Image Security
Image Security
For
"Artificial Intelligence and its impact on present day Communication
Networks"
By-
Dr. I. A. Ansari
PDPM Indian Institute of Information Technology Design and Manufacturing,
Jabalpur
Email: [email protected]
1
Digital Image
A digital image is a representation of a two-dimensional image as a finite set of
digital values, called picture elements or pixels
What is a Digital Image? (cont..)
Pixel values typically represent gray levels, colors, heights, opacities etc.
Remember digitization implies that a digital image is an approximation of a real scene
1 pixel
What is a Digital Image? (cont..)
Or the domain of f:
- Noise Removal
- Image Sharpening
- Image Segmentation
- Image Watermarking
- Object Recognition
- Scene Understanding
- Autonomous Navigation
Multimedia Data
What separates multimedia data from traditional alpha numeric data?
Source: https://www.washingtonpost.com/politics/2020/01/06/gop-congressman-tweeted-fake-image-obama-with-iranian-president-they-never-met/
• Visual representations are often the most efficient way to represent info.
Source: https://www.youtube.com/watch?v=gLoI9hAX9dw
Information Hiding Main Disciplines
21
Steganography vs. Cryptography vs.
Watermarking
Steganography & Cryptography
• Steganography and Cryptography are closely related
Images.
Audio files,
Video files
Information to Hide
(watermark information)
Digital Information Extraction Model
Encryption key
Why needed ?
Disadvantage: ?
Another classification
• Non-Blind Watermarking –
• In Non-Blind Watermarking, one always needs the host and watermark signal along
with secret key.
• Semi-Blind Watermarking –
• Semi-Blind Watermarking does not need host signal but requires Watermark and
secret key.
• Blind Watermarking –
• Blind Watermarking only requires secret key and there is no requirement of host
signal as well as watermark signal. It is also Public Watermarking and it is the most
challenging one among all three.
Technical Requirements for Watermarking
Invisibility
Robustness Capacity