Watermarking with Side Information

Slides:



Advertisements
Similar presentations
Shapelets Correlated with Surface Normals Produce Surfaces Peter Kovesi School of Computer Science & Software Engineering The University of Western Australia.
Advertisements

Alignment Visual Recognition “Straighten your paths” Isaiah.
3.3 Hypothesis Testing in Multiple Linear Regression
Dynamic Occlusion Analysis in Optical Flow Fields
Instructor: Mircea Nicolescu Lecture 13 CS 485 / 685 Computer Vision.
Edge Detection. Our goal is to extract a “line drawing” representation from an image Useful for recognition: edges contain shape information –invariance.
Principal Component Analysis CMPUT 466/551 Nilanjan Ray.
Edge detection Goal: Identify sudden changes (discontinuities) in an image Intuitively, most semantic and shape information from the image can be encoded.
Active Calibration of Cameras: Theory and Implementation Anup Basu Sung Huh CPSC 643 Individual Presentation II March 4 th,
CS485/685 Computer Vision Prof. George Bebis
ECE 776 Information Theory Capacity of Fading Channels with Channel Side Information Andrea J. Goldsmith and Pravin P. Varaiya, Professor Name: Dr. Osvaldo.
October 8, 2013Computer Vision Lecture 11: The Hough Transform 1 Fitting Curve Models to Edges Most contours can be well described by combining several.
Machine Learning CUNY Graduate Center Lecture 3: Linear Regression.
Course 12 Calibration. 1.Introduction In theoretic discussions, we have assumed: Camera is located at the origin of coordinate system of scene.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Chapter 21 R(x) Algorithm a) Anomaly Detection b) Matched Filter.
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
Brian Macpherson Ph.D, Professor of Statistics, University of Manitoba Tom Bingham Statistician, The Boeing Company.
3D polygonal meshes watermarking using normal vector distributions Suk-Hawn Lee, Tae-su Kim, Byung-Ju Kim, Seong-Geun Kwon.
Analysis of Optimal and Suboptimal Discrete-Time Digital Communications Receivers Clemson University SURE Program 2005 Justin Ingersoll, Prof. Michael.
Multiple Antennas Have a Big Multi- User Advantage in Wireless Communications Bertrand Hochwald (Bell Labs)
A Flexible New Technique for Camera Calibration Zhengyou Zhang Sung Huh CSPS 643 Individual Presentation 1 February 25,
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Lecture 04 Edge Detection Lecture 04 Edge Detection Mata kuliah: T Computer Vision Tahun: 2010.
Machine Vision Edge Detection Techniques ENT 273 Lecture 6 Hema C.R.
Computer Vision Image Features Instructor: Dr. Sherif Sami Lecture 4.
Basic Message Coding 《 Digital Watermarking: Principles & Practice 》 Chapter 3 Multimedia Security.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Fundamentals of Data Analysis Lecture 10 Correlation and regression.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
CSE 554 Lecture 8: Alignment
Coordinate Transformations
Watermarking Scheme Capable of Resisting Sensitivity Attack
Linear Programming Many problems take the form of maximizing or minimizing an objective, given limited resources and competing constraints. specify the.
Negative Numbers and Subtraction
Error Detection and Correction
Introduction to Functions of Several Variables
We propose a method which can be used to reduce high dimensional data sets into simplicial complexes with far fewer points which can capture topological.
Boyce/DiPrima 9th ed, Ch 10.8 Appendix A: Derivation of the Heat Conduction Equation Elementary Differential Equations and Boundary Value Problems, 9th.
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
MIRA, SVM, k-NN Lirong Xia. MIRA, SVM, k-NN Lirong Xia.
Solver & Optimization Problems
Copyright © Cengage Learning. All rights reserved.
Fitting Curve Models to Edges
In summary C1={skin} C2={~skin} Given x=[R,G,B], is it skin or ~skin?
Detecting Artifacts and Textures in Wavelet Coded Images
Linear Programming.
Chap 3. The simplex method
GAM 325/425: Applied 3D Geometry
Vectors and the Geometry
Principal Component Analysis
Canny Edge Detector.
6.2 Grid Search of Chi-Square Space
Copyright © Cengage Learning. All rights reserved.
Feature space tansformation methods
Spread Spectrum Watermarking
Section 3.4 Sensitivity Analysis.
EE 492 ENGINEERING PROJECT
CSE 185 Introduction to Computer Vision
Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking IEEE Trans. On Signal Processing, April 2003 Multimedia Security.
Information Theoretical Analysis of Digital Watermarking
The Pinhole Camera Model
Vectors and the Geometry
IT472 Digital Image Processing
Error Correction Coding
MIRA, SVM, k-NN Lirong Xia. MIRA, SVM, k-NN Lirong Xia.
Watermarking with Side Information
Introduction to Artificial Intelligence Lecture 22: Computer Vision II
Optimization under Uncertainty
Presentation transcript:

Watermarking with Side Information Multimedia Security

The basic model for a digital watermarking system Cover work interference Co N Received message Message coding Scaling Detection m Source message Embedder Both the embedder and the detector ignore the available information about the cover work.

Informed watermarking (Private Watermarking) The detector is provided with information about the original, unwatermarked cover work. One can subtract this information from the received work, eliminating any interference between the cover work and the watermark. With an informed detector, the detectability of the watermark is affected only by the distortions to which the watermarked work is subjected after embedding; it is not affected by the cover work itself.

Partially Informed Embedding (E-Fixed-LC/D-LC) The embedder examines the cover work during the modification of the message mark in preparation for embedding; the message mark is scaled so that one can obtain a fixed linear correlation detection value. Cover work interference Co N Received message Message coding Modification Detection m Source message Embedder

Embedding as an Optimization Problem There are two main application dependent scenarios : Find the added mark that maximize robustness while keeping within a prescribed limit on perceptual distortion. Find the added mark that minimizes perceptual distortion while maintaining a prescribed level of robustness.

A more complicated and challenging problem To balance the tradeoff between fidelity and robustness!! For example, one may specify a maximum level of distortion and a minimum level of robustness. If the watermark cannot be embedded within both constraints, one or the other should be automatically relaxed. Thus, the embedder might try to maximize robustness while staying within the maximum distortion. However, if the highest robustness attainable is lower than a specified minimum, the perceptual constraint is relaxed. Key Point : we need methods for measuring perceptual distortion and robustness!!

A. Optimizing with respect to a Detection Statistic The simplest way to measure robustness is to assume that a watermark with a high detection value is more robust than one with a low detection value, so that the Detection Statistic itself becomes the measure of robustness. Thus, when embedding a watermark with fixed robustness, the user specifies a desired detection value with the minimum possible distortion. For example, in the E-Fixed-LC embedder, we specify a desired linear correlation as the sum of the threshold, , and a “strength” parameter, .

The assumption that high detection values indicate high robustness is generally true for linear correlation. A high detection value means the watermarked vector is far from the detection threshold, and more distortion of any type can be applied before the watermark is undetectable. However, this assumption is not true for many other detection statistics, including normalized correlation.

Why the E-Fixed-LC algorithm is inappropriate for normalized correlation? Embedding region Detection region : Projected Vectors before embedding Wr : Projected Vectors after embedding

What should we do? We need to fix the normalized correlation at some desired value, , rather than fixing the linear correlation! For each work, represented by ‘ ’, the embedder finds the closest point in marking space, represented by ‘ ’, that has the desired normalized correlation with the watermark.

Y Detection region X Embedding region : Projected Vectors before embedding (Vo) Wr X : Projected Vectors after embedding (Vw)

How to implement the fixed normalized correlation embedder? The embedding region, for normalized correlation, is the surface of a cone, centered on the reference vector, . Therefore, we are trying to find the closest point on a cone to a given point, . Clearly, this point will lie in the plane that contains both and .

So the problem can be reduced to two dimensions by using Gram-Schmidt orthonormalization approach to find two orthogonal coordinate axes for this plane:

Each point on the plane can be expressed with an x and y coordinate as Each point on the plane can be expressed with an x and y coordinate as . The X-axis is aligned with the reference vector, . The coordinateds of are: Note that is guaranteed to be positive.

The embedding region intersects with the XY plane along two lines The embedding region intersects with the XY plane along two lines. Because is positive, the closest point will be on the upper line. This line is described by the vectors

E_BLK_Fixed_CC/D_BLK_CC: 1.Use the extraction function Ex(.) to extract a vector, , from the unwatermarked image, . 2. Compute a new vector in marking space, , that is acceptably close to but lies within the detection region for the desired watermark, 3.Perform the inverse of the extraction operation on to obtain the watermarked image, .

As in the E_BLK_BLIND embedding algorithm, we encode a 1-bit message, m , by determining the ‘Sign’ of a given 8x8 reference mark, :

Fragility of a Fixed Normalized Correlation Strategy for Information Embedding Does a larger value of implying higher robustness? Unlike with linear correlation, higher normalized correlation do not necessarily lead to higher robustness. Linear correlation measures the magnitude of the signal ,normalized correlation essentially measures the signal-to-noise ratio.

The signal to noise ratio can be high even if the signal is very weak, as long as the noise is proportionally weak. So, if we add a fixed amount of noise to a weak signal, the resulting signal-to-noise ratio plummets (筆直落下).

With a high value of , the E-BLK-Fixed-CC embedder yields a vector closer to the cone. Wr Perturbing this vector in almost any direction is likely to send it outside the detection region. A low value of yields a vector deeper within the cone, And thus more resilience to noise.

B. Optimizing with respect to an Estimate of Robustness: The problem with the E_BLK_Fixed_CC algorithm is that its “strength” parameter, , is based on the wrong measure. Normalized correlation does not measure robustness. A correct measure should estimate the amount of , white, Gaussian noise that can be added to the embedded vector, , before it is expected to fall outside the detection region.

The reason for basing this measure on Gaussian noise, rather than on some more realistic form of degradation, is that correlation coefficients are not inherently robust against it. If we ensure that our watermarks are robust against this type of noise, it helps to ensure that they are robust against other types of degradations, for which the correlation coefficient may be better suited.

Detection region Wr

We now wish to make an embedder that holds constant, rather than holding constant. Contours of constant for a given threshold, as shown in the above figure, are hyperbolas. Note that each hyperbola has a positive and a negative part. We wish to ensure that the correlation between the watermark and the selected vector, , is positive. Thus, we restrict the embedder to only the positive portion of the hyperbola.

In other words, the embedder will not only hold constant, but also ensure that is positive. Thus, the embedding region in N-dimensional marking space is not a cone but one half of an N-D, two –sheet hyperboloid. Note: A hyperboloid is obtained by rotating a hyperbola about one of its axes. With hyperbola oriented like those in the above figure, a rotation about the y-axis will result in a single surface called a one-sheet hyperboloid. A rotation about the x-axis will result in two surfaces (one for the positive part and one for the negative part), or a two-sheet hyperboloid. We restrict the embedding region to the positive sheet of the two-sheet hyperboloid.

E_BLK_Fixed_R/D_BLK_CC: The E_BLK_Fixed_R embedder is essentially the same as the E_BLK_Fixed_CC embedder, except that it maintains a constant instead of normailzed correlation. The target value of is provided by the user as a “strength” parameter. Rather than finding analytically we perform a simple search in the same XY plane as used for fixed normalized correlation embedding.