H IGH CAPACITY WATERMARKING H YPERSPECTRAL I MAGES AUTHENTICATION Mehdi Fallahpour Jordi Serra-Ruiz David Megías.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
A reversible data hiding method by histogram shifting in high quality medical images Author: Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang Source: The.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Fifth International Conference on Information
Bit-Plane Watermarking for SPIHT-Coded Images 台北科技大學資工所 指導教授:楊士萱 學生:廖武傑 2003/07/29.
Scalable Wavelet Video Coding Using Aliasing- Reduced Hierarchical Motion Compensation Xuguang Yang, Member, IEEE, and Kannan Ramchandran, Member, IEEE.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
A Review on: Spread Spectrum Watermarking Techniques
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp Authors: Chun-Wei Yang and Jau-Ji.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Title of On the Implementation of a Information Hiding Design based on Saliency Map A.Basu, T. S. Das and S. K. Sarkar/ Jadavpur University/ Kolkata/ India/
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Multiple Image Watermarking Applied to Health Information Management
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Integrity of multimedia data ● Techniques for digital watermarking ● An example in the Wavelet domain ● Experimental results: evaluation.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
Introduction to Audio Watermarking Schemes N. Lazic and P
(k, n)-Image Reversible Data Hiding
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Der-Chyuan Lou and Jiang-Lung Liu,
Reversible Data Hiding in JPEG Images using Ordered Embedding
A Data Hiding Scheme Based Upon Block Truncation Coding
A Digital Watermarking Scheme Based on Singular Value Decomposition
Parag Agarwal Digital Watermarking Parag Agarwal
Source: Information Sciences, 2018, accpeted.
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Hiding and Its Applications
Author: Minoru Kuribayashi, Hatsukazu Tanaka
New Framework for Reversible Data Hiding in Encrypted Domain
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

H IGH CAPACITY WATERMARKING H YPERSPECTRAL I MAGES AUTHENTICATION Mehdi Fallahpour Jordi Serra-Ruiz David Megías

Outline 1. Introduction 2. Image data hiding 3. Audio watermarking 4. Hyperspectral images authentication 5. Conclusions and future research

3 Sender Receiver Internet illegal Information Watermarking

4 Sender Receiver Internet illegal Information Information Watermarking

5  Copyright protection was the original motivation  4 application categories 1. Copyright protection 2. Hidden information 3. Authentication 4. Secure and invisible communication Watermarking applications

6 Imperceptibility Robustness Capacity Trade-off Properties of digital watermarking

Outline 1. Introduction 2. Image data hiding 3. Audio watermarking 4. Hyperspectral images authentication 5. Conclusions and future research

High capacity, reversible data hiding in medical images  Reversible  Tiling and histogram shifting  30%-200% capacity improvement with still better image quality compared with Ni et al. [63] M. Fallahpour, D. Megías, M. Ghanbari, “High capacity, reversible data hiding in medical images”, IEEE International Conference on Image Processing, ICIP st contribution Image Data Hiding

Reversible Data Hiding Based On H.264/AVC Intra Prediction M. Fallahpour; D. Megías. “Reversible Data Hiding Based On H.264/AVC Intra Prediction”, International Workshop on Digital Watermarking (IWDW 2008). Lecture Notes in Computer Science 5450, pp. 52–60,  Reversible  Effective for removing error in H.264/Advanced Video Coding  Capacity is about 50 kbit and the PSNR of the marked image is about 48 dB  Improvement of capacity for the same transparency 1000% compared with Ni et al [63] 2 nd contribution Image Data Hiding

Reversible image data hiding based on gradient adjusted prediction  Reversible  Capacity is about 50 kbit and the PSNR of the marked image is about 48 dB.  Improvement of capacity under same transparency 1200% M. Fallahpour, “Reversible image data hiding based on gradient adjusted prediction”, IEICE Electron. Express, Vol. 5, No. 20, pp , (Impact factor 0.48 in 2008). 3 rd contribution Image Data Hiding

11 Scheme Whole (1 block) Tiling (4 blocks) Tiling (16 blocks) Intra prediction based GAP prediction based ReversibilityYes Blind detectionYes Capacity2k to 10k Increased by 10% to 100% Increased by 50% to 400% Increased by ~ 1000% Increased by ~ 1200% Transparency> 48 dB Summary Image Data Hiding

Outline 1. Introduction 2. Image data hiding 3. Audio watermarking 4. Hyperspectral images authentication 5. Conclusions and future research

High capacity method for real-time audio data hiding using the FFT transform  Low complexity: a very efficient method for real-time applications  Based on FFT transform and using the histogram shifting idea  Very high capacity (5 kbps)  Without significant perceptual distortion (ODG > – 1) and robust against MP M. Fallahpour, D. Megías, “High capacity method for real-time audio data hiding using the FFT transform” Advances in Information Security and Its Application Third International Conference, ISA 2009, Springer, Seoul, Korea, June 25-27, st contribution Audio watermarking

14 Robust high-capacity audio watermarking based on FFT amplitude modification Very high capacity (about 5 kbps) No significant perceptual distortion Robustness against common audio signal processing (added noise, filtering and MP3). Self-synchronization 80. M. Fallahpour, D. Megías, “Robust high-capacity audio watermarking based on FFT amplitude modification” IEICE Transactions on Information and Systems, Vol.E93-D,No.01, pp.-, Jan. 2010, in press (Impact factor 0.36 in 2008). 2 nd contribution Audio watermarking

15 Difference between the original and the MP3 compressed/decompressed Improvements

Robustness against (13 attacks): MP3-128, AddBrumm, AddDynNoise, ADDFFTNoise, Addnoise, AddSinus, Amplify, FFT_Invert, FT_RealReverse, FFT_Stat1, Invert, RC_LowPass, RC_HighPass Robustness against 13 attacks Capacity 1.5 kbps to 8.5 kbps Transparency Imperceptible, not annoying 16 Experimental results

17 High capacity audio watermarking using FFT amplitude interpolation Take advantage of interpolation in FFT domain Very high capacity (about 3 kbps), No significant perceptual distortion (ODG about –0.5) Robustness against common audio signal processing such as echo, add noise, filtering, resampling and MPEG compression (MP3). 79. M. Fallahpour, D. Megías, “High capacity audio watermarking using FFT amplitude interpolation”, IEICE Electron. Express, Vol. 6, No. 14, pp , 2009, (Impact factor 0.48 in 2008). 3 rd contribution Audio watermarking

18 Interpolation

Robustness against (18 attacks): AddBrumm, AddDynNoise, ADDFFTNoise, Addnoise, AddSinus, Amplify, BassBoost, Echo, FFT_HLPassQuick, FFT_Invert, Invert, Resampling, LSBZero, MP3, Noise_Max, Pitchscale, RC_HighPass, RC_LowPass Robustness against 18 attacks Capacity About 3 kbps Transparency Imperceptible, not annoying 19 Experimental results

20 DWT–based high capacity audio watermarking High frequency band of the wavelet Divide the high frequency band into frames and then, for embedding, use the average of the relevant frame Very high capacity (about 5.5 kbps) Without significant perceptual distortion Robustness against common audio signal 81. M. Fallahpour, D. Megías, “DWT–based high capacity audio watermarking” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E93-A, No.01, pp.-, Jan. 2010, in press (Impact factor 0.43 in 2008). 4 th contribution Audio watermarking

Robustness against (19 attacks): AddBrumm, Echo, AddDynNoise, AddFFTNoise, Addnoise, AddSinus, Amplify, BassBoost, FFT_HLPassQuick, FFT_Invert, FFT_RealReverse, Invert,LSBZero, MP3, Noise_Max, RC_HighPass, RC_LowPass, Smooth, Quantization Robustness against 19 attacks Capacity About 5.5 kbps Transparency Imperceptible, not annoying 0 > ODG > –1 21 Experimental results

[1 * ]H. Kang, K. Yamaguchi, B. Kurkoski, K. Yamaguchi, and K. Kobayashi, “Full-Index-Embedding Patchwork Algorithm for Audio Watermarking”, IEICE TRANS. On Information and Systems, E91-D(11): , 2008 [2 * ] J. J. Garcia-Hernandez, M. Nakano-Miyatake and H. Perez- Meana, “Data hiding in audio signal using Rational Dither Modulation”, IEICE Electron. Express, Vol. 5, No. 7, pp , [7 * ] M. A. Akhaee, M. J. Saberian, S. Feizi, F. Marvasti. “Robust Audio Data Hiding Using Correlated Quantization With Histogram-Based Detector” IEEE TRANS. ON Multimedia,V11, P 1-9, [4 ** ] S. Xiang, H.J. Kim, J. Huang, “Audio watermarking robust against time-scale modification and MP3 compression,” Signal Processing, Vol.88 n.10, pp , October, Algorithm SNR (dB) ODG of marked Payload (bps) Robustness Real time scheme [78]––1 to 02.5 k to 8.5 kMP3 FFT scheme [80]35 to 44–1 to 01.5 k to 8.5 k13 Interpolation scheme [79]30.5–1 to 03 k18 Wavelet scheme [81]33–1 to 05.5 k19 IEEE Trans [7]25–1766 IEICE 2008 [1]25–436 ELEX Trans [2]––68913 Signal Processing 2008 [4] 40–2 to – Comparison

Outline 1. Introduction 2. Image data hiding 3. Audio watermarking 4. Hyperspectral images authentication 5. Conclusions and future research

24 Hyperspectral images Signatures with real terrain information Images with multiple bands. Huge information High cost Hyperspectral image authentication

25 Tree vector quantization (TSVQ) and DWT-based hyperspectral images authentication Some selected bands are marked. Wavelet Transform is applied. The watermark is a criterion over TSVQ. (32x32) pixels block tampering detection. Hyperspectral image authentication

dB of PSNR (original – marked image) means values modification: 15 – 20 (max ) Experimental results Difference histogram Signatures original and marked (shifted down 200 units)

Outline 1. Introduction 2. Image data hiding 3. Audio watermarking 4. Hyperspectral images authentication 5. Conclusions and future research

28 Use histogram shifting (50 kbit & 48 dB) PropertyImage DH Capacity Transparency Reversibility Blind detection Conclusions and future research Image data hiding Have a narrower histogram Ideal 256 kbit (1 bpp) under 48 dB Using histogram shifting in color images

29 HAS helps to design Excellent capacity and transparency Robust against attacks 1. Configure the parameters that depend on the scheme 2. Repeating secret bits Frequency domain is complex and robust DWT or FFT Conclusions (II) Conclusions and future research Audio watermarking Real scenario (synchronization, real time) Improve robustness Take advantage of wavelet transforms Repeat secret bits based on behavior of attacks

?...