Watermarking Scheme Capable of Resisting Sensitivity Attack

Slides:



Advertisements
Similar presentations
Randomized Detection for Spread- Spectrum Watermarking: Defending Against Sensitivity and Other Attacks Ramarathnam Venkatesan and Mariusz H. Jakubowski.
Advertisements

Ji-Hee Han, Sejung Yang, and Byung-Uk Lee, Member, IEEE IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 2, FEBRUARY 2011.
Chih-Hsing Lin, Jia-Shiuan Tsai, and Ching-Te Chiu
Watermarking For Image Authentication Presented by San-Hao Wang.
Speech Enhancement Based on a Combination of Spectral Subtraction and MMSE Log-STSA Estimator in Wavelet Domain LATSI laboratory, Department of Electronic,
Cryptanalysis of Correlation-Based Watermarking Schemes Using Single Watermarked Copy Author: Tanmoy Kanti Das and Subhamoy Maitra From IEEE SIGNAL PEOCESSING.
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang Xi'an University of Technology,
Barcode Readers using the Camera Device in Mobile Phones 指導教授:張元翔 老師 學生:吳思穎 /05/25.
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
01-Feb-12Data Leakage Detection1. CONTENTS  ABSTRACT  INTRODUCTION  OBJECTIVES  STUDY AND ANALYSIS  FLOW CHART  FUTURE SCOPE  LIMITATIONS  APPLICATIONS.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Zhejiang University Wavelet-based 3D mesh model watermarking Shi Jiao-Ying State Key Laboratory of CAD&CG, Zhejiang University, Hangzhou
Modified Patchwork Algorithm: Anovel Audio Watermarking Scheme In-Kwon Yeo and Hyoung Joong Kim.
Reversible medical image watermarking based on wavelet histogram shifting Source: Authors: Reporter: Date: The Imaging Science Journal, Vol. 59, No. 1,
Multiple Image Watermarking Applied to Health Information Management
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Multiple-description iterative coding image watermarking Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 20, No. 4, pp , 2010.
NTIT1 A chaos-based robust wavelet- domain watermarking algorithm Source: Chaos, Solitions and Fractals, Vol. 22, 2004, pp Authors: Zhao Dawei,
1 Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform Source : IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 8,
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
1 Transform Domain Fragile Image Watermark Prof. Ja-Ling Wu Graduate Institute of Networking and Multimedia Dept. of Computer Science and Information Engineering.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Der-Chyuan Lou and Jiang-Lung Liu,
Vishal Monga, Divyanshu Vats and Brian L. Evans
K. ZEBBICHE , F. KHELIFI and A. BOURIDANE
Robustness Evaluation of Perceptual Watermarks
Watermarking with Side Information
Increasing Watermarking Robustness using Turbo Codes
Feature Space Based Watermarking in Multi-Images
Dr. Chang Shu COMP 4900C Winter 2008
Mean value based reversible data hiding in encrypted images
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Source: Information Sciences, 2018, accpeted.
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Source: Pattern Recognition Letters, Article In Press, 2007
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source: IEEE Signal Processing Letters, Vol. 14, No. 3, Mar. 2007, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Digital Watermarking for Image Authentication with Localization
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
Source: Pattern Recognition Letters 29 (2008)
A Semi-blind Watermarking Based on Discrete Wavelet Transform
Novel Multiple Spatial Watermarking Technique in Color Images
An Algorithm for Removable Visible Watermarking
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Blind Reversible Authentication Based on PEE and CS Reconstruction
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
An imperceptible spatial domain color image watermarking scheme
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Hidden Digital Watermarks in Images
Pairwise IPVO-Based Reversible Data Hiding
Authors: J.J. Murillo-Fuentes
Source : Digital Signal Processing. Vol. 73, pp , Feb
A Quadratic-Residue-based Fragile Watermarking Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
An image adaptive, wavelet-based watermarking of digital images
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Watermarking Scheme Capable of Resisting Sensitivity Attack Source: IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Author: Xinpeng Zhang and Shuozhong Wang Speaker: Shu-Chuan Ko Date: 2009.12.1

Outline Introduction Sensitivity attack Watermark detector Embedding algorithm Detection algorithm Security analysis Experimental results Conclusions

Introduction This letter proposes a watermarking scheme capable of defeating the sensitivity attack a novel tailor-made embedding algorithm a corresponding detection mechanism are designed to “mislead” the attackers: get a “fake” signal

Sensitivity attack(1/3) Attacker possesses a watermarked image and an available detector Remove or change the embedded without causing serious distortion Original image Watermarked image Sensitivity attack  watermark detector Watermark embedding Watermark Not watermarked

Sensitivity attack(2/3) Decision boundary : between the “Watermarked” and “Not watermarked” regions is a hyper-plane in a multidimensional space. Not watermarked Watermarked Decision boundary

Sensitivity attack(3/3) : perpendicular to the decision boundary : shows how sensitive the detector is to modification in the direction of each vector : is either +1 or -1 indicates addition or subtraction Subtracts from the watermarked copy with an increasing strength until the detector reports that no watermark is present. Thus, the embedded watermark is removed.

Public watermark detector Output 1 (Watermarked) > Threshold Detection function F ≤ Threshold Test image Output 0 (Not watermarked) Black box Watermark detector : provide adequate information about an embedded watermark

Embedding algorithm(1/6) C2,3 C2,0 C1,0 C0,0 C2,2 C2,1 C1,2 C1,1 C0,2 C0,1 DWT 3-levels IDWT Watermarked image Watermark

Embedding algorithm(2/6)

Embedding algorithm(3/6)

Embedding algorithm(4/6) Generate( )data-groups in a pseudo-random manner The number of elements in each data group is equal to that of the host DWT coefficients, and all elements in the groups : mutually independent and satisfy a standard Gaussian distribution with zero mean and unit standard deviation

Embedding algorithm(5/6) : modified DWT coefficients where All modified DWT coefficients are inversely transformed to yield a watermarked copy

Embedding algorithm(6/6) According to the central limit theorem is very close to its mean 1 All are approximately 0 Standard deviation of

Detection algorithm (1/2) If output “ Watermarked ” output “ Not watermarked ”

Detection algorithm (2/2) If test image contains watermark, all close to 0   If test image contains no watermark   M  189 avoid excessive distortion

Security analysis Attacker does not know and is impossible to estimate by measuring the sensitivities of The detection function of the attacked signal always greater than 0 ( F > 0). This means the sensitivity attack cannot remove the embedded watermark.

Experimental results A 960 1280 still image captured Detection function F Original -1.7104 Watermarked 1.5104 A 960 1280 still image captured by a digital camera was used as the original test signal. The system parameter M=189

Conclusions The proposed watermarking scheme is capable of defeating the sensitivity attack. The corresponding detection mechanism can mislead the attackers. The output of detector cannot be used to remove watermark with low distortion.