steganography for secure digital watermarking
DESCRIPTION
Steganography for Secure Digital Watermarking. Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt University of Ulster, UK. Dr. Abbas Cheddad Umea University, Sweden. Steganography. Secret Data. Stego Object. Cover Image. Encoder. Key. Decoder. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Steganography for Secure Digital Watermarking](https://reader036.vdocuments.us/reader036/viewer/2022062723/56813fc0550346895daa9e96/html5/thumbnails/1.jpg)
http://isrc.ulster.ac.uk
Steganography for Secure Digital Watermarking
1
Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt
University of Ulster, UK
Dr. Abbas CheddadUmea University, Sweden
![Page 2: Steganography for Secure Digital Watermarking](https://reader036.vdocuments.us/reader036/viewer/2022062723/56813fc0550346895daa9e96/html5/thumbnails/2.jpg)
http://isrc.ulster.ac.uk2
Steganography
Key
Encoder
Cover Image
Secret Data
Stego Object
Decoder
Secret Data
Communications Channel
![Page 3: Steganography for Secure Digital Watermarking](https://reader036.vdocuments.us/reader036/viewer/2022062723/56813fc0550346895daa9e96/html5/thumbnails/3.jpg)
http://isrc.ulster.ac.uk
Secure Digital Watermarking
Cover Image
Secret Data
Protected Image
![Page 4: Steganography for Secure Digital Watermarking](https://reader036.vdocuments.us/reader036/viewer/2022062723/56813fc0550346895daa9e96/html5/thumbnails/4.jpg)
http://isrc.ulster.ac.uk
Digital content authentication
4
Sorry - this is NOT original.
Test image Original image
Original Image Attacked Image
![Page 5: Steganography for Secure Digital Watermarking](https://reader036.vdocuments.us/reader036/viewer/2022062723/56813fc0550346895daa9e96/html5/thumbnails/5.jpg)
http://isrc.ulster.ac.uk5
Secret Data Cover Image Stego Object
Self-Embedding
![Page 6: Steganography for Secure Digital Watermarking](https://reader036.vdocuments.us/reader036/viewer/2022062723/56813fc0550346895daa9e96/html5/thumbnails/6.jpg)
http://isrc.ulster.ac.uk 6
How to detect alterations (1/2)
Final ResultGrayscale image of
Altered image
Altered image
Extracted grayscale
image
![Page 7: Steganography for Secure Digital Watermarking](https://reader036.vdocuments.us/reader036/viewer/2022062723/56813fc0550346895daa9e96/html5/thumbnails/7.jpg)
http://isrc.ulster.ac.uk7
Original image Extracted image
How to detect alterations (2/2)
![Page 8: Steganography for Secure Digital Watermarking](https://reader036.vdocuments.us/reader036/viewer/2022062723/56813fc0550346895daa9e96/html5/thumbnails/8.jpg)
http://isrc.ulster.ac.uk
Self-Embedding - Temporal information
UU SDW:American Beauty-045/789+0
8
Key Frames
![Page 9: Steganography for Secure Digital Watermarking](https://reader036.vdocuments.us/reader036/viewer/2022062723/56813fc0550346895daa9e96/html5/thumbnails/9.jpg)
http://isrc.ulster.ac.uk9
Temporal content change detection
Original Video Attacked Video
Detected Video
![Page 10: Steganography for Secure Digital Watermarking](https://reader036.vdocuments.us/reader036/viewer/2022062723/56813fc0550346895daa9e96/html5/thumbnails/10.jpg)
http://isrc.ulster.ac.uk
Conclusion A steganography based self-embedding technique
provides a solution for digital content authentication. Benefits
- Protects commercial value of digital content- Protects the secrecy of digital content- Protects digital content from modification
Applicable fields: film/animation, TV, games, music, images
10
![Page 11: Steganography for Secure Digital Watermarking](https://reader036.vdocuments.us/reader036/viewer/2022062723/56813fc0550346895daa9e96/html5/thumbnails/11.jpg)
http://isrc.ulster.ac.uk11
Thank You
![Page 12: Steganography for Secure Digital Watermarking](https://reader036.vdocuments.us/reader036/viewer/2022062723/56813fc0550346895daa9e96/html5/thumbnails/12.jpg)
http://isrc.ulster.ac.uk12
Secret Data Cover Image Stego Object
Self-Embedding
![Page 13: Steganography for Secure Digital Watermarking](https://reader036.vdocuments.us/reader036/viewer/2022062723/56813fc0550346895daa9e96/html5/thumbnails/13.jpg)
http://isrc.ulster.ac.uk13
How to detect alterations (1/3)
Altered Document
Recovered Document
Grayscale image of Altered Document
Final Result
Altered Document
Recovered Document
Grayscale image of Altered Document
Altered Document
Recovered Document