DIGITAL WATERMARKING Ngô Huy Phúc50701831 Trần Kim Lân50701259 Phạm Quốc Hiệp50700812.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Brodatz Textures Vistex Textures What is texture ? Texture can be considered to be repeating patterns of local variation of pixel intensities.
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
Steganography detection Roland Cmorik, Martin Šumák.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Digital Watermarking
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Detection of Image Alterations Using Semi-fragile Watermarks
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
DEPARTMENT OF ECE, BEC, BAGALKOT
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
IMAGE PROCESSING IMAGE WATERMARKING
Visible Watermarking of An Image Using DCT Technique
DONE BY S.MURALIRAJAN M.NIRMAL
Visit for more Learning Resources
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Spread Spectrum Watermarking
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp

PART 1 INTRODUCTION

STEGANOGRAPHY Steganography (art of hidden writing) – The art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. – The existence of information is secret.

Histaeus used his slaves (information tattooed on a slave’s shaved head) Initial Applications of information hiding  Passing Secret messages STEGANOGRAPHY

Physical steganography

STEGANOGRAPHY Digital steganography Network steganography

DEFINITION The process of embedding information into a digital signal in a way that is difficult to remove. The signal may be text, images, audio, video. The information is also carried in the copy if the signal is copied.

DEFINITION Example:

GENERAL APPLICATIONS Copyright Protecton To prove the ownership of digital media.

Tamper proofing To find out if data was tampered. GENERAL APPLICATIONS

Quality Assessment Degradation of Visual Quality Loss of Visual Quality GENERAL APPLICATIONS

LIFE-CYCLE PHASES Attemp to extract watermark from signal The marked signal is modified Produce watermarked signal

CLASSIFICATION Digital watermarking techniques can be classified in many ways : Visibility Robustness Perceptibility Capacity Embedding method

VISIBILITY Visible – Text or a logo which identifies the owner of the media. Invisible – Information is added as digital data to audio, picture or video, but it cannot be perceived. – May be a form of Steganography.

ROBUSTNESS Robust – Resisted a designated a class of transformations. – Against adversary based attack. (e.g. noise addition to images) – Used in copy protection application. Example: Robust Private Spatial Watermarks

ROBUSTNESS Fragile – Fail to be detected after the slightest modification. – Used for tamper detection. Example: Blind Fragile DCT based Watermarks

ROBUSTNESS Semi-fragile – Resist benign tramsformations but fails detection after malignant transformations. – Robust against user-level operation. (e.g. image compression) – Used for detect malignant transformation. Example: Blind Semi-fragile Spatial Watermarks

PERCEPTIBILITY Perceptible – Its presence in the marked signal is noticable, but non-intrusive. Imperceptible – Original cover signal and the marked signal are close to perceptually indistinguishable.

PERCEPTIBILITY Stanford Bunny 3D Model Visible Watermarks in Bunny Model  Distortion Watermarking Stanford Bunny 3D Model Watermarking Invisible Watermarks in Bunny Model  Minimal Distortion

CAPACITY Depend on the length of the embedded message. Zero-bit long – Detect the presence or absence of the watermark. – A 1 denotes the presence. 0 denotes the absence. N-bit long – Modulated in the watermark. – Support multiple watermarks.

EMBEDDING METHOD Spread-spectrum – The marked signal is ontained by an additive modification. – Modestly robust. – Have a low information capacity.

EMBEDDING METHOD Quantization type – The marked signal is ontained by quantization – Low robustness. – Have a high infoirmation capacity. Amplitude modulation – The marked signal is ontained by additive modification similar to spread spectrum method. – Embedded in the spatial domain.

As much information (watermarks) as possible.  Capacity Only be accessible by authorized parties.  Security Resistance against hostile/user dependent changes  Robustness Invisibility  Imperceptibility DESIGN REQUIREMENTS

PART 2 SPECIFIC WATERMARKING TECHNIQUES ON IMAGES

A very simple yet widely used technique for watermarking images is to add a pattern on top of an existing image. Usually this pattern is an image itself - a logo or something similar. SIMPLE WATERMARKING

The LSB technique is the simplest technique of watermark insertion. Consider a still image : each pixel of the color image has three components — red, green and blue. Allocate 3 bytes for each pixel. Then, each colour has 1 byte, or 8 bits. LSB : LEAST SIGNIFICANT BIT

A pixel that is bright purple in colour can be showN as X0 = {R=255, G=0, B=255} Look at another pixel: X1 = {R=255, G=0, B=254} Detecting a difference of 1 on a color scale of 256 is almost impossible for human eye.  Replace the color intensity information in the LSB with watermarking information, the image will still look the same to the naked eye. LSB : LEAST SIGNIFICANT BIT

Use a secret key to choose a random set of bits. The more bits used in the host image, the more it deteriorates. Increasing the number of bits used though obviously has a beneficial reaction on the secret image increasing its clarity. LSB : LEAST SIGNIFICANT BIT

Host image is on the left, watermark image is on the right LSB : LEAST SIGNIFICANT BIT

Watermarking in the frequency domain involves selecting the pixels to be modified based on the frequency of occurrence of that particular pixel. Transform an image into the frequency domain. A block-based DCT watermarking approach is implemented. An image is first divided into blocks and DCT is performed on each block. The watermark is then embedded by selectively modifying the middle- frequency DCT coefficients. FREQUENCY-BASED TECHNIQUES

What is DCT ? Formally, the discrete cosine transform (DCT) is a linear, invertible function F : R N -> R N (where R denotes the set of real numbers), or equivalently an invertible N × N square matrix FREQUENCY-BASED TECHNIQUES

Discrete wavelet transform (DWT) The image is separated into different resolution The original image is high-pass filtered, yielding the three large images, each describing local changes details in the original image It is then low-pass filtered and downscaled, yielding an approximation image. This image is high-pass filtered to produce the three smaller detail images. And low-pass filtered to produce the final approximation image in the upper-left. WAVELET WATERMARKING TECHNIQUES

Embedding the watermark The host image and watermark are transformed into wavelet domain. The transformed watermark coefficients were embedded into those of host image at each resolution level with a secret key. WAVELET WATERMARKING TECHNIQUES

A Narrow-band signal is transmitted over a much larger bandwidth such that the signal energy presented in any signal frequency is undetectable A watermark is spread over many frequency bins so that the energy in one bin is very small and certainly undetectable. SPREAD-SPECTRUM TECHNIQUES

Because the watermark verification process knows the location and content of the watermark, it is possible to concentrate these weak signals into a single output with high SNR ( Signal-to-noise ratio). Remark – To destroy such a watermark would require noise of high amplitude to be added to all frequency bins. – The location of the watermark is not obvious. – Frequency regions should be selected that ensures degradation of the original datafollowing any attack on the watermark. SPREAD-SPECTRUM TECHNIQUES

References Techniques and Applications of Digital Watermarking and Content Protection Michael Arnold, Martin Schmucker, Stephen D. Wolthusen Steganography And Digital Watermarking Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett, School of Computer Science, The University of Birmingham. Real-Time Digital Image Watermarking Subramaniam Ganesan, Professor of Oakland University, Michigan

PART 3 ATTACKING METHODS

Foundations of Attacking 3 effects make detection of watermarking useless: – Watermark cannot be detected. – False watermarks are detected. – Unauthorized detection of watermark.

Classification of Attacking Removal attacks Geometrical attacks Cryptographic attacks Protocol attacks

Classification of watermarking attacks

Removal Attacks Most obvious method Aim for complete removal of watermarking Extreme form of this type is restore the original object Can happen unintentionally due to operations in some certain applications.

Geometrical Attacks Do not actually remove the embedded watermark Intend to distort the watermark detector synchronization with the embedded information

Cryptographic Attacks Aim at cracking the security methods in watermarking schemes Finding a way to remove the embedded watermark information Embed misleading watermarks High computational complexity

Protocol Attacks Aim at attacking the entire concept of the watermarking application First proposed in framework of invertible watermark The attacker subtracts his own watermark from the watermarked data and claims to be the owner Another type is copy attack

Some Methods Collusion Attack – Estimate the watermark from different works with same watermark – The attackers can obtain an approximation of the watermark by averaging the watermarked works

Some Methods Remodulation Attack Damage watermark base on watermark estimation

Some Methods Copy Attack Estimate a watermark from watermarked data and copy it to some other data