Author: Minoru Kuribayashi, Hatsukazu Tanaka

Slides:



Advertisements
Similar presentations
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Advertisements

A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Fifth International Conference on Information
Bit-Plane Watermarking for SPIHT-Coded Images 台北科技大學資工所 指導教授:楊士萱 學生:廖武傑 2003/07/29.
Secure Spread Spectrum Watermarking for Multimedia Ishani Vyas CS590 Winter 2008.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
By Elo Leung and Wing Wong CS 265 Section 2 Spring 2004.
Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery By Pat P. W. Chan Supervised by Michael R. Lyu 8/6/2004 Computer Science.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Apr. 10, 2003TOSHIBA Corporation 1 Toshiba Video Watermarking Technology HIDE -Human eye Insensitive Digitally Embedded watermark- Apr. 10, 2003 TOSHIBA.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
Multiple Image Watermarking Applied to Health Information Management
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Multiple-description iterative coding image watermarking Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 20, No. 4, pp , 2010.
NTIT1 A chaos-based robust wavelet- domain watermarking algorithm Source: Chaos, Solitions and Fractals, Vol. 22, 2004, pp Authors: Zhao Dawei,
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Watermarking Scheme Capable of Resisting Sensitivity Attack
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Spread Spectrum Audio Steganography using Sub-band Phase Shifting
Wavelets : Introduction and Examples
Lossy Compression of DNA Microarray Images
Basic Concepts of Audio Watermarking
Increasing Watermarking Robustness using Turbo Codes
A Digital Watermarking Scheme Based on Singular Value Decomposition
A Digital Watermarking Scheme Based on Singular Value Decomposition
Reference Ingemar J. Cox, Joe Kilian, F. Tomson Leighton, and Talal Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Trans. On Image.
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Digital Steganography Utilizing Features of JPEG Images
Authors:Tae-Yun Chung; Min-Suk Hong; Young-Nam Oh;
High Capacity Data Hiding for Grayscale Images
EarthTour Presentations
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Mean quantization based image watermarking
A Semi-blind Watermarking Based on Discrete Wavelet Transform
New Framework for Reversible Data Hiding in Encrypted Domain
Novel Multiple Spatial Watermarking Technique in Color Images
An Algorithm for Removable Visible Watermarking
An imperceptible spatial domain color image watermarking scheme
A Fast No Search Fractal Image Coding Method
Hidden Digital Watermarks in Images
Authors: J.J. Murillo-Fuentes
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Source: Circuits and Systems for Video Technology,
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

A New Digital Watermarking Scheme Applying Locally the Wavelet Transform Author: Minoru Kuribayashi, Hatsukazu Tanaka Source: IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E84-A, No. 10, Oct. 2001, pp. 2500-2507 Speaker: Henry Chou Date: 2002/12/26 Department of Computer Science, University of Regina At Regina, Canada

Outline Introduction Proposed Scheme I Proposed Scheme II Experimental Results Conclusions

Introduction Haar Wavelet Transform Attacks on Watermarking Signal processing such as filtering, lossy compression, additive noise. Geometric transformations such as rotation, scaling, clipping, shifting.

Haar Wavelet Transform(cont.) Phase 1) Horizontal: A B C D E F G H I J K L M N O P A+B C+D A-B C-D E+F G+H E-F G-H I+J K+L I-J K-L M+N O+P M-N O-P ㄅ ㄆ ㄇ ㄈ ㄉ ㄊ ㄋ ㄌ ㄍ ㄎ ㄏ ㄐ ㄑ ㄒ ㄓ ㄔ Phase 2) Vertical: ㄅ ㄆ ㄇ ㄈ ㄉ ㄊ ㄋ ㄌ ㄍ ㄎ ㄏ ㄐ ㄑ ㄒ ㄓ ㄔ ㄅ+ㄉ ㄆ+ㄊ ㄇ+ㄋ ㄈ+ㄌ ㄍ+ㄑ ㄎ+ㄒ ㄏ+ㄓ ㄐ+ㄔ ㄅ-ㄉ ㄆ-ㄊ ㄇ-ㄋ ㄈ-ㄌ ㄍ-ㄑ ㄎ-ㄒ ㄏ-ㄓ ㄐ-ㄔ

Haar Wavelet Transform(cont.) Phase 1) Horizontal: Example 20 15 30 17 16 31 22 18 25 21 19 35 50 5 10 33 53 1 9 42 -3 -8 43 37 -1 35 50 5 10 33 53 1 9 42 -3 -8 43 37 -1 Phase 2) Vertical: 35 50 5 10 33 53 1 9 42 -3 -8 43 37 -1 68 103 6 19 76 79 -4 -7 2 -3 4 1 -10 5 -2 -9 326 -38 6 19 16 -32 2 -7 -3 4 1 -10 5 -2 -9 (Level one is done) (Level two is done)

Introduction (cont.) StirMark attack Introduces local/global geometric distortions perceptually close to the original image. Make the orthogonal axes out of sync. So the correct frequency coefficients can't be correctly extracted from the attacked image. Combines other attacks such as JPEG compression, additive noise, etc.

Introduction (cont.) StirMark Example

Introduction (cont.) StirMark Example (cont.) Original image:

Introduction (cont.) StirMark Example (cont.) Distorted image.

Proposed Scheme I Assumption: Trusted center. Author registers watermarked image with the trusted center. Watermark embedded into the frequency domain, thus spread over the whole image, for better tolerance to attacks. Wavelet transform applied to sub-images consisting of local blocks.

Proposed Scheme I (cont.) Embedding: 2 watermark bits embedded in each iteration.

Proposed Scheme I (cont.) Searching Protocol:

Proposed Scheme I (cont.) Extracting: Construct a sub-image from the four blocks of the distorted image. Calculate the difference between the DCT coefficients of the original and distorted image that hides the watermark bit Watermark bit =

Proposed Scheme II Hiding watermark data in high frequency elements is less perceptible. Only blocks with variances larger than a predefined criteria are selected to hide data.

Experimental Results Degradation Trade-off between quality and robustness: 8  m  12

Experimental Results (cont.) Degradation Fig. 9 Distortions at a flat region becomes obvious. Fig. 10 Selecting only high frequency blocks for embedding.

Experimental Results (cont.) Degradation (cont.) Trade-off between quality and robustness: 8  m  12

Experimental Results (cont.) Degradation (cont.)

Experimental Results (cont.) Searching Distance “correct” means NO error occurred in extraction. d = 12 is enough for StirMark attack.

Experimental Results (cont.) StirMark Attack (carried out 104 times) Even when m = 12, the tolerance is not enough. However, number of error bits is small. Can be mended with correction codes. Errors decrease as m increases.

Experimental Results (cont.) StirMark Attack (cont.) Statistics of other images resemble those of “lenna” shows the number of errors is independent of characteristics of images.

Experimental Results (cont.) StirMark Attack (cont.) The robustness and PSNR are independent of the embedding coefficient.

Experimental Results (cont.) JPEG Compression (based on 103 experiments) For m  12, can tolerate higher compression.

Experimental Results (cont.) JPEG Compression (cont.) Even for m = 8, number of errors is almost less than 3bits for quality over 30%.

Experimental Results (cont.) JPEG Compression (cont.) For m = 20, the tolerance for JPEG compression at low quality is still good.

Conclusion A robust watermarking scheme is proposed. Hard to remove Hard to forge – needs to know the selected blocks and PN sequence. Withstands distortions of geometric transforms - recovers synchronization by searching protocol.