Presentation is loading. Please wait.

Presentation is loading. Please wait.

Principles of Digital Watermarking

Similar presentations


Presentation on theme: "Principles of Digital Watermarking"— Presentation transcript:

1 Principles of Digital Watermarking
Ingemar J. Cox, Matt L. Miller, and Jeffrey A Bloom

2 Course outline Part 1: Introduction and Applications
Part 2: Basic Algorithms and Concepts Part 3: Advanced Watermarking Course outline

3 Part 1: Definitions and Applications

4 Definitions and Applications: Outline
Definitions of watermarking Properties of watermarking systems Watermarking applications Conclusions Definitions and Applications

5 Definitions of watermarking
Without common definitions, various approaches and technologies cannot be compared. Definitions and Applications

6 Definitions of watermarking: Our definition
Watermarking is the practice of unobtrusively modifying a work of art (image, song, software program, geometric model, etc.) to embed a message about that work. Multimedia watermarking is the practice of imperceptibly altering a work (image, song, etc.) to embed a message about that work. This tutorial will concentrate on multimedia watermarking. We assume that the work is a representation of still or motion imagery or sound. Basic concepts may apply to other types of works. We further illustrate with imagery as that was the easiest to represent in a book. Definitions and Applications

7 Definitions of watermarking: Basic design of a system
Original work Watermark embedder Watermark detector Watermarked work (looks like original) Detected message Message (regarding work) Definitions and Applications

8 Definitions of watermarking: Other definitions
Imperceptibility is not always considered essential (allows for visible watermarking). Sometimes more broadly defined as any data hiding (i.e. hidden data need not relate to work). Sometimes more narrowly defined as owner identification (watermarks must indicate identity of owner). Definitions and Applications

9 Definitions of watermarking: Related terms
Data hiding: any technology for preventing adversaries from perceiving or finding data. Steganography: keeping the existence of messages secret by hiding them within objects, media, or other messages. Modification may be of the file format rather than of the essence of the work. Watermarking is a special case. In watermarking, the secrecy of the message is not essential. Definitions and Applications

10 Definitions of watermarking: Related terms
Watermarking is the practice of unobtrusively modifying a work of art (image, song, software program, geometric model, etc.) to embed a message about that work. Steganography is the practice of undetectably modifying a work to embed a message.

11 Unobtrusive Original Undetectable

12 Definitions and Applications
Properties of systems Understanding, comparing, and selecting watermarking approaches or technologies takes place in the context of system properties. Definitions and Applications

13 List of properties to be discussed
Embedding effectiveness Fidelity Data payload Blind vs. informed detection False positive rate Robustness Security Definitions and Applications

14 Definitions and Applications
A note before we begin … When we say “random work”, we mean a work drawn from an application-dependent distribution of works. Examples: x-rays, animation, natural image, classical music, speech, etc. When we say “random watermark”, we mean a watermark message drawn from the set of possible messages. Definitions and Applications

15 Embedding effectiveness
A system’s embedding effectiveness is the probability it will succeed in embedding a random watermark in a random work. Random work Watermark embedder Watermark detector Message detected correctly? Random message Definitions and Applications

16 Embedding effectiveness
Why might embedding effectiveness be less than 100 percent? In some cases, it is not possible to embed required amount of information imperceptibly. Actual implementations usually involve some round-off and truncation before watermarked work is stored, which sometimes make watermark undetectable. Definitions and Applications

17 Properties of systems: Fidelity
A system’s fidelity is the perceptual similarity between marked and unmarked works. Random work works appear sufficiently similar? Watermark embedder Watermarked work Human observer Random message Definitions and Applications

18 Properties of systems: Data payload
A system’s data payload is the amount of information that it can embed in a single work. Random message Watermarked work Random work Watermark embedder Definitions and Applications

19 Blind vs. informed detection
An informed detector requires some information about the original, unwatermarked work. A blind detector does not. Required by informed detector Original work Watermark embedder Watermark detector Message Definitions and Applications

20 Properties of systems: False positive rate
A system’s false positive rate is the frequency with which it is expected to detect watermarks in unwatermarked works. Watermark detector Random, unwatermarked work Watermark detected? Definitions and Applications

21 Properties of systems: False negative rate
A system’s false negative rate is the frequency with which it is expected to NOT detect watermarks in watermarked works. Watermark detector Random, watermarked work Watermark detected? Definitions and Applications

22 Properties of systems: Robustness
A watermark’s robustness is its ability to survive normal processing (e.g. lossy compression, noise reduction, etc.). Random work Watermark embedder Watermark detector Message detected correctly? Random message Normal processing Definitions and Applications

23 Properties of systems: Security
A watermark’s security is its ability to resist hostile attacks, specifically designed to defeat the purpose of the watermark. Types of attacks Unauthorized embedding (forgery) Unauthorized detection Unauthorized removal Definitions and Applications

24 Security – unauthorized embedding
Random work Watermark detector Forged Message detected Watermarked work Unauthorized embedding by an adversary Forged message Definitions and Applications

25 Security – unauthorized removal
Random work Watermark embedder Watermark detector Message detected correctly? Random message Hostile processing by an adversary Definitions and Applications

26 Security – unauthorized detection
Original Work Watermark embedder Adversary can detect message? Message Attempt at detection by adversary Definitions and Applications

27 Watermarking applications
Watermarking may be appropriate for applications in which data about a work must be imperceptibly embedded. Different applications place different requirements on system properties. Definitions and Applications

28 List of examples discussed
Broadcast Monitoring Owner Identification Proof of Ownership Transaction Tracking Content Authentication Copy Control Definitions and Applications

29 Definitions and Applications
Broadcast monitoring Original content Content was broadcast! Broadcasting system Watermark embedder Watermark detector Definitions and Applications

30 Definitions and Applications
Broadcast monitoring Monitor when and whether content is transmitted over broadcast channels, such as television or radio Verify advertising broadcasts (1997 scandal in Japan) Verify royalty payments ($1000 of unpaid royalties to actors per hour of broadcast) Catch instances of piracy Definitions and Applications

31 Definitions and Applications
Owner identification Alice Original work Alice is owner! Watermark embedder Distributed copy Watermark detector Definitions and Applications

32 Definitions and Applications
Owner identification Watermark identifies owner of copyright, similar to a copyright notice Help honest people identify rightful owner Notify people of copyright In US, until 1988, such notice was required to retain copyright Since 1988, presence of notice increases possible reward in lawsuits Definitions and Applications

33 Definitions and Applications
Owner identification The problem with text: this well-known image … Definitions and Applications

34 Definitions and Applications
Owner identification … is a pirated part of a larger image. Definitions and Applications

35 Definitions and Applications
Proof of ownership Alice Original work Alice is owner! Watermark detector Watermark embedder Distributed copy Bob Definitions and Applications

36 Definitions and Applications
Proof of ownership Watermark is used to prove ownership in a court of law Differs from owner identification in two ways Intended to carry burden of proof Watermark need not be detectable by anyone other than owner (allows informed detection) Definitions and Applications

37 Definitions and Applications
Transaction tracking Alice Watermark A Honest Bob Original work Evil Bob B:Evil Bob did it! Watermark B Watermark detector Unauthorized usage Definitions and Applications

38 Definitions and Applications
Transaction tracking Watermarks record transaction histories of content, typically identifying first authorized recipient Identifying pirates (DiVX corporation) Identifying information leaks (M. Thatcher, movie dailies) Definitions and Applications

39 Transaction tracking The MPAA estimates that piracy costs the US film industry $3B per year One source of material is the annual distribution of Oscar screeners to the 5,803 voting members of the Academy

40 Transaction tracking Thomson system enabled the MPAA to distribute individually-watermarked VHS and DVD screeners to its 5,803 eligible voting members Screeners appeared on the internet The Last Samurai Something's Gotta Give Mystic River Actor Carmine Caridi expelled from MPAA

41 Content authentication
Watermark embedder Watermark detector Definitions and Applications

42 Content authentication
Watermark is used to detect modifications applied to cover work Exact authentication: work is inauthentic if even one bit has changed Selective authentication: work is inauthentic only if significantly changed Tell-tale watermarks/localization: identify what changes have been made Definitions and Applications

43 Definitions and Applications
Copy control Watermarks indicate whether content may be copied Record control: recording devices contain detectors and refuse to record copyrighted material Playback control: players contain detectors and refuse to play pirated material Definitions and Applications

44 Definitions and Applications
Copy control Compliant player Compliant recorder Legal copy Playback control Record control Non-compliant recorder Illegal copy Definitions and Applications

45 Definitions and Applications
Conclusions Definitions and Applications

46 Conclusions: Stuff not covered
Erasability (whether watermark can be perfectly removed) Cipher and watermark keys Modification and multiple watermarks Cost

47 Conclusions: Take Away
Watermarking may be appropriate for applications in which data about a work must be imperceptibly embedded. Different applications place different requirements on system properties.

48 Conclusions: Take Away
Key properties include Embedding effectiveness Fidelity Data payload Blind vs. informed detection False positive rate Robustness Security

49 Digression: The politics of DRM
Why does Hollywood care about piracy? Loss in revenue But some level of piracy actually stimulates sales Evidence that peer-to-peer file sharing affects sales is mixed But has been used to control the evolution of the digital market

50 Digression: The politics of DRM
Why do computer and consumer electronics companies care about DRM? Need content owners to provide content in new digital formats Conflict of interests Customers don’t want DRM Legal and business contracts impose DRM

51 Course outline Part 1: Definitions and Applications
Part 2: Basic Algorithms and Concepts Part 3: Informed Watermarking Course outline

52 Part 2: Basic Algorithms and Concepts

53 Basic Algorithms and Concepts: Outline
Algorithmic building blocks Robustness issues Security issues Conclusions

54 Algorithmic building blocks
Over the past 5 to 10 years of research, several ideas have emerged as basic building blocks of watermarking systems.

55 A simple watermark embedder
Given … Watermark pattern, w Cover image co Embedding strength a Compute watermarked image, cw, as Basic Algorithms and Concepts

56 A watermarked version of this …
Basic Algorithms and Concepts

57 Basic Algorithms and Concepts
…looks like this Basic Algorithms and Concepts

58 Basic Algorithms and Concepts
Informed detection Given Possibly watermarked image c Original cover image co Subtract original to obtain watermark pattern (if present) Basic Algorithms and Concepts

59 Linear correlation test
Use linear correlation to determine whether Linear correlation defined as If c = co + n, then 0 If c = co + aw + n, then azlc(w,w) Basic Algorithms and Concepts

60 Basic Algorithms and Concepts
Blind detection If w is chosen so that zlc(co,w) is likely to be close to 0, then zlc zlc(wn,w). No need to subtract out co before computing linear correlation. White noise pattern tends to have low- magnitude correlation with any image. Basic Algorithms and Concepts

61 Interpreting system geometrically
Media space – a high-dimensional space in which each point corresponds to a work. 256 256 grayscale image -> 65,536 dimensions (one for each pixel). 5 second mono audio clip, sampled at 44,100Hz -> 220,500 dimensions (one for each sample) Basic Algorithms and Concepts

62 2d pictures of media space
Several possible interpretations Abstraction of high-dimensional space (just pretend media space is really 2d) Projection of media space Slice of media space Basic Algorithms and Concepts

63 Basic Algorithms and Concepts
Picture of media space Basic Algorithms and Concepts

64 Algorithmic building blocks: Watermark in media space
Basic Algorithms and Concepts

65 Geometric interpretation of zlc()
zlc(c,w) is just dot product of c and w divided by N Dot product of c and w is cosine of angle between them, times their magnitudes If |w| = 1, then dot product is projection of c onto direction of w Comparing zlc(c,w) against a threshold leads to detection region with planar boundary Basic Algorithms and Concepts

66 Geometric interpretation of zlc()
Basic Algorithms and Concepts

67 Now that we have a basic system …
… let’s consider a problem: What happens when we change the contrast of the image? cwn = ncw , where n is some scalar value zlc(cwn,w) = n zlc(cw,w) If n < 1, detection value might drop below threshold Basic Algorithms and Concepts

68 Solution: normalized correlation
Normalize correlation by magnitudes of vectors Scaling has no effect on znc(c,w) Basic Algorithms and Concepts

69 Geometric interpretation of znc()
znc(c,w) correlation is just cosine of angle between c and w Comparing znc(c,w) against a threshold is equivalent to comparing angle against a threshold Result: detection region with conical boundary Basic Algorithms and Concepts

70 Geometric interpretation of znc()
acos( znc(c,w) ) w Basic Algorithms and Concepts

71 Basic Algorithms and Concepts
Another problem What happens if the image is spatially shifted a little? Detection value will depend on autocorrelation function of watermark pattern. White noise pattern has close to zero autocorrelation. \ Watermark is unlikely to be detected. Basic Algorithms and Concepts

72 Basic Algorithms and Concepts
Possible solution Watermark Fourier-magnitude instead of pixel values Fourier-magnitudes are invariant to translation Basic Algorithms and Concepts

73 Basic Algorithms and Concepts
Possible solution To embed Take FFT of image and compute magnitudes Add w to magnitudes Scale FFT coefficients of image to new magnitudes and take inverse FFT To detect Compute normalized correlation between magnitudes and w Basic Algorithms and Concepts

74 Basic Algorithms and Concepts
Watermark extraction We can view the preceding system as comprising two basic parts A watermark extraction process that maps points in media space to points in some marking space (Fourier-magnitude space, in this case) A simple watermarking system that operates in marking space Basic Algorithms and Concepts

75 Reasons for watermark extraction
Increase robustness Project into distortion invariant space Invert distortions Reduce noise Reduce computational cost Increase security Key-based extraction Basic Algorithms and Concepts

76 “Transform domain” watermarking
Many authors categorize watermarking systems by transforms included in their extraction processes, e.g. … “Spatial-domain watermarking” (no transform) “DCT-domain watermarking” “Wavelet-domain watermarking” Etc. But … Basic Algorithms and Concepts

77 “Transform domain” watermarking
… the transform alone says little about how the system works If T is a linear, energy-preserving transform, then zlc( T(c),w ) = zlc( c,T-1(w) ) Thus a linear-correlation-based system in domain T is the same as a spatial-domain system with a different watermark pattern It is the nonlinearities in the extraction process that distinguish a system’s behavior Basic Algorithms and Concepts

78 Basic Algorithms and Concepts
Perceptual shaping Basic idea: amplify watermark in areas where the cover work can mask noise co Perceptual model w cw Basic Algorithms and Concepts

79 Image before embedding
Basic Algorithms and Concepts

80 Without perceptual shaping
Basic Algorithms and Concepts

81 With perceptual shaping
Basic Algorithms and Concepts

82 Detection after perceptual shaping
Early approach: invert shaping in detector (shown here for informed detector) co Perceptual model c wn Basic Algorithms and Concepts

83 Detection after perceptual shaping
Not necessary to invert perceptual shaping Distortion of watermark pattern degrades detection value for given watermark scaling value, a, but … … possible to use larger value of a because pattern is better hidden Basic Algorithms and Concepts

84 Geometric view of perceptual shaping
Region of acceptable fidelity Shaped watermark vector Original (unshaped) watermark vector Basic Algorithms and Concepts

85 Robustness Issues The robustness of a watermark is its ability to survive normal processing.

86 Basic Algorithms and Concepts
Additive Noise Watermarked image is corrupted by additive noise Linear Correlation Linear Correlation (matched filtering) is optimal when noise is AWGN. Basic Algorithms and Concepts

87 Basic Algorithms and Concepts
Valumetric Scaling Watermarked image is subjected to a change in contrast Linear Correlation For n < 1, this scaling decreases the detection value. How can we select a threshold? Basic Algorithms and Concepts

88 Basic Algorithms and Concepts
Valumetric Scaling Normalized Correlation Independent of vector magnitude Describes the cosine of the angle between the vectors -1  znc  +1 1-n q Unit Sphere Basic Algorithms and Concepts

89 Basic Algorithms and Concepts
Quantization Transform Quantization Entropy Coding uncompressed work compressed Quantization noise cannot be modeled as additive white noise There are current efforts to model quantization noise Eggers and Girod Appendix B.5 Canonical Transform Coder Basic Algorithms and Concepts

90 Basic Algorithms and Concepts
Synchronization Geometric distortion in imagery translation, rotation, zoom, aspect ratio, skew, perspective distortion, warp Temporal distortion in audio time delay, time scaling Video can suffer from both geometric and temporal misalignments Noise due to synchronization errors is not well modeled as additive white noise. Basic Algorithms and Concepts

91 Synchronization Approaches
Exhaustive Search Detection applied at all possible temporal/geometric distortions Negative impact on false positive probability Usually requires too much computation Basic Algorithms and Concepts

92 Synchronization Approaches
Synchronization pattern is embedded along with the payload-carrying pattern. Registration to synchronization pattern prior to detection. Negative impact on fidelity and security Basic Algorithms and Concepts

93 Synchronization Approaches
Implicit Synchronization Watermark location in time or space is relative to extracted features Example: audio reference pattern added between salient points Basic Algorithms and Concepts

94 Synchronization Approaches
Invariance Design patterns that are invariant to desynchronization Example: Use of Fourier magnitude in watermark extraction process for shift invariance Basic Algorithms and Concepts

95 Security Issues The security of a watermark is its ability to resist hostile attacks specifically designed to defeat the purpose of the watermark.

96 Basic Algorithms and Concepts
Robustness Security against unauthorized removal requires robustness to any process that maintains fidelity Desynchronization Attacks Noise Removal Attacks Basic Algorithms and Concepts

97 Basic Algorithms and Concepts
Mosaic Attack Image is broken into many small rectangular patches Each patch is too small for reliable detection Patches are displayed in a table such that patch edges are adjacent Basic Algorithms and Concepts

98 Basic Algorithms and Concepts
Collusion Attacks Many different works, same watermark Many different watermarks, same work Simple example: averaging Average of many different works gives an estimate of the watermark Average of many copies of the same work reduces the strength of each watermark Basic Algorithms and Concepts

99 Basic Algorithms and Concepts
Copy Attack Watermark is “copied” from one work to another Unauthorized Embedding Example: apply a watermark removal attack to obtain an estimate of the watermark, add to fake. Basic Algorithms and Concepts

100 Basic Algorithms and Concepts
Ambiguity Attack Create the appearance that a watermark has been added to someone else’s work Example: define fake watermark pattern and subtract from the distributed image. This is the fake “original.” Difference between distributed and Bob’s original contains Bob’s watermark Difference between distributed and Alice’s original contains Alice’s watermark Basic Algorithms and Concepts

101 Basic Algorithms and Concepts
Ambiguity Attack Alice is owner! Alice’s original (real) Alice Alice’s detector Distributed copy Bob is owner! Bob’s “original” (fake) Bob Bob’s detector Basic Algorithms and Concepts

102 Basic Algorithms and Concepts
Ambiguity Attack Solution to ambiguity attack: Alice uses system that cannot be hacked May be possible to implement by making watermark dependent on cryptographic hash of original work Strictly-speaking, provides proof of ancestry, rather than proof of ownership Basic Algorithms and Concepts

103 Basic Algorithms and Concepts
Sensitivity Analysis Technique for removing watermark when adversary has black box detector Estimate the normal to the detection region surface boundary at some point Assume that this normal indicates a short path out of the detection region Basic Algorithms and Concepts

104 Basic Algorithms and Concepts
Sensitivity Analysis Find a work that lies on the detection boundary Approximate the normal to the detection boundary Scale and add the normal to the watermarked work Detection region work A attacked work watermarked work w Basic Algorithms and Concepts

105 Basic Algorithms and Concepts
Conclusions Basic Algorithms and Concepts

106 Conclusions: Major stuff not covered
Message-coding for multi-bit watermarks Non correlation-based watermarking “Constraint-based” watermarking (can usually be recast as correlation-based) Quantization-based watermarking (will be covered in part 3) Authentication methods ROC Curves Basic Algorithms and Concepts

107 Conclusions: Take Away
Linear correlation (matched filtering) is optimal for detecting a signal in AWGN Most processing is not well modeled as AWGN Normalized correlation provides robustness to amplitude changes Helpful to think of a work as a point in a high dimensional space Basic Algorithms and Concepts

108 Conclusions: Take Away
Watermark extraction: project a work to another space for embedding and/or detection Perceptual modeling can improve fidelity and allow for stronger embedding Robustness to desynchronization is an difficult problem Collusion attacks and sensitivity analysis are significant security challenges Basic Algorithms and Concepts

109 Outline Part 1: Definitions and Applications
Part 2: Basic Algorithms and Concepts Part 3: Informed Watermarking

110 Part 3: Informed watermarking

111 Informed watermarking: Outline
Idea of informed watermarking Informed shaping Informed coding Conclusions Informed watermarking

112 Idea of informed watermarking
Informed watermarking is the practice of using information about the cover work during watermark coding and shaping. Informed watermarking

113 Informed watermarking
Blind coding & shaping Original Work Watermark embedder Blind shaping (scaling) Blind coding Watermarked Work Message Informed watermarking

114 Informed watermarking
Informed shaping Original Work Watermark embedder Blind coding Informed shaping Watermarked Work Message Informed watermarking

115 Informed coding & shaping
Original Work Watermark embedder Informed coding Informed shaping Watermarked Work Message Informed watermarking

116 Informed watermarking
Central insight Watermarking with informed embedder and blind detector = communication with side information at the transmitter Shannon’s model: transmitter has knowledge of channel’s noise characteristics In watermarking, cover Work = (part of) noise Theoretical results for this type of channel should apply to watermarking Informed watermarking

117 Informed watermarking
Consequences Informed shaping alone Allows more precise control of fidelity/robustness tradeoff Informed coding + informed shaping Greatly increases payload for a given fidelity/robustness performance Alternatively, improves fidelity/robustness performance for a given payload Informed watermarking

118 Informed watermarking
Informed shaping The cover work can be used to inform perceptual shaping. It can also be used to adjust watermark pattern for maximal robustness. Informed watermarking

119 Informed watermarking
Basic approach Design detector (we’ll use the linear-correlation detector from Part 2) Treat detection algorithm and parameters as given Design best embedder we can Informed watermarking

120 Informed watermarking
Embedding problem The embedder is capable of producing any image Objective: produce an image within the intersection of a region of acceptable fidelity and the detection region Informed watermarking

121 Informed watermarking
Embedding problem Region of acceptable fidelity Any point in this area is a successful embedding w Informed watermarking

122 Informed watermarking
Embedding problem Several possible approaches Maximize robustness for a given fidelity Maximize fidelity for a given robustness Either approach requires Estimate of fidelity Estimate of robustness Informed watermarking

123 Simple embedding method
Assume MSE indicates fidelity (better estimates lead to perceptual shaping) Assume robustness is monotonic function of linear correlation Under these assumptions, blind embedding achieves maximum “robustness” for given “fidelity” Alternatively … Informed watermarking

124 Simple embedding method
… we can minimize fidelity impact while embedding for a constant “robustness” Informed watermarking

125 Estimating robustness
Simple assumption: robustness is monotonic function of detection value True for linear correlation Not true for other detection measures For normalized correlation, we have obtained good results by estimating amount of white noise that may be added before watermark is likely to be lost Informed watermarking

126 Informed watermarking
Informed coding Significantly larger data payloads can be embedded if the mapping between messages and watermark patterns is dependent on the cover work. Informed watermarking

127 Informed coding: Outline
Writing on dirty paper (problem studied by M. Costa) Dirty-paper codes Application of dirty-paper codes to watermarking Experimental results Conclusions Informed watermarking

128 Informed coding: Writing on dirty paper
M. Costa studied a “dirty-paper channel” Obtain a piece of paper with normally-distributed dirt Write a message using limited ink Send message, acquiring more dirt along the way Recipient cannot distinguish dirt from ink How much information can we send? Informed watermarking

129 Informed coding: The dirty-paper channel
First noise s Second noise n m Transmitter Receiver m’ x y x limited by power constraint: Informed watermarking

130 Informed coding: Costa’s result
First noise has no effect on channel capacity Informed watermarking

131 Informed coding: Dirty-paper codes
Basic idea Dirty-paper code = code in which each message is represented by several alternative code vectors From the set of vectors that represent the desired message, choose the one, u, that is closest to the first noise, s Transmit a function of u and s, for example x = u - s Informed watermarking

132 Coding for a simplified channel
Consider a simplified version of the dirty-paper channel First noise has only two possible values, s1 and s2 (i.e. there are only two possible patterns of dirt on the paper) Remainder of channel is the same If s1 is sufficiently different from s2, then Costa’s result is easy to obtain Informed watermarking

133 Coding for a simplified channel
This group of code vectors centered on s2 A B C D E A B F G C D E This group of code vectors centered on s1 F G Informed watermarking

134 Informed coding: Dirty-paper codes
For full dirty-paper channel: Try to design a dirty-paper code in which, within the power-constraint around every possible s, there is at least one code vector for each message. Informed watermarking

135 Coding for full dirty-paper channel
Code must ensure that, within the power- constraint around every possible s, there is at least one code vector for each message. Capacity cannot be achieved transmitting x = u – s. Costa transmits x = u – as, where a is a carefully-chosen constant Informed watermarking

136 Application to watermarking
Costa’s proof does not translate directly to watermarking In watermarking, noise is not Gaussian Non-Gaussian noise necessitates non-spherical detection regions (e.g. cones) Lessons from Costa Use dirty-paper codes Use non-trivial informed embedding Informed watermarking

137 Practical dirty-paper codes
Costa’s code is generated randomly Requires exhaustive search during encoding and decoding Practical for only very small data payloads Lattice code is most-studied practical code Chen & Wornell (“Dither Index Modulation”, “Quantization Index Modulation”) Eggers, Su, & Girod (“Scalar Costa Scheme”) Informed watermarking

138 Informed coding: Lattice codes
Each dimension in marking space encodes one symbol, usually one bit Bit encoded by choosing between two quantization points 1 1 1 Informed watermarking

139 Properties of lattice codes
Typically much higher capacity than correlation- based systems (> 1000 bits) Not usually as robust as correlation-based systems Correlation-based systems have better payload/robustness tradeoff when noise is high Lattice codes susceptible to changes in image brightness or audio volume Informed watermarking

140 Informed watermarking
Conclusions Informed watermarking

141 Conclusions: Stuff not covered
Informed-embedding for multi-bit watermarks Syndrome coding Application of informed-coding to correlation- based systems Informed watermarking

142 Conclusions: Take Away
Informed shaping Embedder may choose any point in the detection region for the desired message Best to base choice on an estimate of robustness Informed coding Define several patterns for each message, and embed the one that’s closest to the cover work In theory, capacity of watermarking might be unaffected by distribution of cover works Informed watermarking

143 Future directions

144 Future directions Research Informed coding Robustness
Quantization index modulation Syndrome coding Trellis coding Robustness Non-random processes Esp. geometric distortions

145 Future directions Research Security Collusion attacks Others …

146 Future directions Commercial applications Transaction tracking
Movie screeners Digital cinema Broadcast monitoring Metadata Lyrics in MP3 files

147 Future directions Commercial applications Authentication
Cameras Surveillance video Medical imagery Enhancements to legacy systems 3D HDTV – Benoit Macq

148 Future directions Commercial applications? Copy control
Proof of ownership

149 Future directions Commercial applications
Must be based on a service or product Not technology Similar to commercial applications of cryptography


Download ppt "Principles of Digital Watermarking"

Similar presentations


Ads by Google