by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Robust statistical method for background extraction in image segmentation Doug Keen March 29, 2001.
LOGO Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Andrea Colombari and Andrea Fusiello, Member, IEEE.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
1 Audio Compression Techniques MUMT 611, January 2005 Assignment 2 Paul Kolesnik.
Fifth International Conference on Information
1 Audio Watermarking for Copyright Protection 報告人:鄒昇龍.
Efficient Moving Object Segmentation Algorithm Using Background Registration Technique Shao-Yi Chien, Shyh-Yih Ma, and Liang-Gee Chen, Fellow, IEEE Hsin-Hua.
Enhanced images watermarking based on amplitude modulation Image and Vision Computing, 24 (2006), 111 – 119 Authors :T. Amornraksa, K. Janthawongwilai.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Secure Spread Spectrum Watermarking for Multimedia Ishani Vyas CS590 Winter 2008.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Perceived video quality measurement Muhammad Saqib Ilyas CS 584 Spring 2005.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Perceptual Watermarks for Digital Image and Video ECE 738 paper presentation Pei Qi ECE at UW-Madison
Digital Watermarking Parag Agarwal
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY * By: Ricardo A. Garcia *Research done at: University.
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY By: Ricardo A. Garcia University of Miami School.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Mesh Watermarking based on 2D Transferred Domain Jongyun Jun Tae-Joon Kim CS548 Term Project Presentation 2010/05/13.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
03/05/03© 2003 University of Wisconsin Last Time Tone Reproduction If you don’t use perceptual info, some people call it contrast reduction.
Data Throughput and Robustness Studies in a New Digital Image Watermarking Technique Based upon Adaptive Segmentation & Space-Frequency Representation.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Concepts of Multimedia Processing and Transmission IT 481, Lecture #6 Dennis McCaughey, Ph.D. 17 October, 2006.
Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Just Noticeable Difference Estimation For Images with Structural Uncertainty WU Jinjian Xidian University.
Quantization Watermarking Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems Brian Chen, Ph. D. Dissertation,
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Digital Watermarking Using Phase Dispersion --- Update SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu, Michael Su.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
1 Robust and transparent watermarking scheme for colour images Speaker : Po-Hung Lai Adviser : Chih-Hung Lin Date :
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Outline Carrier design Embedding and extraction for single tile and Multi-tiles (improving the robustness) Parameter α selection and invisibility Moment.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
A Partial Survey of the Perfect Digital Watermark Problem.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
MP3 and AAC Trac D. Tran ECE Department The Johns Hopkins University Baltimore MD
Spatial Filtering (Chapter 3) CS474/674 - Prof. Bebis.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Parag Agarwal Digital Watermarking Parag Agarwal
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Authors: J.J. Murillo-Fuentes
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Multi-resolution Scene-Based Video Watermarking Using Perceptual Models by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik from IEEE Journal on Selected Areas in Communications Presenter : Wei-Cheng Lin Project leader : B.H. Advisor : Prof. Ja-Ling Wu

Outline Introduction Author Representation v.s deadlock Visual Masking Temporal Wavelet Transform Watermark Design Watermark Detection Visual and Robustness Results Conclusion

Introduction (1/2) Digital watermarking has been proposed as a means to identify the owner and distribution path of digital data. Some issues when applying watermark : data redundancy between frames identical watermark v.s statistical invisibility

Introduction (2/2) Major contributions of this paper : A Perceptual-Based Video Watermarking Procedure A Scene-Based Multi-scale Watermark Representation An Author Representation Which Solves the Deadlock Problem A Dual Watermark

Author Representation and Deadlock (1/2) The Deadlock Problem and Rightful Ownership ( See Figure ) Dual watermarks One watermarking procedure requires the original data set for watermark detection while the other doesn’t. The second watermark is meant to protect the video that the pirate claims to be his original.

Author Representation and Deadlock (2/2) Using a pseudo random sequence to represent the author : use two keys and a suitable generator, say RSA, Rabin, Blum/Micali , etc. one key is author dependent ; the other is computed from the video signal using a one-way hash function, such as RSA, MD4. due to the computationally infeasible and signal dependent key, the pirate is unable to fabricate a counterfeit original that generate the desired watermark!!

Visual Masking (1/4) Frequency Masking compute the contrast threshold at certain frequency.

Visual Making (2/4) to find the contrast threshold at a frequency, first use DCT and then sum rule below. if the contrast error at f is less than c(f), the model predict the error is invisible.

Visual Masking (3/4) Spatial Masking based on the threshold vision model proposed by Girod, it accurately predicts the making effects near edges and in uniform background. first compute the contrast saturation

Visual Masking (4/4) compute the luminance on the retina then obtain the tolerable error level for the pixel (x,y) by following formula : w1 and w2 are based on Girod’s model. The change to pixel less than ds(x,y) introduce no perceptible distortion.

Temporal Wavelet Transform (1/2) We employ the wavelet transform along the temporal axis of the video sequence. After the wavelet transform, we can get the static and dynamic components (i.e. lowpass frames and highpass frames) of the original signal. See the figure.

Temporal Wavelet Transform (2/2) The watermark embedded in the static components ( lowpass frames ) exists throughout the entire video scene. The watermark embedded in the dynamic components ( highpass frames ) are highly localized in time and change rapidly from frame to frame.

Watermark Design First break the video sequence into scenes. Diagram of watermarking procedure

Watermark Detection (1/3) Detection I - Watermark Detection with Index knowledge

Watermark Detection (2/3) scalar similarity the overall similarity is computed as the mean of Sk for all k. and compared with the threshold to determine to presence. If the length of test video is the same as the original, perform the test in wavelet domain.

Watermark Detection (3/3) Detection II - Watermark Detection without Index Knowledge The hypothesis test is formed by removing the low temporal wavelet frame from the test frame and the computing the similarity with the watermark for it.

Visual and Robustness Results (1/2) Visual Results ( See the figure and table ) Robustness Results detect the watermark when one exists and reject a video when none exists. for a given distortion, the overall performance may be ascertained by the relative difference between the similarity when one present and none present. use the first 32 frames for test of both detection methods.

Visual and Robustness Results (2/2) Attacks Colored Noise Coding ( MPEG CR 100:1 ) Multiple Watermarks Frame Averaging Printing and Scanning

Conclusion (1/2) The watermarking technique directly exploits the masking phenomena of HVS to guarantee the invisibility. The pseudo random sequence is generated by two keys ; one is author dependent and the other is signal dependent.

Conclusion (2/2) Wavelet-based watermark exists at multiple scales in the video. The watermark can be detected with and without the index knowledge in the distortions.