Tuesday, 4 September 2012

Digital image Watermarking


Why watermark images?
Image compression makes the distribution of digital images and video materials over the Internet and on media practical. Such digital materials can b e copied and redistributed uncontrollably. Digital image watermarking – the process of inserting data into in image –can be used to protect the rights of their owners in a variety of ways:
1) Copyright identification – provide a proof of ownership;
2) User identification (fingerprinting) – encode identity of legal users to encode sources of illegal copies;
3) Authenticity determination – if the watermark will be destroyed by modification in an image, its presence quarantines authenticity;
4) Automated monitoring – monitor when and where images are used (for royalty collection or the location of illegal uses);
5) Copy protection – they can specify rules of image usage and copying Visible watermarks
A Visible watermark is an opaque or semi-transparent sub-image or image that is placed on top of another image (that is watermarked) so that is obvious to the viewer.
Invisible watermarks cannot be seen with the naked eye but they can be watermarked
image and the recovered with an extracted
appropriate decoding algorithm. The invisibility is assured by inserting them as visually redundant information  watermarked image after high quality JPEG compression and the extracted watermark…
                                               
The watermark can be recovered by zeroing 6 most significant bits of the image and scaling the remaining values to the full intensity range.
 An important property of invisible watermarks is their resistance to attempts (both intentional and accidental) to remove them… This type of watermarks is referred to as fragile invisible watermarks.
If the watermarked image is compressed and then decompressed using loss JPEG, the watermark is destroyed. As shown in the last
Figure although the visual information was preserved the watermark was unusable. This can be used for image authentication.
Watermarking techniques
Robust invisible watermarks must survive image modification (attacks) including image compression, linear or non-linear filtering, cropping, resampling, rotation, printing/rescanning, adding noise, etc.
                                                      

Watermarking techniques
Watermark insertion and extraction can be performed in spatial domain as shown
Previously, or in the transform domain.
Two watermarked images computed using DCT and Spring 2009 ELEN 4304/5365 DIP 10 p g the intensity-scaled differences between the original and watermarked images. Watermarking techniques Spreading watermarks across an image’s perceptually significant frequency components, a can be made small to reduce watermark visibility. At the same time, watermark security is high since:
1. Watermarks are composed of pseudorandom numbers with no obvious structure,
2. Watermarks are embedded in multiple frequency components with spatial impact over the entire 2D image (their location is not obvious),
3. Attacks against them tend to degrade image as well since the image’s most important frequency components must be altered to affect the watermarks.
ARTICLE BY
K.NISRATH FIRDOUSE
FINAL YEAR IT