Combining digital Watermarks and collusion secure Fingerprints for digital Images

Size: px
Start display at page:

Download "Combining digital Watermarks and collusion secure Fingerprints for digital Images"

Transcription

1 header for SPIE use Combining digital Watermarks and collusion secure Fingerprints for digital Images Jana Dittmann a, Alexander Behr a, Mark Stabenau a, Peter Schmitt b, Jörg Schwenk c, Johannes Ueberberg d a GMD - German National Research Center for Information Techology, Darmstadt, Germany b Justus Liebig University, Giessen, Germany c Deutsche Telekom, Technologiezentrum, Darmstadt, Germany d debis, IT Security Services, Germany ABSTRACT Digital watermarking is the enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multimedia data and analyze the spread spectrum of the data over networks and servers. Embedding of unique customer identification as a watermark into data is called fingerprinting to identify illegal copies of documents. Basically, watermarks embedded into multimedia data for enforcing copyrights must uniquely identify the data and must be difficult to remove, even after various media transformation processes. Digital fingerprinting raises the additional problem that we produce different copies for each customer. Attackers can compare several fingerprinted copies to find and destroy the embedded identification string by altering the data in those places where a difference was detected. In our paper we present a technology for combining a collusion-secure fingerprinting scheme based on finite geometries and a watermarking mechanism with special marking points for digital images. The only marking positions the pirates can not detect are those positions which contain the same letter in all the compared documents, called intersection of different fingerprints. The proposed technology for a maximal number d of pirates, puts enough information in the intersection of up to d fingerprints to uniquely identify all the pirates. Keywords: Collusion secure fingerprinting, watermarking, copyright protection, customer copy identification 1. MOTIVATION The expansion of digital networks all over the world allows extensive access on, and reuse of, visual material. Problems include unauthorised taping, reading, manipulating or removing of data, which might lead to financial loss or legal problems of the producers and creators. Thus, designers, producers and publishers of digital data like images, video or multimedia material are seeking technical solutions to the problems associated with copyright protection of multimedia data. Thus, systems are required which provide environments where digital data can be signed by authors or producers as their intellectual property, i.e. by embedding private or public information into the video data, to ensure and proof ownership rights on the produced video material during its distribution. Digital watermarking is the enabling technology to prove of ownership on copyrighted material, detect the originator of illegally made copies, monitor the usage of the copyrighted multimedia data and analyze the spread spectrum of the data over networks and servers. Embedding of unique customer identification as a watermark into data is called fingerprinting to identify illegal copies of documents. Basically, watermarks, labels or codes embedded into multimedia data for enforcing a copyright must uniquely identify the data as property of the copyright holder, and must be difficult to be removed, even after various media transformation processes. Thus the goal of a label is to always remain present in the data. Digital fingerprinting which embeds customer information into the data to enable detection of license infringement raises the additional problem that we produce different copies for each customer. Attackers can compare several fingerprinted copies to find and destroy the embedded identification string by altering the data in those places where a difference was detected. In our paper we present a technology for combining a collusion-secure fingerprinting scheme based on finite geometries and a watermarking mechanism with special marking points for digital images. The only marking positions the pirates can not detect are those positions which contain the same letter in all the compared images, called intersection of different fingerprints. The proposed technology for a maximal number d of pirates, puts enough information in the intersection of up to d fingerprints to uniquely identify all the pirates. The next chapter explains the fingerprinting algorithm. Based on the fingerprinting algorithm we present then the watermarking algorithm and the test results.

2 2. COLLUSION SECURE FINGERPRINTING ALGORITHM A digital fingerprinting scheme consists of a number of marking positions in the document, a watermarking algorithm to embed letters from a certain alphabet at the marking positions, a fingerprinting algorithm which selects the letters to be embedded for each marking position depending on the number i of the copy and a pirate tracing algorithm which, on input of a modified document, outputs at least one number i of a copy that was used in constructing the modified document. Different copies of a document containing digital fingerprints differ at most at these marking positions. A powerful attack to remove a fingerprint therefore consists of comparing two or more fingerprinted documents and to alter these documents randomly in those places where a difference was detected. If three or more documents are compared, a majority decision can be applied to improve this kind of attack: For the area where the documents differ, choose the value that is present in most of the documents. The only marking positions the pirates can not detect are those positions which contain the same letter in all the compared documents. We call the set of these marking positions the intersection of the different fingerprints. In this section we propose a fingerprinting algorithm that, for a maximal number d of pirates, puts enough information in the intersection of up to d fingerprints to uniquely identify all the pirates. A fingerprinting scheme with this property is called d- detecting. Another important parameter is the number n of copies that can be generated with such a scheme. We use techniques from finite projective geometry [1, 6] to construct d-detecting fingerprinting schemes with q+1 possible copies. These schemes need n=q d +q d q+1 marking positions in the document. We use a binary alphabet in our scheme: Therefore marking positions with a 1 embedded will be called marked, those with a 0 will be called unmarked. Unmarked positions are not altered compared to the original document. The problem of collusion-secure fingerprinting has originally been described and solved by D. Boneh and J. Shaw [2]. Our approach, is different from [2], since we put the information to trace the pirates into the intersection of up to d fingerprints. In the best case (e.g. automated attacks like computing the average of fingerprinted images) this allows us to detect all pirates, in the worst case (removal of individually selected marks) we can detect the pirates with a negligibly small one-sided error probability, i.e. we will never accuse innocent customers Two simple examples The smallest possible example of a fingerprinting scheme (and the smallest projective space) is shown in Picture 1. The projective space PG(2,2) of dimension 2 (i.e. it is a plane) and order 2 (i.e. there are 2+1=3 points on each line) has 7 points and 7 lines (the circle through the points 2, 4 and 6 counting as a line). 1 Points Lines Fingerprint 1 Fingerprint 2 Fingerprint Figure 1: A 2-detecting fingerprinting scheme with 3 possible copies in the finite projective space PG(2,2). To implement this scheme, we need 7 marking positions in the document, each associated with one point of PG(2,2). This association must be secret and highly nonlinear to destroy all purely geometric information in the document. (In the following, if no confusion is possible, we will not distinguish between the terms point and marking position.) Each fingerprint consists of 3 marked and 4 unmarked points. E.g. to embed fingerprint 2 in a document, the marking positions corresponding to the points 1, 2 and 3 will be marked, the rest remains unmarked. This scheme is 2-detecting because any two of the lines {1,2,3}, {3,4,5} and {1,5,6} intersect in a unique point. A possible attack could be the following: Customer 1 buys a copy of the document with fingerprint 1, and customer 2 gets a copy with fingerprint 2. They compare their documents to generate a pirate copy. The two documents differ at the marking positions 2, 3, 5 and 6, 3

3 In the worst case, they can unmark all those points. However, they can not detect marking position 1 if a good watermarking scheme has been used. If they sell the pirated copy, it will eventually fall into the hands of the copyright owner. The copyright owner will then start the pirate tracing algorithm and detect point 1 and from this point the two pirate customers 1 and 2. Remark: Following a different strategy, it is possible for the pirates to generate with probability ¼ a document where detection of pirates is not possible. This can be done by guessing, in each document, the marking point that belongs to point 5 or 3, resp. By leaving these marks unchanged, the pirates make it impossible to decide whether customer 1 and 2, or 2 and 3, or 1 and 3, have generated this document. This problem has already been described in [2]. However, when d and q increase, this probability becomes negligible. How can this scheme be generalized? Figure 2 gives an idea that will be formalized in the next sections. Figure 2: A tetrahedron as an example of a 3-detecing fingerprinting scheme. Consider a tetrahedron in a 3-dimensional space. A tetrahedron has the property that any two of its planes intersect in a unique line, and that any three of its planes intersect in a unique point. A fingerprinting scheme will therefore mark all points of a plane of a generalized tetrahedron. Such structures exist in finite projective spaces Finite Projective Spaces The finite projective spaces PG(d,q) can be constructed from vector spaces over finite fields by the following construction: Let GF(q) be a finite field (finite fields exist and are unique for all prime powers q), and let V=GF(q) d+1 be the (d+1)- dimensional vector space over GF(q). Then PG(d,q) is the following structure: The points of PG(d,q) are the 1-dimensional subspaces of V. The lines of PG(d,q) are the 2-dimensional subspaces of V. Generally: The i-dimensional subspaces of PG(d,q) are the (i+1)-dimensional subspaces of V. By defining a normal form, we can re-use the coordinates of V for PG(d,q): A point of PG(d,q) which corresponds to the 1- dimensional subspace { (ta 0,ta 1,...,ta d ) t GF(q), (a 0,a 1,...,a d ) V } has homogeneous coordinates (0,...,0,1,a i+1 /a i,...,a d /a i ) if a 0 =a 1 =...=a i-1 =0, a i 0. A hyperplane of PG(d,q) is a (d-1)-dimensional subspace. PG(d,q) contains q d +q d q+1 points and the same number of hyperplanes. Hyperplanes can be described as those sets of points whose homogeneous coordinates satisfy a linear equation b 0 x 0 +b 1 x b d x d =0. This equation can be abbreviated as a kind of coordinate [b 0 :b 1 :...:b d ]. The normal form of a hyperplane coordinate is defined in the same way as for the homogeneous coordinates of points. For our fingerprinting scheme we need dual rational normal curves [6]. Without going into the theory behind these structures, they can simply be defined by their coordinates. A dual rational normal curve in PG(d,q) is the following set of hyperplanes: 5 = { [1:t:t 2 :...:t d ] t GF(q)} {[0:0:0:...:0:1]}. (1) These sets of hyperplanes generalize the property of a tetrahedron: Any i d hyperplanes from 5 intersect in a unique subspace of dimension d-i.

4 2.3. The RNC Scheme We can now use 5 to construct a d-detecting fingerprinting scheme with q+1 copies: Each fingerprint consists of the points of one of the hyperplanes from 5 which will be marked in the corresponding copy of the document. This rational normal curve scheme (RNC scheme) has the following properties: The RNC scheme is d-detecting: Given i d fingerprints, that is hyperplanes H 1,..., H i from 5, these hyperplanes intersect in a unique subspace U = H 1... H i. (For i=d this is a point.) From this unique subspace U all hyperplanes H 1,..., H i (and therefore all pirate customers) can be reconstructed due to the geometric properties of dual rational curves. The RNC scheme can generate q+1 copies: 5 contains exactly q+1 hyperplanes. If we omit the special hyperplane [0:0:...:0:1], we have the following algorithms for the generation and detection of pirates: Algorithm 1: Generation of fingerprints For customer I, choose i GF(q) and H i :=[1:i:i 2 :...:i d ]. Mark all marking points associated with points whose homogeneous coordinates have the form (a 0,a 1,...,a d-1,(-a 0 -a 1 i-...-a d-1 i d-1 )/i d ). (2) Algorithm 2: Detection of pirates Detect the marked points in a pirated copy of a document. Determine the largest projective subspace contained in this point set (this may be a single point). Let f be the dimension of this subspace. For one point (1,a 1,...,a d ) of this subspace, solve the equation 1 + a 1 t + a 2 t a d t d = 0 (3) for t in GF(q). Check if there are exactly d-f different solutions for t. If not, return an error message. The different solutions for t correspond to the indices of the pirate customer s hyperplanes. Algorithm 2 : Detection of pirates Detect the marked points in a pirated copy of a document. For a random sample of points (1,a 1,...,a d ), solve the equation 1 + a 1 t + a 2 t a d t d = 0 (4) for t in GF(q). For each sample point, a list of hyperplane indices will be issued. The indices of the pirate customer s hyperplanes are contained in these lists. To get the pirates indices, different algorithms must be used depending on the pirates cheating strategy: If the pirates follow a delete all known marks strategy, the pirates indices lie in the intersection of these lists. If the pirates follow a delete some known marks strategy, a majority vote has to be applied Open problems The main disadvantage of the RNC scheme is the limited number of copies that can be produced. This situation can be improved by combining two (or more) randomly chosen hyperplanes into a fingerprint. If we use each hyperplane only once, then this scheme is still d-detecting, but allows for ½(q d +q d q+1) copies. This scheme poses some problems concerning the traitor tracing algorithm and will be studied in the next phase of our project. 3. DIGITAL WATERMARKING FOR COLLUSION SECURE FINGERPRINTING FOR IMAGES Usually the known watermarking techniques spread the watermarking information all over the image data [3,4,5]. The embedding of the fingerprinting information with watermarking techniques requires an optimized watermarking scheme in the context of digital fingerprints since we have different requirements for the watermarking scheme here. Our watermarking scheme needs special marking points to integrate the fingerprinting information and to build the intersection of remaining fingerprinting elements after an attack in the intersection region. In the first section we present the watermarking algorithm in general for a maximal number d of pirates and for number q of copies that can be generated with the proposed fingerprinting scheme. In the following sections we describe the detailed embedding and retrieval algorithm. The watermarking algorithm is designed to use the original image in the retrieval process to get better results and avoid failures of customer detection.

5 3.1. Watermarking Algorithm Digital Watermarking is used to embed customer information generated by the fingerprinting algorithm to trace illegal image copies. Current digital watermarking techniques usually would embed the generated fingerprinting information FP randomly all over the image with the disadvantage, that the intersection of the proposed fingerprints can not be used to find attackers after comparing attacks of different customer copies. To use the excellent properties of the fingerprint to conclude to the customers which attacked the watermark we build a watermarking scheme with a fixed number of marking positions in each copy of the image. The fingerprinting algorithm selects the letters, the FP vector over the binary alphabet {0,1}. The watermarking algorithm embeds this binary FP vector at the chosen marking positions. The fingerprinting algorithm generates binary FP vectors of length q d +q d q+1 for each image. With this fingerprinting scheme a d-detecting binary FP vector can be generated to build q customer copies of the image. Each customer gets his specific binary FP vector which elements will be embedded at the same marking positions of the image. With these construction the only marking positions the pirates can detect are the differences in the binary FP vectors and they do not detect those positions which contain the same letter in all the compared images, the intersection of the fingerprints FP. Based on the remaining information it is possible to conclude to the customers. To give the watermarking scheme more robustness we embed each binary FP vector r 1 times, r 1 redundant, into the image. With these construction we need r 1 * (q d +q d q+1) marking positions. The marking positions will be generated randomly with a image specific secret user key of the copyright holder and image size as parameter. The embedding of the binary FP vector into the image at the defined marking positions is performed in the frequency domain to be more robust against compression. The image is divided into blocks, transformed into the frequency domain using a discrete cosinus transformation and quantized. The blocks correspond to the marking positions. If the block was selected randomly as marking position the DCT coefficients are modified with a watermarking sequence depending on the FP vector element. The retrieval uses the original and check image to evaluate the embedded watermarking sequence at the marking positions and retrieve the binary FP vector. The fingerprinting algorithm gets the vector as input parameter and produces the customer list Fingerprint Embedding The detailed embedding of the fingerprinting vector for each customer copy is performed in three steps. Figure 3: Embedding Scheme In the first step the fingerprinting vector FP for the customer is generated. The number of customer which can be delivered with a d-detecting fingerprint depends on the maximal number of available marking positions of the image. In step 2 the position sequences, the marking positions, are generated from the user key as a seed with a secure random number generator. In the order of the generated position sequence every marking position block is now discrete cosine transformed and the fingerprinting vector is embedded in the following way: 1. Parameter: Image I with height h and width w Binary FP vector v with length n = q d +q d q+1, v = (x 0, x 1, x 2, x 3...x n ) for example n=13, d=2, q=3 (3 customer): v 1 =( ), v 1 =( ), v 3 =( ), Redundancy for vector embedding: e.g. r 1 = 3 Redundancy for watermarking intensity of the single marking points r 2 : e.g. r 2 = 10 Embedding sequence for each vector element at the marking positions R: [-k,k], -4<=k<=4, parameter value k influences robustness and visibility Secret user key: k Watermarking strength: WMStrength 2. Calculation of the 8x8 blocks of the image: m

6 3. Calculation of the redundancy factor r 1, maximal n*r 1 =m 4. Pseudo random generation of r 1 *n block marking positions x i,j with the user key UK Number of FP vector bits (x 0,x 1, x 2, x 3,...x n ) Redund 1 ancy r r 1 0 x 0,1 x 0,2 x 0,3... x 0,r1 1 x 1,1 x 1,2 x 1,3... x 1,r1 2 x 2,1 x 2,2 x 2,3... x 2,r n x n,1 x n,2 x n,3... x n,r1 Table 1: n*r 1 Marking positions with redundancy r 1 Figure 4: Image marking blocks with redundancy 5. Before we embed the binary bits into the DCT coefficients of the marking blocks directly, we increase the signal difference by a generation of the n random sequences R i [-k,k], k=4, for embedding the single n fingerprinting information bits. Each FP vector element will be then embedded r 1 (e.g. 3) times and modifies r 2 (e.g. 10) DCT coefficients, by using the random sequence R ij for each FP vector bit with r 1 *r 2 (30) redundancy: FP vector bits x i = (x 0,x 1, x 2, x 3,...x n ) Random x i,1 sequences x i,2 for the marking x i,3 Positions n * r 1.. x i,r1 0 R 0,1 R 0,2 R 0,3... R 0,r1 1 R 1,1 R 1,2 R 1,3... R 1,r1 2 R 2,1 R 2,2 R 2,3... R 2,r n R n,1 R n,2 R n,3... R n,r1 Table 2: Random marking sequences R i,j for the marking positions, each R i,j has length r 2 For example, r 1 = 3, r 2 = 10 R 0 = (R 01, R 02, R 03) = (3,0,3,-1,1,1,0,3,-4,1 4,2,2...0,1 3,1,-1,-4,1,0,0,0,3,1)... R n-1(12) = (R 12,1, R 12,2, R 12,3) = (4,0,-4,-1,1,1,0,2,-4,1 2,3,2...0,1-4,1,-1,-2,1,0,3,4,3,1) 6. Embedding of the random sequences R i,j into the marking position blocks: 1. Extraction of the image RGB values 2. Extraction of the luminance values 3. DCT transformation of the luminance values 5. Quantization of the DCT-luminance values with the following weighted quantization matrix: low High Table 3: Quantization matrix

7 The matrix is weighted with the parameter watermarking strength, WMStrength [0,2], and influences the visiblity and robustness of the watermarking information (the fingerprint). 5. Embedding of the FP vector v = (x 0, x 1, x 2, x 3...x n ) with redundancy r 1, e.g. v r1=3 =(x 01, x 01, x 03, x 11, x 12, x 13,...,x n1, x n2, x n3 ) using the random sequence R ij. For each vector bit we use R i = (R i1, R i2, R i3) to embed v i =(x i1, x i1, x i3 ) with redundancy r 2 by adding the R i, 1(...3) to the DCT coefficients when x i is 1 otherwise we embed nothing 7. Retransform the luminance values, inverse quantization, inverse DCT and replacing original luminance of the block with the modified one. Figure 5: Embedding into the marking blocks DCT coefficients, e.g. x 01 The image has now modified luminance blocks if the FP vector bit is one else the original image block remains. The attacker can now work together, find differences, but the intersections of the fingerprinting information remains present for evaluation during retrieval Fingerprint Retrieval The retrieval of the fingerprinting information is performed with the check image and the original image to find the embedded watermarking sequence in the marking positions. The general retrieval steps can be seen in the next figure: Figure 6: Retrieval Scheme We have three main steps to retrieve the customer fingerprints back, the position generation, the retrieval of the watermarking information, which is the fingerprinting vector, and the evaluation of the extracted fingerprint to find the customer Ids. The input parameter of the position generation and retrieval are the user key, the original image and check image. First we calculate the differences between the original and the check image. All following steps use this difference image for retrieval. It is decoded into RGB values and the position generation of the marking points is performed. Then the marking blocks luminance values are DCT tranformed and quantized. The random sequences R i are generated and will be searched in the next steps over all marking position points. If we find a conformity we interpret the marking position with a 1 otherwise 0. The detailed retrieval steps are as follows: 1. Parameter: d and q for the fingerprinting system redundancy factor r 1, e.g. r 1 = 3 Redundancy for watermarking intensity of the single marking points r 2 : e.g. r 2 = 10

8 Search sequence for each vector element at the marking positions R: [-k,k], -4<=k<=4, parameter k influences robustness and visibility, [-4,4] Secret user key: UK Tolerance level 2. Calculation of difference image between original and check image 3. Pseudo random generation of r 1 *n block positions with the user key UK Number of FP vector bits (x 0,x 1, x 2, x 3,...x n ) Redund 1 ancy r r 1 0 x 0,1 x 0,2 x 0,3... x 0,r1 1 x 1,1 x 1,2 x 1,3... x 1,r1 2 x 2,1 x 2,2 x 2,3... x 2,r n x n,1 x n,2 x n,3... x n,r1 Table 4: n*r 1 Marking positions with redundancy r 1 4. Generation of the n random sequences R i [-k,k], k=4: FP vector bits x i = (x 0,x 1, x 2, x 3,...x n ) Random x i,1 sequences x i,2 for the marking x i,3 Positions n * r 1.. x i,r1 0 R 0,1 R 0,2 R 0,3... R 0,r1 1 R 1,1 R 1,2 R 1,3... R 1,r1 2 R 2,1 R 2,2 R 2,3... R 2,r n R n,1 R n,2 R n,3... R n,r1 Table 5: Random marking sequences R i,j for the marking positions, each R i,j has length r 2 In our example: R 0 = (R 01, R 02, R 03) = (3,0,3,-1,1,1,0,3,-4,1 4,2,2...0,1 3,1,-1,-4,1,0,0,0,3,1)... R n-1(12) = (R 12,1, R 12,2, R 12,3) = (4,0,-4,-1,1,1,0,2,-4,1 2,3,2...0,1-4,1,-1,-2,1,0,3,4,3,1) 5. Comparing the generated R ij with appropriate DCT coefficients at the marking positions. If there is a conformity we retrieve a 1 else a 0 Figure 7: Retrieval from the DCT coefficients During the embedding we have used the parameter watermarking strength. To get better retrieval results we should use the same watermarking strength for quantization. We try to estimate the original used watermarking strength in the following two steps: 1. first we quantize the blocks with 1 percent of the original quantization matrix. So we get high values of the watermarking sequence. We sum the absolute values of the generated R ij into SumOrgSequence and sum all the retrieved values into SumWMSequence. 2. Second we quantize the blocks now with quantization factor: 100/(SumWMSequence/SumOrgSequence). With these new factor we estimate the watermarking strength of the embedding process.

9 Extended Retrieval Usually the direct compare of the originally generated random sequences R ij with the retrieved sequences of the difference image will not be successful because of image transformations and modifications. Therefore our extended retrieval uses the whole R ij sequence of one FP vector bit for a comparison. We calculate the absolute sum, SUM1 = SumWMSequence, of each retrieved R ij again. Additionally we calculate SUM2, it is the sum over all absolute differences of the retrieved R ij and original R ij value. If we have embedded a 1 SUM2 should be 0. Then we calculate the number of marking positions for one bit of the FP vector, it is the product p = r 1 * r 2 and weight this product with the ToleranceValue t; t*p. That means we allow variation in the DCT coefficients. For example t = 1 means that every coefficient can vary up to 1. SUM1 is for the 0-decision, because if the fingerprinting bit was 0 we have not embedded any information into the blocks. If now SUM1*2 is less then the weighted product tp we retrieve a 0, if SUM2 is less then tp we retrieve a 1. If both checks fail the block was attacked and we set a 0 into the resulting fingerprinting vector. 4. TESTRESULTS We have tested our implementation with different images and performed first a robustness test of the watermarking algorithm and second the recognition test of attackers, the evaluation of the fingerprinting information. Ten examples should demonstrate the capabilities and the shortcomings of the algorithm. The following table shows the test results of the watermarking robustness tests after compression and after the watermark removing program StirMark [7]. StirMark combines various attacks. It simulates distortions caused by a printing and rescanning process. Furthermore it introduces some minor geometric distortions like stretching, shearing, rotations and shifting. It is reported that StirMark is very effective against most even commercial watermarking techniques. However, the distortions introduced by StirMark are unrecognisable. In the table the original image is displayed and the table entries give the watermarking parameter to withstand the attack. If there is no entry then there was no successful retrieval possible with an acceptable quality (minimum of 4). The quality parameter Q ranges from excellent (1), good (2), satisfying (3), basic (4), unexceptable (5). Parameter: WMStrength W Tolerance level T Visual quality: Q {1,...5} The tests show excellent visual quality factors in images where we have non-homogenous regions. Images with smooth blocks are more visually influenced by high watermarking strengths to withstand high compression. About 30% of the images could withstand very high compression of 90%, and 90% of the images could withstand 50% compression with the appropriate watermarking parameters. The StirMark attack was very successful if we used the original image and the stirmarked watermarked image. No fingerprint was retrieved correctly. We could improve the retrieval by performing also the Stirmark attack with the same parameter on the original image. In this extended retrieval we used the stirmarked original image and the stirmarked watermarked image. 70% of the images could be checked successful and the fingerprinting information was retrieved correctly. The remaining 30% error rate are caused by the scratching and shifting operations of StirMark where our watermarking positions could not be found correctly.

10 Images JPEG Stirmark 25% 50% 75% 85% 90% With Original W=0,1 W=0,4 W=0,7 W=2,0 With stirmarked Original - - W=0,8 T=1,0/1,5 W=0,1 W=0,4 W=0,5 W=0,4-3 W=0,8 T=1, W=0,8 T=1,0/1, T=1,0/1,5 W=1,0 W=1,2 T=2-3 - W=1,0 T=1,0 T=1,0 W=0,1 W=0,4 T=1,0,5 W=0,4 W=0,4-3 W=0,3 T=1,0 W=1,0-2 W=0,5 T=2, T=1,0 W=1,0-2 W=1,5 - W=1, W=0,5 T=2,5 W=1,0 T=2,5 W=1,6 T=2,5 Q=4 - T=1,0/1, T=1,0/1, Table 6: Test results of basic watermarking attacks W=0,5 The next table contains the error rates after comparing attack of different copies to remove the fingerprinting information. Out of a great variety of attacks, we have chosen the most significant one: Comparison of copies from 2 customer and selecting the average of the difference values Comparison of copies from 2 customer and replacing differences with surrounding colours Comparison of n copies and selecting the most frequently used position differences for all n image copies Comparison of n copies and selecting the less frequently used position differences for all n image copies

11 Two customer attack Average calculation Replacing by surroundings (no differences) Two and more customers (maximal d) Average calculation Correct customer recognition 70% 100% 55% 100% Table 7: Fingerprint attacks test results Customer 1 Customer 2 Difference Image Blocks Replacing by surroundings (no differences) Figure 8: Calculation of difference blocks by attackers Figure 8 shows the images of two customer and their difference image. The attack where the difference blocks are replaced by the average value of the images produces partly additional occurrences of 1 instead of 0 in the watermarking retrieval process. The current implementation of the fingerprinting evaluation tool supports only the strategy of maximal removal of the fingerprinting information. Therefore the creation of additional ones are not supported yet and the tool can not detect the concerned customers correctly. The attack of replacing surrounding image part with the difference blocks can be detected correctly with the fingerprinting tool. The original image is nearly reconstructed and produces 0 instead of 1 simulating maximal removal of the fingerprinting information. 5. OPEN PROBLEMS The watermarking algorithm has still problems with robustness against attacks like scaling, rotation, shifting or cutting and cropping the image. The first step is to extend the retrieval process to restore the check image before the difference image is generated. For example the retrieval is successful after scaling if we first scale the original image to the size of the check image, then we re-scale both to the original size and perform the check. We could reach 95% successful results by this proceeding. Secondly the watermarking algorithm is also improved to handle cropped image parts. The missing image regions will be detected and only the cropped image parts are used for the retrieval. Because we have used the redundancy r 1 the fingerprinting information is spread over the image more than once so that we have still marking positions in the remaining cropped image parts and can retrieve this information. The retrieval after the StirMark attack can be increased by using the detected difference blocks in the difference image between the stirmarked original and stirmarked watermarked image instead of using only the pseudo random sequence as correct marking positions. If we have an additional orientation for our watermarking blocks we could find the shifted watermarked blocks easier and improve the error rates of 70% easily. Our prototype implementation of the fingerprinting algorithm can only identify the customers if the strategy of maximal removal of the detected marking point differences has been used. All other kind of attacks, like partly modifications of differences are not supported today in our implementation but will be addressed in further work. 6. CONCLUSION In our paper we described a fingerprinting mechanisms and an appropriate watermarking scheme to embed customer information into images to trace illegal copies. Current digital fingerprinting has the disadvantage, that customers could work together as attackers to destroy the watermarking information by comparing their image data and remove the differences. With our proposed technique attackers could still work together, but our mechanisms provide the possibility to conclude to the customers which attacked the watermark.

12 Our robustness tests of the watermarking scheme based on DCT coefficients are mainly based on compression, format conversions and geometrical transformations. Format conversions are handled with very low error rates. Especially StirMark attacks could be handled more efficiently by performing the StirMark on the original image too to find the correct marking points back. The fingerprinting tests, comparing different image copies, are successful and the remaining intersection gives the possibility to trace the attackers. Altogether our tests show that the watermarking technology with special marking points are satisfying. In our future work we will address first the problems with visual distortions by high WMStrength parameter to withstand high compression and extreme scaling operations. Because each pseudo randomly selected image marking block is modified, artefacts are common especially in smooth blocks or in sharp edges. In our further research our experimental systems will adapt the strength of the embedded watermark to the HVS-properties using two parameters instead of uniformly modulate the luminance values: smoothness and edge character of the block. The edge characteristics could be based on the analysis of DCT values so that we can mostly detect vertical and horizontal edges. Smoothness and edge character will be the two main parameters. These are concerned in the algorithm and the expected visibility of the watermark can be calculated, resulting in a value which can be interpreted as the capability of the block to incorporate the watermark without visual distortions. Altogether digital watermarking to embed fingerprinting information is a pragmatic approach to de-motivate the illegal use of the copied data. Beside the development of watermarking algorithms our future goal is to design interactive tools which strengthen the producers acceptance to use digital watermarking techniques to offer their data in a more secure way in the digital marketplace. ACKNOWLEDGMENTS The research work described in this paper was performed jointly with Eva Saar from Telekom and we would like to thank her for many stimulating discussions and support. REFERENCES [1] A. Beutelspacher and U. Rosenbaum, Projective Geometry. Cambridge University Press [2] D. Boneh and J. Shaw, Collusion-Secure Fingerprinting for Digital Data. Proc. CRYPTO 95, Springer LNCS 963, pp , [3] I.J. Cox and M.L. Miller, A review of watermarking and the importance of perceptual modeling, Proc. of Electronic Imaging 97, February 1997 [4] J. Dittmann and M. Stabenau,, Digitale Wasserzeichen für MPEG Video, GMD Report 34, 1998 [5] J. Dittmann, M. Stabenau, R. Steinmetz, Ralf, Robust MEG Video Watermarking Technologies, Proceedings of ACM Multimedia 98, The 6 th ACM International Multimedia Conference, Bristol, England, pp , 1998 [6] J.W.P. Hirschfeld, Projective Geometries over Finite Fields. Oxford University Press, 2 nd Edition [7] F. Petitcolas and R. J. Anderson, Multimedia and Security, Workshop at ACM Multimedia 98, Bristol, U.K., September 12 13, GMD Report 41, pp , 1998

Combined video and audio watermarking: Embedding content information in multimedia data

Combined video and audio watermarking: Embedding content information in multimedia data Combined video and audio watermarking: Embedding content information in multimedia data Jana Dittmann a, Martin Steinebach a, Ivica Rimac b, Stephan Fischer b, and Ralf Steinmetz a,b a GMD - German National

More information

Multimedia Security: So What s the Big Deal?

Multimedia Security: So What s the Big Deal? Multimedia Security: So What s the Big Deal? Edward J. Delp Purdue University School of Electrical and Computer Engineering Video and Image Processing Laboratory (VIPER) West Lafayette, Indiana email:

More information

Image and Video Watermarking

Image and Video Watermarking Telecommunications Seminar WS 1998 Data Hiding, Digital Watermarking and Secure Communications Image and Video Watermarking Herbert Buchner University of Erlangen-Nuremberg 16.12.1998 Outline 1. Introduction:

More information

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT- Shaveta 1, Daljit Kaur 2 1 PG Scholar, 2 Assistant Professor, Dept of IT, Chandigarh Engineering College, Landran, Mohali,

More information

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function. Filtering -The image shown below has been generated by adding some noise in the form of a cosine function. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y)

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

FRAGILE WATERMARKING USING SUBBAND CODING

FRAGILE WATERMARKING USING SUBBAND CODING ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING

More information

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES H. I. Saleh 1, M. E. Elhadedy 2, M. A. Ashour 1, M. A. Aboelsaud 3 1 Radiation Engineering Dept., NCRRT, AEA, Egypt. 2 Reactor Dept., NRC,

More information

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,

More information

Sign-up Sheet posted outside of my office HFH 1121

Sign-up Sheet posted outside of my office HFH 1121 Lecture 14: Digital Watermarking II Some slides from Prof. M. Wu, UMCP Lab2 Demo Csil Monday: May 24, 1 4pm Optional (9:30 11am) 10 minutes per Group 5 Minutes Presentation 5 Minutes Demo Sign-up Sheet

More information

Compression-Compatible Fragile and Semi-Fragile Tamper Detection

Compression-Compatible Fragile and Semi-Fragile Tamper Detection Compression-Compatible Fragile and Semi-Fragile Tamper Detection Lisa M. Marvel George W. Hartwig, Jr. Charles Boncelet, Jr. Presentation by Peter Macko Motivation Direct Applications Establishing credibility

More information

Watermarking Moble Phone Color Images With Error Correction Codes

Watermarking Moble Phone Color Images With Error Correction Codes IOSR Journal of Electronics & Communication Engineering (IOSR-JECE) ISSN(e) : 2278-1684 ISSN(p) : 2320-334X, PP 05-09 www.iosrjournals.org Watermarking Moble Phone Color Images With Error Correction Codes

More information

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based

More information

ROBUST WATERMARKING OF REMOTE SENSING IMAGES WITHOUT THE LOSS OF SPATIAL INFORMATION

ROBUST WATERMARKING OF REMOTE SENSING IMAGES WITHOUT THE LOSS OF SPATIAL INFORMATION ROBUST WATERMARKING OF REMOTE SENSING IMAGES WITHOUT THE LOSS OF SPATIAL INFORMATION T.HEMALATHA, V.JOEVIVEK, K.SUKUMAR, K.P.SOMAN CEN, Amrita Vishwa Vidyapeetham, Coimbatore, Tamilnadu, India. hemahems@gmail.com

More information

Copy Protection for Multimedia Data based on Labeling Techniques

Copy Protection for Multimedia Data based on Labeling Techniques Copy Protection for Multimedia Data based on Labeling Techniques G.C. Langelaar, J.C.A. van der Lubbe, J. Biemond Department of Electrical Engineering, Information Theory Group Delft University of Technology

More information

A computer aided visual model for ensuring video watermarking transparency

A computer aided visual model for ensuring video watermarking transparency header for SPIE use A computer aided visual model for ensuring video watermarking transparency Jana Dittmann, Anirban Mukherjee and Martin Steinebach 1 GMD - German National Research Center for Information

More information

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT Noura Aherrahrou and Hamid Tairi University Sidi Mohamed Ben Abdellah, Faculty of Sciences, Dhar El mahraz, LIIAN, Department of

More information

Robustness Test of Discrete Cosine Transform Algorithm in Digital Image Watermarking on Android Platform

Robustness Test of Discrete Cosine Transform Algorithm in Digital Image Watermarking on Android Platform B I O D I V E R S IT A S ISSN: 1412-033X Volume 16, Number 1, April 2015 E-ISSN: 2085-4722 Pages: xx-xx DOI: 10.13057/biodiv/d1601xx Robustness Test of Discrete Cosine Transform Algorithm in Digital Image

More information

WATERMARKING FOR LIGHT FIELD RENDERING 1

WATERMARKING FOR LIGHT FIELD RENDERING 1 ATERMARKING FOR LIGHT FIELD RENDERING 1 Alper Koz, Cevahir Çığla and A. Aydın Alatan Department of Electrical and Electronics Engineering, METU Balgat, 06531, Ankara, TURKEY. e-mail: koz@metu.edu.tr, cevahir@eee.metu.edu.tr,

More information

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS SETIT 2005 3 rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 27-31, 2005 TUNISIA ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS Shiva Zaboli

More information

Image Steganography (cont.)

Image Steganography (cont.) Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm: (1) algorithm is split in 8x8 pixel squares

More information

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain Chinmay Maiti a *, Bibhas Chandra Dhara b a Department of Computer Science & Engineering, College of Engineering & Management, Kolaghat,

More information

CHAPTER-5 WATERMARKING OF COLOR IMAGES

CHAPTER-5 WATERMARKING OF COLOR IMAGES CHAPTER-5 WATERMARKING OF COLOR IMAGES 5.1 INTRODUCTION After satisfactorily developing the watermarking schemes for gray level images, we focused on developing the watermarking schemes for the color images.

More information

CHAPTER-4 WATERMARKING OF GRAY IMAGES

CHAPTER-4 WATERMARKING OF GRAY IMAGES CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do

More information

5.7. Fractal compression Overview

5.7. Fractal compression Overview 5.7. Fractal compression Overview 1. Introduction 2. Principles 3. Encoding 4. Decoding 5. Example 6. Evaluation 7. Comparison 8. Literature References 1 Introduction (1) - General Use of self-similarities

More information

Comparison of wavelet based watermarking techniques Using SVD

Comparison of wavelet based watermarking techniques Using SVD Comparison of wavelet based watermarking techniques Using SVD Prof.T.Sudha Department of Computer Science Vikrama Simhapuri University Nellore. Email- thatimakula_sudha@yahoo.com Ms. K. Sunitha Head, P.G

More information

Comparison of Digital Water Marking methods

Comparison of Digital Water Marking methods Comparison of Digital Water Marking methods Darshana Mistry Computer Engineer Department Gandhinagar Institute Of Technology Gandhinagar, India Abstract In Digital watermarking, image or video is embedded

More information

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

Chapter 3 Image Registration. Chapter 3 Image Registration

Chapter 3 Image Registration. Chapter 3 Image Registration Chapter 3 Image Registration Distributed Algorithms for Introduction (1) Definition: Image Registration Input: 2 images of the same scene but taken from different perspectives Goal: Identify transformation

More information

A Robust Video Hash Scheme Based on. 2D-DCT Temporal Maximum Occurrence

A Robust Video Hash Scheme Based on. 2D-DCT Temporal Maximum Occurrence A Robust Video Hash Scheme Based on 1 2D-DCT Temporal Maximum Occurrence Qian Chen, Jun Tian, and Dapeng Wu Abstract In this paper, we propose a video hash scheme that utilizes image hash and spatio-temporal

More information

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions

More information

Copyright Detection System for Videos Using TIRI-DCT Algorithm

Copyright Detection System for Videos Using TIRI-DCT Algorithm Research Journal of Applied Sciences, Engineering and Technology 4(24): 5391-5396, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: March 18, 2012 Accepted: June 15, 2012 Published:

More information

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover 38 CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING Digital image watermarking can be done in both spatial domain and transform domain. In spatial domain the watermark bits directly added to the pixels of the

More information

A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya

A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7776-7782 A New Algorithm for QR Code Watermarking Technique For Digital

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning C. SANTIAGO-AVILA, M. GONZALEZ LEE, M. NAKANO-MIYATAKE, H. PEREZ-MEANA Sección de Posgrado e Investigación, Esime Culhuacan Instituto

More information

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION D. AMBIKA *, Research Scholar, Department of Computer Science, Avinashilingam Institute

More information

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing Arash Ashtari Nakhaie, Shahriar Baradaran Shokouhi Iran University of Science

More information

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

An Efficient Watermarking Algorithm Based on DWT and FFT Approach An Efficient Watermarking Algorithm Based on DWT and FFT Approach S.Manikanda prabu Assistant Professor, Department of CSE, Tamilnadu College of Engineering, Coimbatore, India smaniprabume@gmail.com Dr.S.Ayyasamy

More information

Improved Geometric Warping-Based Watermarking

Improved Geometric Warping-Based Watermarking Improved Geometric Warping-Based Watermarking Dima Pröfrock, Mathias Schlauweg, Erika Müller Institute of Communication Engineering, Faculty of Computer Science and Electrical Engineering, University of

More information

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and

More information

Robust Watermark Algorithm using Genetic Algorithm

Robust Watermark Algorithm using Genetic Algorithm JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 23, 661-670 (2007) Short Paper Robust Watermark Algorithm using Genetic Algorithm CONG JIN AND SHI-HUI WANG * Department of Computer Science Central China

More information

A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm

A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm International Journal of Engineering Research and General Science Volume 3, Issue 4, July-August, 15 ISSN 91-2730 A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm

More information

Speech Modulation for Image Watermarking

Speech Modulation for Image Watermarking Speech Modulation for Image Watermarking Mourad Talbi 1, Ben Fatima Sira 2 1 Center of Researches and Technologies of Energy, Tunisia 2 Engineering School of Tunis, Tunisia Abstract Embedding a hidden

More information

Short Communications

Short Communications Pertanika J. Sci. & Technol. 9 (): 9 35 (0) ISSN: 08-7680 Universiti Putra Malaysia Press Short Communications Singular Value Decomposition Based Sub-band Decomposition and Multiresolution (SVD-SBD-MRR)

More information

A Robust Watermarking Algorithm For JPEG Images

A Robust Watermarking Algorithm For JPEG Images nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 7) A Robust Watermarking Algorithm For JPEG Images Baosheng Sun, Daofu Gong*, Fenlin Liu *Foundation

More information

Breaking the OutGuess

Breaking the OutGuess Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,

More information

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad

More information

Image Error Concealment Based on Watermarking

Image Error Concealment Based on Watermarking Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,

More information

Locating 1-D Bar Codes in DCT-Domain

Locating 1-D Bar Codes in DCT-Domain Edith Cowan University Research Online ECU Publications Pre. 2011 2006 Locating 1-D Bar Codes in DCT-Domain Alexander Tropf Edith Cowan University Douglas Chai Edith Cowan University 10.1109/ICASSP.2006.1660449

More information

H.264 STREAM REPLACEMENT WATERMARKING WITH CABAC ENCODING

H.264 STREAM REPLACEMENT WATERMARKING WITH CABAC ENCODING H.264 STREAM REPLACEMENT WATERMARKING WITH CABAC ENCODING Dekun Zou * and Jeffrey A Bloom ** * Technicolor Corporate Research dekun.zou@technicolor.com ABSTRACT This paper describes a watermarking method

More information

Using Daubechies' Wavelets and Error Correcting Coding. James Ze Wang and Gio Wiederhold. Stanford University, Stanford, CA 94305, USA ABSTRACT

Using Daubechies' Wavelets and Error Correcting Coding. James Ze Wang and Gio Wiederhold. Stanford University, Stanford, CA 94305, USA ABSTRACT WaveMark: Digital Image Watermarking Using Daubechies' Wavelets and Error Correcting Coding James Ze Wang and Gio Wiederhold Stanford University, Stanford, CA 94305, USA ABSTRACT As more and more digital

More information

QR Code Watermarking Algorithm based on Wavelet Transform

QR Code Watermarking Algorithm based on Wavelet Transform 2013 13th International Symposium on Communications and Information Technologies (ISCIT) QR Code Watermarking Algorithm based on Wavelet Transform Jantana Panyavaraporn 1, Paramate Horkaew 2, Wannaree

More information

Secure Data Hiding in Wavelet Compressed Fingerprint Images A paper by N. Ratha, J. Connell, and R. Bolle 1 November, 2006

Secure Data Hiding in Wavelet Compressed Fingerprint Images A paper by N. Ratha, J. Connell, and R. Bolle 1 November, 2006 Secure Data Hiding in Wavelet Compressed Fingerprint Images A paper by N. Ratha, J. Connell, and R. Bolle 1 November, 2006 Matthew Goldfield http://www.cs.brandeis.edu/ mvg/ Motivation

More information

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM 74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small

More information

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS Dr. N.MANOHARAN 1 Dr.R.BALASUBRAMANIAN 2 S.UMA NANDHINI 3 V.SUJATHA 4 1 Assistant Professor in Department of Computer Science,

More information

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme A Robust Color Image Watermarking Using Maximum Wavelet-Tree ifference Scheme Chung-Yen Su 1 and Yen-Lin Chen 1 1 epartment of Applied Electronics Technology, National Taiwan Normal University, Taipei,

More information

Robust Image Watermarking based on DCT-DWT- SVD Method

Robust Image Watermarking based on DCT-DWT- SVD Method Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete

More information

Improved Qualitative Color Image Steganography Based on DWT

Improved Qualitative Color Image Steganography Based on DWT Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V

More information

Part II Authentication Techniques

Part II Authentication Techniques Part II Authentication Techniques Authentication Codes Provides means for ensuring integrity of message Independent of secrecy - in fact sometimes secrecy may be undesirable! Techniques for Authentication

More information

MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ)

MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ) 5 MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ) Contents 5.1 Introduction.128 5.2 Vector Quantization in MRT Domain Using Isometric Transformations and Scaling.130 5.2.1

More information

Lecture 8 JPEG Compression (Part 3)

Lecture 8 JPEG Compression (Part 3) CS 414 Multimedia Systems Design Lecture 8 JPEG Compression (Part 3) Klara Nahrstedt Spring 2012 Administrative MP1 is posted Today Covered Topics Hybrid Coding: JPEG Coding Reading: Section 7.5 out of

More information

Introduction to Visible Watermarking. IPR Course: TA Lecture 2002/12/18 NTU CSIE R105

Introduction to Visible Watermarking. IPR Course: TA Lecture 2002/12/18 NTU CSIE R105 Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105 Outline Introduction State-of of-the-art Characteristics of Visible Watermarking Schemes Attacking Visible Watermarking

More information

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute

More information

CHAPTER-6 WATERMARKING OF JPEG IMAGES

CHAPTER-6 WATERMARKING OF JPEG IMAGES CHAPTER-6 WATERMARKING OF JPEG IMAGES 6.1 INTRODUCTION In the Chapter 4, we have discussed that we can improve the robustness of DCT and DWT based watermarking schemes against some well known attacks by

More information

Adaptive Fuzzy Watermarking for 3D Models

Adaptive Fuzzy Watermarking for 3D Models International Conference on Computational Intelligence and Multimedia Applications 2007 Adaptive Fuzzy Watermarking for 3D Models Mukesh Motwani.*, Nikhil Beke +, Abhijit Bhoite +, Pushkar Apte +, Frederick

More information

An Adaptive Color Image Visible Watermark Algorithm Supporting for Interested Area and its Application System Based on Internet

An Adaptive Color Image Visible Watermark Algorithm Supporting for Interested Area and its Application System Based on Internet MATEC Web of Conferences 25, 0301 8 ( 2015) DOI: 10.1051/ matecconf/ 20152 503018 C Owned by the authors, published by EDP Sciences, 2015 An Adaptive Color Image Visible Watermark Algorithm Supporting

More information

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize.

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize. Cornell University, Fall 2017 CS 6820: Algorithms Lecture notes on the simplex method September 2017 1 The Simplex Method We will present an algorithm to solve linear programs of the form maximize subject

More information

Block Mean Value Based Image Perceptual Hashing for Content Identification

Block Mean Value Based Image Perceptual Hashing for Content Identification Block Mean Value Based Image Perceptual Hashing for Content Identification Abstract. Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions

More information

MRT based Fixed Block size Transform Coding

MRT based Fixed Block size Transform Coding 3 MRT based Fixed Block size Transform Coding Contents 3.1 Transform Coding..64 3.1.1 Transform Selection...65 3.1.2 Sub-image size selection... 66 3.1.3 Bit Allocation.....67 3.2 Transform coding using

More information

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION Shaik Shaheena 1, B. L. Sirisha 2 VR Siddhartha Engineering College, Vijayawada, Krishna, Andhra Pradesh(520007),

More information

A New Spatial q-log Domain for Image Watermarking

A New Spatial q-log Domain for Image Watermarking 1 Ta Minh Thanh, 2 Pham Thanh Hiep, 3 Ta Minh Tam 1 Department of Network Security, Le Quy Don Technical University, 100 Hoang Quoc Viet, Cau Giay, Hanoi, Vietnam. E-mail: taminhjp@gmail.com 2 Le Quy Don

More information

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Comparison of Wavelet Based Watermarking Techniques for Various Attacks International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-3, Issue-4, April 2015 Comparison of Wavelet Based Watermarking Techniques for Various Attacks Sachin B. Patel,

More information

Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching

Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching Neha Agrawal and Marios Savvides Carnegie Mellon University

More information

Video Compression An Introduction

Video Compression An Introduction Video Compression An Introduction The increasing demand to incorporate video data into telecommunications services, the corporate environment, the entertainment industry, and even at home has made digital

More information

Perceptual Watermarks for Digital Images and Video

Perceptual Watermarks for Digital Images and Video Perceptual Watermarks for Digital Images and Video RAYMOND B. WOLFGANG, STUDENT MEMBER, IEEE, CHRISTINE I. PODILCHUK, MEMBER, IEEE, AND EDWARD J. DELP, FELLOW, IEEE Invited Paper The growth of new imaging

More information

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Feature Based Watermarking Algorithm by Adopting Arnold Transform Feature Based Watermarking Algorithm by Adopting Arnold Transform S.S. Sujatha 1 and M. Mohamed Sathik 2 1 Assistant Professor in Computer Science, S.T. Hindu College, Nagercoil, Tamilnadu, India 2 Associate

More information

PROTECTION OF WAVELET-BASED WATERMARKING SYSTEMS USING FILTER PARAMETRIZATION

PROTECTION OF WAVELET-BASED WATERMARKING SYSTEMS USING FILTER PARAMETRIZATION PROTECTION OF WAVELET-BASED WATERMARKING SYSTEMS USING FILTER PARAMETRIZATION Werner Dietl, Peter Meerwald, Andreas Uhl Department of Scientific Computing, University of Salzburg Jakob-Haringerstrasse

More information

ELE 201, Spring 2014 Laboratory No. 4 Compression, Error Correction, and Watermarking

ELE 201, Spring 2014 Laboratory No. 4 Compression, Error Correction, and Watermarking ELE 201, Spring 2014 Laboratory No. 4 Compression, Error Correction, and Watermarking 1 Introduction This lab focuses on the storage and protection of digital media. First, we ll take a look at ways to

More information

Real Time Hybrid Digital Watermarking Based On Key Dependent Basis Function

Real Time Hybrid Digital Watermarking Based On Key Dependent Basis Function International Journal of Scientific and Research Publications, Volume 5, Issue 1, January 2015 1 Real Time Hybrid Digital Watermarking Based On Key Dependent Basis Function Anjietha Khanna Department of

More information

Robust Digital Image Watermarking based on complex wavelet transform

Robust Digital Image Watermarking based on complex wavelet transform Robust Digital Image Watermarking based on complex wavelet transform TERZIJA NATAŠA, GEISSELHARDT WALTER Institute of Information Technology University Duisburg-Essen Bismarckstr. 81, 47057 Duisburg GERMANY

More information

IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc

IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc 0th European Signal Processing Conference (EUSIPCO 01) Bucharest, Romania, August 7-31, 01 IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION Catalin Dragoi, Dinu Coltuc

More information

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting

More information

Multimodal Biometric Watermarking Techniques: A Review

Multimodal Biometric Watermarking Techniques: A Review Multimodal Biometric Watermarking Techniques: A Review C.Karthikeyan 1, D.Selvamani 2 Assistant professor, Dept. of ECE, Einstein Engineering College, Tirunelveli, Tamilnadu, India 1 PG Student, Dept.

More information

FINGERPRINTING SCHEME FOR FILE SHARING IN TRANSFORM DOMAIN

FINGERPRINTING SCHEME FOR FILE SHARING IN TRANSFORM DOMAIN FINGERPRINTING SCHEME FOR FILE SHARING IN TRANSFORM DOMAIN S.Manikandaprabu 1 P.Kalaiyarasi 2 1 Department of CSE, Tamilnadu College of Engineering, Coimbatore, India smaniprabume@gmail.com 2 Department

More information

2D rendering takes a photo of the 2D scene with a virtual camera that selects an axis aligned rectangle from the scene. The photograph is placed into

2D rendering takes a photo of the 2D scene with a virtual camera that selects an axis aligned rectangle from the scene. The photograph is placed into 2D rendering takes a photo of the 2D scene with a virtual camera that selects an axis aligned rectangle from the scene. The photograph is placed into the viewport of the current application window. A pixel

More information

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai

More information

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION T.Punithavalli 1, S. Indhumathi 2, V.Karthika 3, R.Nandhini 4 1 Assistant professor, P.A.College of Engineering and Technology, pollachi 2 Student,

More information

Information and Communications Security: Encryption and Information Hiding

Information and Communications Security: Encryption and Information Hiding Short Course on Information and Communications Security: Encryption and Information Hiding Tuesday, 10 March Friday, 13 March, 2015 Lecture 10: Information Hiding Contents Covert Encryption Principles

More information

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Reversible Data Hiding Scheme for BTC- Compressed Images IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game

More information

A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function

A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function Walid Alakk Electrical and Computer Engineering Department Khalifa University of Science, technology and Research

More information

Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques

Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques Dr.Harpal Singh Professor, Chandigarh Engineering College, Landran, Mohali, Punjab, Pin code 140307, India Puneet Mehta Faculty,

More information

A WATERMARKING METHOD RESISTANT TO GEOMETRIC ATTACKS

A WATERMARKING METHOD RESISTANT TO GEOMETRIC ATTACKS A WATERMARKING METHOD RESISTANT TO GEOMETRIC ATTACKS D. Simitopoulos, D. Koutsonanos and M.G. Strintzis Informatics and Telematics Institute Thermi-Thessaloniki, Greece. Abstract In this paper, a novel

More information

Image processing and features

Image processing and features Image processing and features Gabriele Bleser gabriele.bleser@dfki.de Thanks to Harald Wuest, Folker Wientapper and Marc Pollefeys Introduction Previous lectures: geometry Pose estimation Epipolar geometry

More information

Forensic Image Recognition using a Novel Image Fingerprinting and Hashing Technique

Forensic Image Recognition using a Novel Image Fingerprinting and Hashing Technique Forensic Image Recognition using a Novel Image Fingerprinting and Hashing Technique R D Neal, R J Shaw and A S Atkins Faculty of Computing, Engineering and Technology, Staffordshire University, Stafford

More information

Compression of Stereo Images using a Huffman-Zip Scheme

Compression of Stereo Images using a Huffman-Zip Scheme Compression of Stereo Images using a Huffman-Zip Scheme John Hamann, Vickey Yeh Department of Electrical Engineering, Stanford University Stanford, CA 94304 jhamann@stanford.edu, vickey@stanford.edu Abstract

More information

An Adaptive Approach for Image Contrast Enhancement using Local Correlation

An Adaptive Approach for Image Contrast Enhancement using Local Correlation Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 12, Number 6 (2016), pp. 4893 4899 Research India Publications http://www.ripublication.com/gjpam.htm An Adaptive Approach for Image

More information

Steganography: Hiding Data In Plain Sight. Ryan Gibson

Steganography: Hiding Data In Plain Sight. Ryan Gibson Steganography: Hiding Data In Plain Sight Ryan Gibson What Is Steganography? The practice of concealing messages or information within other nonsecret text or data. Comes from the Greek words steganos

More information

CHAPTER 5 AUDIO WATERMARKING SCHEME INHERENTLY ROBUST TO MP3 COMPRESSION

CHAPTER 5 AUDIO WATERMARKING SCHEME INHERENTLY ROBUST TO MP3 COMPRESSION CHAPTER 5 AUDIO WATERMARKING SCHEME INHERENTLY ROBUST TO MP3 COMPRESSION In chapter 4, SVD based watermarking schemes are proposed which met the requirement of imperceptibility, having high payload and

More information