1 / 50

Multiple watermarking

Multiple watermarking. Wu Dan 2007.10.10. Introduction (I). Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust) Verification watermarks( fragile) Multi-user watermarking The difficulty of multiple watermarking is the order.

xaria
Download Presentation

Multiple watermarking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Multiple watermarking Wu Dan 2007.10.10

  2. Introduction (I) • Multipurpose watermarking • Ownership watermarks (very robust) • Captioning watermarks ( robust) • Verification watermarks( fragile) • Multi-user watermarking • The difficulty of multiple watermarking is the order.

  3. Introduction (II) • The basic method of watermarking • SS (spread spectrum) x’=x+αw • QIM (quantization index module) Odd even odd even 0 1 0 1

  4. Multipurpose Watermarking for Image Authentication and Protection Chun-Shien Lu, Member, IEEE, Hong-Yuan Mark Liao, Member, IEEE IEEE TRANSACTIONS ON IMAGE PROCESSING, OCTOBER 2001

  5. I)cocktail watermarking scheme • Bipolar watermarking • Complementary modulation • Use of a wavelet-based human visual system to control the hiding strength

  6. II) Proposed multipurposealgorithm • Wavelet transform

  7. Quantization of wavelet coefficient S: scale o: orientation (x,y): position MTU: masking threshold units

  8. Negative modulation Positive modulation

  9. q(|p(x,y)|) is regarded as the embedded watermark values. Negative modulation positive modulation

  10. Host image recovery The difference between a recovered wavelet coefficient and its corresponding original wavelet coefficient Watermark detection

  11. Compare the hidden watermark (K) and the extracted one ( ) • Detection of robust watermark

  12. Detection of fragile watermark

  13. A novel blind multiple watermarking technique for images Peter H. W. Wong, Member, IEEE, Oscar C. Au, Senior Member, IEEE, and Y. M. Yeung IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, AUGUST 2003

  14. SWE (single watermarking embedding) • Select image pixels or transform coefficients • Watermark host vector: Watermark: A pseudorandom bit sequence:

  15. The first key: a set of N pseudorandom positive real numbers • The second key: being zero-mean Gaussian with variance Split K and Y into N subvectors of equal length

  16. Force the projection of Yi to be the center of the nearest cell of the desired watermark bits • Decode the watermark of SWE

  17. II) MWE • Embed Q bits simultaneously in each subvector Yi. • The first key: • The second key:

  18. Direct approach

  19. Iterative approach Decode and detection

  20. III) IWE in JPEG compressed domain • Problem: when the original image for the proposed watermarking algorithm is a JPEG-compressed image and the watermarked image needs to be JPEG recompressed to produce another .jpg. Would the watermark still be decodable?

  21. Watermark host vector: • Y1=(f1(0,1),f2(0,1) ,……f32*32(0,1)) Y2=(f1(1,0),f2(1,0) ,……f32*32(1,0)) …… in zigzag order. • Y’i=Yi+Ni

  22. Near optimal watermark estimation and its countermeasure: antidisclosure watermark for multiple watermark embedding Chun-Shien Lu, Member, IEEE, and Chao-Yung Hsu 2007.4 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY,

  23. I) Watermark estimation • X: the original image; : the watermarked image. :the attacked image • Conventional attacks: The collusion attack

  24. Copy attack: the estimated watermark can be inserted into unwatermarked media data to produce a counterfeit watermark data.

  25. Compare denoising attack and copy attack • X: the original image; : the watermarked image. :the estimated watermark is the watermark extracted from if BER( , ) >threshold, the denosing attack succeed.

  26. Z: the faked original image; : the faked watermarked image. is the watermark extracted from if BER( , ) <threshold, the copy attack succeed. A smaller threshold resist copy attack. A larger threshold resist denosing attack.

  27. II) Optimal watermark estimation

  28. Necessary Condition for Optimal Watermark Estimation { } Sufficient and Necessary Condition for Optimal Watermark Estimation Perfect cover data recovery

  29. A near-perfect cover data recovery algorithm For each embedding unit with index q. We adopt Weiner filtering for denosing purpose to get an estimation .

  30. Collusion Estimation of Watermark Sign: Estimation of Watermark Magnitude via Visual Model for Complete Removal: the wavelet coefficient for the recovered image is:

  31. III) Content dependent watermark • Media hash (MH) The magnitude relation ship between two AC coefficient at blocks u and v. This feature value is verified to be robust because this magnitude relationship can be mostly preserved under incidental modifications (e.g., compressions, filtering, and denoising).

  32. CDW (content-dependent watermark) Resistant collusion attack

  33. Resistant copy attack

  34. Conclusion • Non-uniform quantization • Design the perfect CDW

  35. Thanks! Thanks!

More Related