Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication. By:

Similar documents
A Robust Image Watermarking Scheme using Image Moment Normalization

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Robust Lossless Data Hiding. Outline

Robust biometric image watermarking for fingerprint and face template protection

A Study and Analysis on a Perceptual Image Hash Algorithm Based on Invariant Moments

Combined Hashing/Watermarking Method for Image Authentication

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Data Hiding in Video

A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya

Image Steganography (cont.)

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

QR Code Watermarking Algorithm based on Wavelet Transform

Image and Video Watermarking

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

Digital watermarking techniques for JPEG2000 scalable image coding

Multimedia Security: So What s the Big Deal?

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

Information and Communications Security: Encryption and Information Hiding

Block Mean Value Based Image Perceptual Hashing for Content Identification

Comparison of wavelet based watermarking techniques Using SVD

Robust Image Watermarking based on DCT-DWT- SVD Method

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

A Novel Blind Hybrid SVD and DCT Based Watermarking Schemes

Towards a Telltale Watermarking Technique for Tamper-Proofing

Digital Watermarking using Integration of DWT & SVD Techniques

Robust Zero Watermarking for Still and Similar Images Using a Learning Based Contour Detection

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

2015 SCITEPRESS (Science and Technology Publications, Lda.) Originally published in the SCITEPRESS Digital Library (

EMBEDDING WATERMARK IN VIDEO RECORDS

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Multibit Digital Watermarking Robust against Local Nonlinear Geometrical Distortions

A Robust Image Watermarking Technique Using Luminance Based Area Selection and Block Pixel Value Differencing

CHAPTER-5 WATERMARKING OF COLOR IMAGES

Watermarking Moble Phone Color Images With Error Correction Codes

A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

ROBUST WATERMARKING OF REMOTE SENSING IMAGES WITHOUT THE LOSS OF SPATIAL INFORMATION

A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform

Multilayer Data Embedding Using Reduced Difference Expansion

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

Image Authentication and Recovery Scheme Based on Watermarking Technique

Invisible Video Watermarking For Secure Transmission Using DWT and PCA

Part II Authentication Techniques

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

Comparison of DWT-CRT And TLDCT-CRT Methods In Digital Watermarking

Optimized Watermarking Using Swarm-Based Bacterial Foraging

CHAPTER-4 WATERMARKING OF GRAY IMAGES

Robust Digital Image Watermarking. Using Quantization and Back Propagation. Neural Network

Digital Image Processing

Improvements on Image Authentication and Recovery Using Distributed Source Coding

A new robust watermarking scheme based on PDE decomposition *

Copy Protection for Multimedia Data based on Labeling Techniques

Hiding Fingerprint Minutiae in Images

FRAGILE WATERMARKING USING SUBBAND CODING

XML Digital Watermarking

A Color Image Digital Watermarking Scheme Based on SOFM

Recent Researches in Applied Informatics and Remote Sensing

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION

A Robust Watermarking Algorithm For JPEG Images

Speech Modulation for Image Watermarking

Digital Watermarking with Copyright Authentication for Image Communication

APPLICATION OF CONTOURLET TRANSFORM AND MAXIMUM ENTROPY ON DIGITAL IMAGE WATERMARKING

WATERMARKING FOR LIGHT FIELD RENDERING 1

A CRYPTOGRAPHICALLY SECURE IMAGE WATERMARKING SCHEME

Robust Blind Digital Watermarking in Contourlet Domain

Perceptual Watermarks for Digital Images and Video

Adaptive Kernel Regression for Image Processing and Reconstruction

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Digital Image Steganography Using Bit Flipping

Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching

Digital Image Steganography Techniques: Case Study. Karnataka, India.

A Robust Video Hash Scheme Based on. 2D-DCT Temporal Maximum Occurrence

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

Deepa Kundur and Dimitrios Hatzinakos. 10 King's College Road. Department of Electrical and Computer Engineering. University of Toronto

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

ROBUST WATERMARKING OF DIGITAL IMAGES BASED ON CHAOTIC MAPPING AND DCT

A Digital Video Watermarking Algorithm Based on LSB and DCT

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Comparative Analysis of Video Watermarking Scheme Using Different Wavelets & SVD

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

Provision of safety of interactive systems - problems and solutions

Compression-Compatible Fragile and Semi-Fragile Tamper Detection

Available online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)

Robust and Imperceptible Image Watermarking by DC Coefficients Using Singular Value Decomposition

Watermarking 3D images and 3D meshes

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

Image watermarking based on scale-space representation

QR Code Watermarking Algorithm Based on DWT and Counterlet Transform for Authentication

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

An Improved Performance of Watermarking In DWT Domain Using SVD

Transcription:

Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication By: Ravi Andem Todd Yarrington (randem@mix.wvu.edu) (tyarring@mix.wvu.edu)

Motivation Encryption of valuable images Keep track of original digital images being distributed to buyers Copyright protection

Main Idea The work on spatial domain digital watermarking of multimedia objects for buyer authentication by Mukherjee, Maitra and Acton exhibits the following: Image owner authentication Survival of watermark Spatial domain Frequency domain No visual degradation

Overview of Presentation 1. Introduction of Work 2. Generation of Image and Buyer Keys 3. Watermarking 4. Analysis of Results 5. Limitations 6. Suggested Improvements & Future Work 7. Conclusion

1. Introduction of work Use watermarking to encrypt images What is watermarking? Basically a hidden message Text Image Data, etc. In this case, the authors use a unique binary vector to decide where to hide numbers in certain groups of pixels

1. Introduction of work (cont d) Watermarking Process

2. Generation of Image and Buyer Key Image Key Random spatial division of the multimedia object into a set of disjoint subsets Part of image to be watermarked 2 2n-1 (a+b-1) = possible image keys/image Image key of the same part of image

2. Generation of Image and Buyer Key (cont d) Buyer Key Binary vector, B Length of B = m = 2 n = # of groups B β B is selected from C C is set of error correcting codes M distinct codewords in C (with Hamming Distance at least d) β is the number added to the intensity at a position

2. Generation of Image and Buyer Key (cont d) Reed-Muller Code Set of 2 n bit long codewords (CW) Containing M=2 n+1 distinct CWs with minimum distance d=2 n-1 Example: for n = 2, d = 2 0000 0011 0101 1010 1100 0110 1111 1001

3. Watermarking Insertion of Watermark Original image is spatially divided into a number of blocks based on image key Image intensity of each block is modulated depending on bit values of buyer key Group 0 1 2 3 Example: β = 1 0-1 0

3. Watermarking (cont d) Retrieval of Watermark Original and Watermarked images compared block by block (block info. obtained from the image key) Depending on extent of intensity modification in each block, a probable buyer key is generated Generated buyer key is mapped to exact buyer key by correcting the errors using correcting codes

3. Watermarking (cont d) Identifying Buyer Key From Attacked Watermarked Image Image information may be changed so much, σ k, that it could be interpreted by the retrieval system as something completely different Toleration factor c k is used for weighting δ k

3. Watermarking (cont d) Analysis of Watermark Retrieval Process

3. Watermarking (cont d) Resistance to Nonlinear Attacks Nonlinear attacks include: JPEG Compression attack Stirmark Geometric attack

Implementation 256X256 Peppers Input Image Divided into 128 groups (512 pixels per group) 128 bit Reed Muller Code for generating buyer key Simulated Spatial and frequency domain attacks

4. Analysis of Results Cryptographic Robustness in Spatial Domain Results Robust to spatial domain attacks such as: Low pass filtering Median filtering Rotation Robust to frequency domain attacks

4. Analysis of Results (cont d) Performance Against Spatial Domain Attack Low-pass filtering

4. Analysis of Results (cont d) Performance Against Spatial Domain Attack Low-pass filtering

4. Analysis of Results (cont d) Performance Against Spatial Domain Attack Median filtering

4. Analysis of Results (cont d) Performance Against Spatial Domain Attack Median filtering

4. Analysis of Results (cont d) Performance Against Spatial Domain Attack Rotation

4. Analysis of Results (cont d) Performance Against Spatial Domain Attack Rotation

4. Analysis of Results (cont d) Performance Against Frequency Domain Attack

4. Analysis of Results (cont d) Performance Against Frequency Domain Attack

4. Analysis of Results (cont d) Authentication of Buyer Key Find the codeword q closest to q q is the retrieved buyer key Incorrect retrieval is improbable over the complete range of possible tolerance factors

5. Limitations Limitations of the paper include: If number of errors exceeds d/2 then the scheme fails Does not use a buyer specific image key

6. Suggested Improvements & Future Work Use non-uniform values of β(i,j). This can increase robustness to attacks on watermarked image Use a buyer specific image key Simulate nonlinear attacks like JPEG compression.

7. Conclusion Introduced to the problem of Identification of Copyright material Proposed method survives attacks in: frequency domain spatial domains Proposed Improvements

Thank you! Any questions/comments/suggestions?

References D.P. Mukherjee, S. Maitra, and S.T. Acton. Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication. IEEE Trans. On Multimedia, Vol. 6, No.1, Feb. 2004.