10
Watermarking Matt Elliott Brian Schuette

Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References

Embed Size (px)

Citation preview

Page 1: Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References

Watermarking

Matt Elliott

Brian Schuette

Page 2: Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References

Overview

• Goals

• Methods

• Comparison

• Attacks

• References

Page 3: Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References

Goals

Watermark Goals• Robust• Invisible• Recovery

Project Goals• Watermark Types

– Fragile

– Robust

• Techniques– Frequency Domain

– Spatial domain

Page 4: Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References

Bit-Plane Slicing

• Spatial Domain• LSB contains

watermark• Simple detection

• Many options– Image blocks

– Encode Text

– Specific Areas

Page 5: Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References

Cox Method

– Frequency Domain

– Transformation

– AC Coefficients• Sorted by size

• Largest 1000 selected

• Psuedo-random watermark embedded

– Reverse transformation

2D DCT sort v’=v (1+ w) IDCT & normalize

Original image

N largest coeff.

other coeff.

marked image

random vector generator

wmk

seed

Page 6: Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References

Comparison

• Fragile Watermark– Very susceptible to attack– Used for tampering detection

• Robust Watermark– Resistant to tampering– Used with public images– Provides proof of ownership

Page 7: Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References

Bit-Plane Slicing

Page 8: Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References

Methods of Attack

• Scaling

• Cropping

• JPEG

• Print/Xerox

Page 9: Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References

References

• ECE 738 Advanced Digital Image Processing• Professor Hu• Wikipedia• Digital Image Processing, Gonzalez and Woods• I. Cox, J. Kilian, T. Leighton, T. Shamoon:

“Secure Spread Spectrum Watermarking for Multimedia'', IEEE Transaction on Image Processing, vol.6, no.12, pp.1673-1687, 1997.

Page 10: Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References

Questions?