1 / 10

Watermarking and Steganography

Watermarking and Steganography. Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that work itself.

dahlia
Download Presentation

Watermarking and Steganography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Watermarking andSteganography • Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that work itself. • Steganography is the art of writing in cipher, or in character, which are not intelligible except to persons who have the key. In computer terms, steganography has evolved into the practice of hiding a message within a larger one in such a way that others cannot discern the presence or contents of the hidden message.

  2. Examples of Watermarking and Steganography

  3. Watermarking Insert a logo, pattern, a message, and etc. into an image, audio, video to claim the ownership. Steganography Put a cover image, audio, video, and etc. on a secret message to protect the secrecy during the transmission. Differencebetween Watermarking andSteganography

  4. Strategies of Watermarking (1/2) • Cox et al. (1997) A watermark may contain additional information, including the identity of the purchaser of a particular copy of the material. In order to be effective, a watermark should be: unobtrusive, robust, universal, unambiguous

  5. Criteria of Watermarking Unobtrusive: The watermark should be perceptually invisible, or its presence should not interfere with the work being protected. Robust: The watermark must be difficult (hopefully impossible) to remove. In particular, the watermark should be robust to Common signal processing: enhancement, requantization, resampling, recompression, dithering, and etc. Common geometric distortions: rotation, scaling, translation, cropping. Subterfuge Attacks: Collusion and Forgery The watermark should be robust to collusion by multiple individuals who each possesses a watermarked copy of the data. Universal The same digital watermarking algorithm should apply to all three media under consideration: i.e., audio, image, video. Unambiguous Retrieval of the watermark should unambiguously identity the owner.

  6. Strategies of Watermarking (2/2) Wolfgang, Podilchuk, and Delp (1999) Three principles that characterize perceptually based watermarks:Transparency: the watermark is not visible in the image under typical viewing conditions.Robustness to attacks: the watermark can still be detected after the image has undergone linear or nonlinear operations such as those mentioned above.Capacity: the watermarking technique must be of allowing multiple watermarks to be inserted in an image, with each watermark still being independently verifiable.

  7. Criteria for Watermarking For the ownership authentication and/or protection of intellectual property. Experiments of watermarking studies may include at least the following tasks: a watermark definition (generative or acquired) watermark embedding or insertion scheme extraction, detection, and/or verification of a watermark Experiments for testing transparency (unobstrusion~flexibility) Experiments for testing robustness to image operations, such as compression Experiments for testing collusion or multiple colluders PSNR values between the original and watermarked imagesPSNR values between the original and attacked images

  8. Watermarking Watermark generator Embedder Detector Steganography Selection of a cover image, video, audio Embedding Extraction Major Tasks of Watermarking and Steganography

  9. Haar transform 5/3 wavelet transform Daubechies Four 9/7 wavelet transform 3-Scale Wavelet Transforms

  10. 3-Scale Wavelet Transforms

More Related