comparison of watermarking and cryptogrphy - PowerPoint PPT Presentation

About This Presentation
Title:

comparison of watermarking and cryptogrphy

Description:

watermarking, cryptography – PowerPoint PPT presentation

Number of Views:691
Updated: 22 January 2014
Slides: 33
Provided by: 190912066

less

Transcript and Presenter's Notes

Title: comparison of watermarking and cryptogrphy


1
SAVEETHA SCHOOL OF ENGINEERING
  • SAVEETHA UNIVERSITYCHENNAI602105
  • DEPARTMENT OF ELECTRONICS AND COMMUNICATION
    ENGINEERING

2
COMPARISON OF WATERMARKING WITH CRYPTOGRAPHY
  • DONE BY,
  • POOJA SHUKLA
  • PRIYANKA RANJAN
  • SONAM TIWARI



3
AIM
  • To compare watermarking with cryptography
  • To compare the relative advantages and
    disadvantages
  • To provide security needs as well as extra layer
    of authentication

4
ABSTRACT
  • Watermarking is a technique for labelling digital
    pictures by hiding secret information into the
    images.
  • Cryptography is a scheme of protecting
    information by transforming it into an unreadable
    format.

5
EXISTING METHODOLOGY
  • Cryptography is a secret sharing scheme which
    independently disclose no information about the
    original secret image
  • Cryptography can be applied to,
  • TEXT
  • CODE
  • IMAGES

6
PROPOSED SYSTEM
  • Watermarking uses electronic stamps which is used
    for labeling digital pictures by hiding secret
    information into the images.
  • Water Marking can be applied to,
  • IMAGES
  • TEXT
  • AUDIO
  • VIDEO

7
BLOCK DIAGRAM
  • IMAGE WATERMARKING

WATERMARKED IMAGE
ORIGINAL IMAGE
WATERMARK
INVERSE DWT
EMBEDDING PROCESS
DWT
8
IMAGE CRYPTOGRAPHY
KEY
INVERSE KEY
ENCRYPTION
DECRYPTION
IMAGE
SECRET IMAGE
9
TEXT WATERMARKING
TEXT
SECRET TEXT
EMBEDDING
ENCRYPTION
EXTR-ACTION
DECRYPTION
KEY
INVERSE KEY
10
  • TEXT CRYPTOGRAPHY

KEY
INVERSE KEY
CIPHER TEXT
PLAIN TEXT
PLAIN TEXT
ENCRYPTION
DECRYPTION
11
GENERAL COMPARISON
  • WATERMARKING
  • 1. Watermarking is about robustness against
    possible attacks
  • 2. Uses steganography techniques
  • 3. Gives more privacy
  • CRYPTOGRAPHY
  • 1. Cryptography is about protecting the meaning
    of the document
  • 2. Uses biometrics techniques
  • 3. No privacy

12
ADVANTAGES
WATERMARKING
  • Undetectable and Undeletable by hackers
  • Resistant to lossy data compression
  • EXAMPLE JPEG
  • Resistant to image manipulation and processing
    operations
  • EXAMPLE cut-copy-paste
  • Privacy
  • Security
  • Cost and Capacity
  • Recoverable and Reversible

13
CRYPTOGRAPHY
  • Message secure algorithm
  • Security parameter
  • Secure keying
  • Not transmitted to anyone
  • Enables use of DIGITAL CERTIFICATES
  • Fully automated
  • High speed

14
APPLICATIONS
WATERMARKING
  • Copyright protection
  • Prevention of unauthorized copying
  • Authentication
  • Media Bridging
  • Broadcast Monitoring
  • Fingerprinting
  • Secret Communication
  • Determination of ownership

15
CRYPTOGRAPHY
  • Secrecy in transmission and storage
  • Integrity in transmission and storage
  • Authentication of identity
  • Credentialing system
  • System using changing key
  • Hardware support

16
PROPERTIES
WATERMARKING
  • Perceptually Invisible
  • Robustness
  • Embedding Effectiveness
  • Data Payload
  • Blind and Informed Detection
  • High bit rate

17
CRYPTOGRAPHY
  • Image resistance
  • Message authentication codes
  • Accessibility
  • Cryptokey security
  • Protection
  • Exportable and Removable
  • Unique owner

18
REQUIREMENTS
  • Requirements vary with application. For example,
  • Perceptually transparent - must not perceptually
    degrade original content.
  • Robust survive accidental of malicious
    attempts at removal.
  • Oblivious or Non-oblivious recoverable with or
    without access to original.
  • Capacity number of watermark bits embedded.
  • Efficient encoding and decoding.

19
WATERMARKING TECHNIQUES
  1. Embedding Locations
  2. Robust Watermarking
  3. Fragile Watermarking
  4. Semi-Fragile Watermarking
  5. Configuration of Cover Work by Watermark
    Embedding
  6. Watermarking Domains

20
CRYPTOGRAPHY TECHNIQUES
  1. Hash Techniques
  2. Symmetric Key Cryptography
  3. Asymmetric Key Cryptography

21
BASIC FREQUENCY DOMAIN
  • DISCRETE FREQUENCY TRANSFORM
  • DISCRETE COSINE TRANSFORM
  • DISCRETE WAVELET TRANSFORM

22
PARAMETERS
  • PSNR
  • SNR
  • Transformation Method
  • Image Format
  • Quality Factor
  • Kemel size
  • Security Parameter
  • Embedding Parameter
  • Detection Parameter

23
WATERMARKING CONTENT
ORIGINAL IMAGE
SECRET IMAGE
24
WATERMARKED IMAGE
25
CRYPTOGRAPHED CONTENT
26
Share 1 Share 2
27
CONCLUSION
CRYPTOGRAPHY
  • Detecting and decoding the hidden data within a
    given medium.
  • Even if secret content is not revealed, modifying
    the cover medium changes the mediums statistical
    properties.
  • Distributed Dictionary Attack

WATERMARKING
  • It deals with possible attacks and protects the
    content.
  • Once you try to hack the secret the whole content
    gets destroy.

28
FUTURE WORKS
  • The most important use of CRYPTOGRAPHY techniques
    will probably lie in the field of digital
    watermarking.
  • It may become limited under laws - governments
    claimed that criminals use CRYPTOGRAPHY AND
    WATERMARKING to communicate.

29
LITERATURE SURVEY
  • Independent watermarking classification by
    Dittmann, J., Mukherjee, A., Steinebach, M.
    (2000, March 27 - 29).
  • Applied cryptography by Wiley and Sons, 1996.

30
REFERENCE
  • Hidden Digital Watermarks in Images by Chiou-Ting
    Hsu and Ja-Ling Wu, Senior Member, IEEE
  • A Feature-Based Robust Digital Image Watermarking
    Scheme by Chih-Wei Tang and Hsueh-Ming Hang,
    Fellow, IEEE
  • Comparison Of Visual Cryptography Schemes by M.
    Amarnath Reddy, IJEST

31
THANK U.!!!!!!
32
QUERIES..????
Write a Comment
User Comments (0)
About PowerShow.com