Perceptual Watermarks for Digital Image and Video ECE 738 paper presentation Pei Qi ECE at UW-Madison

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Object Specific Compressed Sensing by minimizing a weighted L2-norm A. Mahalanobis.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Maximizing Strength of Digital Watermarks Using Neural Network Presented by Bin-Cheng Tzeng 5/ Kenneth J.Davis; Kayvan Najarian International Conference.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Computer Graphics Recitation 6. 2 Motivation – Image compression What linear combination of 8x8 basis signals produces an 8x8 block in the image?
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
1. 2 u Copyright Protection u Authentication of multimedia data u Robust Data Hiding and Security issues.
Watermarking For Image Authentication Presented by San-Hao Wang.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Data The DCT and JPEG Image Compression Dr Mike Spann Electronic, Electrical and Computer.
Perceived video quality measurement Muhammad Saqib Ilyas CS 584 Spring 2005.
Image and Video Compression
Image Compression - JPEG. Video Compression MPEG –Audio compression Lossy / perceptually lossless / lossless 3 layers Models based on speech generation.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
Digital Audio Watermarking: Properties, characteristics of audio signals, and measuring the performance of a watermarking system نيما خادمي کلانتري
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 8 – JPEG Compression (Part 3) Klara Nahrstedt Spring 2012.
Encoding Stereo Images Christopher Li, Idoia Ochoa and Nima Soltani.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Digital Watermarking SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu, Michael Su.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Zhejiang University Wavelet-based 3D mesh model watermarking Shi Jiao-Ying State Key Laboratory of CAD&CG, Zhejiang University, Hangzhou
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Modified Patchwork Algorithm: Anovel Audio Watermarking Scheme In-Kwon Yeo and Hyoung Joong Kim.
Texture. Texture is an innate property of all surfaces (clouds, trees, bricks, hair etc…). It refers to visual patterns of homogeneity and does not result.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital watermarking: algorithms and applications
MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles Marwen HASNAOUI Maher BELHAJ Mihai MITREA Françoise PRETEUX ARTEMIS.
ELE 488 F06 ELE 488 Fall 2006 Image Processing and Transmission (12 – 7 – 06) Digital Watermarking What? Why? How? Attacks, Legal issues 12/7.
Just Noticeable Difference Estimation For Images with Structural Uncertainty WU Jinjian Xidian University.
Digital Image Processing Lecture 21: Lossy Compression Prof. Charlene Tsai.
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
Detection of Image Alterations Using Semi-fragile Watermarks
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
1 Robust and transparent watermarking scheme for colour images Speaker : Po-Hung Lai Adviser : Chih-Hung Lin Date :
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
A DIGITAL IMAGE WATERMARKING PREPARED BY AMAR RAEED KHORSHıD ALHıLALı ıD : R.G. Schyndel, A. Tirkel, and C. Osborne, “A Digital Watermark”, Procedding.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Image Processing Architecture, © Oleh TretiakPage 1Lecture 5 ECEC 453 Image Processing Architecture Lecture 5, 1/22/2004 Rate-Distortion Theory,
MP3 and AAC Trac D. Tran ECE Department The Johns Hopkins University Baltimore MD
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Digital Image Processing Lecture 21: Lossy Compression
Robustness Evaluation of Perceptual Watermarks
Watermarking for Image Authentication ( Fragile Watermarking )
Pei Qi ECE at UW-Madison
Increasing Watermarking Robustness using Turbo Codes
Feature Space Based Watermarking in Multi-Images
Spread Spectrum Watermarking
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Perceptual Watermarks for Digital Image and Video ECE 738 paper presentation Pei Qi ECE at UW-Madison

What is ‘ perceptual ’ watermark Prior knowledge Prior knowledge Perceptual watermark Perceptual watermark

Prior knowledge Additive watermark Additive watermark Ideal watermark Ideal watermark Three principles Three principles - Transparency or imperceptibility - Transparency or imperceptibility - Robustness - Robustness - Capacity - Capacity Challenging problem Challenging problem - Conflicts - Conflicts - Tradeoff between transparency and robustness - Tradeoff between transparency and robustness

Prior knowledge Human visual system Human visual system Three properties of the human visual system Three properties of the human visual system 1. Frequency sensitivity 1. Frequency sensitivity What’s freq. sensitivity What’s freq. sensitivity Freq. sensitivity describes the human eye’s sensitivity to sine wave gratings at various freq. Given that the minimum viewing distance is fixed, it’s possible to determine a static just noticeable difference threshold for each freq. band. Freq. sensitivity describes the human eye’s sensitivity to sine wave gratings at various freq. Given that the minimum viewing distance is fixed, it’s possible to determine a static just noticeable difference threshold for each freq. band. JND threshold JND threshold The JND threshold is such that changes in the frequency content in the image in the particular frequency band below the threshold are not noticeable The JND threshold is such that changes in the frequency content in the image in the particular frequency band below the threshold are not noticeable

Prior knowledge Human visual system Human visual system Three properties of the human visual system Three properties of the human visual system 2. Luminance sensitivity 2. Luminance sensitivity What’s luminance sensitivity What’s luminance sensitivity Luminance sensitivity measures the effects of the detectability threshold of noise on a constant background, which is a nonlinear function and depends on local image characteristics. Luminance sensitivity measures the effects of the detectability threshold of noise on a constant background, which is a nonlinear function and depends on local image characteristics. 3. Contrast masking 3. Contrast masking Contrast masking allows more dynamic control of the JND threshold levels. Contrast masking refers to the detectability of one signal in the presence of another signal. Contrast masking allows more dynamic control of the JND threshold levels. Contrast masking refers to the detectability of one signal in the presence of another signal.

Prior knowledge Summary Summary What is our goal to introduce human visual system in watermarking application? What is our goal to introduce human visual system in watermarking application? 1. Determine if a watermark inserted into a image is invisible or not 1. Determine if a watermark inserted into a image is invisible or not 2. We are always trying to insert the maximum strength and maximum length watermarks into an image, SINCE more watermarks are inserted 2. We are always trying to insert the maximum strength and maximum length watermarks into an image, SINCE more watermarks are inserted - more robust to attacks - more robust to attacks - more likely to be detected - more likely to be detected Make use of properties of human visual system to adjust the watermark so that it’s perfect for both robustness and transparency Make use of properties of human visual system to adjust the watermark so that it’s perfect for both robustness and transparency JNDs JNDs JNDs generated from different properties provide the quantized thresholds for embedding watermarks. JNDs generated from different properties provide the quantized thresholds for embedding watermarks. - upper bounds on watermark strength levels - upper bounds on watermark strength levels - upper bounds on watermark length (capacity) - upper bounds on watermark length (capacity) Note: JND thresholds are NOT a fixed value, which depend on different images and approaches Note: JND thresholds are NOT a fixed value, which depend on different images and approaches

Perceptual watermark techniques Image-Independent watermark Image-Independent watermark Image-dependent or Image-adaptive watermark Image-dependent or Image-adaptive watermark

Image-Independent watermark A typical method (Cox approach) A typical method (Cox approach)  Key points Place watermark in perceptually significant components (low frequency) (for robustness)Place watermark in perceptually significant components (low frequency) (for robustness) –Modify by a small amount below Just-noticeable-difference (JND) Use long random vector as watermark to avoid artifactsUse long random vector as watermark to avoid artifacts Any difference if using other watermark instead (w-b images, logo) (for imperceptibility & robustness)Any difference if using other watermark instead (w-b images, logo) (for imperceptibility & robustness)  Embedding v’ i = v i +  v i w i = v i (1+  w i ) Perform DCT on entire image and embed watermark in DCT coefficientsPerform DCT on entire image and embed watermark in DCT coefficients Choose N=1000 largest AC coeff. and scale {vi} by a random factorChoose N=1000 largest AC coeff. and scale {vi} by a random factor  Detection

Block diagram of Cox ’ s scheme 2D DCTsor t v’=v (1+  w) IDCT & normalize Original image N largest coeff. other coeff. marke d image random vector generator wm k seed

Implementation Avoiding to change the corresponding location of each coefficient in the image, when you sort the vector projected from matrix of DCT coefficients

Challenging problem How to improve Cox approach How to improve Cox approach Global scaling factor is not suitable for all coefficientsGlobal scaling factor is not suitable for all coefficients - Maybe beyond the threshold in some areas of image, especially obvious in the smooth background area - Maybe beyond the threshold in some areas of image, especially obvious in the smooth background area More explicitly compute Just-noticeable-differenceMore explicitly compute Just-noticeable-difference –JND ~ max amount each frequency coefficient can be modified imperceptibly –Use  i for each coefficients  finely tune watermark strength OverheadOverhead - Cost of computation of thresholds for each coefficient - Cost of computation of thresholds for each coefficient

Image-dependent or Image-adaptive watermark Block-based DCT approach Block-based DCT approach Wavelet DWT approach Wavelet DWT approach

Image-Adaptive watermark General Image-Adaptive watermark scheme  X* u,v : The watermarked image  X u,v : The original image  W u,v : The sequence of watermark values  J u,v : The computed JND for each coefficient Question: Why Xu,v > Ju,v (from local image, considering properties of HVS)

Block-based DCT approach Nonoverlapping 8x8 blocks DCT applied to each block independently X u,v,b : The DCT coefficients X * u,v,b : The watermarked DCT coefficients W u,v,b : The sequence of watermark values t C u,v,b : The computed JND calculated from the visual model Key points Block-by-block DCT How to derive t C u,v,b

Block-based DCT approach t F u,v : a frequency threshold value, which is an 8x8 matrix values for each DCT basis function t L u,v,b : Luminance sensitivity estimated by the formula. X 0,0,b : DC coeff. for block b X 0,0,b : DC coeff. for block b X 0,0 : DC coeff. Corresponding to the mean luminance of the display X 0,0 : DC coeff. Corresponding to the mean luminance of the display a: parameter controlling the degree of luminance sensitivity (empirical value=0.649) a: parameter controlling the degree of luminance sensitivity (empirical value=0.649) t C u,v,b :Contrast masking threshold, where w between 0 and 1, a empirical value for w is 0.7

Block diagram of IA-DCT approach Calculate JNDs Calculate JNDs Watermark Insertion Watermark Insertion DCT Original image X(i,j)X(u,v) Watermark sequence W(u,v) Watermarked image X*(u,v) J(u,v)

Wavelet DWT approach Key point Key point  Hierarchy Decomposition  The upper left corner: Lowest frequency band.  l: resolution level 1, 2, 3, 4  F: frequency orientation 1, 2, 3  Much simpler than DCT app. - Cost of computing JNDs - Cost of computing JNDs

Wavelet DWT approach X u,v,l,f : wavelet coefficient at position(u,v) in resolution level l and frequency orientation f X * u,v,l,f : watermarked wavelet coefficient W u,v,l,f : watermark sequence t F l,f : computed frequency weight at level l and frequency orientation f, which could be further refined by adding image-dependent components like DCT approach

Detection Detection scheme for Block-based DCT 1. Based on classical detection theory as SS detection (Cox) - Original image is subtract from watermarked image and correlation between the signal difference and the watermark sequence is determined - The correlation value is compared to a threshold to determine whether the received image contains the watermark.

Testing IA-DCT without original image Key points 1. Assume original image has been JPEG compressed 2. Feature vector {X f }, X D is greater than ½ of its corresponding quantization table value Q 3. W is only inserted in {X f } 4. A correlation measure c is found between {Z f } and W 5. A threshold test is performed on c to determine if the W under test is present in Z

Detection Detection for Wavelet Detection for Wavelet 1. First, the correlation is performed separately at each level 1. First, the correlation is performed separately at each level 2. Second, We calculate the average for each resolution level l and freq. orientation f 2. Second, We calculate the average for each resolution level l and freq. orientation f 3. At last, we choose the maximum correlation value over all the possible levels as well as freq. locations 3. At last, we choose the maximum correlation value over all the possible levels as well as freq. locations

Comparison Image-Independent vs Image-Adaptive Image-Independent vs Image-Adaptive Image Quality Image Quality All acceptable, but SS watermark is most visible in the smooth background area. All acceptable, but SS watermark is most visible in the smooth background area. Robustness to Compression and Cropping Robustness to Compression and Cropping Winner: IA-W Winner: IA-W Robustness to Scaling Robustness to Scaling Winner: IA-W again Winner: IA-W again Robustness to shift Robustness to shift Only IA-W survives Only IA-W survives

Video watermarks Unique requirements for watermarks Unique requirements for watermarks Extension of the IA-DCT Technique to Video Extension of the IA-DCT Technique to Video Watermarking of MPEG-2 Watermarking of MPEG-2 Scene-Adaptive Video Watermarking Scene-Adaptive Video Watermarking Watermarking Standards Watermarking Standards

Key points in paper What ’ s the perceptual watermark What ’ s the perceptual watermark How does HVS work for watermark applications How does HVS work for watermark applications Three typical watermarking techniques Three typical watermarking techniques

Papers Perceptual Watermarks for Digital Image and video Perceptual Watermarks for Digital Image and video RAYMOND B. WOLFGANG RAYMOND B. WOLFGANG CHRISTINE I. PODILCHUK AND EDWARD J. DELP CHRISTINE I. PODILCHUK AND EDWARD J. DELP Image-Adaptive Watermarking Using Visual Models Image-Adaptive Watermarking Using Visual Models CHRISTINE I. PODILCHUK AND WENJUN ZENG CHRISTINE I. PODILCHUK AND WENJUN ZENG

Thank you for your attention PPT file and papers can be downloaded from website PPT file and papers can be downloaded from website Contact info: Contact info: Name: Qi, Pei Name: Qi, Pei