Modified Patchwork Algorithm: Anovel Audio Watermarking Scheme In-Kwon Yeo and Hyoung Joong Kim.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
N-Secure Fingerprinting for Copyright Protection of Multimedia
FINGER PRINTING BASED AUDIO RETRIEVAL Query by example Content retrieval Srinija Vallabhaneni.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Watermarking For Image Authentication Presented by San-Hao Wang.
Classification of Music According to Genres Using Neural Networks, Genetic Algorithms and Fuzzy Systems.
Perceptual Watermarks for Digital Image and Video ECE 738 paper presentation Pei Qi ECE at UW-Madison
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Zhejiang University Wavelet-based 3D mesh model watermarking Shi Jiao-Ying State Key Laboratory of CAD&CG, Zhejiang University, Hangzhou
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Audio Thumbnailing of Popular Music Using Chroma-Based Representations Matt Williamson Chris Scharf Implementation based on: IEEE Transactions on Multimedia,
8. 1 MPEG MPEG is Moving Picture Experts Group On 1992 MPEG-1 was the standard, but was replaced only a year after by MPEG-2. Nowadays, MPEG-2 is gradually.
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
DCT.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Introduction to Steganalysis Schemes Multimedia Security.
Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
2005/12/021 Fast Image Retrieval Using Low Frequency DCT Coefficients Dept. of Computer Engineering Tatung University Presenter: Yo-Ping Huang ( 黃有評 )
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
1 Transform Domain Fragile Image Watermark Prof. Ja-Ling Wu Graduate Institute of Networking and Multimedia Dept. of Computer Science and Information Engineering.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
3D mesh watermarking Wu Dan Introduction Spatial domain (00 EG) Transformed domain (02 EG) K=D-A; (D ii is a degree of vertex v i, A is an.
A DIGITAL IMAGE WATERMARKING PREPARED BY AMAR RAEED KHORSHıD ALHıLALı ıD : R.G. Schyndel, A. Tirkel, and C. Osborne, “A Digital Watermark”, Procedding.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Noise Filtering in Monte Carlo Rendering
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Watermarking Scheme Capable of Resisting Sensitivity Attack
Introduction to Audio Watermarking Schemes N. Lazic and P
Visible Watermarking of An Image Using DCT Technique
Robust Data Hiding for MCLT Based Acoustic Data Transmission
DONE BY S.MURALIRAJAN M.NIRMAL
Image Watermarking Chu, Hsi-Cheng.
Increasing Watermarking Robustness using Turbo Codes
Steganography with Digital Images
DC Image Extraction and Shot Segmentation
Author: Minoru Kuribayashi, Hatsukazu Tanaka
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
An Iterative Method for Lossless Data Embedding in BMP Images
Digital Watermarking (cont.)
A Quadratic-Residue-based Fragile Watermarking Scheme
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Modified Patchwork Algorithm: Anovel Audio Watermarking Scheme In-Kwon Yeo and Hyoung Joong Kim

What is Audio Watermarking ?  Embed Data into an Audio File  Quality required  Not be perceivable by a listener  Robust again manipulation  Security  Statistically undetectable

Application of Audio Watermarking  Monitoring a file  Fingerprinting  Can indicate content manipulation

Patchwork algorithm definition  We modified two “patchwork” of an image/audio file  We retrieve the information by calculating the difference between the two patchorwk.  The patchworks are randomly chosen, and we have to keep the memory of the Patchwork in order to reconstruct the embeded data.

Exemple of Patchwork Algorithm for Image AAB A BB Original Image We darken some part, and light up some others part of the image We keep in memory the Position of the pixel we have modified. A*=A+d : A original color of the image, A* new image B*=B-d : B original color of the image, B* new image. We have decreased the darkness We assume that E[A-B]=0:

Exemple of Patchwork Algorithm for Image The image has been modified and we try to retrieve the original information. Keep in mind: We know the location of the original modified pixel. E[A*-B* ]= E [(A+d) – (A-d)] = E[A-B] + 2d And E[A-B]=0 as assumed. Thus we get : E[A*-B* ]= 2d So we can retrieve d, and thus the embeded information. But: don’t work very well for audio signal. Very sensitive to the modification.

Audio watermarking = same ideas but differencies  Patchwork algorithm applicated to the frequency domain  We use mean and variance to detect the watermarks  Assume that the Distribution of the sample is gaussian  We use A*=A(1+d) instead of A*=A+d  d is decided adaptively.

Implemented Algorithm for embedding  Apply a DFT, or DCT of size N on an audio frame an store the coefficients F.  From a secret key, generate 2 Index with 2 n values pseudo-randomly chosen between 1 and N. Each index will represented 0 or 1.  Define the subset A and B, with A=[ F coefficients with subset equals to the first n elements of the Index of the desired values]. Same for B with the last n elements.

Implemented Algorithm for embedding (cont’d)  Calculate the mean and the pooled sample standard error S of elements of A and B.  Replace them by Ai*=Ai + sign(average(A-B))* C * S/2  C is a constant  Make the large value set larger, and small value set smaller  The distance between two sample is always bigger than square(C ) *S  Apply the inverse DCT. The signal is watermarked.

Exemple of the Algorithm:  We apply the DCT to an audio frame:  F={2,4,3,4,4,5,5,1,0,0,3,8} of size N=12  Random Generation of the Index I representing 0  I={2,4,5,9} of size 2n=4 (We keep that in memory)  Elements of I are >1 and <N=12  We extract the coefficient of F, with subscript in I.  A={4,4} ( 2th and 4 th coeff of F according to first n elements of I) and B={4,0} (5 th and 9 th of F)  We replace the elements of A and B by Ai* and Bi*  A={4+sign(Average(A-B))*C*S/2),….}  We make the inverse operation, and replace the original F coefficient with the modified values  F={2,A1*,3,A2*,B1*,5,5,1,0,B2*,3,8}

Implemented Algorithm for deembedding  Retrieve the modified DFT,DCT coefficient for the Index representing 0, and 1. A0 and B0 and A1 and B1.  Compute the sample means and pooled sample error (S0,S1) for A0,B0…  See what for what set we get the biggest values T:  T0= (ave(A0)-ave(B0))² /S²0 or T1= (ave(A1)-ave(B1))² /S²1.  If T is bigger than a predecided threshold then we assume that the signal is watermarked.

Summarize: What I Have done so far ?  Understanding globally what a Watermark is. Uses and Applications.  Understand MPA Algorithm.  Try to understand deeply the paper.  Implemented the embedding algorithm  Implemented the deembedding algorithm

Summarize: Still need to do ?  Explain why the algorithm works well  Does it satisfy the conditions  Transparency  Robust to pitch distorsion, passband filter…  Secure  Statistically Undetectable  Comparaisons between Watermarking applicated to speech and music.