Multiple watermarking

50
Multiple watermarking Wu Dan 2007.10.10

description

Multiple watermarking. Wu Dan 2007.10.10. Introduction (I). Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust) Verification watermarks( fragile) Multi-user watermarking The difficulty of multiple watermarking is the order. - PowerPoint PPT Presentation

Transcript of Multiple watermarking

Page 1: Multiple watermarking

Multiple watermarking

Wu Dan2007.10.10

Page 2: Multiple watermarking

Introduction (I)

Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust) Verification watermarks( fragile)

Multi-user watermarking The difficulty of multiple

watermarking is the order.

Page 3: Multiple watermarking

Introduction (II)

The basic method of watermarking SS (spread spectrum) x’=x+αw QIM (quantization index module)

Odd even odd even

0 1 0 1

Page 4: Multiple watermarking

Multipurpose Watermarking for Image Authentication and Protection

Chun-Shien Lu, Member, IEEE, Hong-Yuan Mark Liao, Member, IEEE

IEEE TRANSACTIONS ON IMAGE PROCESSING,

OCTOBER 2001

Page 5: Multiple watermarking

I ) cocktail watermarking scheme Bipolar watermarking Complementary modulation Use of a wavelet-based human

visual system to control the hiding strength

Page 6: Multiple watermarking

II) Proposed multipurposealgorithm

Wavelet transform

Page 7: Multiple watermarking

Quantization of wavelet coefficient

S: scale o: orientation (x,y): position

MTU: masking threshold units

Page 8: Multiple watermarking

Negative modulation

Positive modulation

Page 9: Multiple watermarking

q(|p(x,y)|) is regarded as the embedded watermark values.

Negative modulation

positive modulation

Page 10: Multiple watermarking

Host image recovery The difference between a recovered

wavelet coefficient and its corresponding original wavelet coefficient

Watermark detection

Page 11: Multiple watermarking

Compare the hidden watermark (K) and the extracted one ( )

Detection of robust watermark

Page 12: Multiple watermarking

Detection of fragile watermark

Page 13: Multiple watermarking
Page 14: Multiple watermarking
Page 15: Multiple watermarking
Page 16: Multiple watermarking
Page 17: Multiple watermarking

A novel blind multiple watermarking technique for images  

Peter H. W. Wong, Member, IEEE, Oscar C. Au, Senior Member, IEEE, and Y. M. Yeung

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, AUGUST 2003

Page 18: Multiple watermarking

I) SWE (single watermarking embedding)

Select image pixels or transform coefficients

Watermark host vector:

Watermark: A pseudorandom bit sequence:

Page 19: Multiple watermarking

The first key: a set of N pseudorandom positive real numbers

The second key: being zero-mean Gaussian with variance

Split K and Y into N subvectors of equal length

Page 20: Multiple watermarking
Page 21: Multiple watermarking

Force the projection of Yi to be the center of the nearest cell of the desired watermark bits

Decode the watermark of SWE

Page 22: Multiple watermarking

II) MWE

Embed Q bits simultaneously in each subvector Yi.

The first key: The second key:

Page 23: Multiple watermarking
Page 24: Multiple watermarking

Direct approach

Page 25: Multiple watermarking

Iterative approach Decode and detection

Page 26: Multiple watermarking

III) IWE in JPEG compressed domain

Problem: when the original image for the

proposed watermarking algorithm is a JPEG-compressed image and the watermarked image needs to be JPEG recompressed to produce another .jpg.

Would the watermark still be decodable?

Page 27: Multiple watermarking

Watermark host vector: Y1=(f1(0,1),f2(0,1) ,……f32*32(0,1))Y2=(f1(1,0),f2(1,0) ,……f32*32(1,0))…… in zigzag order. Y’i=Yi+Ni

Page 28: Multiple watermarking
Page 29: Multiple watermarking
Page 30: Multiple watermarking
Page 31: Multiple watermarking
Page 32: Multiple watermarking
Page 33: Multiple watermarking

Near optimal watermark estimation and its countermeasure: antidisclosure watermark for multiple watermark embedding

Chun-Shien Lu, Member, IEEE, and Chao-Yung Hsu

2007.4IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECH

NOLOGY,

Page 34: Multiple watermarking

I) Watermark estimation

X: the original image; : the watermarked image. :the attacked image

Conventional attacks:

The collusion attack

Page 35: Multiple watermarking

Copy attack: the estimated watermark can be inserted into unwatermarked media data to produce a counterfeit watermark data.

Page 36: Multiple watermarking

Compare denoising attack and copy attack X: the original image; : the watermarked imag

e. :the estimated watermark

is the watermark extracted from

if BER( , ) >threshold, the denosing attack succeed.

Page 37: Multiple watermarking

Z: the faked original image; : the faked watermarked image.

is the watermark extracted from

if BER( , ) <threshold, the copy attack succeed.

A smaller threshold resist copy attack.A larger threshold resist denosing attack.

Page 38: Multiple watermarking

II) Optimal watermark estimation

Page 39: Multiple watermarking

Necessary Condition for Optimal Watermark Estimation

{ }

Sufficient and Necessary Condition for Optimal Watermark Estimation

Perfect cover data recovery

Page 40: Multiple watermarking

A near-perfect cover data recovery algorithm

For each embedding unit with index q. We adopt Weiner filtering for denosing purpose to get an estimation .

Page 41: Multiple watermarking

Collusion Estimation of Watermark Sign:

Estimation of Watermark Magnitude via Visual Model for Complete Removal:the wavelet coefficient for the recovered image is:

Page 42: Multiple watermarking
Page 43: Multiple watermarking
Page 44: Multiple watermarking

III) Content dependent watermark

Media hash (MH)The magnitude relation ship

between two AC coefficient at blocks u and v.

This feature value is verified to be robust because this magnitude relationship can be mostly preserved under incidental modifications (e.g., compressions, filtering, and denoising).

Page 45: Multiple watermarking

CDW (content-dependent watermark)

Resistant collusion attack

Page 46: Multiple watermarking

Resistant copy attack

Page 47: Multiple watermarking
Page 48: Multiple watermarking
Page 49: Multiple watermarking

Conclusion

Non-uniform quantization Design the perfect CDW

Page 50: Multiple watermarking

Thanks!