48
Thái Chí Minh Trần Lương Khiêm 1

Digital Watermarking

  • Upload
    reegan

  • View
    83

  • Download
    5

Embed Size (px)

DESCRIPTION

Digital Watermarking. Thái Chí Minh Trần Lương Khiêm. Content. Introduction History Applications Requirements Techniques Attacks. Content. Introduction History Applications Requirements Techniques Attacks. Introduction. 499.99 = 0.99. Introduction. Introduction. - PowerPoint PPT Presentation

Citation preview

Page 1: Digital  Watermarking

Thái Chí MinhTrần Lương Khiêm

1

Page 2: Digital  Watermarking

Content

Introduction History Applications Requirements Techniques Attacks

2

Page 3: Digital  Watermarking

Content

Introduction History Applications Requirements Techniques Attacks

3

Page 4: Digital  Watermarking

Introduction

4

Page 5: Digital  Watermarking

Introduction

5

Page 6: Digital  Watermarking

Introduction

6

Page 7: Digital  Watermarking

Introduction

Relation between embedded message and cover work

Goal and assumption

7

Page 8: Digital  Watermarking

Content

Introduction History Applications Requirements Techniques Attacks

8

Page 9: Digital  Watermarking

History

Histiæus & the slave

Paper watermark, 1282

Banknote. 18th century

9

Page 10: Digital  Watermarking

History In 1954, Emil Hembrooke of the Muzak Corporation filed a patent for

watermarking” musical Works The first Information Hiding Workshop (IHW) ,which included digital

watermarking as one of its primary topics, was held in 1996

10

Page 11: Digital  Watermarking

Content

Introduction History Applications Requirements Techniques Attacks

11

Page 12: Digital  Watermarking

Applications

Broadcast monitoring Owner identification Proof of ownership Transaction tracking Content authentication Copy control

12

Page 13: Digital  Watermarking

Broadcast monitoring

13

Page 14: Digital  Watermarking

Owner identification

14

Page 15: Digital  Watermarking

Proof of ownership

15

Page 16: Digital  Watermarking

Transaction tracking

16

Page 17: Digital  Watermarking

Transaction tracking

17

Page 18: Digital  Watermarking

Content authentication

Digital signature is NOT enough

18

Page 19: Digital  Watermarking

Content authentication

19

Page 20: Digital  Watermarking

Copy control

Cryptography is NOT enough

20

Page 21: Digital  Watermarking

Copy control

21

Page 22: Digital  Watermarking

Content

Introduction History Applications Requirements Techniques Attacks

22

Page 23: Digital  Watermarking

Requirements

Perceptual Transparency Robustness Data payload With / Without originals Security

23

Page 24: Digital  Watermarking

Perceptual Transparency

24

Page 25: Digital  Watermarking

Robustness

Fragile Semi-fragile Robust

25

Page 26: Digital  Watermarking

Data payload

Data payload refers to the number of bits a watermark encodes within a unit of time or within a Work

Different applications may require very different data payloads

26

Page 27: Digital  Watermarking

With / Without originals

Non-blind watermarkingType I

Type II

Semi-blind watermarking

Blind watermarking

27

Page 28: Digital  Watermarking

Security

28

Page 29: Digital  Watermarking

The mutual dependencies among the elements

29

Page 30: Digital  Watermarking

Content

Introduction History Applications Requirements Techniques Attacks

30

Page 31: Digital  Watermarking

Techniques

LSB Spread spectrum Applying on Vietnamese documents

31

Page 32: Digital  Watermarking

Techniques

32

Page 33: Digital  Watermarking

Techniques

There are many techniques to do watermarking in digital things:Spatial domain watermarking: LSB, in text

data, …Transform domain watermarking: frequency-

based watermarking, wavelet based watermarking○ Embedding the watermark in the transform

domain from carrier object (using DCT, DFT, DWT, …)

33

Page 34: Digital  Watermarking

Techniques

LSB:Embedding:

○ Choosing some representation values (e.g pixels) of carrier object.

○ Embed the bits of message (watermark) to LSBs of representation valueMessage ‘A’: 100 0001Carrier object: RGB (2 bits)

100000 010101 101100

010001 100001 000100

101110 011010 111000

34

Page 35: Digital  Watermarking

Techniques

LSB:Embedding:

○ Choosing some representation values (e.g pixels) of carrier object.

○ Embed the bits of message (watermark) to LSBs of representation valueMessage ‘A’: 100 0001Carrier object: RGB (2 bits)

100001 010100 101100

010000 100001 000100

101111 011010 111000

35

Page 36: Digital  Watermarking

Techniques

LSB:Detector:

○ Retrieve the watermark by having the knowledge of the representation values (e.g pixels) used for embedding individuals bits

36

Page 37: Digital  Watermarking

Techniques

Spread spectrumUsing frequency domain transform to

convert the input image into another domain and embedding the watermark to this domain.

37

Page 38: Digital  Watermarking

Techniques

• Apply on Vietnamese documents

38

Page 39: Digital  Watermarking

Techniques

• Apply on Vietnamese documents

39

Page 40: Digital  Watermarking

Techniques

• Apply on Vietnamese documents○ Besides, we can use some methods:

Vertically shifting text lines Horrizontally shifting words

40

Page 41: Digital  Watermarking

Content

Introduction History Applications Requirements Techniques Attacks

41

Page 42: Digital  Watermarking

Attacks

From processing From attackers

42

Page 43: Digital  Watermarking

Attacks

The actions take effect on the watermark embedded in carrier objects.Affects:

○ Destroying the watermark or modifying the watermark with new wrong information.

○ Removing the watermark entirely.But: not degrading the quality of carrier

objects (image, audio, video)Relating to a requirements of watermarking:

Robustness

43

Page 44: Digital  Watermarking

Attacks Classification:

From proscessing carrier objects○ Common signal processing: digital-to-analog and

analog-to-digital conversion, or change image contrast, color, JPEG compression, …

○ Common geometric distortions: scaling, rotating, cropping, dithering …

From attacker○ Mosaic○ Collusion attacks: get the watermark or remove

watermarks entirely to get the original work.○ …

44

Page 45: Digital  Watermarking

Attacks

45

Page 46: Digital  Watermarking

AttacksMosaic attack

46

Page 47: Digital  Watermarking

Attacks How to protect watermarks from attacks

Understanding and applying new researchs in watermarking

Using StirMark Benchmark evaluation engine to evaluate your watermarking scheme○ “All vendors of digital watermarks have their

products benchmarked by Stirmark and as of August 2001, no watermark from any vendor survives the test, ie: the watermarks are all removed without degradation to image quality occurring. “

47

Page 48: Digital  Watermarking

48