+ All Categories
Home > Documents > Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Date post: 18-Jan-2016
Category:
Upload: christopher-melton
View: 214 times
Download: 0 times
Share this document with a friend
Popular Tags:
29
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang
Transcript
Page 1: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Secure Spread Spectrum Watermarking for Multimedia

Young K Hwang

Page 2: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

The characteristics of watermark

Unobtrusiveness Robustness

Common signal processing

Common geometric distortion

Collusion and forgery Universality Unambiguousness

Page 3: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Design for a strong watermark

Watermark structure

i.i.d. samples from Gaussian distribution Insertion strategy

Embedded in perceptual frequency area

For a watermark to be robust and secure, these two components must be designed correctly

Page 4: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Watermark in the frequency domain

Page 5: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Spread Spectrum Coding of a Watermark

The watermark is spread over many frequency bins The location of watermark isn’t obvious Sufficient small to be undetectable

Is it possible to verify watermark? The owner know where the watermark is Increase the energy at a particular freq to

detect the watermark.

Page 6: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Cox’s scheme: Embedding

Page 7: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Cox’s scheme: Detecting

Page 8: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Watermark procedure

D : each document V= : a seq of D to be inserted by wmk X= : a watermark to be inserted V’= : watermarked sequence D’ : watermarked document : attacked document : attacked watermarked seq of : attacked watermark

nxxx ,.....,, 21

nvvv ,.....,, 21

nvvv ',.....,',' 21

*D

*X

*V*D

Page 9: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Inserting the watermark

X V = V’

Three formulae for computing V’

(1)

(2)

(3)

iii xvv '

)1(' iii xvv

)(' ixii evv

Page 10: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Extracting the watermark

Find the inverse function of inserting watermark.

(2)->

1

'1

i

ii v

vx

Page 11: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Choosing the length of the Wmk

The choice of n indicates the degree to which the watermark is spread out among the relevant components of the image.

Proper value of n makes it easy to identify the watermark.

Too large value of n -> distort the image. Too small value of n -> cause robust problem

Page 12: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Evaluating the similarity of wmk

The similarity of X and X* can be measured by

To decide whether X and X* match, one determines if Sim(X,X*) > T, where T=some threshold

T : chosen to minimize the prob of both false alarm and miss detections.

**

**),(

XX

XXXXSim

Page 13: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Evaluating the similarity of wmk Cont.

Creator of X* has no information on X. X* is created independently to X.

For fixed any , each will be independently distributed according to N(0,1)

~

Thus, Thus, false alarm prob doesn’t depend on n But, the large n increases the value of similarity func.

*ix ix

XX * ),,0(),0( **

1

*2

XXNxNn

ii

)1,0(~),( * NXXSim

Page 14: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Questions

Why does large value of n increase similarity function when X and X* are correlated?

nXXsimThus

cnceexxXX

nexx

exxexxXX

exx

n

i

n

iiiii

iii

n

i

n

i

n

iiiiiii

i

~),(,

)1(1)2E(

][E

)(

*

1 1

22**

2

1

1 1

2*

*

Page 15: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Post-processing options

xi should be detected by similarity after many kinds of signal processing.

Some processes make it hard to detect watermark due to severely distorting watermark (for example, D/A-A/D, dithering process)

Setting T to low value result in increasing false alarm prob.

A method to increase sim(X,X*) is required for some processes

Page 16: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Robust statistics for a specific X*(distortion version of X) Goal : Increase

increase decrease

Method 1)

Method 2)

Method 3)

),( *XXSim

XX * ** XX

)( *** XExx iii

otherwise

tolerancexifxx iii

,0

, ***

))(( *** XExsignx iii

Page 17: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

The original image The dithered image

Page 18: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Question on previous slide

Can such postprocessing steps affect the false positive probability?

According to Cox’s paper, that process doesn’t affect the statistical significance calculation as long as X* depends on D* and D.

Page 19: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Resilience to Multiple Document(Collusion) Attacks

The most general attacks consists of using t multiple watermarked copies D1'...,Dt' of document D to produce an un-watermarked document D*.

If the i-th watermark is the same for all copies of the document then it cannot be detected, changed or removed.

Page 20: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Robust, secure, invisible watermark, resistant with respectto the collusion attack (averaging copies of documents with different marks).

Collution attack cont.

Marking copies of one document with a customer signature.

… W1 W2 WN

N customers…

+

original

Page 21: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Experimental Results

Response of the watermark (ROW)=32.0

Page 22: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Experiment 1: Uniqueness of Watermark

Page 23: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Experiment 2: Image Scaling

To recover the watermark the quarter sized image was rescaled to its original dimension, Fig. 7b.(ROW=13.4, 75% of the original data is missing)

Page 24: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Experiment 3: JPEG Coding Distortions

Here are two JPEG encoded versions of the Bavarian couple Image with different percentages for the quality and smoothing. ROW=22.8, 13.9 respectively

Page 25: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Experiment 4: Dithering Distortion

ROW=5.2, 10.5 with a postprocess

Page 26: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Experiment 5: Cropping

Cropping involves the cutting out and removal of portions of an image.(ROW=14.6, 75% of the original date is removed

Page 27: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Experiment 6: Print, Xerox, and Scan

This image represents the result after it has gone through the 4 stage process, printing, xeroxing, scanning and rescaling. ROW=4.0 7.0 with a postprocess

Page 28: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Conclusion

A need for electronic watermarking is developing as electronic distribution of copyright material becomes more widespread.

This paper outlined the necessary characteristics of a watermark Fidelity preservation Robustness to common signal and geometric

processing operations Robustness to attack Applicability to audio, image and video data.

Page 29: Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.

Conclusion …continued

Using the Bavarian couple image, the algorithm used can extract a reliable copy of the watermark from imagery that was degraded with several common geometric and signal processing procedures.

These procedures include translation, rotation, scale change, and cropping.

The algorithm displays strong resilience to lossy operations.

Finally, this proposed methodology is used to hide watermarks in data, the same process can be applied to sending other forms of message through media data.


Recommended