Upload
nasir-iqbal
View
216
Download
0
Embed Size (px)
Citation preview
8/13/2019 DigitalWatermark
1/51
DIGITAL WATERMARKING
Ng Huy Phc 50701831
Trn Kim Ln 50701259Phm Quc Hip 50700812
8/13/2019 DigitalWatermark
2/51
PART 1
INTRODUCTION
8/13/2019 DigitalWatermark
3/51
STEGANOGRAPHY
Steganography(art of hidden writing)
The art and science of writing hiddenmessages in such a way that no one apart
from the intended recipient knows of the
existence of the message.
The existence of information is secret.
8/13/2019 DigitalWatermark
4/51
Histaeus used his slaves (information tattooed
on a slavesshaved head)
Initial Applications of information hiding
Passing Secret messages
STEGANOGRAPHY
8/13/2019 DigitalWatermark
5/51
STEGANOGRAPHY
Physical steganography
8/13/2019 DigitalWatermark
6/51
STEGANOGRAPHY
Digital steganography
Network steganography
8/13/2019 DigitalWatermark
7/51
DEFINITION
The process of embedding information into a
digital signal in a way that is difficult to
remove.
The signal may be text, images, audio, video.
The information is also carried in the copy if
the signal is copied.
8/13/2019 DigitalWatermark
8/51
DEFINITION
Example:
8/13/2019 DigitalWatermark
9/51
GENERAL APPLICATIONS
Copyright Protecton
To prove the ownership of digital media.
8/13/2019 DigitalWatermark
10/51
Tamper proofing
To find out if data was tampered.
GENERAL APPLICATIONS
8/13/2019 DigitalWatermark
11/51
Quality Assessment
Degradation of Visual Quality
Loss of Visual Quality
GENERAL APPLICATIONS
8/13/2019 DigitalWatermark
12/51
LIFE-CYCLE PHASES
Attemp to
extract
watermark
from signal
The markedsignal is
modified
Producewatermarked
signal
8/13/2019 DigitalWatermark
13/51
CLASSIFICATION
Digital watermarking techniques can be
classified in many ways :
Visibility
Robustness
Perceptibility Capacity
Embedding method
8/13/2019 DigitalWatermark
14/51
VISIBILITY
Visible
Text or a logo which identifies the owner of the
media.
Invisible
Information is added as digital data to audio,
picture or video, but it cannot be perceived.
May be a form of Steganography.
8/13/2019 DigitalWatermark
15/51
ROBUSTNESS
Robust
Resisted a designated a class of transformations.
Against adversary based attack.
(e.g. noise addition to images)
Used in copy protection application.
Example: Robust Private Spatial Watermarks
8/13/2019 DigitalWatermark
16/51
ROBUSTNESS
Fragile
Fail to be detected after the slightest modification.
Used for tamper detection.
Example: Blind Fragile DCT based Watermarks
8/13/2019 DigitalWatermark
17/51
8/13/2019 DigitalWatermark
18/51
PERCEPTIBILITY
Perceptible
Its presence in the marked signal is noticable, but
non-intrusive.
Imperceptible
Original cover signal and the marked signal are
close to perceptually indistinguishable.
8/13/2019 DigitalWatermark
19/51
PERCEPTIBILITY
Stanford Bunny 3D Model Visible Watermarks in Bunny
Model Distortion
Watermarking
Stanford Bunny 3D Model
Watermarking
Invisible Watermarks in Bunny Model
Minimal Distortion
8/13/2019 DigitalWatermark
20/51
CAPACITY
Depend on the length of the embedded
message.
Zero-bit long
Detect the presence or absence of the watermark.
A 1 denotes the presence. 0 denotes the absence.
N-bit long
Modulated in the watermark.
Support multiple watermarks.
8/13/2019 DigitalWatermark
21/51
EMBEDDING METHOD
Spread-spectrum
The marked signal is ontained by an additive
modification.
Modestly robust.
Have a low information capacity.
8/13/2019 DigitalWatermark
22/51
EMBEDDING METHOD
Quantization type
The marked signal is ontained by quantization
Low robustness.
Have a high infoirmation capacity.
Amplitude modulation
The marked signal is ontained by additive
modification similar to spread spectrum method.
Embedded in the spatial domain.
8/13/2019 DigitalWatermark
23/51
As much information (watermarks) as possible.
Capacity
Only be accessible by authorized parties.
Security Resistance against hostile/user dependent
changes
Robustness
Invisibility
Imperceptibility
DESIGN REQUIREMENTS
8/13/2019 DigitalWatermark
24/51
PART 2
SPECIFIC WATERMARKING
TECHNIQUES ON IMAGES
8/13/2019 DigitalWatermark
25/51
A very simple yet widely used technique for
watermarking images is to add a pattern on top
of an existing image.
Usually this pattern is an image itself - a logo orsomething similar.
SIMPLE WATERMARKING
8/13/2019 DigitalWatermark
26/51
The LSB technique is the simplest technique of
watermark insertion.
Consider a still image : each pixel of the colorimage has three components red, green and
blue.
Allocate 3 bytes for each pixel. Then, each colourhas 1 byte, or 8 bits.
LSB : LEAST SIGNIFICANT BIT
8/13/2019 DigitalWatermark
27/51
A pixel that is bright purple in colour can be showN
as X0 = {R=255, G=0, B=255}
Look at another pixel: X1 = {R=255, G=0, B=254}
Detecting a difference of 1 on a color scale of 256
is almost impossible for human eye.
Replace the color intensity information in the
LSB with watermarking information, the image will
still look the same to the naked eye.
LSB : LEAST SIGNIFICANT BIT
8/13/2019 DigitalWatermark
28/51
Use a secret key to choose a random set of bits.
The more bits used in the host image, the more it
deteriorates.
Increasing the number of bits used though
obviously has a beneficial reaction on the secret
image increasing its clarity.
LSB : LEAST SIGNIFICANT BIT
8/13/2019 DigitalWatermark
29/51
Host image is on the left,
watermark image is on the right
LSB : LEAST SIGNIFICANT BIT
8/13/2019 DigitalWatermark
30/51
Watermarking in the frequency domain involves
selecting the pixels to be modified based on the
frequency of occurrence of that particular pixel.
Transform an image into the frequency domain. A block-based DCT watermarking approach is
implemented.
An image is first divided into blocks and DCT isperformed on each block. The watermark is then
embedded by selectively modifying the middle-
frequency DCT coefficients.
FREQUENCY-BASED TECHNIQUES
8/13/2019 DigitalWatermark
31/51
What is DCT ?
Formally, the discrete cosine transform (DCT)
is a linear, invertible function
F: RN-> RN(where Rdenotes the set of realnumbers), or equivalently an invertible N Nsquare
matrix
FREQUENCY-BASED TECHNIQUES
8/13/2019 DigitalWatermark
32/51
FREQUENCY-BASED TECHNIQUES
8/13/2019 DigitalWatermark
33/51
Discrete wavelet transform (DWT)
The image is separated into different resolution
The original image is high-pass filtered, yielding
the three large images, each describing local
changes details in the original image It is then low-pass filtered and downscaled,
yielding an approximation image.
This image is high-pass filtered to produce thethree smaller detail images.
And low-pass filtered to produce the final
approximation image in the upper-left.
WAVELET WATERMARKING TECHNIQUES
8/13/2019 DigitalWatermark
34/51
WAVELET WATERMARKING TECHNIQUES
8/13/2019 DigitalWatermark
35/51
Embedding the watermark The host image and watermark are transformed
into wavelet domain.
The transformed watermark coefficients wereembedded into those of host image at each
resolution level with a secret key.
WAVELET WATERMARKING TECHNIQUES
8/13/2019 DigitalWatermark
36/51
WAVELET WATERMARKING TECHNIQUES
8/13/2019 DigitalWatermark
37/51
A Narrow-band signal is transmitted over a muchlarger bandwidth such that the signal energy
presented in any signal frequency is undetectable
A watermark is spread over many frequency binsso that the energy in one bin is very small and
certainly undetectable.
SPREAD-SPECTRUM TECHNIQUES
8/13/2019 DigitalWatermark
38/51
SPREAD-SPECTRUM TECHNIQUES
8/13/2019 DigitalWatermark
39/51
Because the watermark verification process knowsthe location and content of the watermark, it is
possible to concentrate these weak signals into a
single output with high SNR (Signal-to-noise ratio).
Remark
To destroy such a watermark would require noise of
high amplitude to be added to all frequency bins.
The location of the watermark is not obvious. Frequency regions should be selected that ensures
degradation of the original datafollowing any attack on
the watermark.
SPREAD-SPECTRUM TECHNIQUES
8/13/2019 DigitalWatermark
40/51
References
Techniques and Applications of Digital
Watermarking and Content ProtectionMichael Arnold, Martin Schmucker, Stephen D. Wolthusen
Steganography And Digital Watermarking
Jonathan Cummins, Patrick Diskin, Samuel Lau and
Robert Parlett,
School of Computer Science, The University of Birmingham.
Real-Time Digital Image Watermarking
Subramaniam Ganesan, Professor of Oakland University,
Michigan
8/13/2019 DigitalWatermark
41/51
PART 3
ATTACKING METHODS
8/13/2019 DigitalWatermark
42/51
Foundations of Attacking
3 effects make detection of watermarking
useless:
Watermark cannot be detected.
False watermarks are detected.
Unauthorized detection of watermark.
8/13/2019 DigitalWatermark
43/51
Classification of Attacking
Removal attacks
Geometrical attacks
Cryptographic attacks
Protocol attacks
8/13/2019 DigitalWatermark
44/51
Classification of watermarking attacks
8/13/2019 DigitalWatermark
45/51
Removal Attacks
Most obvious method
Aim for complete removal of watermarking
Extreme form of this type is restore the
original object
Can happen unintentionally due to operations
in some certain applications.
8/13/2019 DigitalWatermark
46/51
Geometrical Attacks
Do not actually remove the embedded
watermark
Intend to distort the watermark detector
synchronization with the embedded
information
8/13/2019 DigitalWatermark
47/51
Cryptographic Attacks
Aim at cracking the security methods in
watermarking schemes
Finding a way to remove the embedded
watermark information
Embed misleading watermarks
High computational complexity
8/13/2019 DigitalWatermark
48/51
Protocol Attacks
Aim at attacking the entire concept of the
watermarking application
First proposed in framework of invertible
watermark
The attacker subtracts his own watermark
from the watermarked data and claims to be
the owner
Another type is copy attack
8/13/2019 DigitalWatermark
49/51
Some Methods
Collusion Attack
Estimate the watermark from different works with
same watermark
The attackers can obtain an approximation of thewatermark by averaging the watermarked works
8/13/2019 DigitalWatermark
50/51
Some Methods
Remodulation Attack
Damage watermark base on watermark estimation
8/13/2019 DigitalWatermark
51/51
Some Methods
Copy Attack
Estimate a watermark from watermarked data and
copy it to some other data