Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.

Slides:



Advertisements
Similar presentations
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Advertisements

Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Audio Watermarking Charalampos Laftsidis Artificial Intelligence and Information Analysis Lab Aristotle University of Thessaloniki February 2001.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
1 Audio Compression Techniques MUMT 611, January 2005 Assignment 2 Paul Kolesnik.
Fifth International Conference on Information
Issues for Multimedia Privacy & Security ---- Video Content Privacy Protection, Copyright Protection & Database Access Control Jianping Fan Dept of Computer.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
MPEG Audio Compression by V. Loumos. Introduction Motion Picture Experts Group (MPEG) International Standards Organization (ISO) First High Fidelity Audio.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery By Pat P. W. Chan Supervised by Michael R. Lyu 8/6/2004 Computer Science.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Digital to Analogue Conversion Natural signals tend to be analogue Need to convert to digital.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Perceptual Watermarks for Digital Image and Video ECE 738 paper presentation Pei Qi ECE at UW-Madison
Digital Watermarking Parag Agarwal
Formatting and Baseband Modulation
Digital Audio Watermarking: Properties, characteristics of audio signals, and measuring the performance of a watermarking system نيما خادمي کلانتري
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY * By: Ricardo A. Garcia *Research done at: University.
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY By: Ricardo A. Garcia University of Miami School.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Audio Compression Usha Sree CMSC 691M 10/12/04. Motivation Efficient Storage Streaming Interactive Multimedia Applications.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Modified Patchwork Algorithm: Anovel Audio Watermarking Scheme In-Kwon Yeo and Hyoung Joong Kim.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
Digital watermarking: algorithms and applications
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Quantization Watermarking Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems Brian Chen, Ph. D. Dissertation,
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
Detection of Image Alterations Using Semi-fragile Watermarks
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
A DIGITAL IMAGE WATERMARKING PREPARED BY AMAR RAEED KHORSHıD ALHıLALı ıD : R.G. Schyndel, A. Tirkel, and C. Osborne, “A Digital Watermark”, Procedding.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
An introduction to audio/video compression Prepared by :: Bhatt shivani ( )
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
IMAGE PROCESSING IMAGE WATERMARKING
DONE BY S.MURALIRAJAN M.NIRMAL
Basic Concepts of Audio Watermarking
Watermarking for Image Authentication ( Fragile Watermarking )
Dept. of Elec. & Comp. Engineering
Parag Agarwal Digital Watermarking Parag Agarwal
Spread Spectrum Watermarking
Govt. Polytechnic Dhangar(Fatehabad)
Author: Minoru Kuribayashi, Hatsukazu Tanaka
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY By: Ricardo A. Garcia University of Miami School.
Digital Watermarking (cont.)
Digital Watermarking Lecture 2
Presentation transcript:

Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate

What is watermarking? Permanent proof of originality for paper media. Permanent proof of ownership for digital media. Watermarking preserves intellectual property unlike encryption. Watermarking is statistically and physically invisible (PRN). Watermarking can be detected even after distortions. Watermarking is done in the frequency, temporal, and/or spatial domains.

Audio Watermarking Robustness: Watermark has to be robust to signal manipulation. Impossible to remove without significant alteration of the signal. Statistically undetectable by others to prevent the efforts of unauthorized removal. Can be fulfilled if the potential number of keys that produce distinct watermarks is large. Detection scheme should be as statistically reliable as possible. False rejection or acceptance of watermark should be minimal.

Audio Watermarking: A Temporal Method, p.1 Does not require original signal for the detection of watermark. Requires only a seed or key. Watermark is embedded into the audio signal by changing the least significant bits of the 16-bit or 8-bit audio samples. Results only in slight amplitude modification in the time domain.

Audio Watermarking: A Temporal Method, p.2 Watermarked signal is formed by the following equation: y(i) is the watermarked audio signal. x(i) is the original audio signal. w(i) is form from a random number generator. f(x(i), w(i)) is a function that accounts for the basic audio masking properties. S is defined as follows

Audio Watermarking: A Temporal Method, p.3 The watermark detection value, r, is calculated by the equation below: Theoretically r € [0, 1], but due to estimation of x(i) by y(i), r € [0-e, 1+e]. A detection threshold of 0.5 can be used to decide on the existence of audio watermark. Figure on right shows the pdf for the value of r in a non-watermarked and watermarked signal. Both distributions have been calculated using 1000 different watermarks with SNR = 26.

Audio Watermarking: Results, p.1 Detection values in a watermarked signal using various seed (key is 444). Only the correct key yields a value of r higher than threshold. No significant shift in PDF after resampling from 44.1KHz to KHz and back 100% success in watermark detection after resampling Requantization from 16-bit to 8-bit and back results in increase of deviation of PDF. Still achieve 99.8% accuracy in watermark detection.

No significant shift in PDF after MPEG3 Layer III 80kbs lossy compression. Based on 0.5 threshold, still achieve 100% watermark detection. Filtered by a moving average filter of length 20 which introduces a noticeable audio distortion Shift in mean and variance but still results in 100% detection kHz signal Low-pass filtered by a 25th order Hamming LPF with cut-off at 22.05KHz. Shift in mean and variance but still results in 100% detection. Audio Watermarking: Results, p.2

Video Watermarking Issues on identical watermarks for each frame Problems in maintaining statistical invisibility. Issues on independent watermarks for each frame Problems in easy removal of watermarks. Robustness: Must survive frame averaging, frame dropping, frame swapping, cropping, temporal rescaling. Must be able to discern imposter watermarks (deadlock). Problems in use of the original video sequence. Problems when no video sequence is needed.

Video Watermarking: Deadlocking Detection and Generation of Pseudorandom Sequence Original sequence is present for comparisons, but what about imposters? Possible solution: Public/Private Key Pseudorandom Generator Embedded Watermark for added authorization Real Original Private KeyPublic Key WatermarkedWatermark Embedded Supplied by author PRN

Video Watermarking: A Method, p.1 Temporal WT Extract Blocks Spatial Masking DCT Frequency Masking X DCT Author signature IDCT X + Watermark block Video FramesWavelet Frames Temporal Wavelet Transform yields: 1) Low-pass frames (Static, non-moving component) 2) High-pass frames (Dynamic, moving component) Frequency and Spatial Masking are tuned to human visual perception.

Video Watermarking: A Method, p.2 Detection of Watermark With knowledge of location in video sequence X = input, R = received coeffs, F = original coeffs, N = noise, W = watermark H 0 : X k = R k - F k = N k (No watermark) H 1 : X k = R k - F k = W k + N k (Watermark) Without knowledge of location in video sequence (just one frame present) Only look at the low-pass frames (static, non-moving component) Decision thresholds are determined by a scalar similarity Typical results

References P. Bassia and I. Pitas, “Robust Audio Watermarking in the Time Domain.” Dept. of Informatics, University of Thessaloniki. Jian Zhao, “Look, It’s Not There.” BYTE Magazine - January M. Swanson, B. Zhu, and A. Twefik, “Multiresolution Scene-Based Video Watermarking Using Perceptual Models.” IEEE Journal on Selected Areas in Communications, IEEE 1998.

Answer to Questions, p.1 How is the key embedded into the watermarked signal, y(i)? The key is a unique code for an author’s identification. This unique code is used to generate a maximum length Pseudo-random Noise sequence. This PN sequence is then used to generate the watermark signal w(i) as show in the diagram above. Thus the key is really utilized by the function w(i). A masking threshold for the audio signal can be generated using MPEG Audio Psychoacoustic Model 1. The PN sequence generated by the key is then filtered with the masking filter M(w) to ensure that the spectrum of the watermark is below the masking threshold. This ensures that the watermark is inaudible after embedding into the signal. The figure on the right shows how y(i) is generated.

Answer to Questions, p.2 What does “statistically undetectable” mean? How do we make a watermark “statistically undetectable”? By “statistically undetectable”, we mean that a pirate is unable to detect the watermark simply by generating the whole set of all possible watermarks. In other word the possibility of a pirate correctly guessing the right key is close to zero. This is to ensure that a pirate is unable to remove or claim ownership for the watermark in the audio signal. The condition for “statistically undetectable” is simply fulfilled by having a huge set of keys that will generate distinct watermarks. This will result in statistical safety for the watermarked audio signal.