Program Homework Implementation of the Improved Spread Spectrum Watermarking System.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
H IGH CAPACITY WATERMARKING H YPERSPECTRAL I MAGES AUTHENTICATION Mehdi Fallahpour Jordi Serra-Ruiz David Megías.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Digital watermarking technique for protecting digital images
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Watermarking For Image Authentication Presented by San-Hao Wang.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
By Elo Leung and Wing Wong CS 265 Section 2 Spring 2004.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Audio Steganography Echo Data Hiding
Digital Signal Processing Final Project Proposal R 資工碩一 馬智釗 Reference : “Rotation, scale, and translation resilient digital watermarking based.
Image Compression - JPEG. Video Compression MPEG –Audio compression Lossy / perceptually lossless / lossless 3 layers Models based on speech generation.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Perceptual Watermarks for Digital Image and Video ECE 738 paper presentation Pei Qi ECE at UW-Madison
Digital Watermarking Parag Agarwal
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
ELE 488 F06 ELE 488 Fall 2006 Image Processing and Transmission (12 – 7 – 06) Digital Watermarking What? Why? How? Attacks, Legal issues 12/7.
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Homework Implementing the spread-spectrum watermarking system.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
DEPARTMENT OF ECE, BEC, BAGALKOT
DCT watermarking Speaker: Paul 1.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Welcome
DONE BY S.MURALIRAJAN M.NIRMAL
Basic Concepts of Audio Watermarking
Watermarking for Image Authentication ( Fragile Watermarking )
Parag Agarwal Digital Watermarking Parag Agarwal
Reference Ingemar J. Cox, Joe Kilian, F. Tomson Leighton, and Talal Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Trans. On Image.
Spread Spectrum Watermarking
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Hidden Digital Watermarks in Images
Presentation transcript:

Program Homework Implementation of the Improved Spread Spectrum Watermarking System

2 Reference Ingemar J. Cox, Joe Kilian, F. Tomson Leighton, and Talal Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Trans. On Image Processing, vol. 6, no. 12, December 1997 H. S. Marvar and A. F. Florencio, "Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking," IEEE Trans. on Signal Processing, vol. 51, no. 4, April 2003

Basic Knowledge 2-D DCT DCT pattern for an 8x8 block 3 Middle Band Low Band High Band

Spread-Spectrum Watermarking

Spread Spectrum 5

Define The watermark W = b 1 b 2 … b n ( ex. n = 1000 ) b i ~ N(0,1) Use Sign(.) to convert b i into 1 or -1 The Cover Image C is transformed by N×N DCT. C t =DCT(C). The coefficients to be altered X = x 1 x 2 … x m (m coefficients in the C t except DC, m: extract pattern length) How to choose X: many heuristics In zigzag order choose an interval length = m Max m coefficients in zigzag order Random sample m coefficients m coefficients with largest DCT value … 6

Spread Spectrum 7

8

9 Low Band High Band

Spread Spectrum 10 α = 0.1~100

Spread Spectrum 11 Low Band High Band

Spread Spectrum 12

Spread Spectrum So far, we can embed just “1” bit message into image But, how can we embed “n” bits? 3 Ways Code division Use different extract pattern(orthogonal extract patterns are suggest) Frequency division Embed message into different frequency band Spatial division Slice image into many blocks each block embeds 1 bit message 13

Improved Spread-Spectrum Watermarking

Improved Spread Spectrum Define The watermark W = b 1 b 2 … b n ( ex. n = 1000 ) b i ~ N(0,1) Use Sign(.) to convert b i into 1 or -1 The Cover Image C is transformed by N×N DCT. C t =DCT(C). The coefficients to be altered X = x 1 x 2 … x m (m coefficients in the C t except DC, m: extract pattern length) How to choose X: many heuristics In zigzag order choose an interval length = m In this homework we suggest you to use it Max m coefficient in zigzag order Random sample m coefficient m coefficient with largest DCT value … 15

Improved Spread Spectrum 16

Improved Spread Spectrum 17

Improved Spread Spectrum 18 Low Band High Band

Improved Spread Spectrum 19 α = 0.1~100 λ = around 1

Improved Spread Spectrum 20

Improved Spread Spectrum So far, we can embed just “1” bit message into image But, how can we embed “n” bits? 3 Ways Code division Use different extract pattern(orthogonal extract patterns are suggest) Frequency division Embed message into different frequency band Spatial division Slice image into many blocks each block embeds 1 bit message In this homework we use this method 21

Measurements We always have three dimensions in measurement stage Capacity Fidelity Robustness When measuring one dimension, you must fix the others When compare two dimensions, you must fix the other 22

Measurements Measurements for Capacity Amount of message that embedded in cover image How to improve capacity The more blocks you slice the original image, the more bits you can embed into it As you know, code division, frequency division methods can also achieve capacity requirement. 23

Measurements Measurements for Fidelity Quality of watermarked image Use PSNR value between original image and marked image Reference website Code: Call PSNR(imageA, imageB) in MATLAB or Find PSNR code in web and use it How to improve fidelity Consider influence of cover images not just use additive operation to add watermark into it Consider Human Visual System(ex: perceptual model) Embedding in other domain(ex: wavelet based approach) 24

Measurements 25

26 Attacks Lossy Compression JPEG compression Geometric Distortion Rotation Shifting Scaling Affine transform Cropping Image Processing Blurring …

Homework1 Rules Deadline: 2015/11/30 14:00 (suggest) Before the week of final exam(I will strictly grade your score) Hand-in instructions: Program: MATLAB code(suggest), other languages are welcome(if I cannot run your code, I will ask you to perform your program with your own laptop) Report: PDF file(strongly suggest), others are welcome(but if my computer cannot open it, you will get 0 score) Zip all program files, reports into one file and sent to Title the mail as: [MMSEC]2015HW1_studentID Name the attached file as: [MMSEC]2015HW1_studentID.zip studentID example: R

Homework1 Grading Criteria Program (30%): embed and extract ISS functions A main program to perform embed and extract process Report (70%): How to execute your code Any special method you implement besides the basic ISS scheme Test parameters used in ISS scheme Test capacity, fidelity and robustness of your watermarking scheme Compare Improved Spread Spectrum with Spread Spectrum Compare the influence of attacks on your watermarking scheme At least 6 types of attacks Others 28

Homework1 29

Bonus Please propose a blind watermarking scheme of Chiou- Ting Hsu and Ja-Ling Wu, "Hidden Digital Watermarks in Images," IEEE Trans. On Image Processing, Vol.8, No.1, pp.58~68 January P.S. You can write down your opinions of the new scheme only Coding for the new scheme is welcome 30

Advanced Reading Watermarking on other multimedia No limitation on multimedia materials. References: Video “Digital Video Watermarking in P-Frames with Controlled Video Bit-Rate Increase”, IEEE Transactions on Information Forensics and Security, “Blind MPEG-2 Video Watermarking Robust Against Geometric Attacks: A Set of Approaches in DCT Domain”, IEEE Transactions on Image Processing, Audio “Spread-Spectrum Watermarking of Audio Signals”, IEEE Transactions on Signal Processing, “Watermarked Movie Soundtrack Finds the Position of the Camcorder in a Theater”, IEEE Transactions on Multimedia, Graphics “Watermarking Three-Dimensional Polygonal Models Through Geometric and Topological Modifications”, IEEE Journal on Selected Areas in Communications, Text “Data Hiding in Binary Image for Authentication and Annotation”, IEEE Transactions on Multimedia,