1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Xinpeng Zhang.

Slides:



Advertisements
Similar presentations
Modeling and Analysis of Handoff Algorithms in Multi-Cellular Systems By Chandrashekar Subramanian For EE 6367 Advanced Wireless Communications.
Advertisements

Randomized Detection for Spread- Spectrum Watermarking: Defending Against Sensitivity and Other Attacks Ramarathnam Venkatesan and Mariusz H. Jakubowski.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery Source: Pattern Recognition, Vol. 41, Issue 2,
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Data preprocessing before classification In Kennedy et al.: “Solving data mining problems”
Ji-Hee Han, Sejung Yang, and Byung-Uk Lee, Member, IEEE IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 2, FEBRUARY 2011.
Maximizing Strength of Digital Watermarks Using Neural Network Presented by Bin-Cheng Tzeng 5/ Kenneth J.Davis; Kayvan Najarian International Conference.
Chih-Hsing Lin, Jia-Shiuan Tsai, and Ching-Te Chiu
1 Robust Video Stabilization Based on Particle Filter Tracking of Projected Camera Motion (IEEE 2009) Junlan Yang University of Illinois,Chicago.
Watermarking For Image Authentication Presented by San-Hao Wang.
Speech Enhancement Based on a Combination of Spectral Subtraction and MMSE Log-STSA Estimator in Wavelet Domain LATSI laboratory, Department of Electronic,
Cryptanalysis of Correlation-Based Watermarking Schemes Using Single Watermarked Copy Author: Tanmoy Kanti Das and Subhamoy Maitra From IEEE SIGNAL PEOCESSING.
Scale Invariant Feature Transform (SIFT)
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang Xi'an University of Technology,
Barcode Readers using the Camera Device in Mobile Phones 指導教授:張元翔 老師 學生:吳思穎 /05/25.
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
October 8, 2013Computer Vision Lecture 11: The Hough Transform 1 Fitting Curve Models to Edges Most contours can be well described by combining several.
01-Feb-12Data Leakage Detection1. CONTENTS  ABSTRACT  INTRODUCTION  OBJECTIVES  STUDY AND ANALYSIS  FLOW CHART  FUTURE SCOPE  LIMITATIONS  APPLICATIONS.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Zhejiang University Wavelet-based 3D mesh model watermarking Shi Jiao-Ying State Key Laboratory of CAD&CG, Zhejiang University, Hangzhou
Modified Patchwork Algorithm: Anovel Audio Watermarking Scheme In-Kwon Yeo and Hyoung Joong Kim.
Reversible medical image watermarking based on wavelet histogram shifting Source: Authors: Reporter: Date: The Imaging Science Journal, Vol. 59, No. 1,
Multiple Image Watermarking Applied to Health Information Management
Watermarking Text Document Images Using Edge Direction Histograms Young-Won Kim and Il-Seok Oh Pattern Recognition Letters, Vol. 25, 2004, pp – 1251.
3D polygonal meshes watermarking using normal vector distributions Suk-Hawn Lee, Tae-su Kim, Byung-Ju Kim, Seong-Geun Kwon.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
NTIT1 A chaos-based robust wavelet- domain watermarking algorithm Source: Chaos, Solitions and Fractals, Vol. 22, 2004, pp Authors: Zhao Dawei,
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Robust and Accurate Surface Measurement Using Structured Light IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, VOL. 57, NO. 6, JUNE 2008 Rongqian.
1 Transform Domain Fragile Image Watermark Prof. Ja-Ling Wu Graduate Institute of Networking and Multimedia Dept. of Computer Science and Information Engineering.
 Forensics of image re-sampling (such as image resizing) is an important issue,which can be used for tampering detection, steganography, etc.  Most of.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Watermarking Scheme Capable of Resisting Sensitivity Attack
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Der-Chyuan Lou and Jiang-Lung Liu,
PLIP BASED UNSHARP MASKING FOR MEDICAL IMAGE ENHANCEMENT
Robustness Evaluation of Perceptual Watermarks
Watermarking for Image Authentication ( Fragile Watermarking )
Increasing Watermarking Robustness using Turbo Codes
Feature Space Based Watermarking in Multi-Images
Mean value based reversible data hiding in encrypted images
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Source: Pattern Recognition Letters, Article In Press, 2007
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source: IEEE Signal Processing Letters, Vol. 14, No. 3, Mar. 2007, pp
Digital Watermarking for Image Authentication with Localization
Novel Multiple Spatial Watermarking Technique in Color Images
An Algorithm for Removable Visible Watermarking
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Blind Reversible Authentication Based on PEE and CS Reconstruction
On SVD-based watermarking algorithm
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
An imperceptible spatial domain color image watermarking scheme
Hidden Digital Watermarks in Images
Authors: J.J. Murillo-Fuentes
Source : Digital Signal Processing. Vol. 73, pp , Feb
A Quadratic-Residue-based Fragile Watermarking Scheme
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang and Shuozhong Wang

2 Outline 1.Introduction 2.Sensitivity attack 3.Watermark detector 4.Embedding algorithm 5.Detection algorithm 6.Security analysis 7.Experimental results 8.Conclusions

3 Introduction 1.This letter proposes a watermarking scheme capable of defeating the sensitivity attack a novel tailor-made embedding algorithm a corresponding detection mechanism are designed to “mislead” the attackers: get a “fake” signal

4 Sensitivity attack(1/3) 1.Attacker possesses a watermarked image and an available detector 2.Remove or change the embedded without causing serious distortion  Original image Watermark embedding Watermarked image watermark detector Sensitivity attack Not watermarked Watermark

5 Sensitivity attack(2/3) Not watermarked Watermarked Decision boundary Decision boundary : between the “Watermarked” and “Not watermarked” regions is a hyper-plane in a multidimensional space.

6 Sensitivity attack(3/3) : perpendicular to the decision boundary : shows how sensitive the detector is to modification in the direction of each vector : is either +1 or -1 indicates addition or subtraction Subtracts from the watermarked copy with an increasing strength until the detector reports that no watermark is present. Thus, the embedded watermark is removed.

7 Watermark detector Public watermark detector Detection function F > Threshold ≤ Threshold Output 1 (Watermarked) Output 0 (Not watermarked) Black box Test image Watermark detector : provide adequate information about an embedded watermark

8 Embedding algorithm(1/6) C 2,3 C 2,0 C 1,0 C 0,0 C 2,2 C 2,1 C 1,2 C 1,1 C 0,2 C 0,1 DWT 3-levels Watermark IDWT Watermarked image

9 Embedding algorithm(2/6)

10 Embedding algorithm(3/6)

11 Embedding algorithm(4/6) mutually independent and satisfy a standard Gaussian distribution with zero mean and unit standard deviation 1.Generate( )data-groups in a pseudo-random manner 2.The number of elements in each data group is equal to that of the host DWT coefficients, and all elements in the groups :

12 Embedding algorithm(5/6) where All modified DWT coefficients are inversely transformed to yield a watermarked copy : modified DWT coefficients

13 Embedding algorithm(6/6) 1.According to the central limit theorem is very close to its mean 1 All are approximately 0 2.Standard deviation of

14 Detection algorithm (1/2) 1.If output “ Watermarked ” output “ Not watermarked ”

15 Detection algorithm (2/2) 1.If test image contains watermark, all close to 0   2.If test image contains no watermark 3.M  189 avoid excessive distortion

16 Security analysis 1. Attacker does not know and is impossible to estimate by measuring the sensitivities of 2. The detection function of the attacked signal always greater than 0 ( F > 0). This means the sensitivity attack cannot remove the embedded watermark.

17 Experimental results ImageDetection function F Original -1.7  10 4 Watermarked 1.5  10 4 A still image captured by a digital camera was used as the original test signal. The system parameter M=189

18 Conclusions 1.The proposed watermarking scheme is capable of defeating the sensitivity attack. 2.The corresponding detection mechanism can mislead the attackers. 3.The output of detector cannot be used to remove watermark with low distortion.