What are Blind, Semi-blind and Non-blind Watermarking Systems?
Digital watermarking systems can be grouped in three schemes - they are Blind, Semi-blind and Non-blind.
Blind watermarking scheme is also known as public watermarking scheme. This is the most challenging type of watermarking system as it requires neither the cover (original data), I nor the embedded watermark, W. These systems extract n bits of the watermark data from the watermarked data (i.e the watermarked image).
I' x K -> W
Note: I' is the watermarked data, K is the key
Semi-blind watermarking scheme is also known as semi-private watermarking scheme. This system does not require the cover (original data) for detection. The purpose of this system to find whether that the watermark can be detected.
I' x K x W -> {0,1}
Some applications of systems under this scheme are for copyright protection (ownership), copy control (i.e as in DVD where copying is not allowed) and fingerprinting where the goal is to identify the original recipient of the pirated copies.
Non-blind watermarking scheme is also known as private watermarking scheme. This system requires at least the cover (original data) for detection. Type I systems extract the watermark W from the possibly distorted data I' and use the original data as a hint to find where the watermark could be in I'.
Type II systems also require a copy of the embedded watermark for extraction and yield "yes" or "no" answer to the question whether the watermark data exists.
I x I' x K x W -> {0,1}
This scheme is to be believed as the most robust than the other schemes as it exchanges very little information and requires access to secret material.
Popular Posts
-
Symmetric key cryptography systems use the same key for both to encrypt the plaintext and to decrypt the ciphertext. Symmetric key systems...
-
Cryptography is defined as the art and science of secret writing. The word itself comes from Greek where the words kruptos (κρυπτοσ) and ...
-
Policy is basically a written document that lays out the exact requirements or rules that must be met by the employees. It generally...
-
What are Blind, Semi-blind and Non-blind Watermarking Systems? Digital watermarking systems can be grouped in three schemes - they are Bli...
-
Checking Image Quality Using MATLAB PSNR program PSNR or peak-to-noise ratio is used to evaluate the quality of the watermarked image aft...
-
TVA: Threat-Vulnerability-Asset TVA worksheet lists the asset in priority order along one axis and the threats it is exposed to by prio...
-
The Security System Development Life Cycle (SecSDLC) is a variant of SDLC which can be used in developing an Information Security Policy. ...
-
Find below the Matlab codes to embed a watermark image into a cover(host) image: clear all; close all; clc; [filename1,pathname]=uigetfi...
-
The Interesting Story of Lena.jpg The image above is one that has been widely used in the image compression studies, even today. ...
-
A ciphertext has the possibility of being broken by using statistical analysis that could provide some information on the frequency of char...