Professional Documents
Culture Documents
Main Topics
W
signature
(Watermark)
X
Main Image
Image-dependent
Memoriz
ed
pattern
Memorize
Received ImageImage-dependent
W
Extracted
watermark
3
Lossless robust:
1.
2.
Lossless Robust
Attacks
Robust until
watermark is
detectable
Robust until a
threshold (fragile for
more attacks)
Lossy / lossless
lossless
Question:
?
Lossless Robust ~ Semi-fragile
Zero-watermark
Lossless Methods
categories:
Reversible watermarking
1.
Zero-watermarking
2.
Zero-watermarking
considerations:
10
4 8
16
32
64
11
12
13
14
Feature Selection
scramble
XLK
Main Image
LK
Image-dependent
15
(?)
16
PRN
G
17
Seed is used
for block
selection.
18
v=3 3x3
v=4 4x4
9
16
possible: N=
possible: N=
19
Classification
Example: AND
0
0
0
1
0
1
0
1
0
0
1
1
20
Linear separable
21
Non-Linear separable
kernel function
X
22
SVM
the
trained
SVM
possesses
acceptable generalization ability to
correctly estimate the watermark
bits even some error bits existing in
the input vectors.
23
SVM
24
Extraction
25
26
Results
Bit correct
rate:
The average
BCR indicates
the average
of six BCR
values for six
images.
27
28
Attacks
29
30
Description
Zero watermark
Methods
visual cryptography
wavelet domain.
wavelet domain
LL compares with average
coefficients
XOR
trained neural network (TNN)
spatial domain
edge information
spatial domain
31
32
33
34
TBCR
compares the test input vector of
36
37