Upload
rakesh-roshan
View
213
Download
0
Embed Size (px)
Citation preview
7/31/2019 Rep Body
1/46
Generic Lossless Watermarking Project report 2012
1. INTRODUCTION
Digital watermarking is defined as a process of embedding data (watermark) into a
multimedia object to help to protect the owner's right to that object. The embedded data
(watermark) may be either visible or invisible.
The rapid growth in the digital technology, image processing and Internet has made the
reproduction of digitally created information simple and easy. The advancement in World Wide
Web, MMS communication has made it possible to transmit and distribute this digitally created
information in a fast and easy manner without any quality degradation. This new trend has
several advantages which includes flexibility, cost effectiveness, etc., but at the same time, also
possess some serious drawbacks. It allows hackers to manipulate / duplicate / access
information illegally without the owners knowledge. This has created a great concern on
digital content security and is being studied seriously by several academicians and researchers.
In response to these challenges, digital watermarking schemes have been proposed in the last
decade, where a small amount of imperceptible secret information is embedded into the digital
content, which can be extracted at a later stage for copyright assertion, copy control,
broadcasting, authentication, content integrity verification, etc.
Digital watermarking has been investigated deeply for its technical and commercial
feasibility in all media types like, digital photographic image, audio, printed materials or
compound document images, video, etc. It is a proven method for reducing content piracy and
improving the ability to identify, tract and manage digital media. It is widely used in
applications of rights management, remote triggering, filtering/classification, e-commerce, etc.
It is a technique that is used to balance the need for content security with best possibleconsumer experience to enable media and entertainment industries to adapt the advanced
facilities of the modern digital revolution while reducing the threat of content theft.
In watermarking is defined as a technique which embeds data into digital contents such
as text, still images, video and audio data without degrading the overall quality of the digital
media. A watermark is the information to be hidden and also indicates that the hidden
information is transparent, while the term cover media indicates the media used for carrying thewatermark. The watermarked data is the media which contains the watermark. In digital
Marian Engineering College 1
7/31/2019 Rep Body
2/46
Generic Lossless Watermarking Project report 2012
watermarking technology, the phrase embedding and extraction means the procedures used for
inserting the watermark into the cover media and extracting the embedded watermark from the
watermarked data respectively. Detection is an important process that is used for detecting
whether the given media containing a particular watermark.
In visible watermarking of images, a secondary image (the watermark) is embedded in
a primary (host) image such that watermark is intentionally perceptible to a human observer
whereas in the case of invisible watermarking the embedded data is not perceptible, but may be
extracted detected by a computer program.
Some of the desired characteristics of visible watermarks are listed below.
A visible watermark should be obvious in both colour and monochrome images.
The watermark should be spread in a large or important area of the image in order toprevent its deletion by clipping.
The watermark should be visible yet must not significantly obscure the image detailsbeneath it.
The watermark must be difficult to remove; removing a watermark should be morecostly and labour intensive thanpurchasing the image from the owner.
The watermark should be applied automatically with little human intervention andlabour.
There are very few visible watermarking techniques available in current literature. The IBM
digital library organization has used a visible watermarking technique to mark the digitized
pages of manuscript from the Vatican archive. Kankanhalli et have proposed a visible
watermarking technique in DCT domain. They divide the image into different blocks, classify
the blocks by perceptual methods proposed in and modify the DCT coefficients of host image
as follows.
(1)
The and coefficients are for block n. The (n) are the DCT coefficients of the
host image block and the DCT coefficients of the watermark image block. In this paper,
we propose a visible watermarking technique that modifies the DCT coefficients of the host
image using equation (l) But, the and values are found out using a mathematical model
Marian Engineering College 2
7/31/2019 Rep Body
3/46
Generic Lossless Watermarking Project report 2012
developed by exploiting the texture sensitivity of the human visual system (HVS). This ensures
that the perceptual quality of the image is better preserved. We call scaling factor and as
the embedding factor. We have also proposed a modification to make the watermark more
robust.Several types of watermarking schemes have been proposed for handling different
applications. Examples include
(1). Copyright-related applications where the embedded watermark are robust
(2). Medical, forensic, and intelligence or military applications where the watermark areusually fragile or semi-fragile
(3). Content authentication applications where any tiny changes to the content are notacceptable, the embedding distortion has to be compensated for perfectly.
Digital watermarking techniques originally focused on copyright protection, but have
been exploited in wide range of applications. There are several categories of watermarking
schemes that are designed for different applications. Among them, robust watermarks are
generally used for copyright protection and ownership identification because they are designed
to withstand attacks such as common image processing operations. In contrast, fragile or semi-fragile watermarks are mainly applied to content authentication and integrity attestation
because they are fragile to attacks, i.e., it can detect any changes in an image as well as
localizing the areas that have been changed. Both these techniques are to be treated separately
and this paper deals with content based watermarking system for authentication.
Marian Engineering College 3
7/31/2019 Rep Body
4/46
Generic Lossless Watermarking Project report 2012
2. The Discrete Cosine Transform
Like other transforms, the Discrete Cosine Transform (DCT) attempts to decorrelate the
image data. After decorrelation each transform coefficient can be encoded independently
without losing compression efficiency. This section describes the DCT and some of its
important properties.
2.1. The One-Dimensional DCT
The most common DCT definition of a 1-D sequence of length N is
Foru = 0,1,2,,N 1. Similarly, the inverse transformation is defined as
The average value of the sample sequence. In literature, this value is referred to as the
DC Coefficient. All other transform coefficients are called the AC Coefficients. N = 8 andvarying values ofu is shown in Figure. In accordance with our previous observation, the first
the top-left waveform (u = 0) renders a constant (DC) value, whereas, all other waveforms (u =
1, 2,, 7 ) give waveforms at progressively increasing frequencies These waveforms are called
the cosine basis function. Note that these basis functions are orthogonal. Hence, multiplication
of any waveform in Figure 3 with another waveform followed by a summation over all sample
points yields a zero (scalar) value, whereas multiplication of any waveform in Figure 3 with
itself followed by a summation yields a constant (scalar) value. Orthogonal waveforms are
Marian Engineering College 4
7/31/2019 Rep Body
5/46
Generic Lossless Watermarking Project report 2012
independent, that is, none of the basis functions can be represented as a combination of other
basis functions.
Fig 2.1 One dimensional cosine basis function (N=8).
If the input sequence has more than Nsample points then it can be divided into sub-
sequences of length Nand DCT can be applied to these chunks independently. Here, a very
important point to note is that in each such computation the values of the basis function points
will not change. Only the values off (x) will change in each sub-sequence. This is a very
important property, since it shows that the basis functions can be pre-computed offline and then
multiplied with the sub-sequences. This reduces the number of mathematical operations (i.e.,
multiplications and additions) thereby rendering computation efficiency.
2.2 The Two-Dimensional DCT
The objective of this document is to study the efficacy of DCT on images. This necessitates the
extension of ideas presented in the last section to a two-dimensional space. The 2-D DCT is a
direct extension of the 1-D case and is given by
Marian Engineering College 5
7/31/2019 Rep Body
6/46
Generic Lossless Watermarking Project report 2012
for u,v = 0,1,2,,N 1 and (u) and (v) are defined in (3). The inverse transform is
defined as
for x,y = 0,1,2,,N 1. The 2-D basis functions can be generated by multiplying the
horizontally oriented 1-D basis functions (shown in Figure) with vertically oriented set of the
same functions. The basis functions for N = 8 are shown in. Again, it can be noted that the
basis functions exhibit a progressive increase in frequency both in the vertical and horizontal
direction. The top left basis function of results from multiplication of the DC component in
Figure with its transpose. Hence, this function assumes a constant value and is referred to as the
DC coefficient.
Fig 2.2 Two dimensional DCT basis functions (N = 8). Neutral gray represents zero,
white represents positive amplitudes, and black represents negative amplitude
Marian Engineering College 6
7/31/2019 Rep Body
7/46
Generic Lossless Watermarking Project report 2012
3. INTRODUCTION TO MATLAB
What is MATLAB?
MATLAB (MATrix LABoratory) is a tool for numerical computation and visualization. The
basic data element is a matrix, so if you need a program that manipulates array-based data it isgenerally fast to write and run in MATLAB.
Using MATLAB
The Beginning
When you start MATLAB, the command prompt >> appears. You will tell MATLAB what
to do by typing commands at the prompt.
Creating matrices
The basic data element in MATLAB is a matrix. A scalar in MATLAB is a 1x1 matrix, and a
vector is a 1xn (or nx1) matrix.
For example, create a 3x3 matrix A that has 1s in the first row, 2s in the second row, and 3s
in the third row:
>> A = [1 1 1; 2 2 2; 3 3 3]
The semicolon is used here to separate rows in the matrix. MATLAB gives you:
A =
1 1 1
2 2 2
3 3 3
If you dont want MATLAB to display the result of a command, put a semicolon at the end:
>> A = [1 1 1; 2 2 2; 3 3 3];
Matrix A has been created but MATLAB doesnt display it. The semicolon is necessary when
youre running long scripts and dont want everything written out to the screen! Suppose you
want to access a particular element of matrix A:
>> A(1,2)
ans =
1
Suppose you want to access a particular row of A:
>> A(2,:)
ans =
2 2 2
Marian Engineering College 7
7/31/2019 Rep Body
8/46
Generic Lossless Watermarking Project report 2012
The : operator you have just used generates equally spaced vectors. You can use it to specify
a range of values to access in the matrix:
>> A(2,1:2)
ans =
2 2
You can also use it to create a vector:
>> y = 1:3
y =
1 2 3
The default increment is 1, but you can specify the increment to be something else:
>> y = 1:2:6
y =
1 3 5
Here, the value of each vector element has been increased by 2, starting from 1, while less than
6.
You can easily concatenate vectors and matrices in MATLAB:
>> [y, A(2,:)]
ans =
1 3 5 2 2 2
You can also easily delete matrix elements. Suppose you want to delete the 2nd element of the
vector y:
>> y(2) = []
y =
1 5
MATLAB has several built-in matrices that can be useful. For example, zeros(n,n) makes an
nxn matrix of zeros.
>> B = zeros(2,2)
B =
0 0
0 0
A few other useful matrices are:
zeros create a matrix of zeros
ones create a matrix of onesrand create a matrix of random numbers
Marian Engineering College 8
7/31/2019 Rep Body
9/46
Generic Lossless Watermarking Project report 2012
eye create an identity matrix
Matrix operations
An important thing to remember is that since MATLAB is matrix-based, the multiplication
operator * denotes matrix multiplication. Therefore, A*B is notthe same as multiplying each
of the elements of A times the elements of B. However, youll probably find that at some point
you want to do element-wise operations (array operations). In MATLAB you denote an array
operator by playing a period in front of the operator. The difference between * and .* is
demonstrated in this example:
>> A = [1 1 1; 2 2 2; 3 3 3];
>> B = ones(3,3);
>> A*B
ans =
3 3 3
6 6 6
9 9 9
>> A.*B
ans =
1 1 1
2 2 2
3 3 3
Other than the bit about matrix vs. array multiplication, the basic arithmetic operators in
MATLAB work pretty much as youd expect. You can add (+), subtract (-), multiply (*), divide
(/), and raise to some power (^).
MATLAB provides many useful functions for working with matrices. It also has many scalar
functions that will work element-wise on matrices (e.g., the function sqrt(x) will take the square
root of each element of the matrix x).
Useful matrix functions:
A transpose of matrix A. Also transpose(A).
det(A) determinant of A
eig(A) eigenvalues and eigenvectors
inv(A) inverse of A
svd(A) singular value decomposition
norm(A) matrix or vector norm
Marian Engineering College 9
7/31/2019 Rep Body
10/46
Generic Lossless Watermarking Project report 2012
find(A) find indices of elements that are nonzero. Can also pass an expression to this
function, e.g. find(A > 1)finds the indices of elements of A greater than 1.
A few useful math functions:
sqrt(x) square root
sin(x) sine function.
cos(x) - cosine function.
tan(x) - tan function.
exp(x) exponential
log(x) natural log
log10(x) common log
abs(x) absolute value
mod(x) modulus
factorial(x) factorial function
floor(x) round down.
ceil(x)- rounds up
round(x)- round to nearest integer
min(x) minimum elements of an array.
max(x) maximum elements of an array.
M-files and functions
If you are doing a computation of any significant length in MATLAB, you will probably want
to make an m-file. Anything that you would type at the command prompt you can put in the m-
file (for example, script.m) and then run it all at once (by typing the name of the m-file, e.g.
script, at the command prompt). You can even add comments to your m-file, by putting a
% at the beginning of a comment line. You can also use m-files to create your own functions.
For example, suppose you want to make a function that increments the value of each element of
a matrix by some constant. And suppose you want to call the function incrementor. You
would make an m-file called incrementor.m containing the following:
function f = incrementor(x,c)
% Incrementor adds c to each element in the matrix x.
f = x + c;
When you pass a matrix x and value c to this function, the value of f = x+c is returned.You can now call this function from the command line or in another m-file.
Marian Engineering College 10
7/31/2019 Rep Body
11/46
Generic Lossless Watermarking Project report 2012
>> incrementor(A,1)
ans =
2 2 2
3 3 3
4 4 4
MATLAB provides several flow control statements that you can use in scripts. These
include:
FOR loops:
for i = 1:10
a(i) = 2;
end
WHILE loops:
while a(i) ~= 0
b(i) = 1/a(i);
end
IF/ELSE statements:
if i > 0
a(i) = 1;
else
a(i) = 0;
end
The break statement can be used to exit from the current FOR or WHILE loop. You may find
it useful at some point in a script to return control to the keyboard, to examine variables or
execute commands. Whenever the command keyboard is encountered in a script, MATLAB
will return control to the keyboard. To return to the script, just type return. MATLAB can
also prompt the user for input during a script. This is done with the input command:
x = input(prompt,s)
The string prompt will be displayed to the user. The s is an optional argument, used only if
you want the input to be read in as a string. Heres an example m-file, script1.m that makes
use of the function we created earlier:
% Script1 increment a matrix of ones by some user-specified value, v
B = ones(3,3);
v = input(What value do you want to increment by? );B = incrementor(B,v)
Marian Engineering College 11
7/31/2019 Rep Body
12/46
Generic Lossless Watermarking Project report 2012
When we run script1.m, this is what we get:
>> script1
What value do you want to increment by? 2
B =
3 3 3
3 3 3
3 3 3
File I/O
MATLAB allows you to save matrices and read them in later. The simplest way to do this is
using the commands save and load. Typing in save A saves matrix A to a file called
A.mat. If you want to read in matrix A later, just type load A. You can also use the load
command to read in ASCII files, as long as they are formatted correctly. Formatted correctly
means that the number of columns in each line is the same and the columns are delimited with
a space. Suppose you have a file called datafile.dat that contains the following lines:
12.5 6 9
1 3.5 125
2 4 0
Notice that the columns do not have to be lined up exactly, as long as there are the same
numbers of them on each line. You can read this into MATLAB by typing load datafile.dat.
MATLAB will read the file contents into a matrix called datafile (without the file extension).
Making plots
Now that you can load data into MATLAB and easily manipulate it, youll want to be able to
display the results in a meaningful (and hopefully aesthetically pleasing) way. Lets create
some sample data for an example of a simple linear plot:
>> x = 1:10;
>> y1 = x.^2;
>> y2 = 2.*y1;
You can plot it using the plot command:
>> plot(x,y1)
Suppose you want to plot only the data points, without the line between them:
>> plot(x,y1,ko)
This will plot the data with black os (k for the color black, and o to plot os) instead of the
default blue line. To see all the options for plotting colors/characters, type help plot.
Marian Engineering College 12
7/31/2019 Rep Body
13/46
Generic Lossless Watermarking Project report 2012
Suppose you want to make a second plot, of y2. If you type plot(x,y2) it will overwrite the
plot that we already have. If you want to be able to look at both plots at once, you can plot y2
in a new window. Type figure to open a new figure window:
>> figure
>> plot(x,y2)
However, you may want to plot y1 and y2 on the same set of axes. Use the hold command to
hold the current plot and axes properties. First, return to figure 1:
>> figure(1)
>> hold on
>> plot(x,y2)
You can put multiple individual plots in the same figure window using the subplot command.
Type help subplot for more information. Once youre done with your plot, youll probably
want to label the axes:
>> xlabel(x)
>> ylabel(y)
You can also give it a title:
>> title(My plot)
you can change colours using the colormap command. MATLAB has several built-in
colormaps, or you can make your own. For example, to change to a black-and-white color
scheme, type:
>> colormap(gray)
A brief list of plotting commands for 2-D data is below:
2-D
plot linear plot
loglog log-log plot
semilogx semi-log plot
semilogy semi-log plot
Once youre all done with your plots, you can save them to look at lateruse saveas to save
as a figure file. You can also make images of your figures to use in posters, publications, etc.
Use the print command to export figures in any image format (e.g., ps, eps, tif, jpg).
Advanced operations
Theres a lot more that you can do with MATLAB than is listed in this handout. Check out the
MATLAB help or one of the Other Resources if you want to learn more about the followingmore advanced tools:
Marian Engineering College 13
7/31/2019 Rep Body
14/46
Generic Lossless Watermarking Project report 2012
Numerical integration (quad)
Discrete Fourier transform (fft, ifft)
Statistics (mean, median, std, var)
Curve fitting (cftool)
Signal processing (sptool)
Numerical integration of systems of ODEs (ode45)
Getting help
MATLAB has an interactive Help Desk which includes documentation and examples for
pretty much everything youd want to do. However, it can be slow to navigate, so if you just
want to find out how to use a particular function, its easier to use the help command. Useful
commands for accessing MATLAB help are:
Help desk starts the MATLAB interactive help browser
help name displays documentation for function/command name.
look for string searches all help files for string in the description (first comment line), and
displays the function names with the description.
Suppose you want to find out how to use the tangent function, tan(x).
>> help tan
TAN Tangent of argument in radians.
TAN(X) is the tangent of the elements of X.
See also atan, tand, atan2.
Overloaded functions or methods (ones with the same name in other directories) help
sym/tan.m
Reference page in Help browser
doc tan
Suppose you want to find out how to use the tangent function, but you dont know what it is
called.
>> lookfor tangent
ACOT Inverse cotangent, result in radian.
ACOTD Inverse cotangent, result in degrees.
ACOTH Inverse hyperbolic cotangent.
ATAN Inverse tangent, result in radians.
ATAN2 Four quadrant inverse tangent.
ATAND Inverse tangent, result in degrees.ATANH Inverse hyperbolic tangent.
Marian Engineering College 14
7/31/2019 Rep Body
15/46
Generic Lossless Watermarking Project report 2012
COT Cotangent of argument in radians.
COTD Cotangent of argument in degrees.
COTH Hyperbolic cotangent.
TAN Tangent of argument in radians.
TAND Tangent of argument in degrees.
TANH Hyperbolic tangent.
4. THE DIGITAL WATERMARK
Digital watermarking is a technology for embedding various types of information in
digital content. In general, information for protecting copyrights and proving the validity of
data is embedded as a watermark. A digital watermark is a digital signal or pattern inserted into
digital content. The digital content could be a still image, an audio clip, a video clip, a text
document, or some form of digital data that the creator or owner would like to protect. The
main purpose of the watermark is to identify who the owner of the digital data is, but it can also
Marian Engineering College 15
7/31/2019 Rep Body
16/46
Generic Lossless Watermarking Project report 2012
identify the intended recipient. Why do we need to embed such information in digital content
using digital watermark technology?
The Internet boom is one of the reasons. It has become easy to connect to the Internet
from home computers and obtain or provide various information using the World Wide Web
(www). All the information handled on the Internet is provided as digital content. Such digital
content can be easily copied in a way that makes the new file in distinguishable from the
original. Then the content can be reproduced in large quantities. For example, if paper bank
notes or stock certificates could be easily copied and used, trust in their authenticity would
greatly be reduced, resulting in a big loss. To prevent this, currencies and stock certificates
contain watermarks. These watermarks are one of the methods for preventing counterfeit and
illegal use. Digital watermarks apply a similar method to digital content. Watermarked content
can prove its origin, thereby protecting copyright. A watermark also discourages piracy by
silently and psychologically deterring criminals from making illegal copies.
4.1 Principle of digital watermarks
A watermark on a bank note has a different transparency than the rest of the note when
a light is shined on it. However, this method is useless in the digital world. Currently there are
various techniques for embedding digital watermarks. Basically, they all digitally write desired
information directly onto images or audio data in such a manner that the images or audio data
are not damaged. Embedding a watermark should not result in a significant increase or
reduction in the original data. Digital watermarks are added to images or audio data in such a
way that they are invisible or inaudible unidentifiable by human eye or ear. Furthermore,
they can be embedded in content with a variety of file formats. Digital watermarking is the
content protection method for the multimedia era. Materials suitable for watermarking Digital
watermarking is applicable to any type of digital content, including still images, animation, and
audio data. It is easy to embed watermarks in material that has a comparatively high
redundancy level ("wasted"), such as colour still images, animation, and audio data; however, it
is difficult to embed watermarks in material with a low redundancy level, such as black-and-
white still images To solve this problem, we developed a technique for embedding digital
watermarks in black-and-white still images and a software application that can effectively
embed and detect digital watermarks.
Marian Engineering College 16
7/31/2019 Rep Body
17/46
Generic Lossless Watermarking Project report 2012
4.2 Structure of a digital watermark
The structure of a digital watermark is shown in the following figures
Fig 4.1 Structure of digital watermarking
The material that contains a digital watermark is called a carrier. A digital watermark is
not provided as a separate file or a link. It is information that is directly embedded in the carrier
file. Therefore, simply viewing the carrier image containing it cannot identify the digitalwatermark. Special software is needed to embed and detect such digital watermarks. Kowas
Stegano Sign is one of these software packages. Both images and audio data can carry
watermarks. A digital watermark can be detected as shown in the following illustration
5. THE IMPORTANCE OF DIGITAL WATERMARKS
The Internet has provided worldwide publishing opportunities to creators of various
works, including writers, photographers, musicians and artists. However, these same
opportunities provide ease of access to these works, which has resulted in pirating. It is easy to
duplicate audio and visual files, and is therefore probable that duplication on the Internet occurs
without the rightful owners' permission. An example of an area where copyright protection
needs to be enforced is in the on-line music industry. The Recording Industry Association of
America (RIAA) says that the value of illegal copies of music that are distributed over the
Marian Engineering College 17
7/31/2019 Rep Body
18/46
Generic Lossless Watermarking Project report 2012
Internet could reach $2 billion a year. Digital watermarking is being recognized as a way for
improving this situation. RIAA reports that "record labels see watermarking as a crucial piece
of the copy protection system, whether their music is released over the Internet or on DVD-
Audio". They are of the opinion that any encryption system can be broken, sooner or later, and
that digital watermarking is needed to indicate who the culprit is. Another scenario in which the
enforcement of copyright is needed is in newsgathering. When digital cameras are used to
snapshoot an event, the images must be watermarked as they are captured. This is so that later,
image's origin and content can be verified. This suggests that there are many applications that
could require image
Fig 5.1Internet imaging of watermarking
Watermarking, including Internet imaging, digital libraries, digital cameras, medical
imaging, image and video databases, surveillance imaging, video-on-demand systems, and
satellite-delivered video.
6. THE PURPOSES OF DIGITAL WATERMARKS
Watermarks are a way of dealing with the problems mentioned above by providing a
number of services: They aim to mark digital data permanently and unalterably, so that the
source as well as the intended recipient of the digital work is known. Copyright owners can
incorporate identifying information into their work. That is, watermarks are used in the
protection of ownership. The presence of a watermark in a work suspected of having been
copied can prove that it has been copied. By indicating the owner of the work, they
demonstrate the quality and assure the authenticity of the work. With a tracking service, owners
Marian Engineering College 18
7/31/2019 Rep Body
19/46
Generic Lossless Watermarking Project report 2012
are able to find illegal copies of their work on the Internet. In addition, because each purchaser
of the data has a unique watermark embedded in his/her copy, any unauthorized copies that
s/he has distributed can be traced back to him/her. Watermarks can be used to identify any
changes that have been made to the watermarked data. Some more recent techniques are able to
correct the alteration as well.
6.1 Overview of Copyright Law
"In essence, copyright is the right of an author to control the reproduction of his
intellectual creation". When a person reproduces a work that has been copy righted, without the
permission of the owner, s/he may be held liable for copyright infringement. To prove
copyright infringement, a copyright owner needs to prove 2 things. S/he owns the copyright in
the work, and The other party copied the work (usually determined by establishing that the
other party had access to the copyrighted work, and that the copy is "substantially similar" to
the original).In cases where it cannot be said that the owner's work and the possible illegal copy
are identical, the existence of a digital watermark could prove guilt. The damages charge can be
higher if it can be proven that the party's conduct constitutes will full infringement; that is, s/he
copied the work even though s/he knew that it was copyrighted (for example, copying even
after having discovered a watermark in the work).
7. LOCATION OF WATERMARKS
7.1 Random Marks
The most economical way to produce your watermark is to have it appear in a random
fashion on the finished sheet. in this display, one complete watermark, or i some instances part
of a watermark, will appear on each 8Z/x x 11 sheet. Depending on the size of the design,
marks can be furnished to appear on a higher frequency staggered or uniformly. However, the
location of any random mark will vary from sheet to sheet and cannot be controlled to appear in
the same exact position on each and every sheet. A random mark will appear in the same line
vertically on the sheet, buy may be in different locations from top to bottom
Marian Engineering College 19
7/31/2019 Rep Body
20/46
Generic Lossless Watermarking Project report 2012
Fig 7.1Random Marks
7.2 Localized Watermarks
If more critical positioning of your watermark is required, you might want to consider a
localized watermark. Electronically controlled positioning guarantees that the mark will appear
within (plus or minus) one-half (1/2) inch of the position specified (in any direction) when the
sheet is cut to letterhead size. However, approximately 80% of the total quantity ordered will
usually appear within (plus or minus) one-quarter (1/4) inch of the position specified. Paper in
rolls cannot be localized but design can be centered from side to side parallel to grain direction.For many business firms, localized watermarks are most generally centered in the lower two-
thirds of the sheet so that it will appear centered in the body of the letterhead or corresponding
copy. It is also often localized in the lower right or lower left hand corner of the sheet, where
typing seldom occurs.
Fig 7.2 Localized Watermarks
7.3 Paraded Marks
Marian Engineering College 20
7/31/2019 Rep Body
21/46
Generic Lossless Watermarking Project report 2012
The Dandy roll for this type of watermarking is usually designed to guarantee two full
marks and a portion of a third mark appearing in each 8Z/x * 11 sheet. These marks can be
paraded across the sheet anywhere ... either vertically or horizontally.
Fig 7.3Paraded Marks
7.4 Staggered Marks
Staggered watermarks are produced in the same manner as paraded marks, but with
some visual variation. They appear in varying locations on each sheet.
Fig 7.4 Staggered Marks
7.5 Watermark Configurations
Perhaps the most confusing part of bond and writing papers is the watermark
configurations; by that we mean how and where the watermarks are impressed on the master
size paper sheet. Once the confusion is cleared up, however, the paper salesperson can guide
printers in ordering the proper watermark configuration for a given job.
7.5.1 Head-to-foot
The term head to foot configuration means that on the sheet the head, or top of the
watermark, reads to the bottom, or foot, of the watermark above. Therefore, on the master sheet
all watermarks read correctly from one side of the sheet. As you can see in the diagram, the
Marian Engineering College 21
7/31/2019 Rep Body
22/46
Generic Lossless Watermarking Project report 2012
watermark dies run across the Dandy roll, imprinting the watermark perpendicular to the paper
grain. The result: master sheets watermarked in the head-to-foot configuration will be
watermarked across the grain of the paper. Because in the paper manufacturing process the web
stretches in the grain direction, the watermark can travel from the bottom edge to the top edge
in succeeding letterheads. Also, the watermark may be cut with part of it appearing at the
bottom of the letterhead and part of it appearing at the top. This pattern usually results in a
grain short parent sheet size such as 29 x 21; 34 x 24; 38 x 24; 34 x 22; 35 x 22Z\x. Final
Letterheads cut from the above will be grain long. The printer will print one row of
mastheads along one edge and another row across the centre of the press sheet.
Fig 7.5 Head-to-foot
7.5.2 Head-To-Head
In this configuration, the head of one watermark readds to the head of the watermarkabove, which is upside down, on the master sheet. Therefore, on the master sheet half of the
watermarks are readable while the other half appear upside down. The watermark dies run
around the Dandy roll, imprinting along the paper grain, as you can see in the diagram. The
result: master sheets watermarked head-to-head configuration will be watermarked along the
grain direction of the paper. Because the paper web stretches in the grain direction, the
watermark can drift from the right-hand side of the letterhead to the left-hand side in
succeeding letterheads. Thus, in some letterheads part of the watermark may appear on one side
Marian Engineering College 22
7/31/2019 Rep Body
23/46
Generic Lossless Watermarking Project report 2012
of the letterhead and part on the other side. Although it may be cut, there is always a complete
mark on each 8Z\x * 11.
This pattern usually results in a grain long parent sheet size such as: 21 x 29; 24 x 38;
22 x 34; 22Z/x * 35. Final letterheads cut from the above will be grain short. All mastheads
will print across the center of the sheet providing better register control. These 3 grain long
parent sheets yield a grain long final letterhead. All-Over this watermark position is used
almost exclusively for the manufacturer of paper for envelope conversion where watermark
placement is not as important. The all-over pattern features a head-to-foot staggered watermark,
and can be either cross grain or long grain. The all-over watermark is often attractive to
individuals or companies who choose to design a nonstandard size letterhead. For example, a
6x9 size letterhead folded in half lengthwise to fit a envelope would result in some of the
watermark showing in each letterhead, with no concern for laying out the press sheet.
Fig 7.6 Head-To-Head
8. DIGITAL WATERMARK TYPES AND TERMS
Watermarks can be visible or invisible
Visible watermarks are designed to be easily perceived by a viewer (or listener). They
clearly identify the owner of the digital data, but should not detract from the content of the data.
Invisible watermarks are designed to be imperceptible under normal viewing
(or listening) conditions; more of the current research focuses on this type of watermark than
the visible type.
Both of these types of watermarks are useful in deterring theft, but they achieve this in
different ways. Visible watermarks give an immediate indication of who the owner of the
Marian Engineering College 23
7/31/2019 Rep Body
24/46
Generic Lossless Watermarking Project report 2012
digital work is, and data watermarked with visible watermarks are not of as much usefulness to
a potential pirate (because the watermark is visible). Invisible watermarks, on the other hand,
increase the likelihood of prosecution after the theft has occurred. These watermarks should
therefore not be detectable to thieves, otherwise they would try to remove it; however, they
should be easily detectable by the owners. A further classification of watermarks is into
Fragile, semi-fragile or robust
Table 8.1 Comparing invisible and visible watermarking schemes
One of the major disadvantages of visible watermarking lies in the visibility of markedpatterns. Though embedded patterns are claimed to be unobtrusive, content viewers still feel
annoying about the degrading visual quality. Consequently, applications of visible
watermarking are often limited to content browsing or previewing. As for the invisible
watermarking, though good fidelity is always guaranteed, the requirement that an explicit
extraction module must exist in the extraction side does introduce additional deployment cost
and security problems. To make things worse, in scenarios such as conveying metadata (e.g.
annotations, contextual information or copyright claims) to users of legacy display deviceslacking modern updating/renewing capability, deploying extractor of invisible watermarking
schemes is totally infeasible.
Fragile
Watermark is embedded in digital data to for the purpose of detecting any changes that
have been made to the content of the data. They achieve this because they are distorted, or
"broken", easily. Fragile watermarks are applicable in image authentication systems.
Semi-fragile
Marian Engineering College 24
7/31/2019 Rep Body
25/46
Generic Lossless Watermarking Project report 2012
Watermarks detect any changes above a user-specified threshold. Robust watermarks
are designed to survive "moderate to severe signal processing attacks". Watermarks for images
can further be classified into spatial or spectrum watermarks, depending on how they are
constructed:
Spatial
Watermarks are created in the spatial domain of the image, and are embedded directly
into the pixels of the image. These usually produce images of high quality, but are not robust to
the common image alterations.
Spectral
(Or transform-based) watermarks are incorporated into the image's transform
coefficients. The inverse-transformed coefficients form the watermarked data.
Perceptual
Watermarks are invisible watermarks constructed from techniques that use models of
the human visual system to adapt the strength of the watermark to the image content. The most
effective of these watermarks are known as image-adaptive watermarks. Finally,
blind watermarking techniques are techniques that are able to detect the watermark in a
watermarked digital item without use of the original digital item.
9. GENERIC WATERMARKING SYSTEM
Digital watermarking algorithms are composed of three parts, namely, watermark
embedding algorithm, watermark extraction algorithm and watermark detection algorithm. A
general watermark system phases is shown in Figure 2.1.
Marian Engineering College 25
7/31/2019 Rep Body
26/46
Generic Lossless Watermarking Project report 2012
Figure 9.1 Watermark Lifecycle Phase
During embedding process, an algorithm accepts the host and the data to be embedded
and produces a watermarked signal. The watermarked signal is then transmitted or stored. If a
person makes a modification, then the digital content is said to be attacked. A watermark attack
is an attack on digital data where the presence of a specially crafted piece of data can be
detected by an attacker without knowing the encryption key. Special attention has to be paid to
the kind of attacks as they can help to develop better watermarking techniques and defined
better benchmarks. According to, watermark attacks can be classified into four main groups:
(i) Simple attacks: These types of attacks attempt to damage the embedded watermark by
modifications of the whole frame without any effort to identify and isolate the watermark.
Examples include frequency based compression, addition of noise, cropping and correction.
(ii) Detection-disabling attacks: These attempts to break correlation and to make detection of
the watermark impossible. Geometric distortion like zooming, shift in spatial or (in case of
video) temporal direction, rotation, cropping or pixel permutation, removal or insertion are
used.
(iii) Ambiguity attacks: These attacks the detector by producing fake watermarked data to
discredit the authority of the watermark by embedding several additional watermarks so that it
is not obvious which was the first, authoritative watermark.
Marian Engineering College 26
7/31/2019 Rep Body
27/46
Generic Lossless Watermarking Project report 2012
(iv) Removal attacks: The removal attacks estimates the watermark, separate it out and discard
only the watermark. Examples are collusion attack, denoising or exploiting conceptual
cryptographic weakness of the watermark scheme (e.g. knowledge of positions of single
watermark elements).
Detection (often called extraction) is an algorithm which is applied to the attacked
signal to attempt to extract the watermark from it. If the signal was unmodified during
transmission, then the watermark is still present and it can be extracted. In robust watermarking
applications, the extraction algorithm should be able to correctly produce the watermark, even
if the modifications were strong. In fragile watermarking, the extraction algorithm should fail if
any change is made to the signal.
Any watermarking technique has to be evaluated to judge its performance. Three
factors, as given below, must be considered while evaluating an image watermarking
algorithm.
Capacity, i.e. the amount of information that can be put into the watermark and
recovered without errors;
Robustness, i.e. the resistance of the watermark to alterations of the original content
such as compression, filtering or cropping;
Visibility, i.e. how easily the watermark can be discerned by the user.
The desired properties are high capacity, low distortion and high robustness to attacks
or high security. These factors are interdependent; for example, increasing the capacity will
decrease the robustness and/or increase the visibility. Therefore, it is essential to consider
all three factors for a fair evaluation or comparison of watermarking algorithms
10.CLASSIFICATION OF WATERMARKING SCHEMES
Digital watermarking schemes can be broadly classified into four categories, namely,
Robust, Fragile, Semi-fragile and Reversible. While, as mentioned previously, imperceptibility,
low embedding distortion and security are the common requirements of all classes, each
Marian Engineering College 27
7/31/2019 Rep Body
28/46
Generic Lossless Watermarking Project report 2012
different category of scheme has different characteristics and, thus, is suitable for different
applications. For example, while robustness is an essential requirement for copyright
applications, it has no role in most authentication applications. This section provides a brief
explanation of each of these schemes along with application areas where they can be applied.
10.1. Robust Watermarking Schemes
Robust watermarking algorithm aims at mixing a no perceptible communication channel
with image data, in such a way that the capacity of this extra channel degrades smoothly with
the distortion the watermarked content undergoes. This class of schemes has found its
applications in many areas, which includes the following.
Ownership proof and identification
Transaction tracking/fingerprinting
Copy control/copy prevention
Broadcast monitoring
There are two major approaches to the designing of robust watermarking schemes namely
spread spectrum (SS) watermarking and quantization index modulation (QIM) watermarking.
The idea behind SS-based schemes is to treat the watermark as a narrow-band signal and
embed each bit in multiple samples of the host media, which is treated as a wide-band signal.
The common approach taken by QIM-based schemes is, first, to establish an association
between a set of watermarks and another set of quantizes with their codebooks predefined
according to the watermarks. Then to embed a watermark, a set of features are extracted from
the host media and quantized to the nearest code of the quantize corresponding to the
watermark. For both types of schemes, a common practice for ensuring low distortion and
reducing the interference between the watermark and the host media is the so called informed
embedding in which the information about the host media is exploited by the embedded.
10.2. Fragile Watermarking Schemes
In contrary to robust watermarking, fragile watermarks are sensitive to all kind of
malicious and non-malicious manipulations, i.e. when manipulated the watermarks are
expected to be completely destroyed. Therefore, they are useful for the following applications.
Marian Engineering College 28
7/31/2019 Rep Body
29/46
Generic Lossless Watermarking Project report 2012
Authentication
Content-integrity verification
An effective fragile watermarking scheme must have the capability of thwarting theattacks, such as cut-and-paste (i.e. cutting one region of the media and pasting it somewhere
else in the same or another media) and vector quantization (i.e. forging a new marked image by
combining some regions of taken from different authenticated media while preserving their
relative positions. Some recent fragile schemes can be found in. However, fragile watermarks
are sensitive not only to malicious manipulations but also to content-preserving operations such
as lossy compression, transcoding, bit rate scaling, and frame rate conversion. Unfortunately,
those content preserving operations are sometimes necessary in many Internet and multimedia
applications, making fragile watermarking feasible only in the applications, such as satellite
imagery, military intelligence, and medical image archiving
10.3. Reversible Watermarking Schemes
One limitation of the previously mentioned authentication schemes is that the distortion
inflicted on the host media by the embedding process is permanent. Although the distortion is
often insignificant, it may not be acceptable for some applications. For example, any tiny
distortion of an image, even if it were a result of the watermark embedding process itself, in the
legal cases of medical malpractice would cause serious debate on the integrity of the image.
Therefore, it is desirable that watermarking schemes are capable of perfectly recovering the
original media after passing the authentication process. Schemes with this capability are often
referred to as reversible watermarking schemes also known as invertible or erasable
watermarking.
The work of search for two unequally represented sets of pixel groups such that
changing the intensity of the elements belonging to one set changes their membership, making
them belong to another set. A binary location map is then created, with each bit corresponds to
one pixel group and the value (either 0 or 1) represents the membership of that pixel group. The
location map subsequently undergoes some form of lossless compression so that its compressed
version can be combined with the watermark, the actual payload, to form a bit stream for
embedding. The embedding is carried out by changing the intensity of the pixel groups in order
to make their membership consistent with the binary value of their corresponding bit in the bit
stream. The extraction is simply a process of checking the membership of each pixel group of
Marian Engineering College 29
7/31/2019 Rep Body
30/46
Generic Lossless Watermarking Project report 2012
the watermarked image. If the image passes the authentication process, the original image can
be recovered by uncompressing the location map and then changing the intensity of each pixel
groups so that their intensity become compatible with their actual membership recorded in the
location map.
One of the limitations of all three schemes is that the ratio of the number of members in
the two sets is highly dependent on the host image. Usually images with more details or high-
frequency components tend to have lower ratio, making the location map less compressible,
thus, lowering the embedding capacity of the payload. An interesting scheme with media-
independent embedding capacity is reported in to alleviate this drawback.
11. CONTENT BASED IMAGE WATERMARKING
Many digital watermarking schemes have been proposed in the literature for still images
and videos and are mainly used in applications discussed in the previous chapters. In all these
applications, apart from copyright protection, illegal copy protection, proof of ownership
problems, identification of manipulations, there is a growing need for the authentication of the
digital content. Recently, the searches for more secure watermarking techniques have revealed
Marian Engineering College 30
7/31/2019 Rep Body
31/46
Generic Lossless Watermarking Project report 2012
the fact that the content of the images could be used to improve the invisibility and the
robustness of a watermarking scheme. This section the various content based image
watermarking methods
11.1. Human Visual System (HVS)
The notion of using watermark as a masking phenomena with constrains of non-
visibility is performed using the HVS properties. Much research has been done to increase the
robustness and the data hiding capacity of watermarking techniques based on perceptual
properties of the Human Visual System (HVS). Kay and Izquierdo in used a content based
estimation of Just Noticeable Distortion (JND) in frequency domain. To estimate the JND three
image characteristics were considered, namely, texture, edginess and smoothness. Their results
proved that this technique was resilient to most common attacks like geometric image
transformations.
Recently in this work, they considered the texture, luminance, and corner and edge
information of an image to create a mask that makes the watermark addition to the image less
perceptible to the human eyes. The embedding and extraction are done in frequency domain,
thereby gaining robustness again common attacks like compression and filtering. The results
provided are encouraging.
Much research has been done to increase the robustness and the data hiding capacity of
watermarking techniques based on perceptual properties of the Human Visual System (HVS).
The development and improvement of accurate human vision models helps in the design and
growth of perceptual masks that can be used to better hide the watermark information thereby
increasing its security.
Similarly, in the work proposed by, the noise sensitivity of each pixel based on the local
region image content such as texture, edge and luminance information was used to obtain the
JND mask for the image to be watermarked. Then each bit of the watermark is spread spatially
and shaped by pseudo-noise sequence such that its amplitude is kept below the noise sensitive
of the pixel into which it is inserted. Experimental results proved that the technique was
resistant to compression, cropping and noise attacks.
11.2. Independent Component Analysis (ICA)
Marian Engineering College 31
7/31/2019 Rep Body
32/46
Generic Lossless Watermarking Project report 2012
DCT and DWT are the two transformation techniques that are widely used in the
watermark embedding process. Recently, researchers have started using ICA for watermarking.
In ICA was applied to the blocks of the host image and that becomes the watermark. The least-
energy independent components of the host were replaced by the high-energy independent
components of the watermark image. The drawback of this scheme is that, for watermark
extraction both the watermark and the host images are required.
This was followed by the work of where the host image, the key image, and the watermark
image as the independent sources. Embedding was done by weighted addition of the key and
the watermark to the host. For watermark extraction, two more mixtures were obtained by
adding the key and the watermark using different weights. ICA was then applied to these
mixtures to separate the host, the key, and the watermark. The host and the key both are
required for watermark extraction
12.FINDING THE SCALING AND EMBEDDING FACTORS
While finding the scaling factors and embedding factors , that the quality of the
watermarked image is not degraded.
Marian Engineering College 32
7/31/2019 Rep Body
33/46
Generic Lossless Watermarking Project report 2012
The edge blocks should be least altered to avoid significant distortion of the image. So
one can add only small amount of watermark gray value in the edge block of host
image. This means that scaling factor should be close to, (the maximum value of the
scaling factor) and embedding factor should be close to min, (the minimum valueof the embedding factor).
The distortion visibility is low when the background has strong texture. In a highly
textured block, energy tends to be more evenly distributed among the different AC
DCT coefficients. That means AC DCT coefficients of highly textured blocks have
small variances and we can add more to those blocks. So for convenience, we assume
n to be directly proportional to variance ( ) and n to be inversely proportional to
variance ( ).
Let usdenote the mean gray value of each image block as and that of the image as
. The blocks with mid-intensity values ( =) are more sensitive to noise than that of
low intensity blocks ( < ) as well as high intensity blocks ( > ). This means that
n should increase with as long as ( < ) and should decrease with as long as (> ). For convenience, the relationship between n and is taken to be truncated
Gaussian. The variation of nwith respect to is the reverse of that of . The mean
gray value of each block is given by its DC DCT coefficient.
To confirm to the above requirements we have chosen and n as follows:
The and n for edge blocks are taken to be and minrespectively.
For non-edge blocks and n are computed as:
(1)
(- (2)
Where n, are the normalized values of nand respectively, and is normalized logarithm
of (thevariance of the AC DCT coefficients).
Marian Engineering College 33
7/31/2019 Rep Body
34/46
Generic Lossless Watermarking Project report 2012
n and nare then scaled to the ranges ( , ) and ( , )respectively,
where , are the minimum and maximum values of the scaling factor, and
min , max are the minimum and maximum values of the embedding factor. These
are the parameters determining the extent of watermark insertion.
We divide the original image I into 8x8 blocks and find the DCT coefficients of each
block. Let usdenote the DCT coefficients of block n by, cij(n) = 1,2, ... N, where n represents
the position of block in image I (if we traverse the image in a raster-scan manner). N is the total
number of 8x8blocks in the image and given by (row x co1)/64, "row" is the number of rows
and "col" is the number of columns of the image. The normalized mean gray value of block n is
found out using equation (4):
(4)
Where is the maximum value of
The normalized mean gray value of the image I is calculated using equation (5):
) (5)
The variance of the AC DCT coefficients (on) of block n is found using equation (6):
(6)
Where, is the mean of the AC DCT coefficients
The normalized variance of the AC DCT coefficients of block n is of the value given by
equation (7). Let us denote the natural logarithm of as .
(7)
Where, is the maximum value of
13. THE WATERMARKING PROCESS
13.1 Invisible watermarking process
Marian Engineering College 34
7/31/2019 Rep Body
35/46
Generic Lossless Watermarking Project report 2012
The invisible watermarking is also carried out in spatial domain. The invisible
watermarking we propose uses logical operation instead of simple addition. This increases the
robustness of the watermark at the same time ensures the quality of the image. Following are
the steps for invisible watermark insertion. Pseudo-random binary-sequence (0,l } of period N
is generated using linear shift register. The period N is equal to the number of pixels of the
image. The watermark is generated by arranging the binary sequence into blocks of size 4x4
or 8x8. The size of the watermark is same as the size of the image. We start with bit-plane k=O
(MSB) of the image I. The watermark is EXO Red with the bit-plane of the image. This
gives the bit-plane for watermarked image. All bit-planes (EXO Red and non-EXO Red) of
the image I are merged to obtain final watermarked image I. If SNR>threshold, then we stop;
otherwise we go to (iv) with k incremented by1 (for next lower bit-plane).
Fig 13.1 Invisible Watermarking
13.2 The Visible Watermarking Process
Marian Engineering College 35
7/31/2019 Rep Body
36/46
Generic Lossless Watermarking Project report 2012
In visible watermarking of images, a secondary image (the watermark) is embedded in
a primary (host) image such that watermark is intentionally perceptible to a human observer
whereas in the case of invisible watermarking the embedded data is not perceptible, but may be
extracted/detected by a computer program. Some of the desired characteristics of visible
watermarks are listed below .A visible watermark should be obvious in both colour and
monochrome images. The watermark should be spread in a large or important area of the image
in order to prevent its deletion by clipping. The watermark should be visible yet must not
significantly obscure the image details beneath it. The watermark must be difficult to remove;
removing a watermark should be more costly and labour intensive than purchasing the image
from the owner. The watermark should be applied automatically with little human intervention
and labour
14.INSERTION OF WATERMARK
The steps for watermark insertion are discussed now.
The original image I (to be watermarked) and the watermark image W are divided intoblocks of size 8x8. (Both the images may not be of equal size).
Marian Engineering College 36
7/31/2019 Rep Body
37/46
Generic Lossless Watermarking Project report 2012
The DCT coefficients for each block of the original image are found out.
For each block of the original image I, the normalized mean gray value n is computedusing eqn. (4) and are scaled to the range 0.1-1.0.
The normalized image mean gray value p is found out using equation (5).
For the AC DCT coefficients, the normalized variances are computed using equation
(7) and scaled to the range 0.1-1 .o.
The edge blocks are identified using the Sobel edge operator.
The n and n are found by using equations (2)and (3).
The DCT of watermark image blocks are found out.
The nth block DCT coefficient of the host image I is modified using equation (1). TheIDCT of modified coefficients give the watermarked image.
Figure 14.1 Watermark Insertion Process
Marian Engineering College 37
7/31/2019 Rep Body
38/46
Generic Lossless Watermarking Project report 2012
Watermark image Visible Watermarking Invisible Watermarking
Figure 14.2
Watermark image Host Image Watermarked Host Image
Figure 14.3
15.MODIFICATIONS TO MAKE THE WATERMARK MORE
ROBUST
The algorithm proposed here and also that of the classification schemes proposed in are
not robust for images having very few objects and large uniform areas like in Fig. (Host
image'). In most of the blocks will be classified to be in one class for this type of image. Thedifferent nand n are sorted and displayed here to get a clear understanding of the situation.
So in either of the cases, it is easy for a digital thief to remove the watermark from the
watermarked image as it would be easy to predict the n and n values. We propose a
modification to our above watermark insertion technique. After getting the values we classify
them into two or three different groups. If more than 1/3 of blocks have the same value then we
generate Gaussian random numbers with mean same as the normalized image mean and
variance 1, and scale to the range [0 (max- min)/2]. Then the numbers are added to
Marian Engineering College 38
7/31/2019 Rep Body
39/46
Generic Lossless Watermarking Project report 2012
(subtracted from) n of the largest group. The n values are not disturbed to preserve the
quality of the image. Fig shows the watermarked 'host' image.
16. DIGITAL WATERMARKING APPLICATIONS
Digital watermarking is rapid evolving field, this section identifies digital watermarking
applications and provides an overview of digital watermarking capabilities and useful benefits
to customers. This section deals with some of the scenarios where watermarking is being
already used as well as other potential applications.
VIDEO WATERMARKING
In this case, most considerations made in previous section hold. However, now the
temporal axis can be exploited to increase the redundancy of the watermark. Note that perhaps
the set of attacks that can be performed intentionally is not smaller but definitely more
expensive than for still images.
Marian Engineering College 39
7/31/2019 Rep Body
40/46
Generic Lossless Watermarking Project report 2012
AUDIO WATERMARKING
In this case, time and frequency making properties of the human ear are used to conceal
the watermark and make it inaudible. The greatest difficulty lies in synchronizing the
watermark and the watermarked audio file, but techniques that overcome this problem havebeen proposed.
HARDWARE/SOFTWARE WATERMARKING
This is a good paradigm that allows us to understand how almost every kind of data can
be copyright protected. If one is able to find two different ways of expressing the same
information, then one bit of information can be concealed, something that can be easily
generalized to any number of bits. This is why it is generally said that a perfect compression
scheme does not leave room for watermarking. In the hardware context, Boolean equivalences
can be exploited to yield instances that use different types of gates and that can be addressed by
the hidden information bits. Software can be also protected not only by finding
equivalences between instructions, variable names, or memory addresses, but also by altering
the order of non-critical instructions. All this can be accomplished at compiler level.
TEXT WATERMARKING
This problem, which in fact was one of the first that was studied within the information
hiding area, can be solved at two levels. At the Digital Watermarking printout level,
information can be encoded in the way the text lines or words are separated. This facilitates the
survival of the watermark even to photocopying. At the semantic level (necessary when raw
text files are provided), equivalences between words or expressions can be used, although
special care has to be taken not to destruct the possible intention of the author.
EXECUTABLE WATERMARKS
Once the hidden channel has been created it is possible to include even executable
contents, provided that the corresponding applet is running on the end user side.
LABELING
The hidden message could also contain labels that allow for example to annotate images
or audio. For instance, a movie may contain a "watermark" revealing the date of manufacture,
Marian Engineering College 40
7/31/2019 Rep Body
41/46
Generic Lossless Watermarking Project report 2012
the actors who were in the film, web sites for selling paraphernalia, as well as the owner of the
movie.
FINGER PRINTING
This is similar to the previous application and allows acquisition devices (such as video
cameras, audio recorders, etc.) to insert information about the specific device (e.g., an ID
number) and date of creation. This can also be done with conventional digital signature
techniques but with watermarking it becomes considerably more difficult to excise or alter the
signature. Some digital cameras already include this feature.
AUTHENTICATION
There are two significant benefits that arise from using watermarking: first, as in the
previous case, the signature becomes embedded in the message, second , it is possible to create
'soft authentication' algorithms that offer a multivalued 'perceptual closeness' measure that
accounts for different unintentional transformations that the data may have suffered (an
example is image compression with different levels),instead of the classical yes/no answer
given by cryptography based authentication. Unfortunately, the major drawback of
watermarking based authentication is the lack of public key algorithms that force either to putsecret keys in risk or to resort to trusted parties. Certification is an important issue for official
documents, such as identity cards or passports. Example on the above of a protected identity
card. The identity number "123456789" is written in clear text on the card and hidden as a
digital watermark in the identity photo. Therefore switching or manipulating the identity photo
will be detected Digital watermarking allows to mutually link information on the documents.
That means that some information is written twice on the document: for instance, the name of a
passport owner is normally printed in clear text and is also hidden as an invisible watermark inthe photo of the owner. If anyone would intend to counterfeit the passport by replacing the
photo, it would be possible to detect the change by scanning the passport and verifying the
name hidden in the photo does not match any more the name printed on the passport.
COPY AND PLAYBACK CONTROL
The message carried by the watermark may also contain information regarding copy
and display permissions. Then, a secure module can be added in copy or playback equipment toautomatically extract this permission information and block further processing if required. In
Marian Engineering College 41
7/31/2019 Rep Body
42/46
Generic Lossless Watermarking Project report 2012
order to be effective, this protection approach requires agreements between content providers
and consumer electronics manufacturers to introduce compliant watermark detectors in their
video players and recorders. This approach is being taken in Digital Video Disc (DVD).
SIGNALING
The imperceptibility constraint is helpful when transmitting signalling information in
the hidden channel. The advantage of using this channel is that no bandwidth increase is
required. An interesting application in broadcasting consists in water marking commercials
with signalling information that permits an automatic counting device to assess the number of
times that the commercial has =been broadcast during a certain period. An alternative to this
would require complex recognition software.
FORENSIC TRACKING
Forensic tracking locates the source of the content. The key advantage of digital
watermarking is that it enables tracking of the content to where it leaves an authorized path.
E-COMMERCE/LINKING
The digital watermarking enables the user to purchase or access information about the
content, related content, or items with in the content.
COUNTERFEIT DETERRENCE
Using digital watermarks is being employed by national governments and central banks
to protect the integrity of currencies across the world.
BROADCAST MONITORING
Tracks and monitors where, when and how content is being aired via cable, satellite
and terrestrial delivery
Automates manual reporting system, resulting in cost effective tracking and reporting
solution
Real-time reporting enables faster responsiveness to broadcast information
(e.g. programming changes, ad frequency changes, etc.)
Marian Engineering College 42
7/31/2019 Rep Body
43/46
Generic Lossless Watermarking Project report 2012
`
17. RESULT
Host Image: Watermark Image:
WATER MARKED IMAGE:
Marian Engineering College 43
7/31/2019 Rep Body
44/46
Generic Lossless Watermarking Project report 2012
18. CONCLUSION
A visible watermarking technique has been proposed in the DCT domain. A mathematical
model has been developed for this purpose exploiting the texture sensitivity of the HVS. We
have also proposed a modification to increase the robustness of the watermark when used for
images with very few objects. For more robustness, the watermark should not be made publicly
available; the watermark should be used in different sizes and should be put in different
portions for different images. We have used lower values of and min and max, and higher
values of minand max to make the watermark more prominent even when the images are
printed on paper. But when the watermarked images are to be viewed only through the internet,
the typical values of min, max, min and min are 0.95, 0.98, 0.07 and 0.17 respectively.
The visible watermark can be used in digital TV, digital library, ecommerce etc. We are now
Marian Engineering College 44
7/31/2019 Rep Body
45/46
Generic Lossless Watermarking Project report 2012
trying to incorporate a mathematical model that takes more characteristics of the human visual
system into consideration.
Relevant lemmas and theorems are described and proved to demonstrate the
reversibility of the compound mappings for lossless reversible visible watermarking. The
compound mappings allow different types of visible watermarks to be embedded, and two
applications have been described for embedding opaque monochrome watermarks as well as
translucent full-colour ones. A translucent watermark is clearly visible and visually appealing,
thus more appropriate than traditional transparent binary watermarks in terms of advertising
effect and copyright declaration. The two-fold monotonically increasing property of compound
mappings was defined and an implementation proposed that can provably allow mapped values
to always be close to the desired watermark if colour estimates are accurate. Also described are
parameter randomization and mapping randomization techniques, which can prevent illicit
recoveries of original images without correct input keys. Experimental results have
demonstrated the feasibility of the proposed method and the effectiveness of the proposed
security protection measures. Future research may be guided to more applications of the
proposed method and extensions of the method to other data types other than bitmap images,
like DCT coefficients in JPEG images and MPEG videos.
Marian Engineering College 45
7/31/2019 Rep Body
46/46
Generic Lossless Watermarking Project report 2012
19. DIGITAL WATERMARKING - FUTURE TRENDS
Business of online delivery and distribution via CD/removabledisks of multimedia products face huge obstacles due to unlimited perfect copying andmanipulation at the user end.
Digital watermarking is the technology used for copy control, media identification, tracing and
protecting content owner's rights. The internet is an open network, being increasingly
used for delivery of digital multimedia contents. In the digital format, content is
expressed as streams of ones and zeroes that can be transported flawlessly. The
contents can be copied perfectly inf init e times. A user can also manipulate these files.
However, good business senses necessitates two transaction mechanisms - content protectionand secure transport over the internal. This unique distribution may be hash value or textual
description. Registration authority allots a unique identification number to the
content and archives these two for future reference. Th is ma rk i s se cr et ly an d
securel y merged with original content. Watermarked content's quali ty is
minimally degraded. Owner can also attach a 'label' that is related to a unique identification
number. Cryptology is an effective solution for secure transport of copyright protected. .