Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

tgy

tyhgy7uk
by

Sphoorti Poojary

on 27 October 2012

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of tgy

- Watermarking Technique is used to hide a small amount of digital data in a digital signal in such a way that it can’t be detected by a standard playback device or viewer. TYPES OF WATERMARKING Presented By:-
Praseedha Sudhakaran
Kinjal Rathod
Sphoorti Poojary
Drashti Patel
Swati Patil
Mrunalini Reddy Do you know what watermarks are ? Did you know!?? The term Watermarks was given since the marks resemble the effects of water on paper History of Watermarking More than 700 years ago, watermarks were used in Italy to indicate the paper brand and the mill that produced it.
By the 18th century watermarks began to be used as Anticounterfeiting measures on money and other documents. WaterMarking
Digital watermarks are designed to be completely
invisible, or in the case of audio clips, inaudible

The bits representing the watermark must be
scattered throughout the file in such a way that they cannot be identified and manipulated Visible and Invisible Watermarks PURPOSE OF WATERMARKING C opyright protection
Finger printing
Copy protection
Broadcasting monitoring
Data authentication Properties of Watermark >Invisibility
>Capacity (Number of bits can be hidden)
>Low error probability
>Robustness
>Image watermarking ( filtering, resizing, contrast enhancement, cropping, rotation... )
>Video watermarking ( frame averaging, frame dropping, frame swapping, statistical analysis, interpolation... ) >Video media is susceptible.
>Video content is sensitive .
>Video compression are computationally intensive.
>Video is BW hungry!
>For low bit-rate video ,watermarking poses additional challenges.
>Watermarking should be robust enough against frame drops!!! Challenges for Video Watermarking > Signal enhancement.
> Filtering.
> Lossy compression
> Geometric transforms(translation,rotation, etc.)
> Data reduction (cropping, clipping, etc.)
> Multiple watermarking Watermarking Attacks original JPEG q=100
NC=0.999 JPEG q=80
NC=0.993 JPEG q=10
NC=0.557 >Pinnacle studio >Video Charge studio >Matlab >Windows XP movie maker WATERMARKING Thank you Softwares used visible both invisible
Full transcript