digital watermarking. introduction relation to cryptography –cryptography is reversibility (no...
Post on 15-Jan-2016
221 views
TRANSCRIPT
![Page 1: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/1.jpg)
DigitalWatermarking
![Page 2: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/2.jpg)
Introduction
• Relation to Cryptography– Cryptography is
• Reversibility (no evidence)• Established
– Watermarking (1990s)• Non-reversible (noise)
– Information Hiding• Covert communication channel (steganography)
![Page 3: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/3.jpg)
Digital Watermarking Media
• Video
• Audio
• Images– Our discussion will focus on this.
WatermarkingAlgorithm
WatermarkedImage
OriginalImage
WatermarkBlock Diagram
of image watermarking
![Page 4: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/4.jpg)
Applications
• Copyright– The objective is to permanently and unalterably mark the image
so that the credit or assignment is beyond dispute.
• Digital Rights– A file may only be used by users with a license that matches the
watermarked signature.
• Information Hiding– Foil counterfeiters
• Revision History– Tamper detection
• Meta-tagging– Store keywords, descriptions, time along with images.
![Page 5: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/5.jpg)
Criteria
• Main Criteria– Capacity– Payload – Computational Complexity– Transparency– Robustness
Require optimum relationshipRequire optimum relationship
![Page 6: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/6.jpg)
Capacity
• The ability to detect watermarks with a low probability of error as the number of watermarks in a single image increases.
![Page 7: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/7.jpg)
Payload
• The amount of information that can be legitimately stored within a data stream– Dependent on host medium– JPEG example
![Page 8: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/8.jpg)
Computational Complexity
• Difficulty in process of watermark extraction– Realtime?
![Page 9: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/9.jpg)
Transparency
• Transparency refers to the perceptual quality of the data being protected.– Watermark should be invisible over all image
types as well as local image characteristics.
• Need to consider perceptually insignificant portion of host image for insertion for maximum transparency
![Page 10: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/10.jpg)
Robustness
• Resistance to attacks on the watermark– Attack – an operation performed on the image that
compromises the watermark– Active, Passive, Collusion, Forgery– Blind vs. Nonblind
• Use of non-robust watermarks– eg. tamper detection
![Page 11: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/11.jpg)
Approaches and Implementation
• Two Types of Encoding– Spatial watermarking (spatial domain)– Spectral watermarking (frequency-domain)
• Many types due to variety of transforms• Adjustments made in frequency domain• More robust
![Page 12: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/12.jpg)
Spatial-Domain Implementation
• Low-level Encoding
• Use of Image Analysis Operations– eg. Edge Detection/Color Separation
• Cons– Easily Attacked (Cropping)
![Page 13: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/13.jpg)
Frequency-Domain Implementation
• Algorithm– Decomposition of image– Addition of Watermark
• Possibly encoded/encrypted
– Re-composition of Image
![Page 14: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/14.jpg)
Frequency-Domain Implementation (Discrete Cosine Transform)
• Discrete Cosine Transform (DCT)– Used in today’s standard JPEG compression
• Relation to DFT• Compression explained by previous groups
– Image divided into non-overlapping blocks– Each block is DC transformed– Block coefficients are quantized through a special
algorithm
• Not ideal for human visual system
![Page 15: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/15.jpg)
Frequency-Domain Implementation (Wavelet Transform)
• Wavelet Transform– Based on Short Time Fourier Transform
(STFT)– Becoming more common in compression
techniques• Better model of Human Visual System than DCT
![Page 16: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/16.jpg)
Examples of Wavelets
![Page 17: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/17.jpg)
Frequency-Domain Implementation(Common Wavelet Transform Algorithm - Decomposition)
Filter Bank Decomposition (10 Bands)
![Page 18: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/18.jpg)
Frequency-Domain Implementation (Wavelet Transform Algorithm - Overview)
Watermarked Image
EncodedWatermark
![Page 19: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/19.jpg)
Frequency-Domain Implementation (Cortex Transform)
• Cortex Transform– Recent– Mimics human visual system
• Corresponds to known structure of human eye
– Has its own disadvantages• Computational complexity – requires much more
data!
![Page 20: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/20.jpg)
Other Issues
• Just Noticeable Difference (JND)– Threshold based on Human Visual System
• Adjustment in Frequency• Adjustments in Intensity
– Important impact on transparency
• Spatial adjustment of Frequency-Domain Watermark
![Page 21: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/21.jpg)
Spread Spectrum
• Used to fulfill transparency criterion• The watermark in is based on spread spectrum
communications– Delivers narrowband data through a noisy channel, by
modulating each data symbol with a wideband (but very low amplitude) signal.
– The data is a single bit – a yes or no decision on whether the given watermark is present.
– The channel is the image data itself– The wideband signal is the watermark.
![Page 22: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/22.jpg)
Color Images
• Scheme nearly identical to grayscale– R/G/B channels
• Each color plane treated as a separate image
– Luminance/Chrominance channels• Luminance = intensity• Chrominance = color
![Page 23: Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible](https://reader035.vdocuments.us/reader035/viewer/2022062314/56649d5d5503460f94a3c249/html5/thumbnails/23.jpg)
Resources• ftp://skynet.ecn.purdue.edu/pub/dist/delp/watermark-proceedings/paper.pdf• http://www.cosy.sbg.ac.at/~pmeerw/Watermarking/• http://www.cosy.sbg.ac.at/~pmeerw/Watermarking/MasterThesis/• http://www.eso.org/projects/esomidas/doc/user/98NOV/volb/node308.html• http://www.jjtc.com/Steganography/• http://www.mathworks.com/matlabcentral/files/3508/digital%20watermarking.pdf• Mihcak, Mehmet Kivanc. “Information Hiding Codes and Their Applications to Images
and Audio”, PhD Thesis. 2002.