Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
VIPER DSPS 1998 Slide 1 A DSP Solution to Error Concealment in Digital Video Eduardo Asbun and Edward J. Delp Video and Image Processing Laboratory (VIPER)
N-Secure Fingerprinting for Copyright Protection of Multimedia
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Fifth International Conference on Information
Supervised by Prof. LYU, Rung Tsong Michael Department of Computer Science & Engineering The Chinese University of Hong Kong Prepared by: Chan Pik Wah,
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery By Pat P. W. Chan Supervised by Michael R. Lyu 8/6/2004 Computer Science.
Robust Digital Right Management Scheme (DRM) for Multimedia Anuj Maheshwari Victor Sutan
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Object Based Processing for Privacy Protected Surveillance Karl Martin Kostas N. Plataniotis University of Toronto Dept. of Electrical and Computer Engineering.
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
A Partial Survey of the Perfect Digital Watermark Problem.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
DEPARTMENT OF ECE, BEC, BAGALKOT
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
IMAGE PROCESSING IMAGE WATERMARKING
Welcome
DONE BY S.MURALIRAJAN M.NIRMAL
Recent Developments on Multimedia and Secure Networking Technologies
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Fun Stuff: Digital Media
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Digital Watermarking Lecture 2
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer Science and Engineering The Chinese University of Hong Kong

Department of Computer Science and Engineering The Chinese University of Hong Kong Outline  Motivation  Research objective  Background  Literature Review  New Video Watermarking Algorithm  Future Direction  Conclusion

Department of Computer Science and Engineering The Chinese University of Hong Kong Why need Multimedia Security?  Easier to transfer multimedia documents across the Internet  Copyright protection of content  Multimedia Security and Multimedia Copyright Protection  Encryption and control access  Digital Watermarking Motivation

Department of Computer Science and Engineering The Chinese University of Hong Kong  Cryptography ensures confidentiality, authenticity, and integrity  Cannot help after decryption  Digital Watermarking can help Prove ownership Identify a misappropriating person Trace the marked document ’ s dissemination through the network Why need Digital Watermark? Motivation

Department of Computer Science and Engineering The Chinese University of Hong Kong  Different interesting watermarking approaches have been proposed  Most of Video Watermarking is based on the techniques of the image watermarking  Video watermarking introduces some issues not present in image watermarking  Frame averaging, frame dropping, frame swapping, statistical analysis, interpolation … Why need Video Watermark? Motivation

Department of Computer Science and Engineering The Chinese University of Hong Kong Research objective  Survey and investigation on multimedia security issues and multimedia watermarking scheme.  Compared and evaluate various watermarking scheme  A new approaches and procedures for multimedia security based on watermarking are proposed.  Experiment will be done on this proposed approach Objective

Department of Computer Science and Engineering The Chinese University of Hong Kong Digital Watermarking  Watermarking is a concept of embedding a special pattern, watermark, is embedded into a document  Watermarking is a key process in the protection of copyright ownership of electronic data Background

Department of Computer Science and Engineering The Chinese University of Hong Kong Digital watermarking Detection Algorithm Watermark Or Confidence measure Test Image Ì Watermark W and/or original image I Secret / public key K Watermarking Algorithm Watermarked Image Ì Stego-Image I Watermark W Secret / public key K Background

Department of Computer Science and Engineering The Chinese University of Hong Kong Properties of Watermark  Invisibly  Capacity (Number of bits can be hidden)  Low error probability  Robustness Image watermarking ( filtering, resizing, contrast enhancement, cropping, rotation... ) Video watermarking ( frame averaging, frame dropping, frame swapping, statistical analysis, interpolation... ) Background

Department of Computer Science and Engineering The Chinese University of Hong Kong Application of Watermarking  Owner Identification  Proof of Ownership  Transaction Tracking  Content Authentication  Broadcast Monitoring  Copy Control  Device Control  Automatic monitoring of copyrighted material on the Web Background

Department of Computer Science and Engineering The Chinese University of Hong Kong Attack on Watermarking  Processing operation  Compression  Rescaling  Cropping  Multiple watermarks Background  Frame averaging  Frame dropping  Frame swapping  Statistical analysis  Interpolation

Department of Computer Science and Engineering The Chinese University of Hong Kong Image Watermarking  Checksum  Spread spectrum approach  Hierarchical watermarking with DCT  Wavelet-based watermarking DWT  Digital Fourier Transform Literature Review

Department of Computer Science and Engineering The Chinese University of Hong Kong Video Watermarking  Raw video watermarking DFT DCT DWT  Watermarking I-frame (Mpeg-1,2)  Video object watermarking (Mpeg-4) Literature Review

New Algorithm DWT-based Video Watermarking Scheme with Scramble Watermark

Department of Computer Science and Engineering The Chinese University of Hong Kong Discrete Wavelet Transform  Normalized to 256 X 256 pixel size  Perform DWT for each frame

Department of Computer Science and Engineering The Chinese University of Hong Kong Scene Change Detection  Each scene is embedded with same watermark, it can prevent attacker to remove the watermark by frame dropping  Independent watermark is used for successive different scene can prevent attacker collude with frames from completely different scenes Mark with m 1 Mark with m 3 Mark with m 0 Mark with m 6 Scene change occur

Department of Computer Science and Engineering The Chinese University of Hong Kong Watermark Preprocess  Different frame use different watermark can make the watermark resist to attack by frame averaging  Hard to reconstruct the watermark without knowledge Crop Bit Decomposition 8 bit-planes bit-planes Total 8 images is obtained m0m0 m7m7 Place the bit-planes side by side

Department of Computer Science and Engineering The Chinese University of Hong Kong Watermark Embedding  C[i] = C[i] + 1, if W[j] = 1  C[i] = C[i], otherwise  LL, HH is not watermark HL 1 LH 1 HH 1 HL 2 HH 2 LH 2 LL LH LH 3 HH 3 HL 3 HL HH Watermark m i

Department of Computer Science and Engineering The Chinese University of Hong Kong 1. Video Frame 256 X DWT DWT result frames Original video frames 4. Compare 2. Detect the scene change 5. Averaging the watermark get from different frames Watermark m i m0m0 m1m1 m2m2 m4m4 m5m5 m6m6 m7m7 m3m3 7. Get different part of W from different scene and reconstruct the large image Combine 8 bit-planes Correlate and verify ExtractedOriginal EO Mark with m 1 Mark with m 3 Mark with m 0 Mark with m 6 Scene change occur Watermark Detection

Department of Computer Science and Engineering The Chinese University of Hong Kong Future Direction  Implement and use do experiment on the scheme  Identifiable from very short segment of video. Individual frames extracted from the video will also contain the copyright information  Change to blind watermarking scheme  Make use of the object information (information from Mpeg-4)

Department of Computer Science and Engineering The Chinese University of Hong Kong Conclusion  Video Watermarking is need due to Copyright protection is essential  Video watermarking is different from image watermarking  Brief review of current technologies  DWT-based Video Watermarking Scheme with Scramble Watermark  Future Direction

The End