1 / 13

Steganography for Secure Digital Watermarking

Steganography for Secure Digital Watermarking. Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt University of Ulster, UK. Dr. Abbas Cheddad Umea University, Sweden. Steganography. Secret Data. Stego Object. Cover Image. Encoder. Key. Decoder.

oded
Download Presentation

Steganography for Secure Digital Watermarking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Steganography for Secure Digital Watermarking Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt University of Ulster, UK Dr. Abbas Cheddad Umea University, Sweden

  2. Steganography Secret Data Stego Object Cover Image Encoder Key Decoder Communications Channel Secret Data

  3. Secure Digital Watermarking Secret Data Cover Image Protected Image

  4. Digital content authentication Original Image Attacked Image Test image Original image Sorry - this is NOT original.

  5. Self-Embedding Stego Object Cover Image Secret Data 5

  6. How to detect alterations (1/2) Altered image Extracted grayscale image Grayscale image of Altered image Final Result 6

  7. How to detect alterations (2/2) Original image Extracted image

  8. Self-Embedding - Temporal information UU SDW:American Beauty-045/789+0 Key Frames

  9. Temporal content change detection Original Video Attacked Video Detected Video

  10. Conclusion • A steganography based self-embedding technique provides a solution for digital content authentication. • Benefits • Protects commercial value of digital content • Protects the secrecy of digital content • Protects digital content from modification • Applicable fields: film/animation, TV, games, music, images

  11. Thank You

  12. Self-Embedding Cover Image Secret Data Stego Object 12

  13. How to detect alterations (1/3) Altered Document Altered Document Altered Document Recovered Document Recovered Document Recovered Document Grayscale image of Altered Document Grayscale image of Altered Document Final Result 13

More Related