Multiple watermarking Wu Dan 2007.10.10. Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Reversible watermarking Wu Dan Introduction Difference expansion Histogram bin shifting.
N-Secure Fingerprinting for Copyright Protection of Multimedia
Fifth International Conference on Information
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Multiple Image Watermarking Applied to Health Information Management
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Reversible watermarking Wu Dan Introduction What?
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
ELE 488 F06 ELE 488 Fall 2006 Image Processing and Transmission (12 – 7 – 06) Digital Watermarking What? Why? How? Attacks, Legal issues 12/7.
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
1 Transform Domain Fragile Image Watermark Prof. Ja-Ling Wu Graduate Institute of Networking and Multimedia Dept. of Computer Science and Information Engineering.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
3D mesh watermarking Wu Dan Introduction Spatial domain (00 EG) Transformed domain (02 EG) K=D-A; (D ii is a degree of vertex v i, A is an.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Watermarking Scheme Capable of Resisting Sensitivity Attack
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Source: IEEE Transactions on Multimedia, Vol. 5, No
Vishal Monga, Divyanshu Vats and Brian L. Evans
K. ZEBBICHE , F. KHELIFI and A. BOURIDANE
DONE BY S.MURALIRAJAN M.NIRMAL
Watermarking for Image Authentication ( Fragile Watermarking )
Increasing Watermarking Robustness using Turbo Codes
Feature Space Based Watermarking in Multi-Images
Dept. of Elec. & Comp. Engineering
Parag Agarwal Digital Watermarking Parag Agarwal
Cocktail Watermarking for Digital Image Protection
Source: Pattern Recognition Letters, Article In Press, 2007
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Hiding and Its Applications
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Hidden Digital Watermarks in Images
Authors: J.J. Murillo-Fuentes
Presentation transcript:

Multiple watermarking Wu Dan

Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust) Verification watermarks( fragile) Multi-user watermarking The difficulty of multiple watermarking is the order.

Introduction (II) The basic method of watermarking SS (spread spectrum) x ’ =x+αw QIM (quantization index module) Odd even odd even

Multipurpose Watermarking for Image Authentication and Protection Chun-Shien Lu, Member, IEEE, Hong-Yuan Mark Liao, Member, IEEE IEEE TRANSACTIONS ON IMAGE PROCESSING, OCTOBER 2001

I ) cocktail watermarking scheme Bipolar watermarking Complementary modulation Use of a wavelet-based human visual system to control the hiding strength

II) Proposed multipurpose algorithm Wavelet transform

Quantization of wavelet coefficient S: scale o: orientation (x,y): position MTU: masking threshold units

Negative modulation Positive modulation

q(|p(x,y)|) is regarded as the embedded watermark values. Negative modulation positive modulation

Host image recovery The difference between a recovered wavelet coefficient and its corresponding original wavelet coefficient Watermark detection

Compare the hidden watermark (K) and the extracted one ( ) Detection of robust watermark

Detection of fragile watermark

A novel blind multiple watermarking technique for images Peter H. W. Wong, Member, IEEE, Oscar C. Au, Senior Member, IEEE, and Y. M. Yeung IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, AUGUST 2003

I)SWE (single watermarking embedding) Select image pixels or transform coefficients Watermark host vector: Watermark: A pseudorandom bit sequence:

The first key: a set of N pseudorandom positive real numbers The second key: being zero-mean Gaussian with variance Split K and Y into N subvectors of equal length

Force the projection of Y i to be the center of the nearest cell of the desired watermark bits Decode the watermark of SWE

II) MWE Embed Q bits simultaneously in each subvector Y i. The first key: The second key:

Direct approach

Iterative approach Decode and detection

III) IWE in JPEG compressed domain Problem: when the original image for the proposed watermarking algorithm is a JPEG-compressed image and the watermarked image needs to be JPEG recompressed to produce another.jpg. Would the watermark still be decodable?

Watermark host vector: Y 1 =(f 1 (0,1),f 2 (0,1), …… f 32*32 (0,1)) Y 2 =(f 1 (1,0),f 2 (1,0), …… f 32*32 (1,0)) …… in zigzag order. Y ’ i =Y i +N i

Near optimal watermark estimation and its countermeasure: antidisclosure watermark for multiple watermark embedding Chun-Shien Lu, Member, IEEE, and Chao-Yung Hsu IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY,

I) Watermark estimation X: the original image; : the watermarked image. :the attacked image Conventional attacks: The collusion attack

Copy attack: the estimated watermark can be inserted into unwatermarked media data to produce a counterfeit watermark data.

Compare denoising attack and copy attack X: the original image; : the watermarked image. :the estimated watermark is the watermark extracted from if BER(, ) >threshold, the denosing attack succeed.

Z: the faked original image; : the faked watermarked image. is the watermark extracted from if BER(, ) <threshold, the copy attack succeed. A smaller threshold resist copy attack. A larger threshold resist denosing attack.

II) Optimal watermark estimation

Necessary Condition for Optimal Watermark Estimation { } Sufficient and Necessary Condition for Optimal Watermark Estimation Perfect cover data recovery

A near-perfect cover data recovery algorithm For each embedding unit with index q. We adopt Weiner filtering for denosing purpose to get an estimation.

Collusion Estimation of Watermark Sign: Estimation of Watermark Magnitude via Visual Model for Complete Removal: the wavelet coefficient for the recovered image is:

III) Content dependent watermark Media hash (MH) The magnitude relation ship between two AC coefficient at blocks u and v. This feature value is verified to be robust because this magnitude relationship can be mostly preserved under incidental modifications (e.g., compressions, filtering, and denoising).

CDW (content-dependent watermark) Resistant collusion attack

Resistant copy attack

Conclusion Non-uniform quantization Design the perfect CDW

Thanks!