Digital Image Watermarking Er-Hsien Fu EE381K-15280 Student Presentation.

Slides:



Advertisements
Similar presentations
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Advertisements

Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
1. 2 u Copyright Protection u Authentication of multimedia data u Robust Data Hiding and Security issues.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Image and Video Compression
A Review on: Spread Spectrum Watermarking Techniques
Perceptual Watermarks for Digital Image and Video ECE 738 paper presentation Pei Qi ECE at UW-Madison
Digital Watermarking Parag Agarwal
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY * By: Ricardo A. Garcia *Research done at: University.
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY By: Ricardo A. Garcia University of Miami School.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
Digital Image Processing Image Compression
ELE 488 F06 ELE 488 Fall 2006 Image Processing and Transmission (12 – 7 – 06) Digital Watermarking What? Why? How? Attacks, Legal issues 12/7.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Multiple-description iterative coding image watermarking Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 20, No. 4, pp , 2010.
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
Detection of Image Alterations Using Semi-fragile Watermarks
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Digital Watermarking Using Phase Dispersion --- Update SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu, Michael Su.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Outline Carrier design Embedding and extraction for single tile and Multi-tiles (improving the robustness) Parameter α selection and invisibility Moment.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
A DIGITAL IMAGE WATERMARKING PREPARED BY AMAR RAEED KHORSHıD ALHıLALı ıD : R.G. Schyndel, A. Tirkel, and C. Osborne, “A Digital Watermark”, Procedding.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
DEPARTMENT OF ECE, BEC, BAGALKOT
JPEG Compression What is JPEG? Motivation
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
DONE BY S.MURALIRAJAN M.NIRMAL
Watermarking for Image Authentication ( Fragile Watermarking )
Increasing Watermarking Robustness using Turbo Codes
Parag Agarwal Digital Watermarking Parag Agarwal
Spread Spectrum Watermarking
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Authors: J.J. Murillo-Fuentes
Digital Watermarking Lecture 2
Presentation transcript:

Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation

Overview Introduction Background Watermark Properties Embedding Detection The Project Introduction Embedding Detection Conclusions

Introduction Watermark--an invisible signature embedded inside an image to show authenticity or proof of ownership Discourage unauthorized copying and distribution of images over the internet Ensure a digital picture has not been altered Software can be used to search for a specific watermark

Background Watermark Properties Watermark should appear random, noise-like sequence Appear Undetectable Good Correlation Properties High correlation with signals similar to watermark Low correlation with other watermarks or random noise Common sequences A) Normal distribution B) m-sequences W=[ ]

Project: Introduction Possible for watermark to be binary sequence Error-correction coding techniques Use convolutional codes Decode by Viterbi algorithm Compare with non-coding method See if it improves watermark detection More or less robust to attacks? Additive noise, JPEG Compression, Rescale, Unzign Performance assessed by correlation coefficient

Watermark Embedding WatermarkOriginal ImageWatermarked image Watermark placed into information content of Original Image to create Watermarked Image Image Content Spatial Domain (Least Significant Bit) FFT - Magnitude and Phase Wavelet Transforms DCT Coefficients

Setup-Watermark Embedding Image 1000 Highest Coeff Conv Code DCT Inter- leave Water- mark Water- marked Image IDCT DC Component Excluded for 1000 Highest Coefficients Interleaving prevents burst errors Watermarked Image Similar to original image Without coding, ignore Conv Code and Interleave block

Original Image Watermarked Image, No Coding Watermarked Image with Coding 512x512 “Mandrill” Image See Handout Both watermarks imperceptible Alterations to original image difficult to notice

Watermark Detection * =  Suspected Image Extracted Watermark Original Watermark Correlation Watermark Extracted from Suspected Image Compute correlation of Extracted and Original Watermark Threshold correlation to determine watermark existence

Watermark Detection Corrupted Image Original Image Extracted Watermark Owner’s watermark Correlation Coefficient 1000 Highest DCT Coeff Deinterleave, Viterbi Decode For no coding, deinterleave and decode block ignored  =E[W1*W2]/{ E[W1 2 ]E[W2 2 ]} If W1=W2 then  =1 if W1 and W2 are independent, then  =0 if E[W1]=0 Corruptions are additive noise, JPEG Compression Image scaling, and UnZign W2 W1

Convolutional Codes Input=[ ] G0 = [ ] G1 = [ ] C0 C1 Output C0 = conv(G0,Input); Output C1=conv(G1,Input) Convolutional code implemented using linear shift registers Adds redundancy for error-correction Encoding/Decoding well researched Good coding performance, very popular

Viterbi Decoding State …………………… Find most likely path through trellis Begin and end at all zero state Upper arrows => input=0, Lower arrow =>input=1 Every possible input/output combination is compared with the received output Optimal Decoding Method

With Coding: Additive Noise (0,900) No Coding: Additive Noise(0,900) Zero mean additive noise, variance=100, 400, 900 Both methods had high correlation Coding method performed slightly better For variance = 900  (no coding) = 77% p (coding) = 84%

4:1 JPEG Compression, No coding 4:1 JPEG Compression With Coding JPEG Compression: 1.4:1, 2.2:1, 4:1 ratio Both methods resistant to JPEG compression Coding method outperformed non-coding method Perfect detection for coding method

Watermark removal using UnzignConvert to grayscale and resize Unzign--watermark removal software Image resized to 512x512 and convert to grayscale before detection Moderate detection for without coding:  (no coding) = 57%  (coding) = 23% Coding method sensitive to resizing

Conclusions Convolutional coding more immune to additive noise and JPEG Compression Coding method fragile w.r.t. rescaled images Moderate detection levels for unzigned images Further Suggestion: Try block DCT Use Wavelet Transform Exploit Human Visual System

Questions