Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Secure Spread Spectrum Watermarking for Multimedia Ishani Vyas CS590 Winter 2008.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Perceptual Watermarks for Digital Image and Video ECE 738 paper presentation Pei Qi ECE at UW-Madison
Digital Watermarking Parag Agarwal
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Cryptography, Authentication and Digital Signatures
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
Digital watermarking: algorithms and applications
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
1 Robust and transparent watermarking scheme for colour images Speaker : Po-Hung Lai Adviser : Chih-Hung Lin Date :
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
K. ZEBBICHE , F. KHELIFI and A. BOURIDANE
DONE BY S.MURALIRAJAN M.NIRMAL
Watermarking with Side Information
Basic Concepts of Audio Watermarking
Pei Qi ECE at UW-Madison
Dept. of Elec. & Comp. Engineering
Parag Agarwal Digital Watermarking Parag Agarwal
Spread Spectrum Watermarking
Information Theoretical Analysis of Digital Watermarking
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash

Presentation Outline n The growing need for watermarking n Basic encryption techniques and limitations n Important factors for watermark n Overview of visual models n Watermarking techniques n Spread Spectrum watermarking n Watermarking and the Internet n Current applications n Conclusion

Motivation n Digital data can be copied without compromising the quality of the copied object. n Digital objects can be copied and distributed anonymously with no way to identify the criminals. n Copyright protection of multimedia data is essential for network data delivery. n Number of watermarking publication grew from 2 in 1992 and 1993 to 64 in 1997[1].[1].

Encryption Techniques n Public key cryptography involves two keys a private and a public key that are mathematically related so that a message encrypted with one can be decrypted with the other. n Private key or symmetric key cryptography:every user possess only one type of key, which is being used for the encryption, and decryption of messages.

Certificate Authority (CA) Services n security of data, privacy of data, business policies, and transaction processing integrity n they provide a public key certificate, which is a digital document that irrevocably binds a person’s identity to a public key n Time stamping services n well established CA’s are BBB online, Truste, Veri-Sign, ICSA, and Web- Trust[16].

Limitations of Encryption Techniques n Although encryption protects content through the delivery process, once the content is decrypted the data is no longer protected and therefore can be copied and distributed without compromising the identity of the participants. n Watermarking and encryption should be used as two complimentary techniques

Definition of Digital Watermark n A digital watermark is a visible or perfectly invisible, identification code that is permanently embedded in the data and remains present within the data after any decryption process[4]. n makes possible to identify the source, author creator owner, distributor, and authorizes consumer of digitized images [4].

Important Factors for Watermarking n Difficult to notice (transparency). –to place it in the most insignificant parts of the image –contradicts the requirements for robustness –The limitation of compression algorithms[6]

Important Factors for Watermarking n Robustness –robust to transformations that include common signal distortions as well as digital to analog and analog to digital conversion, and geometric distortions. –The watermark should be present in the data after distortion –The watermark detector should be able to detect the watermark.

Important Factors for Watermarking n Tamper Resistance –The same image might be distributed with different watermarks for the purpose of buyer identification. –Threat: Buyers may collude in an attempt to tamper the watermark. –The watermark should be tamper resistance.

Important Factors for Watermarking n Capacity –Multiple identifiable watermarks n Universal –The same digital watermark should apply for all three multimedia objects. n Scalability –the cost of decoding is very important –should support real time decoding

Visual Models n By incorporating perceptual knowledge into the watermark scheme it is possible to insert the watermark into most significant part of the image n Use of the visual models provide thresholds for how much a given transform coefficient can change before such changes are noticeable

Frequency sensitivity n sensitivity mainly uses Modulation Transfer Function (MTF). This function describes the human eye's sensitivity to sine wave at various frequencies. n Given that the minimum viewing distance is fixed it is possible to determine a static just noticeable difference (JND) threshold for each frequency band. n This frequency sensitivity technique provides a basic visual model that depends only on the viewing conditions and is independent of image content.

Visual Models (Cont..) n Luminance Sensitivity: a way to measure the effect of the detectability threshold of noise on a constant background. n Contras Masking: Contrast masking refers to the detectability of one signal in the presence of another signal.

Discrete Cosine Transformation (DCT) n. The DCT has become the standard method for image compression n typically the image is divided into 8x8 pixel blocks, where each block is transformed into 64 transform coefficients

Spatial watermarks n Spatial watermarks provide simple and effective schemes for embedding an invisible watermark into the original image n they are not robust to common image alteration. n resulting image of high quality but not robust to attacks. Spatial watermarking techniques include the checksum technique, and the basic spread spectrum approach.

Spatial watermarks(cont.) n Checksum Technique –formed of the values of the seven most significant bits of all pixels in the image.

Spread Spectrum Communication. n Spread spectrum system is one in which the transmitted signal is spread over a wide frequency band. n The codes used for spreading have low cross correlation values and are unique to every user.

Advantages of Spread Spectrum Communication n Resist intentional and unintentional interference. n Can share the same frequency band with other users (multiple watermark). n Protect the privacy, due to the pseudo random code sequence.

Secure Spread Spectrum Watermarks for Multimedia n spread spectrum watermark based on DCT [4]. n Cox et al asserted that in order for a watermark to be robust, it need to be placed in the most significant part of the image. n the watermark will be composed of random numbers drawn from a Gaussian N(0,1) distribution

Secure Spread Spectrum Watermarks for Multimedia General procedure: n Applying frequency transformation to the data. n Computing perceptual mask to highlight the most significant regions in the spectrum that can support the watermark without affecting the image fidelity (V).

Secure Spread Spectrum Watermarks for Multimedia n Inserting the watermark to the image. n Inverse DCT

Secure Spread Spectrum Watermarks for Multimedia Watermark Structure A watermark consists of a sequence of real numbers X=x1……Xn where each value x i is chosen independently according to N(0,1).

Secure Spread Spectrum Watermarks for Multimedia n A sequence of values V=v 1....v n is extracted from each document D. The watermark x i is then inserted into the value v i and results in V’=v’ 1...v’ n. n. V’ is inserted to the image instead of V and the result is document D’ n An attacker might alter document D’ into D*. Given D and D* watermark X* is extracted and is compared to X for statistical significance

Secure Spread Spectrum Watermarks for Multimedia Insertion of the watermark n v’ i =v i (1+a i x i ) where a is a parameter which determines the extent to which X alters V. n The author does not provide a solution for how to compute a in order to maximize the robustness of the watermark.

Secure Spread Spectrum Watermarks for Multimedia Evaluating the similarity of the watermark n The extracted watermark might differ from the original watermark. n sim(X,X*)= X*·X/SQRT(X*·X*) n one should decide on a threshold T, and compare sim(X,X*)>T n Set T to minimize the false positives and false negatives. n This requires the independence of X*,X

Image and Watermarked Image

Uniqueness of the Watermark

Image Scaling The watermark is still noticeable on the small image.

Experiment (Cont.) n JPEG distortions n Dithering distortions n Cropping n Xerox and Scan n Adding multiple watermarks

Disadvantages n The need to have the original image to be able to detect the watermark. n Since the DCT transform is based on the whole image, the transform does not allow for any local spatial control of the watermark. n Does not provide a maximum use of the human visual system

Image Adaptive Watermarking n Wolfgang et al [1]developed this model based on [4]. n The image adaptive DCT algorithm is based on 8x8 DCT framework which allows to incorporate visual masking effects. n All local information is extracted from the visual models stored in a Just Noticeable Difference (JND) Matrix.

Image Adaptive Watermarking n The JND is derived from image independent frequency sensitivity and image dependent luminance sensitivity and contrast masking. n This assists in determining the maximum amount of watermark signal the can be tolerated.

Image Adaptive Watermarking X u,v,b + J u,v,b W u,v,b X u,v,b >J u,v,b X* u,v,b = X u,v,b, otherwise n where X u,v,b refers to the coefficient in position (u,v) of block b, X* u,v,b is the watermarked DCT coefficients, W u,v,b is the sequence of watermark values and J u,v,b is the computed Just Noticeable Difference.

Image Adaptive Watermarking n The watermark insertion is not limited only to the most significant part of the image, the goal is to place the maximum strength watermark sequence.

Detection W* s,u,v,b = X u,v,b - X* u,v,b n W* u,v,b = W* u,v,b,s /J u,v,b n P ww*= (w*w)/(w*w*) n The probability P ww which is a normalized correlation coefficient between the two signals w and w* is used to check the threshold for the watermark detection. n Again P is examined against a threshold which is designed to balance false positives and false negatives.

Experiment n In the first image the figures are fairly uniform, therefore we cannot take full advantage of the image adaptive watermark. n In the second image the content is non uniform a fact that allows us to take full advantage of the image adaptive watermark.

JPEG Compression

Rescaling

WWW Applications n trusted third parties –A valid public key with registered identity. – Transfer the image to the third party (watermarking server). –The server verify that there are no previous watermarks and timestemps. –The server embed the watermark and a timestamp into the image and save it. –The server encrypts the watermarked image and the unique id with the customer’s public key, and sends it to the customer.

WWW Applications (Cont.) n The watermark is searching the internet on a continuos basis and look for watermarked images. n The watermark server issues a report to the image owner regarding the location of all the copies of the image. n It is crucial to have a standard watermarking technique, so that watermarked can be identified by multiple certificate authorities.