Signal-Coherent Watermarking Schemes

Slides:



Advertisements
Similar presentations
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Advertisements

Digital rights management Audio watermark Jiamian.
Data Compression CS 147 Minh Nguyen.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Fifth International Conference on Information
Interword Distance Changes Represented by Sine Waves for Watermarking Text Images Author: Ding Huang Supervisor: Prof. Hong Yan.
Secure Spread Spectrum Watermarking for Multimedia Ishani Vyas CS590 Winter 2008.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery By Pat P. W. Chan Supervised by Michael R. Lyu 8/6/2004 Computer Science.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Xinqiao LiuRate constrained conditional replenishment1 Rate-Constrained Conditional Replenishment with Adaptive Change Detection Xinqiao Liu December 8,
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
GODIAN MABINDAH RUTHERFORD UNUSI RICHARD MWANGI.  Differential coding operates by making numbers small. This is a major goal in compression technology:
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35.
A Partial Survey of the Perfect Digital Watermark Problem.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Watermarking Scheme Capable of Resisting Sensitivity Attack
DEPARTMENT OF ECE, BEC, BAGALKOT
Introduction to Audio Watermarking Schemes N. Lazic and P
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Data Compression.
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Welcome
A review of audio fingerprinting (Cano et al. 2005)
Vishal Monga, Divyanshu Vats and Brian L. Evans
Data Compression.
Data Compression CS 147 Minh Nguyen.
Watermarking with Side Information
Basic Concepts of Audio Watermarking
Watermarking for Image Authentication ( Fragile Watermarking )
Increasing Watermarking Robustness using Turbo Codes
Why Compress? To reduce the volume of data to be transmitted (text, fax, images) To reduce the bandwidth required for transmission and to reduce storage.
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
A User Attention Based Visible Watermarking Scheme
Parag Agarwal Digital Watermarking Parag Agarwal
Reference Ingemar J. Cox, Joe Kilian, F. Tomson Leighton, and Talal Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Trans. On Image.
Spread Spectrum Watermarking
Govt. Polytechnic Dhangar(Fatehabad)
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Information Theoretical Analysis of Digital Watermarking
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Presentation transcript:

Signal-Coherent Watermarking Schemes “On the need for Signal-Coherent Watermarking,” IEEE Trans. on Multimedia , Oct 2006 Block Replacement Attack v.s Signal-Coherent Watermarking Multimedia Security

General Remark In content protection systems, embedded watermarks do not add any value to the multimedia items from the customer perspective. On the contrary, the hidden information can be used in court to convince a jury that a suspect has not respected the license agreement. Therefore, malicious users want to remove this hidden evidence and design efficient attack to defeat the system.

A. Signal Removed Attack Finding an attack which bring the detection (correlation) score below the detection threshold, that is, the attack aims at decreasing the power of the hidden watermark down to a level where the detector cannot reliably assert that it is present. Example: Low-pass filtering, lossy compression, gamma correction, quantization, noise addition due to D/A-A/D conversion (printing and scanning)

A new brand of attacks based on estimation theory has also been appeared Estimating either the original unwatermarked content or the embedded watermark itself – denoising tech. can be exploited to remove hidden watermark. Side effect: blurring artifact. J.Su and B.Girod, “Power-spectrum condition for energy-efficient watermarking.” IEEE Trans. on Multimedia, Dec.2002 ,pp. 551-560

B. Synchronization Removal Attack Disrupt the communication between the embedder and the detector. Most of the detector today are correlation based and thus expect each watermark sample to be at a pre-defined location in the working space. This knowledge is shared by both embedder and the detector . If an external party disturbs this alignment, the convention shared with the detector becomes obsolete and communication is no longer possible.

Both spatial and temporal alternations can be performed on the watermarked data to trap the detector Example: image flipping, rotation, cropping, scaling, time stretching. The most powerful class of desynchronization attack are locally random geometric distortions. (StirMark : http://www.petitcolas.net/fabien/watermarking/stirmark) “Attack on copyright marking system,” Lecture Notes in Computer Science LNCS-1525, pp.219-239,1998

Fact: The human Visual systems is not sensitive against shifts and local affine transformation Such a strategy still succeeds in confusing most of the watermark detectors today

C. Block Replacement Attack Common signal processing operations do decrease the correlation score, they may also introduce undesirable distortion artifacts. Desynchronization attacks do not remove the hidden watermark. Nothing ensures that a future enhanced version of the detector is not going to be able to detect the desynchronized watermark. Moreover, misalignment prevents from using common quantization metrics such as PSNR to evaluate the impact of the attack.

Specification for designing an attack (i) the detector should no longer be able to detect the embedded watermark after the attack (ii) the attack should not introduce geometric distortions so that quantitative measures of distortion can still be used. (iii) the attack should introduce a fair additional distortion , e.g., the distance between the watermarked and attacked should be close to the distance between the original and watermarked documents.

(iv) the attack should be designed in such a way that it is possible (iv) the attack should be designed in such a way that it is possible to adapt the strength of the attack to cope with alternative watermarking schemes using different embedded strength. (V) the watermark should ensure that a future improved version of the detector cannot overcome the problem.

Basic idea Multimedia digital data is highly redundant. Successive frame are highly in a video shot Most songs contain repetitive patterns An attack can exploit these similarities to replace each part of the signal with a similar one taken from another location in the same signal.

Genetic Description of the Block Replacement Attack 1. Partition the input signal into block 2. For each input block (a) Define a search window and build a codebook which contain a collection of codewords (b) Compute a replacement block similar to the input one using the blocks in the codebook (c) Replace the input block by the replacement one Similarity between two blocks B1 and B2 is measured by N is the number of considered signal sample

Video content is recognized to be highly redundant Video content is recognized to be highly redundant. In particular, the background which usually occupies most of the scene is repeated across successive video frames. As a result, for a given video frame, neighboring frames often entail an estimation of the current one. neighboring frames are gathered and combined, e.g., averaged to obtain a replacement frame.

Temporal Frame Averaging After Registration (TFAR) : Estimating a given video frame from its neighboring ones using frame registration. Frame registration: A binary mask Mt has be built for each frame to distinguish useful areas in the frame (e.g., the background area) from useless ones (e.g., moving and varying objects).

Repetition is often a principal part of composing music and is a natural consequence of the fact that distinct instruments, voices and tones are used to create a soundtrack. One can likely to find similar blocks of music within a single musical piece, an album of songs from a single author, or in instrument solos. Remarks: music has a lot less redundant than video musical redundancies are often superimposed high fidelity music tolerates significant multiplicative noise levels, makes block replacement attacks quite viable for audio content.

In the context of still images, self-similarities have previously exploited to obtain efficient coding tools. Fractal Image Compression: Theory and Applications, springer-Verlag, 1994. For each image blocks, the most similar block in the search window modulo a geometrical (scaling, rotation, flip) and a photometric transform is found to generate an estimate of the block (a codeword of the codebook). By varying different parameters, a codebook can be generated.

Conclusions (i) Exploiting multimedia self-similarity to replace each signal block with another, perceptually similar one. Several blocks carrying different watermarks are combined to obtain a candidate block for replacement which is expected not to carry the same watermark as the input signal block. (i) and (ii) make block replacement attacks very effective! Intra-Signal collusion: Several watermarked signal-blocks are combined to obtain unwatermarked blocks

How to disable, or at least to decrease, the impact of such an attack? If similar signal blocks carry similar watermarks, the presented block replacement strategy is likely to be ineffective. The introduced watermark has to be coherent with the self-similarities of the host signal! How to obtain a host coherent watermark??