DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.

Slides:



Advertisements
Similar presentations
Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Advertisements

Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
T.Sharon-A.Frank 1 Multimedia Compression Basics.
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
1 A video authentication scheme for H.264/AVC Main profile Nandakishore Ramaswamy Multimedia Processing Lab July 9 th, 2004.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Maximizing Strength of Digital Watermarks Using Neural Network Presented by Bin-Cheng Tzeng 5/ Kenneth J.Davis; Kayvan Najarian International Conference.
Digital watermarking technique for protecting digital images
Watermarking Technology Ishani Vyas CS590 Winter 2008.
1. 2 u Copyright Protection u Authentication of multimedia data u Robust Data Hiding and Security issues.
Watermarking For Image Authentication Presented by San-Hao Wang.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
1 A Unified Rate-Distortion Analysis Framework for Transform Coding Student : Ho-Chang Wu Student : Ho-Chang Wu Advisor : Prof. David W. Lin Advisor :
By Elo Leung and Wing Wong CS 265 Section 2 Spring 2004.
A robust associative watermarking technique based on similarity diagrams Source: Pattern Recognition, Vol. 40, No. 4, pp , 2007 Authors: Jau-Ji.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Perceptual Watermarks for Digital Image and Video ECE 738 paper presentation Pei Qi ECE at UW-Madison
Digital Watermarking Parag Agarwal
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 8 – JPEG Compression (Part 3) Klara Nahrstedt Spring 2012.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Directional DCT Presented by, -Shreyanka Subbarayappa, Sadaf Ahamed, Tejas Sathe, Priyadarshini Anjanappa K. R. RAO 1.
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
ELE 488 F06 ELE 488 Fall 2006 Image Processing and Transmission (12 – 7 – 06) Digital Watermarking What? Why? How? Attacks, Legal issues 12/7.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 10 – Compression Basics and JPEG Compression (Part 4) Klara Nahrstedt Spring 2014.
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
JPEG - JPEG2000 Isabelle Marque JPEGJPEG2000. JPEG Joint Photographic Experts Group Committe created in 1986 by: International Organization for Standardization.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
STATISTIC & INFORMATION THEORY (CSNB134) MODULE 11 COMPRESSION.
Chapter 8 Lossy Compression Algorithms. Fundamentals of Multimedia, Chapter Introduction Lossless compression algorithms do not deliver compression.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
DONE BY S.MURALIRAJAN M.NIRMAL
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Basic Concepts of Audio Watermarking
Watermarking for Image Authentication ( Fragile Watermarking )
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Dept. of Elec. & Comp. Engineering
A Digital Watermarking Scheme Based on Singular Value Decomposition
Parag Agarwal Digital Watermarking Parag Agarwal
Reference Ingemar J. Cox, Joe Kilian, F. Tomson Leighton, and Talal Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Trans. On Image.
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Blind Reversible Authentication Based on PEE and CS Reconstruction
On SVD-based watermarking algorithm
Hidden Digital Watermarks in Images
Presentation transcript:

DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999 Multimedia Security

2 A generic image watermarking system Requirements –Invisibility –Robustness –No ambiguity Watermark Embedding Distortions Image processing Compression …... Extraction Watermark Comparison

3 Advantages of this scheme Advantages: –Semantically meaningful watermark pattern –Good perceptual invisibility –Acceptable robustness –Various user-selected options –Reasonable complexity/execution time

4 System overview Watermarks are randomly permuted to spread their spatial relationship, and then embedded in the DCT domain of the host image, with consideration of invisibility/robustness

5 Block Diagrams of the Original Algorithm Original Image FDCT Embedding (Polarity Reversing) IDCT Watermark Image Pseudo-random Permutation Block-based Mapping Watermarked Image

6 Block Diagrams of the Original Algorithm Original Image FDCT Suspected Image FDCT Extract the Permutated Data (XOR) Reverse Block- based Permutation Reverse Pseudo- random Permutation Extracted Watermark

7 Block DCT/IDCT Advantages –Fast –Suitable for robustness against JPEG compression Disadvantages –Block effect –Effect of picture cropping

8 Semantic Meaningful Watermarks Watermarks can be verified with naked eyes by understanding the semantics of the extracted watermark patterns The seal of CML (in Chinese characters)

9 Pseudo-Random Permutation A n-bit Linear Feedback Shift Register (LFSR) is used to generate the maximal length (2 n -1) sequence The 14-bit Shift Register that permutes Original Watermark Permuted Watermark

10 Block-based Mapping Watermark blocks with more signal pixels are embedded into image blocks with higher variances – to achieve better perceptual invisibility.

11 Embedding(1/2) Choices of embedding positions within each block: –Low-frequency Bad invisibility –High-frequency Bad robustness => Middle-frequency Fix positions in each block Embedding 4 watermark pixels

12 Embedding(2/2) Polarity: the inequality relations between the scaled DC value and the selected AC coefficients Effects of the JPEG quantization table are also considered

13 Polarity Reversing Polarity: the inequality relationship between DC & corresponding AC values within each DCT block watermark bits: polarity: reversed polarity: XOR EmbeddingExtraction

14 Extraction Exclusive-or (XOR) operations are performed on the two polarity patterns to obtain the permuted binary data.