Jaroslaw Kutylowski 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Robust Undetectable Interference Watermarks Ryszard Grząślewicz.

Slides:



Advertisements
Similar presentations
Distinctive Image Features from Scale-Invariant Keypoints
Advertisements

Randomized Detection for Spread- Spectrum Watermarking: Defending Against Sensitivity and Other Attacks Ramarathnam Venkatesan and Mariusz H. Jakubowski.
Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
A Graph based Geometric Approach to Contour Extraction from Noisy Binary Images Amal Dev Parakkat, Jiju Peethambaran, Philumon Joseph and Ramanathan Muthuganapathy.
Jaroslaw Kutylowski 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Reliable Broadcasting without Collision Detection… … in.
Spatial Filtering (Chapter 3)
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Maximizing Strength of Digital Watermarks Using Neural Network Presented by Bin-Cheng Tzeng 5/ Kenneth J.Davis; Kayvan Najarian International Conference.
N-Secure Fingerprinting for Copyright Protection of Multimedia
Randomized Radon Transforms for Biometric Authentication via Fingerprint Hashing 2007 ACM Digital Rights Management Workshop Alexandria, VA (USA) October.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Active Calibration of Cameras: Theory and Implementation Anup Basu Sung Huh CPSC 643 Individual Presentation II March 4 th,
Slide 1 Joe O’Ruanaidh Siemens Corporate Research Princeton, NJ Digital Watermarking: How it works! SIGGRAPH’99 Panel Friday 13 August 2:15pm - 4:00pm.
Bit-Plane Watermarking for SPIHT-Coded Images 台北科技大學資工所 指導教授:楊士萱 學生:廖武傑 2003/07/29.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Invariant Image Hashing for DWT SPIHT Coded Images 陳慶鋒11/23/04.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Scale-Invariant Feature Transform (SIFT) Jinxiang Chai.
Right Protection via Watermarking with Provable Preservation of Distance-based Mining Spyros Zoumpoulis Joint work with Michalis Vlachos, Nick Freris and.
FACE DETECTION AND RECOGNITION By: Paranjith Singh Lohiya Ravi Babu Lavu.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Distinctive Image Features from Scale-Invariant Keypoints By David G. Lowe, University of British Columbia Presented by: Tim Havinga, Joël van Neerbos.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Local invariant features Cordelia Schmid INRIA, Grenoble.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
Texture. Texture is an innate property of all surfaces (clouds, trees, bricks, hair etc…). It refers to visual patterns of homogeneity and does not result.
Digital Image Processing CCS331 Relationships of Pixel 1.
December 9, 2014Computer Vision Lecture 23: Motion Analysis 1 Now we will talk about… Motion Analysis.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Wenqi Zhu 3D Reconstruction From Multiple Views Based on Scale-Invariant Feature Transform.
Detection of Image Alterations Using Semi-fragile Watermarks
Digital Image Processing Lecture 16: Segmentation: Detection of Discontinuities Prof. Charlene Tsai.
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
October 1, 2013Computer Vision Lecture 9: From Edges to Contours 1 Canny Edge Detector However, usually there will still be noise in the array E[i, j],
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Jaroslaw Kutylowski 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Maintaining Communication Between an Explorer and a Base.
Digital Image Processing Lecture 16: Segmentation: Detection of Discontinuities May 2, 2005 Prof. Charlene Tsai.
Machine Vision Edge Detection Techniques ENT 273 Lecture 6 Hema C.R.
Image features and properties. Image content representation The simplest representation of an image pattern is to list image pixels, one after the other.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Martina Uray Heinz Mayer Joanneum Research Graz Institute of Digital Image Processing Horst Bischof Graz University of Technology Institute for Computer.
Spatial Filtering (Chapter 3) CS474/674 - Prof. Bebis.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Der-Chyuan Lou and Jiang-Lung Liu,
Wavelets : Introduction and Examples
DONE BY S.MURALIRAJAN M.NIRMAL
Robustness Evaluation of Perceptual Watermarks
Feature description and matching
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Parag Agarwal Digital Watermarking Parag Agarwal
Digital Image Processing Week IV
Parts of Similar Triangles
Authors: J.J. Murillo-Fuentes
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Jaroslaw Kutylowski 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Robust Undetectable Interference Watermarks Ryszard Grząślewicz (WUT) Mirosław Kutyłowski (WUT) Jarosław Kutyłowski (HNI) Wojciech Pietkiewicz (WUT)

Jaroslaw Kutylowski 2 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Introduction Motivation undetectable watermarks cannot be detected in an image only the owner can prove his rights to an image using a secret private key not suited for web crawlers Key features of our scheme watermarks encoded in spatial domain resistant against attack preserving distance between points (filtering, rotation, JPEG compression) resistance against some attacks changing distance between points watermark can be reconstructed from a small part of image original image not needed for reconstruction large computational effort for reconstruction needed

Jaroslaw Kutylowski 3 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Physical motivation Interference – Young‘s experiment

Jaroslaw Kutylowski 4 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Scheme overview Watermark image Interference image Watermarked image Reconstructed watermark image Cover image

Jaroslaw Kutylowski 5 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Construction of simple interference image Watermark image all black with some white points white points are light source set of white points

Jaroslaw Kutylowski 6 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Construction of simple interference image Interference image interference image is placed at distance on top of watermark image each “light source” from influences each point of interference image distance and determine strength of influence this is approximation of real physical interference image drawback: visible pattern

Jaroslaw Kutylowski 7 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Construction of encrypted interference image Interference image consider the influence of one point from previously it influenced a point at distance with a ring at distance consists of cells of size intensity of each cell defined by value of hash function the angle is taken modulo – repetition of the same sequence key is needed for computation of values interference image does not contain visible patterns

Jaroslaw Kutylowski 8 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Scheme overview Watermark image Interference image Watermarked image Reconstructed watermark image Cover image

Jaroslaw Kutylowski 9 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Reconstruction of watermark General idea determine the intensity of each point of the watermark image –take the watermarked image (cover image + interference image) –generate interference image for point –compare them –if there is strong “similarity” – assign a high value watermarked imageinterference image for Low similarity small pixel value High similarity large pixel value Example with simple interference image not with encrypted – usually the encrypted would be used

Jaroslaw Kutylowski 10 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Reconstruction of watermark Idea (continued) look for the highest valued points check whether these points form a valid watermark –use equilateral triangles –certain number of triangles of specific edge length must be found to form a watermark Properties for the points actually in –there will be a large similarity between the watermarked image and the interference image there are points to check for each point operations are needed to compare the images key is needed for reconstruction

Jaroslaw Kutylowski 11 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Reconstruction of watermark Additional operations the reconstruction must be repeated for all rotations with degree –this yields resistance against rotations of the image the scale factor of the image must be determined –take a small part of the image –there should be at least one “white point” from in this part –check different scale factors and perform reconstruction of this image part for it –determine scale factor with largest peak value – this peak corresponds to a white point from the watermark –perform full reconstruction with this scale factor

Jaroslaw Kutylowski 12 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Experimental results Evaluation against StirMark 3 77 of 89 tests passed Cropping – all passed Removing rows/columns – only lighter one passed Flip – all passed Scaling – all passed Change aspect ratio – all passed Rotation with cropping – for rotation smaller than 30% passed Rotation with cropping and scalling – for rotation smaller than 30% passed Shearing – only simple ones passed Linear transformations – not passed StirMark – not passed Gaussian filtering – all passed Sharpening – all passed Median filtering – all passed LRAttack – all passed JPEG compression – all passed

Jaroslaw Kutylowski 13 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Conclusions Results robustness against attacks basing on filtering and local editions of image shown robustness against some linear transformations (rotating, scaling) shown Further work methods for detection of general linear transformations needed methods for detection of nonlinear transformations needed

Jaroslaw Kutylowski 14 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Thank you for your attention!