Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May 4, 2005
Outline Introduction The proposed method Experimental results Conclusions
Introduction Watermarking Technology Colored Visual Cryptography
Watermarking Technology primitive image watermark stego-image Good digital watermarking : 1. Perceptual invisible 2. Security 3. Blindness 4. Multiple watermarks 5. Robustness
Colored Visual Cryptography
Colored Visual Cryptography (cont.)
The proposed method The primitive gray-level image “Lena”Colored watermark
The proposed method (cont.)
Random
The proposed method (cont.) Range of mean value Mask [0, 63] [64, 127] [128, 191] [192, 255] Mean:186 The color Masks of four kinds of mean values
coding table The proposed method (cont.)
Experimental Results Share image 1Share image 2
Experimental Results The recovered image from two share images
Experimental Results (cont.) ( a ) The cropping attacked “Lena” ( b ) The recovered image from two share images of cropped “Lena”
Experimental Results (cont.) ( a ) The blurring attacked “Lena” ( b ) The recovered image from two share images of blurred “Lena”
Experimental Results (cont.) ( b ) The recovered image from two share images of sharpened “Lena” ( a ) The sharpening attacked “Lena”
Conclusions Provide high robustness by using Visual Cryptography technique in Digital Watermarking. Keep the quality of primitive image.
Watermarking Technology Based on BTC Method Author: Hsien-Chu Wu, Chwei-Shyong Tsai, I-Su Lee Speaker: I-Su Lee Date: May 4, 2005
Outline Introduction The Proposed method Experimental results Conclusions
Block Truncation Coding, BTC ×512 Mean = ( … )/16 = 191 M1 = ( )/7 = 204 M0 = ( )/9 = 181 <191 0 >191 bitmap
BTC decompression bitmap <191 0 >191 1 0 Mean = ( … )/16 = 191 M1 = ( )/7 = 204 M0 = ( )/9 = 181
The Proposed method 8-bit grayscale image binary watermark
Codebook design min distance 128×128cover-image codebook
Codebook design (cont.) codebook codebook0 codebook1 0 1
Watermark Embedding codebook0 codebook1 cover-image binary watermark 0 1 stego-image cover-image binary watermark
Watermark Extraction (cont.) stego-image codebook0 codebook1 0 1 binary watermark
Experimental results (a) Lena(b) Girl(c) F16 (d) Pepper(e) Splash(f) Tiffany
Experimental results (cont.) Cover-imagestego-image (unit:dB) BTC compression image (unit:dB) Lena Girl F Peppers Splash Tiffany Comparison results (PSNR)
Experimental results (cont.) (a) cropping attack watermark bit correct rate = watermark bit correct rate = (b) cropping attack
Experimental results (cont.) bit correct rate = bit correct rate = watermark (c) cropping attack (d) cropping attack
Experimental results (cont.) bit correct rate = bit correct rate = watermark (e) sharpening attack (f) blurring attack
Experimental results (cont.) Cover image Lena Girl F Peppers Splash Tiffany Average Correct rate of six kinds of attacked watermark (a) cropping attack (b) cropping attack (c) cropping attack (d) cropping attack (f) sharpening attack (g) blurring attack
Conclusions The proposed method can embed watermark in compressed images directly. It is simple and efficient to embed waterm ark in images with using BTC. Stego-image has good image quality.