Digital watermarking technique for protecting digital images

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Technical Aspects of Digital Rights Management
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Watermarking Technology Ishani Vyas CS590 Winter 2008.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Audio Steganography Echo Data Hiding
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital Watermarking
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
ELE 488 F06 ELE 488 Fall 2006 Image Processing and Transmission (12 – 7 – 06) Digital Watermarking What? Why? How? Attacks, Legal issues 12/7.
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
DEPARTMENT OF ECE, BEC, BAGALKOT
DCT watermarking Speaker: Paul 1.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
IMAGE PROCESSING IMAGE WATERMARKING
Visible Watermarking of An Image Using DCT Technique
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
DONE BY S.MURALIRAJAN M.NIRMAL
Image Watermarking Chu, Hsi-Cheng.
Watermarking for Image Authentication ( Fragile Watermarking )
Dept. of Elec. & Comp. Engineering
Parag Agarwal Digital Watermarking Parag Agarwal
Digital Watermarking for Image Authentication with Localization
Digital Watermarking Lecture 2
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Digital watermarking technique for protecting digital images Nibedita Sahoo M.Tech (ICT) Roll no.-10IT61B01

Agenda Watermark and digital watermarking Basic characteristic Watermark attacks Watermarking technique Spatial Domain watermarking Transform Domain Watermarking Techniques Current application area Future trends Conclusion Reference

What is watermark? A distinguishing mark impressed on paper during manufacture; visible when paper is held up to the light (e.g. $ Bill)

What is digital watermarking? In generally digital watermarking is a technique for inserting information into an image. It is an evolving field that requires continuous effort to find the best possible method in protecting multimedia content. It is a process of embedding information into digital multimedia content such that the information can later be extracted or detected for variety of purposes including identification and authentication.

Block diagram for watermarking digital image Original image Embedding procedure Watermark digital image

Example : Digital watermarking Original image Watermark Digital watermarking

Basic characteristic of digital watermarking Capacity The optimum amount of data that can be embedded in a given signal. Robustness We embed and retrieve data such that it would survive malicious or accidental attempts. Security We determine that the information embedded has not been tampered, forged or even removed . Transparency The watermark is not visible in the image under typical viewing conditions.

Watermark Attacks Active Attacks Passive Attacks Forgery Attacks Hacker attempts to remove or destroy the watermark. Passive Attacks Hacker tries to find if a watermark is present. Removal of watermark is not an aim. Forgery Attacks Hacker tries to embed a valid watermark. Serious in authentication. If hacker embeds a valid authentication watermark, watermark detector can accept modified media.

Types of watermarking techniques

1.According to working domain Spatial domain Direct usage of data to embed and extract Watermark. Spatial watermarking can also be applied using color separation. In this way, the watermark appears in only one of the color bands. This renders the watermark visibly subtle such that it is difficult to detect under regular viewing. However, the mark appears immediately when the colors are separated for printing. Frequency Domain This technique is motivated by both perceptual transparency and watermark robustness. This technique is very effective both in terms transparency, robustness to signal processing.

2.According to the type of document Image Watermarking Video Watermarking Audio Watermarking Text Watermarking

3.According to the human perception Visible watermark In visible digital watermarking, the information is visible in the picture or video. Typically, the information is text or a logo, which identifies the owner of the media. Invisible-Robust watermark Information is added as digital data to audio, picture, or video, but it cannot be perceived. Invisible-Fragile watermark A fragile marking system should be able to detect any changes made in a marked image after marking. Fragile watermarking is mainly used for integrity protection, which must be very sensitive to the changes of signal.

4.According to application source based Source-based watermark are desirable for ownership identification or authentication where a unique watermark identifying the owner is introduced to all the copies of a particular image being distributed. Destination based In case of destination based where each distributed copy gets a unique watermark identifying the particular buyer. The destination based watermark could be used to trace the buyer in the case of illegal reselling. (EX- FINACLE SOFTWARE BY INFOSYS)

Digital Image Processing An image is a 2-D Signal – Spatial signal – Intensity value as I(X,Y) Digital image – Digitized 2-D signal Use rectangular shape areas called pixels Digital representation: 8-bit, 12-bit, 16-bit, …

Review of Digital Image Processing Digital images are represented using matrices:

Types Watermarking The hidden message may be added in Spatial Domain Discrete Fourier Transform (DFT) Domain Discrete Cosine Transform (DCT) Domain Discrete Wavelet Transform Domain (DWT)

Spatial domain Watermarking The term spatial domain refers to the aggregate of pixel composing an image. Spatial domain methods are procedures that operate directly on the pixels. Watermark message M(x,y) – Random or pseudo random signal – Binary { -1,+1} or { -1, 0, +1} – other signals are used Watermark message is added linearly as: W(x,y)= I(x,y)+kM(x,y)

Contd. The watermark message is added in the spatial Domain: IM (x, y) = I (x, y) + kM(x, y)

Spatial Domain Watermark Embedding Scheme Overview: We will first embed the watermark into X and then redirect the watermark to the saturation component of the image . Our original image, f is a color image of size MxN and will be represented by :f = { f(x,y), 0 ≤ x < M, 0 ≤ y < N} Our watermark will be a image of size M/8xN/8. It is represented by:W={W(i,j),0≤ i<M/8, 0≤ j<N/8}.

Contd. Step 1: Find the achromatic component of the host image Compute the achromatic component of a color image . Step 2: Break the achromatic image into blocks. Step 3:Perform a permutation of the watermark to reduce its vulnerability. Step 4:Embed the watermark into the Achromatic Component. Step 5: Redirect the Watermark into the Saturation Component of the Color Image.

Spatial Domain Watermark Extraction Scheme This type of extraction is called a nonblind extraction because original image, along with the watermarked image, are needed to extract the watermark. Step 1: Find Achromatic Component of Original Image Step 2: Reverse the Saturation Adjustment and Find the Achromatic Component of the Watermarked Image. Step 3: Break the achromatic components into blocks. Step 4: Extract the permuted Watermark. Step 5: Reverse Pseudorandom Permutation.

THE PROPOSED MODEL

Transform Domain Watermarking Transform domain watermarking techniques are more robust in comparison to spatial domain methods. Among the transform domain watermarking techniques discrete wavelet transform (DWT) based watermarking techniques are gaining more popularity because DWT has a number of advantages over other transform such as progressive and low bit-rate transmission, quality scalability . The watermark message is inserted in the transform domain. Different transforms behaves differently to different attacks.

Transform Domain Watermarking Discrete Fourier Transform (DFT) is superior for shifting attacks- Shifting in the space domain leads to a phase shift in the frequency domain.

Transform Domain Watermarking Discrete Cosine Transform (DCT) Supports block-based transform (8x8),(16x16), (32x32), … Compacts the energy of each block according to its frequency content. Used in JPEG compression The watermark message is embedded in the intermediate frequency coefficients. Example of adding watermark image to the intermediate frequency of each block.

Transform Domain Watermarking Discrete Cosine Transform – Example of adding watermark image to the intermediate frequency of each block

Transform Domain Watermarking Discrete Wavelet Transform (DWT) DWT locally separates the content of the image into low frequency and high frequency subbands. Most of the energy is concentrated in the low frequency subband. In watermarking: The message is inserted in the high frequency subbands (HL,LH and HH)

Transform Domain Watermarking Non-Regular Transform – Spreads the energy content into different subbands – The subbands are similar to the original image Similar images Similar histogram

Application Ownership assertion Watermarks can be used for ownership assertion. Copy prevention or control Recording device may inhibit recording a signal if detected watermark indicates that it is prohibited. DVD video and digital music distribution. Secret Communications Hide information such that general public do not know its presence.

Application Authentication Broadcast Monitoring Fingerprinting Detect If image/video has been altered Broadcast Monitoring Keep track of when and where an advertisement is played. Fingerprinting Identify the source of an illegal copy. Unique watermark embedded in each copy

Future trends A number of companies, such as Sony and IBM have introduced digital watermarking software applications that allow individuals to imbed watermarks within image, audio and video files to protect them from copyright. Companies are also offering on-line tracking services so that the copyright owner can see how the owner's materials are used via the Web.

Conclusion As described recent developments in the digital watermarking of images in which the watermarking technique is invisible. Digital watermarking is a rapidly evolving area of research and development. Digital watermarking technology can provide a new way to protect the copyright of multimedia information and to ensure the safe use of multimedia information.

Reference http://en.wikipedia.org/wiki/Steganography http://en.wikipedia.org/wiki/Digital_watermark W. Bender D. Gruhl N. Morimoto and A. Lu. Techniques for data hiding. IBM Systems Journal, 35(3-4):313–336, 1996. [2] S. Bhattacharjee, “Compression Tolerant Image Authentication”, Proceedings, Int. Conf. Image Proc., Chicago, Oct. 1998.

Reference S.P. Mohanty, et aI., "A Dual Watennarking Technique for Images", Proc. 7th ACM International Multimedia Conference, ACM-MM'99, Part 2, pp. 49-51, Orlando, USA, Oct. 1999. [2] I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watennarking for multimedia," IEEE Transactions on Image Processing, vol. 6, no. 12, December, 1997, pp. 1673-1687. [3] F. M. Boland, J. J. K. 6 Ruanaidh and C. Dautzenberg, "Watennarking digital images for copyright protection," Proceedings of the International Conference on Image Processing and its Applications, Edinburgh, Scotland, July 1995, pp. 321-326.

THANK YOU