watermarking tech doc
TRANSCRIPT
-
7/30/2019 Watermarking Tech Doc
1/31
WATERMARKING 08R91A12B3
1. INTRODUCTION
The enormous popularity of
the World Wide Web in the
early 1990's demonstrated
the commercial potential of
offering multimedia
resources through the digital
networks. Since commercial
interests seek to use the
digital networks to offer
digital media for profit, they
have a strong interest in
protecting their ownership
rights. Digital watermarking
has been proposed as one
way to accomplish this.
A digital watermark is a
digital signal or pattern
inserted into a digital image.
Since this signal or pattern is
present in each unaltered
copy of the original image,
the digital watermark may
also serve as a digital
signature for the copies. A
given watermark may be
unique to each copy (e.g. to
identify the intended
recipient), or be common to
multiple copies (e.g. to
identify the document
source). In either case, the
watermarking of the
document involves the
transformation of the
original into another form.
This distinguishes digital
watermarking from digital
fingerprinting, where the
original file remains intact
and a new created file
'describes' the original file's
content.
Digital watermarking is also
to be contrasted with public-
key encryption, which also
transform original files into
another form. It is acommon practice nowadays
to encrypt digital documents
so that they become un-
viewable without the
decryption key. Unlike
Page 1 of31
-
7/30/2019 Watermarking Tech Doc
2/31
WATERMARKING 08R91A12B3
encryption, however, digital
watermarking leaves the
original image (or file)
basically intact and
recognizable. In addition,
digital watermarks, as
signatures, may not be
validated without special
software. Further, decrypted
documents are free of any
residual effects of
encryption, whereas digital
watermarks are designed to
be persistent in viewing,
printing, or subsequent re-
transmission or
dissemination.
2. GENERAL FRAMEWORK
FORWATERMARKING
Watermarking is the
process that embeds data
called a watermark or digital
signature or tag or label into
a multimedia object such
that watermark can be
detected or extracted later to
make an assertion about the
object. The object may be animage or audio or video. A
simple example of a digital
watermark would be a
visible seal placed over an
image to identify the
copyright. However the
watermark might contain
additional information
including the identity of the
purchaser of a particular
copy of the material. In
general, any watermarking
scheme ,(algorithm) consists
of three parts.
The watermark.
The encoder
(insertion algorithm).
Page 2 of31
-
7/30/2019 Watermarking Tech Doc
3/31
WATERMARKING 08R91A12B3
The decoder and
comparator
(verification or
extraction or
detection algorithm).
Each owner has a unique
watermark or an owner can
also put different
watermarks in different
objects the marking
algorithm incorporates thewatermark into the object.
The verification algorithm
authenticates the object
determining both the owner
and the integrity of the
object.
2.1 Encoding Process
Let us denote an image by a
signature by S and the
watermarked image by I. E is
an encoder function, it takes an
image I and a signature S, and
it generates a new image which
is called watermarked image ,
Fig.2.1.encoder
It should be noted that the
signature S may be dependent
on image I. Following figureillustrates the encoding
process.
2.2 Decoding Process
A decoder function
D takes an image J.whose
ownership is to be
determined and recovers a
signature from the image. In
this process an additional
image I can also be included
which is often the original
and un- watermarked
version of J. This is due to
Page 3 of31
Encoder
Origin
Watermark
edimage(I)
Signat
ure(S)
-
7/30/2019 Watermarking Tech Doc
4/31
WATERMARKING 08R91A12B3
the fact that some encoding
schemes may make use of
the original images in the
watermarking process to
provide extra robustness
against intentional and
unintentional corruption of
pixels. The extracted
signature will then be
compared with the owner
signature sequence by a
comparator function and a
binary output decision
generated. It is 1 if there is
match and 0 otherwise,
which can be represented as
follows.
Fig. Decoder
3. WATERMARKING TECHNIQUES
Page 4 of31
decoder
Origin
al
compar
ator
Text
image(
Extract
ed
signatu
Ori
Sig
re(
Signat
ure(S)
Original
Signatu
re(S)
-
7/30/2019 Watermarking Tech Doc
5/31
WATERMARKING 08R91A12B3
The techniques
proposed so far can be divided
into two main groups of
according to the embedding
domain of the container image.
Spatial Domain
Approach
Frequency Domain
Approach
3.1 Spatial Domain
Approach
Several different
methods enable watermarking
in the spatial domain. The
simplest (too simple for many
applications) is just to flip the
lowest-order bit of chosen
pixels. This works well only if
the image is not subject to any
modification. A more robust
watermark can be embedded by
superimposing a symbol over
an area of the picture. The
resulting mark may be visibleor not, depending upon the
intensity value. Picture
cropping, e.g., (a common
operation of image editors), can
be used to eliminate the
watermark.
Spatial watermarking can also
be applied using color
separation. In this way, the
watermark appears in only one
of the color bands. This renders
the watermark visibly subtle
such that it is difficult to detect
under
regular viewing. However, the
mark appears immediately
when the colors are separated
for printing. This renders the
document
useless for the printer unless
the watermark can be removed
from the color band. This
approach is used commercially
for journalists to inspect digital
pictures from a photo-
stockhouse before buying
unmarked versions.
3.2 Frequency Domain
Approach
Watermarking can be
applied in the frequency
domain (and other transform
domains) by first applying a
Page 5 of31
-
7/30/2019 Watermarking Tech Doc
6/31
WATERMARKING 08R91A12B3
transform like the Fast Fourier
Transform (FFT). In a similar
manner to spatial domain
watermarking, the values of
chosen frequencies can be
altered from the original. Since
high frequencies will be lost by
compression or scaling, the
watermark signal is applied to
lower frequencies, or better yet,
applied adaptively to
frequencies that contain
important information of the
original picture. Since
watermarks applied to the
frequency domain will be
dispersed over the entirety of
the spatial image upon inverse
transformation, this method is
not as susceptible to defeat by
cropping as the spatial
technique. However, there is
more a tradeoff here between
invisibility and decodability,
since the watermark is in effect
applied indiscriminately across
the spatial image. Table 1.
shows a small comparison
between the two different
techniques.
Spatial Domain Frequency Domain
Computation Cost Low High
Robustness Fragile More Robust
Perceptual Quality High Control Low Control
Capacity High (depend on the size of theimage)
Low
Example ofApplications
Mainly Authentication Copy Rights
Comparison between Watermarking Techniques
Page 6 of31
-
7/30/2019 Watermarking Tech Doc
7/31
WATERMARKING 08R91A12B3
4. DIGITAL WATERMARKING
Watermarking is
the process that embeds data
called a watermark, tag or
label into a multimedia
object such that watermark
can be detected or extracted
to make an assertion about
the object may an image or
video or audio may also be
text only. A watermark can
be perceived as an attribute
of the carrier (cover). It may
contain information such as
copyright, license, tricking
and authorship etc. Whereas
in case of steganography,
the embedded message may
have nothing to do with the
cover. Digital watermarking
differs from digital
fingerprinting.
4.1. Introduction Of
Digital water
marking
Digital Watermarking, an
extension of Steganography,is a promising solution of
content copyright protection
in the global network. It
imposes extra robustness on
embeddedinformation.Digita
Page 7 of31
-
7/30/2019 Watermarking Tech Doc
8/31
WATERMARKING 08R91A12B3
l watermarks dont leave a
noticeable mark on the
content and not affect its
appearance. These are
imperceptible and can be
detected only by proper
authorities. Digital
watermarks are difficult to
remove without noticeably
degrading the content and
are a covert means in
situations where
cryptography fails to
provide robustness.
4.2 Types Of Digital
Watermarks
Watermarks and
watermarking techniques
can be divided into various
categories in various ways.
The watermarks can be
applied in spatial domain.
An alternative to spatial
domain watermarking is
frequency domain
watermarking. It has been
pointed out that the
frequency domain methods
are more robust than the
spatial domain techniques.
Watermarking techniques
can be divided into four
categories according to the
type of document to be
watermarked as follows.
Image
Watermarking
Video
Watermarking
Audio
Watermarking
Text Watermarking
According to the human
perception, the digital
watermarks can be divide
into three different types as
follows.
Visible watermark
Invisible-Robustwatermark
Invisible-Fragile
watermark
Dual watermark
Page 8 of31
-
7/30/2019 Watermarking Tech Doc
9/31
WATERMARKING 08R91A12B3
Fig. TYPES OF DIGITALWATERMARK
Visible watermark is a
secondary translucent
overlaid into the primary
image. The watermark
appears visible to a casual
viewer on a careful
Page 9 of31
-
7/30/2019 Watermarking Tech Doc
10/31
WATERMARKING 08R91A12B3
inspection. The invisible-
robust watermark is embed
in such a way that an
alternation made to the pixel
value is perceptually not
noticed and it can be
recovered only with
appropriate decoding
mechanism. The invisible-
fragile watermark is
embedded in such a way that
any manipulation or
modification of the image
would alter or destroy the
watermark. Dual watermark
is a combination of a visible
and an invisible
watermark .In this type of
watermark an invisible
watermark is used as a back
up for the visible watermark
as clear from the following
diagram.
An invisible robust
private watermarking
scheme requires the original
or reference image for
watermark detection;
whereas the public
watermarks do not. The
class of invisible robust
watermarking schemes that
can be attacked by creating a
counterfeit original is called
invertible watermarking
scheme.
From application
point of view digital
watermark could be as
below.
Source based or
Destination based.Source-based
watermark are desirable for
ownership identification or
authentication where a
unique watermark
identifying the owner is
introduced to all the copies
of a particular image being
distributed. A source-based
watermark could be used for
authentication and to
Page 10 of31
-
7/30/2019 Watermarking Tech Doc
11/31
WATERMARKING 08R91A12B3
determine whether a
received image or other
electronic data has been
tampered with. The
watermark could also be
destination based where
each distributed copy gets a
unique watermark
identifying the particular
buyer. The destination
-based watermark could be
used to trace the buyer in the
case of illegal reselling.
5. APPLICATION OF DIGITAL
WATERMARKS
5.1 Visible Watermark
Visible watermarks can be
used in following cases:
Visible watermarking for
enhanced copyright
protection. In such
situations, where images are
made available through
Internet and the content
owner is concerned that the
images will be used
commercially (e.g.
imprinting coffee mugs)
without payment of
royalties. Here the content
owner desires an ownership
mark, that is visually
apparent, but which does not
prevent image being used
for other purposes.
visible watermarking used to
indicate ownership originals.
In this case images are made
available through the
Internet and the content
owner desires to indicate the
ownership of the underlying
Page 11 of31
-
7/30/2019 Watermarking Tech Doc
12/31
WATERMARKING 08R91A12B3
materials
(librarymanuscript), so an
observer might be
encouraged to patronize the
institutions that own the
material
5.2 Invisible Robust
Watermark
Invisible robust
watermarks find application
in following cases.
Invisible watermarking
to detect misappropriated
images. In this scenario, the
seller of digital images is
concerned, that his, fee-
generating images may be
purchased by an individualwho will make them
available for free, this would
deprive the owner of
licensing revenue.
Invisible
watermarking as evidence of
ownership. In this scenario,
the seller that of the digital
images suspects one of his
images has been edited and
published without payment
of royalties. Here, the
detection of the sellers
watermark in the image is
intended to serve as
evidence that the published
image is property of seller.
5.3 Invisible Fragile
Watermarks
Following are the
applications of invisible
fragile watermarks.
Invisible watermarking
for a trustworthy camera. In
this scenario, images are
captured with a digital
camera for later inclusion in
news articles. Here, it is the
desire of a news agency to
verify that an image is true
to the original capture and
has not been edited to falsify
a scene. In this case, an
invisible watermark is
embedded at capture time;
its presence at the time of
publication is intended to
indicate that the image has
not been attended since it
was captured.
Invisible
watermarking to detect
Page 12 of31
-
7/30/2019 Watermarking Tech Doc
13/31
WATERMARKING 08R91A12B3
alternation of images stored
in a digital library. In this
case, images (e.g. human
fingerprints) have been
scanned and stored in a
digital library; the content
owner desires the ability
to detect any alternation of
the images, without the need
to compare theimages to the
scanned materials.
5.4 Attacks On
Watermarks
A watermarked
image is likely to be
subjected to certain
manipulations, some
intentional such as
compression and
transmission noise and some
intentional such as cropping,
filtering, etc. They are
summarized in Lossy
Compression: Many
compression schemes like
JPEG and MPEG can
potentially degrade the
datas quality through
irretrievable loss of
data.Geometric Distortions:
Geometric distortions are
specific to images videos
and include such operations
as rotation, translation,
scaling and cropping.
Common Signal ProcessingOperations: They include
the
Following D/A conversion
A/D conversion
Resampling
Requantization
Dithering distortion
Recompression
Linear filtering such
as high pass and low
pass filtering.
Addition of a
constant offset to the
pixel values
Addition of Gaussian
and Non Gaussian
noise
Local exchange of
pixels
other intentional
attacks:
Printing and
Rescanning
Page 13 of31
-
7/30/2019 Watermarking Tech Doc
14/31
WATERMARKING 08R91A12B3
Watermarking of
watermarked image
(rewatermarking)
Collusion: A number
of authorized
recipients of the
image should not be
able to come
together (collude)
and like the
differently
watermarked copies
to generate an un-
watermarked copy of
the image (by
averaging all the
watermarked
images).
Page 14 of31
-
7/30/2019 Watermarking Tech Doc
15/31
WATERMARKING 08R91A12B3
Fig.Attacks on watermarking
Page 15 of31
-
7/30/2019 Watermarking Tech Doc
16/31
WATERMARKING 08R91A12B3
6. CHARACTERISTICS
OFWATERMARKS
6.1 Characteristics ofVisible
Watermarks
A visible watermark
should be obvious in both
colors and monochrome
images. The watermark
should spread in a large orimportant area of the image
in order to prevent its
deletion by clipping.
The watermark should be
visible yet must not
significantly obscure the
image details beneath it.
The watermark must
be difficult to remove.
Rather, removing a
watermark should be more
costly and labor intensive
than purchasing the image
from the owner. The
watermark should be applied
automatically with little
human intervention and
labor.
6.2 Characteristics of
Invisible Robust
Watermark
The invisible watermark
should neither be Noticeable
to the viewer nor should
degrade the quality of the
content. An invisible robust
watermark must be robust to
common signal distortions
and must be resistant to
various intentional
tamperings solely intended
to remove the watermark.
Retrieval of watermarkshould unambiguously
identify the owner. It is
desirable to design a
watermark whose decoder is
scalable with each
generation of computer.
While watermarking high
quality images and art works
the amount of pixel
modification should be
minimum. Insertion of
watermark should require
Page 16 of31
-
7/30/2019 Watermarking Tech Doc
17/31
WATERMARKING 08R91A12B3
little human intervention or
labor.
6.3 Characteristics of
Invisible Fragiles
Watermarks
The invisible
watermark should neither be
noticeable to the viewer nor
should degrade the quality
of the content.
An invisible fragile
watermark should be readily
modified when the image
pixel values have been
altered. The watermark
should be secure. This
means that it is impossible
to recover the changes, or
regenerate the watermark
after image alternations,
even when the watermarking
procedure, and/or the
watermark itself is known.
For high quality images, the
amount of individual pixelmodification
should be as small as
possible.
6.4 Characteristics
Of Video
Watermarks
The presence of
watermark should not cause
any visible or audible effects
on the playback of the
video. The watermark
should not affect the
compressibility of the digital
content. The watermark
should be detected with high
degree of reliability. The
probability of false detection
should be extremely small.
The watermark should be
robust to various intentional
and unintentional attacks.
The detection algorithm
should be implemented in
circuitry with small
extra cost.
6.5. Characteristics
Image
Watermarking
There are plenty of image
watermarking techniques
algorithms available in
current literature. In this
Page 17 of31
-
7/30/2019 Watermarking Tech Doc
18/31
WATERMARKING 08R91A12B3
section we will discuss a
few of them.
M.Kankanhalli, have
developed a visible
watermarking technique.
They divide the host image
into different blocks, find
the DCT of each block.
Then they classify the
blocks into six different
classes in the increasing
order of noise sensitivity,
such as edge block, uniform
with moderate intensity,
uniform with high or low
intensity, moderate busy,
busy and very busy. Each
block is then assigned.
The watermark is robust to
common signal and
geometric distortion such as
A/D and D/A conversion,
resampling, quantization,
compression, rotation,
translation, cropping and
scaling. The watermark is
universal in the sense that it
can be applied to all three
media. Retrieval of the
watermark unambiguously
identifies the owner and the
watermark can be
constructed to make
counterfeiting almost
impossible. The
watermarking technique has
the disadvantage that it
needs the original image for
its extraction. It is also not
clear whether the watermark
is robust to photocopying.
Page 18 of31
-
7/30/2019 Watermarking Tech Doc
19/31
WATERMARKING 08R91A12B3
Fig.visibleimage watermarking
Page 19 of31
-
7/30/2019 Watermarking Tech Doc
20/31
WATERMARKING 08R91A12B3
7. THE WATERMARK TECHNOLOGY
Digital watermarking,
an extension of
steganography, is a
promising solution for
content copyright protection
in the global network. It
imposes extra robustness on
embedded information. To
put into words, digital
watermarking is the art and
science of embedding
copyright information in the
original files. The
information embedded is
called watermarks.
Digital watermarks dont
leave a noticeable mark on
the content and dont affect
its appearance. These are
imperceptible and can be
detected only by proper
authorities. Digital
watermarks are difficult to
remove without noticeably
degrading the content and
are a covert means in
situations where
cryptography fails to
provide robustness.
The content is
watermarked by converting
copyright information into
random digital noise using a
special algorithm that is
perceptible only to the
content creator. Digital
watermarks can be read only
by using the appropriate
reading software. These are
resistant to filtering and stay
with the content as long as
Originally purposely
degraded.
Page 20 of31
-
7/30/2019 Watermarking Tech Doc
21/31
WATERMARKING 08R91A12B3
Digital watermarks dont
leave a noticeable mark on
the content and dont affect
its appearance. These are
imperceptible and can be
detected only by proper
authorities. Digital
watermarks are difficult to
remove without noticeably
degrading the content and
are a covert means in
situations where
cryptography fails to
provide robustness.
The content is
watermarked by converting
copyright information into
random digital noise using a
special algorithm that is
perceptible only to the
content creator. Digital
watermarks can be read only
by using the appropriate
reading software. These are
resistant to filtering and stay
with the content as long as
Originally purposely
degraded.
While the later
technique facilitates access
of the encrypted data only
for valid key holders but
fails to track any
reproduction or
retransmission of data after
decryption. On the other
hand, in digital
watermarking, an
identification code (symbol)
is embedded permanently
inside a cover image which
remains within that cover
invisibly even after
decryption process. This
requirement of
watermarking technique, in
general, needs to possess the
following characteristics:
imperceptibility for
hidden information,
redundancy in
distribution of the
hidden information
inside the cover
image to satisfy
robustness in water
mark extraction
process even from
truncated(cropped)
image .
Page 21 of31
-
7/30/2019 Watermarking Tech Doc
22/31
WATERMARKING 08R91A12B3
one or more keys to
achieve
cryptographic
security of hidden
content.
Besides these
general properties, an ideal
watermarking system should
also be resilient to insertion
of additional watermarks to
retain the rightful
ownership. The perceptually
invisible data hiding needs
insertion of watermark in
higher spatial frequency of
the cover image since
human eye is less sensitive
to this frequency
component. But in most ofthe natural images majority
of visual information are
concentrated on the lower
end of the frequency band.
So the information hidden in
the higher frequency
components might be lost
after quantization operation
of lossy compression. This
motivates researchers in
recent times to realize the
importance of perceptual
modeling of human visual
system and the need to
embed a signal in
perceptually significant
regions of an image,
especially if the watermark
is to survive lossy
compression.In spatial
domain block based
approach, this perceptually
significant region is
synonymous to low variance
blocks of the cover image.
It is found in the
literature that the robust
watermarking systems
proposed so far can only
withstand some of the
possible external attacks but
not all. While spatial domain
watermarking, in general, is
easy to implement on
computational point of view
but too fragile to withstand
large varieties of external
attacks. On the other hand,
frequency or Transformed
domain approach offers
robust watermarking but
most cases
Page 22 of31
-
7/30/2019 Watermarking Tech Doc
23/31
WATERMARKING 08R91A12B3
implementationneed higher
computational complexity.
Moreover the transform
domain technique is global
in nature (global within the
block in block based
approach) and cannot
restrict visual degradation of
the cover image. But in the
spatial domain scheme,
degradation in image quality
due to watermarking could
be controlled locally leaving
the region of interest
unaffected. The present
paper describes a
computationally efficient
block based spatial domain
watermarking technique for
a two level watermark
symbol. The selection of the
required block is based on
variance of the block and
watermark insertion exploits
average brightness of the
blocks.
7.1 Insertion Of
Watermark
In the present work, a
block based spatial domain
algorithm is used to hide
copyright mark (invisible
logo) in the homogenous
regions of the cover image
exploiting average
brightness.
The cover image is
partitioned into non-
overlapping square blocks of
size (8X8)pixels. A block is
denoted by the location of
its starting pixel (x, y). If the
cover image is of size
(NXN), total (N/8XN/8)
number of such block is
obtained for watermark
insertion. Next, all such
blocks are arranged in
ascending order based on
their variance values. The
variance () of a block of
size (M X N) is denoted by
m-1 n-1
=1/mn[(,y)-]
(1)
x=0 y=0
where
m-1 n-1
=1/mn[(,y)]
(2)
Page 23 of31
-
7/30/2019 Watermarking Tech Doc
24/31
WATERMARKING 08R91A12B3
x=0 y=0
is the statistical average
value of the block.
The blocks having
small variance values may
be called as homogenous
blocks and, of course, the
smallness in variance value
depends on the
characteristics of image to
be watermarked. If the
Watermark symbol is a (N X
N) binary image, only N
homogeneous blocks are
sufficient to insert one
watermark pixel in each
such homogenous block. A
two level map of size
(N/8XN/8) _is constructedbased on the location of
homogenous blocks in the
cover image assigning each
homogeneous block of the
cover image by value 1
while all other blocks by
value 0. This two level
map later modified as multi
level image, also called as
secret image (s), is used for
extraction of watermark
pixels. The formation of
multilevel image from two
level maps is described.
In the proposed
scheme, one watermark
pixel is inserted in each
homogenous block. Before
insertion, the binary
watermark is spatially
dispersed using a chaotic
system called tours auto
Orphism. Basically, the
tours auto Orphism is a kind
of image independent
permutation done by using
pseudo random number of
suitable length. This pseudo
random number is generated
using Linear Feedback
Shift Register. The
pseudorandom number in
the present case is of length
256 and the spatially
dispersed watermark data
thus obtained is denoted by
L1.a J
From the two level
image formed in step 2,
desired blocks Of the
cover image are selected and
statistical average value of
these blocks are used for
Page 24 of31
-
7/30/2019 Watermarking Tech Doc
25/31
WATERMARKING 08R91A12B3
watermark insertion. Let for
one such block this average
value and its integer part are
denoted by A and A=A
respectively. Now one pixel
from L1 replaces a
particular bit (preferably
Least Significant Bit planes)
in bit plane representation of
A for each homogenous
block. The selection of
particular bit in bit plane
representation may be
determined based on the
characteristics (busyness
/smoothness of regions) of
the block. The bit plane
selection is also governed by
global characteristics of thecover image besides the
local property of candidate
block, such as mean gray
value. For a block of low
variance (homogenous zone)
higher bit plane may be
chosen provided that the
mean gray level value of the
block is either less than T1
or greater than T2, where T1
and T2 are certain pre-
specified threshold values
with T1 should preferably
be close to 0 (minimum)
and T2 close to 255
(maximum). However, the
closeness of T1 and T2 to
0 and 255 respectively, is
relative, and is strongly
image dependent. Users may
choose the value of T1 and
T2 and also the proper bit
plane by checking the
degradation in the image
quality affected by the
insertion of the logo.
A multilevel secret
image is constructed by
inserting the value of bit
position selected for
different homogeneous
block located in the 1
position of the secret image.
This positional information
as gray value of the secret
image helps to extract
watermark pixel from the
proper bit position of the
mean gray value of the
block. Watermark insertion
keeps all pixels values of
each homogenous block
unchanged, increased or
Page 25 of31
-
7/30/2019 Watermarking Tech Doc
26/31
WATERMARKING 08R91A12B3
decreased by fixed value
(based on the appropriate bit
plane selection).
The choice of lower
order MSB plane (say 3rd or
higher from the bottom
plane) may result in more
robust watermarking at the
cost of greater visual
distortion of the cover
image. Further bit
manipulation is done to
minimize this aberration and
to counter the effect of
smoothing that may cause
possible loss of embedded
information. The process
effectively changes those
mean gray values of the
blocks that have been used
in watermark insertion.
Implementation is done by
estimating the tendency of
possible change in mean
gray value after the attack
like mean filtering. Larger
size of spatial mask such as
7x 7 is used to adjust
suitably the gray values of
all pixels of the block. The
use of spatial mask reduces
visual distortion on and
average fifty percent times.
Page 26 of31
-
7/30/2019 Watermarking Tech Doc
27/31
WATERMARKING 08R91A12B3
Fig. insertion of watermark
7.2 Watermark
Extraction
The extraction of
watermark requires the
secret image(s) and the key
(k) used for spatial
dispersion of the watermark
image. The watermarked
image under inspection with
or without external attacks is
partitioned into non-
overlapping block of size
8x8 pixels. Now from the
secret image, position of the
homogenous blocks are
selected and gray value of
the secret image indicates
the corresponding bitpositioning mean gray
values where watermark
pixel was
Page 27 of31
-
7/30/2019 Watermarking Tech Doc
28/31
WATERMARKING 08R91A12B3
inserted. Hence from the
secret image the mean gray
value of the blocks of the
watermarked
image/distorted
watermarked image is
calculated and watermark
pixel is extracted. The
spatially dispersed
watermark image thus
obtained is once again
permuted using the same
key (k) (pseudo random
number) and watermark in
original form is thus
obtained. This completes
watermark
extractionprocess.
Fig. watermark extraction
Page 28 of31
-
7/30/2019 Watermarking Tech Doc
29/31
WATERMARKING 08R91A12B3
8. CONCLUSION
Watermarking methods are
fast /robust and protect
against most forms of
manipulation. The
watermarking research is
progressing very fast and
numerous researchers from
various fields are focusing
to develop some workable
scheme. Different
companies also working to
get commercial products.
We hope some commercial
and effective schemes will
be available in future.
Digital watermarkingtechnique describes robust
and blind digital image
watermarking in spatial
domain, which is
computationally efficient.
Embedded watermark is
meaningful and
recognizable rather than a
sequence of real numbers
that are normally distributed
or a Pseudo-Noise sequence.
Proposed technique has been
tested over large number of
benchmark images as
suggested by watermarking
community and the results
of robustness to different
signal processing operations
are found to be satisfactory.
Page 29 of31
-
7/30/2019 Watermarking Tech Doc
30/31
WATERMARKING 08R91A12B3
9. REFERENCES
11. Hal Berghel,
Watermarking
Cyberspace, Comm. of
the ACM, Nov.1997,
Vol.40, No.11, pp.19-
24.
22. G. W. Braudaway, et.
al., Protecting Publicly
Available Images with a
Visible Image
Watermark, Proc.
SPIE Conf. Optical
Security and
Counterfeit Deterrence
Technique, Vol. SPIE-
2659, pp.126-132, Feb.
1996.
33. C.-T. Li and F.M. Yang.
One-dimensional
Neighborhood Forming
Strategy for Fragile
Watermarking. In
Journal of Electronic
Imaging, vol. 12, no. 2,
pp. 284-291, 2003.
4. R. Anderson. Information
Hiding. Proceedings
of the First Workshop
on Information Hiding,
LNCS-1174, Springer
Verlag, New York,
1996.
Page 30 of31
-
7/30/2019 Watermarking Tech Doc
31/31
WATERMARKING 08R91A12B3