Spread Spectrum Watermarking

Slides:



Advertisements
Similar presentations
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Advertisements

Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
1. 2 u Copyright Protection u Authentication of multimedia data u Robust Data Hiding and Security issues.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Data Transmission Slide 1 Continuous & Discrete Signals.
Secure Spread Spectrum Watermarking for Multimedia Ishani Vyas CS590 Winter 2008.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Perceptual Watermarks for Digital Image and Video ECE 738 paper presentation Pei Qi ECE at UW-Madison
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
Digital Audio Watermarking: Properties, characteristics of audio signals, and measuring the performance of a watermarking system نيما خادمي کلانتري
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Sensitivity System sensitivity is defined as the available input signal level Si for a given (SNR)O Si is called the minimum detectable signal An expression.
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Texture. Texture is an innate property of all surfaces (clouds, trees, bricks, hair etc…). It refers to visual patterns of homogeneity and does not result.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
Digital Watermarking
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Detection of Image Alterations Using Semi-fragile Watermarks
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Lecture#10 Spectrum Estimation
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Basic Message Coding 《 Digital Watermarking: Principles & Practice 》 Chapter 3 Multimedia Security.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
DEPARTMENT OF ECE, BEC, BAGALKOT
UNIT-III Signal Transmission through Linear Systems
PATTERN COMPARISON TECHNIQUES
Introduction to Audio Watermarking Schemes N. Lazic and P
IMAGE COMPRESSION.
IMAGE PROCESSING IMAGE WATERMARKING
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Vishal Monga, Divyanshu Vats and Brian L. Evans
K. ZEBBICHE , F. KHELIFI and A. BOURIDANE
Watermarking with Side Information
Basic Concepts of Audio Watermarking
Watermarking for Image Authentication ( Fragile Watermarking )
Pei Qi ECE at UW-Madison
Increasing Watermarking Robustness using Turbo Codes
Signal-Coherent Watermarking Schemes
A User Attention Based Visible Watermarking Scheme
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Reference Ingemar J. Cox, Joe Kilian, F. Tomson Leighton, and Talal Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Trans. On Image.
Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking IEEE Trans. On Signal Processing, April 2003 Multimedia Security.
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Information Theoretical Analysis of Digital Watermarking
Presenter: Shih-Hsiang(士翔)
Digital Watermarking (cont.)
Presentation transcript:

Spread Spectrum Watermarking Multimedia Security

Spread Spectrum Communication A Narrow-band signal is transmitted over a much larger bandwidth such that the signal energy presented in any signal frequency is undetectable.

Watermarking (1/3) A watermark is spread over many frequency bins so that the energy in one bin is very small and certainly undetectable.

Watermarking (2/3) Because the watermark verification process knows the location and content of the watermark, it is possible to concentrate these weak signals into a single output with high SNR.

Watermarking (3/3) Remark: To destroy such a watermark would require noise of high amplitude to be added to all frequency bins.

Why it is secure? The location of the watermark is not obvious Frequency regions should be selected that ensures degradation of the original data following any attack on the watermark

Why/How it is imperceptible? (1/2) The energy in the watermark is sufficiently small in any single frequency coefficient It is possible to increase the energy present in particular frequencies by exploiting knowledge of masking phenomena in human auditory and visual systems

Why/How it is imperceptible? (2/2) Upon applying a frequency transformation (FFT/DCT) to the data, a perceptual mask is computed that highlights perceptual significant regions in the spectrum that can support the watermark without affecting perceptual fidelity.

Why it is robust? (1/2) To be confident of eliminating a watermark, an attack must attack all possible frequency bins with modifications of certain strength → create visible defects in the data

Why it is robust? (2/2) Unintentional signal distortions due to compression or image manipulation, must leave the perceptually significant spectra components intact, otherwise the resulting image will be severely degraded.

Spread Spectrum Watermarking (1/2) In order to place a length n watermark into an N×N image, the N×N DCT of the image is computed and watermark is placed into the n highest magnitude coefficients (which are data dependent) of the transformed image, excluding the DC component (not necessary).

Spread Spectrum Watermarking (2/2) A watermark consists of a sequence of real numbers X = x1 , … , xn , where each value xi is chosen independently according to N(0,1) : normal distribution assumption

Watermark Insertion (1/2) When we insert X into V to obtain V ’ we specify a scaling parameter α, which determines the extent to which X alters V.

Watermark Insertion (2/2) vi’ = vi + α xi vi’ = vi (1 +α xi ) = vi +α xi vi vi’ = vi ( e α x i ) or log vi’ = log vi + α xi (1) may not be appropriate when the values of vi varying widely!! Insertion based on (2) or (3) are more robust against ‘different in scales.’

Determination of α (1/5) A single α may not be applicable for perturbing all of the values vi , since different spectral components may exhibit more or less tolerance to modification

Determination of α (2/5) vi’ = vi (1 +αi xi ) Where αi can be viewed as a relative measure of how much one must alter vi to alter the perceptual quality of the host.

Determination of α (3/5) A large αi means that one can perceptually ‘get away’ with altering vi by a large factor without degrading the host. (2) can be viewed as a special case of the generalized (1) ( vi’ = vi (1 +αi xi ) ), for αi =α vi

Determination of α (4/5) A large value is less sensitive to additive alternations than a small value

Determination of α (5/5) Question How sensitive a image to various additive alternations is highly related to Human perceptual systems. Subjective distance measurement : JND Objective distance measurement mean αj ~ median | vj* - vj | max

Choice of n (1/2) The choice of n indicated the degree to which the watermark is spread out among the relevant components of the image. In general, as the number of altered components are increased the extent to which they must be altered decreases - the ability to against attacks ↓

Choice of n (2/2) Information theoretic assessment Channel Capacity Rate-Distortion Theory

Evaluating the Similarity : Detection scheme X* : the extracted mark Sim ( X , X* ) = ( X*‧X ) / sqrt ( X*‧X* ) X and X* match, if Sim ( X , X* ) > T Minimize the rate of False Negatives (missed detections) False Positive (false alarms)

Other Issues Is there any post processing that can improve the watermark detection performance? Statistical approach Optimization approach: NN, GA With the aid of the knowledge of the host : Communication with side information Game Theory

Attacks (1/2) Collision attack Image Scaling JPEG Compression Dithering Distortion Cropping attack Print, Xerox, and Scan

Attacks (2/2) Attack by Watermarking Watermarked Image - multiple watermarking Sometimes, this is a must Sometimes, this produces ‘Watermark Dilemma’