AFOSR PROGRAM REVIEW JUNE 5-7, 2003 PRINCETON, NJ DATA HIDING IN TIME-FREQUENCY DISTRIBUTION OF IMAGES Bijan Mobasseri ECE Department Villanova University.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Watermarking Techniques Digital Rights Seminar © April 28, 2006 Mahmoud El-Gayyar.
Information Hiding: Watermarking and Steganography
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
ECE643 DIGITAL IMAGE PROCESSING Steganalysis versus Splicing detection Paper by: Yun Q. Shi, Chunhua Chen, Guorong Xuan and Wei Su By: Nehal Patel Siddharth.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
A Review on: Spread Spectrum Watermarking Techniques
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Digital Steganography
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Damageless Information Hiding Technique using Neural Network Keio University Graduate School of Media and Governance Kensuke Naoe.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Introduction to Steganalysis Schemes Multimedia Security.
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
Multiple-description iterative coding image watermarking Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 20, No. 4, pp , 2010.
Quantization Watermarking Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems Brian Chen, Ph. D. Dissertation,
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Compressive Sensing Techniques for Video Acquisition EE5359 Multimedia Processing December 8,2009 Madhu P. Krishnan.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Visible Watermarking of An Image Using DCT Technique
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Welcome
Increasing Watermarking Robustness using Turbo Codes
Steganography with Digital Images
A Data Hiding Scheme Based Upon Block Truncation Coding
Information Theoretical Analysis of Digital Watermarking
Authors: J.J. Murillo-Fuentes
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

AFOSR PROGRAM REVIEW JUNE 5-7, 2003 PRINCETON, NJ DATA HIDING IN TIME-FREQUENCY DISTRIBUTION OF IMAGES Bijan Mobasseri ECE Department Villanova University Villanova, PA 19085

2 Outline Data hiding definition and modalities Motivation for using TF distributions Wigner distribution Watermarking model Embedding and detection Capacity Future work

3 Data hiding requirements Data hiding must meet at least the following three conditions: –Transparency; no visible impact on the cover signal –Robustness; Survive “friendly fire”: filtering, compression, cropping but break under attacks –Security; hidden data should not be easily removed or replaced

4 Data hiding modalities Watermarking –Message itself is not secret: owner identification, copyright protection, fingerprinting –Transparency, robustness and security still apply. –Embedding capacity not a major issue –In authentication applications, watermark must be content- dependent, secure but somewhat brittle Steganography –Used as a covert channel, the message is secret and its very presence within the host data must not be detectable

5 Information hiding as a game Information hiding has been stated as a game between two cooperative players (embedder and decoder) and an opponent (attacker) The first party tries to maximize a payoff function and the opponent tries to minimize it (Moulin, O’Sullivan)

6 Data hiding paradigm embedder attackerdecoder P. Moulan, J, O’Sullivan, IEEE Trans IT, March 2003

7 New domain Digital watermarking has heretofore been applied in either spectral or temporal/spatial domains but not in both simultaneously. The ability to watermark joint time-frequency cells provides additional control, capacity and security DCT TFD t f distinct keys

8 Time-varying data hiding t f Watermark can be designed to follow a trajectory in time- frequency plane Attackers have a harder time targeting watermarked bins or have to flood the whole TF plane Attacks with known T-F signatures can be circumvented An N-point signal has N 2 TF distribution cells a substantial fraction of which is available for watermarking

9 Previous work S. Stankovic, I. Djurovic, I. Pitas, “Watermarking in the space/spatial-frequency domain using two-dimensional Radon-Wigner distribution, “IEEE Transaction on Image Processing, vol. 10, no. 4, pp , April They add a sinusoidal pattern to the image in a way that is only detectable in time-frequency domain. It is presented as a watermarking algorithm Our approach hides data in the transform domain instead

10 Generating TFD: Wigner Distribution WD of function x is Fourier transform of its local autocorrelation function. The discrete-time WD of a 1-D signal is given below

11 WD at work

12 Watermarking model We parallel DCT watermarking by additively modifying selected T-F cells of WD. This simple model will not work unless certain precautions are taken into account

13 The Inverse Wigner Not every two dimensional function is an allowed time-frequency representation It is possible that no signal may be found that has the given TFD This is a synthesis problem and can be stated as follows Given a target (watermarked) WD Y, find the corresponding signal x whose Wigner distribution is closest to Y in some sense

14 A time-frequency filtering problem C (1) R (2) f1 f2  1 =Mf 1 ’2’2 M **  * :inadmissible   :admissible M:mapping function H:transformation  2 =HM  1 ’2 2’2 2  1 =Mf 1

15 Solutions There are a number of solutions to this problem. For DTWD: V. Kumar et al, “Discrete Wigner synthesis,” Signal Processing, vol. 11, pp , For DWD: S. Nelatury, B. Mobasseri,” Synthesis of discrete-time discrete- frequency Wigner Distribution “ IEEE Signal Processing Letters, in press.

16 Example: time-frequency filtering

17 2D Wigner Formally, the 2D Wigner Distribution is a 4-D function, In this work, we avoid this by applying a 1D Wigner to each block of image

18 1D Wigner distribution of 2D block Let define an NxN image block Define an “equivalent” linear array then do a 1D Wigner on it Column-wisezigzagrandom

19 Picking the order Since WD reflects local autocorrelation of the signal, different pixel arrangements produce distinctly different TFDs However, we are only interested in the integrity of signal synthesis. In this sense, it makes no difference how is found from X

20 Evidence SNR>300 dB originalreconstructed

21 Compression effect on time- frequency signature If robustness to compression is desired, only compression-resistant TF cells must be watermarked. We evaluate a simple error measure and apply it across JPEG Q-factor

22 Error surfaces

23 Error surfaces Q=30Q=50

24 Which component to watermark? JPEG follows YUV(luma-hue-saturation) color model. We have found that the TF signature of saturation band is most robust to compression

25 Band energy

26 MSE analysis

27 Watermarking Geometry Tile the image: –Exhaustively –Randomly (keyed) Embed one bit, spread spectrum- wise, in the WD of each block Use a unique key per block. Image is then tiled by a reference template

28 Algorithm Summary

29 Watermark detection Watermark is detected based on the following hypothesis testing –Ho: –H1: Rejecting the null hypothesis, when it is true, amounts to the probability of false alarm(picture is incorrectly decided to carry watermark)

30 Test statistic For candidate TF cells, evaluate the following test statistic The null hypothesis will be rejected at  significance level if

31 Watermark strength vs. image PSNR WSR(dB)SNR(dB)  x4 blocks, each carrying one bit Q=50

32 Results

33 Data hiding in saturation band:16x16 blocks Q=5 Q=50 Virtually identical performance across all Q-factors

34 Capacity: are TF cells independent? [Richard’01] has shown that: For all, the number of linearly independent components of discrete WD of x is upper bounded by (N even) For 8x8 blocks, there are 4096 components of which1056 are independent 8x8 DCT produces a maximum of 64 coefficients

35 Payload numbers Capacity=N 2 /block_size Larger block size provides bigger PG and watermark survival at lower Q In lena(256 2 ), we can embed 4096 bits using 4x4 blocks at WSR= -13dB Reliable detection is possible down to Q=25

36 Conclusions and future work A new transform domain for sata hiding is introduced It features high capacity, low probability of intercept and low JPEG Q-factor operation Need work on blind detection Robustness to geometric transformations Capacity and Steganalysis benchmarking

THE END