NTIT1 A chaos-based robust wavelet- domain watermarking algorithm Source: Chaos, Solitions and Fractals, Vol. 22, 2004, pp. 47-54. Authors: Zhao Dawei,

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Wavelet Transform and SPIHT Coding. Outline Wavelet Transform SPIHT Coding Multiple Description Coding.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授 Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Maximizing Strength of Digital Watermarks Using Neural Network Presented by Bin-Cheng Tzeng 5/ Kenneth J.Davis; Kayvan Najarian International Conference.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Resolution Mosaic EM Algorithm for Medical Image Segmentation Mohammed A-Megeed Salem, Beate Meffert High Performance Computing & Simulation(HPCS)2009.
Fifth International Conference on Information
Bit-Plane Watermarking for SPIHT-Coded Images 台北科技大學資工所 指導教授:楊士萱 學生:廖武傑 2003/07/29.
Wavelet-based Coding And its application in JPEG2000 Monia Ghobadi CSC561 project
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
A robust associative watermarking technique based on similarity diagrams Source: Pattern Recognition, Vol. 40, No. 4, pp , 2007 Authors: Jau-Ji.
A Review on: Spread Spectrum Watermarking Techniques
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Reversible medical image watermarking based on wavelet histogram shifting Source: Authors: Reporter: Date: The Imaging Science Journal, Vol. 59, No. 1,
Color Image Watermarking Using Multidimensional Fourier Transforms Adviser : Chih-Hung Lin Speaker : Ming-Rui Chen Date : 2009/10/27 Received : December.
DCT.
Multiple-description iterative coding image watermarking Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 20, No. 4, pp , 2010.
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
1 Commutative Encryption and Watermarking in Video Compression 交換式加密及浮水印法應用在視頻壓縮 IEEE Transactions on Circuits and Systems for Video Technology, VOL. 17,
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
1 Robust and transparent watermarking scheme for colour images Speaker : Po-Hung Lai Adviser : Chih-Hung Lin Date :
Date of download: 6/2/2016 Copyright © 2016 SPIE. All rights reserved. Watermarking the intensity component of a color image using the IHS color coordinate.
International Journal of Advanced Science and Technology 57 Vol 26, January2011 Wavelet Based Blind Technique by Espousing Hankel Matrix for Robust Watermarking.
Digital Image Watermarking using Hybrid DWT -FFT Technique with Different Attacks Presented By: Mahendra Kumar Faculty at UCE, RTU, Kota (Raj.) India Director,
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Watermarking Scheme Capable of Resisting Sensitivity Attack
DEPARTMENT OF ECE, BEC, BAGALKOT
DCT watermarking Speaker: Paul 1.
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
Robust Image Hashing Based on Color Vector Angle and Canny Operator
IMAGE PROCESSING IMAGE WATERMARKING
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Robustness Evaluation of Perceptual Watermarks
Source: Journal of Visual Communication and Image Representation, Vol
Increasing Watermarking Robustness using Turbo Codes
Wavelet in POCS for image segment
Embedded Zerotree Wavelet - An Image Coding Algorithm
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source: Signal Processing: Image Communication 64 (2018) 78-88
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
A new chaotic algorithm for image encryption
Author: Minoru Kuribayashi, Hatsukazu Tanaka
A Semi-blind Watermarking Based on Discrete Wavelet Transform
An Algorithm for Removable Visible Watermarking
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Blind Reversible Authentication Based on PEE and CS Reconstruction
An imperceptible spatial domain color image watermarking scheme
A Fast No Search Fractal Image Coding Method
Hidden Digital Watermarks in Images
Authors: J.J. Murillo-Fuentes
An Image Quality Evaluation Method Based on Digital Watermarking
Increasing Watermarking Robustness using Turbo Codes
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

NTIT1 A chaos-based robust wavelet- domain watermarking algorithm Source: Chaos, Solitions and Fractals, Vol. 22, 2004, pp Authors: Zhao Dawei, Chen Guanrong, Liu Wenbo Speaker: Hao-Cheng Wang( 王皓正 ) Date: 2004/9/22

NTIT 2 Outline Introduction  Watermarking in the wavelet domain  DWT (Discrete Wavelet Transformation)  Chaos and its application to watermarking The new watermarking algorithm  Watermark embedding  Watermark detection Results and analysis Conclusions Comment

NTIT 3 Watermarking in the wavelet domain The digital watermarking technology includes  Spatial-domain  Transform-domain DCT, DWT

NTIT 4 DWT (Discrete Wavelet Transformation)(1/2) 低頻 (low frequency) :像素之間的變化小,影像較平 滑,人眼的敏感度高.  LL 1 高頻 (high frequency) :像素之間的差異大,影像較粗 糙、模糊,人眼的敏感度較低.  HH 1 中頻:介於低頻與高頻之間.  HL 1 、 LH 1 LH 1 HH 1 HL 1 LL 1

NTIT 5 DWT (Discrete Wavelet Transformation)(2/2) LH 1 HH 1 HL 1 LL 1 LH 1 HH 1 HL 1 LH 2 HH 2 HL 2 LL 2

NTIT 6 Logistic map Where When, the map is in the chaotic state. Where Chaos and its application to watermarking

NTIT 7 Logistic map(1/3) Example

NTIT 8 Logistic map(2/3) Example

NTIT 9 Logistic map(3/3) We will use the logistic map twice:  To generate a label sequence  To generate the watermark

NTIT 10 The new watermarking algorithm Apply the wavelet transform locally Watermark embedding I ori (256 × 256) I sub (128 × 128) DWT IDWT I’ sub (128 × 128) I’ ori (256 × 256) 8×8 block

NTIT 11 Watermark embedding(1/7) ……………….. ……………………………….. ……………………….. Original Image (256 × 256 pixels)

NTIT 12 Watermark embedding(2/7) 33, 1023, 112, 36, 77……………96, 1, 64…………………….983, 124, ……………………………… Label Sequence (Length=256) (1) (2)

NTIT 13 Watermark embedding(3/7)

NTIT 14 Watermark embedding(4/7) LH 1 HH 1 HL 1 LH 2 HH 2 HL 2 LH 3 HH 3 HL 3 LL 3 DWT

NTIT 15 Watermark embedding(5/7) Type …… Type 2 [1, -1]

NTIT 16 Watermark embedding(6/7), i=1, 2, …, N C band are the original wavelet coefficients C’ band are the watermarked wavelet coefficients αis a global parameter accounting for the watermark strength w is the watermark signal N is the element number of subband HL 1 or HH 1 or LH 1 {HL1, HH1, LH1} (1) (2) (3)

NTIT 17 Watermark embedding(7/7), i=1, 2, …, N i … i wm (i) … w(i)w(i) … C band … C’ band …

NTIT 18 Watermark detection(1/2) The detection method we use is similar to the method proposed in [1] We adopt the Neyman-Pearson criterion to determine the threshold T p [1] Barni M, Bartolini F. Improved wavelet-bsed watermarking through pixel- wise masking. IEEE Trans Image Processing 2001;10(5):

NTIT 19 Watermark detection(2/2) if ρ>T ρ : a watermark signal exists; otherwise, a watermark signal does not exist see [1] for more details (1) (2)

NTIT 20 Results and analysis(1/3) Test images: “Lena” and “Barbara”(256×256 pixels) α=6.0, i seq = and i wm =0.4123

NTIT 21 Results and analysis(2/3) PSNR=39.30

NTIT 22 Results and analysis(3/3) When we set α=1.0, or smaller, we cannot detect the watermark correctly

NTIT 23 Robustness against various attacks α=6, P f =10 -8, i seq =0.1564, i wm = Additive noise attacks  Gaussian noise  Salt and pepper noise JPEG compression Geometric manipulations  Cropping, resizing, rotation

NTIT 24 Cropping

NTIT 25 Resizing and rotation Resizing  Zoom scale m Zoom in (m>1) Zoom out (m<1)  m >0.625 Rotation  25°

NTIT 26 Conclusions This scheme applies the wavelet transform locally, based on the chaotic logistic map, and embeds the watermark into the DWT domain. Introduced a blind watermarking detection technique using the Neyman-Pearson criterion. Highly robust against geometric attacks and signal processing operations and JPEG compression.

NTIT 27 Comment(1/2) 結合圖片的浮水印技術 …… LH 1 HH 1 HL 1 LH 2 HH 2 HL 2 LH 3 HH 3 HL 3 LL 3 c1c1 c 1 mod 2 = 1 or 0 ? c 1 ±1

NTIT 28 Comment(2/2) p1p1 p 1 mod 2 = 1 or 0 ? p 1 ±1