NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
N-Secure Fingerprinting for Copyright Protection of Multimedia
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Fifth International Conference on Information
Slide 1 Joe O’Ruanaidh Siemens Corporate Research Princeton, NJ Digital Watermarking: How it works! SIGGRAPH’99 Panel Friday 13 August 2:15pm - 4:00pm.
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
Department of Informatics, Aristotle University of Thessaloniki1 Transform Based Watermarking Solachidis Vassilios Department of Informatics Aristotle.
Secure Spread Spectrum Watermarking for Multimedia Ishani Vyas CS590 Winter 2008.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Digital Signal Processing Final Project Proposal R 資工碩一 馬智釗 Reference : “Rotation, scale, and translation resilient digital watermarking based.
A Review on: Spread Spectrum Watermarking Techniques
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Mesh Watermarking based on 2D Transferred Domain Jongyun Jun Tae-Joon Kim CS548 Term Project Presentation 2010/05/13.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
NTIT1 A chaos-based robust wavelet- domain watermarking algorithm Source: Chaos, Solitions and Fractals, Vol. 22, 2004, pp Authors: Zhao Dawei,
Jaroslaw Kutylowski 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Robust Undetectable Interference Watermarks Ryszard Grząślewicz.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
CSE725.  Watermarking dates back in History.  Cryptography for protection.  Need of software for ownership protection.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Date of download: 6/2/2016 Copyright © 2016 SPIE. All rights reserved. Watermarking the intensity component of a color image using the IHS color coordinate.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
DONE BY S.MURALIRAJAN M.NIRMAL
Robustness Evaluation of Perceptual Watermarks
Image Watermarking Chu, Hsi-Cheng.
Recent Developments on Multimedia and Secure Networking Technologies
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Steganography in digital images
Parag Agarwal Digital Watermarking Parag Agarwal
Author: Minoru Kuribayashi, Hatsukazu Tanaka
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Authors: J.J. Murillo-Fuentes
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu Department of Computer and Information Science Brooklyn College of the City University of New York 2900 Bedford Avenue, Brooklyn, NY 11210

NYMAN 2004, New York City 2 E. Ganic & Ahmet M. Eskicioglu PROTECTION OF MULTIMEDIA DATA  Multimedia is the presentation of information in multiple forms of media (text, graphics, images, animation, audio, and video) in a given application.  Encryption and watermarking are two groups of complementary technologies for copy prevention and copyright protection.  A digital watermark is a pattern of bits inserted into a multimedia element such as an image, an audio or video file.  3 criteria to classify image watermarking systems  Type of domain: pixel & transform  Type of watermark: PRN sequence & visual watermark  Type of information needed for detection: Original image, secret keys & watermark  Detection  False positives: detecting the watermark in an unmarked image  False negatives: not detecting the watermark in a marked image

NYMAN 2004, New York City 3 E. Ganic & Ahmet M. Eskicioglu DIGITAL WATERMARKING  Watermarking technology is becoming mature.  Recent DWT or DCT domain watermarking schemes  Robust against a number of attacks  Not useful for geometric attacks like rotation, translation, and scaling  Current focus is on DFT-based watermarking.  In two papers, a circularly symmetric watermark is embedded in the DFT domain  Solachidis and Pitas [1999]: a 2D circularly symmetric sequence in a ring covering the middle frequencies  Licks and Jordan [2000]: use a watermark in the form of a circle with a radius that corresponds to higher frequencies of the image  Recent work: Mehul and Priti [2003]  embedding a watermark in low frequencies is robust to one set of attacks  embedding a watermark in high frequencies is robust to another set of attacks

NYMAN 2004, New York City 4 E. Ganic & Ahmet M. Eskicioglu CIRCULAR WATERMARK  We extend the multiple watermarking idea by inserting two circular watermarks in the DFT domain.  Test image: 256x256 Lena  Two radii:  32 (corresponds to lower frequencies)  96 (corresponds to higher frequencies)  Attacks with MATLAB  JPEG compression  Gaussian noise  Blurring  Resizing  Histogram equalization  Contrast adjustment  Gamma correction  Scaling  Rotation  Cropping

NYMAN 2004, New York City 5 E. Ganic & Ahmet M. Eskicioglu TEST IMAGE Original LenaWatermarked Lena

NYMAN 2004, New York City 6 E. Ganic & Ahmet M. Eskicioglu ATTACKS JPEG Gaussian noiseblurringGamma correction Resizing Cropping Histogram equalizationContrast adjustmentRotation JPEG

NYMAN 2004, New York City 7 E. Ganic & Ahmet M. Eskicioglu DETECTION  Presence of the watermark is detected using the correlation  Decision rule  H 0 : the image is watermarked with W if c  T  H 1 : the image is not watermarked with W if c < T  Threshold T = (  0 +  1 )/2  0 : the expected values of the Gaussian probability density functions (pdfs) associated with the hypotheses H 0  1 : the expected values of the Gaussian probability density functions (pdfs) associated with the hypotheses H 1

NYMAN 2004, New York City 8 E. Ganic & Ahmet M. Eskicioglu EXPERIMENTAL RESULTS: THRESHOLDS AND FALSE NEGATIVES Radius = 96Radius = 32 T%T% JPEG Gaussian noise blurring resizing histogram equalization contrast adjustment gamma correction scaling rotation cropping

NYMAN 2004, New York City 9 E. Ganic & Ahmet M. Eskicioglu EXPERIMENTAL RESULTS: THRESHOLDS AND FALSE POSITIVES Radius = 96Radius = 32 T%T% JPEG Gaussian noise blurring resizing histogram equalization contrast adjustment gamma correction scaling rotation cropping

NYMAN 2004, New York City 10 E. Ganic & Ahmet M. Eskicioglu CONCLUSIONS  Embedded in higher frequencies  the percentage of false negatives or positives is higher for one group of attacks JPEG, Gaussian noise, blurring, and resizing  the percentage of false negatives or positives is lower for another group of attacks histogram equalization, contrast adjustment, gamma correction, scaling, rotation, and cropping  Embedding in lower frequencies  the percentage of false negatives or positives is lower for one group of attacks JPEG, Gaussian noise, blurring, and resizing  the percentage of false negatives or positives is higher for another group of attacks histogram equalization, contrast adjustment, gamma correction, scaling, rotation, and cropping  For all attacks, the percentages of false positives are lower than false negatives.