Concepts of Multimedia Processing and Transmission IT 481, Lecture #9 Dennis McCaughey, Ph.D. 2 April, 2007.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Technical Aspects of Digital Rights Management
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Secure Spread Spectrum Watermarking for Multimedia Ishani Vyas CS590 Winter 2008.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Audio Compression Usha Sree CMSC 691M 10/12/04. Motivation Efficient Storage Streaming Interactive Multimedia Applications.
Concepts of Multimedia Processing and Transmission IT 481, Lecture #13 Dennis McCaughey, Ph.D. 4 December, 2006.
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
1 Lecture 1 1 Image Processing Eng. Ahmed H. Abo absa
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Concepts of Multimedia Processing and Transmission IT 481, Lecture #6 Dennis McCaughey, Ph.D. 17 October, 2006.
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
Detection of Image Alterations Using Semi-fragile Watermarks
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
DEPARTMENT OF ECE, BEC, BAGALKOT
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Technical Aspects of Digital Rights Management
DONE BY S.MURALIRAJAN M.NIRMAL
Watermarking for Image Authentication ( Fragile Watermarking )
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Concepts of Multimedia Processing and Transmission IT 481, Lecture #9 Dennis McCaughey, Ph.D. 2 April, 2007

04/02/2007 IT 481, Spring Project Project will be recovering a student specific watermark from the bird image. MATLAB code will be provided you only have to execute it. This is not a programming project. me at – I will reply with the code. Criteria: –Recover the watermark –Assess the visibility and robustness of the watermarking method

04/02/2007 IT 481, Spring Homework #4 requesting MATLAB code and “bird” picture. I will reply with the code. Load these on a CD and bring to 4/9 class Review the following instructions –Insert the CD –Open Matlab –Under “file” open D\:watermarkread.m –Under “debug” click “run” –When prompted, set the search path to the top of the Matlab search order, click “ok” –When prompted, enter your student ID # Project –Answer the following questions What is the embedded message? How many errors are reported? The number of errors may not equal the misspelled words, Why? – your answers to me by 4/13

04/02/2007 IT 481, Spring Watermarking Watermarking is a secret code described by a digital signal carrying information about the copyright property of the product. The watermark is embedded in the digital data in such a way that it is not visually perceptible. The copyright owner should be the only person who can show the existence of his own watermark and to prove then origin of the product.

04/02/2007 IT 481, Spring Watermark Requirements Alterations introduced into the image or audio should be perceptually invisible. A water mark must be undetectable and not removable by an attacker. A sufficient number of watermarks in the same image or audio, detectable by their own key, can be produced. The detection of the watermark should not require the original image or audio. A watermark should be robust against attacks which preserve the desired quality of the image or audio.

04/02/2007 IT 481, Spring Main Features of Watermarking Perceptual Invisibility Trustworthy Detection Associated Key Automated Detection/Search Statistical Invisibility Multiple Watermarks Robustness

04/02/2007 IT 481, Spring Perceptual Invisibility Watermark should not degrade the perceived image/audio quality Differences may become apparent when the original and watermarked versions are directly compared

04/02/2007 IT 481, Spring Trustworthy Detection Watermarks should constitute a sufficient and trustworthy part of ownership. False alarms should be extremely rare. Watermarks signatures/signals should be complex. An enormous set of watermarks prevents recovery by trial-and-error methods.

04/02/2007 IT 481, Spring Associated key Watermarks should be associated with an identifiable number called the watermark key. Key used to cast, detect and remove the watermark. The key should be private and should exclusively characterize the legal owner. Any signal removed from the image/audio is assumed to be valid only if it can be associated with the key via a well established algorithm

04/02/2007 IT 481, Spring Automated Detection/Search Watermark should combine with a search algorithm.

04/02/2007 IT 481, Spring Statistical Invisibility Watermark should not be recoverable using statistical methods. The possession of a great number of watermarked images, embedded with the same key should not enable the recovery of the watermark through statistical methods. –Watermarks should be image/audio independent.

04/02/2007 IT 481, Spring Multiple Watermarks Multiple watermarks assist in the case where someone illicitly watermarks and already watermarked image/audio. Convenient in transferring copyrighted material.

04/02/2007 IT 481, Spring Robustness A watermark should survive some modifications to the data. Common manipulations to image/video –Data Compression –Filtering –Color, quantization, brightness modifications, geometric distortions, etc –Other trans-coding operations.

04/02/2007 IT 481, Spring Application Domains A1: Carrying value-added metadata –Additional information such as hyperlinks, content based indexing –Malicious and non-malicious attacks –Survive MPEG encoding A2: Copy protection and conditional access –Control Intellectual Property Management and Protection –View and copy options –Every compliant decoder must be able to trigger protection or royalty collection mechanisms at the time of decoding –Unauthorized individuals should not be able to defeat the watermarks by any means A3: Ownership assertion, recipient tracking –Establish ownership and determine origin of unauthorized duplication. –Prosecution of copyright infringement

04/02/2007 IT 481, Spring Application Domains Cont’d A4: Authentication and verification –Allows fragile watermarks; if contents modified watermarks should disappear. –Helps in identifying areas that wer modified A5: Broadcast monitoring –Monitor where and when the contents are played –Advertisements. Here heavy content degradation is less of an issue. –Watermark removal, invalidation and forgery can be significant concern –Counterfeiting should be intractable for the system to be effective A6: Secret communication or steganography –Data hiding may require higher capacity watermarks than other applications –Secrecy may be the overriding concern in some applications

04/02/2007 IT 481, Spring Attacks AT1: Basic attacks –Lossy compression, frame dropping & temporal rescaling AT2: Simple attacks –Blurring, median filtering, noise addition gamma correction and sharpening AT3: Normal attacks –Translation, cropping and scaling AT4: Enhanced attacks –Aspect ratio change & random geometric perturbations (Stirmark) AT5: Advanced Attacks –Delete/insert watermarks, single document watermark estimation attacks & multiple-document statistical attacks

04/02/2007 IT 481, Spring Robustness, Resilience & Detection Applications Domain Unintentional Attacks Intentional Attacks Every Decoder High Capacity Applications Example AT1AT2AT3AT4AT5 A1Yes MaybeNo Yes Value-added metadata A2Yes NoCopy Protection A3Yes No Ownership/fingerprint A4YesNo SomeYesNoAuthentication A5Yes NONoYes Broadcasting A6Yes Maybe YesNoYes Secret Communication

04/02/2007 IT 481, Spring Human Perception Watermarking schemes take advantage of the fact that the human audio and visual systems are imperfect detectors. Audio & visual signals must have a minimum intensity or contrast before they are perceptible. These minima are spatially, temporally and frequency dependent. These dependencies are either implicitly or explicitly exploited

04/02/2007 IT 481, Spring Transform Domain Considerations The human eye is more sensitive to noise in the lower frequency range than in the higher frequency counterparts However, energy in most images is concentrated in the lower frequency range. Quantization used in DCT based compression reflects the HVS which is less sensitive in the higher frequencies A trade is required to balance watermark invisibility and survivability resulting in the use of the mid-frequency terms.

04/02/2007 IT 481, Spring Transform Domain Considerations An alteration of a transform coefficient is spread across the entire spatial block A one dimensional example:

04/02/2007 IT 481, Spring Data Embedding Algorithm

04/02/2007 IT 481, Spring Embedded Data Examples Multilingual soundtracks within a motion picture Copyright data Distribution permissions Data used for accounting and billing and royalties Etc.

04/02/2007 IT 481, Spring Watermarking Techniques Non-Blind: Watermark recovery requires the original Blind: Watermark recovery does not require the original Spatial domain or transform domain embedding Spatial domain: –LSB, color pallet, geometric Transform Domain: –FFT, DCT, Wavelet

04/02/2007 IT 481, Spring An Algorithm Proposed by Busch, Funk and Wolthusen

04/02/2007 IT 481, Spring Algorithm Considerations Watermark embedding position determined through a pseudo-random number generator that determines the order of block processing and the coefficient to be modified –Embed all available blocks Key may be public or secret leading to a public or secret watermark Redundantly embed the watermark to achieve survivability to MPEG-2 compression

04/02/2007 IT 481, Spring Selected Block Embedding 1. Block is transformed using the DCT 2. Perform edge detection 3. Select pair of DCT coefficients from the sub-band used using a Pseudo random permutation 4. Quantize the selected coefficients using the MPEG-2 algorithm 5. Determine if the coefficient pair is suitable for embedding Avoid “Edge” and “Plain” blocks 6. Enforce a differential relationship between the coefficients in the pair to encode a “1” or a “0” 7. Inverse quantize the modified coefficients

04/02/2007 IT 481, Spring Busch Watermarking DCT Coefficients If the absolute value of one of the highlighted coefficients is greater than 39, the block is classified as an “edge” and not used. If the quantized value of one of the coefficients in the selected band is zero the block is classified as a “plain” block

04/02/2007 IT 481, Spring Visibility “Edge” blocks, if modified, are highly visible in video and are to be avoided “Plain” blocks are not so sensitive, so they can be used if care is exercised –In one of the bands randomly select a pair of coefficients and randomly select one to be the “first” (DCT1) and another to the “second” (DCT2) –To encode a “one” set DCT1 = (ABS(DCT1)+ ABS(DCT2))/2 + K, Preserving the sign(DCT1) –To encode a “zero” set DCT1 = (ABS(DCT1)+ ABS(DCT2))/2 - K, Preserving the sign(DCT1) –K is elected as a compromise between visibility and robustness to MPEG-2 compression

04/02/2007 IT 481, Spring Reference C. Busch, W. Funk, and S. Wolthusen: “Digital Watermarking: From Concepts to Real-Time Video Applications”; IEEE Computer Graphics and Applications, 1999

Matlab Overview