Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Randomized Detection for Spread- Spectrum Watermarking: Defending Against Sensitivity and Other Attacks Ramarathnam Venkatesan and Mariusz H. Jakubowski.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Maximizing Strength of Digital Watermarks Using Neural Network Presented by Bin-Cheng Tzeng 5/ Kenneth J.Davis; Kayvan Najarian International Conference.
N-Secure Fingerprinting for Copyright Protection of Multimedia
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection Xudong Zhao, Shilin Wang, Shenghong Li and Jianhua Li Shanghai Jiao.
Modeling Pixel Process with Scale Invariant Local Patterns for Background Subtraction in Complex Scenes (CVPR’10) Shengcai Liao, Guoying Zhao, Vili Kellokumpu,
Fifth International Conference on Information
Adaptive MPEG-2 Video Data Hiding Scheme Anindya Sarkar, Upmanyu Madhow, Shivkumar Chandrasekaran, B. S. Manjunath Presented by: Anindya Sarkar Vision.
Efficient Moving Object Segmentation Algorithm Using Background Registration Technique Shao-Yi Chien, Shyh-Yih Ma, and Liang-Gee Chen, Fellow, IEEE Hsin-Hua.
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
1. 2 u Copyright Protection u Authentication of multimedia data u Robust Data Hiding and Security issues.
Robust Object Segmentation Using Adaptive Thresholding Xiaxi Huang and Nikolaos V. Boulgouris International Conference on Image Processing 2007.
Watermarking For Image Authentication Presented by San-Hao Wang.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Jacinto C. Nascimento, Member, IEEE, and Jorge S. Marques
Lossy Compression Based on spatial redundancy Measure of spatial redundancy: 2D covariance Cov X (i,j)=  2 e -  (i*i+j*j) Vertical correlation   
A Review on: Spread Spectrum Watermarking Techniques
Normalization of the Speech Modulation Spectra for Robust Speech Recognition Xiong Xiao, Eng Siong Chng, and Haizhou Li Wen-Yi Chu Department of Computer.
ECE738 Advanced Image Processing Data Hiding (2 of 3) Curtsey of Professor Min Wu Electrical & Computer Engineering Univ. of Maryland, College Park.
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Layered Coding Basic Overview. Outline Pyramidal Coding Scalability in the Standard Codecs Layered Coding with Wavelets Conclusion.
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles Marwen HASNAOUI Maher BELHAJ Mihai MITREA Françoise PRETEUX ARTEMIS.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Multiple-description iterative coding image watermarking Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 20, No. 4, pp , 2010.
Quantization Watermarking Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems Brian Chen, Ph. D. Dissertation,
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
FREE-VIEW WATERMARKING FOR FREE VIEW TELEVISION Alper Koz, Cevahir Çığla and A.Aydın Alatan.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
1 Robust and transparent watermarking scheme for colour images Speaker : Po-Hung Lai Adviser : Chih-Hung Lin Date :
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
Introduction to Audio Watermarking Schemes N. Lazic and P
K. ZEBBICHE , F. KHELIFI and A. BOURIDANE
Spread Spectrum Audio Steganography using Sub-band Phase Shifting
DONE BY S.MURALIRAJAN M.NIRMAL
Robustness Evaluation of Perceptual Watermarks
Watermarking with Side Information
Basic Concepts of Audio Watermarking
Regression-Based Prediction for Artifacts in JPEG-Compressed Images
Watermarking for Image Authentication ( Fragile Watermarking )
Increasing Watermarking Robustness using Turbo Codes
Feature Space Based Watermarking in Multi-Images
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Reversible Data Hiding
Source: Pattern Recognition Letters, Article In Press, 2007
Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking IEEE Trans. On Signal Processing, April 2003 Multimedia Security.
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Presenter: Shih-Hsiang(士翔)
Authors: J.J. Murillo-Fuentes
Presentation transcript:

Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu

Outlines Introduction Multilevel Data Hiding in Grayscale Image Multilevel Data Hiding in Video Conclusion

Introduction Goal: apply the solutions in Part I to specific design problems and present details of embedding data

Multilevel Data Hiding in Grayscale Image Introduction Spectrum Partition System Design Experimental Results

Multilevel Data Hiding in Grayscale Image -- Introduction Present a two-level data hiding using two types of embedding mechanisms Basis: Fig5. in Part I Basic Assumptions/Conditions: Grayscale Images Embedding Domain: 8*8 block DCT coefficients Using Spectrum Segments for Embedding Dealing with non-coherent case

Multilevel Data Hiding in Grayscale Image -- Introduction

Spectrum Partition Data Model and Formula Experimental Results

Spectrum Partition-Data Model(1) Embedding: where the watermark {s1, …, sn } is an n-sample known sequence, b: a bit to be embedded and is equally likely to be “-1” or “+1”, d i : noise, i.i.d. Gaussian

Spectrum Partition-Data Model(2) A few considerations Bits can be embedded in all bands. In many cases, bits are embedded in mid-band due to Low band coefficients generally have higher power High band coefficients are vulnerable to attacks Noise Model can be extended to Normal Distribution with Various Covariance. Whitening should be performed in such cases

Spectrum Partition-Data Model(3) The detector The mean

Spectrum Partition-Simulation(1) Subject: 141 Images Embedding: the Block-DCT spread spectrum algorithm proposed by Podilchuk-Zeng Detection: the q-statistic proposed by Zeng-Liu Three watermarks are used Pre-processing: An estimation of the host signal’s power is performed based on testing images A set of known signals are added to help locating host signal from noise

Spectrum Partition-Simulation(2) Detection: Defined two statistics: q’ and q, with and without the weighting

Spectrum Partition-Simulation(3) Experiments: DCT coefficients are ordered in zig-zag order Several distortion are introduced while computing q-statistics JPEG with different quality factors Low pass filtering q-statistics are normalized with respect to number of embeddable coefficients, see Figures Q is maximum when the embedding starts around 6-11 Q’ is larger than q and it’s monotone Conclusion: For high robustness, embed the bit to mid-band coefficients For high payload, embed the bit to low-band coefficients

Spectrum Partition-Simulation(4)

Spectrum Partition-Simulation(5)

Spectrum Partition-Simulation(6)

System Design Block Diagram Two Level Embedding

System Design– Block Diagram(1) Embedding

System Design– Block Diagram(2) Detecting

Two Level Embedding(1) First Level: Using Odd-Even Embedding in the Low Band Quantization Techniques are applied

Two Level Embedding(2) Second Level: Using Type I Spread Spectrum Technique Antipodal Modulation Is Used where {v i }: original coefficients {v i ’}: marked coefficients {b’}: antipodal mapping from b, which is +1 or –1 : watermark strength, adjusted by the just-noticeable- difference (JND) standard

Experimental Results

Multilevel Data Hiding in Video Embedding Domain Variable Embedding Rate (VER) Versus Constant Embedding Rate (CER) Control Data Versus User Data Experimental Results

Embedding Domain(1) Problems Introduced by Consecutive Frames Add/Drop Some Frames Switch the Order of Frames Generate New Frames Possible Attacks Collusion Attack Solution Adding Redundancy

Embedding Domain(2) To Avoid Frame-Jitter Partitioning the Video into Temporal Segments Embedding Same Data in Every Frame of a Segment

Embedding Domain(3) To Avoid Frame Drop, Reordering, Insertion Embedding the Same User Data As Well As a Shorten Version of Segment Index The Segment Index Is Part Of the Control Bits

Variable Embedding Rate (VER) vs. Constant Embedding Rate (CER) Problem The Uneven Embedding Capacity Arises Both From Region to Region within a Frame and From Frame to Frame Solution Combine VER and CER The Intra-Frame Unevenness Is Handled by CER and Shuffling The Inter-Frame Unevenness Is Handled by VER and Additional Side Information

Number of Bits Embedded in Each Frame Number of Bits That Can Be Embedded in Each Frame Changes Greatly Estimate Number of Bits for Each Frame Estimate the Achievable Embedding Payload Based on Energy of DCT Coefficients, Number of Embeddable Coefficients Set Two Threshold and If do not embed data If a number of bits are embedded If bits are embedded in higher rate

Estimation of Payload For Type I Spread Spectrum Embedding, The Mean of Detection Statistic Is Bit Error Probability Is Given by Maximum Bit Error Probability Is Given by A Lower Bound of Mean Detection Statistic Is Defined by The Detection Statistic When All Embeddable Coefficients Are Used Is Given By The Payload Is

Control Data Versus User Data(1) Control Data: Additional Information Include Frame Sync Index, Number of Bits Embedded in Each Frame Embedding Frame Sync A Short Version of Video Segment Index Assume Frame Sync’s Range is 0 to K-1 The i-th Segment Is Labeled as

Control Data Versus User Data(2) User Data: Information TDM with Shuffling IS Applied Orthogonal Modulation Is Used to Double the Number of Embedded Bits Assume 2B bits Are Embedded

Block Diagram

Experimental Results

Conclusion Demonstrate How to Apply General Solutions in Part I to Specific Designs Made use of Two types of Embedding Modulation and Multiplex Techniques Shuffling Multilevel Data Hiding