Increasing Watermarking Robustness using Turbo Codes

Slides:



Advertisements
Similar presentations
Scrambler Mismatch and MAC FEC: Is there a problem?
Advertisements

Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
A Comprehensive Design Evaluation for SPIHT Coding 台北科技大學資工所指導教授:楊士萱學生:廖武傑 2003/06/05.
Inserting Turbo Code Technology into the DVB Satellite Broadcasting System Matthew Valenti Assistant Professor West Virginia University Morgantown, WV.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
C M S 2001 Darmstadt 1 Optimization of Watermarking Performances using Error Correcting Codes and Repetition S.Zinger, Z.Jin, B.Sankur*, H. Maître Ecole.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Adaptive MPEG-2 Video Data Hiding Scheme Anindya Sarkar, Upmanyu Madhow, Shivkumar Chandrasekaran, B. S. Manjunath Presented by: Anindya Sarkar Vision.
Bit-Plane Watermarking for SPIHT-Coded Images 台北科技大學資工所 指導教授:楊士萱 學生:廖武傑 2003/07/29.
Scalable Wavelet Video Coding Using Aliasing- Reduced Hierarchical Motion Compensation Xuguang Yang, Member, IEEE, and Kannan Ramchandran, Member, IEEE.
Coded Modulation in Fading Channels Ryan Aures Matthew Holland ECE 492 Mobile Communications.
Methods of Image Compression by PHL Transform Dziech, Andrzej Slusarczyk, Przemyslaw Tibken, Bernd Journal of Intelligent and Robotic Systems Volume: 39,
Improving the Performance of Turbo Codes by Repetition and Puncturing Youhan Kim March 4, 2005.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Perceptual Watermarks for Digital Image and Video ECE 738 paper presentation Pei Qi ECE at UW-Madison
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Channel Coding Part 1: Block Coding
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Title of On the Implementation of a Information Hiding Design based on Saliency Map A.Basu, T. S. Das and S. K. Sarkar/ Jadavpur University/ Kolkata/ India/
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
WATERMARKING Adviser :葉家宏 老師 Presenter :邱怡雯 Date : 2011/03/28.
Iterative Multi-user Detection for STBC DS-CDMA Systems in Rayleigh Fading Channels Derrick B. Mashwama And Emmanuel O. Bejide.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
Post-processing of JPEG image using MLP Fall 2003 ECE539 Final Project Report Data Fok.
Coding Theory. 2 Communication System Channel encoder Source encoder Modulator Demodulator Channel Voice Image Data CRC encoder Interleaver Deinterleaver.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
劉晟志 2010/03/21 Homework 1. watermarking. Hide “nsysu logo” into the 3 rd bit plane.
Multiple-description iterative coding image watermarking Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 20, No. 4, pp , 2010.
NTIT1 A chaos-based robust wavelet- domain watermarking algorithm Source: Chaos, Solitions and Fractals, Vol. 22, 2004, pp Authors: Zhao Dawei,
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.
Real-Time Turbo Decoder Nasir Ahmed Mani Vaya Elec 434 Rice University.
JPEG - JPEG2000 Isabelle Marque JPEGJPEG2000. JPEG Joint Photographic Experts Group Committe created in 1986 by: International Organization for Standardization.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
COMPARATIVE STUDY OF HEVC and H.264 INTRA FRAME CODING AND JPEG2000 BY Under the Guidance of Harshdeep Brahmasury Jain Dr. K. R. RAO ID MS Electrical.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Date of download: 6/2/2016 Copyright © 2016 SPIE. All rights reserved. Watermarking the intensity component of a color image using the IHS color coordinate.
ISSCS 2009, Iasi, Romania1 On the Choice of the Mother Wavelet for Perceptual Data Hiding Corina Nafornita, Alexandru Isar Politehnica University of Timisoara.
10/19/20051 Turbo-NFSK: Iterative Estimation, Noncoherent Demodulation, and Decoding for Fast Fading Channels Shi Cheng and Matthew C. Valenti West Virginia.
12/12/2003EZW Image Coding Duarte and Haupt 1 Examining The Embedded Zerotree Wavelet (EZW) Image Coding Method Marco Duarte and Jarvis Haupt ECE 533 December.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
DEPARTMENT OF ECE, BEC, BAGALKOT
FHTW Wavelet Based Video Compression Using Long Term Memory Motion-Compensated Prediction and Context-based Adaptive Arithmetic Coding D.Marpe, H.L.Cycon,
High Capacity Data Embedding in JPEG Bit Streams Using Visual Models
K. ZEBBICHE , F. KHELIFI and A. BOURIDANE
Robustness Evaluation of Perceptual Watermarks
Coding for Noncoherent M-ary Modulation
Coding and Interleaving
Reversible Data Hiding in JPEG Images using Ordered Embedding
Pei Qi ECE at UW-Madison
Increasing Watermarking Robustness using Turbo Codes
Chapter 6.
A Data Hiding Scheme Based Upon Block Truncation Coding
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Direct Sequence Spread Spectrum Modulation and Demodulation using Compressive Sensing Under the guidance of M.Venugopala Rao Submitted by K.Y.K.Kumari.
Hiding Data in a Color Palette Image with Hybrid Strategies
Spread Spectrum Watermarking
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Hiding and Its Applications
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Author: Minoru Kuribayashi, Hatsukazu Tanaka
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Homework #2 Due May 29 , Consider a (2,1,4) convolutional code with g(1) = 1+ D2, g(2) = 1+ D + D2 + D3 a. Draw the.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
On SVD-based watermarking algorithm
An imperceptible spatial domain color image watermarking scheme
A Data Hiding Scheme Based Upon Block Truncation Coding
A Second Order Statistical Analysis of the 2D Discrete Wavelet Transform Corina Nafornita1, Ioana Firoiu1,2, Dorina Isar1, Jean-Marc Boucher2, Alexandru.
Presentation transcript:

Increasing Watermarking Robustness using Turbo Codes Corina Nafornita, Alexandru Isar, Maria Kovaci Politehnica University of Timisoara Email: {corina.nafornita, alexandru.isar, maria.kovaci@etc.upt.ro} WISP 2009, Budapest, Hungary

Goal Duo-binary turbo codes Robustness Capacity Imperceptibility Watermarking requirements Perceptual mask - DWT WISP 2009, Budapest, Hungary

Barni et al., 2001 Daubechies-6 Watermark Marked Original Mask IDWT WISP 2009, Budapest, Hungary

Proposed solution Artifacts  low resolution mask High resolution mask Watermark easily erased All resolution levels New approach: duo-binary turbo codes WISP 2009, Budapest, Hungary

New method Bior2.2 DBTC Encoded Watermark Marked Original New mask message New mask Encoded Watermark Original Marked DWT IDWT Bior2.2 Select only higher coefficients!!! WISP 2009, Budapest, Hungary

Mask estimation Low resolution vs. High resolution (Barni et al.,2001) (Nafornita et al.,2006) WISP 2009, Budapest, Hungary

Duo-Binary Turbo Code 8-state duo binary RSC encoder , rate 2/3. RSC r-ary ilv Input sequence r u 1 c1 c2 u2 1 c =u0 S1 u1 S3 S2 8-state duo binary RSC encoder , rate 2/3. Encoder polynomials: 15 (feedback) and 13 (redundancy) WISP 2009, Budapest, Hungary

Experiments Test image Lena Message length: 768 bits Block size 7 Threshold 10 Watermark strength =9 PSNR obtained 29.95 dB Lena Watermarked Lena WISP 2009, Budapest, Hungary

AWGN: σ=3.25…15 BER vs.  BER vs. PSNR WISP 2009, Budapest, Hungary

JPEG compression: Q=10…100 BER vs. quality factor BER vs. PSNR WISP 2009, Budapest, Hungary

Coded vs. Uncoded Attack vs. BER BER Uncoded DBTC JPEG compression, Q=50, PSNR=32.94 dB 0.167132 0.001488 AWGN, =8, PSNR=29.29 dB 0.0885 3.25·10-4 WISP 2009, Budapest, Hungary

Conclusions BER decreases in both cases when using turbo codes Less severe attacks: perfect reconstruction, the attack modeled like an AWGN channel with high SNR. Coding gain of DBTC higher than 2 dB WISP 2009, Budapest, Hungary