea
The basic idea of watermark is to embed some information in digital
images so that it can not be miss used or owned by others
Visible watermark
The implementation of visible watermarks can be applied in following areas
1. Word Document
Types of Digital Watermark
Visible watermark
The implementation of visible watermarks can be applied in following areas
2. On Images
Types of Digital Watermark
Visible watermark
2. Multimedia Files
Invisible watermark
- The watermark will not appear on the image and its existence can be determined
using appropriate watermark extraction or detection algorithm.
Explanation
An invisible watermark technique consist of an encoding process and a decoding
process.
Types of Digital Watermark
Invisible watermark
How to implement ?
Step -1
Select randomly the area of image to obtain its pixel values
A=
Types of Digital Watermark
Invisible watermark
How to implement ?
Step -2
Convert into its binary values
A=
B=
Types of Digital Watermark
Invisible watermark
How to implement ?
Step -3
Form a watermarking key
A=
B=
C=
Watermark Key
Types of Digital Watermark
Invisible watermark
How to implement ?
Step -4
The OR Operation is used
B=
01100101 01100100
00000011 00000001
D= B + C 01101000 01100101
01100111 01100110
00000000 00000010
01100111 01101000
Types of Digital Watermark
Summery
B=
3. Convert to binary
C=
ENCODING Algorithm
Data
01100101 01101000
00000011
Encoder Key
Note
Watermark will not effect the composition of image
Achievement
We have add a invisible water mark in the image
Invisible watermark
We have embed the watermark in image
3. Later on Mr.Jamil access this image and modify it and clam its ownership
4. Mr.Ali can detect his image by extracting the embedded watermark and can reclaim the
ownership
Types of Digital Watermark
- The image can only be decoded by using the decoded algrothem with the key which was used for
encoding.
01101000 01100101
Input to Decoding Algorithm
Example
Watermark detected by the Algorithm and hence intellectual property can be saved.
Data 01101000
01100101 01101000
Communication Media
00000011
Encoder Key
X’ = EK (X,W)
Hence
X = Original Image
W= watermark information being
embedded
K= user insertion key
E= watermark insertion function
X’ = Watermarked Image
Mathematically Decoding
W = DK’ (X’)
Hence
X’ = Watermarked image
K’= extraction key
D= watermark extraction function
W= Extracted watermarked information
Achievement
We have understand the process of extracting the
watermarked key from image
1. Ownership Declaration
Application of watermark
Finger Print IS File save ?
Application of watermark
Finger Print
Data Center-01
Data Center-02
Network
Data Center-03
Application of watermark
Finger Print
4
Embed the number of copies to be allowed for copying embed in the hardware
4 3 2 1
Copy not allowed
Application of watermark
Fraud Detection
Data Center-01
Data Center-02
Network
Data Center-03
Application of watermark
5. ID Card & Security
Observe ID card
Karim Ahmad
Muhammad Ishfaque
Muhammad Ishfaque
M.jamil Ishfaque
Muhammad
Robustness
The ability of watermark to provide the resistance against the modification of image is
called robustness
Modification
Original Image Resize Rotation & Compression
Properties of Watermark
No perceptibility
“ When we embed a invisible watermark by changing it bits it will not effect Human visual
system”
Modification
Non Detectable
Design a watermark that is not detectable by the outer attacks
Complexicity
The amount of time required to encode & decode a image is called complexicity
Achievement
Watermark: 01 01 10 11...
Watermarked Image:
11001011 00110010 00011100 00000011...
Thanks