Sign-up Sheet posted outside of my office HFH 1121

Similar documents
Multimedia Forensics for Traitors Tracing. Multimedia Forensics for Traitors Tracing

Image and Video Watermarking

Image Steganography (cont.)

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

CHAPTER-6 WATERMARKING OF JPEG IMAGES

An Improved Images Watermarking Scheme Using FABEMD Decomposition and DCT

Multimedia Security: So What s the Big Deal?

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

Combined Hashing/Watermarking Method for Image Authentication

Compression-Compatible Fragile and Semi-Fragile Tamper Detection

Robust Image Watermarking based on DCT-DWT- SVD Method

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

Information and Communications Security: Encryption and Information Hiding

Watermarking Attack (BOWS contest)

Data Hiding in Video

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Improved Content Based Image Watermarking

Watermarking Moble Phone Color Images With Error Correction Codes

CHAPTER-5 WATERMARKING OF COLOR IMAGES

SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION

A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function

DIGITAL watermarking technology is emerging as a

A Video Watermarking Algorithm Based on the Human Visual System Properties

MAPS represent geospatial information ubiquitous in government,

CHAPTER-4 WATERMARKING OF GRAY IMAGES

CERIAS Tech Report

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

Robust Watermark Algorithm using Genetic Algorithm

Frequency Domain Watermarking: An Overview

SOME CONCEPTS IN DISCRETE COSINE TRANSFORMS ~ Jennie G. Abraham Fall 2009, EE5355

Data hiding technique in JPEG compressed domain

Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching

Copy Protection for Multimedia Data based on Labeling Techniques

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

A CRYPTOGRAPHICALLY SECURE IMAGE WATERMARKING SCHEME

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

On domain selection for additive, blind image watermarking

Fusion of Digital Signature & Fingerprint Watermarking using Bit plane slicing

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Part II Authentication Techniques

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

Digital watermarking techniques for JPEG2000 scalable image coding

An Improved Performance of Watermarking In DWT Domain Using SVD

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing

Part III. Attacks and Countermeasures

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

QUANTIZATION WATERMARKING IN THE JPEG2000 CODING PIPELINE

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Perceptual Watermarks for Digital Images and Video

Watermarking of Image Using Priority Based On Algorithms

Robust Digital Image Watermarking based on complex wavelet transform

A Statistical Comparison of Digital Image Watermarking Techniques

Chaotic-Correlation Based Watermarking Scheme for Still Images

Breaking the OutGuess

Jeff Hinson CS525, Spring 2010

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

Tampering Detection in Compressed Digital Video Using Watermarking

Block-based Watermarking Using Random Position Key

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

Robust DWT Based Technique for Digital Watermarking

A Robust Watermarking Algorithm For JPEG Images

LSB Based Watermarking of Digital Images against Various Attack

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

VIDEO-DNA: LARGE-SCALE SERVER-SIDE WATERMARKING

ROBUST WATERMARKING OF DIGITAL IMAGES BASED ON CHAOTIC MAPPING AND DCT

Webpage: Volume 4, Issue V, May 2016 ISSN

Towards a Telltale Watermarking Technique for Tamper-Proofing

APPLICATIONS OF DATA HIDING IN DIGITAL IMAGES

Improved content based watermarking for images

Robust Lossless Data Hiding. Outline

ENTROPY-BASED IMAGE WATERMARKING USING DWT AND HVS

Invisible Watermarking Using Eludician Distance and DWT Technique

A new robust watermarking scheme based on PDE decomposition *

A Cryptographic Watermark Embedding Technique

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

A CRT BASED ROBUST IMAGE WATERMARKING USING DISCRETE TCHEBICHEF TRANSFORM

Image Error Concealment Based on Watermarking

Scalable Video Watermarking. Peter Meerwald June 25, 2007

THE COMBINATION OF WATERMARKING ALGORITHMS FOR MP4 VIDEO

FRAGILE WATERMARKING USING SUBBAND CODING

A Digital Video Watermarking Algorithm Based on LSB and DCT

ELE 201, Spring 2014 Laboratory No. 4 Compression, Error Correction, and Watermarking

Image Authentication and Recovery Scheme Based on Watermarking Technique

Contour Extraction & Compression from Watermarked Image using Discrete Wavelet Transform & Ramer Method

Digital Image Steganography Techniques: Case Study. Karnataka, India.

On Collusion Attack for Digital Fingerprinting

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

Comparison of Digital Water Marking methods

ROBUST AND OBLIVIOUS IMAGE WATERMARKING SCHEME IN THE DWT DOMAIN USING GENETIC ALGORITHM K. Ramanjaneyulu 1, K. Rajarajeswari 2

The DCT domain and JPEG

A Nonoblivious Image Watermarking System Based on Singular Value Decomposition and Texture Segmentation

DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING

Transcription:

Lecture 14: Digital Watermarking II Some slides from Prof. M. Wu, UMCP Lab2 Demo Csil Monday: May 24, 1 4pm Optional (9:30 11am) 10 minutes per Group 5 Minutes Presentation 5 Minutes Demo Sign-up Sheet posted outside of my office HFH 1121 $&

Review: What is a Watermark? A watermark is a secret message that is embedded into a cover message Usually, only the knowledge of a secret key allows us to extract the watermark. Has a mathematical property that allows us to argue that its presence is the result of deliberate actions. Effectiveness of a watermark is a function of its Stealth Resilience Capacity Review: Watermarking Encoding original Watermark S Encoder watermarked User Key K #&

Review: Watermarking Decoding watermarked S=X? original Decoder Watermark X User Key K Various Categories of Watermarks Based on method of insertion Additive Quantize and replace Based on domain of insertion Transform domain (today) Spatial domain (last lecture) Based on method of detection Private - requires original Public (or oblivious) - does not require original Based on security type Robust - survives manipulation Fragile - detects manipulation (authentication) '&

Review: Robust Watermarks Can still extract the watermark even with editing, noise, or compression etc. Review: Fragile Watermarks Breaks when the is altered; used to detect whether the has been altered. (&

Review: Embedding Fragile Watermarks Method 1: Spatial Domain Least Significant Bit (LSB) Modification Simple but not robust An pixel s value Replace the bit with your watermark pixel value (0 or 1) Review: Spatial Domain Robust Watermarking Pseudo-randomly (based on secret key) select n pairs of pixels: pair i: a i, b i are the values of the pixels in the pair The expected value of sum i (a i -b i )==0 Increase a i by 1, Decrease b i by 1 The expected value of sum i (a i -b i ) now!2n To detect watermark, check sum i (a i -b i ) on the watermarked!&

TODAY: FREQUENCY-DOMAIN ROBUST WATERMARKING Secure Spread Spectrum Watermarking For Multimedia Cox, Kilian, Leighton, and Shamoon, IEEE Transactions on Image Processing vol. 6, no. 12, December 1997 An Example 10011010 Copyright Embedding domain tailored to media characteristics & application requirement )&

Spread Spectrum Watermark Spread Spectrum == transmits a narrowband signal over a much larger bandwidth the signal energy present in any single frequency is much smaller Apply this to watermark: The watermark is spread over many frequency bins so that the (change of ) energy in any one bin is very small and almost undetectable Watermark extraction == combine these many weak signals into a single but stronger output Because the watermark verification process knows the location and content of the watermark To destroy such a watermark would require noise of high amplitude to be added to all frequency bins UMCP ENEE631 Slides (created by M.Wu based on Research Talks 98-04) Spread Spectrum Watermark: Cox et al What to use as watermark? Where to put it? Place wmk in perceptually significant spectrum (for robustness) Modify by a small amount below Just-noticeable-difference (JND) Use long random noise-like vector as watermark for robustness/security against jamming+removal & imperceptibility Embedding v i = v i +! v i w i = v i (1+! w i ) Perform DCT on entire and embed wmk in DCT coeff. Choose N=1000 largest AC coeff. and scale {v i } by a random factor Original Full frame 2D DCT seed random vector generator marked wmk N largest coeff. sort v =v (1+! w) Full Frame IDCT & other coeff. normalize *&

Details: Embedding a Watermark Compute the M x M DCT of an M x M gray scale cover I The watermark W must be composed of random numbers drawn from a Gaussian distribution N(0,1) N(, 2 ) denotes a normal distribution with mean, and variance 2 Embed a sequence of watermark: W= w 1,w 2,..., w n, according to N (0,1), into the n largest magnitude DCT coefficients X i, excluding the DC component) Type I: X i ' =X i + w i, i=1...n Type II: :X i ' =X i (1+ w i ) i=1.n Now compute the inverse DCT to obtain the watermarked I In general =0.1, n=1000 UMCP ENEE631 Slides (created by M.Wu based on Research Talks 98-04) Watermarking Example by Cox et al. Original Cox Difference between whole DCT marked & original Embed in 1000 largest coeff. +&

UMCP ENEE631 Slides (created by M.Wu based on Research Talks 98-04) " Subtract original from the test one before feeding to detector ( non-blind detection ) " Correlation-based detection a correlator normalized by Y in Cox et al. paper test X =X+W+N? X =X+N? original unmarked preprocess orig X test X DCT DCT select N largest select N largest wmk compute similarity threshold decision Details: Detection Steps Compute the DCT of the watermarked (and possibly attacked) cover I* Need original and compute its own DCT values Find the n largest AC coefficients from the original Extract the watermark W For Add-SS: y i =(x i * -x i )/ For Mult-SS: y i =(x i * -x i )/ x i Evaluate the similarity of Y and W using sim If sim (Y, W) > T, a given threshold, the watermark W exists,&

UMCP ENEE631 Slides (created by M.Wu based on Research Talks 98-04) Robustness (claimed) scaling, JPEG, dithering, cropping, printing-xeroxingscanning, multiple watermarking No big surprise with high robustness equivalent to sending just 1-bit {0,1} with O(10 3 ) samples Summary: Spread Spectrum Embedding Main ideas Place wmk in perceptually significant spectrum (for robustness) Modify by a small amount below Just-noticeable-difference (JND) Use long random vector of low power as watermark to avoid artifacts (for imperceptibility, robustness, and security) Cox s approach Perform DCT on entire & embed wmk in large DCT AC coeff. Embedding: x i = x i +! x i w i = x i (1+! w i ) Detection: subtract original and perform correlation w/ wmk $%&

Collusion Attacks by Multiple Users # Collusion: A cost-effective attack against multimedia fingerprints Users with same content but different fingerprints come together to produce a new copy with diminished or attenuated fingerprints Fairness: Each colluder contributes equal share through averaging, interleaving, and nonlinear combining Alice Bob Chris Originally fingerprinted copies Alice Chris Collusion by averaging 1/3 Collage Colluded copy ENEE631 Digital Image Processing (Spring 2010) Lec 21 Data Hiding [21] Your Lab3 Implement the spread spectrum watermark embedding in matlab [60pt] (estimated time: 2--3 hours) Read original (download lena.jpg here), make it 8-bit grayscale) rgb2gray(), uint8() Generate watermark vector w of length n (e.g., n = 1000) randn() Apply 2D DCT transform on the entire, not each macroblock (dct2()) Take the n largest AC coefficients x Generate watermarked coefficients x by x' = x * (1 + a * w) w is the corresponding watermark component, a = 0.1 Apply 2D IDCT on the new DCT coefficients (original DC, new x and the rest AC coefficients) (idct2()) Compare the original and watermarked Compute the PSNR Repeat the above with different n (100, 200, 500, 1000, 1500) Plot a figure of PSNR vs. n $$&

Your Lab3 cont Implement the spread spectrum watermark detection in matlab [40pt] Detect/extract watermark (estimated time, 2--3 hours) apply 2D DCT on the to be tested extract the n largest coefficients (Hint: use the original to identify the location of these n coefficients) Subtract the corresponding n DCT value of the original, y i =(x i * -x i )/ x i Compute the similarity, and use a threshold of 6 to check with a particular watermark W is present Y,W = " y i # w i i Due Tue. June 1, 11:59PM via turnin lab3, Individual project, no grouping Your Lab3 cont Examine Robustness in matlab Bonus [25pt] Check robustness (estimated time: 2-3 hours) Add noise, alter your (JPEG compression with quality 25 and 50), and see if you can detect the original watermark Both Noise and JPEG compression steps can be found in the watermarking_demo.zip from the course website outfilename='temp.jpg'; imwrite(wimg,outfilename,'quality,25); wcimg=imread(outfilename); noisyimg = imnoise(wimg,'gaussian'); Produce collusion attacks Generate three different watermarked (w1,w2,w3) s following the same manner, take the average of the three to create a new, and detect whether any watermark (w1,w2, w3) is present Try the above with different n values and report your findings $#&

FINGERPRINTING UMCP ENEE631 Slides (created by M.Wu based on Research Talks 98-04) Robust Wmk Application for Tracing Traitors Leak of information as well as alteration and repackaging poses serious threats to government operations and commercial markets e.g., pirated content or classified document studio The Lord of the Ring Promising countermeasure: robustly embed digital fingerprints Alice Insert ID or fingerprint (often through conventional watermarking) to identify each user Purpose: deter information leakage; digital rights management (DRM) Challenge: imperceptibility, robustness, tracing capability w1 w2 w3 Bob Carl $'&

Embedded Fingerprint for Tracing Traitors Insert special signals to identify recipients Deter leak of proprietary documents Complementary protection to encryption Consider imperceptibility, robustness, traceability Attacks mounted by single and multiple users President Satellite Image w1 w2 w3 Alice Bob Carl Multi-user Attacks Traitor Tracing UMCP ENEE631 Slides (created by M.Wu based on Research Talks 98-04) Case Study: Tracing Movie Screening Copies # Potential civilian use for digital rights management (DRM)! Copyright industry $500+ Billion business ~ 5% U.S. GDP # Alleged Movie Pirate Arrested (23 January 2004) A real case of a successful deployment of 'traitor-tracing' mechanism in the digital realm Use invisible fingerprints to protect screener copies of prerelease movies Last Samurai w1 Carmine Caridi Russell friends Internet http://www.msnbc.msn.com/id/4037016/ Hollywood studio traced pirated version $(&

Summary of Digital Watermarking Widely used to protect digital media Many different forms (still an active research area today) Spatial vs. Frequency Robust vs. Fragile Schedule for the Next 2 weeks Mon (May 24): No class, Demo Session at Csil Wed. (May 26): Discussion on lab3 Mon (May 31): No class, holiday $ Wed. (June 2): Final review $!&