Download presentation
Presentation is loading. Please wait.
Published byJob Mosley Modified over 9 years ago
1
http://isrc.ulster.ac.uk Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt University of Ulster, UK Dr. Abbas Cheddad Umea University, Sweden
2
http://isrc.ulster.ac.uk 2 Steganography Key Encoder Cover Image Secret Data Stego Object Decoder Secret Data Communications Channel
3
http://isrc.ulster.ac.uk Secure Digital Watermarking Cover Image Secret Data Protected Image
4
http://isrc.ulster.ac.uk Digital content authentication 4 Sorry - this is NOT original. Test image Original image Original Image Attacked Image
5
http://isrc.ulster.ac.uk 5 Secret Data Cover Image Stego Object Self-Embedding
6
http://isrc.ulster.ac.uk 6 How to detect alterations (1/2) Final Result Grayscale image of Altered image Altered image Extracted grayscale image
7
http://isrc.ulster.ac.uk 7 Original image Extracted image How to detect alterations (2/2)
8
http://isrc.ulster.ac.uk Self-Embedding - Temporal information UU SDW:American Beauty-045/789+0 8 Key Frames
9
http://isrc.ulster.ac.uk 9 Temporal content change detection Original Video Attacked Video Detected Video
10
http://isrc.ulster.ac.uk Conclusion A steganography based self-embedding technique provides a solution for digital content authentication. Benefits - Protects commercial value of digital content - Protects the secrecy of digital content - Protects digital content from modification Applicable fields: film/animation, TV, games, music, images 10
11
http://isrc.ulster.ac.uk 11 Thank You
12
http://isrc.ulster.ac.uk 12 Secret Data Cover Image Stego Object Self-Embedding
13
http://isrc.ulster.ac.uk 13 How to detect alterations (1/3) Altered Document Recovered Document Grayscale image of Altered Document Final Result Altered Document Recovered Document Grayscale image of Altered Document Altered Document Recovered Document
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.