Integrity of multimedia data ● Techniques for digital watermarking ● An example in the Wavelet domain ● Experimental results: evaluation.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
H IGH CAPACITY WATERMARKING H YPERSPECTRAL I MAGES AUTHENTICATION Mehdi Fallahpour Jordi Serra-Ruiz David Megías.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Fifth International Conference on Information
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Bit-Plane Watermarking for SPIHT-Coded Images 台北科技大學資工所 指導教授:楊士萱 學生:廖武傑 2003/07/29.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery By Pat P. W. Chan Supervised by Michael R. Lyu 8/6/2004 Computer Science.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Paul Blythe and Jessica Fridrich Secure Digital Camera.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Reversible medical image watermarking based on wavelet histogram shifting Source: Authors: Reporter: Date: The Imaging Science Journal, Vol. 59, No. 1,
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Multiple Image Watermarking Applied to Health Information Management
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Copyright 2000, Odyssey Research Associates, Inc. SL Semantic Data Integrity DARPA Program Review Cornell Business & Technology Park 33 Thornwood.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Digital Watermarking
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
DEPARTMENT OF ECE, BEC, BAGALKOT
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
IMAGE PROCESSING IMAGE WATERMARKING
K. ZEBBICHE , F. KHELIFI and A. BOURIDANE
Watermarking for Image Authentication ( Fragile Watermarking )
Increasing Watermarking Robustness using Turbo Codes
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Parag Agarwal Digital Watermarking Parag Agarwal
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Hiding and Its Applications
Author: Minoru Kuribayashi, Hatsukazu Tanaka
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Authors: J.J. Murillo-Fuentes
Digital Watermarking Lecture 2
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Integrity of multimedia data ● Techniques for digital watermarking ● An example in the Wavelet domain ● Experimental results: evaluation

Watermarking ● Basic idea To insert a invisibile structure (watermark) inside a «host» signal in order to mark it ● Result Author identification Author identification Which alteration? Which quality? Which alteration? Which quality? Evalutaion of the similarity between the original and teh altered data Evalutaion of the similarity between the original and teh altered data

Applications Applicazioni Copyright Protection Authentication Hidden annotation Secret communication E-commerceVideo-on-demandE-commerceforensic Multimedia distributuion medical imaging cartograpgy indexing & retrievial Military and intelligence Alternatives to cryprography

Example ● Method Request analysis Request analysis Choice of watermarking techniques Choice of watermarking techniques Improvements on the state-of-the- art Improvements on the state-of-the- art

Method ● «musts» Do not compromise the image quality Do not compromise the image quality Capable to reveal unauthorized modification Capable to reveal unauthorized modification JPEG2000 compression is «legal» JPEG2000 compression is «legal» unauthorized modifications are difficult unauthorized modifications are difficult To localize altered area To localize altered area

Robust self-embedding watermarking Method ● Tecnica di watermarking Fase di CASTING Fase di DETECTION Confronto

Method ● Improvements Watermark is less visible Watermark is less visible Correct thealterations Correct thealterations Resistant to JPEG 2000 compression Resistant to JPEG 2000 compression

The algorithm: casting Self Embedding DWT Correction error code Quantization and binarization IDWT DWT Quantization and binarization

Self Embedding DWT Codice a correzione d’errore Quantization and binarization Quantization and binarization IDWT The algorithm: casting Quantization function

Casting Correction error code Parity Bit 01001…011 Base band Self Embedding DWT Correction error code Quantization and binarization IDWT

Casting Binary Code Golay (23,12) … v 0 12 … Self Embedding DWT Correction error code Quantization and binarization IDWT

IDWT Casting Low Bit Modulation (LBM) Test on JPEG2000 Coefficienti wavelet autenticati Coefficienti wavelet per inserimento watermark Coefficienti wavelet non utilizzati Self Embedding DWT Correction error code Quantization and binarization IDWT

Detection W Extraction DWT Quantization and Binary representation Error correction code Golay (23,12) … v 0 12 …

● Which Metric? ● Evaluation of watermarking percetion ● Evaluation of robustness ● How to reveal and correct alterations? Experimental results ● Which images?

Test Images Medical Syntethic Standard Naturalistics 62 images in 4 categories

Metrics Similarity between watermark Similarity between images

Is it visible? 3 Livelli di decomposizione 5 Livelli di decomposizione Immagine Originale Risultati sperimentali 3 Livelli di decomposizione 5 Livelli di decomposizione

Experimental results What about robustness??? Simple attacks Simple attacks Gaussian noise Gaussian noise Median filter Median filter Gaussian filter Gaussian filter lossy compression JPEG2000 lossy compression JPEG2000 removal attacks removal attacks Removal of watermark Removal of watermark removal of an area of the image removal of an area of the image Loss of synchronization Loss of synchronization

Robustness to compression JPEG2000 Simple attacks

Removal of an area of the images PSNR Difference PSNR Removal attacks

Experiments Removal and corrections Immagine originaleImmagine marchiata e compressa Immagine manipolataErrori rilevatiErrori rilevati nel dominio spazialeErrori rilevati nel dominio DWTImmagine ricostruita