ECE738 Advanced Image Processing Data Hiding (2 of 3) Curtsey of Professor Min Wu Electrical & Computer Engineering Univ. of Maryland, College Park.

Slides:



Advertisements
Similar presentations
Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Advertisements

Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Watermarking Techniques Digital Rights Seminar © April 28, 2006 Mahmoud El-Gayyar.
EE565 Advanced Image Processing Copyright Xin Data Hiding in Image Adapted from ENEE631 UMD ECE by Courtesy of Prof. Min Wu UMCP ENEE631 Slides.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Secure Spread Spectrum Watermarking for Multimedia Ishani Vyas CS590 Winter 2008.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
ECE738 Advanced Image Processing Data Hiding (1 of 3) Curtsey of Professor Min Wu Electrical & Computer Engineering Univ. of Maryland, College Park.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Perceptual Watermarks for Digital Image and Video ECE 738 paper presentation Pei Qi ECE at UW-Madison
Digital Watermarking Parag Agarwal
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Watermarking Text Document Images Using Edge Direction Histograms Young-Won Kim and Il-Seok Oh Pattern Recognition Letters, Vol. 25, 2004, pp – 1251.
ENEE631 Digital Image Processing (Spring'04) Introduction to Data Hiding in Image & Video Spring ’04 Instructor: Min Wu ECE Department, Univ. of Maryland,
ENEE631 Digital Image Processing (Spring'09) Image Forensics Spring ’09 Instructor: Min Wu Electrical and Computer Engineering Department, University of.
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles Marwen HASNAOUI Maher BELHAJ Mihai MITREA Françoise PRETEUX ARTEMIS.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Digital Watermarking
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
ELE 488 F06 ELE 488 Fall 2006 Image Processing and Transmission (12 – 7 – 06) Digital Watermarking What? Why? How? Attacks, Legal issues 12/7.
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
Quantization Watermarking Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems Brian Chen, Ph. D. Dissertation,
Detection of Image Alterations Using Semi-fragile Watermarks
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Watermarking with Side Information
Basic Concepts of Audio Watermarking
Watermarking for Image Authentication ( Fragile Watermarking )
Data Hiding in Binary Image for Authentication and Annotation Min Wu and Bede Liu, IEEE Trans. on Multimedia, August.2004 Multimedia Security.
A User Attention Based Visible Watermarking Scheme
Multimedia Data Hiding: What, Why, and How?
Digital Watermarking Lecture 2
Presentation transcript:

ECE738 Advanced Image Processing Data Hiding (2 of 3) Curtsey of Professor Min Wu Electrical & Computer Engineering Univ. of Maryland, College Park

ECE738 Advanced Image Processing Min U. Maryland Recall: Spread Spectrum Approach Key points –Place wmk in perceptually significant spectrum (for robustness) Modify by a small amount below Just-noticeable-difference (JND) –Use long random vector as watermark to avoid artifacts (for imperceptibility & robustness) Cox’s approach –Perform DCT on entire image and embed wmk in large DCT AC coeff. –Embedding: v’ i = v i +  v i w i = v i (1+  w i ) –Detection: subtract original and perform correlation w/ wmk Podilchuk’s improvement –Embed in many “embeddable” AC coeff. in block-DCT domain –Adjust watermark strength by explicitly computing JND

ECE738 Advanced Image Processing Min U. Maryland A Few Comments on Cox/Podilchuk Approaches “1000 largest coeff.” before and after embedding –May not be identical (and order may also changes) –Solutions: use “embeddable” mask to avoid mis-synch. Detection without using original/host image –Treat host image as part of the noise/interference ~ Blind detection need long wmk signal to combat severe host interference [Zeng-Liu] –Can do better than blind detection as embedder knows the host “Embedding with Side Info.” ~ will discuss this later Robustness –Very robust against additive noise (seen from detection theory) –Very sensitive to synchronization errors esp. under blind detection and … jitters (line dropping/addition) geometric distortion (rotation, scale, translation) => add registration pattern or embed in RST-invariant domain

ECE738 Advanced Image Processing Min U. Maryland Data Hiding Beyond Additive Approach

ECE738 Advanced Image Processing Min U. Maryland Examples Odd-even embedding –Round a feature to nearest even# to embed “0” and to odd# to embed “1” –Work in quantized domain to achieve limited robustness (-Q/2, +Q/2) –Err. Correction Codes also help combat errors & improve hiding rate –Equiv. formulation: Quantization Index Modulation (QIM) [Chen et al.] select between two non-overlapped quantizer with relative offset Q’/2 Table look-up embedding: give additional security feature value 23Q 24Q 25Q 26Q lookup table mapping… … feature value 2kQ (2k+1)Q (2k+2)Q (2k+3)Q odd-even mapping lookup table mapping … …

ECE738 Advanced Image Processing Min U. Maryland Type-II Relationship Enforcement Embedding Deterministically enforcing relationship –Partition host signal space into sub-regions each region is labeled with 0 or 1 marked sig. is from a region close to orig. & labeled w/ the bit to hide –Secondary info. carried solely in X’ Difference (X’-X) doesn’t necessarily reflect the embedded data Representative: odd-even embedding –No interference from host signal => High capacity but limited robustness –Robustness achieved by quantization or tolerance zone mapping { b} data to be hidden X host sig. X’= f( b ) marked copy 1 or 0

ECE738 Advanced Image Processing Min U. Maryland Hiding Data in Binary Images  How Embedding Mechanisms are Used?  Other Issues Besides Embedding Mechanisms

ECE738 Advanced Image Processing Min U. Maryland Binary Image: A Simple yet Important Class –scanned documents, electronic publishing, drawings, signatures Social Security E-Files From Princeton EE201 lab material

ECE738 Advanced Image Processing Min U. Maryland Copyright Protection for E-Publishing Change horizontal and vertical spacing to embed data –Eyes can not easily identify such changes –“Make it difficult and not worthwhile rather than impossible” for cheap, high-volume content ~ newspaper, magazine, E-books possible to remove watermark, but why not just pay a bulk –Embedding may be through additive spread-spectrum or enforcement from N.F. Maxemchuk, S. Low: “Marking Text Documents”, ICIP, 1997.

ECE738 Advanced Image Processing Min U. Maryland Authentic Signatures? Digitized signatures become popular in everyday life –At least a good interim solution to carry a long tradition to digital world Forgery and mis-use of signatures Clinton electronically signed Electronic Signatures Act - Yahoo News 6/30/00 media/gif/bil.gif as of 7/00 (link no longer valid) E-PAD (InterLink Electronics)

ECE738 Advanced Image Processing Min U. Maryland “Signature in Signature” –Annotating digitized signature with content info. of the signed document

ECE738 Advanced Image Processing Min U. Maryland Binary Image D.H. for Authentication/ Annotation Security against forgery is a primary design requirement –Robustness against unintentional noise is desirable but not critical Challenges –little room for “invisible” changes –uneven distribution of changeable pixels A block-based pixel-domain method –hide a fixed number of bits in each block –extract hidden data without the use of original copy Three issues on data embedding –determine which pixels to flip for invisibility –embed data in each block using flippable pixels –handle uneven embedding capacity via shuffling Robustness is not a major requirement for authentication and annotation applications.

ECE738 Advanced Image Processing Min U. Maryland Preserve Visual Quality Assign flippability score to each pixel –Determine how noticeable the flipping of a pixel is –Based on smoothness and connectivity –Hierarchical Sort pixels in each block according to the scores –Flip high-score pixels with high priority (a) (b)

ECE738 Advanced Image Processing Min U. Maryland Embedding Mechanism Extracting data without original image –Hard to directly encode data in flippable pixels flippability may change after encoding Embedding via deterministic enforcement –Manipulate flippable pixels to enforce block-based property enforce the total number of black pixels to be odd/even to hide 1 bit / block, or use more general mapping incorporate quantization or tolerance zone for robustness # of black pixel per blk 2kQ (2k+1)Q (2k+2)Q (2k+3)Q odd-even mapping lookup table mapping … …

ECE738 Advanced Image Processing Min U. Maryland Pixels with high flippability score are shown in the images. Unevenness in Embedding Uneven distribution of flippable pixels –most are on rugged boundary Embedding rate (per block) –variable: need side info. –constant: require larger blk Random shuffling equalizes distribution –embed more bits –enhance security –con: sensitive to jitter and mis-alignment embeddble coeff. # per block (signature img) portion of blocks before shuffle after shuffle Important ! image size 288x48, red block size 16x16

ECE738 Advanced Image Processing Min U. Maryland before shuffle std after shuffle mean after shuffle Compare Analysis with Simulation for Shuffling Simulation: 1000 indep. random shuff. q = 16 x 16 S = 288 x 48 N = S/q = 18 x 3 p = 5.45% before shuffle mean after shufflestd after shuffle analysissimulationanalysissimulation m 0 /N (0 th bin) 20.37%5.16x10 -5 %0 %9.78x m 1 /N (1 st bin) 1.85%7.77x10 -4 %0 %3.79x m 2 /N (2 nd bin) 5.56%5.81x10 -3 %5.56x10 -3 %0.0010

ECE738 Advanced Image Processing Min U. Maryland Example-1: “Signature in Signature” –Annotating digitized signature with content info. of the signed document Each block is 320- pixel large, 1bit / blk.

ECE738 Advanced Image Processing Min U. Maryland Example-2: Annotating Binary Line Drawings original marked w/ “01/01/2000” pixel-wise difference

ECE738 Advanced Image Processing Min U. Maryland Summary More on additive spread-spectrum embedding Alternative embedding mechanism via enforcement Data hiding in binary image –Manipulate spacing for copyright protection of text document –Pixel-domain enforcement for annotation  Next time –Data hiding for authentication –Embedding Capacity and Advanced “Hybrid” embedding mechanism

ECE738 Advanced Image Processing Min U. Maryland Suggested Reading –Wu-Liu: 2-Part, binary wmk –Maxemchuk-Low: Doc. wmk –Yeung-Mintzer: Authentication –Lin-Chang: Semi-Fragile wmk –Lin-Delp: Authentication survey  See the reading list in course web page