Watermarking for Image Authentication ( Fragile Watermarking )

Slides:



Advertisements
Similar presentations
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Advertisements

Image Data Representations and Standards
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Watermarking For Image Authentication Presented by San-Hao Wang.
JPEG.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
JPEG Still Image Data Compression Standard
CMPT 365 Multimedia Systems
CS430 © 2006 Ray S. Babcock Lossy Compression Examples JPEG MPEG JPEG MPEG.
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
Image and Video Compression
Trevor McCasland Arch Kelley.  Goal: reduce the size of stored files and data while retaining all necessary perceptual information  Used to create an.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Perceptual Watermarks for Digital Image and Video ECE 738 paper presentation Pei Qi ECE at UW-Madison
Introduction to JPEG Alireza Shafaei ( ) Fall 2005.
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 8 – JPEG Compression (Part 3) Klara Nahrstedt Spring 2012.
ECE472/572 - Lecture 12 Image Compression – Lossy Compression Techniques 11/10/11.
1 Image Compression. 2 GIF: Graphics Interchange Format Basic mode Dynamic mode A LZW method.
Klara Nahrstedt Spring 2011
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
Epson Palo Alto Laboratory 5/8/01 Standards Compliant Watermarking for Access Management Viresh Ratnakar & Onur G.Gulyeruz Please view in full screen presentation.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
JPEG. The JPEG Standard JPEG is an image compression standard which was accepted as an international standard in  Developed by the Joint Photographic.
Indiana University Purdue University Fort Wayne Hongli Luo
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
ELE 488 F06 ELE 488 Fall 2006 Image Processing and Transmission (12 – 7 – 06) Digital Watermarking What? Why? How? Attacks, Legal issues 12/7.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 10 – Compression Basics and JPEG Compression (Part 4) Klara Nahrstedt Spring 2014.
Detection of Image Alterations Using Semi-fragile Watermarks
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
JPEG Image Compression Standard Introduction Lossless and Lossy Coding Schemes JPEG Standard Details Summary.
Page 11/28/2016 CSE 40373/60373: Multimedia Systems Quantization  F(u, v) represents a DCT coefficient, Q(u, v) is a “quantization matrix” entry, and.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Image Processing Architecture, © Oleh TretiakPage 1Lecture 7 ECEC 453 Image Processing Architecture Lecture 8, February 5, 2004 JPEG: A Standard.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
CHRIST COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE ENGINEERING AND TECHNOLOGY.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
JPEG Compression What is JPEG? Motivation
IMAGE COMPRESSION.
Chapter 9 Image Compression Standards
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Der-Chyuan Lou and Jiang-Lung Liu,
JPEG Image Coding Standard
JPEG.
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
CMPT 365 Multimedia Systems
CIS679: MPEG MPEG.
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
A User Attention Based Visible Watermarking Scheme
JPEG Pasi Fränti
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Dept. of Elec. & Comp. Engineering
JPEG Still Image Data Compression Standard
The JPEG Standard.
Reference Ingemar J. Cox, Joe Kilian, F. Tomson Leighton, and Talal Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Trans. On Image.
Spread Spectrum Watermarking
Digital Steganography Utilizing Features of JPEG Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Hidden Digital Watermarks in Images
I-Chuan Chang Bor-Wen Hsu and Chi Sung Laih
Presentation transcript:

Watermarking for Image Authentication ( Fragile Watermarking ) Multimedia Security

Desirable Features to be able to determine whether an image has been altered or not; to be able to locate any alteration made on the image;

to be able to integrate authentication data with host image rather than as a separate data file ; the embedded authentication data be invisible under normal viewing conditions; to allow the watermarked image be stored in lossy-compression format.

Block Diagram of Embedding Process Original image Lookup Table (LUT) Entropy Coding Block DCT Marked Coeffs. Quant Embed Data to be embedded Marked JPEG Image (Watermark is embedded into the quantized DCT coeffs. via a look-up table)

1. Embedding Binary Bits Via Table Look-up A proprietary look-up table (LUT) is generated before hand by the owner of the image or the digital camera manufactures. The table maps every possible value of JPEG coeff. randomly to “1” or “0” with the constraint that runs of “1” and “0” are limited in length.

To embed a “1” in a coefficient, the coeff To embed a “1” in a coefficient, the coeff. is unchanged if the entry of the table corresponding to that coeff. is also a “1”. If the entry of the table is a “0”, than the coeff. is changed to its nearest neighboring values for which the entry is “1”. The embedding of a “0” is similar.

Let denotes the original coeff. denotes the marked coeff. is the bit to be embedded in LUT(.) is the mapping by look-up table :

Then, the embedding process can be represented as : if if , and The extraction of the signature is simply by : Where is the extracted bit.

Ex : ×  LUT ‥‥‥ -75 -74 -73 -72 ‥‥ 23 24 25 ‥‥‥ ‥‥‥ 1 0 1 1 ‥‥ 0 0 1 ‥‥‥ × -73 1 Embed “0” (changed) -74 36 -73 8 … 24 5 original embedded -74 24 Marked 24  Embed “0” (unchanged) 24

In this example, zeros are embedded into two AC coefficients with values “-73” and “24” of an 8×8 image block. The entry in LUT for coeff-value “-73” is “1”. So to embed a “0”, we go to its closest neighbor for which the entry is “0”. In this case, “-73” is changed to “-74”. Since the entry for coeff-value “24” is “0”, it is unchanged.

2. Consideration for Minimizing Distortion To ensure the markings are invisible : The run of “1” and “0” entries in the LUT is constrained to avoid excessive modification on the coeffs. DC coeff. in each block is not changed to avoid blocky effect. Small value coeffs are not modified to avoid high freq. distortion.

The above constraints make the number of bits that can be embedded varies significantly from block to block. Also extraction error may occur due to image format conversion and other causes. For these reasons, we choose to embed “one bit per 8×8 block” by embedding the same bit to all embeddable coeffs in the block and detecting that bit by “majority voting”.

Remarks The detection of an error in the embedded bit signals alteration of that block. The constraint of leaving DC coeffs. and small valued AC coeffs unchanged makes it impossible to embed data in smooth blocks where all AC coeffs are very small and hence unembeddable.

3. Choice of Embedded Data for Authentication The authentication data we embed in an image consists of a “visually meaningful binary pattern” and some “content features”. The visually meaningful pattern serves as a quick check for alteration and location of possible alteration.

A simple example of content feature is the “most significant bit” of macroblock mean intensity. Another example is the “sign” of intensity difference between macroblocks. The combination of these two types data is suitable for such applications as image authentication for “trustworthy” digital camera.

block Quant Extract visualize DCT Embedded Features compare Features Original Image LUT Marked block Quant Embed coeff. Entropy Compressed DCT coding Marked Image features Binary pattern Test Image (decompressed) LUT Binary Pattern block Quant Extract visualize DCT Embedded Features compare Features Embedding and Extraction Procedures

4. Smooth Region Embedding Authentication data cannot be embedded in smooth blocks because the AC coeffs are small. This shortage can be solved by embedding data in blocks that are not smooth but whose location bears a “fixed relationship” to the smooth block in question ——backup embedding.

5. Color Image and Video For color images, one may work in YCrCb coordinates and use the proposed approach to mark luminance components while leaving chrominance components unchanged ; or one may apply the approach to chrominance components as well as to embed more data. One may also work in other color coordinates, such as RGB. For MPEG-video, one may mark the I-frames using the proposed scheme. The I-frame serial number can be used as part of embedded data to detect modification such as frame reordering and frame dropping.

References [1] Yeung & Mintzer, “Invisible Watermarking for Image Verification”, J. of Electronic Imaging, pp.578-591, July 1998. [2] P.W.Wang, “A public Key Watermark for Image Verification and Authentication, “ IEEE Inte’l conf. Image Processing, pp.455-459, Oct. 1998. [3] Wu & Liu, “Watermarking for Image Authentication,” IEEE Inte’l conf. Image Processing, pp.437-441, Oct. 1998. [4] Xie & Arce, “ Joint Wavelet Compression and Authentication Watermarking,” IEEE Inte’l conf. Image Processing, pp.427-431, Oct. 1998.