Dept. of Elec. & Comp. Engineering

Slides:



Advertisements
Similar presentations
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Advertisements

Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
By Elo Leung and Wing Wong CS 265 Section 2 Spring 2004.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Robust Digital Right Management Scheme (DRM) for Multimedia Anuj Maheshwari Victor Sutan
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital Watermarking
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
DEPARTMENT OF ECE, BEC, BAGALKOT
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
IMAGE PROCESSING IMAGE WATERMARKING
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Technical Aspects of Digital Rights Management
DONE BY S.MURALIRAJAN M.NIRMAL
Watermarking for Image Authentication ( Fragile Watermarking )
Increasing Watermarking Robustness using Turbo Codes
Parag Agarwal Digital Watermarking Parag Agarwal
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Hidden Digital Watermarks in Images
Authors: J.J. Murillo-Fuentes
Digital Watermarking Lecture 2
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Dept. of Elec. & Comp. Engineering An Adaptive Digital Image Watermarking Technique for Copyright Protection Mohammed J. Islam Dept. of Elec. & Comp. Engineering 2018/12/8 RCIM Seminar

Presentation Outline Introduction Problem Statement Watermarking Techniques Spatial Domain Watermarking Frequency Domain Watermarking Motivation Proposed Method Experimental Results- LPF and Median Conclusion 2018/12/8 RCIM Seminar

Digital Media and the Internet Internet makes easier the transmission of digital multimedia content such as text, audio, image and video No quality loss Inexpensive copies Wide distribution but no control Problem? How can Intellectual property be protected? How does the creator get the money? How to control distribution? 2018/12/8 RCIM Seminar

Digital Media Protection Traditional encryption algorithm such as DES and RSA are widely adopted. Digital media is encrypted into scrambled data using a predetermined encryption key (private or public) Correct decryption key can decrypt the encrypted data and recover original media What if the decrypted media is illegally distributed or copied? Digital watermarking is a way of solving this issue. 2018/12/8 RCIM Seminar

What is Watermarking? Embeds a mark (text or logo) into an image, text, audio and video. Not dependent on file format Visible or invisible Principle of digital watermarking is the robust and secret embedding of copyright information in a digital medium. 2018/12/8 RCIM Seminar

Watermark Requirements (1) Perceptual Transparency Invisible, hidden to the human observer Unambiguity Retrieval of watermark identify the owner. Robustness Removal of the embedded watermark should be difficult for an attacker 2018/12/8 RCIM Seminar

Watermark Requirements (2) Robustness Attempting to remove or destroy the watermark should produce a remarkable degradation in media quality before the watermark is lost. Watermark should still be present if the watermarked media are processed by some common signal processing operations Resampling, requantization, lossy compression (JPEG, MPEG, wavelet compression), linear filtering (LPF, HPF), nonlinear filtering (median filtering), geometric distortions (scaling, translation, rotation, and cropping) as well as A-to-D and D-to-A conversion 2018/12/8 RCIM Seminar

Robustness vs. Transparency Robustness often conflicts with transparency requirements To be robust a watermark should be embedded in perceptually significant regions of the host media To be transparent to the human observers, a watermark should be embedded in perceptually insignificant regions of the host media. Needs a trade-off between imperceptibility and robustness A balance is achieved by taking the concealment principles denoted by Human Visual System (HVS). 2018/12/8 RCIM Seminar

Human Visual System (HVS) HVS takes the human senses and image features into account when embedding the watermark. Mauro Barni suggested three rules based on the experiments: Distortions are much less visible on highly textured regions than on uniform area; Contours are more sensitive to noise addition than highly textured regions but less than flat areas; Distortions are less visible over dark and bright regions. 2018/12/8 RCIM Seminar

How Watermark Works? Generate watermark based on secret key Transform image (e.g. DCT) or spatial domain Choose pseudorandom location Make significant yet invisible changes Take human visual system (HVS) into account Inverse Transformation 2018/12/8 RCIM Seminar

Watermark Detection Blind or non-blind recovery (original image required) Get watermark image (possibly altered) Extracting embedded data Apply error correction Correlation Decision 2018/12/8 RCIM Seminar

Spatial Domain Watermarking (1) Modify the intensities or color values of some selected pixels Simplest technique is to embed a watermark in the least significant bits (LSBs) of some randomly selected pixels Watermark can be easily destroyed if the watermarked image is low-pass filtered or JPEG compressed To increase the security, Matsui and Tanaka proposed a method to use secret key to select the locations where a watermark is embedded. 2018/12/8 RCIM Seminar

Spatial Domain Watermarking (2) Voyatzis and Pitas used a toral automorphism approach to scramble the digital watermark before it is inserted into an image. To increase the robustness of the watermark, many approaches have been proposed to modify some properties of selected pixels or blocks Darven and Scott proposed a fractal-based steganographic method to embed the watermark Wolfgang et al. reshaped an m-sequence into 2D watermark blocks, which are added and detected on a block-by-block basis. and many more……. 2018/12/8 RCIM Seminar

Frequency Domain Watermarking (1) Transforms an image into the frequency domain coefficients. Transformation may be Fourier transform, DCT or wavelet transforms etc. Watermark is then embedded in the transformed coefficients according to the perceptual significance of the transform coefficients. The coefficients are inverse transformed to form the watermarked image, identical to the original image The frequency sensitivity of the HVS can be used to ensure that the watermark is invisible and robust to any attacks 2018/12/8 RCIM Seminar

Frequency Domain Watermarking (2) O’Ruanaidh et. al. embedded the watermark in the phase information in the DFT domain since the phase distortion is more sensitive to HVS than the magnitude distortion. It is more robust to tampering when compared to magnitude modulation. Cox et. al proposed a secure spread spectrum watermarking method for embedding a watermark in the DCT domain. A block based DCT watermarking approach is proposed by Hsu and Wu and many more………. 2018/12/8 RCIM Seminar

Watermark Selection (1) Most of the algorithms use a serial number, a set of normally distributed random numbers, a Gaussian distribution, or an author ID as a watermark. A quantitative measure is required to verify the extraction result Usually a similarity, q, between the original watermark and extracted watermark is computed. The value of q is then tested against a threshold T. Determination of threshold produces another ambiguity Solution? 2018/12/8 RCIM Seminar

Watermark Selection (2) Use a visually meaningful watermark (a small image). Human eyes can easily verify the extracted result. However, a large quantity of data must be embedded into the host image if a visually meaningful image is adopted. The embedding algorithm must adapt its insertion strategy to accommodate a large quantity of data in the host image 2018/12/8 RCIM Seminar

Motivation To provide a larger capacity for watermark insertion, a spatial domain watermarking method is used. Embedding a watermark in the least significant bits of a pixel is less sensitive to human eyes. Watermark will be destroyed if some common image operations such as low-pass filtering are applied to the watermarked image. So to make the embedded watermark more resistant to any attack, the watermark can be embedded in the MSBs. This will introduce more distortion in the host image and conflicts with the invisible requirements. 2018/12/8 RCIM Seminar

Proposed Approach Visually recognizable binary watermark image. So human eyes can easily identify the extracted watermark To meet both invisibility and robustness, the proposed method adaptively modifies the intensities of some selected pixels as much as possible and modification is not noticeable to human eyes. To prevent tampering or unauthorized access, the watermark is first permuted into scrambled data 2018/12/8 RCIM Seminar

Block diagram- Watermark Insertion 2018/12/8 RCIM Seminar

Watermark Permutation To prevent the watermark from tampering or unauthorized access by attackers, the watermark image is first permuted to be scrambled data before insertion. A pseudorandom number generator is used to permute the watermark. Pixel at (i’,j’) is mapped to a pixel at (i,j) in a pseudorandom order. M and N are height and width of watermark image 2018/12/8 RCIM Seminar

Watermark Embedding The scrambled watermark image is inserted into the host image The embedded watermark must be invisible to human eyes and robust to most image processing operations To meet these requirements, a bit of pixel value(0 or 1) is embedded in a block of the host image. Depending on the contrast of the block, pixels in this block are adaptively modified to maximize robustness and guarantee invisibility. 2018/12/8 RCIM Seminar

Watermark Embedding Steps (1) The host image is decomposed into blocks of size nxn, The position or block for embedding is selected by pseudorandom number generator using the key K Step 1: Sort the pixels in block B. Step 2: Compute the average intensity gmean, maximal intensity gmax, and minimal intensity gmin of the block. Step 3: Classify every pixel in B into one of the two categories, bij belongs to ZH if bij>gmean bij belongs to ZL if bij≤gmean 2018/12/8 RCIM Seminar

Watermark Embedding Steps (2) Step 4: Compute the mean values (mH and mL) of these two categories Step 5: Define the contrast value of block B as CB=max(Cmin, (gmax-gmin)) , where , Cmin are constant Step 6: Assuming the embedded value bW is 0 or 1. Modify the pixel value according to the following rules: If bW=1 g’=gmax if g>mH g’=gmean if mL≤g<gmean g’=g+ otherwise 2018/12/8 RCIM Seminar

Watermark Embedding Steps (3) If bW=0 g’=gmin if g<mL g’=gmean if gmean≤g<mH g’=g- otherwise Where g’ is the modified intensity and  is a randomly generated value between 0 and CB Embedding of the watermark bit depends on the content of each block. For a block of larger contrast, the intensities of pixels will be changed greatly otherwise the intensities are tuned slightly. For a smooth block, the intensities of pixels will be tuned by a small randomly generated value 2018/12/8 RCIM Seminar

Block diagram- Watermark Extraction 2018/12/8 RCIM Seminar

Experimental Results -Embedding 2018/12/8 RCIM Seminar

Experimental Results -Extraction 2018/12/8 RCIM Seminar

Results- Recovered Watermark-NC 2018/12/8 RCIM Seminar

Results- Linear Lowpass Filter 2018/12/8 RCIM Seminar

Linear Lowpass Filter-NC 2018/12/8 RCIM Seminar

Results- Median Filter 2018/12/8 RCIM Seminar

Median Filter- NC 2018/12/8 RCIM Seminar

Conclusions Extracted watermark can be easily used to identify the owner of the host image The proposed algorithm is robust to common image processing operations like linear lowpass and median filter. The proposed approach utilizes the sensitivity of HVS to adaptively modify the contents of the blocks. The pixel intensities are changed adaptively depending on the contrast of the block. 2018/12/8 RCIM Seminar

References C-H. Lee, and Y-K. Lee, “ An adaptive digital watermarking technique for copyright protection”, IEEE Transaction on Consumer Electronics, Vol. 45, No. 4, pp. 1005-1014, 1999. C.-T. Hsu and J.-L, Wu, “Hidden digital watermarks in images”, IEEE Transactions on Image Processing, Vol. 8, No. 1, pp-58-68, 1999 M. M. Yeung and F. Mintzer, “An invisible watermarking technique for image verification”, International conference on Image Processing, Vol. 2, pp- 680-683, 1997. C.-T. Hsu and J.-L, Wu, “Hidden Signatures in images”, Proceedings ICIP, pp-223-226, 1996 2018/12/8 RCIM Seminar