Digital Watermarking

Preview:

DESCRIPTION

Digital Watermarking. Thái Chí Minh Trần Lương Khiêm. Content. Introduction History Applications Requirements Techniques Attacks. Content. Introduction History Applications Requirements Techniques Attacks. Introduction. 499.99 = 0.99. Introduction. Introduction. - PowerPoint PPT Presentation

Citation preview

Thái Chí MinhTrần Lương Khiêm

1

Content

Introduction History Applications Requirements Techniques Attacks

2

Content

Introduction History Applications Requirements Techniques Attacks

3

Introduction

4

Introduction

5

Introduction

6

Introduction

Relation between embedded message and cover work

Goal and assumption

7

Content

Introduction History Applications Requirements Techniques Attacks

8

History

Histiæus & the slave

Paper watermark, 1282

Banknote. 18th century

9

History In 1954, Emil Hembrooke of the Muzak Corporation filed a patent for

watermarking” musical Works The first Information Hiding Workshop (IHW) ,which included digital

watermarking as one of its primary topics, was held in 1996

10

Content

Introduction History Applications Requirements Techniques Attacks

11

Applications

Broadcast monitoring Owner identification Proof of ownership Transaction tracking Content authentication Copy control

12

Broadcast monitoring

13

Owner identification

14

Proof of ownership

15

Transaction tracking

16

Transaction tracking

17

Content authentication

Digital signature is NOT enough

18

Content authentication

19

Copy control

Cryptography is NOT enough

20

Copy control

21

Content

Introduction History Applications Requirements Techniques Attacks

22

Requirements

Perceptual Transparency Robustness Data payload With / Without originals Security

23

Perceptual Transparency

24

Robustness

Fragile Semi-fragile Robust

25

Data payload

Data payload refers to the number of bits a watermark encodes within a unit of time or within a Work

Different applications may require very different data payloads

26

With / Without originals

Non-blind watermarkingType I

Type II

Semi-blind watermarking

Blind watermarking

27

Security

28

The mutual dependencies among the elements

29

Content

Introduction History Applications Requirements Techniques Attacks

30

Techniques

LSB Spread spectrum Applying on Vietnamese documents

31

Techniques

32

Techniques

There are many techniques to do watermarking in digital things:Spatial domain watermarking: LSB, in text

data, …Transform domain watermarking: frequency-

based watermarking, wavelet based watermarking○ Embedding the watermark in the transform

domain from carrier object (using DCT, DFT, DWT, …)

33

Techniques

LSB:Embedding:

○ Choosing some representation values (e.g pixels) of carrier object.

○ Embed the bits of message (watermark) to LSBs of representation valueMessage ‘A’: 100 0001Carrier object: RGB (2 bits)

100000 010101 101100

010001 100001 000100

101110 011010 111000

34

Techniques

LSB:Embedding:

○ Choosing some representation values (e.g pixels) of carrier object.

○ Embed the bits of message (watermark) to LSBs of representation valueMessage ‘A’: 100 0001Carrier object: RGB (2 bits)

100001 010100 101100

010000 100001 000100

101111 011010 111000

35

Techniques

LSB:Detector:

○ Retrieve the watermark by having the knowledge of the representation values (e.g pixels) used for embedding individuals bits

36

Techniques

Spread spectrumUsing frequency domain transform to

convert the input image into another domain and embedding the watermark to this domain.

37

Techniques

• Apply on Vietnamese documents

38

Techniques

• Apply on Vietnamese documents

39

Techniques

• Apply on Vietnamese documents○ Besides, we can use some methods:

Vertically shifting text lines Horrizontally shifting words

40

Content

Introduction History Applications Requirements Techniques Attacks

41

Attacks

From processing From attackers

42

Attacks

The actions take effect on the watermark embedded in carrier objects.Affects:

○ Destroying the watermark or modifying the watermark with new wrong information.

○ Removing the watermark entirely.But: not degrading the quality of carrier

objects (image, audio, video)Relating to a requirements of watermarking:

Robustness

43

Attacks Classification:

From proscessing carrier objects○ Common signal processing: digital-to-analog and

analog-to-digital conversion, or change image contrast, color, JPEG compression, …

○ Common geometric distortions: scaling, rotating, cropping, dithering …

From attacker○ Mosaic○ Collusion attacks: get the watermark or remove

watermarks entirely to get the original work.○ …

44

Attacks

45

AttacksMosaic attack

46

Attacks How to protect watermarks from attacks

Understanding and applying new researchs in watermarking

Using StirMark Benchmark evaluation engine to evaluate your watermarking scheme○ “All vendors of digital watermarks have their

products benchmarked by Stirmark and as of August 2001, no watermark from any vendor survives the test, ie: the watermarks are all removed without degradation to image quality occurring. “

47

48

Recommended