Fifth International Conference on Information

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

H IGH CAPACITY WATERMARKING H YPERSPECTRAL I MAGES AUTHENTICATION Mehdi Fallahpour Jordi Serra-Ruiz David Megías.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Detecting Re-captured Videos using Shot-Based Photo Response Non-Uniformity Dae-Jin Jung.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
N-Secure Fingerprinting for Copyright Protection of Multimedia
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
By Elo Leung and Wing Wong CS 265 Section 2 Spring 2004.
Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery By Pat P. W. Chan Supervised by Michael R. Lyu 8/6/2004 Computer Science.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Robust Digital Right Management Scheme (DRM) for Multimedia Anuj Maheshwari Victor Sutan
Paul Blythe and Jessica Fridrich Secure Digital Camera.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
Video Data Hiding using Forbidden Zone and Selective Embedding Submitted Under Team Members.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
Detection of Image Alterations Using Semi-fragile Watermarks
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Advanced Science and Technology Letters Vol.35(Security 2013), pp Image Steganograpy via Video Using Lifting.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
A Partial Survey of the Perfect Digital Watermark Problem.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
DEPARTMENT OF ECE, BEC, BAGALKOT
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
DONE BY S.MURALIRAJAN M.NIRMAL
Parag Agarwal Digital Watermarking Parag Agarwal
Author: Minoru Kuribayashi, Hatsukazu Tanaka
On SVD-based watermarking algorithm
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Authors: J.J. Murillo-Fuentes
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Fifth International Conference on Information and Communications Security ICICS 2003 Huhehaote City, Inner-Mongolia, China, 10-13 October, 2003 A DWT-based Digital Video Watermarking Scheme with Error Correcting Code Pat P. W. Chan and Michael R. LYU Computer Science and Engineering Department The Chinese University of Hong Kong

Outline Introduction New Video Watermarking Algorithm Experimental Results Future Direction Conclusion

Watermarking Algorithm Introduction Watermarking is a concept of embedding a special pattern, watermark, into a document. Watermarking is a key process for the protection of copyright ownership of electronic data. In this presentation, we will focus on the video watermarking scheme. Watermarking Algorithm Watermarked Image Ì Stego-Image I Watermark W Secret / public key K

Introduction Video watermarking is challenging Video watermarking introduces some issues not present in image watermarking. Due to large amounts of data and inherent redundancy between frames, video signals are highly susceptible to pirate attacks, including frame averaging, frame dropping, frame swapping, statistical analysis, etc. However, the currently proposed algorithms do not solve these problems effectively. Existing techniques are not aware of the usefulness of the audio channel in a video.

Introduction A new scheme for robust blind digital video watermarking with error correcting code will be introduced. The features of the video watermarking algorithm are: Our scheme embeds different parts of a single watermark into different scenes of a video under the wavelet domain; To increase robustness of the scheme, the watermark is refined by the error correcting code, while the correcting code is embedded as watermark in the audio channel; Our video watermarking algorithm is robust against the attacks of frame dropping, averaging and statistical analysis; It allows blind retrieval of embedded watermark which does not need the original video; The watermark is perceptually invisible. To tackle these problems. we’ve proposed a new scheme for robust blind digital video watermarking with error correcting code.

Watermarking Scheme Overview

Video Preprocess: DWT & Scene Change Detection Video frames are transformed to wavelet domain. Perform scene change detection. Each scene is embedded with the same watermark, so it can prevent attackers from removing the watermark by frame dropping. Different watermarks used for successive different scene can prevent attackers from colluding with frames from completely different scenes. Mark with m1 Mark with m3 Mark with m7 Mark with m0 Scene change occur

Watermark Preprocess Scale the watermark to a particular size with the following equations 2n ≦m , n>0 p + q = n , p and q > 0 Size of image = 64˙2p X 64˙2q Divide the image into 2n small images with size 64 X 64 m -- # of scene change of the video Different frames using different watermarks can make the watermarks resistant to attacks by frame averaging Hard to reconstruct the watermark without knowledge m=10, n=3, p=1, q=2

Watermark Preprocess Encrypted watermark m’0 Original watermark Preprocessed watermark m0-m7

Video Watermark Embedding Exchange C[i] with max(C[i], C[i+1], C[i+2], C[i+3], C[i+4]) while W[j] = 1 Exchange C[i] with min(C[i], C[i+1], C[i+2], C[i+3], C[i+4]) while W[j] = 0 LL, HH coefficients are not watermarked

Audio Watermark Error correcting code is extracted from the watermark image Embedded in audio channel as an audio watermark This watermark can provided the error correction and detection capability for the video watermark Average

Audio Watermark Embedding Spread-Spectrum Watermarking Modulated Complex Lapped Transform (MCLT)

Watermarked Frame & Wave Original video frame and wave Watermarked video frame and wave

Watermark Detection Video is split into video stream and audio stream. Watermarks are extracted separately by audio watermark extraction and video watermark extraction. Then the extracted watermark undergoes refining process

Video Watermark Detection if WC[i] > median(WC[i], WC[i+1],WC[i+2], WC[i+3], WC[i+4]) W[j] = 1 else W[j] = 0 Original video frame Watermarked video frame Extracted Watermark Recovered Watermark

Watermark Refining Error correcting codes are extracted from the audio stream The video watermark extracted is refined by this information with the following equation k = kth block of the average image i = x-coordinate of video watermark j = y-coordinate of video watermark T = Threshold that the pixel need to correct P: Q = the ratio of importance of extracted watermark to the average

Experimental Setup VirtualDub -- a video capture/processing utility (http://www.virtualdub.org/) A video clip with 1526 frames of size 352 X 288 Experiments: Experiment with Frame Dropping Experiment with Frame Averaging and Statistical Analysis Experiment with Lossy Compression Experiment with Cropping Watermarked Frame Measurement:

Experiment with Frame Dropping As a video contains a large amount of redundancies between frames, it may suffer attacks by frame dropping. From the experiment, we found that our scheme achieves better performance than the DWT-based scheme without scene-based watermarks.

Experiment with Frame Averaging and Statistical Analysis Frame averaging and statistical analysis is another common attack to the video watermark. When attackers collect a number of watermarked frames, they can estimate the watermark by statistical averaging and remove it from the watermarked video Scenario of statistical averaging attack

Experiment with Frame Averaging and Statistical Analysis The watermarked video is statistically analyzed by colluding a number of video frames and the watermarks are extracted and NC values are obtained. It is found that the proposed scheme can resist to statistical averaging quite well.

Experiment with Lossy Compression The performance of the scheme is significantly improved by combining with audio watermark, especially when the quality factor of MPEG is low. When the quality factor of MPEG is low, the error of the extracted watermark is increased and the watermark is damaged significantly. As the error correcting code is provided from the audio watermark, it can survive the attack by lossy compression which is applied to the video channel.

Experiment with Cropping Watermarked Frame DWT inherits many advantages in resisting the attacks on the watermarked frames. It achieves perceptual invisibility and attacks by image processing techniques. Cropping is one of the most common attack to video watermark.

Conclusion & Future Direction Video watermarking is needed since copyright protection is essential. Video watermarking is different from image watermarking. A DWT-based Digital Video Watermarking Scheme with Error Correcting Code is proposed. Use visual-audio watermark to increase the robustness of the scheme. Increase robustness of the scheme by improving the way to embed the watermark. Use better error correction coding. Make use of the information from the video, such as time information to increase the robustness of the watermark.

Q & A