+ All Categories

dwm

Date post: 11-Aug-2015
Category:
Upload: prasanth-vaidya
View: 69 times
Download: 2 times
Share this document with a friend
Popular Tags:
28
Copyright Protection of Images using Digital Watermarking SANIVARAPU PRASANTH VAIDYA
Transcript
Page 1: dwm

Copyright Protection of Images using Digital Watermarking

SANIVARAPU PRASANTH VAIDYA

Page 2: dwm

I. IntroductionII. ApplicationsIII. Earlier WorksIV. Problem StatementV. ReferencesVI. Coursework

Presentation outline

Page 3: dwm

Internet makes the transmission of digital multimedia content easy

text, audio, image and video

Illegal usage Distribution without any loss in quality

How can Intellectual property be protected? How to control the distribution?

INTRODUCTION

Page 4: dwm

Information Hiding

Steganography

Cryptography

watermarking

Information Hiding Techniques

Page 5: dwm

If steganography techniques are used like Digital data is encrypted using encryption key (private or public), Correct decryption key can decrypt the encrypted data and recover original media.

What if the decrypted media is illegally distributed or copied?

Digital watermarking is a way of solving this issue

Information Hiding Techniques contd..

Page 6: dwm

Hiding of information in carrier signal when applied in digital domain.

Embeds a mark (text or logo) into an image, text, audio and video.

Practice of imperceptibly altering a work to embed a message about that work.

A watermark is in the form of image or text that is impressed onto paper, which provides evidence of its authenticity.

A distinguish mark impressed on paper during manufacture visible when paper is held up to the light.

What is Watermarking?

Page 7: dwm

A watermarking system is usually divided into 3 distinct steps

Embedding Attack Detection

Digital Watermarking System

Page 8: dwm

Attacks on watermark may not necessarily remove the watermark, but disable its readability.

Image processing and image transforms are commonly employed to create and apply watermark.

TYPES : Basic attacks Removal attacks Legal attacks Geometrical attacks Protocol attacks Cryptographic attacks

Attacks

Page 9: dwm

Visible and Invisible watermarking

Robust and Fragile watermarking

Asymmetric and Symmetric watermarking

Public and Private watermarking

Steganographic and Non-Steganographic watermarking

Watermarking Classification

Page 10: dwm

Watermarking

Spatial Domain watermarking

Least Significant

Bit

SSM-modulation

Frequency Domain watermarking

Discrete cosine

transform

Discrete wavelet

transform

Watermarking Techniques

Page 11: dwm

Imperceptible Robustness Security Capacity Invertibility Possibility of verification

Features

Page 12: dwm

Copy protection: Limits the access, inhibits copy process.

Content authentication: Robust watermarks are used.

Copyright protection: Embedding watermarks in digital data.

Metadata tagging: Watermarks convey object specific information to users of the object. Tag patient id to medical images.

Applications of Digital watermarking

Page 13: dwm

[1] YOU, XINGE, LIANG DU, YIU-MING CHEUNG, AND QIUHUI CHEN,"A BLIND WATERMARKING SCHEME USING NEW NONTENSOR PRODUCT WAVELET FILTER BANKS",IMAGE PROCESSING, IEEE TRANSACTIONS ON 19, NO. 12, 28 JUNE 2010,PP. 3271 – 3284.

Overcome tensor wavelet banks which reveal singularities in 3 directions only. Makes watermark scheme flexible because more sub bands and coefficients are suitable for embedding.

Robust against attacks particularly Gaussian noising attack. Applied in computer vision , pattern recognition , digital

watermarking.

The determination of parameters of nontensor product wavelet is still unknown.

Earlier Works

Page 14: dwm

[2] TSAI, HUNG-HSU, AND CHI-CHIH LIU. "WAVELET-BASED IMAGE WATERMARKING WITH VISIBILITY RANGE ESTIMATION BASED ON HVS AND NEURAL NETWORKS." PATTERN RECOGNITION 44, NO. 4 ,APRIL 2011,PP.751-763.

The technique employs the information of the JND profile to embed watermarks so that it makes the watermark further imperceptible.

First, we derive the allowable visibility ranges of the JND thresholds for all coefficients of a wavelet-transformed image.

An artificial neural network (ANN) is then used to memorize the relationships between the original wavelet coefficients and its watermark version

An advantage of the WIW technique is to utilize the trained ANN to estimate the watermark without the original image.

Performs better transparency and robustness

Page 15: dwm

[3] NASIR, I., FOUAD KHELIFI, JIANMIN JIANG, AND S. IPSON. "ROBUST IMAGE WATERMARKING VIA GEOMETRICALLY INVARIANT FEATURE POINTS AND IMAGE NORMALISATION." IMAGE PROCESSING, IET 6, NO. 4 , JUNE 2012,PP354-363.

Visually significant feature points were extracted using the end-stopped wavelets detector and used as reference points to eliminate synchronisation errors between watermark embedding and detection.

Circular images were extracted, which were watermarked in the DCT domain by location of feature points.

More robust feature points an image has, the better performance the watermarking system achieves.

To improve performance other feature point techniques can be applied.

Page 16: dwm

[4] LUO, LIXIN, ZHENYONG CHEN, MING CHEN, XIAO ZENG, AND ZHANG XIONG. "REVERSIBLE IMAGE WATERMARKING USING INTERPOLATION TECHNIQUE", INFORMATION FORENSICS AND SECURITY, IEEE TRANSACTIONS ON 5,NO.1,06 NOVEMBER 2009,PP.187-193.

An interpolation technique, which can embed a large amount of covert data into images with imperceptible modification.

Due to the slight modification of pixels, high image quality is preserved, without sacrificing embedding capacity.

Greater payload capacity and higher image fidelity compared with other state-of-the-art schemes&Computational cost is small.

Page 17: dwm

[5] LAGZIAN, SAMIRA, MOHSEN SORYANI, AND MAHMOOD FATHY,"A NEW ROBUST WATERMARKING SCHEME BASED ON RDWT-SVD", INTERNATIONAL JOURNAL OF INTELLIGENT INFORMATION PROCESSING 2, NO. 1,MARCH 2011,PP. 22-29.

High robustness against common attacks , high PSNR and correlation coefficient of watermarked image .

RDWT is shift invariant, and its redundancy introduces an over complete frame expansion .

RDWT based signal processing tends to be more robust expansion and it is the possibility to embed a large watermark in the cover image.

Page 18: dwm

[6] SU, QINGTANG, YUGANG NIU, GANG WANG, SHAOLI JIA, AND JUN YUE,"COLOR IMAGE BLIND WATERMARKING SCHEME BASED ON QR DECOMPOSITION", SIGNAL PROCESSING,VOLUME 94, JANUARY 2014, PP. 219–235.

Firstly, the color host image is divided to 4x4 non-overlapping pixel blocks ,then each selected pixel block is decomposed by QR decomposition and the first row fourth column element in the matrix R is quantified for embedding the watermark information.

In the extraction procedure, original host image or the original watermark image is not required.

Robustness against attacks such as image compression, filtering, cropping, noise adding, blurring, scaling and sharpening etc.

Embedding color watermark image into the matrix Q based on QR decomposition.

Page 19: dwm

[7] LI, LEIDA,SHUSHANG LI, AJITH ABRAHAM, AND JENG-SHYANG PAN,"GEOMETRICALLY INVARIANT IMAGE WATERMARKING USING POLAR HARMONIC TRANSFORMS", INFORMATION SCIENCES VOLUME 199, 15 SEPTEMBER 2012, PP.1–19.

PHT is a recently developed orthogonal moment method Similar to Zernike moment (ZM) and pseudo-Zernike moment (PZM) approaches.

During embedding, watermarked image is obtained by adding the compensation image to the original image.

In the decoder, the watermark can be retrieved from the magnitudes of the PHTs directly.

It cannot deal with image cropping, because PHT is a statistical based image feature extraction method.

Page 20: dwm

[8] HUANG, HSIANG-CHEH, CHI-MING CHU, AND JENG-SHYANG PAN,"THE OPTIMIZED COPYRIGHT PROTECTION SYSTEM WITH GENETIC WATERMARKING", SOFT COMPUTING, 27 MAY 2008,PP.333-343.

By finding trade-offs among robustness, capacity, and imperceptibility, we design a practical fitness function for optimization.

The three requirements conflict with one another, thus, by applying GA, we can obtain the optimized outcome.

Properly selected weighting factors can lead to better results in overall performance.

Other schemes, such as employing ECC into the watermark, can be implementation.

Page 21: dwm

[9] ABDALLAH, HANAA A., RANIA A. GHAZY, HANY KASBAN, OSAMA S. FARAGALLAH, ABDALHAMEED A. SHAALAN, MOHIY M. HADHOUD, MOAWAD I. DESSOUKY, NAWAL A. EL-FISHAWY, SALEH A. ALSHEBEILI, AND FATHI E. ABD EL-SAMIE,"HOMOMORPHIC IMAGE WATERMARKING WITH A SINGULAR VALUE DECOMPOSITION ALGORITHM”, , INFORMATION PROCESSING & MANAGEMENT ,VOLUME 50, ISSUE 6, NOVEMBER 2014, PP. 909–923.

The reflectance component contains most of the image features but with low energy, and hence watermarks embedded in this component will be invisible.

The watermark embedding on a block-by-block basis makes the watermark more robust to attacks.

The block-by-block SVD watermarking in the homomorphic domain has high fidelity, robustness, and detectability under attacks.

To increase the level of security permutation-based algorithms can be used efficiently for this purpose.

Page 22: dwm

[10] THANH, TA MINH, PHAM THANH HIEP, TA MINH TAM, AND KEISUKE TANAKA,"ROBUST SEMI-BLIND VIDEO WATERMARKING BASED ON FRAME-PATCH MATCHING",AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS , VOLUME 68, ISSUE 10, OCTOBER 2014,PP.1007–1015.

The watermark information is embedded in Discrete Cosine Transform (DCT) domain of randomly generated blocks in the matched region.

Based on the matched KAZE feature points, RST (rotation, scaling, translation) parameters are estimated and the watermark information can be successfully extracted.

Robustness against geometrical attacks, video processing attacks, and temporal attacks.

As future work , combining different techniques with this method to achieve the robustness also against ratio change, perspective transform, and so on.

Page 23: dwm

[11] MAITY,SANTI P.,SEBA MAITY,JAYA SIL,AND CLAUDE DELPHA,"COLLUSION RESILIENT SPREAD SPECTRUM WATERMARKING IN M-BAND WAVELETS USING GA-FUZZY HYBRIDIZATION", JOURNAL OF SYSTEMS AND SOFTWARE VOLUME 86, ISSUE 1, JANUARY 2013, PP.47–59.

M-band decomposition offers uniform small flat frequency equivalent scale-space tiling and GA selects proper coefficients and respective embedding strengths.

Integration leads to imperceptible and improved robustness performance against time varying collusion operation

Detection performance is significantly improved in multistage interference cancelation.

Future work would extend this concept considering de-synchronization in collusion operations.

Page 24: dwm

[12] PIPER, ANGELA, AND REIHANEH SAFAVI-NAINI. "SCALABLE FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION." INFORMATION SECURITY, IET 7, ISSUE 4,DECEMBER 2013,PP. 300-311.

Our algorithm generates some image features using layers above the lowest authenticable bit rate.

This prevents an attacker from freely modifying higher layers, which is particularly important for highly scalable images where the lowest authenticable bit rate contains only a small fraction of the data contained in the full image.

Robust to resolution and quality scaling.

The locations of the lost bits can be precisely identified at the detector.

Page 25: dwm

To develop an adaptive and robust watermarking of digital images in frequency or wavelet domain

Problem Statement

Page 26: dwm

Proposed Architecture

Original image

Watermark embedding

Trans

mission

Watermark extraction

Watermark found

Noise/Attacks

Page 27: dwm

[1] You, Xinge, Liang Du, Yiu-ming Cheung, and Qiuhui Chen,"A blind watermarking scheme using new nontensor product wavelet filter banks",Image Processing, IEEE Transactions on 19, no. 12, 28 june 2010,pp. 3271 – 3284.

[2] Tsai, Hung-Hsu, and Chi-Chih Liu. "Wavelet-based image watermarking with visibility range estimation based on HVS and neural networks." Pattern Recognition 44, no. 4 ,April 2011,pp.751-763.

[3] Nasir, I., Fouad Khelifi, Jianmin Jiang, and S. Ipson. "Robust image watermarking via geometrically invariant feature points and image normalisation." Image Processing, IET 6, no. 4 , June 2012,pp354-363.

[4] Luo, Lixin, Zhenyong Chen, Ming Chen, Xiao Zeng, and Zhang Xiong. "Reversible image watermarking using interpolation technique", Information Forensics and Security, IEEE Transactions on 5,no.1,06 November 2009,pp.187-193.

[5]Lagzian, Samira, Mohsen Soryani, and Mahmood Fathy,"A new robust watermarking scheme based on RDWT-SVD", International Journal of Intelligent Information Processing 2, no. 1,march 2011,pp. 22-29.

[6] Su, Qingtang, Yugang Niu, Gang Wang, Shaoli Jia, and Jun Yue,"Color image blind watermarking scheme based on QR decomposition", Signal Processing,Volume 94, January 2014, pp. 219–235.

References

Page 28: dwm

[7] Li, Leida,Shushang Li, Ajith Abraham, and Jeng-Shyang Pan,"Geometrically invariant image watermarking using Polar Harmonic Transforms", Information Sciences Volume 199, 15 September 2012, pp.1–19.

[8] Huang, Hsiang-Cheh , Chi-Ming Chu, and Jeng-Shyang Pan,"The optimized copyright protection system with genetic watermarking", Soft Computing, 27 May 2008,pp.333-343.

[9] Abdallah, Hanaa A., Rania A. Ghazy, Hany Kasban, Osama S. Faragallah, Abdalhameed A. Shaalan, Mohiy M. Hadhoud, Moawad I. Dessouky, Nawal A. El-Fishawy, Saleh A. Alshebeili, and Fathi E. Abd El-samie,"Homomorphic image watermarking with a singular value decomposition algorithm”, , Information Processing & Management ,Volume 50, Issue 6, November 2014, pp. 909–923.

[10] Thanh, Ta Minh, Pham Thanh Hiep, Ta Minh Tam, and Keisuke Tanaka,"Robust Semi-blind Video Watermarking based on Frame-patch Matching",AEU-international journal of Electronics and Communications , Volume 68, Issue 10, October 2014,pp.1007–1015.

[11] Maity,Santi P.,Seba Maity,Jaya Sil,and Claude Delpha,"Collusion resilient spread spectrum watermarking in M-band wavelets using GA-fuzzy hybridization", Journal of Systems and Software Volume 86, Issue 1, January 2013, pp.47–59.

[12] Piper, Angela, and Reihaneh Safavi-Naini. "Scalable fragile watermarking for image authentication." Information Security, IET 7, Issue 4,December 2013,pp. 300-311.


Recommended