Claudia Schremmer / University of Mannheim / Germany Digital Image Watermarking Claudia Schremmer University of Mannheim / Germany September 2001 Teleseminar.

Slides:



Advertisements
Similar presentations
Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Advertisements

Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
F5 A Steganographic Algorithm
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Brodatz Textures Vistex Textures What is texture ? Texture can be considered to be repeating patterns of local variation of pixel intensities.
Technical Aspects of Digital Rights Management
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Watermarking Technology Ishani Vyas CS590 Winter 2008.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Spread Spectrum Steganography
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
Steganography.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Concepts of Multimedia Processing and Transmission IT 481, Lecture #9 Dennis McCaughey, Ph.D. 2 April, 2007.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital Watermarking
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
A Partial Survey of the Perfect Digital Watermark Problem.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Technical Aspects of Digital Rights Management
DONE BY S.MURALIRAJAN M.NIRMAL
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Digital Watermarking Lecture 2
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Claudia Schremmer / University of Mannheim / Germany Digital Image Watermarking Claudia Schremmer University of Mannheim / Germany September 2001 Teleseminar on Electronic Commerce Introductory Week: in Nice

Claudia Schremmer / University of Mannheim / Germany page 2 Overview 1. Introduction 2. Digital Watermarking 3. Attacks 4. Algorithm of Zhao/Koch 5. Conclusion Overview

Claudia Schremmer / University of Mannheim / Germany page 3 Prelude Page from a prayer book showing the baking of unleavened bread (15th century) from the Illuminated Haggadah Exhibit.

Claudia Schremmer / University of Mannheim / Germany page 4 1. Introduction In former times... Traditional content media yield degraded content when copied: –paper documents, –analogue recordings, –celluloid film, –canvas paintings, and –marble sculptures Or they require expensive and specialized equipment to produce high-quality copies. Thus, the technical burden on traditional content creators for protecting their material has been minimal. 1. Introduction

Claudia Schremmer / University of Mannheim / Germany page 5 Nowadays... High quality (even: identical) copies are easy to produce. There is apparently no limit to the value that can be added by creating and providing access to digital content. Creators and owners of (digital) content need ways to protect their property rights in the increasingly digital world. Distributors and recipients of content need ways to fully utilize the rich potential of their digital assets. 1. Introduction

Claudia Schremmer / University of Mannheim / Germany page 6 Example Is this photo original? Is it fake / has it been modified? Who owns the right? Are we allowed to use this photo in our seminar? 1. Introduction Robbie Williams

Claudia Schremmer / University of Mannheim / Germany page 7 Definition 1. Introduction

Claudia Schremmer / University of Mannheim / Germany page 8 2. Digital Watermarking Digital watermarks are fixed to the underlying data. In contrast to the traditional way of watermarking paper or money, digital watermarks rely on steganography: A digital watermark is included into a digital medium the way that the user does not perceive it. Thus, the communication is secret. Two ways of secret communication: –The copyright information is transferred via a secret key while the algorithm is known. Thus, only the user can access the information. –No secret key exists, but the algorithm is kept secret. 2. Digital Watermarking

Claudia Schremmer / University of Mannheim / Germany page 9 Practical Approach Substitutional steganography: A noisy component of the digital message is substituted by an encrypted secret message. Constructive steganography: The secret message is not included by means of replacement, but by means of reproduction of noisy signals, based on the model of the original noise. Existing watermarking algorithms are based on the substitutional steganography. 2. Digital Watermarking

Claudia Schremmer / University of Mannheim / Germany page 10 Types of watermarks Subdivision of unperceptible (steganographic) watermarks: –Unperceptible robust: Insertion of hidden information, copyright information, authentification, and meta information. Based on a modification of the pixel (for an image), example: modification of an amplitude in the blue channel. Or based on a modification in the frequency domain, example: after DCT or wavelet transformation. –Unperceptible fragile: Aim to proof the integrity of a document. They are destroyed on purpose in order to detect manipulation. Based on content related algorithms like the digital signature. 2. Digital Watermarking

Claudia Schremmer / University of Mannheim / Germany page Attacks: unintentional There are a number of unintentional and intentional attacks: Unintentional attacks: –Image: compression, transcoding, printing/scanning, filtering, noise, geometric transforms, cropping, compositing/mosaicing,... –Video: AD/DA conversion, compression, transcoding, text/logo insertion, geometric transformations, jitter, cropping, Attacks

Claudia Schremmer / University of Mannheim / Germany page 12 Attacks: intentional Intentional attacks: –watermark removal/interference: denoising, compression, quantization, remodulation, blurring, averaging,... –Desynchronization (detector disabling): cropping, affine and projective transforms, jittering, mosaicing, collage,... –Cryptographic: key determination (brute force), Oracle attack (i.e., generate unmarked data by trial and error) –Protocol: copy attack, printing/rescanning,...  Watermark research must include work on attacks! 3. Attacks

Claudia Schremmer / University of Mannheim / Germany page 13 Example (I) 3. Attacks original wavelet compr.94%crumple & scan warpmosaic

Claudia Schremmer / University of Mannheim / Germany page 14 Example (II) 3. Attacks composition of wavelet compressed house and warped bear

Claudia Schremmer / University of Mannheim / Germany page 15 Constraints Human visual perception shall not be disturbed by the watermarks. The capacity for watermarks differs according to the number of bits allocated. Robustness regards the performance towards intentional and unintentional attacks. 3. Attacks visibility robustnesscapacity

Claudia Schremmer / University of Mannheim / Germany page Algorithm of Zhao/Koch Jian Zhao and Eckhard Koch: Embedding robust labels into images for copyright protection. In: Proc. of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies. Vienna, Austria, August This is the initial paper which initialized a whole new research area. 4. Algorithm of Zhao/Koch

Claudia Schremmer / University of Mannheim / Germany page 17 Outline of the Zhao/Koch Algorithm The paper of Zhao/Koch describes a pool of novel steganographic methods for secure and robust insertion of watermarks into digital images. The included watermark is neither detectable, nor movable/relocatable, nor changeable. Furthermore, it survives attacks which do not strongly the image quality, such as lossless compression, low pass filtering (i.e., smoothing) and transcoding. 4. Algorithm of Zhao/Koch

Claudia Schremmer / University of Mannheim / Germany page 18 Fundamentals (I) System for Copyright Protection: SysCoP The system supports gray value, color, and binary images. 4. Algorithm of Zhao/Koch Labelled Image (y’) Position Sequence Generator Ts(y, U k ) Label Embeddin g System Position Sequence (PS) Image Data (y) User Key (U k ) Label Code (C) write a watermark Two steps to write a watermark: –Generation of a pseudo-random sequence of positions in order to select DCT-encoded blocks in which the code is embedded. Here, this step is accomplished by the function –Embedding of the code into the block selected by the sequence of positions.

Claudia Schremmer / University of Mannheim / Germany page 19 Fundamentals (II) The reading process reverses the writing process: –Reading the code from the block selected by the sequence of positions. –Retrieve the label inserted. 4. Algorithm of Zhao/Koch Position Sequence Generator Ts(y, U k ) Label Retrieval System Position Sequence (PS) Image Data (y) User Key (U k ) Embedded Code (C) read a watermark

Claudia Schremmer / University of Mannheim / Germany page 20 Remarks In the following: consideration of gray value images only. A block is of size 8x8 pixels. It can be contiguous or distributed. –A contiguous block is a square part of an image. –A distributed block is a random agglomeration of 64 pixels of the image. It is difficult to determine an optimal function. Therefore, only the width and the height of an image are actually used to generate the block positions. 4. Algorithm of Zhao/Koch

Claudia Schremmer / University of Mannheim / Germany page 21 Framework(write) Algorithm: Framework(write). –(1) If i  n, return. –(2) Randomly select a block b, using the position sequence generation function Ts(U k, y). –(3) If b exists already in B, go to (2), otherwise add b to B. –(4) Call check_write(b, c i ) to check weather b is a valid block: if this function returns False, go to (2). –(5) Call write(b, c i ) to embed a bit c i to the block b. –(6) Increment i, go to (1). 4. Algorithm of Zhao/Koch –The code C to be embedded is represented by its binary bit sequence: –i marks the current bit in the sequence –B is the set of blocks of which a block is randomly selected. –The initialization is: i=0, B={}.

Claudia Schremmer / University of Mannheim / Germany page 22 Framework(read) Algorithm: Framework(read). –(1) If i  n, return. –(2) Randomly select a distributed or a contiguous 8  8 block b, using the position sequence generation function Ts(U k,y). –(3) If b exists already in B, then go to (2), otherwise add b to B. –(4) Call check_read(b, c i ) to check weather b is a valid block: if this function returns False, go to (2). –(5) Call read(b) to retrieve a bit from the block b. –(6) Increment i, and go to (1). 4. Algorithm of Zhao/Koch

Claudia Schremmer / University of Mannheim / Germany page 23 JPEG-based Code Insertion In the framework, the following algorithms are still undefined: –check_write(b, c i ) –write(b, c i ) –check_read(b, c i ) –read(b, c i ) They depend on the coding format of the image. We restrict our future considerations to JPEG-encoded images: 4. Algorithm of Zhao/Koch Image pre- processor Pixel Block Image encoder DCT QuantizationEntropy encoding: run length Huffman arithmetic

Claudia Schremmer / University of Mannheim / Germany page 24 Visual Perception General idea: Insert watermarks in positions where the human visual system does not or nearly not perceive a modification of the coefficients. Here: Insertion in the smooth background areas, i.e., in the white areas of the right picture. The coefficients concerned are of the middle frequencies in the DCT-transformed domain. 4. Algorithm of Zhao/Koch

Claudia Schremmer / University of Mannheim / Germany page 25 Possible Positions Statistic and empirical research has defined possible positions to include a code into a block. 4. Algorithm of Zhao/Koch

Claudia Schremmer / University of Mannheim / Germany page 26 Demonstration 4. Algorithm of Zhao/Koch

Claudia Schremmer / University of Mannheim / Germany page Conclusion We have not... –... detailed any precise algorithm. –... discussed other media than images. For audio, this would e.g. mean entering the field of research on human audible properties. –... discussed the various attacking algorithms like e.g. STIRMARK. We have... –... given an introduction and an overview on the purpose of digital watermarking. –... outlined the challenge of creating a robust algorithms to unintentional and intentional attacks. –... restricted our considerations on images. 5. Conclusion

Claudia Schremmer / University of Mannheim / Germany page 28 Information... Claudia Schremmer University of Mannheim, Germany Department Praktische Informatik IV