Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

Similar documents
Information and Communications Security: Encryption and Information Hiding

Robust Image Watermarking based on DCT-DWT- SVD Method

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Image Steganography (cont.)

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

Jeff Hinson CS525, Spring 2010

Multimedia Security: So What s the Big Deal?

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Robust Digital Image Watermarking based on complex wavelet transform

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Sign-up Sheet posted outside of my office HFH 1121

Image and Video Watermarking

Frequency Domain Watermarking: An Overview

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

Comparison of Digital Water Marking methods

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

Data Hiding in Video

A new robust watermarking scheme based on PDE decomposition *

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Watermarking Moble Phone Color Images With Error Correction Codes

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

Compression-Compatible Fragile and Semi-Fragile Tamper Detection

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

A Print-Scan Resilient Watermarking based on Fourier Transform and Image Restoration

Digital Watermarking: Combining DCT and DWT Techniques

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Hiding Fingerprint Minutiae in Images

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

QR Code Watermarking Algorithm based on Wavelet Transform

Final Review. Image Processing CSE 166 Lecture 18

A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function

A Survey: Digital Image Watermarking Techniques

On domain selection for additive, blind image watermarking

RST Invariant Digital Image Watermarking Based on Log-Polar Mapping and Phase Correlation

Lecture 8 Object Descriptors

A New Approach to Compressed Image Steganography Using Wavelet Transform

Digital Image Watermarking Using DWT Based DCT Technique

[Patil* et al., 5(7): July, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

A Robust Image Watermarking Scheme using Image Moment Normalization

CHAPTER-4 WATERMARKING OF GRAY IMAGES

Part III. Attacks and Countermeasures

Perceptual Watermarks for Digital Images and Video

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION

Digital Watermarking with Copyright Authentication for Image Communication

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Processing. Image Enhancement in the Frequency Domain

A Statistical Comparison of Digital Image Watermarking Techniques

Tampering Detection in Compressed Digital Video Using Watermarking

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Chapter 2 Various Problems in Visual Cryptography

Machine vision. Summary # 6: Shape descriptors

Lecture 5: Frequency Domain Transformations

A Robust A DCT-Based Digital Watermarking Scheme Using Important Feature Points

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

DIGITAL WATERMARKING OF VIDEO USING DCT AND EXTRACTION FROM ATTACKED FRAMES

A WATERMARKING METHOD RESISTANT TO GEOMETRIC ATTACKS

DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING

THE COMBINATION OF WATERMARKING ALGORITHMS FOR MP4 VIDEO

Speech Modulation for Image Watermarking

Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching

Implementation and Comparison of Watermarking Algorithms using DWT

Comparison of wavelet based watermarking techniques Using SVD

Robust Watermark Algorithm using Genetic Algorithm

Steganography. Brent McClain Rob Carey

Analysis of feature-based geometry invariant watermarking

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Multimodal Biometric Watermarking Techniques: A Review

IT Digital Image ProcessingVII Semester - Question Bank

Image Error Concealment Based on Watermarking

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Digital Image Watermarking: An Overview

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

Image Transformation Techniques Dr. Rajeev Srivastava Dept. of Computer Engineering, ITBHU, Varanasi

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

Towards a Telltale Watermarking Technique for Tamper-Proofing

Robust Digital Image Watermarking. Using Quantization and Back Propagation. Neural Network

Practical Image and Video Processing Using MATLAB

Digital watermarking techniques for JPEG2000 scalable image coding

A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya

A Novel Spatial Domain Invisible Watermarking Technique Using Canny Edge Detector

Digital video watermarking robust to geometric attacks and compressions

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

Robust DWT Based Technique for Digital Watermarking

Combined Hashing/Watermarking Method for Image Authentication

Image Authentication and Recovery Scheme Based on Watermarking Technique

Part II Authentication Techniques

Improved content based watermarking for images

Volume 2 No. 1 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

OVERVIEW OF DIGITAL WATERMARKING CATEGORIES AND TECHNIQUES

An Invisible, Robust and Secure DWT-SVD Based Digital Image Watermarking Technique with Improved Noise Immunity

Open Access Side-Informed Image Watermarking Scheme Based on Dither Modulation in the Frequency Domain

Rotation, Scale, and Translation Resilient Digital Watermark Based on Complex Exponential Function

RST ROBUST WATERMARKING SCHEMA BASED ON IMAGE NORMALIZATION AND DCT DECOMPOSITION

Transcription:

Filtering -The image shown below has been generated by adding some noise in the form of a cosine function. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function. - Using the additive property of FT, the FT of the noisy image will be F(u,v)+N(u,v) where F(u,v) is the FT of f(x,y) and N(u,v) is the FT of n(x,y). -We can remove this noise effectively in the frequency domain using FT (filter out the frequencies corresponding to the cosine function)

-2- Fourier Descriptors (T. Wallace and P. Wintz, "An efficient three-dimensional aircraft recognition algorithm using normalized fourier descriptors", Computer Graphics and Image Processing, vol. 13, pp. 99-126, 1980) Region Representation for 2D Recognition -Interms of boundaries (external characteristics) (good when shape information is important) -Interms of pixels comprising the region (internal characteristics) (good when texture, color, etc. are important) Region Description for 2D Recognition -Extract a number of features (descriptors) (e.g., length, orientation of lines, concavities etc.) -Descriptors can be used for recognition -Must be invariant to size, translation, and rotation

Fourier Descriptors -3- -Represent the boundary as a sequence of point coordinates by traversing the boundary, for example, in a counterclockwise order (x 0, y 0 ), (x 1, y 1 ),..., (x N 1, y N 1 ) (for simplicity, x(k) = x k and y(k) = y k ) -Treat each coordinate as a complex number -Consider the FT of s(k) z(k) = x(k) + jy(k), k = 0, 1,..., N 1 (u) = 1 N N 1 Σ z(k)e k=0 j2 k/n (u) are called the fourier descriptors of the bound- -The complex coefficients ary

-4- -Take the IFT z(k) = N 1 Σ (u)e u=0 j2 k/n Represent the boundary using a few fourier descriptors -Let s consider the first M terms of the sum only ẑ(k) = M 1 Σ (u)e j2 k/n, M < N u=0

Properties -5- -Fourier descriptors can be computed fast using FFT. -The zero descriptor (0) represents the center of gravity of the curve. -Atranslation of the curve by z 0 = x 0, y 0 affects only the (0) term: t(0) = (0) + z 0 -A rotation of the curve by an angle results in a phase shift of the coefficients: r(u) = (u)e i -Ascaling of the curve byafactor s (about the center of gravity of the curve) results in scaling of the Fourier coefficients: z s (k) = sz(k) s(u) = s (u) -A change in the starting point of curve traversal produces modulation of the Fourier descriptors: z p (k) = z(k k 0 ) p(u) = (u)e i2 k 0u/N Normalization -Translation invariance: set (0) = 0 (n) -Scale invariance: (n) = (1) ( (1) will always be the largest assuming the curve does not cross itself) -Rotation and starting point invariance: can be done but more complicated.

-10- Image Watermarking (J. O Ruanaidh and T. Pun, "Rotation, Scale and Translation Invariant Digital Image Watermarking", Signal Processing, vol 66, no. 3, pp. 303-318, 1998, on-line) Data hiding or steganography -Steganography deals with methods of embedding data within a medium (e.g., images) in an imperceptible way. -The invisibly embedded signal (watermark) completely characterizes the person who applied it on the image, and can be used as a proof of digital media ownership (copyright protection). Why itworks? -Data hiding techniques in images explore the noise or distortion masking property of the human visual system. -This property refers to the decrease in the perceived intensity of a visual stimulus when this is superimposed over another stimulus. Related areas

Encryption -11- -Data transmitted over a network may be protected from unauthorized receivers using cryptography techniques. -Only persons who possess the appropriate private key can decrypt the data using a public algorithm. - Once the data is decrypted, however, it can be freely distributed or manipulated. Authentication -Itisrelated to data integrity verification. -Should be able to signal a data integrity violation when significant modification of the visual content occur and pinpoint the image regions which have been altered. - In contrast to copyright protection, data inserted for authentication should be fragile (i.e., should be modified when the image is manipulated). Covert communications -Exchange of messages secretly embedded within images. -Being able to convey a fairly large amount of data is a basic requirements for such applications.

Requirements -12- -The modifications caused by watermark embedding should not degrade the perceived image quality. -Watermark signals should be characterized by great complexity to to able to produce an extensive set of well distinguishable watermarks (trustworthy detection). -Watermarks should be associated with a key which is used to cast, detect, or remove a watermark (private or public keys). -The watermark must be easily and securely detectable by the owner (i.e., using the key). - The watermark must be difficult or impossible to remove (i.e., without the key), at least without visibly degrading the original image. -The watermark must survive image modifications that are common to typical applications (e.g., filtering, compression) - Watermarks should not be recovered using statistical methods (i.e., should be image dependent). Steps in watermarking Generation: producing the watermark pattern, using an owner and/or image dependent key. Embedding: a superposition of the watermark signal on the original image. Detection: verifying whether the image under consideration hosts a certain watermark.

-13- Categorization of watermarking techniques Av ailability of original image during detection (1) Private or image escrow schemes *Require that the original image is available during detection. *Robust to a wide range of image manipulation including filtering and geometric manipulations such as cropping, scaling, rotation, etc. *Donot fit well in certain applications. (2) Oblivious or blind methods *Donot require the original image for watermark detection. *More general compared to private schemes. *Limited robustness to image modifications and attacks. Domain where the watermark signal is embedded (1) Spatial domain methods *Do data embedding in the spatial domain by modulating the intensity of certain pixels. (2) Transform domain methods *Modify the magnitude of the coefficients in an appropriate transform domain (e.g., DFT, DWT, DCT etc.)

-14- Rotation, Scale and Translation Invariant Digital Image Watermarking Overview of the method -Itisbased on the Fourier-Mellin transform. - The embedded marks are unaffected by any combination of rotation, scale, and translation. -Watermark is encoded using spread spectrum encoding: *Encoded watermark resembles a pseudo-random sequence. *This allows embedding messages of arbitrary length. *A secret key is needed for decoding the watermark (seed used to generate the pseudo-sequence). -The encoding scheme is coupled with an error-correcting scheme for improved robustness.

Fourier-Mellin transform -15- -It s the Fourier transform applied on a log-polar coordinate system. -The log-polar transform is defined as follows: where R and 0 <2 x = e cos( ) y = e sin( ) -There is a unique correspondence between (x, y) and (, )

-16- Rotation and scale invariance -Scaling in (x, y) domain corresponds to translation in (, ) domain. (sx, sy) --> ( + log(s), ) -Rotation in (x, y) domain corresponds to translation in (, ) domain. (xcos( ) ysin( ), xsin( ) + ycos( )) --> (, + ) -The magnitude of the Fourier-Mellin transform is invariant to translation. Rotation, scale and translation invariance -Consider the following two operators: (1) F which extracts the magnitude of the Fourier transform. (2) F M which extracts the magnitude of the Fourier-Mellin transform. -Consider an image f (x, y) which is translated, scaled, and rotated -Itcan be shown that ˆf (x, y) = RST f(x, y) [F M F] f (x, y) = [F M F] ˆf (x, y) (true for any combination of transformations and in any order)

-17-

-18- -There are many practical issues (see paper for details) *Computing the log-polar or inverse log-polar requires interpolation. *Both steps introduce some loss of information. Watermark embedding and extraction -The watermark is a 1D spread spectrum signal as discussed. -Each element is added to some percentage of the largest components in the invariant domain (i.e., Fourier-Mellin). -The variance of the spread spectrum signal indicates the strength of the watermark. -The diagram below illustrates the extraction of the watermark.

Experiments -19- - The authors demonstrate the robustness of their method to rotation, scale, translation. - Also, they demonstrate reasonable robustness to JPEG compression (50%-75% quality factor) and cropping (50%). -Ittakes 7 sec to embed a message and 5 sec to extract it.