Professional Documents
Culture Documents
Advisor Student
Outline
Review of watermarking Applications and examples of watermarking Some architectures of watermarking combined with other techniques
Motive of watermarking
Recent advancements in computer technologies offer many facilities for duplication, distribution, creation, and manipulation of digital contents. Encryption is useful for transmission but does not provide a way to examine the original data in its protected form.
Watermarking process
1) Embedding stage
Spatial domain
flipping the low-order bit of each pixels embedding the watermark in mid-frequency components relatively robust to noise, image processing and compression the quality of the host image will be distorted significantly if too much data is embedded
Frequency domain
2) Distribution stage
Compression, transmission error, and common image processing are seen as an attack on the embedded information
Watermarking process
3) Extraction stage
Blind extraction without original image Semi-blind rely on some data or features Non-blind need original image Evaluate the similarity between the original and detected watermark
False positivewatermark is detected although there is none False negativeno watermark is detected while there is one
4) Detection stage
Watermarking properties
Perceptual transparency Robustness
The mark should resist to
Common signal processing like lossy compression Geometric transformation like image rotation, scaling, and cropping
Security
How easy it is to intentionally remove a watermark
Data capacity
Amount of information that can be stored within the content
Fragile
indicate modifications of the content
Semi-fragile
differentiate between lossy transformation that are info. preserving and lossy transformation which are info. altering
Applications
Copyright Protection
Invisible watermark which can tolerate malicious and unintentional attacks It does not prevent people from copying the digital data
Data Hiding
It tries to invisibly embed the maximum amount of data into a host signal => this allows communication using enciphered messages without attracting the attention of a third party Robustness is not important while invisibility and capacity are required
Applications
Authentication and Data Integrity
Verification watermarks are required to be fragile, so that any modification to the image will destroy the mark
Copy Protection
Requirements
Robustness against removal Ability of blind detection Capability of conveying non-trivial number of bits
Applications
Fingerprinting
Trace the source of illegal copies
Different watermarks are embedded by the owner in the copies of the data that are supplied to different customers Transparency and robustness are required
Examples of watermarking
Image Watermarking Document Watermarking Graphics watermarking Video watermarking
Image Watermarking
Robust and imperceptible
The watermark may be scaled appropriately to minimize noticeable distortion to the host
Examples
Texture-based watermark
Embed it into a portion of the image with similar texture
Document Watermarking
Line-shifts Word-shifts
Document Watermarking
Slight modifications to characters
Graphics Watermarking
Embedding in facial animation parameter (FAP) data
The amount of deviation the watermark signal has on FAP is limited to minimize visible distortion
1% for head rotation 3% for lip motion
Video Watermarking
Copy generation management
Minimum information that must convey
Copy never Copy once Copy no more Copy freely
Video Watermarking
Examples
For video coding like MPEG or H.26x, we embed the watermark into DCT coefficients
Only partial decoding of block DCT is necessary for watermark embedding If constant bit rate is required, only nonzero DCT coefficients are marked
Solution
Using robust watermark to embed the ECM and EMM information into the content
Conclusion
Cryptography does not provide error tolerance. By combining cryptography and robust watermarking techniques, the key receives stronger error-protection since the robust watermark can tolerate transmission errors/attacks The key is implicitly synchronized to the content
In sum, the watermark is added to the significant coefficients of the LL band of the original image to ensure its robustness
Extraction phase
Inspection phase
1. 2. 3. 4. (Iwz, C-RS-ECC) = Extract_Fragile_Watermark_and_Set_LSB_Zero(Iw) RS-ECC = Rijndael_Decrypt(C-RS-ECC, K) RS-ECC = Generate_RS_ECC (Iwz) If RS-ECC == RS-ECC, jump to Extraction phase Fix_Image(Iwz, RS-ECC)
4.
5.
W = RS_Decode(WRS)
Reference
1. W.A. Wan Adnan, S. Hitam, S. Abdul-Karim, M.R.Tamjis, A Review of Image Watermarking, in Proceedings, Student Conference on Research and Development, Aug. 2003, pp.381384 C.I. Podilchuk, E.J. Delp, Digital WatermarkingAlgorithms and Applications, IEEE Signal Processing Magazine, Vol. 18 Issue 4, July 2001, pp. 33-46 S.H. Kwok, C.C. Yang, K.Y. Tam, Watermark Design Pattern for Intellectual Property Protection in Electronic Commerce Applications, in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Vol. 2, Jan 4-7 2000.
2.
3.
Reference
4. F.C. Chang, H.C. Huang, H.M. Hang, Layered access control schemes on watermarked scalable media, IEEE International Symposium on Circuits and Systems, Vol. 5, May 2005, pp. 4983-4986 K.M. Chan, L.W. Chang, A novel public watermarking system based on advanced encryption system, International Conference on Advanced Information Networking and Applications, Vol. 1, 2004, pp. 48-52
5.