PROPOSAL “EDGE DIGIT WATERMARK” A. Astapkovich, B. Krivosheev Saint-Petersburg State University of Aerospace Instrumentation State University of Saint-Petersburg.

Slides:



Advertisements
Similar presentations
Multimedia Data Compression
Advertisements

Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 4 – Digital Image Representation Klara Nahrstedt Spring 2009.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
DIGIT VIDEO SYSTEMS A. ASTAPKOVICH State University of Aerospace Instrumentations, Saint-Petersburg, 2012 Lecture 0 COURSE REVIEW.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
N-Secure Fingerprinting for Copyright Protection of Multimedia
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Fifth International Conference on Information
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Perceived video quality measurement Muhammad Saqib Ilyas CS 584 Spring 2005.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
Steganography detection Roland Cmorik, Martin Šumák.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
 Coding efficiency/Compression ratio:  The loss of information or distortion measure:
Rate-distortion modeling of scalable video coders 指導教授:許子衡 教授 學生:王志嘉.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Multiple Image Watermarking Applied to Health Information Management
1 Lecture 1 1 Image Processing Eng. Ahmed H. Abo absa
Wavelet-based Coding And its application in JPEG2000 Monia Ghobadi CSC561 final project
MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles Marwen HASNAOUI Maher BELHAJ Mihai MITREA Françoise PRETEUX ARTEMIS.
PROPOSAL “EDGE STEGO DIGIT WATERMARK” A. Astapkovich State University of Aerospace Instrumentation 2011.
Outline Kinds of Coding Need for Compression Basic Types Taxonomy Performance Metrics.
Compression video overview 演講者:林崇元. Outline Introduction Fundamentals of video compression Picture type Signal quality measure Video encoder and decoder.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
NTIT1 A chaos-based robust wavelet- domain watermarking algorithm Source: Chaos, Solitions and Fractals, Vol. 22, 2004, pp Authors: Zhao Dawei,
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Video Compression—From Concepts to the H.264/AVC Standard
COMPARATIVE STUDY OF HEVC and H.264 INTRA FRAME CODING AND JPEG2000 BY Under the Guidance of Harshdeep Brahmasury Jain Dr. K. R. RAO ID MS Electrical.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 4 – Audio and Digital Image Representation Klara Nahrstedt Spring 2010.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
DIGIT VIDEO SYSTEMS Lecture 0 COURSE REVIEW.
Quality Evaluation and Comparison of SVC Encoders
IMAGE PROCESSING IMAGE WATERMARKING
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Wavelets : Introduction and Examples
DONE BY S.MURALIRAJAN M.NIRMAL
Watermarking for Image Authentication ( Fragile Watermarking )
Increasing Watermarking Robustness using Turbo Codes
Research Topic Error Concealment Techniques in H.264/AVC for Wireless Video Transmission Vineeth Shetty Kolkeri EE Graduate,UTA.
Standards Presentation ECE 8873 – Data Compression and Modeling
A Digital Watermarking Scheme Based on Singular Value Decomposition
Parag Agarwal Digital Watermarking Parag Agarwal
Digital television systems (DTS)
Reference Ingemar J. Cox, Joe Kilian, F. Tomson Leighton, and Talal Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Trans. On Image.
Author: Minoru Kuribayashi, Hatsukazu Tanaka
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

PROPOSAL “EDGE DIGIT WATERMARK” A. Astapkovich, B. Krivosheev Saint-Petersburg State University of Aerospace Instrumentation State University of Saint-Petersburg 2011

Preliminary_1: digital fingerprinting formalizm Special notations will be used: In common case watermarking suppose using the encryptions and whole procedure is described with I x K x M → I” where I - container image K – encryption key M – watermark Attack is described with I” x A → I A ” container image after attack M A ” watermark image extracted from attacked image Number of pixel in image Im will be described as NP (Im)

Preliminary_2: robustness measurements Let us N (I 1,I 2 ) is some norm for difference between images I 1 and I 2 Robustness is described with the vector N ( I, I”) - quality of the watermarked image N (I, I A ”) - attack wildness N (M,M A ”) – quality of the extracted watermark image after the attack N (M,M A ”)/ N (I,I A ”) - relative robustness of the watermarking procedure;

Goal of the research THEORY Creating the knowledge base to support research activity in digital watermarking and digital fingerprinting fields; Developing and investigating the new concepts for robust watermarking and fingerprinting algorithm oriented for the digit video applications; PRACTICE The digital fingerprinting method for high quality video files has to be developed; The method has to be realized as the demo version of the soft tool for fingerprinting;

Basic requirements - practice Video file has format 1080p60 and is compressed with MPEG4; 1 min segment of video file can be used for the fingerprinting; Method has to withstand attacks: rotation, small enlargements with cropping, noising, small nonlinear distortions, down sampling up to 720p30, collusion attack with at least 100 copies ;

Basic requirements - theory Volume of the container (set of images) is the huge in comparizon with the marking information NP (M ) << NP( ∑ Im ) (C.1) Any watermark can be destroyed with severe attack and to provide the surviving of the fingerprint method has to meet the condition N (M,M A ”)/ N (I,I A ”) < 1 (C.2) Existence of the embedded watermark is more important than the quality of extracted image, but has to be good enough to be recognized N (M,M A ”) < prescribed level (C.3)

Edge watermark concept Any watermark can be destroyed by attack with strong enough wildness Attacked image has to have N (I, I A ”) < corrupted quality Watermarking method has to be build such way that N (M,M A ”)/ N (I,I A ”) < 1 It is reasonable to build the watermark to most fragile element of image, like edges Possibility to use edge region has to be investigated, also

Digital Fingerprinting Method (DFM) DFM includes: method to Generate the Fingerprint Set (GFS) method to generate the Set of Marking Positions (SMP) method to Embed the Marking Information at selected marking positions (EmMI) and method to Extract the Marking Information (ExMI) method to Interpretation Extracted Fingerprint (IEF)

Generating the Fingerprint Set (GFS) To provide robustness the fingerprinting information is converting to set of the images C0123 C0123… -> I0, I1, I2,I3,I4.. This images have to be embed to appropriate frames of video to survive against conclusion attack Images can be used directly or as wavelet decomposition components: LL,LH,HL,HH and so on

Generating the Set of Marking Positions (SMP) To provide robustness against collusion attack SMP has to provide possibility the Boneh-Shaw fingerprint scheme (code) For c+1 total users Boney-Shaw code uses O ( с 3 log (1/ε) ) bits to attain security against coalition of size c with error ε Boneh-Shaw code is used as building block for many sophisticated digital watermarking schemes Condition (C.1 ) provides possibility to build method with Boneh- Shaw code for C >> 100

Distortion against collusion Other possibilities have to be proposed and investigated As example : Collision attack based on difference of the images and creating the new version to eliminate the distributor ability to trace the object to any of them Little distortion of images with digital fingerprint destroy the simple collusion attack scheme Simple averaging will destroy the images and make collusion copy worthless

Example of the edge watermarking (I).bmp = 640x480 NP (EDGE) = NP(M) = NP( 100x100)= 10 4 бит (I x M ).bmp = 640x480 Marking Image was build to set of G and B components of edge pixels, generated with CANNY edge detector; Extracted M

Method to Embed the Marking Information (EmMI) Kutter algorithm for embedding provides defense against the noising attack Mi - bit of marking information I = {R,G,B} container p(x,y) – selected position for embedding ; Mi is embedded to B channel L(p)= R(p) G(p) B(p) B(p) + q*L(p), if Mi =0 B(p)” = B(p) - q*L(p), if Mi =1 q – robustness parameter ( larger q leads to better robustness) In order to increase robustness every bit is embedded r times as the cross figure (7*7, с = 3), so total number is N = 3*r ;

Method to Extract the Marking Information (ExMI) ; Kutter algorithm for blind ExMI related with EmMI The bit value is determined by looking at the sign of the difference between the pixel under inspection and the estimated original Modification of ExMI + EmMI on base Kutter algorithm for edge pixel set has to be developed

Robustness of the wavelet decomposition As estimates the result of work Mohsen Ashourian, Peyman Moallem, Yo-Sung Ho “A Robust Method for Data Hiding in Color Images” can be used //PCM (2) , 2005; LL,HL,LH,HH Haar components of watermark (MASTER b/w image) is imbedded with modified Kutter algorithm ab cd (a+b+c+d)/4(a-b+c-d)/4 (a+b-c-d)/4(a-b-c+d)/4 LLLH HLHH

Eхамples of the wavelet decomposition approach LL LH HL HH Watermark MASTER image had the size ½ * ½ * 1/3 of the container image; Container images

Robustness against the compression attack PSNR for compression with JPEG The published results demonstrate the good robustness properties against compression with JPEG and JPEG2000 Extracted watermark image for Q=55 Robustness to MPEG4 has to be investigated ;

Robustness against down sampling attack Origin watermark Extracted watermark after ½ down sampling This is possible due to decomposition of the watermark image and the mixing of Haar components during embedding

Robustness against the filtering attack PSNR (dB) for extracted M MF GF Parrots Boats Median filtering (MF)Gauss filtering (GF)

Robustness against the cropping attack I A ” M A ” for 10% cutting Wavelet decomposition of the M provides high robustness for this type of attack ;

Open questions Robustness is described with the vector and some approaches have to be investigated: what norm has to be used ? is it the same norm has to be used for all components ? what level of norm meanings has to be defined from practical point of view ? For IEF stage norm has to be selected also ;

Brief norm review Classical approach is using the peak signal-to-noise ratio (PSNR) and MSE ; MAX I — maximal pixel meaning value (for 8-bit w/b image MAXI = 255); PSNR is no sign measure and useful for small distortions case; Original image Enhanced contrast PSNR=25 dB JPEG compression PSNR=25 dB

Attack wildness measurements  To measure the attack wildness the linear measure has to be used (at least) Salt and pepper noise attack Noise amplitude  PSNR can be modified (as example)

Modern structural norms Original image MSE=0 SSIM=1 CW-SSIM=1 MSE=306 SSIM=0.928 CW-SSIM=0.938 Enhanced contrastDistorted brightness MSE=309 SSIM=0.987 CW-SSIM=1 Gauss noise MSE=309 SSIM=0.576 CW-SSIM=0.814 Zhou Wang and Eero P. SimoncelliTranslation insensitive image similarity in complex wavelet domain / Proc. IEEE Inter. Conf. Acoustic, Speech & Signal Processing Volume II, Pages , March 2005  Some new ideas based on structural symmetry (SSIM) and complex wavelet structural symmetry (CW-SSIM) can be useful for the watermarking applications

Modern structural norms MSE=313 SSIM=0.73 CW-SSIM=0.811 Impulse noiseJPEG compression Enlargement MSE=309 SSIM=0.58 CW-SSIM=0.63 MSE=694 SSIM=0.505 CW-SSIM=0.925 MSE= 873 SSIM= CW-SSIM=0.933 Rotation to left  Metrology benchmark image library and software tools have to be created  Structural similarity norm can be useful for estimation of the quality of the extracted watermark N (M,M A ”)

Noiseproof edge detector Edge watermarking withstand some attacks like cropping, rotation, displacement easily For blind watermarking this approach needs a noise proof edge detector Concept of the neuron like adaptive noise proof edge detector was proposed and investigated “The teaching by showing” methodology was used :  this approach is very flexible :  different samples can be used during initial learning  filter can increase experience due to additional learning with new samples This approach can be classified as “open algorithm approach”

Canny edge detector Clean image Noisy image edges Noisy image  Canny filter is the best edge detector, but ….. Clean image edges

Neuron adaptive linear filter Initial learning min II Sw – F II w Adding the new experience is not very expensive procedure Let us Se k = ∑ S k T S k - experience matrix for k samples Fek = ∑ Sk T F k – experience vector for k samples New filter weights W k+1 = (Se k + S k+1 T S k+1 +  E) –1 * (Fe k +S k+1 T F k+1 ) S 1 S 2 S 3 S 4 S 5 S 6 S 7 S 8 S 9 image Filter 3*3 S1 S2 SNSEN 1 (S,W) TH min TH max W = (S T S +  E) –1 S T F

Neuron like adaptive noise proof edge detector TRmin = 40 TRmin = 30 Results of filtering for the clean and noisy test image with H51 and H52 filters with different low threshold (Trmin)  Methodology is universal and has no limits on size of edge filter  Example of 5*5 filter, learned with one and two sample noised images

Real image test  Two linear 5*5 filter were used to find the edges with different prescribed low thresholds  Artificial generated pictures with added noise were used to generate the learning samples  Different teacher samples were used Filter, learned with LAPLAS edge detector Filter, learned with hand pointed edge low threshold : 30 and 60

Overview of MPEG-4 MPEG-4 encodes natural video, synthetic video an still texture In addition MPEG-4 encodes a description of the scene for proper rendering of all objects At the decoding end the scene description and the individual media objects are decoded, synchronized and composed for presentation At rates below 1 Mbit/sec MPEG-4 demonstrates better performance than MPEG-1 and MPEG-2

Watermarking of Compressed Video Method for digital watermarking of MPEG-2 encoded video is presented. It consists of additions of an encrypted pseudo-noise signal to the video ( F.Hartung B. Girod “Watermarking of Uncompressed and Compressed Video” // Signal Processing Volume 66 Issue 3, May 1998, pp ) The proposed scheme is applicable to MPEG-4, H.261,H.263. Compressed video is partly decoded to provide access to DCT

Hurtung-Girod method Just DCT encoded signal blocks are used For watermark pixel the 3D video sequence is regarded as one dimensional in T-domain Watermark signal is generated for each frame This signal is arranged into 2D signal, having the same dimensions as the video frames

Watermarking for low bit-rate MPEG-4 In work A. Alattar, M. Celik E.Lin Evaluation of Watermarking Low Bit-rate MPEG-4 Bit Stream the method for watermarking MPEG-4 was proposed. A watermark signal is inserted directly into MPEG-4 compressed bit-stream, while detection is performed using uncompressed video; A pair of templates is imposed on spread spectrum signal to combat synchronization loss due to rotation and scaling of the video after watermarking; To meet bit-rate constraints on watermarked video the special algorithm was proposed and investigated;

Experimental results Algorithm has benn tested with 5 sec of the standard sequences : Foreman, Flower Garden, Football and Salesmen, that were encoded with MPEG-4 at 128 Kb/s (QCIF 176*144),384 Kb/s and 768 Kb/s (CIF 352*288) at 15 fr/sec Average quality and increase in bit rate

Conclusion : result is the vector Method component The fingerprinting based on multiple description subband ( wavelet decomposition) image coding, that is embedded to edge domain with modified Kutter algorithm has to be investigated as the possible solution Some preliminary estimates demonstrate a good robustness against the various signal processing and geometrical attacks 2D embedding process (spatial + time) domains has to be investigated as the defense against the set of attacks (includes collusion) Theory component Vector approach for robustness measurements has to be developed and investigated Adaptive algorithm on base of neuron net approach for edge detector has to be developed and investigated Practice component  Metrology base has to be created The demo version of the digital fingerprinting tool has to be created

Conclusion : result is the vector Method component The fingerprinting based on multiple description subband ( wavelet decomposition) image coding, that is embedded to edge domain with modified Kutter algorithm has to be investigated as the possible solution Some preliminary estimates demonstrate a good robustness against the various signal processing and geometrical attacks 2D embedding process (spatial + time) domains has to be investigated as the defense against the set of attacks (includes collusion) Theory component Vector approach for robustness measurements has to be developed and investigated Adaptive algorithm on base of neuron net approach for edge detector has to be developed and investigated Practice component  Metrology base has to be created The demo version of the digital fingerprinting tool has to be created