Vishal Monga, Divyanshu Vats and Brian L. Evans

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Randomized Detection for Spread- Spectrum Watermarking: Defending Against Sensitivity and Other Attacks Ramarathnam Venkatesan and Mariusz H. Jakubowski.
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
LOGO Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Randomized Radon Transforms for Biometric Authentication via Fingerprint Hashing 2007 ACM Digital Rights Management Workshop Alexandria, VA (USA) October.
Special Topic on Image Retrieval Local Feature Matching Verification.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Overview Introduction to local features
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf.
A public fragile watermarking scheme for 3D model authentication Chang-Min Chou, Din-Chang Tseng Computer-Aided Design Vol. 38 (Nov. 2006) 1154–1165 Reporter:
Presented by Tienwei Tsai July, 2005
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Copyright Protection of Images Based on Large-Scale Image Recognition Koichi Kise, Satoshi Yokota, Akira Shiozaki Osaka Prefecture University.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Detection of Image Alterations Using Semi-fragile Watermarks
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
1 Perceptually Based Methods for Robust Image Hashing Vishal Monga Committee Members: Prof. Ross Baldick Prof. Brian L. Evans (Advisor) Prof. Wilson S.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Watermarking Scheme Capable of Resisting Sensitivity Attack
DEPARTMENT OF ECE, BEC, BAGALKOT
Lecture 07 13/12/2011 Shai Avidan הבהרה: החומר המחייב הוא החומר הנלמד בכיתה ולא זה המופיע / לא מופיע במצגת.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Vishal Monga and Prof. Brian L. Evans
A review of audio fingerprinting (Cano et al. 2005)
Lossy Compression of Stochastic Halftones with JBIG2
Perceptually Based Methods for Robust Image Hashing
K. ZEBBICHE , F. KHELIFI and A. BOURIDANE
Recognizing Deformable Shapes
DONE BY S.MURALIRAJAN M.NIRMAL
Watermarking for Image Authentication ( Fragile Watermarking )
Signal-Coherent Watermarking Schemes
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Parag Agarwal Digital Watermarking Parag Agarwal
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Spread Spectrum Watermarking
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Recognizing Deformable Shapes
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Presented by Xu Miao April 20, 2005
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A New Method for Tamper Detection and Recovery
A Quadratic-Residue-based Fragile Watermarking Scheme
Clustering Algorithms for Perceptual Image Hashing
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Vishal Monga, Divyanshu Vats and Brian L. Evans 2005 IEEE Int. Conference on Multimedia and Expo Image Authentication Under Geometric Attacks Via Structure Matching Vishal Monga, Divyanshu Vats and Brian L. Evans July 6th , 2005 http://signal.ece.utexas.edu Embedded Signal Processing Laboratory The University of Texas at Austin Austin, TX 78712-1084 USA {vishal, vats, bevans}@ece.utexas.edu

The Problem of Robust Image Authentication Introduction The Problem of Robust Image Authentication Given an image Make a binary decision on the authenticity of content Content : defined (rather loosely) as the information conveyed by the image, e.g. one-bit change or small degradation in quality is NOT a content change Robust authentication system: required to tolerate incidental modifications yet be sensitive to content changes Two classes of media verification methods Watermarking: Look for pre-embedded information to determine authenticity of content Digital Signatures: feature extraction; a significant change in the signature (image features) indicates a content change

Geometric Distortions or Attacks Introduction Geometric Distortions or Attacks Motivation to study geometric attacks Vulnerability of classical watermarking/signature schemes Loss of synchronization in watermarking Classification of geometric distortions Original Shearing Random bending Global Local

Related Work Geometric distortion resistant watermarking Periodic insertion of the mark [Kalker et. al, 1999 ] [Kutter et. al, 1998 ] Template matching [Pun et. al, 1999 ] Geometrically invariant domains [Lin et. al, 2001], [Pun et. al, 2001] Feature point based tessellations [Bas et. al, 2002] Scheme Local distortion robustness Global distortion robustness Remark Periodic insertion no yes Leak information Template insertion easily removed Invariant domain mark embedding Fragile under many signal processing modifications Tessellations Too much pressure on the feature detector

Proposed Authentication Scheme Proposed Framework Proposed Authentication Scheme Received Image System components Visually significant feature extractor T: model of geometric distortion D(.,.) : robust distance measure Feature Extraction N Update T T(.) Reference Feature Points M Compute d = D(M, T(N)) d = dmin? No Yes Natural constraints 0 < ε < δ dmin < ε ? dmin > δ ? No No Human intervention needed Yes Yes Credible Tampered

Hypercomplex or End-Stopped Cells Feature Extraction Hypercomplex or End-Stopped Cells Cells in visual cortex that help in object recognition Respond strongly to line end-points, corners and points of high curvature [Hubel et al.,1965; Dobbins, 1989] End-stopped wavelet basis [Vandergheynst et al., 2000] Apply First Derivative of Gaussian (FDoG) operator to detect end-points of structures identified by Morlet wavelet Synthetic L-shaped image Morlet wavelet response End-stopped wavelet response

Proposed Feature Detection Method Feature Extraction Proposed Feature Detection Method Compute wavelet transform of image I at suitably chosen scale i for several different orientations Significant feature selection: Locations (x,y) in the image identified as candidate feature points satisfy Avoid trivial (and fragile) features: Qualify location as final feature point if

Distance Metric for Feature Set Comparison Robust Distance Metric Distance Metric for Feature Set Comparison Hausdorff distance between point sets M and N M = {m1,…, mp} and N = {n1,…, nq} where h(M, N) is the directed Hausdorff distance Why Hausdorff ? Robust to small perturbations in feature points Accounts for feature detector failure or occlusion H.D. = small

Is Hausdorff Distance that Robust? Distance Metric for feature comparison Is Hausdorff Distance that Robust? h(N, M) M N One outlier causes the distance to be large This is undesirable......

Solution: Define a Modified Distance Distance Metric for feature comparison Solution: Define a Modified Distance One possibility Generalize as follows

Modeling the Geometric Distortion Geometric Distortion Modeling Modeling the Geometric Distortion Affine transformation defined as follows x = (x1, x2) , y = (y1, y2), R – 2 x 2 matrix, t – 2 x 1 vector

Authentication Procedure Determine T* such that Let dmin < ε  credible dmin > δ  tampered Else human intervention needed Search strategy based on structure matching [Rucklidge 1995] Based on a “divide and conquer” rule Search Strategy

Results: Feature Extraction Original image JPEG with Quality Factor of 10 Rotation by 25 degrees Stirmark random bending

Quantitative Results Feature set comparison If N is a transformed version of M otherwise Attack Lena Bridge Peppers JPEG, QF = 10 0.0857 0.1112 0.105 Scaling by 50% 0.0000 0.0020 0.1110 Rotation by 250 0.0030 0.1277 0.0078 Random Bending 0.0345 0.0244 0.0866 Print and Scan 0.0905 0.1244 0.1901 Cropping by 10% 0.0833 0.0025 0.1117 Cropping by 25% 0.2414 0.2207 0.2766 Generalized Hausdorff distance between features of original and attacked (distorted) images Attacked images generated by Stirmark benchmark software

This yields a pseudo-random signal representation Security Via Randomization Randomized Feature Extraction Randomization Partition the image into N random (overlapping) regions Random tiling varies significantly based on the secret key K, which is used as a seed to a (pseudo)-random number generator This yields a pseudo-random signal representation

Conclusion Highlights Future work Robust feature detector based on visually significant end-stopped wavelets Hausdorff distance: accounts for feature detector failure or occlusion; generalized the distance to enhance robustness Randomized feature extraction for security against intentional attacks Future work Extensions to watermarking More secure feature extraction Faster transformation matching for applications to scalable image search problems

Questions and Comments!

End-Stopped Wavelet Basis Morlet wavelets [Antoine et al., 1996] To detect linear (or curvilinear) structures having a specific orientation End-stopped wavelet [Vandergheynst et al., 2000] Apply First Derivative of Gaussian (FDoG) operator to detect end-points of structures identified by Morlet wavelet x – (x,y) 2-D spatial co-ordinates ko – (k0, k1) wave-vector of the mother wavelet Orientation control – Back

Computing Wavelet Transform Feature Extraction Computing Wavelet Transform Generalize end-stopped wavelet Employ wavelet family Scale parameter = 2, i – scale of the wavelet Discretize orientation range [0, π] into M intervals i.e. θk = (k π/M ), k = 0, 1, … M - 1 End-stopped wavelet transform

Search Strategy: Example (-12,15) , (11,-10), (15,14) (15,12) , (-10,-11), (14,-14) transformation space

Solution: Data set normalization Normalize data points in the following way Why do normalization? Preserves geometry of the points Brings feature points to a common reference normalize

Relation Based Scheme : DCT coefficients Digital Signature Techniques Relation Based Scheme : DCT coefficients Discrete Cosine Transform (DCT) Typically employed on 8 x 8 blocks Digital Signature by Lin Fp, Fq, DCT coefficients at the same positions in two different 8 x 8 blocks , DCT coefficients in the compressed image 8 x 8 block p q N x N image Back

Conclusion & Future Work Decouple image hashing into Feature extraction and data clustering Feature point based hashing framework Iterative feature detector that preserves significant image geometry, features invariant under several attacks Trade-offs facilitated between hash algorithm goals Clustering of image features [Monga, Banerjee & Evans, 2004] Randomized clustering for secure image hashing Future Work Hashing under severe geometric attacks Provably secure image hashing?

End-Stopped Wavelet Basis Morlet wavelets [Antoine et al., 1996] To detect linear (or curvilinear) structures having a specific orientation End-stopped wavelet [Vandergheynst et al., 2000] Apply First Derivative of Gaussian (FDoG) operator to detect end-points of structures identified by Morlet wavelet x – (x,y) 2-D spatial co-ordinates ko – (k0, k1) wave-vector of the mother wavelet Orientation control – Back