An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.

Slides:



Advertisements
Similar presentations
Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Advertisements

Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.
Maximizing Strength of Digital Watermarks Using Neural Network Presented by Bin-Cheng Tzeng 5/ Kenneth J.Davis; Kayvan Najarian International Conference.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
1. 2 u Copyright Protection u Authentication of multimedia data u Robust Data Hiding and Security issues.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
1 An Efficient Method for DCT- Domain Image Resizing with Mixed Field/Frame-Mode Macroblocks Changhoon Yim and Michael A. Isnardi IEEE TRANSACTION ON CIRCUITS.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
Image Recognition and Processing Using Artificial Neural Network Md. Iqbal Quraishi, J Pal Choudhury and Mallika De, IEEE.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Reversible medical image watermarking based on wavelet histogram shifting Source: Authors: Reporter: Date: The Imaging Science Journal, Vol. 59, No. 1,
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Multiple Image Watermarking Applied to Health Information Management
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
Detection of Image Alterations Using Semi-fragile Watermarks
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
1 Robust and transparent watermarking scheme for colour images Speaker : Po-Hung Lai Adviser : Chih-Hung Lin Date :
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Image Adaptive Watermarking Using Wavelet Domain Singular Value Decomposition Source:IEEE Transactions on Circuits and Systems for Video Technology, Volume:
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
DEPARTMENT OF ECE, BEC, BAGALKOT
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
IMAGE PROCESSING IMAGE WATERMARKING
Der-Chyuan Lou and Jiang-Lung Liu,
DONE BY S.MURALIRAJAN M.NIRMAL
Increasing Watermarking Robustness using Turbo Codes
Feature Space Based Watermarking in Multi-Images
Dept. of Elec. & Comp. Engineering
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Parag Agarwal Digital Watermarking Parag Agarwal
DCT-based Processing of Dynamic Features for Robust Speech Recognition Wen-Chi LIN, Hao-Teng FAN, Jeih-Weih HUNG Wen-Yi Chu Department of Computer Science.
Reduction of blocking artifacts in DCT-coded images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Digital Steganography Utilizing Features of JPEG Images
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Progressive Transmission of Two-Dimensional Gel Electrophoresis Image Based on Context Features and Bit-plane Method Source:2004 IEEE International Conference.
Detecting Hidden Message Using Higher Order Statistical Models Hany Farid By Jingyu Ye Yiqi Hu.
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
An imperceptible spatial domain color image watermarking scheme
Hidden Digital Watermarks in Images
Source: Circuits and Systems for Video Technology,
A Quadratic-Residue-based Fragile Watermarking Scheme
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of Kaohsiung, Kaohsiung 81148, Taiwan IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 23, NO. 3, MARCH 2011

OUTLINE INTRODUCTION BACKGROUND ◦ Discrete cosine transform ◦ Singular value decomposition THE PROPOSED WATERMARKING SCHEME ◦ Image information ◦ The watermark embedding procedure EXPERIMENTAL RESULTS CONCLUSION

INTRODUCTION Digital watermarking has been regarded as an effective solution to protect the copyright of digital media. In this paper, an improved SVD-based watermarking technique considering human visual characteristics is presented. Experimental results are provided to demonstrate the proposed approach is able to withstand a variety of image processing attacks.

BACKGROUND Discrete cosine transform (1) (2) defined as

BACKGROUND Discrete cosine transform

BACKGROUND

BACKGROUND

BACKGROUND

BACKGROUND Singular value decomposition (3)

BACKGROUND Singular value decomposition

THE PROPOSED WATERMARKING SCHEME Image information In designing a watermarking scheme, two conflicting requirements should be satisfied at the same time: ◦ (1) the watermark should be imperceptible ◦ (2) the watermark should be robust and very difficult to remove. Using HVS properties to produce a more robust watermark.

Image information The HVS model can be used not only tomeasure the perceptibility ofwatermarks once they are embedded, but also to control that perceptibility during the embedding process. Therefore, we considered the visual entropy and edge entropy,which are also used by in order to select watermark embedding regions that satisfy the aforementioned two requirements. THE PROPOSED WATERMARKING SCHEME

Visual entropy Edge entropy (4) (5)

Visual entropy THE PROPOSED WATERMARKING SCHEME

The watermark embedding procedure THE PROPOSED WATERMARKING SCHEME

The watermark embedding procedure ◦ Step 1. The cover image is first partitioned into non-overlapping blocks with 8×8 pixels. ◦ Step 2. Select appropriate blocks forwatermark embedding by utilizing the HVS characteristics. ◦ Step 3. Apply DCT technique to the selected blocks and then obtain DCT domain frequency bands. ◦ Step 4. Apply SVD to all DCT transformed blocks. THE PROPOSED WATERMARKING SCHEME

The watermark embedding procedure step5 ◦ On each selected block, the relationship between the entries in the first column of the U matrix is examined. ◦ The watermark is embedded by changing the relation between the third (u3,1) and the fourth (u4, 1) entries in the first column. ◦ If the embedded binarywatermark bit is 1, then the value of (u3, 1−u4, 1) should be positive and its magnitude is greater than a threshold (T). ◦ If the embedded binary watermark bit is 0, then the value of THE PROPOSED WATERMARKING SCHEME

The watermark embedding procedure step5 ◦ (u3,1−u4,1) should be negative and its magnitude is greater than a threshold (T). ◦ When these two conditions are violated,the entries of u3, 1 and u4,1 should be modified as ˆu3;1 and ˆu4;1,respectively, based on the following rules: THE PROPOSED WATERMARKING SCHEME (6) (7)

The watermark extracting procedure THE PROPOSED WATERMARKING SCHEME

The watermark extracting procedure ◦ Step 1. Thewatermarked image is first partitioned into blockswith 8×8 pixels. ◦ Step 2. The visual entropy and edge entropy of each block are calculated to determine the block where the watermark is embedded. ◦ Step 3. Apply DCT to the selected blocks to obtain DCT domain frequency. ◦ Step 4. Apply SVD to all DCT transformed blocks. THE PROPOSED WATERMARKING SCHEME

The watermark extracting procedure Step 5. ◦ The relationship between the third and the fourth entries in the first column of the U matrix is examined. ◦ If a positive difference is detected, then the extracted watermark bit is a 1, whereas a negative difference would imply that a watermark bit 0 is extracted. ◦ These extracted bit values are used to construct the extracted watermark. THE PROPOSED WATERMARKING SCHEME

EXPERIMENTAL RESULTS

Fig. 6. Extracted watermarks at the threshold value=0.012 with different attacks. (a) Cropping, (b) Gaussian noise, (c) Median filtering, (d) JPEG compression, and (e) Sharpening. Fig. 7. Extracted watermarks at the threshold value=0.04 with different attacks. (a) Cropping, (b) Gaussian noise, (c) Median filtering, (d) JPEG compression, and (e) Sharpening.

CONCLUSION The technique fully exploits the respective feature of SVD which efficiently represents intrinsic algebraic properties of an image. The use of HVS characteristics helps to select watermark embedding regions for a good compromise between robustness and quality of the watermarked image.