You are on page 1of 21

PCA Based Formatted Text Watermarking

Presented by:
Yogesh K N. Manjunath N.

Agenda

Watermarking. Classification. Watermarking categories. PCA(Principal component analysis). PCA Watermarking. Watermark generation and embedding. Watermark Validation. Experimental results. Conclusions. References.

What is Watermarking?
Digital Watermarking: Application of Information hiding (Hiding Watermarks in digital Media, such as text, images or videos) for the authenticity of its owners.

Classifications of Watermarking:

A visible Watermark:

(taken from IBM research magazine)

Invisible Watermark example:

Watermarking Categories:

Robust Watermark

Embeds invisible watermarks. Resist to image processing or attacks. Used for copyright protection or to verify the ownership.

Fragile Watermark

Destroy easily on modifying original data. Used for tamper detection.

PCA (principal component Analysis)


PCA has become a popular technique since its birth 1901. It is famous for its strong expressive ability. It leads to remarkable advantage in distinguishing objects.

PCA Watermarking

Today, tampering proof of text document is of great importance. There are many watermarking schemes and traditional hash methods available to solve this problem (increase in file size). Watermarking with PCA technique is free from the above embarrassment.

Watermark generation and embedding

We first generate the Watermarks for the text document using PCA technique (using a key K).
The watermarks are then embedded into the text document through ULC coding. The un-tampered text document is the one with the valid watermarks.

Watermark Validation:

To check whether a text document has been illegally tampered, We first extract a watermark for it as in the case of embedding process. If the extracted watermark and embedded watermark are identical, the page is legal; otherwise tampered.

Experimental results.

Fig 1.(a) Original text document.

Experimental results.

Fig 1.(b)Watermarked Text Document.

Experimental results.

Fig 1.(c) Watermark generated fot Original Text document and the Experimental result showing Document is not Tampered

Experimental results.

Fig 1.(d) Tampered text document with data being changed compared to original document.

Experimental results.

Fig 1.(e) Watermarked Tampered text document

Experimental results.

Fig 1.(f) Watermark generated for tampered document and its verified result showing Document is Tampered

Conclusions

Today, the tamper-proof of text documents is among the most significant security issues. In this paper, based on the PCA on a matrix produced from a text document and a secret key, we present a new watermarking scheme for this issue. The results show that the presented PCA-based watermarking scheme is a promising method to protect the integrity of text documents.

Conclusions

Besides the tamper-proof of text documents, this scheme may be also useful in other applications in Markup Language, such as HTML and XML (Extensible Markup Language).
Thus it is of significant importance to explore watermarking schemes for other markup languages, and potential applications of them.

References:
[1] W. Stallings, Cryptography and Network Security Principles and Practice, second ed., Prentice-Hall Inc., Englewood Cliffs, NJ, 1999. 2] S. Katzenbeisser, A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Boston, 2000 [3] S.H. Low, N.F. Maxemchuk, Performance comparison of two text marking methods, IEEE J. Sel. Areas Commun. 16 (1998) 561572. [4] K. Jonathan, F. Hartung, B. Griod, Digital watermarking of text, image and video documents.

THANK YOU

You might also like