Professional Documents
Culture Documents
IN
DIGITAL WATERMARKING
BY
C.RAGHAVENDRA S.V.JAGADEESH
III CSE, RGMCET, III CSE, RGMCET,
NANDYAL. NANDYAL.
1
DIGITALWATER MARK
ABSTRACT
The technique of watermarking paper (rather than heads) is
almost as old as paper manufacturing itself, dating back to the
late middle ages. Their earliest use seems to have been to record
the manufacturer’s trademark on the product so that the
authenticity could be clearly established without degrading the
aesthetics and utility of the stock. Experience with watermarks
was so successful, that governments began to watermark their
currencies, postage stamps, revenue stamps, etc. to thwart
counterfeiting.
2
Watermarking is the process of embedding the code in to
the multimedia object such that the watermark can be extracted
later to make an assertion of about the object. The code can be
audio, video or textual data. The code contains the information
about the right owner of the object. This paper highlights the
difference between stenography, encryption and watermarking.
And also simple technique on water marking are proposed and
implemented.
1.Introduction
3
noise. Every member has an unique code that works as an index
to the register. This code is encoded into the image.
4
© Time stamping: It is the process of adding time to the
data without regard to the physical medium on which it resides.
With the help of time we can identify the right owner of the
intellectual property.
5
An invisible watermark is an overlaid image which cannot
be seen, but which can be detected algorithmically. Different
applications of this technology call for two very different types of
invisible watermarks:
6
unknown) then attempts to remove or destroy a watermark,
should result in severe degradation in fidelity before the
watermark is lost. In particular, the watermark should be robust
to :
7
(iii) Universal: The same digital watermarking algorithm
should apply to all three media under consideration. This is
potentially helpful in the watermarking of multimedia products.
Also, this feature is conducive to implementation of audio and
image/video watermarking algorithms on common hardware.
3.Methodology
3.1 Fragile invisible watermark technique
8
a) read the ASCII value of the first character in the message
or watermark (ASCII character contains 8-bits)
d) Repeat all the above steps until all the ASCII values are
covered in the given message/watermark file
When all the above steps are finished we can obtained the
watermarked image, we can’t find the difference between
original image (Un-watermarked image) and watermarked image.
3.2 Results:
(a) Images with copy right information hidden in it shown below
along with it original image
9
Original Image Watermarked Image
Message Hidden:- This property is copy righted to Mr. RAO’s company, illegal use of
this photograph in any manner is considered to be a crime…..!
10
Original Image Watermarked Image
Message Hidden:- This property is copy righted to Mr. RAO’s company, illegal use of
this photograph in any manner is considered to be a crime…..!
11
LOGO Image
Advantages:
(i) It is simple than all other time domain methods
(ii) It can also be used for authentication purpose
(iii) It can also be used for integrity checking
(iv) It can also run efficiently on small processors
Disadvantages:
12
(i) If all LSB’s are set to zero in the Image file we can’t
prove copy rights hence it is simple to erase the
watermark from object being protected.
13
REFERENCES
14
i . ex e