Professional Documents
Culture Documents
Presented by:
Yogesh K N. Manjunath N.
Agenda
Watermarking. Classification. Watermarking categories. PCA(Principal component analysis). PCA Watermarking. Watermark generation and embedding. Watermark Validation. Experimental results. Conclusions. References.
What is Watermarking?
Digital Watermarking: Application of Information hiding (Hiding Watermarks in digital Media, such as text, images or videos) for the authenticity of its owners.
Classifications of Watermarking:
A visible Watermark:
Watermarking Categories:
Robust Watermark
Embeds invisible watermarks. Resist to image processing or attacks. Used for copyright protection or to verify the ownership.
Fragile Watermark
PCA Watermarking
Today, tampering proof of text document is of great importance. There are many watermarking schemes and traditional hash methods available to solve this problem (increase in file size). Watermarking with PCA technique is free from the above embarrassment.
We first generate the Watermarks for the text document using PCA technique (using a key K).
The watermarks are then embedded into the text document through ULC coding. The un-tampered text document is the one with the valid watermarks.
Watermark Validation:
To check whether a text document has been illegally tampered, We first extract a watermark for it as in the case of embedding process. If the extracted watermark and embedded watermark are identical, the page is legal; otherwise tampered.
Experimental results.
Experimental results.
Experimental results.
Fig 1.(c) Watermark generated fot Original Text document and the Experimental result showing Document is not Tampered
Experimental results.
Fig 1.(d) Tampered text document with data being changed compared to original document.
Experimental results.
Experimental results.
Fig 1.(f) Watermark generated for tampered document and its verified result showing Document is Tampered
Conclusions
Today, the tamper-proof of text documents is among the most significant security issues. In this paper, based on the PCA on a matrix produced from a text document and a secret key, we present a new watermarking scheme for this issue. The results show that the presented PCA-based watermarking scheme is a promising method to protect the integrity of text documents.
Conclusions
Besides the tamper-proof of text documents, this scheme may be also useful in other applications in Markup Language, such as HTML and XML (Extensible Markup Language).
Thus it is of significant importance to explore watermarking schemes for other markup languages, and potential applications of them.
References:
[1] W. Stallings, Cryptography and Network Security Principles and Practice, second ed., Prentice-Hall Inc., Englewood Cliffs, NJ, 1999. 2] S. Katzenbeisser, A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Boston, 2000 [3] S.H. Low, N.F. Maxemchuk, Performance comparison of two text marking methods, IEEE J. Sel. Areas Commun. 16 (1998) 561572. [4] K. Jonathan, F. Hartung, B. Griod, Digital watermarking of text, image and video documents.
THANK YOU