Sie sind auf Seite 1von 6

Digital image processing and computer vision DIGITAL WATER MARKING, ITS APPLICATION AND TYPES

(Rao Bahadhur Y Mahabelleshwarappa Engineering College)


Varun HR Student, CSE Email: varunhr.rymec@gmail.com Mob no.8904236499 Vivek Kumar Student, CSE Email: vivek.rymec@gmail.com Mob no.7411505065 Mrs.K.S.Aparna Lecturer,CSE Email:
aparna.vastrad@gmail.com

Mob no. 9980293558

ABSTRACT In the wake of increasing copyright misuses, several new technologies are developed to preserve the authentication of information. Digital water marking is one of them. It is a technique that allows us to add hidden copyright notices, verification messages or any other useful information to the original signal. The hidden message can be a group of bits that describe something about the signal or about the genuine author of the signal. The description can be about the name, place or something related to this. Much of the research work has been done in the field of digital watermarking in the recent period of time. In this paper, a brief description about various digital water marking techniques for different media types is given. Watermark insertion and watermark decoding is described as well. The watermarking techniques described for various media types include audio water marking, video water marking, image water marking and text water marking. Some of the properties and applications are also discussed. KeywordsSteganography,Encryption,Decryption.

1. INTRODUCTION

To begin with, the meaning of watermark is a mark that is not perceptible to the naked eye in ordinary circumstances but is visible when focused through a special light. A digital water marked signal is also difficult to differentiate from the original signal normal circumstances. In fact, there should be no

detectable difference between the original signal and watermarked signal. The desire to communicate secretly is a human trait that dates back to the earliest times. This led to the invention of steganography at first and encryption later on. Before the origin of watermarking technique, there were two techniques called steganography and encryption. Steganography takes its origin from the old Greek language that means cover writing. It is nothing but, a way of transmitting hidden messages between two persons. Encryption is used to provide communication privacy and deny access to unauthorized persons from damaging the content. Watermarking can basically be classified into visible and invisible watermarking. Visible watermarking obviously includes usage of logos, trademarks and other related things for unique identification. Invisible watermarking is classified basing on the ability to withstand attacks, into robust and fragile watermarking. Fragile watermark is capable of detecting any minute transformation made to the watermarked content of the host signal. It is easy to attacks needs to be tolerated, a robust watermark is embed this into the signal. This can be accomplished by accommodating it in the unimportant portions of the original data. But it cannot withstand wide range of attacks. For the application where in wide range of used. Robust watermarking techniques are especially useful for military applications, authentication, copyright protection and so forth.

So that the insertion of watermark is not noticeable by the human ear.


Original watermark F

Watermarked Signals F' Watermark embedding Distortion medium

Partitioning Into frames

Analysis for spectral comp

Elimination of low frequency comp.

Actual Host H

Corrupted Signals F Watermark decoding Insertion of watermark

Confidential Key C Decode signals

Fig 2.Block diagram for audio watermark insertion At first, the audio signal to be processed is partitioned into some frames, allotting a finite time interval to each frame. Following this, analysis is done to calculate the spectral components, which is accomplished using FFT, more often than not. This process also allows us to find out the power contained in each frame, which is useful in the later parts of the method. From the above calculations, the low frequency components are removed from the signal. The watermark is placed in the low frequency region, where the low frequency components are removed earlier on.

Fig 1: Block diagram of a watermarking system

2. WATERMARKING FOR VARIOUS MEDIA TYPES TECHNIQUES The digital audio watermark consists of the information pertaining not only to the creator of the audio information that could be any one of several forms of song, music etc., but also to the authenticated user of the audio information. This allows that particular information to be used by only the authorized user and no one else. The watermark can also be used for secondary applications other than authentication. e.g. providing information about the song, album, style of tunes, etc. This watermark is useful in voice conferencing halls to indicate the person who is speaking at the moment. This application can be extended to videoconferences as well. The method of inserting watermark consists of concealing the watermark in the low frequency components of the message signal.

This finishes the process of inserting the watermark in the audio file. Now that the process of insertion is accomplished, the user has to extract the watermark and get it verified with his license to access the information in the audio file. The process of extraction of watermark is similar to the process of inserting the watermark as well.

Watermarked signal Partitioning into frames

Analysis using FFT

is known to the transmitting person and the receiving person as well.

Carrier processing Fig 3. Block diagram for removal of watermark from the audio watermarked file.

Audio Video Signals

Video watermarking process

watermarked signals to be transmitted

Water image hidden key


Fig 4.Video watermark insertion

The watermarked signal to be processed is subjected to framing of some finite duration. This amount of time must be the same as that of duration during insertion process. Once again, spectral analysis is carried out using techniques such as FFT, to calculate the low frequency components and the power constituted in each frame as well. From the above analysis, the power contained in the low frequency components is observed which determines the watermark.

Ideally, this watermark should be exact reproduction of the original watermark that was inserted during insertion process. This is subjected to certain constraints like power in each frame. 3. Digital video watermarking A watermark inserted in a video signal can be used for DVD copy protection. First of all, the watermark should satisfy the requirements of strength and imperceptibility. Besides this, it can be bestowed on to convey the information to restrict copying in many ways such as copy never i.e. the DVD is copy protected, copy no more i.e. it is possible to copy a finite number of times, copy liberally i.e. it can be copied any number of times, copy only once. The design depends upon the content in the DVD.A general process of digital video watermarking consists of inserting a group of bits along with the video frame to be transmitted. The process of insertion of watermark is through a hidden key that

The watermark is inserted into an image of a video sequence, it is susceptible to wide range of attacks in the channel through which it is transmitted. These attack could include deliberate attacks and attacks by chance, i.e. not deliberately done. Some of the deliberate attacks are reducing frames, conspiracy and geometric attacks. Herein, the signal is not completely damaged or distorted beyond use, for the pirate who attacks thus would like to use it anyway. Other range of attacks that the signal could suffer is those that arise from the errors due to transmission and also due to errors generated during processing of the signal. Now, the process of extraction or removal of watermark is an intricate process. This process consists of extraction of watermark from the received watermarked signal, provided the hidden key is known. By the time the signal arrives at the watermarking process, it might in a compressed form i.e. it might have undergone compression techniques. Compression is a technique that reduces the storage space required for a digital form of the video signal. This is essential to meet the bandwidth requirements. So it is necessary that the watermark signal be inserted directly into this signal, which in compressed form without having to decode the video signal to reduce intricacy.

Received Signal

Extraction process

Watermark

Hidden key Fig5 Extraction of watermark from watermarked

4.

Image watermarking

For watermarking a still image, the watermark is directly inserted on to the picture information itself such as colour, brightness, and luminescence etc. The watermark may be inserted directly on to the pixels, which are either in the spatial domain or in the transform domain. Earliest form of spatial domain techniques consists of inserting a finite number of sequences of bits into the least significant data of the host signal. This type of insertion provides for efficient visible insertion technique. Another advantage of using this technique is that the implementation requires very low cost. Later on this technique was extended to two dimensions as well. This also proved to be an effective fragile watermarking technique. While decoding, a correlation detector is used for the retrieval of watermark. Another method where a correlation detector is used does the watermarking by introducing a texture-based watermark into the region, which is quite identical to the original image. This enhances the transparency between the watermarked and the actual image. Watermarking the image in transform domain comes up with many advantages like capability of withstanding the compression techniques.

watermarking was that it was quite easy to remove the watermark. Later on, watermarks were placed in the text that depends on linguistic properties like synonyms, sequence of words etc. Minor modifications are made to characters, and such characters are used for watermarking. Text watermarking schemes are applicable to any type of texts from usual word documents to PDF files. At detection stage, the watermark is removed by processing which involves the correction for noise, and distortion introduced, if any (during the insertion process) as well. This scheme protects texts like poetry well as, the changes brought about in the text will damage the worth of it. This is also resistant to attacks like photocopying because these do not alter the watermark. 6. WATERMARK INSERTION Mid frequency components are chosen for embedding the watermark in a simple way, owing to the shortcomings with the low frequency components and high frequency components. The difficulty with the low frequency components is that they are highly susceptible to distortion. The high frequency components do not bear much of the information reliably, since their removal from the actual signal does not affect the signals quality too much. The watermarking process is a process known to all, thus the safety of the signal completely depends up on the hidden key (confidential key C shown in the Fig 1). This key C determines the sequence of bits, which are to be embedded into the host signal. The key acts in such a way that, it would be difficult (almost impossible) to recover the original signal without knowing the confidential key C. There are simple additive watermarking methods, which can be represented using simple mathematical equation: F= H + P Where F is the watermarked signal, H is the host signal (from fig 1). The new signal P is nothing but the signal originating from the hidden key C and the original watermark F. This method of representation is not applicable to all embedding processes. In some of the processes, the properties of the host signal are used for the embedding process.

5. Text watermarking Text watermarking is the process of inserting watermark into the text for preserving the creators identity. This is especially applicable to such valuable texts such as poetry. An earlier form of watermarking the texts was accomplished by inserting spaces in specific parts of the text. The disadvantage associated with this form of

7. WATERMARK DECODING Detection and identification are not the same. The method of deciding about whether a signal received contains a watermark or not is detection. But, identification is the actual process of decoding the unique watermark from a finite number of possible choices. Two kinds of errors could occur at the detection. The first one is detection of a watermark in the received signal when it really does not exist. The second one is quite opposite to this. Herein, the watermark, which inherently exists in the received data, is not detected. Synchronization failure between watermark embedding and detection process could disable the entire communication process. This could result in attacks on the signal.

information, it is possible to preserve the integrity of the information. 9. PROPERTIES Tamper resistance: If there is a possibility of aggressive or antagonistic attacks, then the watermarked signal must be tamper resistant. Tamper resistance is immaterial if there are slim chances of aggressive attacks. The watermarked signal must be tamper resistant to attacks like passive, active, and falsification attacks. In passive form of attacks, the attacker just likes to determine whether a watermark is present in the signal or not. In contrast to this, an active attack is one in which the attacker tries to remove the watermark from the watermarked signal. There is yet another form of active attack, called collusion attack wherein, the attacker tries to reconstruct the replica with no watermark from different sets of copies with different watermarks. In falsification attacks, the attacker inserts another watermark into the genuine one, thereby, changing the identification of the copy. Reliability: A watermarked signal may be considered to be highly reliable, if the distortion caused by the inclusion of watermark is quite unnoticeable by the human eye. Cost involved: Depending upon the application, the number of watermark embedders and watermark detectors vary. Their working speeds vary as well according to the type of application. The cost involved thus varies greatly depending up on all these constraints.

8. APPLICATIONS Some of the additional applications of digital watermarking are broadcast monitoring, usage of contractual watermarks for special purposes, secret communication and copy control. Broadcast monitoring: Watermarks are used in broadcast monitoring by inserting watermarks in the message that is to be transmitted. This is done before signal (audio or video) is broadcasted. Secret communication: This was one of the earliest applications of watermarking technique. It is a process of transmitted secret messages in concealed form. Specially designed programs are there to accomplish these tasks.

Copy control: Many watermarks do not actually prevent the copying of content into which they are embedded, but serve as identification marks of the genuine owner of it. But using certain mechanisms that detect the watermarks and inhibit the copying of the

10. CONCLUSION Digital watermarking is an outstanding technology that can serve a wide range of applications in various media types. But, the employment of schemes depends upon the requirements that may vary widely. A sound knowledge of communication techniques and signal processing methods is essential for

efficient development of watermarking techniques. Besides this, the attacks that the signal is expected to endure the assessment of the amount of distortion that the signal suffered which in turn determine the efficacy of the system and the effective cost involved need to be taken into consideration while designing watermarking technique for a particular application. Thus the standards for all the applications dont remain alike. ACKNOWLEDGMENT Our sincere gratitude to all the staff of our department and college officials who have been supportive throughout and special thanks to F.Y.DAUN whose work has been immensely helpful in understanding the concept and prepare this paper.

BIBLIOGRAPHY [1] M. Wu and B. Liu, Watermarking for Image Authentication, Proceedings of IEEE International Conference on Image Processing, 1998, vol.2, pp. 437-441. [2] Collected from Site Error! Hyperlink reference not valid. journal of modern Engineering Research). [3].Digital communications, By Bernard [4]. Digital image processing By Ganzaly [5]. JPEG based image compression for low bit rate coding By P.P.Gandhi. [6]F,Y.Daun,I.King, SHORT SUMMARY OF DIGITAL WATERMARK-ING TECHNIQUES FOR MULTIMEDIA DATA [7] Fernando P erez-Gonz alez and Juan R. Hern andez, A TUTORIAL ON DIGITAL WATERMARKING, Dept. Tecnologas de las Comunicaciones, ETSI Telecom. [8] Michael Gaylord,COMPONENTS OF DIGITAL WATERMARKING AND PROTECTION OF OWNERSHIP,University of cape down. [9] Onur Mutlu,AN OVERVIEW OF IMAGE WATERMARKING ALGORITHMS [10]KJ. Lach, W. Mangione-Smith, and M. Potknojak, Fingerprinting digital circuits on programmable hardware, in Information Hiding (D. Aucsmith, ed.), vol. 1525 of Lecture Notes in Computer Science, (Berlin), pp. 1631, SpringerVerlag, 1998.

Das könnte Ihnen auch gefallen