+ All Categories
Home > Documents > Multiple Re-Watermarking Scenarios

Multiple Re-Watermarking Scenarios

Date post: 16-Jan-2016
Category:
Upload: tryna
View: 21 times
Download: 0 times
Share this document with a friend
Description:
Multiple Re-Watermarking Scenarios. Severin Kampl, Daniel Mark. „Multiple Re-Watermarking“ Team. Carinthia Tech Institute, University of Applied Sciences, Austria Department of Computer Sciences, Salzburg University, Austria. Michael Dorfer Severin Kampl - PowerPoint PPT Presentation
Popular Tags:
22
Multiple Multiple Re-Watermarking Re-Watermarking Scenarios Scenarios Severin Kampl, Daniel Mark
Transcript
Page 1: Multiple  Re-Watermarking Scenarios

Multiple Multiple Re-Watermarking Re-Watermarking

ScenariosScenarios

Severin Kampl, Daniel Mark

Page 2: Multiple  Re-Watermarking Scenarios

Multiple Re-Watermarking ScenariosMultiple Re-Watermarking Scenarios 22/22/22

Carinthia Tech Institute, University of Applied Sciences, Austria

Department of Computer Sciences, Salzburg University, Austria

Michael Michael DorferDorfer Severin Severin KamplKamplAlexander Alexander MaierMaier Daniel Daniel MarkMarkAndreas Andreas PalliPalli Günter Günter ScheerScheer Univ.-Prof. Mag. Dr. Andreas Univ.-Prof. Mag. Dr. Andreas UhlUhl

„„Multiple Re-Watermarking“ Multiple Re-Watermarking“ TeamTeam

Page 3: Multiple  Re-Watermarking Scenarios

Multiple Re-Watermarking ScenariosMultiple Re-Watermarking Scenarios 33/22/22

Presentation StructurePresentation Structure

IntroductionIntroduction Multiple Re-WatermarkingMultiple Re-Watermarking Experimental StudyExperimental Study Conclusion and PerspectivesConclusion and Perspectives

Page 4: Multiple  Re-Watermarking Scenarios

Multiple Re-Watermarking ScenariosMultiple Re-Watermarking Scenarios 44/22/22

DRM & multimedia securityDRM & multimedia security

Significantly different properties of Significantly different properties of Algorithms: Algorithms: Fragility (integrity investigations)Fragility (integrity investigations) Robustness (ownership claims)Robustness (ownership claims)

- Introduction- Introduction - Multiple Re- Watermarking- Multiple Re- Watermarking - Experimental Study - Experimental Study

- Settings & Methods- Settings & Methods- Results- Results

- Conclusion / Perspectives - Conclusion / Perspectives

IntroductionIntroduction

Page 5: Multiple  Re-Watermarking Scenarios

Multiple Re-Watermarking ScenariosMultiple Re-Watermarking Scenarios 55/22/22

Composite watermarkingComposite watermarking One single embedding processOne single embedding process

Segmented watermarkingSegmented watermarking Host data is partitionedHost data is partitioned

Successive watermarking (Re-Successive watermarking (Re-Watermarking)Watermarking) Embedding of one watermark after the otherEmbedding of one watermark after the other

Our focus: Multiple Re-Watermarking with Our focus: Multiple Re-Watermarking with robust techniquesrobust techniques

- Introduction- Introduction - Multiple Re- Watermarking - Multiple Re- Watermarking - Experimental Study - Experimental Study

- Settings & Methods- Settings & Methods- Results- Results

- Conclusion / Perspectives - Conclusion / Perspectives

Multiple WatermarkingMultiple Watermarking

Page 6: Multiple  Re-Watermarking Scenarios

Multiple Re-Watermarking ScenariosMultiple Re-Watermarking Scenarios 66/22/22

Scenario for reconstruction of the trading chainScenario for reconstruction of the trading chain

- Introduction- Introduction - Multiple Re- Watermarking - Multiple Re- Watermarking - Experimental Study- Experimental Study

- Settings & Methods- Settings & Methods- Results- Results

- Conclusion / Perspectives - Conclusion / Perspectives

Target ScenarioTarget Scenario

owner inforecipient info}

embedding technique

host image

1st sale re-sale re-sale . . . . . .

Page 7: Multiple  Re-Watermarking Scenarios

Multiple Re-Watermarking ScenariosMultiple Re-Watermarking Scenarios 77/22/22

Result:Result: Correlation value of (e.g. B with B‘) Correlation value of (e.g. B with B‘)

- Introduction- Introduction - Multiple Re- Watermarking- Multiple Re- Watermarking - Experimental Study - Experimental Study

- Settings & Methods- Settings & Methods- Results- Results

- Conclusion / Perspectives - Conclusion / Perspectives

Watermark DetectionWatermark Detection

Non-Blind AlgorithmNon-Blind Algorithm Correct reference image is requiredCorrect reference image is required

Blind AlgorithmBlind Algorithm No reference image is requiredNo reference image is required

Page 8: Multiple  Re-Watermarking Scenarios

Multiple Re-Watermarking ScenariosMultiple Re-Watermarking Scenarios 88/22/22

„„Lena“ Image Lena“ Image (512 x 512 Px, 8 bpp)(512 x 512 Px, 8 bpp)

Freely available watermarking Freely available watermarking toolboxtoolbox

Algorithms:Algorithms: Wang Wang (non-blind, waveletbased, MF - HF)(non-blind, waveletbased, MF - HF)

Corvi Corvi (non-blind, waveletbased NF - MF)(non-blind, waveletbased NF - MF)

Koch Koch (blind, DCT-based, random blocks)(blind, DCT-based, random blocks)

Final PSNR >= 38dbFinal PSNR >= 38db

- Introduction- Introduction - Multiple Re- Watermarking - Multiple Re- Watermarking - Experimental Study - Experimental Study

- Settings & Methods- Settings & Methods- Results- Results

- Conclusion / Perspectives - Conclusion / Perspectives

Experimental Study: Experimental Study: SettingSetting

Lena image, 512x512 Pixels, 8bpp

Page 9: Multiple  Re-Watermarking Scenarios

Multiple Re-Watermarking ScenariosMultiple Re-Watermarking Scenarios 99/22/22

WANG - AlgorithmWANG - Algorithm

- Introduction- Introduction - Multiple Re- Watermarking - Multiple Re- Watermarking - Experimental Study - Experimental Study

- Settings & Methods- Settings & Methods- Results- Results

- Conclusion / Perspectives - Conclusion / Perspectives

Page 10: Multiple  Re-Watermarking Scenarios

Multiple Re-Watermarking ScenariosMultiple Re-Watermarking Scenarios 1010/22/22

WANG - AlgorithmWANG - Algorithm

- Introduction- Introduction - Multiple Re- Watermarking - Multiple Re- Watermarking - Experimental Study - Experimental Study

- Settings & Methods- Settings & Methods- Results- Results

- Conclusion / Perspectives - Conclusion / Perspectives

Page 11: Multiple  Re-Watermarking Scenarios

Multiple Re-Watermarking ScenariosMultiple Re-Watermarking Scenarios 1111/22/22

WANG - AlgorithmWANG - Algorithm

- Introduction- Introduction - Multiple Re- Watermarking - Multiple Re- Watermarking - Experimental Study - Experimental Study

- Settings & Methods- Settings & Methods- Results- Results

- Conclusion / Perspectives - Conclusion / Perspectives

Page 12: Multiple  Re-Watermarking Scenarios

Multiple Re-Watermarking ScenariosMultiple Re-Watermarking Scenarios 1212/22/22

- Introduction- Introduction - Multiple Re- Watermarking - Multiple Re- Watermarking - Experimental Study - Experimental Study

- Settings & Methods- Settings & Methods- Results- Results

- Conclusion / Perspectives - Conclusion / Perspectives

WANG - AlgorithmWANG - Algorithm

Page 13: Multiple  Re-Watermarking Scenarios

Multiple Re-Watermarking ScenariosMultiple Re-Watermarking Scenarios 1313/22/22

WANG - AlgorithmWANG - Algorithm

- Introduction- Introduction - Multiple Re- Watermarking - Multiple Re- Watermarking - Experimental Study - Experimental Study

- Settings & Methods- Settings & Methods- Results- Results

- Conclusion / Perspectives - Conclusion / Perspectives

Page 14: Multiple  Re-Watermarking Scenarios

Multiple Re-Watermarking ScenariosMultiple Re-Watermarking Scenarios 1414/22/22

CORVI - AlgorithmCORVI - Algorithm

- Introduction- Introduction - Multiple Re- Watermarking - Multiple Re- Watermarking - Experimental Study - Experimental Study

- Settings & Methods- Settings & Methods- Results- Results

- Conclusion / Perspectives - Conclusion / Perspectives

Page 15: Multiple  Re-Watermarking Scenarios

Multiple Re-Watermarking ScenariosMultiple Re-Watermarking Scenarios 1515/22/22

CORVI - AlgorithmCORVI - Algorithm

- Introduction- Introduction - Multiple Re- Watermarking - Multiple Re- Watermarking - Experimental Study - Experimental Study

- Settings & Methods- Settings & Methods- Results- Results

- Conclusion / Perspectives - Conclusion / Perspectives

Page 16: Multiple  Re-Watermarking Scenarios

Multiple Re-Watermarking ScenariosMultiple Re-Watermarking Scenarios 1616/22/22

Explanation:Explanation: Wang: Wang: most significant wavelet most significant wavelet

coefficientscoefficients

always different coefficientsalways different coefficients

Corvi: all approximation subband Corvi: all approximation subband coefficientscoefficients

less overwritingless overwriting

WANG WANG CORVI CORVI

- Introduction- Introduction - Multiple Re- Watermarking - Multiple Re- Watermarking - Experimental Study - Experimental Study

- Settings & Methods- Settings & Methods- Results- Results

- Conclusion / Perspectives - Conclusion / Perspectives

Page 17: Multiple  Re-Watermarking Scenarios

Multiple Re-Watermarking ScenariosMultiple Re-Watermarking Scenarios 1717/22/22

KOCH - AlgorithmKOCH - Algorithm

- Introduction- Introduction - Multiple Re- Watermarking - Multiple Re- Watermarking - Experimental Study - Experimental Study

- Settings & Methods- Settings & Methods- Results- Results

- Conclusion / Perspectives - Conclusion / Perspectives

Page 18: Multiple  Re-Watermarking Scenarios

Multiple Re-Watermarking ScenariosMultiple Re-Watermarking Scenarios 1818/22/22

KOCH - AlgorithmKOCH - Algorithm

- Introduction- Introduction - Multiple Re- Watermarking - Multiple Re- Watermarking - Experimental Study - Experimental Study

- Settings & Methods- Settings & Methods- Results- Results

- Conclusion / Perspectives - Conclusion / Perspectives

Page 19: Multiple  Re-Watermarking Scenarios

Multiple Re-Watermarking ScenariosMultiple Re-Watermarking Scenarios 1919/22/22

KOCH - AlgorithmKOCH - Algorithm

- Introduction- Introduction - Multiple Re- Watermarking - Multiple Re- Watermarking - Experimental Study - Experimental Study

- Settings & Methods- Settings & Methods- Results- Results

- Conclusion / Perspectives - Conclusion / Perspectives

Page 20: Multiple  Re-Watermarking Scenarios

Multiple Re-Watermarking ScenariosMultiple Re-Watermarking Scenarios 2020/22/22

KOCH - AlgorithmKOCH - Algorithm

- Introduction- Introduction - Multiple Re- Watermarking - Multiple Re- Watermarking - Experimental Study - Experimental Study

- Settings & Methods- Settings & Methods- Results- Results

- Conclusion / Perspectives - Conclusion / Perspectives

Page 21: Multiple  Re-Watermarking Scenarios

Multiple Re-Watermarking ScenariosMultiple Re-Watermarking Scenarios 2121/22/22

WANG & KOCH as predictedWANG & KOCH as predicted CORVI as predicted when using CORVI as predicted when using

correct ref. Img.correct ref. Img. Corvi also useable in „blind“ wayCorvi also useable in „blind“ way

Large number of WMs detectableLarge number of WMs detectable Robustness concerning compressionRobustness concerning compression

- Introduction- Introduction - Multiple Re- Watermarking - Multiple Re- Watermarking - Experimental Study - Experimental Study

- Settings & Methods- Settings & Methods- Results- Results

- Conclusion & Perspectives - Conclusion & Perspectives

Conclusion & Conclusion & PerspectivesPerspectives

Page 22: Multiple  Re-Watermarking Scenarios

Thank you for your Attentention!Thank you for your Attentention!

Michael Dorfer, Severin Kampl, Alexander Maier, Daniel Michael Dorfer, Severin Kampl, Alexander Maier, Daniel Mark, Andreas Palli, Günter Scheer, Univ.-Prof. Mag. Dr. Mark, Andreas Palli, Günter Scheer, Univ.-Prof. Mag. Dr.

Andreas UhlAndreas Uhl


Recommended