Download presentation
Presentation is loading. Please wait.
1
Slide 1 Joe O’Ruanaidh Siemens Corporate Research Princeton, NJ Digital Watermarking: How it works! SIGGRAPH’99 Panel Friday 13 August 2:15pm - 4:00pm Gabriella Csurka CUI, University of Geneva Switzerland
2
Slide 2 Agenda Some Examples: almost but not quite! –Glyphs –Easter Eggs –Money Dots Spread Spectrum Image Watermarking Video Watermarking Security Conclusions
3
Slide 3 Goals Context: distribution of documents over Internet Goal: copyright enforcement image video audio text Framework: security architecture (e.g. DCT Switzerland, Fraunhof Institute); public and private watermark.
4
Slide 4 The Holy Grail No original image! –watermark resistant to e.g.:photometric transformations, scanning; JPEG, MPEG compression; geometric transformations: cropping, translation, rotation, scaling, aspect ratio change, flip, general linear or affine transformation; regular removal of rows/columns or videoframes, shearing –video frame rate change (temporal scaling); –cryptographic attacks.
5
Slide 5 Spread Spectrum Looks like noise! Technically it’s a symmetric key cryptosystem Very very robust.
6
Slide 6 Original Images
7
Slide 7 Transformations of images
8
Slide 8 Basic approach spread-spectrum sequence inserted in transform domain; template: key-based grid to recover geometric transformations, inserted and detected in transform domain
9
Slide 9 Template: key-based grid to recover aspect ratio and frame-rate changes, Inserted in transform domain Detected in log-log-log mapping of transform domain; Video watermarking: frame by frame or as 3D object
10
Slide 10 Detecting a Watermark Wrong Key No watermark there -20dB SNR -40dB SNR
11
Slide 11 Review We need a fully integrated and secure system. Complete solution involves aspects of: –Cryptography –Communications –Spatial Transformations –Statistical Decision Theory
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.