Upload
vivid1984
View
220
Download
0
Embed Size (px)
Citation preview
8/7/2019 Image Watermark - Final
1/29
Image Watermarking for
Multimedia Security
8/7/2019 Image Watermark - Final
2/29
Example:LSB Encoding
Original Image Watermark
8/7/2019 Image Watermark - Final
3/29
Replace 4 and 7 LSBs of Original
4 LSBs Watermarked 7 LSBs Watermarked
8/7/2019 Image Watermark - Final
4/29
What is a Watermark?
A watermark is a secret message that is embedded
into a cover (original or host) message.
Only the knowledge of a secret key allows us toextract the watermark from the cover message.
Effectiveness of a watermarking algorithm is a
function of its
Resilience to attacks.
Capacity.
Stealth.
8/7/2019 Image Watermark - Final
5/29
What Can Be Watermarked?
Multimedia data.
Video.
Audio. Still Images.
Documents.
Software.
Hardware designs.
8/7/2019 Image Watermark - Final
6/29
Multimedia Watermarks
A digital watermark is a secret key
dependent signal inserted into digital
multimedia data. Watermark can be later detected/extracted in
order to make an assertion about the data.
A digital watermark can be.
Visible (perceptible).
Invisible (imperceptible).
8/7/2019 Image Watermark - Final
7/29
Watermark Applications
Proof of ownership. Prove ownership in a court of law.
Simple copyright notice may not help for digitalmultimedia data. Easily destroyed.
Copy prevention or control. Recording device may inhibit recording a signal if
detected watermark indicates that it is prohibited.
DVD video and digital music distribution.
Content protection (visible watermarks). Destruction of watermark destroys the content.
8/7/2019 Image Watermark - Final
8/29
Watermark Applications
Authentication. Detect if image/video has been altered.
Digital cameras.
Media Bridging. Bridge media such as magazines and the Internet.
Digimarc.
BroadcastM
onitoring. Keep track of when and where an advertisementis played.
ConfirMedia from Verance.
8/7/2019 Image Watermark - Final
9/29
Watermark Applications
Fingerprinting. Identify the source of an illegal copy.
Unique watermark embedded in each copy.
DiVX, a modified version of DVD.
Secret Communications.
Hide information such that general public do not
know its presence.
Bin Laden hides attack plans in images on the
web USA Today, Feb. 26, 2001.
8/7/2019 Image Watermark - Final
10/29
Requirements
Requirements vary with application. For
example:
Perceptually transparent - must not perceptuallydegrade original content.
Robust - survive accidental or malicious attempts
at removal.
Oblivious or Non-oblivious - Recoverable with orwithout access to original.
Capacity Number of watermark bits embedded.
Efficient encoding and/or decoding.
8/7/2019 Image Watermark - Final
11/29
Contradicting Requirements
Perceptual Transparency
Oblivious vs. Non-Oblivious
RobustnessPayload Security
8/7/2019 Image Watermark - Final
12/29
Example: Additive Watermarks
W( , ) : seudo and om attern {-1,0,1}
kMultiply by gain
factork
I( , ) IW( , )
IW(x,y)=I(x,y)+k W(x,y)
W(x,y) detected
T p
' ( , ) ( , )W
I x y W x yR T" p
No W(x,y) detected
8/7/2019 Image Watermark - Final
13/29
h
v
Additive watermarks in transformdomain: Spread Spectrum
8/7/2019 Image Watermark - Final
14/29
Watermark Attacks
Active Attacks.
Hacker attempts to remove or destroy the
watermark. Watermark detector unable to detect watermark.
Key issue in proof of ownership, fingerprinting,
copy control.
Not serious for authentication or covertcommunication.
8/7/2019 Image Watermark - Final
15/29
Watermark Attacks
Passive Attacks. Hacker tries to find if a watermark is present.
Removal of watermark is not an aim. Serious for covert communications.
Collusion Attacks. Hacker uses several copies of watermarked data
(images, video etc.) to construct a copy with nowatermark.
Uses several copies to find the watermark.
Serious for fingerprinting applications.
8/7/2019 Image Watermark - Final
16/29
Watermark Attacks
Forgery Attacks.
Hacker tries to embed a valid watermark.
Serious in authentication. If hacker embeds a valid authentication
watermark, watermark detector can accept bogus
or modified media.
8/7/2019 Image Watermark - Final
17/29
Example: Forging Photo I.D.
Bad
Forgery!
Millionaire with
Swiss bank
account
Assistant
Professor
Thanks
Hong Man,
for this
picture!
8/7/2019 Image Watermark - Final
18/29
Content-based Watermarking
Original Watermark
8/7/2019 Image Watermark - Final
19/29
JPEG Compression Attack
8/7/2019 Image Watermark - Final
20/29
Watermarking Research
Information Theoretic Issues. Compute watermarking capacity
How many watermark bits can be hidden in awatermark channel ?
Capacity when multiple watermarks are used.
Decision Theoretic Issues. Robust watermark detector.
Quickest possible watermark detection.
Invariant to statistical uncertainties.
Achieves desired false alarm and detectionprobabilities.
8/7/2019 Image Watermark - Final
21/29
Watermarking Research
Signal Processing Issues. What transforms to use ? wavelet, DCT etc.
Geometric invariant transform scale, translation,
and rotation invariance. Watermarking protocols and system issues.
Protocol used by sender and receiver for securetransmission.
Steganalysis. How to analyze multimedia data for the presence
of watermark(s).
Secure Digital Music Initiative (SDMI) has beenhacked!
8/7/2019 Image Watermark - Final
22/29
Robust Watermarking Techniques- A Communications Framework
+
Media Carrier
HVS
Watermark
Media Carrier
Noise/Attack Channel
Water-
mark
Coding and
Modulation
Decoding and
DemodulationX
8/7/2019 Image Watermark - Final
23/29
Techniques Developed at
MSyNC Lab
(some results are in collaboration with
Iowa State U. and Polytechnic U.)
8/7/2019 Image Watermark - Final
24/29
Information TheoreticFormulation
A new watermark channel model. Multiplicative and additive attacks.
Models geometric attacks (killer attack).
Attack parameters assumed imperfectlyknown.
Lower and upper bounds on watermarkingcapacity.
Many current capacity estimates are specificcases of proposed estimates.
Capacity in the presence of multiplewatermarks using multiuser information
theory.
8/7/2019 Image Watermark - Final
25/29
Multiple DescriptionWatermarking
A new framework for watermarking using
multiple description codes.
Partition the source into multiple descriptions. Each description carries enough information.
Allocate watermarking bits to descriptions subject
to distortion constraints.
Experiments for secure wireless mediatransmission is promising.
Rate-distortion theory formulation.
8/7/2019 Image Watermark - Final
26/29
Decision Theoretic Formulation
How many pixels to watermark ?
A new measure for watermarking capacity.
Different from standard information theoreticformulation.
Perhaps a more practical measure.
Fast watermark detector.
Computation reduction. Useful for hardware implementation.
8/7/2019 Image Watermark - Final
27/29
Steganalysis
A distributed detection framework for
analyzing images for presence of
watermarks. Theoretical formulation and practical
algorithm for steganalysis of LSB based
image watermarking.
A new watermarking capacity measure calledsteganographic capacity.
8/7/2019 Image Watermark - Final
28/29
Projected Applications ofProposed Techniques
Secure media streaming.
Wireless multimedia security.
Watermark error resilience coding.
Error concealment for wireless multimedia
transmission. Refer to
http://www.ece.stevens-tech.edu/~mouli/msync/index.html
8/7/2019 Image Watermark - Final
29/29
Million Dollar Question
Watermarking or Encryption or Combination?