ENEE631 Digital Image Processing (Spring'04) Introduction to Data Hiding in Image & Video Spring ’04 Instructor: Min Wu ECE Department, Univ. of Maryland,

Slides:



Advertisements
Similar presentations
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Advertisements

Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
EE565 Advanced Image Processing Copyright Xin Data Hiding in Image Adapted from ENEE631 UMD ECE by Courtesy of Prof. Min Wu UMCP ENEE631 Slides.
Information Hiding: Watermarking and Steganography
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Image (and Video) Coding and Processing Lecture 5: Point Operations Wade Trappe.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
N-Secure Fingerprinting for Copyright Protection of Multimedia
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Watermarking Technology Ishani Vyas CS590 Winter 2008.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Multimedia Data Hiding
ELE 488 F06 ELE 488 Fall 2006 Image Processing and Transmission (12 – 12 – 06) Digital Watermarking What? secondary information in media data Why? to convey.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
ECE738 Advanced Image Processing Data Hiding (1 of 3) Curtsey of Professor Min Wu Electrical & Computer Engineering Univ. of Maryland, College Park.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Perceptual Watermarks for Digital Image and Video ECE 738 paper presentation Pei Qi ECE at UW-Madison
Digital Watermarking Parag Agarwal
1 Watermark Attacks ENEE 739M S’02 ENEE739M Multimedia Comm. & Info. Security(S’02)Watermark Attack 2/26 Hong Zhao ®Min Wu.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
ECE738 Advanced Image Processing Data Hiding (2 of 3) Curtsey of Professor Min Wu Electrical & Computer Engineering Univ. of Maryland, College Park.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
ENEE631 Digital Image Processing (Spring'09) Data Hiding in Images Spring ’09 Instructor: Min Wu Electrical and Computer Engineering Department, University.
ECE738 Advanced Image Processing Data Hiding (3 of 3) Curtsey of Professor Min Wu Electrical & Computer Engineering Univ. of Maryland, College Park.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
ENEE631 Digital Image Processing (Spring'09) Image Forensics Spring ’09 Instructor: Min Wu Electrical and Computer Engineering Department, University of.
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles Marwen HASNAOUI Maher BELHAJ Mihai MITREA Françoise PRETEUX ARTEMIS.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
ELE 488 F06 ELE 488 Fall 2006 Image Processing and Transmission (12 – 7 – 06) Digital Watermarking What? Why? How? Attacks, Legal issues 12/7.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
Detection of Image Alterations Using Semi-fragile Watermarks
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Watermarking for Image Authentication ( Fragile Watermarking )
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
Parag Agarwal Digital Watermarking Parag Agarwal
Spread Spectrum Watermarking
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Presentation transcript:

ENEE631 Digital Image Processing (Spring'04) Introduction to Data Hiding in Image & Video Spring ’04 Instructor: Min Wu ECE Department, Univ. of Maryland, College Park   (select ENEE631 S’04) UMCP ENEE631 Slides (created by M.Wu © 2004) Based on ENEE631 Spring’04 Section 16

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [2] Overview and Logistics Last Time: –High-order nonlinear spatial warping –2-D sampling at Rectangular grid –Lattice theory for multidimensional sampling at non-rectangular grid Today: –Finish the discussion on sampling issues => => [ See Slides in Lecture 24 ] –Introduction to data hiding in image and video UMCP ENEE631 Slides (created by M.Wu © 2004)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [3] Embedding Basics: Two Simple Tries Data Hiding: To put secondary data in host signal (1) Replace LSB (2) Round a pixel value to closest even or odd numbers u Both equivalent to reduce effective pixel depth for representing host image u Detection scheme is same as LSB, but embedding brings less distortion in the quantized case + Simple embedding;  Fragile to even minor changes even “0” odd “1” pixel value odd-even mapping lookup table mapping … … UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [4] Example of Replacing LSBs (1) Downloaded from steganography/image_downgrading/ UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [5] Example of Replacing LSBs (2) Replace LSB with Pentagon’s MSB UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [6] Example of Replacing LSBs (3) Replace 6 LSBs with Pentagon’s 6 MSBs UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [7] Tampering Detection by Pixel-domain Fragile Wmk Downloaded from ICIP’97 CD-ROM paper by Yeung-Mintzer UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [8] From Fragile to Robust Watermarking Applications of fragile watermark –Tampering detection –Secret communications => “Steganography” (covert writing) –Convey side information in a seamless way: lyric, director’s notes Situations demanding higher robustness –Protect ownership (copyright label), prevent leak (digital fingerprint) –Desire robustness against compression, filtering, etc. How to make it robust? –Use “quantization” from signal processing => Type-II –Borrow theories from telecommunications => Type-I u “Spread Spectrum Watermark”: use “noise” as watermark and add it to the host signal for improved invisibility and robustness UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [9] Robust Wmk Application for Tracing Traitors Leak of information as well as alteration and repackaging poses serious threats to government operations and commercial markets –e.g., pirated content or classified document Promising countermeasure: robustly embed digital fingerprints –Insert ID or “fingerprint” (often through conventional watermarking) to identify each user –Purpose: deter information leakage; digital rights management(DRM) –Challenge: imperceptibility, robustness, tracing capability studio The Lord of the Ring Alice Bob Carl w1 w2 w3Sell UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [10] Type-II Relationship Enforcement Embedding Deterministically enforcing relationship –Secondary info. carried solely in watermarked signal –Typical relationship: parity/modulo in quantized features Representative: odd-even (quantized) embedding –Alternative view: switching between two quantizers w/ step size 2Q u “Quantization Index Modulation” –Robustness achieved by quantization or tolerance zone –High capacity but limited robustness e.g. to hide data in binary image, enforcing # of black pixels per block to odd/even => additional issues in handling uneven embedding capacity even “0” odd “1” feature value 2kQ (2k+1)Q (2k+2)Q (2k+3)Q odd-even mapping lookup table mapping … … UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [11] Type-II Relationship Enforcement (cont’d) General approach: –Partition host signal space into sub-regions u each region is labeled with 0 or 1 u marked sig. is from a region close to orig. & labeled w/ the bit to hide –Secondary info. carried solely in X’ u difference (X’-X) doesn’t necessarily reflect the embedded data Advanced embedding: –Combining the two types with techniques suggested by information theory mapping { b} data to be hidden X host sig. X’= f( b ) marked copy 1 or 0 UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [12] Type-I Additive Embedding Add secondary signal in host media Representative: spread spectrum embedding –Add a noise-like signal and detection via correlation –Good tradeoff between imperceptibility and robustness –Limited capacity: host signal often appears as major interferer modulation data to be hidden  X original source X’ = X +  marked copy = UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [13] Spread Spectrum Approach: Cox et al (NECI) Key points –Place wmk in perceptually significant spectrum (for robustness) u Modify by a small amount below Just-noticeable-difference (JND) –Use long random vector as watermark to avoid artifacts (for imperceptibility & robustness) Embedding v’ i = v i +  v i w i = v i (1+  w i ) –Perform DCT on entire image and embed wmk in DCT coeff. –Choose N=1000 largest AC coeff. and scale {v i } by a random factor 2D DCTsort v’=v (1+  w) IDCT & normalize Original image N largest coeff. other coeff. marked image random vector generator wmk seed UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [14] Cox et al’s Scheme (cont’d): Detection –Subtract original image from the test one before feeding to detector (“non-blind detection”) –Correlation-based detection u a correlator normalized by |Y| in Cox et al. paper DCT compute similarity threshold test image decision wmk DCTselect N largest original unmarked image select N largest preprocess – – orig X test X’ X’=X+W+N ? X’=X+N ? To think UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [15] Performance of Cox et al’s Scheme Robustness –(claimed) scaling, JPEG, dithering, cropping, “printing-xeroxing- scanning”, multiple watermarking –No big surprise with high robustness u equiv. to conveying just 1-bit {0,1} with O(10 3 ) samples Comment –Must store original unmarked image  “private wmk”, “non-blind” detect. –Perform image registration if necessary –Adjustable parameters: N and  UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [16] Robustness vs. Capacity Blind/non-coherent detection ~ original copy unavailable Robustness and capacity tradeoff Advanced embedding: quantization w/ distortion-compensation –Combining the two types with techniques suggested by info. theoryRobustnessCapacity Imperceptibility noise stronger noise weaker UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [17] Issues and Challenges Tradeoff among conflicting requirements –Imperceptibility –Robustness & security –Capacity Key elements of data hiding –Perceptual model –Embedding one bit –Multiple bits –Uneven embedding capacity –Robustness and security –What data to embed Upper Layers Uneven capacity equalization Error correction Security …… Lower Layers Imperceptible embedding of one bit Multiple-bit embedding Coding of embedded data Robustness Capacity Imperceptibility UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [18] More Detailed Discussions => => UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [19] SS Wmk Detection Based on Hypothesis Testing Optimal detection for On-Off Keying (OOK) –OOK under i.i.d. Gaussian noise {d i } u b  {0,1} represents absence vs. presence of ownership mark u Use a correlator-type detector (recall the review last week) –Need to determine how to choose {s i } Neyman-Pearson Detection [Poor’s book Sec.2.4] –False-alarm ~ claiming wmk existence when nothing embedded –Given max. allowed false-alarm, try to minimize prob. of miss detection u Use likelihood ratio as detection statistic u Determine threshold according to false-alarm prob. UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [20] Invisible Robust Wmk: Improved Schemes Apply better Human-Perceptual-Model –Global scaling factor is not suitable for all coefficients –More explicitly compute Just-noticeable-difference (JND) u JND ~ max amount each freq. coeff. can be modified imperceptibly u Use  i for each coeff.  finely tune wmk strength –Better tradeoff between imperceptibility and robustness u Try to add a watermark as strong as possible Block-DCT based schemes: –Podichuk-Zeng and Swanson-Zhu-Tewfik –Existing visual model for block DCT: JPEG UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [21] Compare Cox & Podilchuk Schemes OriginalCox Podilchuk whole image DCT block-DCT Embed in 1000 largest coeff. Embed to all “embeddables” UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [22] Compare Cox & Podilchuk Schemes (cont’d) CoxPodilchuk UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [23] Distortion Compensated Quantization Embedding Distortion compensation technique –Increase quantization step by a factor  for higher robustness –Compensate the extra distortion by dragging the enforced feature toward the original feature value Overall embedding distortion unchanged Choose alpha to maximize a distortion-compensation SNR odd/even mapping UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [24] Fragile Watermark for Document Authentication u Embed pre-determined pattern or content features beforehand u Verify hidden data’s integrity to decide on authenticity (f) alter (a) (b) (g) after alteration (e) (c) (d) UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [25] Pixels with high flippability score are shown in the images. Unevenness in Data Hiding (Binary Image Example) Uneven distribution of flippable pixels –most are on rugged boundary Embedding rate (per block) –variable: often need side info. u worthwhile if such overhead is relatively small –constant: require larger block Random shuffling equalizes distribution –embed more bits –enhance security u a key to generate shuffle table –con: sensitive to jitter and mis-alignment embeddble coeff. # per block (signature img) portion of blocks before shuffle after shuffle Important ! image size 288x48, red block size 16x16 UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [26] Watermark Attacks: What and Why? Attacks: intentionally obliterate watermarks –remove a robust watermark –make watermark undetectable (e.g., miss synchronization) –uncertainty in detection (e.g., multiple ownership claims) –forge a valid (fragile) watermark –bypass watermark detector Why study attacks? –identify weaknesses –propose improvement –understand pros and limitation of tech. solution To win each campaign, a general should know both his troop and the opponent’s as well as possible. -- Sun Tzu, The Art of War, 500 B.C. UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [27] “Innocent Tools” Exploited by Attackers Recovery of lost blocks –for resilient multimedia transmission of JPEG/MPEG –good quality by edge-directed interpolation: Jung et al; Zeng-Liu Remove robust watermark by block replacement edge estimation edge-directed interpolation UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [28] Potential civilian use for digital rights management (DRM) u u Copyright industry – $500+ Billion business ~ 5% U.S. GDP Alleged Movie Pirate Arrested (23 January 2004) – –A real case of a successful deployment of 'traitor-tracing' mechanism in the digital realm – –Use invisible fingerprints to protect screener copies of pre-release movies Carmine CaridiRussellfriends … Internet w1 Last Samurai Hollywood studio traced pirated version Case Study: Tracing Movie Screening Copies UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [29] Collusion Attacks by Multiple Users... Averaging Attack Interleaving Attack Collusion: A cost-effective attack against MM fingerprints – –Users with same content but different fingerprints come together to produce a new copy with diminished or attenuated fingerprints Result of fair collusion: – –Each colluder contributes equal share through averaging, interleaving, and nonlinear combining – –Energy of embedded fingerprints may decrease => Need for Collusion-resistant Fingerprinting UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [30] Embedded Fingerprinting for Multimedia Embedded Finger- printing Multi-user Attacks Traitor Tracing UMCP ENEE631 Slides (created by M.Wu © based on Research Talks ’98-’04)

ENEE631 Digital Image Processing (Spring'04) Lec25 – Data Hiding [31] Summary of Today’s Lecture Sampling and resampling issues in 2-D and 3-D –Frequency-domain interpretation of sampling lattice –Sampling rate conversion: spatial-temporal Basic considerations and techniques of data hiding To explore more on data hiding 1. I. Cox, J. Kilian, T. Leighton, T. Shamoon: “Secure Spread Spectrum Watermarking for Multimedia'', IEEE Transaction on Image Processing, vol.6, no.12, pp , M. Wu, W. Trappe, Z.J. Wang, and K.J.R. Liu: “Collusion-resistant fingerprinting for Multimedia,” IEEE Signal Proc Magazine, March M. Wu and B. Liu: “Multimedia Data Hiding,” Springer-Verlag, I. Cox, M. Miller, and J. Bloom: “Digital Watermarking,” Morgan Kauffman, UMCP ENEE631 Slides (created by M.Wu © 2004)