Professional Documents
Culture Documents
L.SARALADEVE
LECTURER, MCA
JERUSALEM COLLEGE OF ENGINEERING
saraladeve@gmail.com
ABSTRACT
A Watermark is a recognizable image or pattern in paper that appears as various shades of lightness/darkness when viewed by
transmitted light, caused by thickness variations in the paper. The use of the word of watermarking is derived from the much
older notion of placing a visible watermark on paper. In the wake of increasing copyright misuses, several new technologies are
developed to preserve the authentication of information. Digital Water Marking is one of them.Digital watermarking is the
process of possibly irreversibly embedding information into a digital signal. The signal may be audio, video or pictures.It is a
technique that allows us to add hidden copyright notices, verification messages or any other useful information to the original
signal. The description can be about the name, place or something related to this. Much of the research work has been done in the
field of digital watermarking in the recent period of time. Digital watermarking is distinctly different from data hashing. It is the
process of altering the original data file, allowing for the subsequent recovery of embedded auxiliary data referred to as a
watermark. Digital Watermarking can be used for a wide range of applications such as:
• Copyright protection
• Fingerprinting (Different recipients get differently watermarked content)
• Broadcast Monitoring (Television news often contains watermarked video from international agencies)
• Convert Communication (steganography)
A disadvantage of digital watermarking is that a subscriber cannot significantly alter some files without sacrificing the quality or
utility of the data. This can be true of various files including image data, audio data, and computer code.
1
I
. INTRODUCTION
2
This application can be extended to videoconferences
as well. The method of inserting watermark consists
of concealing the watermark in the low frequency
components of the message signal (audio signal), so
that the insertion of watermark is not noticeable by
the human ear.
3
eases the insertion process. The drawback to this
process is that the watermark is vulnerable to remove
entirely at the time of detection. To make the
watermark stable even after detection, the watermark
is inserted by imposing energy differences between
different parts of a video signal.
3. Image watermarking:
4
will damage the worth of it. This is also resistant to identification is the actual process of decoding the
attacks like photocopying because these do not alter unique watermark from a finite number of possible
the watermark. choices. Two kinds of errors could occur at the
detection. The first one is detection of a watermark in
the received signal when it really does not exist. The
second one is quite opposite to this. Herein, the
watermark, which inherently exists in the received
data, is not detected. Synchronization failure between
watermark embedding and detection process could
disable the entire communication process. This could
result in attacks on the signal.
V. APPLICATIONS:
Fig 6. Diagram showing changed ‘N’(character
alteration). Some of the additional applications of digital
. watermarking are broadcast monitoring, usage of
1. Here the word “fundamental” is printed in the contractual watermarks for special purposes, secret
ordinary way. communication and copy control.
2. It shows the word “fundamental”, in which the
letter ‘N’ is modified slightly. 1. Broadcast monitoring:
5
information, it is possible to preserve the integrity of
the information. 3. Reliability: