劉晟志 2010/03/21 Homework 1. watermarking. Hide “nsysu logo” into the 3 rd bit plane.

Slides:



Advertisements
Similar presentations
CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 4 – Digital Image Representation Klara Nahrstedt Spring 2009.
Advertisements

A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang.
Reversible Data Hiding ECE643 Digital Image Processing (I) Course Project Professor: Yun Q. Shi Su Yu 12/02/2011.
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Bit Depth and Spatial Resolution SIMG-201 Survey of Imaging Science © 2002 CIS/RIT.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Watermarking For Image Authentication Presented by San-Hao Wang.
Images.
Digital Image Processing Homework 4 TA. Yu-Lun Liu VC Lab. Dec.04, 2007.
 HTML Tags  Multimedia Definitions  Information from the Computer Internet Project  Information from the Technology/Scanner Assignment  Information.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Steganography detection Roland Cmorik, Martin Šumák.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Chapter 11 Fluency with Information Technology 4 th edition by Lawrence Snyder (slides by Deborah Woodall : 1.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Compsci 06/101, Fall Steganography l Hide text in image (or hide information in image)  Why might we do this?  Difference: watermarking v steganography.
Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:
WATERMARKING Adviser :葉家宏 老師 Presenter :邱怡雯 Date : 2011/03/28.
Multiple Image Watermarking Applied to Health Information Management
Computer Images Can store color info about each pixel, but makes file BIG Compression for Web 15.
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
1 資訊隱藏技術之研究 The Study of Information Hiding Mechanisms 指導教授: Chang, Chin-Chen ( 張真誠 ) 研究生: Lu, Tzu-Chuen ( 呂慈純 ) Department of Computer Science and Information.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Integrity of multimedia data ● Techniques for digital watermarking ● An example in the Wavelet domain ● Experimental results: evaluation.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 4 – Audio and Digital Image Representation Klara Nahrstedt Spring 2010.
Homework 1 Watermarking Advisor:葉家宏 Presenter:林承洋.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
More Digital Representation Discrete information is represented in binary (PandA), and “continuous” information is made discrete.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
Date of download: 6/2/2016 Copyright © 2016 SPIE. All rights reserved. Watermarking the intensity component of a color image using the IHS color coordinate.
ISSCS 2009, Iasi, Romania1 On the Choice of the Mother Wavelet for Perceptual Data Hiding Corina Nafornita, Alexandru Isar Politehnica University of Timisoara.
LOGO Организация кредитования в Республике Беларусь Костенко А.К., к.э.н., доцент.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
涉外合同中的法律适用问题 --- 以上海地区为例 Group 2 吕雅丽 王燕玉 刘彧 孙煜 韦卫玲 李天奇 LOGO.
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Robustness Evaluation of Perceptual Watermarks
Digital Image Compression Using Bit Plane Slicing Method
Reversible Data Hiding in JPEG Images using Ordered Embedding
Images in Binary.
Increasing Watermarking Robustness using Turbo Codes
A Data Hiding Scheme Based Upon Block Truncation Coding
The Digital Portfolio: Protecting Photos Online
Adding and Subtracting Decimals
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Colors Computers build colors from Red, Green, and Blue; not Red, Blue, and Yellow. RGB = Red Green Blue Creating Colors Red + Blue = Purple No Red, No.
A Restricted Region-based Data-hiding Scheme
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Step-by-Step Banner Creation Guide
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Hiding and Its Applications
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Author: Minoru Kuribayashi, Hatsukazu Tanaka
The Image The pixels in the image The mask The resulting image 255 X
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Graphic Design Semester 1 Final Exam
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
On SVD-based watermarking algorithm
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Increasing Watermarking Robustness using Turbo Codes
A Restricted Region-based Data-hiding Scheme
Presentation transcript:

劉晟志 2010/03/21 Homework 1. watermarking

Hide “nsysu logo” into the 3 rd bit plane

PSNR: dB OriginalPost

Discuss:  why can’t we extract the watermarking after doing the “Noise adding” by Photoshop?  Every pixel had been change during the process  The noise rate only decides the weight of the noise that will be add to every pixel  As the result, the watermarking can not avoid attack  Add black spot noise

Add black spot noise with different occur rate (gray level watermarking) 5% 10% 15% 20%

Add black spot noise with different occur rate (binary watermarking) 5% 10% 15% 20%

Different JPEG compress rate 5% 10% 15% 20% Cover image Water marking

Discuss:  why can’t we extract the watermarking after doing the “Noise adding” by Photoshop?  Every pixel had been change during the process  The noise rate only decides the weight of the noise that will be add to every pixel  As the result, the watermarking can not avoid this kind of noise attack

End