Bit-Plane Watermarking for SPIHT-Coded Images 台北科技大學資工所 指導教授:楊士萱 學生:廖武傑 2003/07/29.

Slides:



Advertisements
Similar presentations
H IGH CAPACITY WATERMARKING H YPERSPECTRAL I MAGES AUTHENTICATION Mehdi Fallahpour Jordi Serra-Ruiz David Megías.
Advertisements

A Comprehensive Design Evaluation for SPIHT Coding 台北科技大學資工所指導教授:楊士萱學生:廖武傑 2003/06/05.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
LOGO Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
1 Image Transcoding in the block DCT Space Jayanta Mukhopadhyay Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur,
1 Outline  Introduction to JEPG2000  Why another image compression technique  Features  Discrete Wavelet Transform  Wavelet transform  Wavelet implementation.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Fifth International Conference on Information
A Comprehensive Study of Wavelet Transforms for SPIHT 台北科技大學資工所指導教授:楊士萱學生:廖武傑 2003/03/27.
1 Error-Protection Techniques of SPIHT- Coded Images in Packet Loss Network 指導教授:楊士萱報告者:鄭博峰 11 月 12 日.
Watermarking MPEG-4 2D Mesh Animation in the Transform Domain
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
OPTIMZED SPIHT CODING 國立台北科技大學資工所 指導教授:楊士萱 研究生:廖武傑.
Invariant Image Hashing for DWT SPIHT Coded Images 陳慶鋒11/23/04.
A Comprehensive Study of Wavelet Transforms for SPIHT 台北科技大學資工所指導教授:楊士萱學生:廖武傑 2003/03/27.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Notes by Shufang Wu Embedded Block Coding with Optimized Truncation - An Image Compression Algorithm Notes by Shufang Wu
Optimal Quantization Scheme for Biorthogonal Wavelets for Coding and Data hiding 台北科技大學資工所 指導教授:楊士萱 研究生:廖武傑 2003/2/27.
Unequal Loss Protection: Graceful Degradation of Image Quality over Packet Erasure Channels Through Forward Error Correction Alexander E. Mohr, Eva A.
Error Resilience and Error Concealment in SPIHT 指導教授:楊士萱報告者:鄭博峰日期:四月二十四日.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Reversible medical image watermarking based on wavelet histogram shifting Source: Authors: Reporter: Date: The Imaging Science Journal, Vol. 59, No. 1,
Multiple Image Watermarking Applied to Health Information Management
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
JPEG2000 Yeh Po-Yin Lien Shao-Chieh Yang Yi-Lun. Outline Introduction Features Flow chart Discrete wavelet transform EBCOT ROI coding Comparison of ROI.
Outline Kinds of Coding Need for Compression Basic Types Taxonomy Performance Metrics.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Quantization Watermarking Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems Brian Chen, Ph. D. Dissertation,
NTIT1 A chaos-based robust wavelet- domain watermarking algorithm Source: Chaos, Solitions and Fractals, Vol. 22, 2004, pp Authors: Zhao Dawei,
Jaroslaw Kutylowski 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Robust Undetectable Interference Watermarks Ryszard Grząślewicz.
1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Date of download: 6/2/2016 Copyright © 2016 SPIE. All rights reserved. Watermarking the intensity component of a color image using the IHS color coordinate.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Introduction to Audio Watermarking Schemes N. Lazic and P
PERFORMANCE ANALYSIS OF VISUALLY LOSSLESS IMAGE COMPRESSION
WAVELET VIDEO PROCESSING TECHNOLOGY
(k, n)-Image Reversible Data Hiding
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
K. ZEBBICHE , F. KHELIFI and A. BOURIDANE
DONE BY S.MURALIRAJAN M.NIRMAL
Robustness Evaluation of Perceptual Watermarks
Compression for Synthetic Aperture Sonar Signals
Increasing Watermarking Robustness using Turbo Codes
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Information Hiding and Its Applications
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Novel Multiple Spatial Watermarking Technique in Color Images
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: Circuits and Systems for Video Technology,
Presentation transcript:

Bit-Plane Watermarking for SPIHT-Coded Images 台北科技大學資工所 指導教授:楊士萱 學生:廖武傑 2003/07/29

OUTLINE Introduction to watermarking SPIHT Factors that affect watermarking system Proposed watermarking scheme Conclusion

Watermarking The watermark is an imperceptible but indelible code used for ownership identification. Why? convenience of digital multimedia data intellectual property of digitally recorded material shortcomings of encryption techniques Requirements perceptual transparency robustness security appropriate complexity Computational requirements introduced by watermark embedding and detection should be small

Domains of image watermarking

OUTLINE Introduction to watermarking SPIHT Factors that affect watermarking system Proposed watermarking scheme Conclusion

SPIHT coding procedure

Wavelet transform(1D) h0 h1 h0 h Resolution 1/2 Resolution 1/4 C 3,n C 2,n C 1,n d 2,n d 1,n

Wavelet transform(2D) h0 h Horizontal filteringVertical filtering

Wavelet filter Daubechies 9/7 Analysis Filter Coefficients: iLow-Pass FilterHigh-Pass Filter ± ± ± ±

Example, “Lena”

SPIHT coding procedure

Spatial Orientation Trees

Example (1 st Sorting pass, Encoder) LIPLSP LIS: T=32 A2A3A

Example (1 st Sorting pass) LIPLSP LIS: T=32 A3A B

Example (1 st Sorting pass) LIPLSP LIS: T=32 A B B3 001

Example (1 st Sorting pass) LIPLSP LIS: T=32 A B A9 001 A10A11A

Example (1 st Sorting pass) LIPLSP LIS: T=32 A B A9 001 A11A

Example (1 st Refinement pass) Do nothing

Example (2nd Sorting pass) LIPLSP LIS: T=16 A4B2A9A11A

Example (2nd Refinement pass) LSP: In 1st sorting pass:

Example (3rd Sorting pass) LIPLSPT=8

Example (4th Sorting pass) LIPLSPT=4

Example (5th Sorting pass) LIPLSPT=2

Example (1 st Sorting pass, Decoder) Received: originaldecoded

Example (1 st Sorting pass, Decoder) Original coefficients Reconstructed value (by 1st sorting pass) 48

Example (2 nd Sorting pass, Decoder) Received: originaldecoded

Example (2 nd Refinement pass, Decoder) Original coefficients Reconstructed value (by 1st sorting pass) Refinement bit: 56 Refinement by 2nd refinement pass 40 If refinement bit is ‘0’

Example (2 nd Refinement pass, Decoder) Received: originaldecoded 1010

OUTLINE Introduction to watermarking SPIHT Factors that affect watermarking system Proposed watermarking scheme Conclusion

Watermarks over a noise channel The noise comes from:  The host signal  Lossy compression  Other attacks

Host-interference-nonrejecting watermarking method Transform domain watermarking Watermark: Gaussian random source Embedding method: After distortion: Effect of host interference and quantization noise W. Zhu, Z. Xiong, and Y.-Q. Zhang, “Mutiresolution watermarking for images and video,” IEEE Trans. Circuits Syst. Video Technol., June 1999

Watermark similarity measure for judging: (linear correlation) where: Informed detection: Effect of host interference and quantization noise (cont.)

Test images “Lena”“Baboon”

Degradation of watermark similarity due to quantization Bpp1/641/321/161/81/41/21 Step size MSE PSNR Correlati on (informe d) Correlati on (blind) “Lena”, alpha=0.26, watermark length:255, subband:1-6, coefficients smaller than 512

Degradation of watermark similarity due to quantization “Baboon”, alpha=0.28, watermark length:255, subband:1-6, coefficients smaller than 512 Bpp1/641/321/161/81/41/21 Step size MSE PSNR Correlati on (infor med) Correlati on (blin d)

OUTLINE Introduction to watermarking SPIHT Factors that affect watermarking system Proposed watermarking scheme Conclusion

Proposed watermarking scheme

Proposed watermarking scheme (Cont.) Embedding our watermark

The effect of wavelet coefficient after embedding watermark

Extracting watermark procedure

Watermarking detecting

Proposed watermarking scheme (Cont.) Host-interference rejection Minimization of quantization effects Low complexity Progressive nature

StirMark attacks JPEG compression Gaussian filtering Median filtering Sharpening FMLR

JPEG compression attacks

Gaussian filtering

Median filtering

Sharpening

FMLR

watermark length:255 PN code, subband:1-6, coefficient between 512 and 256 soft-decision, bit-rate: 0.25bpp LenaBaboonPepperF16 Jpeg 50% PSNR / / / / / / / Jpeg 30% PSNR / / / / / / / / Jpeg 10% PSNR / / / / / / / / Gaussian filter PSNR / / / / / / / / Median filter PSNR / / / / / / / / Sharpening PSNR / / / / / / / / FMLR PSNR / / / / / / / /

watermark length:255 PN code, subband:1-6, coefficient between 512 and 256, soft-decision, bit-rate: 0.5bpp LenaBaboonPepperF16 Jpeg 50% PSNR / / / / / / / / Jpeg 30% PSNR / / / / / / / / Jpeg 10% PSNR / / / / / / / / Gaussian filter PSNR / / / / / / / / Median filter PSNR / / / / / / / / Sharpening PSNR / / / / / / / / FMLR PSNR / / / / / / / /

Enhanced watermarking by repetition codes

Performance (basic vs. enhanced) By soft-decision:  The difference between basic and enhanced scheme is small. By hard-decision:  Enhanced scheme is superior to basic scheme. (except some particular attacks)

OUTLINE Introduction to watermarking SPIHT Factors that affect watermarking system Proposed watermarking scheme Conclusion

Our watermarking system suffers less from the host interference and quantization noise. The embedding and extracting of watermarks are simple. The performance can be improved by enhanced scheme with larger noise margins.