Image Watermarking For Tampering Protection and Self-Recovery

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Introduction to H.264 / AVC Video Coding Standard Multimedia Systems Sharif University of Technology November 2008.
Digital rights management Audio watermark Jiamian.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
1 Self-Recovery Fragile Watermarking Scheme with Variable Watermark Payload Fan Chen, Hong-Jie He, Yaoran Huo, Hongxia Wang Southwest Jiaotong University,
Watermarking Techniques Digital Rights Seminar © April 28, 2006 Mahmoud El-Gayyar.
1 A video authentication scheme for H.264/AVC Main profile Nandakishore Ramaswamy Multimedia Processing Lab July 9 th, 2004.
Information Hiding: Watermarking and Steganography
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
Biometrics based Cryptosystem Design. Cryptosystem A mechanism using which one can encode an information content to an incomprehensible form and also.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Foundations of Cryptography Lecture 5 Lecturer: Moni Naor.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
1 Audio Compression Techniques MUMT 611, January 2005 Assignment 2 Paul Kolesnik.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Bit-Plane Watermarking for SPIHT-Coded Images 台北科技大學資工所 指導教授:楊士萱 學生:廖武傑 2003/07/29.
Efficient Fine Granularity Scalability Using Adaptive Leaky Factor Yunlong Gao and Lap-Pui Chau, Senior Member, IEEE IEEE TRANSACTIONS ON BROADCASTING,
Notes by Shufang Wu Embedded Block Coding with Optimized Truncation - An Image Compression Algorithm Notes by Shufang Wu
Unequal Loss Protection: Graceful Degradation of Image Quality over Packet Erasure Channels Through Forward Error Correction Alexander E. Mohr, Eva A.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
Paul Blythe and Jessica Fridrich Secure Digital Camera.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Multimedia Databases (MMDB)
Channel Coding Part 1: Block Coding
IMAGE COMPRESSION USING BTC Presented By: Akash Agrawal Guided By: Prof.R.Welekar.
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Lossless Watermarking for Image Authentication: A New Framework and an Implementation IEEE TRANSACTIONS ON IMAGE PROCESSING APRIL 2006 C.M.Chen.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Chapter 21 Public-Key Cryptography and Message Authentication.
MIMO continued and Error Correction Code. 2 by 2 MIMO Now consider we have two transmitting antennas and two receiving antennas. A simple scheme called.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Reversible watermarking Wu Dan Introduction What?
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
UEP LT Codes with Intermediate Feedback Jesper H. Sørensen, Petar Popovski, and Jan Østergaard Aalborg University, Denmark IEEE COMMUNICATIONS LETTERS,
1 Raptor codes for reliable multicast object delivery Michael Luby Digital Fountain.
C.K. Kim, D.Y. Suh, J. Park, B. Jeon ha 強壯 !. DVC bitstream reorganiser.
Li-Wei Kang and Chun-Shien Lu Institute of Information Science, Academia Sinica Taipei, Taiwan, ROC {lwkang, April IEEE.
SPIHT algorithm combined with Huffman encoding Wei Li, Zhen Peng Pang, Zhi Jie Liu, 2010 Third International Symposium on Intelligent Information Technology.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 13.Message Authentication.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to H.264 / AVC Video Coding Standard Multimedia Systems Sharif University of Technology November 2008.
Introduction to Audio Watermarking Schemes N. Lazic and P
Source: IEEE Signal Processing Letters (Accepted)2016
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Reversible Data Hiding in JPEG Images using Ordered Embedding
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
A Data Hiding Scheme Based Upon Block Truncation Coding
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Hiding and Its Applications
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Blind Reversible Authentication Based on PEE and CS Reconstruction
Ming-Shi Wang *, Wei-Che Chen 11 November 2006 present: 沈雅楓
A New Method for Tamper Detection and Recovery
Source : Digital Signal Processing. Vol. 73, pp , Feb
An Efficient Spatial Prediction-Based Image Compression Scheme
A Quadratic-Residue-based Fragile Watermarking Scheme
Presentation transcript:

Image Watermarking For Tampering Protection and Self-Recovery Iranian Cryptography Society Dr. Mohammad Ali Akhaee 4Khordad 1393

Outline Introduction Problem Definition and Proposed Framework The Proposed Source-Channel Coding Scheme Proposed Method Applied Source and Channel Coding A Sample Parameter Selection and System Design Results Main References

Outline (2) New Project topics in Data Hiding Demo Data Hiding in the compressed domain H.264, H.265 G.72x Steganalysis platform Audio, Image, and Video signals Network Forensics Behavioral Analysis Demo

Introduction

Introduction Widespread use of digital multimedia over the Internet Information hiding Applications Recent trend: Finding novel IH applications IH in PCB design or dll files to ensure the integrity Communicating the secret key in cryptography Mono transmission of the stereo music Communicating the flight information Authentication: one of the very first applications

Introduction A very recent IH application: Image tempering protection and self-recovery Initial IH schemes were capable to detect image integrity, and later, to locate tampering Recent methods, not only detect and locate the tampering, but also recover the lost content to some extent A digest of image and authentication information are embedded into image Tampered area is found using authentication Information, while its content is retrieved using the available digest information as much as possible

Introduction Self-restoration is a “Forensics” application The improvement in authentication is necessary due to simple access to image modification software Self-restoration helps to not only claim the tampering, but also recovers the manipulated truth In this study, a general source-channel coding framework is proposed Hash information are used for local authentication Source coding generates the digest, which is protected against tampering using appropriate channel code

Problem Definition and Proposed Framework

Problem Definition and Proposed Framework A watermark is embedded into the original image Watermark is extracted at the receiver to help retrieving the lost image content Watermark embedding and image restoration must satisfy the best compromise of three main parameters: The quality of the watermarked image (PSNR) The quality of restored image in tampered area (PSNR) Tolerable tampering rate (percent)

Problem Definition and Proposed Framework Proposed solution: Source-channel coding modeling of the problem: Reference bit or digest generation is an image compression using proper source coding Check bits determines the tampered blocks Having the tampered blocks known, tampering can be modeled as an erasure channel, and can be dealt with proper channel coding Using a systematic code, watermark includes three bit groups: Source code bits or reference bits Channel code parity bits Check bits generated using hash function

Problem Definition and Proposed Framework General Encoder: General Decoder:

Problem Definition and Proposed Framework Reference for check bits must remain unchanged LSB replacement Unaltered parts might be used as restored image How to exploit the unaltered information?! Source coding let us most efficiently represent the image information, but makes it hard to use unaltered content

The Proposed Source-Channel Coding Based Method

The Proposed S-C Coding Based Method General Description: Transmitter: nm MSB unchanged, nw LSB watermarked out of 8 For each block, check bits are generated from unchanged part, to locate the tampered blocks at the receiver Image is compressed at ns bpp Compressed bitstream is protected using a channel code from rate of R=ns/nc, with np=nc-ns bpp parity bits ns compressed bitstream, np channel code parity and nh check bits per pixel form the watermark which is embedded in nw LSB: nw=ns+np+nh

The Proposed S-C Coding Based Method Receiver: Tampered blocks are located using check bits Channel code bits of healthy blocks along with the list of tampered block as the erasure locations are passed to the channel erasure decoder If the tampering does not exceed the limits of the channel code, channel decoder retrieves the compressed bitstream Source decoder is applied to deliver an estimation of the original image Healthy blocks may or may not replace their equivalents in the restored image

The Proposed S-C Coding Based Method Source coded bits are permuted using k1, channel code bits using k2, both derived from K, the secret key of communication which provides security A hash algorithm (MD5) is used to generate the hash bits using nm MSB Hash bits are XORed with a random bitstream to generate check bits, blocks with different check bits at the receiver are marked as tampered Probability of collision for nh=0.5 bpp=32 bpb=2-32 ≈ 0 nw can be non-integer as well, for example nw=2.5 means using 2 and 3 LSB of blocks alternatively

Proposed Encoder nw=2, ns=1, np=0.5, nh=0.5 bpp:

Proposed Decoder nw=2, ns=1, np=0.5, nh=0.5 bpp:

Source Coding (SPIHT) Set Partitioning In Hierarchical Trees (SPIHT) is applied as the source coding scheme SPIHT is an embedded compression method, means that output bitstream can be truncated in desired rate DWT coefficients are sorted by magnitude Higher bit-planes in DWT domain are sent earlier Sorting pass must be available in the receiver too Self-similarities on the spatial orientation trees, from root downward to the leaves, are used to offer a sophisticated sorting method with least required bit budget

Source Coding (SPIHT) For an insignificant root, leaves on lower levels are highly likely insignificant too Low complexity of implementation Flexible output rate fits our scheme Quality of compression offered by SPIHT at ns bpp determines the constant restoration performance of proposed method below TTR

Channel Coding (RS) Reed-Solomon codes: Classical solution of erasures Codes over large field are desired because: All lost bits of a tampered block can be integrated to few erased symbols All the compressed bitstream can be channel coded using few coding iteration to gain its best performance Limitation: Large enough to keep code practical Symbol bit length divides block watermark bit length

Channel Coding (RS) Codes over GF(2t): t-bit symbols Up to 2t-1 symbol can be generated in one iteration Feature of RS codes fits our generally designed framework: every input and output size is feasible by puncturing and proper base element RS codes can be also implemented over prime 2t+1: No need to lookup table and generator polynomials Integer mod(2t+1) calculations instead of polynomials Simpler implementation using FFT of length 2t

Channel Coding (RS) For N=number of pixels, RS(N×nc,N×ns) is used if N×nc<2t and: TTR(nc,ns)=(nc-ns)/nc=1-ns/nc

Sample System Design Protecting 512×512 cameraman image, 8×8 blocks Using 2 and 3 LSB results in PSNR of 44.2 and 37.9 Despite most of methods that use 3 LSB and impose near-visible distortions, we propose a 2 LSB scheme ns=1 for cameraman results in SPIHT compression with quality of 44.9 dB nh=0.5 results in collision probability of 2-32≈0 nc=1.5 helps to set up channel code over GF(216+1) Every block hosts (1.5×64)/16=6 symbols

Sample System Design TTR=(1.5-1)/1.5 = 33% Input length of channel coder: 512×512×1/16=16384 Output length of channel coder: 1.5×16384=24576<216 RS(24576,16384) over GF(65537) is used by puncturing RS(32768,16384) made by α=9 from order of 32768 All of the image is coded using one block The resulting performance is constant restoration quality of 44.9 dB before tampering rate of 33%

Results 2-LSB: 3-LSB:

Results 3 LSB in Korus and Zhang methods, resulting in maximum recovery of 40.7dB Our PSNR is limited to 1bpp SPIHT compression Applying our and Korus’s to 10000 images, average recovery are 40.3 and 36.3 dB 4 dB recovery gain comparing to Korus’s λ=1 Korus: Proposed:

Results In our 3-LSB version ns=1 and nc=2.5, resulting in TTR=60% Our 3-LSB version outperforms Korus’s in recovery PSNR and TTR Constant performance of our 3-LSB version totally outperformance the decaying one of Zhang by up to 14 dB in high tampering rates A sample image with restoration around both mean values is chosen Performance of our 2-LSB is similar to Korus’s 3-LSB λ=2, with 6 dB gain in quality of watermarked image

Main References

Main References S. Sarreshtedari, M. A. Akhaee, "Source-Channel Coding Approach to Generate Tamper-Proof Images," IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), May 2014 S. Sarreshtedari, M. A. Akhaee, “On Source Channel Coding for Image Tampering Detection and Self- Recovery,” IEEE Trans. on Image Proc., vol. 25, no. 3, June, 2015. S. Sarreshtedari, M. A. Akhaee, A. A. Abbasfar, “A Joint Source Channel Coding Framework for Digital Image Self- Embedding,” Accepted to be published, IEEE Trans. on Image Proc.

Main References P. Korus and A. Dziech, “Efficient method for content reconstruction with self-embedding,” Image Processing, IEEE Transactions on, vol. 22, no. 3, pp. 1134–1147, 2013. X. Zhang, Z. Qian, Y. Ren, and G. Feng, “Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction,” Information Forensics and Security, IEEE Transactions on, vol. 6, no. 4, pp. 1223–1232, 2011. A. Said and W. Pearlman, “A new, fast, and efficient image codec based on set partitioning in hierarchical trees,” Circuits and Systems for Video Technology, IEEE Transactions on, vol. 6, no. 3, pp. 243–250, 1996.

Thank You!