Professional Documents
Culture Documents
A Seminar Presentation On Image Authentication Technique: By: Nitin Mathur Ec-B Roll No. - 76
A Seminar Presentation On Image Authentication Technique: By: Nitin Mathur Ec-B Roll No. - 76
A Seminar Presentation On Image Authentication Technique: By: Nitin Mathur Ec-B Roll No. - 76
Seminar presentation
On
IMAGE AUTHENTICATION TECHNIQUE
By:
Nitin Mathur
EC-B
Roll No. -76
1
Image Authentication
• By data authentication we mean here a procedure
capable of ensuring that data have not been tampered
with and of indicating their true origin.
2
Cryptography
3
Encryption & Decryption
4
Cryptographic Data Authentication
5
Drawbacks of Cryptographic
Authentication
• Knowledge of private key
• Delay in transmission
• High requirements of video camera
6
Watermarking
What is a “Digital Image Watermark”
1. pattern inserted into a digital image
2. may be unique to each copy, or be common to multiple copies
7
Types of Watermarking
WATERMARKING
FRAGILE ROBUST
WATERMARKING WATERMARKING
INVISIBLE VISIBLE
WATERMARKING WATERMARKING
8
Requirements of Watermarks
9
Techniques of watermarking
• Spatial watermarking
-> by superimposing a symbol over an area of the picture.
• Frequency watermarking
-> applying a transforms like the Fast Fourier Transform (FFT), Discrete Cosine
Transforms (DCT), Wavelet Transforms etc.
10
The FFT Watermarking
11
The Image Authentication
Framework
• Watermark Embedding
12
The Image Authentication
Framework
• Watermark Detection
13
ADVANTAGES
DISADVANTAGES
• Frame independent watermark can be easily found by
comparative
analysis of all image sequence
•The detector should know the frame number in order to perform
authenticity check.
14
THANK YOU
15