+ All Categories
Home > Documents > Image Watermark - Final

Image Watermark - Final

Date post: 08-Apr-2018
Category:
Upload: vivid1984
View: 219 times
Download: 0 times
Share this document with a friend

of 29

Transcript
  • 8/7/2019 Image Watermark - Final

    1/29

    Image Watermarking for

    Multimedia Security

  • 8/7/2019 Image Watermark - Final

    2/29

    Example:LSB Encoding

    Original Image Watermark

  • 8/7/2019 Image Watermark - Final

    3/29

    Replace 4 and 7 LSBs of Original

    4 LSBs Watermarked 7 LSBs Watermarked

  • 8/7/2019 Image Watermark - Final

    4/29

    What is a Watermark?

    A watermark is a secret message that is embedded

    into a cover (original or host) message.

    Only the knowledge of a secret key allows us toextract the watermark from the cover message.

    Effectiveness of a watermarking algorithm is a

    function of its

    Resilience to attacks.

    Capacity.

    Stealth.

  • 8/7/2019 Image Watermark - Final

    5/29

    What Can Be Watermarked?

    Multimedia data.

    Video.

    Audio. Still Images.

    Documents.

    Software.

    Hardware designs.

  • 8/7/2019 Image Watermark - Final

    6/29

    Multimedia Watermarks

    A digital watermark is a secret key

    dependent signal inserted into digital

    multimedia data. Watermark can be later detected/extracted in

    order to make an assertion about the data.

    A digital watermark can be.

    Visible (perceptible).

    Invisible (imperceptible).

  • 8/7/2019 Image Watermark - Final

    7/29

    Watermark Applications

    Proof of ownership. Prove ownership in a court of law.

    Simple copyright notice may not help for digitalmultimedia data. Easily destroyed.

    Copy prevention or control. Recording device may inhibit recording a signal if

    detected watermark indicates that it is prohibited.

    DVD video and digital music distribution.

    Content protection (visible watermarks). Destruction of watermark destroys the content.

  • 8/7/2019 Image Watermark - Final

    8/29

    Watermark Applications

    Authentication. Detect if image/video has been altered.

    Digital cameras.

    Media Bridging. Bridge media such as magazines and the Internet.

    Digimarc.

    BroadcastM

    onitoring. Keep track of when and where an advertisementis played.

    ConfirMedia from Verance.

  • 8/7/2019 Image Watermark - Final

    9/29

    Watermark Applications

    Fingerprinting. Identify the source of an illegal copy.

    Unique watermark embedded in each copy.

    DiVX, a modified version of DVD.

    Secret Communications.

    Hide information such that general public do not

    know its presence.

    Bin Laden hides attack plans in images on the

    web USA Today, Feb. 26, 2001.

  • 8/7/2019 Image Watermark - Final

    10/29

    Requirements

    Requirements vary with application. For

    example:

    Perceptually transparent - must not perceptuallydegrade original content.

    Robust - survive accidental or malicious attempts

    at removal.

    Oblivious or Non-oblivious - Recoverable with orwithout access to original.

    Capacity Number of watermark bits embedded.

    Efficient encoding and/or decoding.

  • 8/7/2019 Image Watermark - Final

    11/29

    Contradicting Requirements

    Perceptual Transparency

    Oblivious vs. Non-Oblivious

    RobustnessPayload Security

  • 8/7/2019 Image Watermark - Final

    12/29

    Example: Additive Watermarks

    W( , ) : seudo and om attern {-1,0,1}

    kMultiply by gain

    factork

    I( , ) IW( , )

    IW(x,y)=I(x,y)+k W(x,y)

    W(x,y) detected

    T p

    ' ( , ) ( , )W

    I x y W x yR T" p

    No W(x,y) detected

  • 8/7/2019 Image Watermark - Final

    13/29

    h

    v

    Additive watermarks in transformdomain: Spread Spectrum

  • 8/7/2019 Image Watermark - Final

    14/29

    Watermark Attacks

    Active Attacks.

    Hacker attempts to remove or destroy the

    watermark. Watermark detector unable to detect watermark.

    Key issue in proof of ownership, fingerprinting,

    copy control.

    Not serious for authentication or covertcommunication.

  • 8/7/2019 Image Watermark - Final

    15/29

    Watermark Attacks

    Passive Attacks. Hacker tries to find if a watermark is present.

    Removal of watermark is not an aim. Serious for covert communications.

    Collusion Attacks. Hacker uses several copies of watermarked data

    (images, video etc.) to construct a copy with nowatermark.

    Uses several copies to find the watermark.

    Serious for fingerprinting applications.

  • 8/7/2019 Image Watermark - Final

    16/29

    Watermark Attacks

    Forgery Attacks.

    Hacker tries to embed a valid watermark.

    Serious in authentication. If hacker embeds a valid authentication

    watermark, watermark detector can accept bogus

    or modified media.

  • 8/7/2019 Image Watermark - Final

    17/29

    Example: Forging Photo I.D.

    Bad

    Forgery!

    Millionaire with

    Swiss bank

    account

    Assistant

    Professor

    Thanks

    Hong Man,

    for this

    picture!

  • 8/7/2019 Image Watermark - Final

    18/29

    Content-based Watermarking

    Original Watermark

  • 8/7/2019 Image Watermark - Final

    19/29

    JPEG Compression Attack

  • 8/7/2019 Image Watermark - Final

    20/29

    Watermarking Research

    Information Theoretic Issues. Compute watermarking capacity

    How many watermark bits can be hidden in awatermark channel ?

    Capacity when multiple watermarks are used.

    Decision Theoretic Issues. Robust watermark detector.

    Quickest possible watermark detection.

    Invariant to statistical uncertainties.

    Achieves desired false alarm and detectionprobabilities.

  • 8/7/2019 Image Watermark - Final

    21/29

    Watermarking Research

    Signal Processing Issues. What transforms to use ? wavelet, DCT etc.

    Geometric invariant transform scale, translation,

    and rotation invariance. Watermarking protocols and system issues.

    Protocol used by sender and receiver for securetransmission.

    Steganalysis. How to analyze multimedia data for the presence

    of watermark(s).

    Secure Digital Music Initiative (SDMI) has beenhacked!

  • 8/7/2019 Image Watermark - Final

    22/29

    Robust Watermarking Techniques- A Communications Framework

    +

    Media Carrier

    HVS

    Watermark

    Media Carrier

    Noise/Attack Channel

    Water-

    mark

    Coding and

    Modulation

    Decoding and

    DemodulationX

  • 8/7/2019 Image Watermark - Final

    23/29

    Techniques Developed at

    MSyNC Lab

    (some results are in collaboration with

    Iowa State U. and Polytechnic U.)

  • 8/7/2019 Image Watermark - Final

    24/29

    Information TheoreticFormulation

    A new watermark channel model. Multiplicative and additive attacks.

    Models geometric attacks (killer attack).

    Attack parameters assumed imperfectlyknown.

    Lower and upper bounds on watermarkingcapacity.

    Many current capacity estimates are specificcases of proposed estimates.

    Capacity in the presence of multiplewatermarks using multiuser information

    theory.

  • 8/7/2019 Image Watermark - Final

    25/29

    Multiple DescriptionWatermarking

    A new framework for watermarking using

    multiple description codes.

    Partition the source into multiple descriptions. Each description carries enough information.

    Allocate watermarking bits to descriptions subject

    to distortion constraints.

    Experiments for secure wireless mediatransmission is promising.

    Rate-distortion theory formulation.

  • 8/7/2019 Image Watermark - Final

    26/29

    Decision Theoretic Formulation

    How many pixels to watermark ?

    A new measure for watermarking capacity.

    Different from standard information theoreticformulation.

    Perhaps a more practical measure.

    Fast watermark detector.

    Computation reduction. Useful for hardware implementation.

  • 8/7/2019 Image Watermark - Final

    27/29

    Steganalysis

    A distributed detection framework for

    analyzing images for presence of

    watermarks. Theoretical formulation and practical

    algorithm for steganalysis of LSB based

    image watermarking.

    A new watermarking capacity measure calledsteganographic capacity.

  • 8/7/2019 Image Watermark - Final

    28/29

    Projected Applications ofProposed Techniques

    Secure media streaming.

    Wireless multimedia security.

    Watermark error resilience coding.

    Error concealment for wireless multimedia

    transmission. Refer to

    http://www.ece.stevens-tech.edu/~mouli/msync/index.html

  • 8/7/2019 Image Watermark - Final

    29/29

    Million Dollar Question

    Watermarking or Encryption or Combination?


Recommended