Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.

Slides:



Advertisements
Similar presentations
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Advertisements

Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Brodatz Textures Vistex Textures What is texture ? Texture can be considered to be repeating patterns of local variation of pixel intensities.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Fractal Image Compression
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Secure Spread Spectrum Watermarking for Multimedia Ishani Vyas CS590 Winter 2008.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Image Analysis Preprocessing Arithmetic and Logic Operations Spatial Filters Image Quantization.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
Jaroslaw Kutylowski 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Robust Undetectable Interference Watermarks Ryszard Grząślewicz.
Detection of Image Alterations Using Semi-fragile Watermarks
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Integrity of multimedia data ● Techniques for digital watermarking ● An example in the Wavelet domain ● Experimental results: evaluation.
Outline Carrier design Embedding and extraction for single tile and Multi-tiles (improving the robustness) Parameter α selection and invisibility Moment.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
A Partial Survey of the Perfect Digital Watermark Problem.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
IMAGE PROCESSING IMAGE WATERMARKING
DONE BY S.MURALIRAJAN M.NIRMAL
Increasing Watermarking Robustness using Turbo Codes
Image Enhancement in the Spatial Domain
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Parag Agarwal Digital Watermarking Parag Agarwal
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Digital Watermarking Lecture 2
Presentation transcript:

Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec 2000 Wollongong Austr. Presented by Gene Rugg Electronic copyright protection schemes… have proven ineffective or insufficient in the last years. The recent failure of the DVD copy prevention is just another argument supporting the idea that electronic copyright protection should rather rely on copy detection techniques.

Measure of a Watermark Robustness * –Ability to resist image modification from typical image processing applications, difficult or impossible to remove without visiably degrading the original image Capacity * –The amount of information embedded and later detectible by the proper authorities Imperceptibility –The degree with which the original image is left unchanged.

Achievements of Watermarking Difficult to remove –Fairly easy to do Robust –Not easily done with current watermarks. Very fragile to many graphic attacks Imperceptible Readily detectible –Fairly easy to do

Robustness Sebe, Domingo and Herrera developed two algorithms that was more robust than most other watermarking techniques, based off ideas from Didital watermarking robust against JPEG compression, Lee Park and Zheng, 1999.

1: Crop-Proof Watermarking From the original take a JPEG copy, compressed to greater than the required resistance level eg 10%

1: Crop-Proof Watermarking Subtract the two pictures to from image. This is 0 where the colors match, or postive and negitive chages to the image. These non zero pixels are where the information is to be hidden

1: Crop-Proof Watermarking Take the binary watermark you wish to embed

1: Crop-Proof Watermarking Encode with an Error Correcting Code (ECC)

1: Crop-Proof Watermarking Take a pseudo-random number, generated by a key only we know; k …

1: Crop-Proof Watermarking Repeat watermark up to the number of bits in the image, ie w h pixels (3 w h colour) … …

1: Crop-Proof Watermarking XOR the bit strings. These represent when add or subtract the difference, the embedded string … … S= …

1: Crop-Proof Watermarking Use the string s to encode into the image Original Image

1: Crop-Proof Watermarking Use the string s to encode into the image JPEG Approximation

1: Crop-Proof Watermarking Use the string s to encode into the image 0 subtract, 1 adds Encoded Image

1: Crop-Proof Watermarking If there is too much noise in the image, randomly choose pixels and shift the values towards the original image until the noise level is reduced.

Restore test image to BMP form, and compress to original JPEG level, and recalculate the non zero pixel locations Cycling the length of the watermark, compare the levels, and return 1: higher or 0: lower or #: undefined XOR this result with the pseudorandom string. Recall the result at the position in the watermark, then ECC retrieve the message 1: Crop-Proof Retrieval

1: Robustness Assessment Natively Robust Against: Color quantization All Low pass filtering –Gaussian blur –Median filter (2x2 3x3 4x4) –Simple sharpening –Laplacian removal, frequency mode JPEG compression higher than q Rotations of ±.25 degrees Shearing of 1% Cropping attacks/removal of rows or columns, by shifting the image until relative position is correct

1: Robustness ReAssessment Crop-Proof is better, as multiple watermarks can be applied, and still all can be detected, and recovered. Crop-Proof is worse against: Scale attacks of a small degree or more Minor rotations Random transformations and filters

2: Scale-Proof Watermarking From the original, calculate its darkness if its color is <70, and also by averaging the pixels around it, giving a maximised normalized number in a range of 1 to 4. This is V j d

2: Scale-Proof Watermarking Divide the image into the maximum number of squares so there are bands of pixels r wide, forming q tiles. Each tile will encode one bit so q is the capacity of the image

2: Scale-Proof Watermarking Encode and elongate that source watermark, XOR with the pseudorandom number up to q number of bits S=

2: Scale-Proof Watermarking For all embeddable pixels in each tile, apply V j to each difference as before 0; new pixel is old color minus V j 1; new pixel is old color plus V j

2: Scale-Proof Retrieval From the given image, estimate the tile spacing, and number of tiles Within each tile, locate and compare each pixel relative with the original. If the difference is greater, record a 1 for that tile, or if less, a 0. XOR with the pseudorandom number Tally on each tile to see if there are more 1s or 0s Decode via ECC

2: Robustness Assessment Natively Robust Against: Color quantization Most Low pass filtering –Gaussian blur –Median filter (2x2 3x3) –Simple sharpening –Laplacian removal, frequency mode JPEG compression Rotations (with/without scaling) of ±.25 degrees Shearing of 1% Removal of rows or columns Scaling Attacks

2: Robustness ReAssessment Scale-Proof is better handling large compression and scaling attacks Scale-Proof is worse against: Crop attacks of a small degree or more Minor rotations

Conclusions More work is needed in the field of spatial- domain image watermarking Suggested a combination of the two techniques Obvious that image manipulation to scale and rotate back to normal possible and helps algorithms.

Thoughts Is 0.25° enough for most image manipulators? Is computation time as important as a concise algorithm? Did you understand, and is it useful? Acknowledgments: Sebé, Domingo-Ferrer, Herrera * Alecander Huber, informatik.tu-meunchen.de/~hubera/watermarking