Detection of Image Alterations Using Semi-fragile Watermarks

Slides:



Advertisements
Similar presentations
Randomized Detection for Spread- Spectrum Watermarking: Defending Against Sensitivity and Other Attacks Ramarathnam Venkatesan and Mariusz H. Jakubowski.
Advertisements

LOGO Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
VIPER DSPS 1998 Slide 1 A DSP Solution to Error Concealment in Digital Video Eduardo Asbun and Edward J. Delp Video and Image Processing Laboratory (VIPER)
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Watermarking For Image Authentication Presented by San-Hao Wang.
Digital Watermarking for Images Aarathi Raghu CS 265 Spring 2005.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery By Pat P. W. Chan Supervised by Michael R. Lyu 8/6/2004 Computer Science.
Paul Blythe and Jessica Fridrich Secure Digital Camera.
EI San Jose, CA Slide No. 1 Nearest-neighbor and Bilinear Resampling Factor Estimation to Detect Blockiness or Blurriness of an Image* Ariawan Suwendi.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Perceptual Watermarks for Digital Image and Video ECE 738 paper presentation Pei Qi ECE at UW-Madison
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Edward J. Delp Panasonic January 13, 2000 Slide 1 Watermarking: What is the Future? Edward J. Delp Purdue University School of Electrical and Computer.
IMA - Digital Libraries February 13, 2001 Slide 1 Multimedia Security: Is Their Hope In Securing Our Digital Future? Edward J. Delp Purdue University School.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
ELE 488 F06 ELE 488 Fall 2006 Image Processing and Transmission (12 – 7 – 06) Digital Watermarking What? Why? How? Attacks, Legal issues 12/7.
Jaroslaw Kutylowski 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Robust Undetectable Interference Watermarks Ryszard Grząślewicz.
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
CS654: Digital Image Analysis
Benchmarking steganographic and steganalysis techniques Electronic Imaging of SPIE 2005 Authors:Kharrazi, Mehdi, Husrev T. Sencar, and Nasir Memon Department.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
A DIGITAL IMAGE WATERMARKING PREPARED BY AMAR RAEED KHORSHıD ALHıLALı ıD : R.G. Schyndel, A. Tirkel, and C. Osborne, “A Digital Watermark”, Procedding.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Vishal Monga, Divyanshu Vats and Brian L. Evans
DONE BY S.MURALIRAJAN M.NIRMAL
Robustness Evaluation of Perceptual Watermarks
Image Watermarking Chu, Hsi-Cheng.
Model-based Steganography
Watermarking for Image Authentication ( Fragile Watermarking )
Pei Qi ECE at UW-Madison
A User Attention Based Visible Watermarking Scheme
Parag Agarwal Digital Watermarking Parag Agarwal
Spread Spectrum Watermarking
Reduction of blocking artifacts in DCT-coded images
Author: Minoru Kuribayashi, Hatsukazu Tanaka
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source: Circuits and Systems for Video Technology,
Presentation transcript:

Detection of Image Alterations Using Semi-fragile Watermarks Eugene T. Lin†, Christine I. Podilchuk‡ and Edward J. Delp† †Purdue University School of Electrical and Computer Engineering Video and Image Processing Laboratory (VIPER) West Lafayette, Indiana ‡Bell Laboratories, Lucent Technologies Murray Hill, New Jersey

Overview Introduction Image authentication Fragile watermarks Robust watermarks Semi-fragile watermarks Description of proposed technique Results Conclusion

Image Authentication Identify the source of an image Determine if the image has been altered If so, locate regions where alterations have occurred Authentication watermark watermark is imperceptible under normal observation allows user to determine if image has been altered after mark embedding

Fragile Watermarks Watermark is rendered undetectable after slightest modifications to marked content Typically able to localize alterations with high degree of precision Sensitivity achieved through use of hash functions Problem: if lossy compression is applied to marked image, mark is destroyed even though compressed image remains perceptually similar

Robust Watermarks Resists removal attempts Examines large regions of image, limited localization of alterations Robustness typically achieved through spread-spectrum techniques Problem: robust watermark may remain even after alterations that change the visual message conveyed by the image

Semi-Fragile Watermarks Able to detect and localize significant “information altering” transformations (feature replacement) Able to tolerate some degree of “information preserving” transformations (lossy compression) Suitable in authentication applications where legitimate use includes lossy compression or other image adjustment by users

Semi-Fragile Watermarks Challenges for fragile watermark  semi-fragile watermark: LSB plane embedding not tolerant to compression Cryptographic hash functions too sensitive Challenges for robust watermark  semi-fragile watermark: Reduce region size used in mark detection but retain enough SNR to achieve reliable detection Boundary effects

Description of Proposed Technique Watermark construction DCT construction, spatial embedding Watermark detection Based on differences of adjacent pixel values Most natural images contain large regions of relatively smooth features

Watermark Construction DCT Watermark Generation

Watermark Construction After watermark is constructed in DCT domain, it is transformed to spatial domain and embedded DCT watermark Generation IDCT Original Image + Marked Image W X Y=X+W

Watermark Detection Independent detection performed on each block, for localizing altered blocks Define two operators:

Example of Differential Operators

Watermark Detection Tb = Block of image being tested Wb = Corresponding block of watermark image Detector uses both row and column differences:

Block Test Statistic Tb* and Wb* are correlated to compute block test statistic b: b  T: Block is likely authentic b < T: Block is likely altered.

Results - Gradient Original “Gradient” Altered “Gradient” Total Blocks: 682, Altered:300 (44%) Detector Block size:16x16, embedding =5.0

Results - Gradient

Results - Gradient

Results - Sign Original “Sign” Altered “Sign” Total Blocks: 1536, Altered:77 (5%) Detector Block size:16x16, embedding =5.0

Results - Sign

Results - Sign

Results - Money Original “Money” Altered “Money” Total Blocks: 570, Altered:143 (25%) Detector Block size:16x16, embedding =5.0

Results - Money

Results - Money

Results - Girls  Original “Girls” Altered “Girls”  Total Blocks: 5704, Altered:951 (17%) Detector Block size:16x16, embedding =5.0

Results - Girls

Results - Girls

Detection Performance Embed: =5.0 Detection: T=0.1 blocksize=16x16 JPEG-60 bitrate=0.90 bpp 93% correct detection 4% false positive 17% misses

Conclusions A semi-fragile watermarking technique was proposed which classifies about 70%of blocks correctly for moderate JPEG compression, 90% for light JPEG compression Detector has problems with edges and textures Future work: Integrate a visual model to embed mark at higher strengths in textured areas