Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Prepared for DA 201  Introduction to Digital Watermarking.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Technical Aspects of Digital Rights Management
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Digital watermarking technique for protecting digital images
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Watermarking in E-commerce Systems. Outline Introduction, Applications Characteristics and classification Popular techniques for watermarking Attacks.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Secure Spread Spectrum Watermarking for Multimedia Ishani Vyas CS590 Winter 2008.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
By Elo Leung and Wing Wong CS 265 Section 2 Spring 2004.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
A Review on: Spread Spectrum Watermarking Techniques
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
Digital Watermarking By: Li Yang
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Copyright Protection of Digital Image Sung-Ho Bae Tongmyong University of information technology.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
CPS 182s 1.1 Digital Watermark l What is a watermark? A digital watermark?  Message about a work is embedded in the work l What is steganography?  The.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Digital Watermarking: Principles and Practices
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
ELE 488 F06 ELE 488 Fall 2006 Image Processing and Transmission (12 – 7 – 06) Digital Watermarking What? Why? How? Attacks, Legal issues 12/7.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
DEPARTMENT OF ECE, BEC, BAGALKOT
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
IMAGE PROCESSING IMAGE WATERMARKING
Visible Watermarking of An Image Using DCT Technique
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Welcome
Technical Aspects of Digital Rights Management
DONE BY S.MURALIRAJAN M.NIRMAL
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Reference Ingemar J. Cox, Joe Kilian, F. Tomson Leighton, and Talal Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Trans. On Image.
Multimedia Data Hiding: What, Why, and How?
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Presentation transcript:

Thái Chí Minh Trần Lương Khiêm 1

Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Content  Introduction  History  Applications  Requirements  Techniques  Attacks 3

Introduction 4

5

6

Relation between embedded message and cover work Goal and assumption 7

Content  Introduction  History  Applications  Requirements  Techniques  Attacks 8

History Histiæus & the slave Paper watermark, 1282 Banknote. 18 th century 9

History  In 1954, Emil Hembrooke of the Muzak Corporation filed a patent for watermarking” musical Works  The first Information Hiding Workshop (IHW),which included digital watermarking as one of its primary topics, was held in

Content  Introduction  History  Applications  Requirements  Techniques  Attacks 11

Applications  Broadcast monitoring  Owner identification  Proof of ownership  Transaction tracking  Content authentication  Copy control 12

Broadcast monitoring 13

Owner identification 14

Proof of ownership 15

Transaction tracking 16

Transaction tracking 17

Content authentication  Digital signature is NOT enough 18

Content authentication 19

Copy control  Cryptography is NOT enough 20

Copy control 21

Content  Introduction  History  Applications  Requirements  Techniques  Attacks 22

Requirements  Perceptual Transparency  Robustness  Data payload  With / Without originals  Security 23

Perceptual Transparency 24

Robustness  Fragile  Semi-fragile  Robust 25

Data payload  Data payload refers to the number of bits a watermark encodes within a unit of time or within a Work  Different applications may require very different data payloads 26

With / Without originals  Non-blind watermarking Type I Type II  Semi-blind watermarking  Blind watermarking 27

Security 28

The mutual dependencies among the elements 29

Content  Introduction  History  Applications  Requirements  Techniques  Attacks 30

Techniques  LSB  Spread spectrum  Applying on Vietnamese documents 31

Techniques 32

Techniques  There are many techniques to do watermarking in digital things: Spatial domain watermarking: LSB, in text data, … Transform domain watermarking: frequency- based watermarking, wavelet based watermarking ○ Embedding the watermark in the transform domain from carrier object (using DCT, DFT, DWT, …) 33

Techniques  LSB: Embedding: ○ Choosing some representation values (e.g pixels) of carrier object. ○ Embed the bits of message (watermark) to LSBs of representation value Message ‘A’: Carrier object: RGB (2 bits)

Techniques  LSB: Embedding: ○ Choosing some representation values (e.g pixels) of carrier object. ○ Embed the bits of message (watermark) to LSBs of representation value Message ‘A’: Carrier object: RGB (2 bits)

Techniques  LSB: Detector: ○ Retrieve the watermark by having the knowledge of the representation values (e.g pixels) used for embedding individuals bits 36

Techniques  Spread spectrum Using frequency domain transform to convert the input image into another domain and embedding the watermark to this domain. 37

Techniques Apply on Vietnamese documents 38

Techniques Apply on Vietnamese documents 39

Techniques Apply on Vietnamese documents ○ Besides, we can use some methods: Vertically shifting text lines Horrizontally shifting words 40

Content  Introduction  History  Applications  Requirements  Techniques  Attacks 41

Attacks  From processing  From attackers 42

Attacks  The actions take effect on the watermark embedded in carrier objects. Affects: ○ Destroying the watermark or modifying the watermark with new wrong information. ○ Removing the watermark entirely. But: not degrading the quality of carrier objects (image, audio, video) Relating to a requirements of watermarking: Robustness 43

Attacks  Classification: From proscessing carrier objects ○ Common signal processing: digital-to-analog and analog-to-digital conversion, or change image contrast, color, JPEG compression, … ○ Common geometric distortions: scaling, rotating, cropping, dithering … From attacker ○ Mosaic ○ Collusion attacks: get the watermark or remove watermarks entirely to get the original work. ○ … 44

Attacks 45

Attacks Mosaic attack 46

Attacks  How to protect watermarks from attacks Understanding and applying new researchs in watermarking Using StirMark Benchmark evaluation engine to evaluate your watermarking scheme ○ “All vendors of digital watermarks have their products benchmarked by Stirmark and as of August 2001, no watermark from any vendor survives the test, ie: the watermarks are all removed without degradation to image quality occurring. “ 47

48