Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

Similar presentations


Presentation on theme: "Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105."— Presentation transcript:

1 Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105

2 Outline Introduction Introduction State-of-the-Art State-of-the-Art Characteristics of Visible Watermarking Schemes Characteristics of Visible Watermarking Schemes Attacking Visible Watermarking Schemes Attacking Visible Watermarking Schemes Discussions and Conclusions Discussions and Conclusions

3 Classifying Watermarking Schemes

4 Visible Watermarking +  IPR protection schemes for images and video that have to be released for certain purposes Unobtrusive copyright patterns can be recognized on embedded contents

5 Invisible Watermarking v.s. Visible Watermarking Invisible WatermarkingVisible Watermarking Watermark Perceptibility Protection Robustness Imperceptible distortionVisibly Meaningful pattern Intentional attacks and common signal processing User-intervention based watermark removal PassiveActive Current Research Status HotOnly few papers Extraction Explicit extraction module Direct viewing

6 Requirements of Visible Watermarking Perceptibility of host image details Perceptibility of host image details Contents should not be rendered useless after being visibly watermarked Contents should not be rendered useless after being visibly watermarked Visibility of watermark patterns in embedded contents Visibility of watermark patterns in embedded contents No explicit watermark extraction techniques are required No explicit watermark extraction techniques are required Robustness Robustness Difficult to remove unless exhaustive and expensive human interventions are involved Difficult to remove unless exhaustive and expensive human interventions are involved

7 A General Model of Visible Watermarking I ’ : the watermarked content I ’ : the watermarked content I: the un-watermarked original content I: the un-watermarked original content W: the watermark pattern W: the watermark pattern K i : the weighting factor K i : the weighting factor D: a distance function measuring the perceptual difference of its two parameters D: a distance function measuring the perceptual difference of its two parameters E i : image feature extraction operators E i : image feature extraction operators Threshold I : the largest allowable distortion of image details that observers can tolerate and, at the same time, the signature of can be maintained. Threshold I : the largest allowable distortion of image details that observers can tolerate and, at the same time, the signature of can be maintained. Threshold W : the largest allowable distortion of the embedded watermark pattern that the copyright information can be clearly recognized. Threshold W : the largest allowable distortion of the embedded watermark pattern that the copyright information can be clearly recognized.

8 State-of-the-Art G. Braudaway, K.A. Magerlein, and F. Mintzer, "Protecting Publicly Available Images with a Visible Image Watermark," Proceedings of the SPIE International Conference on Electronic Imaging, San Jose, CA, Feb.,1996 G. Braudaway, K.A. Magerlein, and F. Mintzer, "Protecting Publicly Available Images with a Visible Image Watermark," Proceedings of the SPIE International Conference on Electronic Imaging, San Jose, CA, Feb.,1996 J. Meng and S. F. Chang, “ Embedding visible watermarks in the compressed domain, ” Proc. of ICIP 98. J. Meng and S. F. Chang, “ Embedding visible watermarks in the compressed domain, ” Proc. of ICIP 98. M. S. Kankanhalli, Rajmohan and J. R. Ramakrishnan, “ Adaptive Visible Watermarking of Images, ” IEEE International Conference on Multimedia Computing and Systems, 1999 M. S. Kankanhalli, Rajmohan and J. R. Ramakrishnan, “ Adaptive Visible Watermarking of Images, ” IEEE International Conference on Multimedia Computing and Systems, 1999 S. P. Mohanty, J. R. Ramakrishnan, and M. S. Kankanhalli, “ A DCT domain visible watermarking technique for images, ” Proc. of ICME 2000. S. P. Mohanty, J. R. Ramakrishnan, and M. S. Kankanhalli, “ A DCT domain visible watermarking technique for images, ” Proc. of ICME 2000. S. P. Mohanty, J. R. Ramakrishnan, and M. S. Kankanhalli, “ A Dual Watermarking Technique for Images, “ Proc. ACM, pp. 49-51, 1999 S. P. Mohanty, J. R. Ramakrishnan, and M. S. Kankanhalli, “ A Dual Watermarking Technique for Images, “ Proc. ACM, pp. 49-51, 1999

9 The Scheme Proposed by G. Braudaway et al An approximately uniform color space is used, such as the CIE 1976 (L*u*v*) space and the CIE 1976(L*a*b*)-space, so amounts of brightness increasing and decreasing are perceptually equal for a fixed change occurred everywhere in the color space An approximately uniform color space is used, such as the CIE 1976 (L*u*v*) space and the CIE 1976(L*a*b*)-space, so amounts of brightness increasing and decreasing are perceptually equal for a fixed change occurred everywhere in the color space Definitions Definitions Y n,m and Y ’ n,m : the brightness values of each pixel in the unmarked original and the watermarked image Y n,m and Y ’ n,m : the brightness values of each pixel in the unmarked original and the watermarked image Y w : the brightness of the “ scene white ” Y w : the brightness of the “ scene white ”

10 Other Enhancing Schemes [Meng and Chang] [Meng and Chang] The same embedding model is extended to the DCT domain by simple statistic model approximation for the convenience of processing directly in the MPEG- compressed domain. The same embedding model is extended to the DCT domain by simple statistic model approximation for the convenience of processing directly in the MPEG- compressed domain. [Kankanhalli et al] [Kankanhalli et al] Local features related to the degree of distortion tolerances, such as edge locations, texture distributions and luminance sensitivity, are taken into consideration so that more unobtrusive watermarked images can be generated. Local features related to the degree of distortion tolerances, such as edge locations, texture distributions and luminance sensitivity, are taken into consideration so that more unobtrusive watermarked images can be generated. Simple statistics of block-DCT coefficients are calculated and analyzed to decide the watermark embedding energy of each block. Simple statistics of block-DCT coefficients are calculated and analyzed to decide the watermark embedding energy of each block. Edge integrity will be preserved, in these approaches, since the edge information is essential to maintain the image quality. Edge integrity will be preserved, in these approaches, since the edge information is essential to maintain the image quality. And the energy of the embedded watermark is larger in highly textured areas than in smooth ones due to different noise sensitivity. And the energy of the embedded watermark is larger in highly textured areas than in smooth ones due to different noise sensitivity. In additions, the watermark energy of mid-gray regions is also smaller than other areas since the noises are more visible against a mid-gray background In additions, the watermark energy of mid-gray regions is also smaller than other areas since the noises are more visible against a mid-gray background [S. P. Mohanty et al] [S. P. Mohanty et al] in addition to the visibly embedded watermark, a fragile invisible watermark is also adopted to check if the visible watermark is altered or not in addition to the visibly embedded watermark, a fragile invisible watermark is also adopted to check if the visible watermark is altered or not

11 Important observations (1/4) Attacking visible watermarking scheme means successfully recover the watermarked area. Attacking visible watermarking scheme means successfully recover the watermarked area. Implication: Implication: Similar image processing techniques can be adopted Similar image processing techniques can be adopted Image recovery Image recovery Object removal Object removal

12 Important observations(2/4) To clearly recognize the copyright patterns, the contours of embedded patterns must be preserved. To clearly recognize the copyright patterns, the contours of embedded patterns must be preserved. Implication: Implication: An attacking scheme is effective if An attacking scheme is effective if 1. The pattern is completely removed 2. The shape is seriously distorted without seriously degrading visual quality.

13 Important observations(3/4) The perceptibility of the host image details within watermarked area depends on the preservation of edge information. The perceptibility of the host image details within watermarked area depends on the preservation of edge information. Implication: Implication: Available information while attacking Available information while attacking Surrounding pixels around watermarked area. Surrounding pixels around watermarked area. Edge information within watermarked area is available while attacking. Edge information within watermarked area is available while attacking.

14 Important observations(4/4) The robustness lies in the inevitability of exhaustive and expensive labors. The robustness lies in the inevitability of exhaustive and expensive labors. Implication: Implication: Only minimum user intervention should be adopted during attacking Only minimum user intervention should be adopted during attacking User selection of watermarked areas User selection of watermarked areas

15 Averaging Attacks Refill the watermarked areas by averaging surrounding pixels. Refill the watermarked areas by averaging surrounding pixels. Good approximations for small areas. Good approximations for small areas. Blurring effects across object boundaries Blurring effects across object boundaries

16 Image Inpainting M. Bertalmio, V. Caselles, and C. Ballester, “ Image inpainting, ” SIGGRAPH 2000, Aug. 2000 M. Bertalmio, V. Caselles, and C. Ballester, “ Image inpainting, ” SIGGRAPH 2000, Aug. 2000 Image inpainting Image inpainting is an iterative image recovery technique. is an iterative image recovery technique. prolongs the approaching isophotes into damaged areas. prolongs the approaching isophotes into damaged areas. successfully reconstruct the edges of damaged area. successfully reconstruct the edges of damaged area.

17 Basic Inpainting Attacks Attacks against visible watermarking are regarded as common image recovery problems. Attacks against visible watermarking are regarded as common image recovery problems. Good results can be obtained for areas composed of thin copyright patterns, but areas composed of thick patterns cannot be successfully recovered. Good results can be obtained for areas composed of thin copyright patterns, but areas composed of thick patterns cannot be successfully recovered.

18 General Attacks Classifying flat areas within watermarked area by analyzing remaining edge information of host images Classifying flat areas within watermarked area by analyzing remaining edge information of host images Directly extend colors of surrounding flat areas into watermarked areas Directly extend colors of surrounding flat areas into watermarked areas Edge Area Watermark Area

19 Further Improvement

20 Experimental Results (I)

21 Experimental Results (II)

22 Experimental Results (III)


Download ppt "Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105."

Similar presentations


Ads by Google