A message-based cocktail watermarking system

Slides:



Advertisements
Similar presentations
漢語ㄅㄆㄇ ( 一 ) 聲母 Consonants/medeklinker 製作人 made by: 周玉雪 Y. Chou.
Advertisements

Multi-Label Prediction via Compressed Sensing By Daniel Hsu, Sham M. Kakade, John Langford, Tong Zhang (NIPS 2009) Presented by: Lingbo Li ECE, Duke University.
A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang.
Maximizing Strength of Digital Watermarks Using Neural Network Presented by Bin-Cheng Tzeng 5/ Kenneth J.Davis; Kayvan Najarian International Conference.
Wavelet Transform. Wavelet Transform Coding: Multiresolution approach Wavelet transform Quantizer Symbol encoder Input image (NxN) Compressed image Inverse.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Fundamentals of Multimedia Chapter 8 Lossy Compression Algorithms (Wavelet) Ze-Nian Li and Mark S. Drew 건국대학교 인터넷미디어공학부 임 창 훈.
1 Embedded colour image coding for content-based retrieval Source: Journal of Visual Communication and Image Representation, Vol. 15, Issue 4, December.
Image Compression Using Neural Networks Vishal Agrawal (Y6541) Nandan Dubey (Y6279)
Face Recognition Using Neural Networks Presented By: Hadis Mohseni Leila Taghavi Atefeh Mirsafian.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Kumar Srijan ( ) Syed Ahsan( ). Problem Statement To create a Neural Networks based multiclass object classifier which can do rotation,
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Digital Speech Processing Homework 3
A Memory-efficient Huffman Decoding Algorithm
NTIT1 A chaos-based robust wavelet- domain watermarking algorithm Source: Chaos, Solitions and Fractals, Vol. 22, 2004, pp Authors: Zhao Dawei,
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
An Image Retrieval Approach Based on Dominant Wavelet Features Presented by Te-Wei Chiang 2006/4/1.
1 A Statistical Matching Method in Wavelet Domain for Handwritten Character Recognition Presented by Te-Wei Chiang July, 2005.
Efficient Huffman Decoding Aggarwal, M. and Narayan, A., International Conference on Image Processing, vol. 1, pp. 936 – 939, 2000 Presenter :Yu-Cheng.
Watermarking Scheme Capable of Resisting Sensitivity Attack
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Source: IEEE Transactions on Multimedia, Vol. 5, No
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
Data Mining and Its Applications to Image Processing
Face recognition using improved local texture pattern
Progressive medical image transmission and compression
Lossy Compression of DNA Microarray Images
Convolution.
Advisor: Chin-Chen Chang1, 2
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Source: Journal of Visual Communication and Image Representation, Vol
Presenter by : Mourad RAHALI
CSE 589 Applied Algorithms Spring 1999
Centrality Bias Measure for High Density QR Code Module Recognition
Source :Journal of visual Communication and Image Representation
A Data Hiding Scheme Based Upon Block Truncation Coding
network of simple neuron-like computing elements
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Source: Pattern Recognition Vol. 38, May, 2005, pp
3-5 Slopes of Lines Warm Up Lesson Presentation Lesson Quiz
Dynamic embedding strategy of VQ-based information hiding approach
Chair Professor Chin-Chen Chang Feng Chia University
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Hiding Information in VQ Index Tables with Reversibility
Fuzzy Color Histogram and Its Use in Color Image retrieval
An Algorithm for Compression of Bilevel Images
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Data hiding method using image interpolation
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Mean quantization based image watermarking
Source: Pattern Recognition Letters 29 (2008)
A Semi-blind Watermarking Based on Discrete Wavelet Transform
3.5 Slopes of Lines.
An Algorithm for Removable Visible Watermarking
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Predictive Grayscale Image Coding Scheme Using VQ and BTC
An Efficient Spatial Prediction-Based Image Compression Scheme
A New Image Compression Scheme Based on Locally Adaptive Coding
Source: Circuits and Systems for Video Technology,
Rich QR Codes With Three-Layer Information Using Hamming Code
Outline Announcement Neural networks Perceptrons - continued
Authors:Bijan G. Mobasseri、Domenick Cinalli
Presentation transcript:

A message-based cocktail watermarking system Source: Pattern Recognition Vol. 36, 2003, pp. 957 - 968 Authors: Gwo-Jong Yuam, Chun-Shien Lub, Hong-Yuan Mark Liaob Speaker: Yeh Jun-Bin Date: 2004.04.27

Outline Wavelet Code generation Cocktail Watermark Inexact matching Experimental results Conclusions

Flowchart of proposed method

Wavelet 1” Wavelet LL2 HL2 LH2 HH2 2” Wavelet LL1 HL1 LH1 HH1

Wavelet(cont.) Phase 1) Horizontal: Phase 2) Vertical: A B C D E F G H J K L M N O P A+B C+D A-B C-D E+F G+H E-F G-H I+J K+L I-J K-L M+N O+P M-N O-P ㄅ ㄆ ㄇ ㄈ ㄉ ㄊ ㄋ ㄌ ㄍ ㄎ ㄏ ㄐ ㄑ ㄒ ㄓ ㄔ Phase 2) Vertical: ㄅ ㄆ ㄇ ㄈ ㄉ ㄊ ㄋ ㄌ ㄍ ㄎ ㄏ ㄐ ㄑ ㄒ ㄓ ㄔ ㄅ+ㄉ ㄆ+ㄊ ㄇ+ㄋ ㄈ+ㄌ ㄍ+ㄑ ㄎ+ㄒ ㄏ+ㄓ ㄐ+ㄔ ㄅ-ㄉ ㄆ-ㄊ ㄇ-ㄋ ㄈ-ㄌ ㄍ-ㄑ ㄎ-ㄒ ㄏ-ㄓ ㄐ-ㄔ

Wavelet(cont.) Phase 1) Horizontal : Example Phase 2) Vertical : 20 15 30 17 16 31 22 18 25 21 19 35 50 5 10 33 53 1 9 42 -3 -8 43 37 -1 35 50 5 10 33 53 1 9 42 -3 -8 43 37 -1 Phase 2) Vertical : 35 50 5 10 33 53 1 9 42 -3 -8 43 37 -1 68 103 6 19 76 79 -4 -7 2 -3 4 1 -10 5 -2 -9 326 -38 6 19 16 -32 2 -7 -3 4 1 -10 5 -2 -9 (Level one is done) (Level two is done)

Flowchart of proposed method

Code generation Hadamard code guarantee the maximal hamming distance Map ASCII code to Hadamard code Code generate: H1 = (1) H2n = Where –Hn is complement of Hn Ex: H2 = , H4 =

Code generation (cont.) A: 1111 1111 B: 1010 1010 C: 1100 1100 D: 1001 1001 E: 1111 0000 F: 1010 0101 G: 1100 0011 H: 1001 0110

Flowchart of proposed method

Attack types 320 240 DWT 80 20 10 40 15 sharp compress

Cocktail Watermark - Encode Note: PM and NM are the form of these formula, but not equal. For more detail, please read the original paper. Original image 326+1*1=327 -38+1*1= -37 326 -38 6 19 16 -32 2 -7 -3 4 1 -10 5 -2 -9 Gaussian Distribution P N 1 2 -1 3 -2 -3 4 -4 5 -5 6 -6 7 -7 -8 8 Positive watermark 1100 1100 Negative watermark mapping 1100 1100 327 -37 Watermarked image

Cocktail Watermark – Encode(Cont.) Original image Note: PM and NM are the form of these formula, but not equal. For more detail, please read the original paper. 326 -38 6 19 16 -32 2 -7 -3 4 1 -10 5 -2 -9 6 - 1*1=5 19+(-1)*1=18 Gaussian Distribution P N 1 2 -1 3 -2 -3 4 -4 5 -5 6 -6 7 -7 -8 8 Positive watermark 1100 1100 Negative watermark mapping 1100 1100 327 -37 5 18 15 -31 1 -6 3 -4 -11 6 -1 -10 Watermarked image

Cocktail Watermark – Decode Attacked image Original image B(325-326) = 0 B(-37-(-38)) = 1 B(6-3) = 1 B(18-19) = 0 326 -38 6 19 16 -32 2 -7 -3 4 1 -10 5 -2 -9 325 -37 3 18 15 -31 1 -6 -4 5 -11 6 -1 -10 Positive watermark 1 Negative watermark 1 2 -1 3 -2 -3 4 -4 5 -5 6 -6 7 -7 -8 8 1 We (x,y) = B(Wa (x,y) – Wo (x,y)) for positive We (x,y) = B(Wo (x,y) - Wa (x,y)) for negative B(z) = 1 if z >= 0 0 if z < 0 mapping

Flowchart of proposed method

Inexact matching Inexact matching is used to recover the codeword and map the codeword to ASCII code Back Propagation Neural Network(BPNN) algorithm is used in Inexact matching stage

Inexact matching(Cont.) (Input, output) (右手,跑) (左手,站起來) 當我伸右手,就跑,伸左手就站起來!

Inexact matching(Cont.)

Inexact matching(Cont.) Step 1: Training Fed Hadamard code as input, ASCII code index as output train the weights between input and hidden, hidden and output. All Hadamard codes All ASCII codes index Neural network

Inexact matching(Cont.) 2 training sample: (11, 10), (10, 01) Step 1 example: 1 3 4 2 5 X1=1 w13 w24 w23 w14 O5=1 6 w35 w46 w45 w36 X2=1 O6=0

Inexact matching(Cont.) Step 2: Inexact matching Fed output of Cocktail as input (one codeword at a time) use the weights trained at step1 The output is ASCII code index A: 1111 1111 B: 1010 1010 C: 1100 1100 D: 1001 1001 E: 1111 0000 F: 1010 0101 G: 1100 0011 H: 1001 0110 1100 1100 0010 0000 1100 1101 0010 0000 Neural network

Experimental results

Conclusions Hadamard code and cocktail watermark make message type watermark more reliable