Digital Watermarking Sapinkumar Amin 005240067 Guided By: Richard Sinn.

Slides:



Advertisements
Similar presentations
Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Advertisements

Rob Farraher Ken Pickering Lim Vu
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Watermarking Techniques Digital Rights Seminar © April 28, 2006 Mahmoud El-Gayyar.
Information Hiding: Watermarking and Steganography
Brodatz Textures Vistex Textures What is texture ? Texture can be considered to be repeating patterns of local variation of pixel intensities.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Technical Aspects of Digital Rights Management
Blue Spike © 2001 Blue Spike, Inc. - 1 Copyright Protection? What are the technologies which can address copyright management in a world of digital copies?
N-Secure Fingerprinting for Copyright Protection of Multimedia
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Robust Digital Right Management Scheme (DRM) for Multimedia Anuj Maheshwari Victor Sutan
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Reza Mohammadi Shiraz University Of Technology
Steganography detection Roland Cmorik, Martin Šumák.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Digital Steganography
Media Protection Media Encryption Media Watermark Media Protection Media Encryption Media Watermark Lesson 10.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Video Data Hiding using Forbidden Zone and Selective Embedding Submitted Under Team Members.
Digital Watermarking
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Basic Message Coding 《 Digital Watermarking: Principles & Practice 》 Chapter 3 Multimedia Security.
A Partial Survey of the Perfect Digital Watermark Problem.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Technical Aspects of Digital Rights Management
DONE BY S.MURALIRAJAN M.NIRMAL
A User Attention Based Visible Watermarking Scheme
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Authors: J.J. Murillo-Fuentes
Digital Watermarking Lecture 2
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn

Agenda What is Digital Watermarking? Why? How? (General Framework) Properties Types Limitations Attacks Current Trends

Steganography It is a sub discipline of data hiding and part of cryptology. Steganography is “secret writing”. The steganographic message is integrated invisibly and covered inside other harmless source, it is very difficult to detect the message without knowing its existence and its appropriate encoding scheme.

Digital Watermarking “Digital Watermarking “means embedding information into digital material in such a way that it is imperceptible to a human observer but easily detected by computer algorithm. A digital watermark is a transparent, invisible information pattern that is inserted into a suitable component of data source by using a specific computer algorithm. Digital watermarks are signal added to digital data that can be detected or extracted later to make an assertion about the data.

Why Digital Watermarking? In order to protect copyrighted material from illegal duplication, two typical technologies have been developed. One approach uses key-based cryptographic methods which enable the appropriate security during the transmission process, but once the encrypted data is decoded, the control of redistribution and its spread fails. To address limitations of encryption, the main idea is to label a digital material with specific marks, which are called digital watermarks. Such technology can be used as ownership proof for distribution channel tracking and other applications in business and public domains. Furthermore, watermarking technology enables the owner to obtain the copyright status of certain documents and distributors can be made accountable for the condition. Additionally, compatible media player technology (DRM used by Microsoft in Windows media player), Divx and DVD player, can detect distorted marks and refuse to play, display, or execute the media asset files

General Framework (How) In order to combine a watermark with a digital document images, you need an image (I), a signature (S=s1, s2, s3…..sN) that contains the watermarking information, and an encoding algorithm (E) to create a watermarked image (I’). The encoder takes the signature and cover the document, and generates the watermarked image, that is described as a function: E(I,S) = I’. Secret or public key and other parameters can be used to extend the watermarking encoder.

General Framework (How) The watermark is extracted using a decoder function. In this case, the decoder D loads the watermarked, normal or corrupted image I(w), and extract the hidden signature S. Using non-blind watermarking techniques, the decoder D loads an additional image I, which is often the original image, to extract the watermarking information by correlation. The process can be described as D(I,I(w)) = S. Give detail about blind and non-blind technique.

General Framework (How) Digital watermarks are weaved into the core structure of digital document in an invisible and unrecognizable way. Watermark does not change the main functionality of file. Therefore, the watermark must be inserted into the data structure imperceptibility. It should neither be visible, audible and, nor detected to strangers or observers. Each watermark method consists of an embedding algorithm and an extracting algorithm. The embedding algorithm inserts the watermark information and others only determine its existence. Such methods can be used either as ownership proof or verification.

Properties and Requirements Robustness Non-perceptibility Security Complexity Capacity

Types of Watermarking LSB Watermarking Spatial Domain Watermarking Temporal Domain Watermarking Spread Spectrum Watermarking

LSB Watermarking In general – 149 is One of the most earliest techniques Embed watermark data by alternation of certain bits of digital image which are selected based on secret key. Extraction – by reading value of bits Advantage - High Watermark channel capacity, Algorithm has less computational complexity Disadvantages-No robustness, Search Space is huge, Weak against D/A and A/D

Spatial (Space) Domain Watermarking Ueung-Mintzer scheme  Watermark is a binary logo smaller than image but stretched to form as big as image (gray scale).  Scan each pixel and extract using look up table generated using secret key.  If the extracted watermark bit is equal to the authentic watermark bit, the pixel is left unchanged; other wise the gray scale of the pixel is adjusted until the extracted watermark bit is equal to the authentic one. Wong’s public scheme  All LSB are set to zero, than image is divided into blocks, blocks applied to hash function and than applied to XOR operation. Result is encrypted using private key of RAS cryptography and embedded with original image.

Spatial (Space) Domain Watermarking continued… Wong and Memon method  Improved scheme by adding an image index and a block index to the input of hash function. Image index is just like a unique serial number of image. But the verifier needs to have the prior knowledge about the image index.

Temporal Domain Watermarking MPEG compression  I (Intra)-pictures  P (Predictive)-pictures  B (Bi-directional)-pictures I-pictures are independently encoded in MPEG, watermark insertion concentrates on I-pictures using spatial domain watermarking. It takes a watermark video that consists of a number N0 of pictures and embeds this video in the usual way, frame by frame. This number N0 is a parameter, clearly if N0=1, then we have the ordinary spatial watermarking scheme. If N0 is greater than 1, the approach is time-variant. The information contained in N0 is entirely up to the user.

Spread Spectrum Watermarking Use spread spectrum to spread the watermark all over the host image. b is the watermarking bit α is a scaling factor (Coefficient) (x,y) is a 2-dimensional pseudo-random sequence of 1 and -1 I(n1,n2) is the original image Used in radar, navigation and communication appliances

Attacks on Digital Watermarking Simple attack Detection Disabling attack Ambiguity attack Removal attack

Current Trends Color image watermarking, and other multimedia signals. Watermarking of maps, graphics and cartoons. Applications beyond copyright protection. Protocols and standardization.

References Digital Watermarking – Juergen Seitz, tech.edu/~mouli/waterm_tut.ppt+digital+watermarking+ppt&hl=en&ct=clnk&cd=2&gl=us tech.edu/~mouli/waterm_tut.ppt+digital+watermarking+ppt&hl=en&ct=clnk&cd=2&gl=us linz.ac.at/education/Inhalte/se_moderne_methoden/WS0405/hasslacher_digital_watermark ing.pdf+digital+watermarking+ppt&hl=en&ct=clnk&cd=1&gl=us linz.ac.at/education/Inhalte/se_moderne_methoden/WS0405/hasslacher_digital_watermark ing.pdf+digital+watermarking+ppt&hl=en&ct=clnk&cd=1&gl=us EU05/Notes/Watermarking.pdf+digital+watermarking+ppt&hl=en&ct=clnk&cd=3&gl=us EU05/Notes/Watermarking.pdf+digital+watermarking+ppt&hl=en&ct=clnk&cd=3&gl=us fall2001/projects/presentations/team10.ppt+digital+watermarking+ppt&hl=en&ct=clnk&cd=4 &gl=us

Any Questions….