Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.

Slides:



Advertisements
Similar presentations
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Advertisements

1 Self-Recovery Fragile Watermarking Scheme with Variable Watermark Payload Fan Chen, Hong-Jie He, Yaoran Huo, Hongxia Wang Southwest Jiaotong University,
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
Maximizing Strength of Digital Watermarks Using Neural Network Presented by Bin-Cheng Tzeng 5/ Kenneth J.Davis; Kayvan Najarian International Conference.
N-Secure Fingerprinting for Copyright Protection of Multimedia
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
1 A Unified Rate-Distortion Analysis Framework for Transform Coding Student : Ho-Chang Wu Student : Ho-Chang Wu Advisor : Prof. David W. Lin Advisor :
By Elo Leung and Wing Wong CS 265 Section 2 Spring 2004.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Multiple Image Watermarking Applied to Health Information Management
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Watermarking Text Document Images Using Edge Direction Histograms Young-Won Kim and Il-Seok Oh Pattern Recognition Letters, Vol. 25, 2004, pp – 1251.
MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles Marwen HASNAOUI Maher BELHAJ Mihai MITREA Françoise PRETEUX ARTEMIS.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
EE381K-14 MDDSP Literary Survey Presentation March 4th, 2008
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Quantization Watermarking Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems Brian Chen, Ph. D. Dissertation,
ON THE INTERMEDIATE SYMBOL RECOVERY RATE OF RATELESS CODES Ali Talari, and Nazanin Rahnavard IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 5, MAY 2012.
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
1 Robust and transparent watermarking scheme for colour images Speaker : Po-Hung Lai Adviser : Chih-Hung Lin Date :
1 Marco Carli VPQM /01/2007 ON BETWEEN-COEFFICIENT CONTRAST MASKING OF DCT BASIS FUNCTIONS Nikolay Ponomarenko (*), Flavia Silvestri(**), Karen.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Watermarking Scheme Capable of Resisting Sensitivity Attack
DCT watermarking Speaker: Paul 1.
PERFORMANCE ANALYSIS OF VISUALLY LOSSLESS IMAGE COMPRESSION
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
High Capacity Data Embedding in JPEG Bit Streams Using Visual Models
Reversible Data Hiding in JPEG Images using Ordered Embedding
Watermarking for Image Authentication ( Fragile Watermarking )
Increasing Watermarking Robustness using Turbo Codes
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Reversible Data Hiding in JPEG Images
Source : Journal of Visual Communication and Image Representation, vol
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source : Journal of Visual Communication and Image Representation, vol
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Halftone Image Data Hiding with Block-Overlapping Parity Check
Hidden Digital Watermarks in Images
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong Department of Information Engineering Chinese University of Hong Kong

Chinese University of Hong Kong Department of Information Engineering Outline n JPEG-to-JPEG (J2J) image watermarking n Background of capacity estimation for image watermarking n Proposed J2J capacity estimate technique n Necessary condition to achieve maximum capacity n Experimental results n Conclusions

Chinese University of Hong Kong Department of Information Engineering Background of capacity estimation for image watermarking n There are some existing methods to estimate the data hiding capacity of digital images n Ramkumar [1] et al. focused on comparing the capacity among different transforms n Moulin et al. [2] estimated the capacity under different kind and degree of attacks n Voloshynovskiy et al. [3] considered security issue of watermark to estimate the capacity

Chinese University of Hong Kong Department of Information Engineering Background of capacity estimation for image watermarking n Shannon [4] showed that for Gaussian channel n For watermarking, image is considered as noise

Chinese University of Hong Kong Department of Information Engineering Background of capacity estimation for image watermarking n Costa [5] showed that if the distribution of the image is only known at the watermark embedder

Chinese University of Hong Kong Department of Information Engineering n Most of the digital images are stored in JPEG format n Both the input and output images need to be JPEG compatible n It is called JPEG-to-JPEG (J2J) watermarking n All DCT coefficients need to be re-quantized after watermark insertion JPEG-to-JPEG (J2J) Image Watermarking

Chinese University of Hong Kong Department of Information Engineering JPEG-to-JPEG Watermarking (J2J)

Chinese University of Hong Kong Department of Information Engineering Proposed J2J Capacity Estimate Technique n Capacity of watermarking is defined as the maximum number of bits that can be embedded in the image and invisible n There are two assumptions –the watermarked images will be JPEG-compressed using after watermark insertion –the dimensions of the images are not changed in the watermark embedding n Human Visual System (HVS) model is used to estimate the Just Noticeable Difference (JND) of DCT coefficients n Does not assume any specific watermarking method and embedding domain

Chinese University of Hong Kong Department of Information Engineering J2J - Capacity Estimation n Denote the ij th quantized DCT coefficient of the k th block as D q (i,j,k) n The dequantized DCT coefficient D o (i,j,k) is given by n The quantized watermarked DCT coefficient D n (i,j,k) should satisfies n Guarantees the invisibility of the watermark

Chinese University of Hong Kong Department of Information Engineering J2J - Capacity Estimation n Only finite possible values of D n (i,j,k) is allowed n The no. of possible value is n J2J data hiding capacity of the image is given approximately by C w n K is the number of blocks in the image

Chinese University of Hong Kong Department of Information Engineering J2J - Capacity Estimation N w (i,j,k) = 5 Capacity = log 2 (5) bits

Chinese University of Hong Kong Department of Information Engineering J2J - Capacity Estimation n Agrees somewhat with the works of Costa n W is assumed to be uniformly distributed n power of the watermark is n assuming the quantization noise is uniformly distributed in n the power of quantization noise is

Chinese University of Hong Kong Department of Information Engineering J2J - Capacity Estimation

Chinese University of Hong Kong Department of Information Engineering Necessary Conditions to Achieve Capacity n Consider a DCT coefficient n The capacity of a communication channel with side information is given by where U is a finite alphabet auxiliary random variable, by setting U = D n where U is a finite alphabet auxiliary random variable, by setting U = D n

Chinese University of Hong Kong Department of Information Engineering Necessary Conditions to Achieve Capacity n The maximum of is achieved when is equally probable in when is known n the corresponding capacity is

Chinese University of Hong Kong Department of Information Engineering Experimental Results n Two common test images 512x512 gray-scale images are estimated and reported n Only the luminance component is used n Scaling factor (SF) is used to scale the default quantization table in JPEG to control the compression ratio

Chinese University of Hong Kong Department of Information Engineering Experimental Results LenaPepper

Chinese University of Hong Kong Department of Information Engineering Experimental Results LenaPepper

Chinese University of Hong Kong Department of Information Engineering Experimental Results – Block Capacity Lena, SFbefore=1, SFafter=0.5, Est. capacity=3507 bits Pepper, SFbefore=1, SFafter=0.5, Est. capacity=3663 bits

Chinese University of Hong Kong Department of Information Engineering Experimental Results - Histogram LenaPepper

Chinese University of Hong Kong Department of Information Engineering Conclusions n A method to estimate the watermarking capacity of digital images in the JPEG-to-JPEG watermarking framework is proposed n The estimation does not assume any specific watermarking method and embedding domain, it should apply to any watermarking method in the J2J framework More details can be founded from: P.H.W. Wong, Oscar C. Au, "A Capacity Estimation Technique for JPEG- To-JPEG Image Watermarking," IEEE Transactions on Circuits and Systems for Video Technology: Special Issue on Authentication, Copyright Protection and Information Hiding, pp , Aug A Capacity Estimation Technique for JPEG- To-JPEG Image WatermarkingA Capacity Estimation Technique for JPEG- To-JPEG Image Watermarking

Chinese University of Hong Kong Department of Information Engineering References 1. M. Ramkumar and A.N. Akansu, “Capacity Estimates for Data Hiding in Compressed Images,” IEEE Trans. Image Processing, vol. 10, no. 8, pp , Aug P. Moulin and M.K. Mıhçak, “A Framework for Evaluating the Data- Hiding Capacity of Image Sources”, IEEE Trans. Image Processing, vol. 9, no. 8, pp , Aug S. Voloshynovskiy and T. Pun, “Capacity-Security Analysis of Data Hiding Technologies,” in Proc. of IEEE Int. Conf. on Multimedia and Expo, vol. 2, pp , Aug C.E. Shannon, “A Mathematical Theory of Communication,” Bell Systems Technical Journal, vol. 27, pp , , M. Costa, “Writing on Dirty Paper,” IEEE Trans. Inform. Theory, vol. 29, no. 3, pp , May 1983.