Preview

Digital Image Watermarking

Powerful Essays
Open Document
Open Document
9985 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Digital Image Watermarking
INTRODUCTION

1. Introduction

Information is becoming widely available via global networks. These connected networks allow cross-references between databases. The advent of multimedia is allowing different applications to mix sound, images, and video and to interact with large amounts of information (e.g., in e-business, distance education, and human-machine interface). The industry is investing to deliver audio, image and video data in electronic form to customers, and broadcast television companies, major corporations and photo arc hivers are converting their content from analogue to digital form. This movement from traditional content, such as paper documents, analogue recordings, to digital media is due to several advantages of digital media over the traditional media.
Digital Watermarking Technique is becoming popular, especially for adding undetectable identifying marks, such as author or copyright information. Because of this use, watermarking techniques are often evaluated based on their invisibility, recoverability, and robustness. Our goal was to implement watermarking method and evaluate their susceptibility to attack by various image processing techniques.

1.1 Problem Statement

An important factor that slows down the growth of multimedia networked services is that authors, publishers and providers of multimedia data are reluctant to allow the distribution of their documents in a networked environment. This is because the ease of reproducing digital data in their exact original form is likely to encourage copyright violation, data misappropriation and abuse. These are the problems of theft and distribution of intellectual property. Therefore, creators and distributors of digital data are actively seeking reliable solutions to the problems associated with copyright protection of multimedia data.

1.2 Objectives

Digital watermarking is the process of embedding information into a digital signal in a way that is difficult to



References: 1. G.J.Simmons. "The prisoner 's problem and the subliminal channel". In "Advances in Cryptography: Proceedings of Crypto-83", 1984. 22. Kundur et.al, "A Robust Digital Image Watermarking Method Using Wavelet-Based Fusion" in Proceedings of International Conference on Image Processing vol 1, 1997 pp. 544-547 23 30. 2. The 8th information hiding conference, 2006, online at http://ih2006.jjtc.com 31

You May Also Find These Documents Helpful

  • Good Essays

    Once something is on a computer, it can replicate and move around the world in a heartbeat. Making a million perfect copies takes but an instant – copy of things we want everyone in the world to see, and also copies of things that weren’t meant to be copied at all.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7 Vocab Answers

    • 4516 Words
    • 19 Pages

    Steganography is task of hiding information by putting messages within one another. Whereas, cryptography is when you change information into an illegible layout. this format is called cipher text.…

    • 4516 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Satisfactory Essays

    Piracy is a long debated issue, expressly in the entertainment industry. It is argued that encryption programs are necessary to prevent piracy, protecting the rights of artists as well as production agents. Yet, an important query on this matter still remains; the question of public benefit and free flowing ideas for purchasers wanting limited copies in digital form. Yet the rights of the artists and producers still remains leaving the question of copyright violation, the idea behind encryption is valid but only to a certain aspect. Piracy will not be able to be brought to an end so hastily as long as the motivation to do so still remains, that is the real problem behind this debate. The purchasers should be allowed to make a limited number of copies as a fair use policy. If a purchaser fairly buys rights to a product they should be allowed to make copies for themselves via modes of laptop and other digital other issues relating to the consumer as well, which may result in this idea to be more counterproductive instead of beneficial. Instead of using encryption it may be more productive in the long run to educate purchasers of a product about piracy. The costs of products such as DVD’s and BLU-RAY copies has steadily increased causing a lot of consumers to make do with cheaper and pirated versions…

    • 463 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    is rapidly excreted in the urine and only low concentrations of daidzein and equal remain…

    • 4945 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Denton, A., (2011). ITU/NEWS. Intellectual Property rights in Today’s digital economy. Retrieved from : http://www.itu.int/net/itunews/issues/2011/07/38.aspx…

    • 1035 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Digital Media and Society

    • 5379 Words
    • 22 Pages

    * Digital information can be shared and exchanged between large numbers of users simultaneously, and across enormous distances…

    • 5379 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    The widespread availability of photo manipulation software has made it unprecedentedly easy to manipulate images for malicious purposes. Image splicing is one such form of tampering. In recent years, researchers have proposed various methods for detecting such splicing. In this paper, we present a novel method of detecting splicing in images, using discrepancies in motion blur. We use motion blur estimation through image gradients in order to detect inconsistencies between the spliced region and the rest of the image. We also develop a new measure to assist in inconsistent region segmentation in images that contain small amounts of motion blur. Experimental results show that our technique provides good segmentation of regions with inconsistent motion blur. We also provide quantitative comparisons with other existing blur-based techniques over a database of images. It is seen that our technique gives significantly better detection results.…

    • 1832 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Digital Forensics Essay

    • 1416 Words
    • 6 Pages

    The main significance of digital forensics is to identify the proof of a crime, it is able to be utilized to facts to particular suspect, affirm explanations or articulations, focus goal, distinguish sources or authenticate documents. The forensic tools can help us to identify potential digital evidence. In addition to the identification of evidence of murders, terrorism, where the tools are used commonly but it is also used in other types of crime such as child pornography or stalking. Also helps to guarantee the overall reliability and survivability of the network infrastructure. Considerate the lawful and specialized parts of…

    • 1416 Words
    • 6 Pages
    Good Essays
  • Better Essays

    The topic of this case study deals with the problem of online piracy and copyright infringement. In this paper, a discussion will be made on the problems with the topic. A list of alternatives to the problem will be displayed, a possible resolution to the problem, followed by a contingency plan to further implement problem solving ideas. The purpose of this case study is to bring awareness to this devastating issue of the selling of copyrighted materials and products without owner compensation. An understanding of the seriousness of the problem must be understood and dealt with in order to protect companies and individuals from their right to market, sell and profit from their talent and ideals.…

    • 1466 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Steganography

    • 277 Words
    • 2 Pages

    antiquity. There are stories of secret messages written in invisible ink or hidden in love…

    • 277 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Photo Manipulation

    • 701 Words
    • 3 Pages

    Image manipulation is everywhere on are daily life. It is a type of digital art. It is a unique way to describe editing photos and adding filters and special effects to photographs in order to make an illusion or define through digital means. Photo manipulation has been commonly used to deceive or convince viewers. It can be simply a photo which colors have been converted, or a photo that has been painted over, usually they use photoshop, but there are other softwares what can we use for manipulating images, image manipulation is an art as well.…

    • 701 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Lwod Char. Creation

    • 1354 Words
    • 6 Pages

    Background Limit: 5 (Generally 5, for some Background Types the limitation can be lower. For Specific Info, see "Available Background List")…

    • 1354 Words
    • 6 Pages
    Powerful Essays