1 Self-Recovery Fragile Watermarking Scheme with Variable Watermark Payload Fan Chen, Hong-Jie He, Yaoran Huo, Hongxia Wang Southwest Jiaotong University,

Slides:



Advertisements
Similar presentations
F5 A Steganographic Algorithm
Advertisements

Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery Source: Pattern Recognition, Vol. 41, Issue 2,
Information Hiding: Watermarking and Steganography
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.
Fifth International Conference on Information
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Watermarking For Image Authentication Presented by San-Hao Wang.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Paul Blythe and Jessica Fridrich Secure Digital Camera.
Digital Watermarking Parag Agarwal
Median Filtering Detection Using Edge Based Prediction Matrix The 10th IWDW, Atlantic City, New Jersey, USA 23~26 October 2011 School of Information Science.
Image Watermarking For Tampering Protection and Self-Recovery
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp Authors: Chun-Wei Yang and Jau-Ji.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Cellular Automata Based Authentication (CAA ) Monalisa Mukherjee 1 Niloy Ganguly 2 P Pal Chaudhuri 1 1 Department of Computer Science & Technology, Bengal.
Multiple Image Watermarking Applied to Health Information Management
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Detection of Image Alterations Using Semi-fragile Watermarks
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Phen-Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Information Hiding Technology: Current Research and Future Trend
Model-based Steganography
Reversible Data Hiding in JPEG Images using Ordered Embedding
Watermarking for Image Authentication ( Fragile Watermarking )
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Source :Journal of visual Communication and Image Representation
Advisor: Chin-Chen Chang1, 2 Student: Wen-Chuan Wu2
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Reversible Data Hiding Scheme Using Two Steganographic Images
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Ming-Shi Wang *, Wei-Che Chen 11 November 2006 present: 沈雅楓
A Data Hiding Scheme Based Upon Block Truncation Coding
Source : Digital Signal Processing. Vol. 73, pp , Feb
A Quadratic-Residue-based Fragile Watermarking Scheme
Presentation transcript:

1 Self-Recovery Fragile Watermarking Scheme with Variable Watermark Payload Fan Chen, Hong-Jie He, Yaoran Huo, Hongxia Wang Southwest Jiaotong University, Chengdu, Sichuan, P.R. China

2 Fan Chen Chengdu, Sichuan, China Southwest Jiaotong University An associate professor, and pursuing the Ph.D degree Research interests: digital watermarking and Digital-forensics.

3 Presentation Outline 1.Background 2.Proposed Self-recovery Scheme 3.Experimental Results 4.Conclusions and Future Work Self-Recovery Fragile Watermarking Scheme with Variable Watermark Payload

4 1. Background Image Blocks Block codes : 8×8 pixels: DCT coefficients 2×2 pixels : average intensity Common Characteristic The length of block codes is fixed.

Background SIP laboratory Examples: Smooth Rough Blocks DCT quantized coefficients [9]. Z.Qian et al, Image self-embedding with high-quaility restoration capability, Digital Signal Processing, 21 (2011):

Background SIP laboratory  Qian [9] proposed that the blocks were encoded to different number of bits.  The rougher blocks have more bits  And the smoother blocks have fewer bits. But, the amount of the compression code bits was still fixed for different images, no matter the image is smooth or rough. [9]. Z.Qian et al, Image self-embedding with high-quaility restoration capability, Digital Signal Processing, 21 (2011):

7 The watermark payload is more than the average length of the codes. This is due to the following two facts:  Tampering coincidence problem: Dual watermark [7], Reference Sharing Mechanism [2]  Tamper detection problem: Authentication data Increasing watermark payload Decreasing the quality of watermarked image Being vulnerable to the collage attack 1. Background

8 2 The Proposed Scheme  Main purpose  Reducing the watermark payload as much as possible while maintaining good recovery quality and security  Strategies  Variable watermark payload

9  Watermarked Image Generation  Variable-Length Block Coding  Variable-Payload Watermark embedding  Tamper Detection and Recovery  Tamper detection  Tamper recovery 2 The Proposed Scheme

10  Variable-Length Block Coding For a block of 8×8 pixels: The basic-code: 24 bit The total-code : the number of bits is variable 2 The Proposed Scheme -----watermarked Image Generation Type sType-code Code length v i (bits) Code length: (24+27,24+101)

11  Variable-Payload Watermark Insertion 1.Watermark payload equals to the length of block-codes. 2.Basic-code and total-code of a block are encrypted and hidden in the different blocks based on secret key. 2 The Proposed Scheme -----watermarked Image Generation

12 2 The Proposed Scheme -----Watermarked Image Generation Basic-code Total-code Basic-code: the second LSB of the last 24 pixels Total-code

13 SIP laboratory  Tamper Detection: Statistical Detection [5] (1) Basic-code mapping: T B (2) Total-code mapping : T T (3) Incorporation : T 2 The Proposed Scheme -----Watermarked Image Generation

14 SIP laboratory Basic-code matching Total-code matching Detection results T Tamper detection performance is better [5] He ea al, Adjacent-Block Based Statistical Detection Method for Self- Embedding Watermarking Techniques, The Proposed Scheme -----Watermarked Image Generation

15  Tamper Recovery : Only for the invalid blocks.  Watermark-reserved: the tampered block whose basic-code or total-code is valid  the corresponding codes  Watermark-destroyed: the tampered block whose basic-code and total-code are destroyed  the valid blocks adjacent to the block 2 The Proposed Scheme Tamper Detection and Recovery

16 3. Experimental results Images Watermark Payload (bpp) Proposed Qian[9] Invisibility (dB) Proposed Qian [9] Boat Lena Airplane Barbara Mona Lisa Elaine Goldhill Napoleon Man Fingerprint  The watermark payload and invisibility for different images

17  Restoration Performance The tampered image can be recovered by the proposed scheme with an acceptable visual quality even the tamper ratio is up to 60% of the host image. 3. Experimental results

18 (a) Watermarked Napoleon (b) Watermarked Mona Lisa  Collage attack 3. Experimental results both of size 372×288

19 (c) Tampered image (about 20%)  Collage attack (d) Proposed dB 3. Experimental results

20  multi-region and multi-attack tampering (1) General tampering (2) Only content tampering (3) Collage attack (4) Constant-feature attack 3. Experimental results

21 (a) Proposed 34.38dB (b) Qian [9] dB (c) He [5] dB 3. Experimental results Qian [9] and He [5] cannot resist all the counterfeiting attacks

22  Our work  A variable watermark payload  Invisibility  Recovery quality  Security 4. Conclusions and Future Work

23 4. Conclusions and Future Work  Future work  Extending this approach to resist mild distortion such as JPEG compression  And analytic investigation on the tamper detection performance.

24 If you have any question, please us.