1 / 33

Multi resolution Watermarking For Digital Images

Multi resolution Watermarking For Digital Images. Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems. Overview. Why multi resolution watermarking? Introduction Previous Work Multi resolution representation

Download Presentation

Multi resolution Watermarking For Digital Images

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems

  2. Overview Why multi resolution watermarking? Introduction Previous Work Multi resolution representation Multi resolution watermark embedding Watermarking extracting procedures Discussion Experimental results Conclusion Limitations Improvements/Suggestions

  3. Why multi resolution watermarking? • Image quality degradation, the low resolution rendition of the watermark will still be reserved within the corresponding low resolution components of the image.

  4. Introduction Digital Watermark was proposed as a way to claim the ownership of the source and the owner. • In order for watermarking to achieve the maximum protection, the watermarking should be:

  5. Introduction • Undeletable • Perceptually invisible • Statistically undetectable • Resist to lossy data compression • Resist to common image processing operations • Unambiguous

  6. Previous work They use watermark as a symbol or ID number which is comprised of a sequence of bits, and can only be detected by employing the “Detecting Theory”. The original image is subtracted from the image in question, and the similarity between the difference and specific watermark is obtained. The similarity is compared with a predefined threshold to determine whether the image in question contains the specific watermark.

  7. Goal of this paper • In this paper, the watermark is visually recognizable pattern, which can be extract instead of only detected and characterized the owner. So, they can use both the extracted pattern and the similarity measurement for determining whether the image is watermarked.

  8. Restrictions for embedding • Watermark imbedding concentrated in low frequencies • Important Watermark features should be not be in high frequencies • Watermarks high rez copies are mapped to high host frequencies • Watermark needs to be randomly placed in the image so it is difficult to maliciously remove

  9. 1) Pyramid Structure of a binary watermark • JBIG is used as a resolution reduction function of the watermark • Low rez – high rez = differential watermark • no loss of the binary watermark under such a reducing and reconstructing process.

  10. JBig

  11. 2) Wavelet decomposition of the host image • Wavelet transform is used to hierarchically decompose the host image into a series of successively lower resolution reference images and their associate detail images. • At each level, the low resolution image and the detail images contain the information needed to reconstruct the reference image at next higher resolution level.

  12. Wavelet Transform

  13. 3) Pseudo Permutation • To mix the inlay of the watermark for difficult extraction • 2d pseudo-random number traversing • Number each pixel in watermark in ascending order • Then randomly order the numbers

  14. 4) Block Based image-dependent permutation • To improve perceptional invisibility • Pixels are conformed to a pattern of the host image

  15. 5) Modification of DWT Coefficients • Watermarks are imbedded into a neighboring relationship on a per rez bases • A residual mask is used to map watermark to transformed host • Compute residual polarity between neighboring pixels • Modifiy corresponding pixels of transformed host by adding or subtracting polarity

  16. Residual mask

  17. 6) Inverse Discrete Wavelet Transform • Simply apply the inverse discrete wavelet transform

  18. Multi resolution watermark embedding

  19. Watermarking extracting procedures • We need both the original and the watermark images not only for obtaining the permutation mapping specified in image-dependent permutation, but also in computing the correlation with the extracted result as a watermark verification process. The extraction steps are the following:

  20. Watermarking extracting procedures 1. Discrete wavelet transformation: Both the original image and the watermarked image are DWT transformed. 2. Generation of the residual results: By applying the residual masks during the embedding step we can generate the residual results for the detail images. 3. Extract the permuted differential watermarks: Perform the exclusive-or (XOR) operation on the residual results to obtain the permuted binary data.

  21. Watermarking extracting procedures 4. Reverse the permutations: The image dependent permutation mapping can be obtain from the original detailed image and the differential watermark. Then, reverse the image-dependent permutation by the image-dependent permutation mapping, and followed with the pseudo-random permutation according to the predefined pseudo-random order.

  22. Watermarking extracting procedures 5. Reconstruct the watermark: Reconstruct the higher-resolution layers to obtain the extracted watermarks. 6. Similarity Measurement: Similarity measurement of the extracted watermark and the referenced watermark can be defined as:

  23. Discussion 1. User Key. A user key is used as additional feature that can be implemented to serve various embedding processes by using the same embedding technology. 2. Evaluation of Wavelet filters. Choice of wavelet filters is critical issue that affect the quality of the watermarked image and the robustness to compression attacks.

  24. Experimental results

  25. Image Processing Operation

  26. Image Processing Operation

  27. JPEG lossy compression

  28. JPEG lossy compression

  29. Conclusion with the characteristics of successive approximation, as a higher-resolution images are obtained, the higher resolution watermark will be extracted

  30. Limitations • This method can only work if the image is to be worked is ½ the size of the image to watermark. So, we have to place a serious restrictions on the type of watermark which can be used. Since the watermark can be any size, this method isn’t appropriate or reliable for variable size image which is used as a watermark. • We used both the watermarked image and the original images. Other methods require only the watermark image in order to tell whether the image is embedded or not.

  31. Limitations • The evaluation of suitability of wavelet filters for invisible watermarking is under exploring.

  32. Improvements/Suggestions • They should extend their method to work for also color images. • This paper was not giving any solution to any general form of image manipulation.

  33. Questions??????

More Related