WATERMARKING Adviser :葉家宏 老師 Presenter :邱怡雯 Date : 2011/03/28.

Slides:



Advertisements
Similar presentations
Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Advertisements

Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
LOGO Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照.
N-Secure Fingerprinting for Copyright Protection of Multimedia
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Watermarking For Image Authentication Presented by San-Hao Wang.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:
Reversible medical image watermarking based on wavelet histogram shifting Source: Authors: Reporter: Date: The Imaging Science Journal, Vol. 59, No. 1,
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Multiple Image Watermarking Applied to Health Information Management
1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.
劉晟志 2010/03/21 Homework 1. watermarking. Hide “nsysu logo” into the 3 rd bit plane.
Multiple-description iterative coding image watermarking Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 20, No. 4, pp , 2010.
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
Digital Watermarking Using Phase Dispersion --- Update SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu, Michael Su.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
1 Robust and transparent watermarking scheme for colour images Speaker : Po-Hung Lai Adviser : Chih-Hung Lin Date :
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
多媒體網路安全實驗室 Source: IEICE Trans. Fundamentals, Vol. E90-A, No. 4, April 2007, pp Authors:Hong Lin Jin, Masaaki Fujiyoshi, Hitoshi Kiya Speaker:Cheng.
Outline Carrier design Embedding and extraction for single tile and Multi-tiles (improving the robustness) Parameter α selection and invisibility Moment.
Homework 1 Watermarking Advisor:葉家宏 Presenter:林承洋.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
Date of download: 6/2/2016 Copyright © 2016 SPIE. All rights reserved. Watermarking the intensity component of a color image using the IHS color coordinate.
LOGO Организация кредитования в Республике Беларусь Костенко А.К., к.э.н., доцент.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
涉外合同中的法律适用问题 --- 以上海地区为例 Group 2 吕雅丽 王燕玉 刘彧 孙煜 韦卫玲 李天奇 LOGO.
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Robustness Evaluation of Perceptual Watermarks
Image Watermarking Chu, Hsi-Cheng.
Digital Image Compression Using Bit Plane Slicing Method
Model-based Steganography
Source: Journal of Visual Communication and Image Representation, Vol
Increasing Watermarking Robustness using Turbo Codes
مسابقة المدرسين المجددين
Feature Space Based Watermarking in Multi-Images
Image Enhancement in the
A Data Hiding Scheme Based Upon Block Truncation Coding
Save for Web and Devices in PS
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Instructions for Windows users:
Instructions for Windows users:
Instructions for Windows users:
Reference Ingemar J. Cox, Joe Kilian, F. Tomson Leighton, and Talal Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Trans. On Image.
Step-by-Step Banner Creation Guide
Data hiding method using image interpolation
Information Hiding and Its Applications
High Capacity Data Hiding for Grayscale Images
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Data hiding method using image interpolation
EarthTour Presentations
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Novel Multiple Spatial Watermarking Technique in Color Images
On SVD-based watermarking algorithm
An imperceptible spatial domain color image watermarking scheme
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Authors: J.J. Murillo-Fuentes
News Article Thumbnails TEMPLATE
Increasing Watermarking Robustness using Turbo Codes
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Presentation transcript:

WATERMARKING Adviser :葉家宏 老師 Presenter :邱怡雯 Date : 2011/03/28

Outline  Embed method  Gray level logo  Binary logo  Result  Gray level logo  Binary logo  Conclusion

Embed method(1/2)  Spatial domain watermarking  Gray level logo  Embed 4 bits Add 5%~20% noise Save the image as JPEG file and choose different quality Extract directly Original image Watermark Watermarked image Watermark extraction

Embed method(2/2)  Spatial domain watermarking  Binary logo Add 5%~20% noise Save the image as JPEG file and choose different quality Extract directly Original image Watermark Watermarked image Watermark extraction

Result-gray level logo(1/7) (A) bit plane 7(B) bit plane 6(C) bit plane 5(D) bit plane 4 (A) bit plane 7(B) bit plane 6(C) bit plane 5(D) bit plane 4 Embed 4 bit to bit plane 7,6,5 and 4

Result-gray level logo(2/7) PSNR curve with embed the watermarking in different bit plane

Result-gray level logo(3/7) Add noise(use PS) to bit plane 5 which embed 4 bits (A)5%(B)10%(C)15%(D)20% (A)5%(B)10%(C)15%(D)20%

Result-gray level logo(4/7) Add noise to bit plane 5 which embed 4 bits (A)5%(B)10%(C)15%(D)20% (A)5%(B)10%(C)15%(D)20%

Result-gray level logo(5/7) Compress.raw into different quality (A)10%(B)30%(C)50%(D)70% Bit plane 5 which embed 4 bits

Result-binary logo(6/7) (A) bit plane 7(B) bit plane 6(C) bit plane 5(D) bit plane 4 Embed binary logo to bit plane 7,6,5 and 4

Add noise to bit plane 5 and 4 Result-binary logo(7/7) (A)5%(B)10%(C)15%(D)20% Plane 5 Plane 4

Conclusion  Embed bits to high bit plane are more robust but lower PSNR

THE END