Thread Rating:
  • 5 Vote(s) - 3 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Digital Watermarking Full Seminar Report Download
Post: #51
Presented by:
Abhipsa Dash

What is watermark
A watermark is a recognizable image or pattern in paper/background that appears as various shades of lightness/darkness when viewed by transmitted light (or when viewed by reflected light, atop a dark background), caused by thickness or density variations in the paper/background.
What is digital watermarking?
The process of digitally inserting a watermark into a multimedia object in such a way that the watermark can be detected or extracted later easily to make an impression about the object and it’s owner is called digital watermarking.
Encoding of watermarking to an object
Let’s denote an image by I, a signature by S and the watermarked image by I’ . E is an encoder function, taking the image I and signature S, and generating a new image called watermarked image (I’).
Mathematically, E(I,S)=I’
Following figure illustrates the encoding process.
Decoding of watermark
A function D takes an image ‘J’ whose ownership is to be determined and recovers a signature S’ from the image. In this process an additional image ‘I’ can also be included which is often the original and un-watermarked version of ‘J’ .
Mathematically, D(J , I )= S’
The extracted signature S’ will then be compared with the owner signature sequence by a comparator function C and a binary output decision generated. It is 1 if there is match and 0 otherwise .
Types of watermarking
1. Image watermarking
a ) Visible watermarking
b ) Invisible watermarking
2.Video watermarking
3. Audio watermarking
4. Text watermarking
Image watermarking
According to human perception image watermarking is of two types
1. Visible watermarking
2. 2. Invisible watermarking
A visible watermark is a semi-transparent text or image overlaid on the original image. This watermark appears visible to a casual viewer on a careful inspection. Visible watermarks are more robust against image transformation.
2. Invisible Watermarking:
An “invisible watermark” is an embedded image which cannot be perceived with human eye. Only electronic devices can extract the hidden information to identify the copyright owner. It is used to mark a specialized digital content (text, images or even audio) to prove its authenticity.
The process of watermarking the sequence of video frames is called video
watermarking. To watermark a video file we have to watermark each
frame of the video file.
The process of embedding information into audio can be termed as audio
watermarking. In case of audio watermarking the time and frequency
property of human ear is used to hide the watermark and make it
The process of embedding/hiding data in text can be termed
as text watermarking. At the time of printout some of the information is
Types of possible attacks
• Active Attacks – Hacker tries to remove the watermark or make it undetectable.
• Passive Attacks – Hacker tries to determine whether there is a watermark and identify it. However, no damage or removal is done.
• Forgery Attacks – Hacker tries to embed a valid watermark of their own rather than remove one.
• Decorative Attacks – Hacker applies some distorted transformation uniformly over the object in order to degrade the watermark so that it becomes undetectable/unreadable.
Post: #52
plz upload the ppt of Digital Watermarking...and also report...
Post: #53
Parag Agarwal

Digital Watermarking
Information Hiding
Information Hiding…..started with
Steganography (art of hidden writing):
The art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. The existence of information is secret.
Steganography (dates back to 440 BC)
Histaeus used his slaves (information tattooed on a slave’s shaved head )
Microchip - Application
Germans used Microchips in World War II
What is a watermark ?
What is a watermark ? A distinguishing mark impressed on paper during manufacture; visible when paper is held up to the light (e.g. $ Bill)
What is a watermark ?
Digital Watermarking: Application of Information hiding (Hiding Watermarks in digital Media, such as images)
Digital Watermarking can be ?
- Perceptible (e.g. author information in .doc)
- Imperceptible (e.g. author information in images)
Visibility is application dependent
Invisible watermarks are preferred ?
Tamper proofing: To find out if data was tampered.
Quality Assessment: Degradation of Visual Quality
Watermarking Vs Cryptography
Watermark D  Hide information in D
Encrypt D  Change form of D
Watermarking Process
Data (D), Watermark (W), Stego Key (K), Watermarked Data (Dw)
Embed (D, W, K) = Dw
Extract (Dw) = W’ and compare with W
(e.g. find the linear correlation and compare it to a threshold)
Q. How do we make this system secure ?
A. K is secret (Use cryptography to make information hidden more secure)
Watermarking Process Example – Embedding (Dw = D + W)
Matrix representation (12 blocks – 3 x 4 matrix)
(Algorithm Used: Random number generator RNG), Seed for RNG = K, D = Matrix representation, W = Author’s name
Watermarking Process Example – Extraction
The Watermark can be identified by generating the random numbers using the seed K
Data Domain Categorization
Spatial Watermarking
Direct usage of data to embed and extract Watermark
e.g. voltage values for audio data
Transform Based Watermarking
Conversion of data to another format to embed and extract.
e.g. Conversion to polar co-ordinate systems of 3D models, makes it robust against scaling
Extraction Categorization
Informed (Private)
Extract using {D, K, W}
Semi - Blind (Semi-Private)
Extract using {K, W}
Blind (Public)
Extract using {K}
- Blind (requires less information storage)
- Informed techniques are more robust to tampering
Robustness Categorization
Fragile (for tamper proofing e.g. losing watermark implies tampering)
Semi-Fragile (robust against user level operations, e.g. image compression)
Robust (against adversary based attack, e.g. noise addition to images)
Categorization of Watermark
Eg1. Robust Private Spatial Watermarks
Eg2. Blind Fragile DCT based Watermarks
Eg3. Blind Semi-fragile Spatial Watermarks
Watermarking Example
Application: Copyright Protection
Design Requirements:
- Imperceptibility
- Capacity
- Robustness
- Security

Adversaries can attack the data set and remove the watermark.
Attacks are generally data dependent
e.g. Compression that adds noise can be used as an attack to remove the watermark. Different data types can have different compression schemes.
Value Change Attacks
- Noise addition e.g. lossy compression
- Uniform Affine Transformation e.g. 3D
model being rotated in 3D space OR
image being scaled
If encoding of watermarks are data value dependent 
Watermark is lost  Extraction process fails
Sample loss Attacks

- Cropping e.g. Cropping in images
- Smoothing e.g. smoothing of audio
signals e.g. Change in Sample rates
in audio data change in sampling rat
results in loss of samples
If watermarks are encoded in parts of data set which are
lost  Watermark is lost  Extraction process fails
Reorder Attack

- Reversal of sequence of data values e.g. reverse filter in audio signal reverses the order of data values in time
Multiple Watermarks can be supported.
More capacity implies more robustness since watermarks can be replicated.
Spatial Methods are have higher capacity than transform techniques ?
In case the key used during watermark is lost anyone can read the watermark and remove it.
In case the watermark is public, it can be encoded and copyright information is lost.
Watermarking Algorithm Design Requirements
As much information (watermarks) as possible
 Capacity
Only be accessible by authorized parties
 Security
Resistance against hostile/user dependent changes
 Robustness
 Imperceptibility
Tamper proofing
Robustness against user related operations – compression, format conversion
Accuracy of Detection – Only changes in meaning should be detected
Post: #54
please send me the full seminars report and presentation
Post: #55
plz check all report information did u get..
Post: #56
:Big Grin
Please send me the report on Digital Watermarking
Post: #57
The purpose of the project is
à To add the watermarks to the image inside to hide the data from the unauthorized persons.
à To Provide copy right Protection for the Documents.
Introduction :-
Watermarking can be defined as an act of embedding a message i.e. a text or an image into a existing work .
Watermarking can also be defined as an invisible signature.
More recently, different watermarking techniques and strategies have been proposed in order to solve a number of problems, ranging from the detection of content manipulations, to information hiding (steganography), to document usage tracing.
Why Watermarking ?
Security of multi media communications is regarded by both academy and industrial research as one of the most important and urgent problems of last decades.
Watermarking is the art of imperceptibly embedding a message into a work. More recently, different watermarking techniques and strategies have been proposed in order to solve a number of problems, ranging from the detection of content manipulations, to information hiding (steganography), to document usage tracing.
The possibility of adding several watermarks to the same image would enable many interesting applications such as multimedia document tracing, data usage monitoring, multiple property management.
Existing System :-
In the existing system we used single watermarking concept. In this concept overwriting applied only one time. So, it has some low security. In the Traditional (and Conventional) method of Watermarking, the Watermark is made during the paper manufacturing process. Once the water marking has been applied to the paper then we cannot change it or overwrite it, which makes insecure in the water marking technique.
Existing System Disadvantages :-
 Minimum Order Quantity is HUGE (Typically Larger Than 30 Tons of Paper)
 Paper Mill has to recover the cost of the Dandy Roll, which is very expensive to make
 INCONSISTENT Positioning of the Watermark across all the Sheets
Proposed System :-
 Here we are providing multiple watermarking concepts, such as the sample image overwrite more than one time on the original image. Its robustness against standard image degradation operations has been extensively tested and its security under projection attack has also been proven even though the envisaged application refers to a collaborative environment, in which malicious attacks are not a critical aspect.
Proposed System Advantages :-
• In this scheme we use multiple watermarking.
• We can implement text based, image based, passcode based.
• We can watermark even after manufacturing of paper.
• The encryption is done by symmetric key cryptographic algorithm that is fast and inexpensive.
Modules :-
This project contains four modules. They are:
Resolution Hiding
Security providing
Briefly about Modules :-
Preprocessing :-
Preprocessing is nothing but the color enhancement where the quality of the picture is increased. The quality can be varied by using the parameters like contrast, Brightness/Gamma, Saturation, etc
Post: #58
i want matlab code for digital watermarking using dct and wavelet
Post: #59
hi... iam jaideep.. doin in govt. engg colg calicut.. i would like to do digital water marking as my seminars on dis 7th semester.... can u pls give notes about dis topic...
Post: #60
i want full report on digital water marking
Post: #61
this is very beautiful site for seminars finder
Post: #62
HI... very good work, but, please send or post the rar password for the file...
thanks to u...
Post: #63
Post: #64
please send the full report and ppt for digital watermarking as soon as possible....
Post: #65
To get more information about the topic " Digital Watermarking" please refer the link below
Post: #66
Watermark = Water (Invisible) + Mark
Media Copyright Protection
- Develop of e-commerce
- Ownership
Two Different Viewpoints
- Watermark-as-signal
- Watermark-as-information
Why Watermarking?
Secure Distribution of Digital Contents
- Unlimited copies of original contents
- Instant distribution over internet
- Quick download of compressed streams
Content Protection
- Authentication
- Encryption/Decryption
- Watermarking
Post: #67

i am very happy to join.i want some model project paper.please send to my mail
Post: #68
hi friend you can refer these pages to get the details on Digital Watermarking
Post: #69
hi digital watermarking
Post: #70
hi friend you can refer these pages to get the details on Digital Watermarking
Post: #71
hiiiiiiiiiiiiii send me digital watermarking ppt.....
Post: #72

im glad to take this report. Smile
Post: #73
Hi i want reprt on digital voltmeter
Post: #74
to get information about the topic"Digital Watermarking Full Seminar Report Download" refer the link bellow
Post: #75
i need adv of this.and i need the advantage of digital watermarking that is used in the robust video data hiding

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: att 4g, srs on digital watermarking, digital watermarking on an, robustness, seminar topics on digital watermarking, watermarking algorithm, seminar on digital hubub,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  imouse full report computer science technology 3 3,634 17-06-2016 12:16 PM
Last Post: ashwiniashok
  computer networks full report seminar topics 7 4,902 25-05-2016 02:07 PM
Last Post: dhanyavp
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 4,997 10-05-2016 12:21 PM
Last Post: dhanyavp
  Optical Computer Full Seminar Report Download computer science crazy 43 34,284 29-04-2016 09:16 AM
Last Post: dhanyavp
Lightbulb Virtual Laser Keyboards (Download PPT,Abstract,Report) computer science crazy 493 104,744 28-03-2016 04:10 AM
Last Post: zotufalist
  ethical hacking full report computer science technology 41 46,783 18-03-2016 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 2,104 27-02-2016 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 19,486 11-02-2016 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 14,046 16-09-2015 02:51 PM
Last Post: seminar report asees
  HOLOGRAPHIC VERSATILE DISC A SEMINAR REPORT Computer Science Clay 20 28,455 16-09-2015 02:18 PM
Last Post: seminar report asees