An Algorithm for Removable Visible Watermarking

Slides:



Advertisements
Similar presentations
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
Advertisements

1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Fifth International Conference on Information
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:
Reversible medical image watermarking based on wavelet histogram shifting Source: Authors: Reporter: Date: The Imaging Science Journal, Vol. 59, No. 1,
Multiple Image Watermarking Applied to Health Information Management
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
NTIT1 A chaos-based robust wavelet- domain watermarking algorithm Source: Chaos, Solitions and Fractals, Vol. 22, 2004, pp Authors: Zhao Dawei,
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
An Image Retrieval Approach Based on Dominant Wavelet Features Presented by Te-Wei Chiang 2006/4/1.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
Watermarking Scheme Capable of Resisting Sensitivity Attack
JPEG Compressed Image Retrieval via Statistical Features
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Der-Chyuan Lou and Jiang-Lung Liu,
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Image camouflage by reversible image transformation
Picode: A New Picture-Embedding 2D Barcode
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source: Journal of Visual Communication and Image Representation, Vol
Mean value based reversible data hiding in encrypted images
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
A Color Image Hidden in a
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Wavelet Transform Fourier Transform Wavelet Transform
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Reduction of blocking artifacts in DCT-coded images
Improved joint reversible data hiding in encrypted images
Reversible Data Hiding
Reversible Data Hiding in JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Data hiding method using image interpolation
Source : Journal of Visual Communication and Image Representation, vol
Partial reversible data hiding scheme using (7, 4) hamming code
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Digital Watermarking for Image Authentication with Localization
Data hiding method using image interpolation
Source: Pattern Recognition Letters 29 (2008)
A Semi-blind Watermarking Based on Discrete Wavelet Transform
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
Reverse Seam Carving 2011 Sixth International conference on Image and Graphics Gang Pan, Weishu Li, Wei Bai, Jinyan Chen, and Luyuan Li Speaker: Hon-Hang.
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
Blind Reversible Authentication Based on PEE and CS Reconstruction
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Information Protection and Recovery with Reversible Data Hiding
An imperceptible spatial domain color image watermarking scheme
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Dynamic improved pixel value ordering reversible data hiding
An Efficient Spatial Prediction-Based Image Compression Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Presentation transcript:

An Algorithm for Removable Visible Watermarking Source: Circuits and Systems for Video Technology, Vol 16,  Issue 1,  Jan. 2006, pp. 129 – 133 Authors: Yongjian Hu, Kwong S, and Jiwu Huang. Speakers: Hong-Hang Chang. Date: 12. 21. 2009

Outline Introduction Related work Proposed scheme Experimental Result Conclusion

Introduction This is a original Image. And then, we can embedded the watermark to the original image by the information of the key. So if we have the original image, watermark and the key , we can embedded the watermark to the original image. Then, how can I extract the watermark from the watermarked image. The work is similar to the embedded work , we need a watermark and a key , then we can remove the watermark from the watermarked image soblutely.

HL HL LL LL LH LH HH HH Related work DWT LL2 HL2 LH2 HH2 LL HL HH LH 130 110 100 120 115 105 95 88 90 79 127 126 125 101 DWT LL LL2 HL2 HL HL 240 210 20 -10 235 200 5 10 178 167 -2 8 253 226 1 24 LL LL LH2 HH2 LH LH HH HH 475 410 25 431 393 -1 32 5 10 15 -20 -75 -59 -3 -16 LL HL HH LH

HL HL LH LH HH HH Proposed scheme LL2 HL2 LH2 HH2 LLK LHK HLK HHK LL2 HL2 HL HL LLK LH2 HH2 Low-Frequency Suspend LH LH HH HH LH HH HL HL2 LH2 HH2 k = the current scale of the DWT. K = the final scale of the DWT. High-Frequency Suspend

H W X Proposed scheme (Cont.) Suppose wh= 0.25 ww= 0.75 170 150 200 140 110 120 130 100 90 H 50 40 60 70 90 80 100 110 W Suppose wh= 0.25 ww= 0.75 170*0.25 + 50*0.75= 80 150*0.25 + 40*0.75= 67 . 90*0.25 + 90*0.75= 78 80 67 95 83 88 75 98 92 100 110 90 82 77 78 X

HL X Proposed scheme (Cont.) Low-Frequency Suspend Case1: take the H(1,1) for example. X(i,j) = the mean of the coefficients corresponding ‘0’ from nearest 8 neighbors . X(1,1)= (150+140)/2 =145 1 1 1 1 170 150 200 140 110 120 130 100 90 Case2: take the H(1,4) for example. X(i,j) = the mean of all the unchanged coefficients. X(1,4)= (170+150+…+77+78) / 16 = 91.625≈92 1 1 145 150 95 92 140 110 75 98 130 100 90 82 78 HL X

H W H W X Proposed scheme (Cont.) Low-Frequency Suspend 1 170 150 200 LH HH HL HL2 LH2 HH2 LH HH HL HL2 LH2 HH2 170 150 200 140 110 120 130 100 90 50 40 60 70 90 80 100 110 H W 170 150 140 120 130 90 100 50 40 70 90 80 200 150 110 120 100 140 90 130 H W X

Proposed scheme (Cont.) 1 40 20 5 160 50 90 -1 -5 -10 -20 4 -15 -30 High-Frequency Suspend 1 1 LH HH HL HL2 LH2 HH2 HLK LHK HHK Case1: take the H(1,2) for example. the mean of unchanged coefficients in its 8 neighbors. Case2: take the H(3,3) for example. the mean of unchanged coefficients in its 24 neighbors. Case3: take the H(4,4) for example. the mean of all unchanged coefficients . 40 5 20 160 50 90 -1 -5 3 -20 4 -15 1

Proposed scheme (Cont.) High-Frequency Suspend 40 5 20 160 50 90 -1 -5 3 -20 4 -15

Proposed scheme (Cont.) Retrieve A B C D E F G H I J K L M N O P 300 250 260 280 10 20 30 15 -2 -5 -1 7 5 …… a b c d e f g h i j k l m n o p 155 129 4 8 145 123 6 13 132 15 5 128 135 16 10 ……

Experiment result Fig. 1 PSNR (DB) OF RECOVERED IMAGES. LR AND ILR DENOTE LEGALLY AND ILLEGALLY RECOVERED IMAGES, RESPECTIVELY

Conclusion The experimental results have demonstrated that the legally obtained image has very high visual quality.