scispace - formally typeset
Open AccessJournal Article

Digital watermarking

TLDR
A large number of the questioned people believe that watermarking should be placed in the intermediate area according to its severity in the sanction system, but the exact rules and regulations are still unclear.
Abstract
................................................................................................................................................. 7 1.0 Introduction of Digital Watermarking ................................................................................................ 7 2.0 Watermarking ................................................................................................................................... 8 2.1 Definition of Watermarking ........................................................................................................... 8 2.2 Principle of Watermarking ............................................................................................................. 9 3.0 Requirements .................................................................................................................................. 10 3.1 Transparency: .............................................................................................................................. 10 3.2 Robustness: ................................................................................................................................. 10 3.3 Capacity or Data Load: ................................................................................................................. 10 4.0 Applications ..................................................................................................................................... 10 4.1 Copyright Protection: ................................................................................................................... 10 4.2 Authentication: ............................................................................................................................ 10 4.3 Broadcast Monitoring: ................................................................................................................. 10 4.4 Content Labeling: ......................................................................................................................... 10 4.5 Tamper Detection: ....................................................................................................................... 10 4.6 Digital Fingerprinting: .................................................................................................................. 10 4.7 Content protection: ..................................................................................................................... 11 5.0 Classifications of Watermarking ....................................................................................................... 11 5.1 Visible .......................................................................................................................................... 11 5.2 Invisible ....................................................................................................................................... 11 5.2.1 Robust Watermarks .............................................................................................................. 11 5.2.2 Fragile Watermarks ............................................................................................................... 11 5.2.3 Public and Private Watermark ............................................................................................... 12 5.3 Capacity ....................................................................................................................................... 12 5.4 Perceptibility ............................................................................................................................... 12 5.5 Embedding Techniques: ............................................................................................................... 12 5.5.1 Spread Spectrum ................................................................................................................... 12 Digital Watermarking 4 Abrar Ahmed Syed 1000614216 5.5.2 Quantization ......................................................................................................................... 12 5.5.3 Amplitude Modification: ....................................................................................................... 12 6.0 Techniques or Schemes of Watermarking ........................................................................................ 13 6.1 Spatial Domain Techniques .......................................................................................................... 13 6.1.1 Least Significant Bit Coding (LSB) ........................................................................................... 13 6.1.2 Predictive Coding Schemes .................................................................................................... 13 6.1.3 Correlation-Based Techniques ............................................................................................... 13 6.1.4 Patchwork Techniques .......................................................................................................... 14 6.2 Frequency Domain techniques ..................................................................................................... 14 6.2.1 Discrete cosine transform (DCT) based technique: ................................................................ 14 6.3 Wavelet Transform based Watermarking ..................................................................................... 18 6.4 Simple Watermarking .................................................................................................................. 19 7.0 Attacks ............................................................................................................................................ 20 7.1 Basic ............................................................................................................................................ 20 7.2 Robustness .................................................................................................................................. 20 7.3 Presentation ................................................................................................................................ 20 7.4 Interpretation .............................................................................................................................. 21 7.5 Implementation ........................................................................................................................... 21 7.6 Removal....................................................................................................................................... 21 7.7 Geometrical ................................................................................................................................. 22 7.8 Cryptographic .............................................................................................................................. 22 7.9 Active & Passive ........................................................................................................................... 22 7.10 Forgery ...................................................................................................................................... 22 7.11 Collusion .................................................................................................................................... 22 7.12 Distortive ................................................................................................................................... 23 8.0 Counter Attacks ............................................................................................................................... 23 8.1 Power Spectrum Condition (PSC) ................................................................................................. 23 8.2 Noise Visibility Function (NVF): .................................................................................................... 24 9.0 Privacy Laws of Watermarking ......................................................................................................... 25 10.0 Project Goal ................................................................................................................................... 25 10.1 Invisible Watermarking (Least significant bit Watermarking) ...................................................... 25 10.1.1 Steps ................................................................................................................................... 25 Digital Watermarking 5 Abrar Ahmed Syed 1000614216 10.1.2 Program .............................................................................................................................. 26 10.1.3 Algorithm Explanation ......................................................................................................... 28 10.1.14 Flow-chart: ........................................................................................................................ 31 10.1.5 Results: ............................................................................................................................... 31 10.2 Visible Watermarking – Concatenation ...................................................................................... 33 10.2.1 Steps ................................................................................................................................... 33 10.2.2 Program: ............................................................................................................................. 33 10.2.3 Algorithm Explanation ......................................................................................................... 36 10.2.4 Flow-chart ........................................................................................................................... 38 10.2.5 Result ..............................................................................................

read more

Citations
More filters
Proceedings ArticleDOI

An Efficient Block-by-Block SVD-Based Image Watermarking Scheme

TL;DR: This paper presents a block based digital image watermarking that is dependent on the mathematical technique of singular value decomposition (SVD) and makes the watermark more robust to the attacks such as noise, compression, cropping and other attacks as the results reveal.
Book ChapterDOI

Survey of Watermarking Techniques and Applications

TL;DR: A recent proliferation and success of the Internet, together with availability of relatively inexpensive digital recording and storage devices has created an environment in which it became very easy to obtain, replicate and distribute digital content without any loss in quality.
Book

Data Engineering: Mining, Information and Intelligence

TL;DR: The book will be the first to categorize and synthesize the diverse methodologies that are used in these interrelated fields into a structured approach entitled, Data Engineering.
Proceedings ArticleDOI

Robust watermark extraction using SVD-based dynamic stochastic resonance

TL;DR: A novel dynamic stochastic resonance-based non-blind watermark extraction technique has been proposed for robust extraction of a grayscale watermark and can be done without trading-off with visual quality of the watermarked image.
Book ChapterDOI

A Novel Wavelet Image Watermarking Scheme Combined with Chaos Sequence and Neural Network

TL;DR: A method for watermarking of chaos and neural network that can be successfully detected even after rotation, translation, scaling and is good at protecting from many kind watermark attacks is proposed.
References
More filters
Journal ArticleDOI

Discrete Cosine Transform

TL;DR: In this article, a discrete cosine transform (DCT) is defined and an algorithm to compute it using the fast Fourier transform is developed, which can be used in the area of digital processing for the purposes of pattern recognition and Wiener filtering.
Journal ArticleDOI

The JPEG still picture compression standard

TL;DR: The author provides an overview of the JPEG standard, and focuses in detail on the Baseline method, which has been by far the most widely implemented JPEG method to date, and is sufficient in its own right for a large number of applications.
Journal ArticleDOI

DCT-domain watermarking techniques for still images: detector performance analysis and a new structure

TL;DR: Analysis of a spread-spectrum-like discrete cosine transform (DCT) domain watermarking technique for copyright protection of still digital images is analyzed and analytical expressions for performance measures are derived and contrasted with experimental results.
Journal Article

Watermarking digital image and video data

TL;DR: A chuck has a chuck body rotatable about an axis and formed with a plurality of angularly spaced radially extending inner guides and a plurality that is radially displaceable in each of the inner guides.
Journal ArticleDOI

Attacks on digital watermarks: classification, estimation based attacks, and benchmarks

TL;DR: The current work of the European Certimark project is summarized, whose goal is to accelerate efforts from a number of research groups and companies in order to produce an improved ensemble of benchmarking tools.