Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
N-Secure Fingerprinting for Copyright Protection of Multimedia
2005/6/16 by pj 1 Hiding Biometric Data Hiding Biometric Data IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 25, NO. 11, NOVEMBER.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Digital watermarking technique for protecting digital images
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Video Coding with Spatio-temporal Texture Synthesis and Edge-based inpainting Chunbo Zhu, Xiaoyan Sun, Feng Wu, and Houqiang Li ICME 2008.
Claudia Schremmer / University of Mannheim / Germany Digital Image Watermarking Claudia Schremmer University of Mannheim / Germany September 2001 Teleseminar.
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
Secure Spread Spectrum Watermarking for Multimedia Ishani Vyas CS590 Winter 2008.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
A Review on: Spread Spectrum Watermarking Techniques
Digital Watermarking Parag Agarwal
A public fragile watermarking scheme for 3D model authentication Chang-Min Chou, Din-Chang Tseng Computer-Aided Design Vol. 38 (Nov. 2006) 1154–1165 Reporter:
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Zhejiang University Wavelet-based 3D mesh model watermarking Shi Jiao-Ying State Key Laboratory of CAD&CG, Zhejiang University, Hangzhou
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles Marwen HASNAOUI Maher BELHAJ Mihai MITREA Françoise PRETEUX ARTEMIS.
Digital Watermarking
數位內容保護與多媒體趨勢研 討會 主講人:呂俊賢博士 中央研究院 資訊科學研究所 助研究員 12/18/2004 高雄第一科技大學 報告者:馮振邦.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Detection of Image Alterations Using Semi-fragile Watermarks
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Correspondence search using Delaunay triangulation Rishu Gupta
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Visible Watermarking of An Image Using DCT Technique
A review of audio fingerprinting (Cano et al. 2005)
Vishal Monga, Divyanshu Vats and Brian L. Evans
DONE BY S.MURALIRAJAN M.NIRMAL
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Author: Minoru Kuribayashi, Hatsukazu Tanaka
I-Chuan Chang Bor-Wen Hsu and Chi Sung Laih
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf. on Multimedia and Expo: special session on Media Identification, Taipei, Taiwan, 2004 Reporter: Jen-Bang Feng

2 Outline Watermarking and Hashing The Proposed Method Conclusions

3 Watermarking and Hashing Digital Watermarking (Data Hiding) Content has to be modified (a data hiding technique) Contents to be protected must be watermarked Measures “ originality ” Stand-along Media Hashing (Fingerprinting) Content is not modified (a non-hiding technique) Can track the usage of contents already available in the public domain Measure “ similarity ” Connection to database required

4 Robust Signal Hashing Problem Hash(Baboon) = XXX … Hash(Lena) = YYY … Hash(Lena 2) = ZZZ … Should be very different Should be sufficiently similar

5 Perceptual Hashing The fragility of cryptography hashing is too restricted Media data permits acceptable distortions Media hashing needs Robustness (error-resilience) Collision-free Fast searching (complexity) Scalability

6 Track 1 Architecture for Robust Identification of Media Content Track Track 1 Meta data Fingerprint Generator Database Compare Fingerprint Generator Test Track If match Return Track ID Confidence

7 The Proposed Method DWT Original image Harris detector Delaunay tesslation Mesh normalization Mesh-based Hash extraction Lowest-frequency component Mesh generation Normalized meshes Hash sequence

8 The Proposed Method

9 Mesh Normalization A B C MkMk A’A’ B’B’ C’C’ M k norm

10 Mesh-Based Hashing 32 4x4 DCT Total 64 blocks 64 bits per mesh, half 1 ’ s and half 0 ’ s

11 Conclusions The number of 0 ’ s and 1 ’ s are the same Collision-free Robust against attacks

12 Watermark Attacks Watermarking Attacks Removal Attack Geometrical Attack Cryptographic Attack Protocol Attack Denoising Lossy compression Quantization Remodulation Collusion Averaging Global, local warping Global, local transforms Jittering Brute force key search Oracle Watermark inversion Copy attack Voloshynovskiy et al. “ attacks modeling: towards a second generation watermarking benchmark, ” Signal Processing, 2001 Kutter and Petitcolas, “ A fair benchmark for image watermarking systems, ” Proc. SPIE99

13 Harris Detector where I(x, y) is the grey level intensity and where A represents the integration of A on a given neighborhood. If at a certain point the two eigenvalues of the matrix are large, then a small motion in any direction will cause an important change of grey level. This indicates that the point is a corner.

14 Harris Detector The corner response function is given by: where k is a parameter set to 0.04 (a suggestion of Harris). Corners are defined as local maxima of the cornerness function. Sub-pixel precision is achieved through a quadratic approximation of the neighborhood of the local maxima.

15 Delaunay Triangulation Voronoi Diagrams 每一點皆屬於最靠近的一區 ama/voro/edelacli.html ama/voro/edelacli.html