Watermarking Techniques Digital Rights Seminar © April 28, 2006 Mahmoud El-Gayyar.

Slides:



Advertisements
Similar presentations
Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Advertisements

Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Sheng-Wen Peng  Introduction  WATERMARKING FOR IMAGE AUTHENTICATION  COPY-COVER IMAGE FORGERY DETECTION  PCA Domain Method  EXPERIMENTAL.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
N-Secure Fingerprinting for Copyright Protection of Multimedia
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Fifth International Conference on Information
1 Audio Watermarking for Copyright Protection 報告人:鄒昇龍.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Robust Digital Right Management Scheme (DRM) for Multimedia Anuj Maheshwari Victor Sutan
Paul Blythe and Jessica Fridrich Secure Digital Camera.
Digital Watermarking Parag Agarwal
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp Authors: Chun-Wei Yang and Jau-Ji.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Zhejiang University Wavelet-based 3D mesh model watermarking Shi Jiao-Ying State Key Laboratory of CAD&CG, Zhejiang University, Hangzhou
Title of On the Implementation of a Information Hiding Design based on Saliency Map A.Basu, T. S. Das and S. K. Sarkar/ Jadavpur University/ Kolkata/ India/
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Multiple Image Watermarking Applied to Health Information Management
Digital Watermarking
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
Jaroslaw Kutylowski 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Robust Undetectable Interference Watermarks Ryszard Grząślewicz.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Basic Message Coding 《 Digital Watermarking: Principles & Practice 》 Chapter 3 Multimedia Security.
3D mesh watermarking Wu Dan Introduction Spatial domain (00 EG) Transformed domain (02 EG) K=D-A; (D ii is a degree of vertex v i, A is an.
A DIGITAL IMAGE WATERMARKING PREPARED BY AMAR RAEED KHORSHıD ALHıLALı ıD : R.G. Schyndel, A. Tirkel, and C. Osborne, “A Digital Watermark”, Procedding.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
IMAGE PROCESSING IMAGE WATERMARKING
DONE BY S.MURALIRAJAN M.NIRMAL
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
Parag Agarwal Digital Watermarking Parag Agarwal
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Digital Watermarking for Image Authentication with Localization
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Digital Watermarking Lecture 2
A Quadratic-Residue-based Fragile Watermarking Scheme
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Watermarking Techniques Digital Rights Seminar © April 28, 2006 Mahmoud El-Gayyar

First Part Watermarking Techniques in Spatial Domain Mahmoud El-Gayyar

* AGENDA * * First Part: Introduction a.Elements of a WM system b.Watermarking Requirements c.Watermarking Techniques * Second Part: A Fragile WM Technique a.Fragile Watermarking b.Fragile WM scheme + * Summary

Introduction -- Elements of a WM system * Elements of a WM System * Watermark Generator Watermark Generator Information Coder Information Coder Embedder Communication Channel Communication Channel Detector Signal Processing Signal Processing Watermark Generator Watermark Generator Information Coder Information Coder KgKg S0S0 S0S0 SwSw S’ w KK KgKg S0S0 W0W0 W0W0 WW W’ back

Introduction – WM Requirements * WM Requirements * 1. Security. a.Secrecy of WM b.Resist malicious attacks 2. Imperceptibility 3. Capacity 4. [Robustness] Robustness Capacity Imperceptibility

Introduction – WM Techniques * WM Techniques * Spatial DomainFrequency Domain Computation Cost LowHigh RobustnessFragileMore Robust Perceptual Quality High ControlLow Control Capacity High (depend on the size of the image) Low (1/16 of the host image) Example of Applications Mainly Authentication Copyright Protection

* AGENDA * * First Part: Introduction * Second Part: A Fragile WM Technique a.Fragile Watermarking b.Fragile WM scheme i.Symbol Definition ii.Embedding Algorithm iii.Detection Algorithm iv.Experiment on Attacks * Summary

Part 2 – Fragile WM * Fragile Watermarking * What is Fragile Watermarking? Type of Attack (Host Media Forgery) Unique Features: 1. High resolution tampering localization. 2. Tampering detection with low false positive. 3. Gemotric manipulation detectability. 4. Attack Identification. 5.Blind detection. 6.Proper Embedding Sequence: selection of dependency is limited to the previously watermarked portion of the image.

Part 2 – WM Scheme * WM Scheme * We will discuss a Fragile WM scheme depends on both of the contextual information and non- deterministic information to perform WM. Y.Yuan and C.Tsun. IEEE 2004 (17 th international conference of pattern recognition) Contextual (dependency) information: From other portions of the image. Non-deterministic information: randomly chosen parameters to produce a unique signature. link link Different non-deterministic signature for two identical blocks at the same position of two images.

Part 2 – WM Scheme – Symbol Definition * Symbols Definition * f:f:the original imagef ′:the image received by the watermark detector. f(i):i th pixel of fZ:Z:the size of the image f f M (i):the seven most significant bits of f(i) f l (i):the least significant bit of f(i) w:w:generated binary watermark of the same size M as the image f w(i):the i th bit of w w ′:the extracted binary watermark by the decoder w ′ (i):the i th bit of w ′ k:k:the length of dependency neighborhood. L:L:the size of the neighborhood, L= k × k. S(i):the secret non- deterministic dependency information of pixel i calculated N(i):the square dependency neighborhood centered at pixel i consisting of k × k pixels including pixel i itself D:D:the binary difference map between w and w ′ with its i th pixel denoted as D(i) (D(i)  {0, 255}) indicating whether w(i) and w ′ (i) are different. link

Part 2 – WM Scheme – Embedding Algorithm * Embedding Algorithm * 1. Generate w with the secret key shared with the detector. 2. For each pixel i in image f A. Calculate the secret dependency S(i) according to B. Adjust f l (i) so that the following equation holds (1) where  denotes the (XOR) operation. (2) linkBACK

Part 2 – WM Scheme – Detection Algorithm * Detection Algorithm * 1.Generate w with the secret key shared with the embedder. 2. For each pixel i a.Calculate the secret dependency S(i) from the received image f ′ according to Eq (1) b. Extract the watermark bit w ′ (i) according to: c. Calculate D(i) between w(i) & w'(i) using: (3) (4) link

Part 2 – WM Scheme – Experiment on Attack * Experiment on Attack * 1. Low-pass filtering attack. Example of common signal processing 2. Geometric attack. 3. Forgery attack. 4. VQ attack.

Part 2 – WM Scheme – Experiment on Attack- Low Pass * Low-Pass Filter Attack * a.Watermarked image. b.difference map after the watermarked image is low pass filtered.

Part 2 – WM Scheme – Experiment on Attack- Geometry * Geometry Attack * a.The cropped image. b. The difference map showing the cropped trace.

Part 2 – WM Scheme – Experiment on Attack- Forgery * Forgery Attack * a.The tampered image. b. The actual region tampered. c.The difference map with k=9 d.The difference map with k=7 LINK

Part 2 – WM Scheme – Experiment on Attack- VQ * VQ Attack * a.The image lena. b. The image with LSB and second LSB flipped. c.The image with the LSB plane flipped. d.The image with the second LSB plane flipped.

Part 2 – WM Scheme – Experiment on Attack- VQ * VQ Attack * continued a.The patched image. b. The difference map.

Summary * Summary *  Overview of the watermarking system (fragile watermarking)  Spatial watermarking scheme that can detect large range of attacks.  The discussed scheme has been extended to allow adding info. in more bits (2 and 3 bits)  high capacity + less quality

Thank You