steganography and watermarking

13
STEGANOGRAPHY & WATERMARKING CSG252 FINAL PROJECT By Zina Saadi & Shivani Sahi (Dec,2004)

Upload: zina-saadi

Post on 21-Jun-2015

3.419 views

Category:

Documents


1 download

DESCRIPTION

The term “Information Hiding” relates to both watermarking and steganography. Watermarking usually refers to methods that hide information in a data object so that the information is robust to modifications. That means, it should be impossible to remove a watermark without degrading the quality of the data object. On the other hand, steganography refers to hidden information that is fragile. Modifications to thecover medium may destroy it.

TRANSCRIPT

Page 1: Steganography And Watermarking

STEGANOGRAPHY &WATERMARKING

CSG252 FINAL PROJECT

By Zina Saadi & Shivani Sahi

(Dec,2004)

Page 2: Steganography And Watermarking

Motivation for the Project

• Advanced application in internet

• Efficiency in protecting copyright and seals (watermarking)

• Efficient techniques for sending confidential information and messages .

Page 3: Steganography And Watermarking

What is Steganography?

• Information Hiding

• The communication itself is invisible

• Supplements Cryptography

Page 4: Steganography And Watermarking

Steganography vs. Cryptography

• Presence of communication is hiddenin Steganography

• In cryptography,the communication is made unintelligible to the people unaware of the required keys.

Page 5: Steganography And Watermarking

Diagrammatic representation

Page 6: Steganography And Watermarking

Mediums &Techniques

• Mediums –text, audio, video and digital images

• 4 methods-

• Least Significant Bit Insertion

• Algorithms and Transformations

• Redundant Pattern Encoding

• Spread Spectrum Method

Page 7: Steganography And Watermarking

General Applications of Steganography

• Copyright Protection and Owner Identification

• Data Authentication

• Data Hiding

• Medical Safety

Page 8: Steganography And Watermarking

What is Watermarking

• Information Hiding-methods that hide information in a data object .

• May or may not be apparent to a viewer.

• Should be impossible to remove a watermark without degrading the quality of the data object.

Page 9: Steganography And Watermarking

Requirements (Properties) of a watermark

• Unobstrusive

• Robust

Geometric Processes

Common Signal Processing

Collusion and Forgery

• Universal

• Unambiguous

Page 10: Steganography And Watermarking

Implementation

• Watermarking

• Extraction

Page 11: Steganography And Watermarking

Advantages of the implemented Technique

• Technique is immune to geometric processes such as rotation, scaling, translation .

• Size of the watermark image and the original image is not the same

Page 12: Steganography And Watermarking

Disadvantages of the implemented technique

• Value of alpha based on a comparative view of the color-scale of the original and the watermark.

• Values of alpha

0.1

0.01

0.001

Page 13: Steganography And Watermarking

Conclusion

• Supplement to Cryptography ,not a replacement

• Extensive use in hiding confidential information

• Internet usage in the current age.