1. 2 u Copyright Protection u Authentication of multimedia data u Robust Data Hiding and Security issues.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Introduction to H.264 / AVC Video Coding Standard Multimedia Systems Sharif University of Technology November 2008.
T.Sharon-A.Frank 1 Multimedia Compression Basics.
Object Specific Compressed Sensing by minimizing a weighted L2-norm A. Mahalanobis.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
November 12, 2013Computer Vision Lecture 12: Texture 1Signature Another popular method of representing shape is called the signature. In order to compute.
INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, ICT '09. TAREK OUNI WALID AYEDI MOHAMED ABID NATIONAL ENGINEERING SCHOOL OF SFAX New Low Complexity.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Department of Computer Engineering University of California at Santa Cruz Data Compression (3) Hai Tao.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Watermarking For Image Authentication Presented by San-Hao Wang.
JPEG.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Methods of Image Compression by PHL Transform Dziech, Andrzej Slusarczyk, Przemyslaw Tibken, Bernd Journal of Intelligent and Robotic Systems Volume: 39,
5. 1 JPEG “ JPEG ” is Joint Photographic Experts Group. compresses pictures which don't have sharp changes e.g. landscape pictures. May lose some of the.
Roger Cheng (JPEG slides courtesy of Brian Bailey) Spring 2007
Image and Video Compression
Image Compression - JPEG. Video Compression MPEG –Audio compression Lossy / perceptually lossless / lossless 3 layers Models based on speech generation.
Lossy Compression Based on spatial redundancy Measure of spatial redundancy: 2D covariance Cov X (i,j)=  2 e -  (i*i+j*j) Vertical correlation   
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Perceptual Watermarks for Digital Image and Video ECE 738 paper presentation Pei Qi ECE at UW-Madison
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 8 – JPEG Compression (Part 3) Klara Nahrstedt Spring 2012.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Klara Nahrstedt Spring 2011
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Concepts of Multimedia Processing and Transmission IT 481, Lecture 5 Dennis McCaughey, Ph.D. 19 February, 2007.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Modified Patchwork Algorithm: Anovel Audio Watermarking Scheme In-Kwon Yeo and Hyoung Joong Kim.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
8. 1 MPEG MPEG is Moving Picture Experts Group On 1992 MPEG-1 was the standard, but was replaced only a year after by MPEG-2. Nowadays, MPEG-2 is gradually.
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
BARCODE IDENTIFICATION BY USING WAVELET BASED ENERGY Soundararajan Ezekiel, Gary Greenwood, David Pazzaglia Computer Science Department Indiana University.
Compression video overview 演講者:林崇元. Outline Introduction Fundamentals of video compression Picture type Signal quality measure Video encoder and decoder.
Introduction to Steganalysis Schemes Multimedia Security.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Quantization Watermarking Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems Brian Chen, Ph. D. Dissertation,
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
The task of compression consists of two components, an encoding algorithm that takes a file and generates a “compressed” representation (hopefully with.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
CS654: Digital Image Analysis
Page 11/28/2016 CSE 40373/60373: Multimedia Systems Quantization  F(u, v) represents a DCT coefficient, Q(u, v) is a “quantization matrix” entry, and.
1 Transform Domain Fragile Image Watermark Prof. Ja-Ling Wu Graduate Institute of Networking and Multimedia Dept. of Computer Science and Information Engineering.
Introduction to JPEG m Akram Ben Ahmed
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Basic Message Coding 《 Digital Watermarking: Principles & Practice 》 Chapter 3 Multimedia Security.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
4C8 Dr. David Corrigan Jpeg and the DCT. 2D DCT.
Tamal Bose, Digital Signal and Image Processing © 2004 by John Wiley & Sons, Inc. All rights reserved. Figure 11-1 (p. 624) (a) Image coder; (b) image.
Image Processing Architecture, © Oleh TretiakPage 1Lecture 5 ECEC 453 Image Processing Architecture Lecture 5, 1/22/2004 Rate-Distortion Theory,
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
JPEG Compression What is JPEG? Motivation
High Capacity Data Embedding in JPEG Bit Streams Using Visual Models
K. ZEBBICHE , F. KHELIFI and A. BOURIDANE
Watermarking for Image Authentication ( Fragile Watermarking )
Increasing Watermarking Robustness using Turbo Codes
Image Coding and Compression
Spread Spectrum Watermarking
Presentation transcript:

1

2 u Copyright Protection u Authentication of multimedia data u Robust Data Hiding and Security issues

3 ¨ There are three different applications that use digital watermarking in images. 1- The detection of the presence of the embedded signal 2- The concealment of the bit stream in the image and the extraction of this information. 3- The ability to reveal whether some sort of changes was done to the image. ¨ In the last application one of the characteristics of the hidden data should be low robustness, while in the first two high robustness of the embedded data is one of the most important requirements for successful data hiding. ¨ The first applications is implemented in the Method 1and the second one is implemented in the Method 2 of this project

4 u Digital watermarking is a technique for data hiding in digital multimedia u WM in images should meet the next set of requirements : * Invisibility to a Human Visual System * Robustness to various kinds of distortions * Simplicity of detection and extraction to the owner * High information capacity

5 u Watermarking techniques divided into two basic classes : * Spatial Domain WM- pixels values are affected * Frequency Domain WM- transform coefficients are affected u In this project the second technique is investigated u The advantages are high robustness and exploiting the Human Visual System features u The watermark is embedded using two transforms * DCT based watermark * DFT based watermark

6 u DCT transform algorithm is given by u The advantages of DCT are * Real coefficients and relatively small calculation time * Small manipulations on coefficients don’t affect the image visual properties

7 u DFT transform algorithm is given by u The advantages of DFT are * Most of the image information is contained in phase that allows great flexibility on magnitudes manipulations * Fast FFT algorithm decreases computation time

8 u The project scheme contains the following blocks : * Encoder - embeds the WM into the image * Channel - corrupts the watermarked image * Decoder - detects the WM sequence from corrupted watermarked image

9 u The following diagram demonstrates the above :

10 u The encoding schemes uses following characteristics : * Choice of WM amplitude has an important impact on the visibility of the WM * Selection of effected coefficients in the transformed image has to preserve the tradeoff between the robustness to corruption and the invisibility of the WM * WM embedded sequence is a set of normally distributed numbers chosen among X pseudo-random sequences

11 u The following diagram demonstrates encoder block diagram u The affected coefficients are chosen according to the transform and the parameters specified above

12 u The following diagram demonstrates channel block diagram

13 u The following diagram demonstrates decoder block diagram

14 u WM embedder performs zig-zag scan on the DCT coefficients - an approximation of radial frequency u M diagonals starting from L-th are selected to vector T u New vector T’ is created by the following rule:

15 u New vector T’ is reinserted in the appropriate indices u Inverse DCT is performed to create watermarked image

16 u The following images present the embedding of the WM in Lena. Original ImageImage with WM

17 u The WM bellow was created with following parameters :  WM amplitude:  = 0.2 * width of WM: M = 50 diagonals * first diagonal : L = 165 diagonal u The detection occurred on uncorrupted image Detection watermarks response correlation threshold Embbeded coefficents

18 u Two types of corruption are presented - AWGN and JPEG AWGN Corrupted Watermarked Image Detection watermarks response correlation threshold

19 Corrupted Watermarked Image-JPEG comp Detection watermarks response correlation threshold u JPEG compression (quality of 50) is a strong noise but the WM signal can still be detected

20 u Likely to DCT, DFT WM embedder selects square rings around DC after shift of FFT transform coefficients to the center u M squares starting from L-th are selected to vector T u New vector T’ is created by the following rule:

21 u As mentioned above, only magnitude of coefficients are modified in the way that preserves the symmetry of the real image DFT u New vector T’ is reinserted in the appropriate indices u Inverse DFT is performed to create watermarked image

22 u The following images present the embedding of the WM in Lena. Original ImageImage with WM

23 u The WM bellow was created with following parameters :  WM amplitude:  = 0.17 * WM width : M =20 rings * first square: L = 45 ring u The detection occurred on uncorrupted image Embbeded coefficents Detection watermarks response correlation threshold

24 u Two types of corruption are presented - AWGN and JPEG Detection watermarks response correlation threshold AWGN Corrupted Watermarked Image

25 u JPEG compression (quality of 50) is a strong noise but the WM signal can still be detected JPEG-Corrupted Watermarked Image Detection watermarks response correlation threshold

26 u Both of the presented transforms perform robust, invisible and easy to extract WM technique. u Choice of suitable parameters must be taken into consideration, when these two transforms are compared u Tradeoff must be achieved between the invisibility and robustness when M, L and  parameters are chosen u On the whole, no significant advantage was found to recommend on DFT or DCT.

27 u Exploiting of characteristics of Human Visual System: u Visual masking - every pixel is changed according to its local weighting factor u Image partition to blocks in order to enable efficient implementation and real time processing u Choice of different set of the parameters for different images

28

29 u This method exploits WM application, in which, bit stream is the hidden signal u Unlike first technique, encoding and detection is based on FFT signaling scheme, similar to communication channel, where narrow band signal is hidden in wide band environment u This method is a relatively new in the field and has a lot of unexplored features

30 u Similar to Method 1 the main hierarchy includes encoder, channel and decoder. u The difference is in the way that spectral components are computed and affected u The image is divided to blocks and selected transform is applied on each block u The size of the block is a parameter of the encoding scheme

31 u Encoder performs the following algorithm u Blockwise spectral transform - DFT/DCT u Selection of coefficients with unique magnitude in case of DFT - only half of the coefficients are selected u Alignment of each block to one column vector u KLT transform is performed on each vector u All vectors are combined to Mc matrix u Mapping of the binary stream to the signature u Insertion of the signature u Inverse process to obtain the encoded image

32 u The image coefficients are highly correlated and this fact can damage the WM invisibility u An efficient way to reduce this correlation is to apply KLT on each vector of block coefficients u KLT matrix is calculated once from 15 different pictures - For each image, Mc matrix is calculated by applying blockwise DCT/DFT Mc matrices are merged to one matrix X. Matrix X is multiplied by its transpose matrix X’. The result is normalized by number of columns in X to obtain a square matrix Rx. The Eigen vectors of Rx are calculated and combined to KLT matrix T.

33 u The following figure demonstrates the creation of KLT matrix

34 u The following figure demonstrates the structure of the encoder

35 u The insertion of the binary stream should be done with the highest efficiency and without damaging the image u The binary stream should be mapped to the signature that has high self correlation u In addition, the signature has to be low correlated with the original image in order to achieve high detection ability u The binary stream is divided to p-length segments u p is a parameter that is set in the initialization of the encoder

36 u In order to create high correlated sequence to map p-length segment the following algorithm should be performed  Create a random binary (±1) sequence b k of length 2 p-1.  Calculate B k - DFT of b k.  Calculate S k from B k such that | S k | = 1 and  S k =  B k  Take IDFT of S k to obtain s k that is real, cyclic all pas function. All cyclic shifts of s k and their negative are orthogonal.  Create a table of all cyclic shifts and their negative (MSS table) to map binary sequence length p.

37 u Binary sequence divided to p-length fragments u For each segment decimal representation Dk is calculated and entry in MSS table that is appropriate to Dk is selected u All selected sequences combined into one row vector to generate the signature u The value of p has an influence on the BPP (Bit Per Pixel) rate and on the robustness of the encoded signal u The larger p is the lower the BPP goes but the robustness of the signal increases

38 u The BPP is given by the following formula u It is possible to adjust the BPP in more precise way by using different coding schemes, like checksum and Reed Solomon

39 u The detection is made without resorting to the original image, therefore the components of the original image are an additive noise for the embedded signal u Some pre-processing is required to improve the detection efficiency - self noise suppression u The main idea is to estimate the original picture and to subtract this prediction from the received image Error = D(I rec ) = I rec - I est u The buried information can be extracted more efficiently from Error rather then from received image itself

40 u The estimation too similar to received image will produce zero and this will make it impossible to detect the hidden signal u On the other hand very coarse prediction will make the detection very difficult because of large amount of noise u Some sort of quantization of the received image may by used as the estimated image u The step of the quantizer used will depend on the level of noise

41 u Not any modification of the image coefficients allowed u The error introduced should maintain the following condition e = |C ^ – C | = | s – D(C) | where C ^ is the encoded image and C is an original one u The algorithm for embedding the signature sequence s in c is if (|s(k) – D(c(k)| < v(k)) then e(k) = s(k) – D(c(k)) else e(k) = v(k)sign(s(k) – p(k)) if ( rem(abs(c(k) >  /2) then e(k) = -e(k) else e(k) = e(k) if ( c(k)  0) then C ^ (k) = c(k) + e(k) else C ^ (k) = c(k) – e(k ) u v(k) is the visual threshold calculated for each block and determines the activity a particular block

42 u The detected signature s dec is extracted from the spectrum coefficients of received image after KLT transform by applying Self-Noise suppression scheme u If the encoded image was not corrupted the s dec is equal to an original signature s u After the extraction the signature s dec is divided into 2 p-1 - length fragment when each one is representing p-length binary segment u There are 2 p possible sequences for each fragment

43 u Each fragment represents p-bit number u For each fragment the correlation is calculated with every entry in MSS table u The index of the entry that produced maximum correlation is the decimal representation of p-length segment

44 u The following figure summarizes the decoder

45 u The following images demonstrates the encoding scheme results when the applied transform is DFT,p = 9 and delta = 140

46 u The following images demonstrates the encoding scheme results when the applied transform is DCT,p = 8 and delta = 20

47 u The system was checked with 5 256x256 standard images u The following table summarizes the results of the project u The following table summarizes the BER of the project when the images were compressed with JPEG ( Quality = 75)

48 u The article results report on achieved capacity of 1100 bits per image for ‘Lena’, which matches achieved capacity in this project u DCT and DFT results show a very similar robustness and visual properties of the watermarked image u DFT has less coefficients, therefore the amount of the embedded data is smaller u Larger block size enables better detection u On the whole, results of both articles investigated, were achieved and confirmed

49 u Selection and manipulation on the part of the coefficients will improve the robustness u Different error insertion for each spectral component will enhance the invisibility of the watermark u Interleaving of the coefficients before the encoding and de- interleaving before the decoding will prevent from some kinds of “spike” noise like JPEG to destroy the signature u Different encoding schemes like Reed Solomon, Checksum will reduce the bit rate but will reduce the number of errors as well

50