Watermarking 3D images and 3D meshes

Similar documents
Image Steganography (cont.)

Information and Communications Security: Encryption and Information Hiding

A New Approach to Compressed Image Steganography Using Wavelet Transform

Jeff Hinson CS525, Spring 2010

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING

Data Hiding in Video

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Multimedia Security: So What s the Big Deal?

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

Laboratoire d'informatique, de Robotique et de Microélectronique de Montpellier Montpellier Cedex 5 France

Breaking the OutGuess

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Steganography. Brent McClain Rob Carey

Robust Lossless Data Hiding. Outline

A DCT-BASED DATA-HIDING METHOD TO EMBED THE COLOR INFORMATION IN A JPEG GREY LEVEL IMAGE

Image and Video Watermarking

Piecewise Permutation Steganography for 3D Humanoid Mesh Models

DATA HIDING IN H.264 VIDEO FOR LOSSLESS RECONSTRUCTION OF REGION OF INTEREST

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

3-D D Digital Watermarking

A Novel Information Security Scheme using Cryptic Steganography

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

[Patil* et al., 5(7): July, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

2

A histogram shifting based RDH scheme for H. 264/AVC with controllable drift

Introduction to Visible Watermarking. IPR Course: TA Lecture 2002/12/18 NTU CSIE R105

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION

A Grey-Level Image Embedding its Color Palette

Application of Data Hiding in Audio-Video Using Advance Algorithm

A Robust Image Hiding Method Using Wavelet Technique *

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

A Digital Video Watermarking Algorithm Based on LSB and DCT

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

International Journal of Computer Engineering and Applications,

Digital Image Steganography Using Bit Flipping

Reversible Data Hiding in Encrypted Images with Private Key Cryptography

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression

A Image Steganography based on Non-uniform Rectangular Partition

Comparison of wavelet based watermarking techniques Using SVD

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function

Part II Authentication Techniques

Cryptography MIS

Invisible Video Watermarking For Secure Transmission Using DWT and PCA

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

LSB Based Audio Steganography Using Pattern Matching

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata

Watermarking Using Bit Plane Complexity Segmentation and Artificial Neural Network Rashmeet Kaur Chawla 1, Sunil Kumar Muttoo 2

FPGA IMPLEMENTATION OF INVISIBLE VIDEO WATERMARKING USING DWT TECHNIQUE

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

Face Protection by Fast Selective Encryption in a Video

Block-based Watermarking Using Random Position Key

COMPARISON OF WATERMARKING TECHNIQUES DWT, DWT-DCT & DWT-DCT-PSO ON THE BASIS OF PSNR & MSE

A Secure Steganography Technique using DCT and Modified RC4

Random Image Embedded in Videos using LSB Insertion Algorithm

Enhanced Watermarking Scheme for 3D Mesh Models

A Framework to Reversible Data Hiding Using Histogram-Modification

II. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca

A Color Image Hidden in a Grey-Level Image

Appendix A. Definition of Terms

Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

A Novel Method for Compressing Encrypted Images using Auxiliary Information

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication. By:

Efficient & Secure Data Hiding Using Secret Reference Matrix

Steganography Process- A Review

A Novel Spatial Domain Invisible Watermarking Technique Using Canny Edge Detector

Security. Communication security. System Security

International Journal of Science and Engineering Research (IJ0SER), Vol 3 Issue 5 May , (P) X

Overview Of Techniques Of Stegnography On Various Media

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

Research Article Volume 6 Issue No. 12

A Robust Image Watermarking Scheme using Image Moment Normalization

GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption

Improved Qualitative Color Image Steganography Based on DWT

Comparision in cover media under Stegnography Digital media by Hide and Seek Approach

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique

A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform

A Survey : Video Steganography techniques

Image Steganography Method Using Integer Wavelet Transform

Introduction. Ahmet Burak Can Hacettepe University. Information Security

A NOVEL METHOD FOR HIDING INFORMATION

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

A Robust Watermarking Scheme Based on Steerable Pyramid and Singular Value Decomposition

International Journal of Advance Research in Engineering, Science & Technology

Transcription:

Watermarking 3D images and Applications for cultural heritage William PUECH LIRMM Laboratoire d Informatique, de Robotique et de Microélectronique de Montpellier UMR 5506 CNRS, University of Montpellier, France May, 19 th of 2008 W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 1 / 48

Outline 1 Introduction The problem Previous work in the LIRMM 2 Visual data protection Data encryption Watermarking 3 3D Watermarking 3D images 4 Conclusion W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 2 / 48

Outline Introduction 1 Introduction The problem Previous work in the LIRMM 2 Visual data protection Data encryption Watermarking 3 3D Watermarking 3D images 4 Conclusion W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 3 / 48

Outline Introduction The problem 1 Introduction The problem Previous work in the LIRMM 2 Visual data protection Data encryption Watermarking 3 3D Watermarking 3D images 4 Conclusion W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 4 / 48

Introduction The problem Safe visual data transfer: the problem Safe transfer of visual data with high resolution. W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 5 / 48

Introduction The problem Safe visual data transfer: the problem 3D Visualisation on line. W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 6 / 48

Introduction The problem Safe visual data transfer: the problem Safe Transfer and visualisation on line in real time for low powered systems (wireless devices). W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 7 / 48

Introduction The problem Safe visual data transfer: the objectives To transfer safe visual data To Have Confidential data during and after Transfer To Ensure the Integrity (perceptual) and the Authenticity of data To Hide associated data (high capacity) in Image To Access in different resolution levels of visual data To Process in Real Time To Reduce the data size. W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 8 / 48

Introduction The problem Safe visual data transfer: the objectives To transfer safe visual data To Have Confidential data during and after Transfer To Ensure the Integrity (perceptual) and the Authenticity of data To Hide associated data (high capacity) in Image To Access in different resolution levels of visual data To Process in Real Time To Reduce the data size. W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 8 / 48

Introduction The problem Safe visual data transfer: the objectives To transfer safe visual data To Have Confidential data during and after Transfer To Ensure the Integrity (perceptual) and the Authenticity of data To Hide associated data (high capacity) in Image To Access in different resolution levels of visual data To Process in Real Time To Reduce the data size. W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 8 / 48

Introduction The problem Possible solutions: data encryption or watermarking Encryption or watermarking for safe visual data transfer Robust to noise Compatible with a compression Fast: access in real time The secret is based on a key (secrete or private key) The Algorithm is known Principle of Kerckhoffs [KER 83] Norms and standards A. Kerckhoffs. La cryptographie militaire. Journal des sciences militaires, vol. 9, pp. 5 38, 1883. W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 9 / 48

Introduction The problem Possible solutions: data encryption or watermarking Encryption or watermarking for safe visual data transfer Robust to noise Compatible with a compression Fast: access in real time The secret is based on a key (secrete or private key) The Algorithm is known Principle of Kerckhoffs [KER 83] Norms and standards A. Kerckhoffs. La cryptographie militaire. Journal des sciences militaires, vol. 9, pp. 5 38, 1883. W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 9 / 48

Introduction The problem Possible solutions: data encryption or watermarking Encryption or watermarking for safe visual data transfer Robust to noise Compatible with a compression Fast: access in real time The secret is based on a key (secrete or private key) The Algorithm is known Principle of Kerckhoffs [KER 83] Norms and standards A. Kerckhoffs. La cryptographie militaire. Journal des sciences militaires, vol. 9, pp. 5 38, 1883. W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 9 / 48

Outline Introduction Previous work in the LIRMM 1 Introduction The problem Previous work in the LIRMM 2 Visual data protection Data encryption Watermarking 3 3D Watermarking 3D images 4 Conclusion W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 10 / 48

Safe Image Transfer Introduction Previous work in the LIRMM a) b) c) a) Original image. b) Embedded image with a message of 512 bits using the DCT based data hiding method. c) Difference between (a) and (b). W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 11 / 48

Introduction Previous work in the LIRMM Safe Image Transfer (a) (b) a) Original image, b) Original image histogram c) Encrypted image with the stream cipher algorithm, with a key of 128 bits d) Histogram of the image (c). (c) W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 12 / 48 (d)

Safe Image Transfer Introduction Previous work in the LIRMM a) b) a) Original image. b) Transfer of compressed Image with a Safe ROI. c) Reconstruction of the High Resolution Definition of the ROI. c) W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 13 / 48

Introduction Previous work in the LIRMM Safe Image Transfer (a) (b) (c) (d) a) The original image, b) The associated binary mask, c) Color watermarked image, d) Difference between original color image and color watermarked image. W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 14 / 48

Safe Image Transfer Introduction Previous work in the LIRMM (a) (b) a) 5 degree rotation of color watermarked image "Fish", b) The label of fish color image with watermarked blocks. W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 15 / 48

Outline Visual data protection 1 Introduction The problem Previous work in the LIRMM 2 Visual data protection Data encryption Watermarking 3 3D Watermarking 3D images 4 Conclusion W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 16 / 48

Outline Visual data protection Data encryption 1 Introduction The problem Previous work in the LIRMM 2 Visual data protection Data encryption Watermarking 3 3D Watermarking 3D images 4 Conclusion W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 17 / 48

Data encryption Visual data protection Data encryption Data encryption The art to mask the data: confidentiality : data protection authenticity : emitter and receiver integrity : ensure the totality and the content of the data non repudiation : ACK W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 18 / 48

Visual data protection Data encryption Perceptual signature: data integrity Signature of a text M1 = Aujourd hui il fait beau dans le sud de la France, même si il y a un peu de vent... S1 = Ox2534A8C08E12F4A8 M2 = Aujourd hui il fait beau dans le sud de la France, même si il y a un peu de mistral... S2 = Ox3D68AB9310E38B51 Signature of visual data S1(original image (760 kb)) W. PUECH (LIRMM CNRS/UMII) = S2(compressed image (224 kb)) Watermarking 3D images and May, 19th of 2008 19 / 48

Visual data protection Data encryption Perceptual signature: data integrity Signature of a text M1 = Aujourd hui il fait beau dans le sud de la France, même si il y a un peu de vent... S1 = Ox2534A8C08E12F4A8 M2 = Aujourd hui il fait beau dans le sud de la France, même si il y a un peu de mistral... S2 = Ox3D68AB9310E38B51 Signature of visual data S1(original image (760 kb)) W. PUECH (LIRMM CNRS/UMII) = S2(compressed image (224 kb)) Watermarking 3D images and May, 19th of 2008 19 / 48

Outline Visual data protection Watermarking 1 Introduction The problem Previous work in the LIRMM 2 Visual data protection Data encryption Watermarking 3 3D Watermarking 3D images 4 Conclusion W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 20 / 48

Visual data protection Watermarking Watermarking Watermarking and Data Hiding The art to embed message in perceptual data: invisibility: statistically invisible no removable: robust to transformations and attacks payload: size of the hidden message Data hiding: large payload Steganography: invisibility Watermarking: robust to attacks W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 21 / 48

Visual data protection Watermarking Watermarking Watermarking and Data Hiding The art to embed message in perceptual data: invisibility: statistically invisible no removable: robust to transformations and attacks payload: size of the hidden message Data hiding: large payload Steganography: invisibility Watermarking: robust to attacks W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 21 / 48

Outline 3D Watermarking 1 Introduction The problem Previous work in the LIRMM 2 Visual data protection Data encryption Watermarking 3 3D Watermarking 3D images 4 Conclusion W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 22 / 48

Outline 3D Watermarking 3D images 1 Introduction The problem Previous work in the LIRMM 2 Visual data protection Data encryption Watermarking 3 3D Watermarking 3D images 4 Conclusion W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 23 / 48

3D Watermarking 3D images Image watermarking: LSB substitution #17 #54 #83 Figure: 125 original slides of Baton Percé #17 #54 #83 Figure: 125 watermarked slides of Baton Percé W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 24 / 48

3D Watermarking 3D images Image watermarking: LSB substitution Analyze original size: 125 slides 382 82 pixels watermarking with a text file: 5.4 kbytes: PNSR = 70.5 db watermarking with an image of 25.8 kbytes: PNSR = 63.8 db watermarking with a 3D file of 472.4 kbytes: PNSR = 51.2 db #17 #54 #83 W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 25 / 48

3D Watermarking 3D images Image watermarking: LSB substitution (a) Figure: 3D Reconstruction: a) From the original data, b) From the watermarked data. (b) W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 26 / 48

Outline 3D Watermarking 1 Introduction The problem Previous work in the LIRMM 2 Visual data protection Data encryption Watermarking 3 3D Watermarking 3D images 4 Conclusion W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 27 / 48

3D Watermarking 3D watermarking based on MST References P. Amat, W. Puech, S. Druon and J.P. Pedeboy Lossless Data Hiding Method Based on MST and Topology Changes of 3D Triangular Mesh Proceedings of the 16th European Signal Processing Conference, Lausanne, Switzerland, 2008 Algorithm MST construction, Search of quadruples, Selection of quadruples based on coplanarity and convexity, Embed one bit in each selected quadruple. W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 28 / 48

3D Watermarking 3D watermarking based on MST Figure: Selection of quadruples in the MST. W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 29 / 48

3D Watermarking 3D watermarking based on MST Figure: Data hiding of a 0-bit or a 1-bit. W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 30 / 48

3D Watermarking 3D watermarking based on MST Advantages Global High payload Any modification of the vertex positions Inconvenient No robust to noise W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 31 / 48

3D Watermarking 3D Watermarking Baton Percé : 102173 vertices. With a threshold of 1 degree: message = 4466 bits (Hausdorff s error = 0.001637). With a threshold of 30 degree: message = 21698 bits (Hausdorff s error = 0.029063) W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 32 / 48

3D Watermarking 3D Watermarking W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 33 / 48

3D Watermarking 3D Watermarking W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 34 / 48

3D Watermarking 3D Watermarking W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 35 / 48

3D Watermarking 3D Watermarking W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 36 / 48

3D Watermarking 3D Watermarking W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 37 / 48

3D Watermarking 3D Watermarking W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 38 / 48

3D Watermarking 3D Watermarking W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 39 / 48

3D Watermarking 3D Watermarking W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 40 / 48

3D Watermarking 3D Watermarking W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 41 / 48

3D Watermarking Robust 3D watermarking References F. Cayre and B. Macq Data Hiding on 3D Triangle Meshes IEEE Transactions on Signal Processing, 2003 W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 42 / 48

3D Watermarking Robust 3D watermarking Algorithm Choice of a fisrt triangle ABC, Choice of a reference edge AB, Divide AB in several parts, Associate each part to a 0-bit or a 1-bit, Move the vertex C in order to have a projection of C on AB in a wished part. W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 43 / 48

3D Watermarking Robust 3D watermarking Figure: Overview of the method. W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 44 / 48

3D Watermarking Robust 3D watermarking Advantage Invisible Robust to noise Inconvenient Local W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 45 / 48

3D Watermarking 3D Watermarking (a) (b) Figure: a) Original 3D object Smilodon 508796 vertices, b) Watermarked 3D object with 314071 bits (= 38.3 kbytes) W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 46 / 48

Outline Conclusion 1 Introduction The problem Previous work in the LIRMM 2 Visual data protection Data encryption Watermarking 3 3D Watermarking 3D images 4 Conclusion W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 47 / 48

Conclusion Conclusion Visual data protection is necessary, First proposed methods: high payload but not robust to noise or robust to noise with a small paylaod, But not robust to cropping for example. W. PUECH (LIRMM CNRS/UMII) Watermarking 3D images and May, 19 th of 2008 48 / 48