T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
H IGH CAPACITY WATERMARKING H YPERSPECTRAL I MAGES AUTHENTICATION Mehdi Fallahpour Jordi Serra-Ruiz David Megías.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Maximizing Strength of Digital Watermarks Using Neural Network Presented by Bin-Cheng Tzeng 5/ Kenneth J.Davis; Kayvan Najarian International Conference.
N-Secure Fingerprinting for Copyright Protection of Multimedia
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Fifth International Conference on Information
1 Audio Watermarking for Copyright Protection 報告人:鄒昇龍.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Enhancing Biometric Security Using Watermarking By Shivankush Aras.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Damageless Information Hiding Technique using Neural Network Keio University Graduate School of Media and Governance Kensuke Naoe.
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
Mesh Watermarking based on 2D Transferred Domain Jongyun Jun Tae-Joon Kim CS548 Term Project Presentation 2010/05/13.
WATERMARKING Adviser :葉家宏 老師 Presenter :邱怡雯 Date : 2011/03/28.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Multiple-description iterative coding image watermarking Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 20, No. 4, pp , 2010.
NTIT1 A chaos-based robust wavelet- domain watermarking algorithm Source: Chaos, Solitions and Fractals, Vol. 22, 2004, pp Authors: Zhao Dawei,
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Date of download: 6/2/2016 Copyright © 2016 SPIE. All rights reserved. Watermarking the intensity component of a color image using the IHS color coordinate.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
DEPARTMENT OF ECE, BEC, BAGALKOT
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
IMAGE PROCESSING IMAGE WATERMARKING
Welcome
DONE BY S.MURALIRAJAN M.NIRMAL
Robustness Evaluation of Perceptual Watermarks
Image Watermarking Chu, Hsi-Cheng.
Parag Agarwal Digital Watermarking Parag Agarwal
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Authors: J.J. Murillo-Fuentes
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness of typical watermarks Johnson Lee Prepared for EECE 575 – Digital Image Processing

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 2 Outline Background Info Techniques –Spatial Domain –DCT Domain –Wavelet Domain Conclusion

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 3 Background – Terminology Watermarking techniques that allow secret communication, usually by embedding or hiding the secret information Fingerprinting special application of watermarking related to copyright protection Copy Protection vs Copyright Protection copy protection inhibits the copy process itself while copyright protection embeds copyright information into an object

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 4 Principles of Watermarking Capacity –As much information as possible Security –Only be accessible by authorized parties Robustness –Resist against attacks Imperceptibility –Invisible

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 5 Principles of Watermarking Capacity –As much information as possible Security –Only be accessible by authorized parties Robustness  Focus of this study –Resist against attacks Imperceptibility –Invisible

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 6 Principles of Watermarking Capacity –As much information as possible Security –Only be accessible by authorized parties Robustness  Focus of this study –Resist against attacks Imperceptibility  Lightly present –Invisible

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 7 Type of Attacks Unintentional –Image compression Ideal watermarking and compression systems inherently mutually exclusive Malicious –Disabling watermark Geometric distortion or noise

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 8 Basic Concept of Watermarking Let O = original image W = watermark M = watermarked image f(x) = some transformation Then, M = O + f(W)

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 9 CDMA Spatial Domain Spread Limited capacity Ideal for small watermarks PSNR =

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 10 CDMA Spatial Resistance JPEG resistant until quality factor 50 No resistance against resizing, rotation Mildly tolerable of mean and median filters – up to [3 3] [3 3][2 2] Common to Many Techniques

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 11 Bruyndonckx (Spatial Domain) Signature generated with input text Based on zone/category classification to embed information  Algorithm use different edge gradients to embed info

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 12 Bruyndonckx (Spatial Domain) Pixel classification, Zone based PSNR = 26407` Original

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 13 Bruyndonckx (Spatial Domain) JPEG resistant until quality factor 50 No resistance against resizing, rotation Mildly tolerable of median and mean filters bit matches: 491/584 correlation: bit matches: 515/584 correlation: bit matches: 421/584 correlation: bit matches: 439/584 correlation: MeanMedian [3 3] [4 4] 5060 bit matches: 394/584bit matches: 538/584 correlation: correlation: SAME PROBLEM AS CDMA SPATIAL DOMAIN

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 14 Comparison-based Correlation DCT Midband

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 15 Comparison-based Correlation DCT Midband - Resistance JPEG resistant until quality factor 28 Geometric – cannot be done because algorithm needs exact size Mean and Median – [4 4] tolerant COMPARISON CDMA & Bruyndonckx JPG – 50 Geo – 0 Median – [3 3] Mean – [3 3] MeanMedian [4 4]

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 16 Cox (DCT Domain) PSNR = Original

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 17 Cox Resistance (DCT Domain) Extremely robust to JPG, Q – 20 Geometric –cannot be done because algorithm needs exact same size as original Mean and Median –Highly resistance since not dependent on high freq noise Correlation [10 10] [6 6] MeanMedian

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 18 Future/In Progress Work Resizing needs to be redone –Most algorithms require input file to be same size as original, can be done by resizing DWT Domain CDMA and advanced DWT techniques