A Seminar Presentation On Image Authentication Technique: By: Nitin Mathur Ec-B Roll No. - 76

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

A

Seminar presentation
On
IMAGE AUTHENTICATION TECHNIQUE

By:
Nitin Mathur
EC-B
Roll No. -76

1
Image Authentication
• By data authentication we mean here a procedure
capable of ensuring that data have not been tampered
with and of indicating their true origin.

• There are two types of authentication schemes, which


are-
1. Cryptographic data authentication.-
2. Watermarking-based authentication.

2
Cryptography

• a straight forward way to provide video


authentication, namely through the joint use
of asymmetric key encryption and the digital
Hash function
• It has mainly two functions:
-> Encryption
-> Decryption

3
Encryption & Decryption

4
Cryptographic Data Authentication

5
Drawbacks of Cryptographic
Authentication
• Knowledge of private key
• Delay in transmission
• High requirements of video camera

6
Watermarking
What is a “Digital Image Watermark”
1. pattern inserted into a digital image
2. may be unique to each copy, or be common to multiple copies

A given Watermark may be


1.Unique to each copy (e.g., to identify the intended recipient),
or
2.Be common to multiple copies (e.g., to identify the document
source)

7
Types of Watermarking

WATERMARKING

FRAGILE ROBUST
WATERMARKING WATERMARKING

INVISIBLE VISIBLE
WATERMARKING WATERMARKING

8
Requirements of Watermarks

1. The watermark must be difficult or impossible to


remove

2. The watermark must survive image modifications that


are common to typical image-processing applications

3. An invisible watermark should be imperceptible so as


not to affect the experience of viewing the image.

9
Techniques of watermarking

• Spatial watermarking
-> by superimposing a symbol over an area of the picture.

-> be applied using color separation

• Frequency watermarking

-> applying a transforms like the Fast Fourier Transform (FFT), Discrete Cosine
Transforms (DCT), Wavelet Transforms etc.

-> Watermark signal is applied to lower frequencies.

10
The FFT Watermarking

11
The Image Authentication
Framework
• Watermark Embedding

12
The Image Authentication
Framework

• Watermark Detection

13
ADVANTAGES

• Robustness to high quality lossy image compression.


• Automatic discrimination between malicious and innocuous
manipulations.
• Controllable visual deterioration of the VS sequence by
varying the watermark embedding power.

DISADVANTAGES
• Frame independent watermark can be easily found by
comparative
analysis of all image sequence
•The detector should know the frame number in order to perform
authenticity check.
14
THANK YOU

15

You might also like