1 / 31

PROPOSAL “EDGE STEGO DIGIT WATERMARK”

PROPOSAL “EDGE STEGO DIGIT WATERMARK”. A. Astapkovich. State University of Aerospace Instrumentation 201 1. Preliminary_1: digital fingerprinting formalizm. Special notations will be used: In common case watermarking suppose using the encryptions

evadne
Download Presentation

PROPOSAL “EDGE STEGO DIGIT WATERMARK”

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PROPOSAL “EDGE STEGO DIGIT WATERMARK” A.Astapkovich State University of Aerospace Instrumentation 2011

  2. Preliminary_1: digital fingerprinting formalizm • Special notations will be used: • In common case watermarking suppose using the encryptions • and whole procedure is described with • I x K x M → I” • where I - container image • K – encryption key • M – watermark • Attack is described with • I” x A → IA” container image after attack • MA” watermark image extracted from attacked image • Number of pixel in image Im will be described as • NP (Im)

  3. Preliminary_2: robustness measurements Let us N (I1,I2) is some norm for difference between imagesI1 and I2 Robustness is described with the vector N ( I, I”) - quality of the watermarked image N(I, IA”) - attack wildness N (M,MA”) – quality of the extracted watermark image after the attack N (M,MA”)/ N(I,IA”) - relative robustness of the watermarking procedure;

  4. Goal of the research THEORY Creating the knowledge base to support research activity in digital watermarking and digital fingerprinting fields; Developing and investigating the new concepts for robust watermarking and fingerprinting algorithm oriented for the digit video applications; PRACTICE The digital fingerprinting method for high quality video files has to be developed; The method has to be realized as the demo version of the soft tool for fingerprinting;

  5. Basic requirements - practice • Video file has format 1080p60 and is compressed with MPEG4; • 1 min segment of video file can be used for the fingerprinting; • Method has to withstand attacks: rotation, small enlargements with cropping, noising, small nonlinear distortions, down sampling up to 720p30, collusion attack with at least 100 copies;

  6. Basic requirements - theory • Volume of the container (set of images) is the huge in comparizon with the marking information NP (M ) << NP( ∑ Im ) (C.1) • Any watermark can be destroyed with severe attack and to provide the surviving of the fingerprint method has to meet the condition N (M,MA”)/ N(I,IA”) < 1 (C.2) • Existence of the embedded watermark ismore important than the quality of extracted image, but has to be good enough to be recognized N (M,MA”) < prescribed level (C.3)

  7. Edge watermark concept Any watermark can be destroyed by attack with strong enough wildness Attacked image has to have N(I, IA”) < corrupted quality Watermarking method has to be build such way that N (M,MA”)/ N(I,IA”) < 1 It is reasonable to build the watermark to most fragile element of image, like edges Possibility to use edge region has to be investigated, also

  8. Digital Fingerprinting Method (DFM) DFM includes: • method to Generate the Fingerprint Set (GFS) • method to generate the Set of Marking Positions (SMP) • method toEmbedthe Marking Information at selectedmarking positions (EmMI) and method toExtract the Marking Information (ExMI) • method to Interpretation Extracted Fingerprint (IEF)

  9. C 0 1 2 3 Generating the Fingerprint Set (GFS) • To provide robustness the fingerprinting information is converting to set of the images C0123… -> I0, I1, I2,I3 ,I4.. • This images have to be embed to appropriate frames of video to survive against conclusion attack • Images can be used directly or as wavelet decomposition components: LL,LH,HL,HH and so on

  10. Generating the Set of Marking Positions (SMP) • To provide robustness against collusion attack SMP has to provide possibility the Boneh-Shaw fingerprint scheme (code) • For c+1 total users Boney-Shaw code uses O (с3 log (1/ε) ) bits to attain security against coalition of size c with error ε • Boneh-Shaw code is used as building block for many sophisticated digital watermarking schemes • Condition (C.1 ) provides possibility to build method with Boneh-Shaw code for C >> 100

  11. Distortion against collusion • Other possibilities have to be proposed and investigated As example : • Collision attack based on difference of the images and creating the new version to eliminate the distributor ability to trace the object to any of them • Little distortion of images with digital fingerprint destroy the simple collusion attack scheme • Simple averaging will destroy the images and make collusion copy worthless

  12. Example of the edge watermarking • Marking Image was build to set of G and B components • of edge pixels, generated with CANNY edge detector; (I).bmp = 640x480 (I x M ).bmp = 640x480 Extracted M NP (EDGE) = 68698 NP(M)= NP( 100x100)= 104 бит

  13. Method toEmbedthe Marking Information (EmMI) • Kutter algorithm for embedding provides defense against the noising attack Mi - bit of marking information I = {R,G,B} container p(x,y) – selected position for embedding ; • Mi is embedded to B channel L(p)= 0.299 R(p) +0.587 G(p)+0.114 B(p) B(p) + q*L(p), if Mi =0 B(p)” = B(p) - q*L(p),if Mi =1 q – robustness parameter ( larger q leads to better robustness) • In order to increase robustness every bit is embedded r times as the cross figure (7*7, с = 3), so total number is N =3*r ;

  14. Method toExtract the Marking Information (ExMI) ; • Kutter algorithm for blind ExMI related with EmMI • The bit value is determined by looking at the sign of the difference between the pixel under inspection and the estimated original • Modification of ExMI + EmMI on base Kutter algorithm for edge pixel set has to be developed

  15. a b c d (a+b+c+d)/4 (a-b+c-d)/4 LL (a+b-c-d)/4 LH (a-b-c+d)/4 HL HH Robustness of the wavelet decomposition • As estimates the result of work Mohsen Ashourian, Peyman Moallem, Yo-Sung Ho “A Robust Method for Data Hiding in Color Images” can be used //PCM (2) 258-269 , 2005; • LL,HL,LH,HH Haar components of watermark (MASTER b/w image) is imbedded with modified Kutter algorithm

  16. Eхамples of the wavelet decomposition approach Container images • Watermark MASTER image had the size ½ * ½ * 1/3of the container image; LL LH HL HH

  17. Robustness against the compression attack • The published results demonstrate the good robustness properties against compression with JPEG and JPEG2000 • Extracted watermark image • for Q=55 • Robustness to MPEG4 has to be investigated ; PSNR for compression with JPEG

  18. Robustness against down sampling attack Origin watermark Extracted watermark after ½ down sampling • This is possible due to decomposition of the watermark image and the mixing of Haar components during embedding

  19. Robustness against the filtering attack Median filtering (MF) Gauss filtering (GF) PSNR (dB) for extracted M MF GF Parrots 20.65 25.80 Boats 21.65 24.43

  20. Robustness against the cropping attack IA” MA”for10% cutting • Wavelet decomposition of the M provides high robustness for this type of attack ;

  21. Open questions Robustness is described with the vector and some approaches have to be investigated: what norm has to be used ? is it the same norm has to be used for all components ? what level of norm meanings has to be defined from practical point of view ? For IEF stage norm has to be selected also ;

  22. Brief norm review • Classical approach is using the peaksignal-to-noiseratio(PSNR) and MSE ; MAXI — maximal pixel meaning value (for 8-bit w/b image MAXI = 255); • PSNR is no sign measure and useful for small distortions case; Original image Enhanced contrast PSNR=25 dB JPEG compression PSNR=25 dB

  23. Attack wildness measurements • To measure the attack wildness the linear measure has to be used (at least) • PSNR can be modified (as example) Noise amplitude Salt and pepper noise attack

  24. Modern structural norms • Some new ideas based on structural symmetry (SSIM) and complex wavelet structural symmetry (CW-SSIM) can be useful for the watermarking applications Original image Enhanced contrast Distorted brightness Gauss noise MSE=0 SSIM=1 CW-SSIM=1 MSE=306 SSIM=0.928 CW-SSIM=0.938 MSE=309 SSIM=0.987 CW-SSIM=1 MSE=309 SSIM=0.576 CW-SSIM=0.814 Zhou Wang and Eero P. SimoncelliTranslation insensitive image similarity in complex wavelet domain / Proc. IEEE Inter. Conf. Acoustic, Speech & Signal Processing Volume II, Pages 573-576, March 2005

  25. Modern structural norms Impulse noise JPEG compression Rotation to left Enlargement MSE=313 SSIM=0.73 CW-SSIM=0.811 MSE=309 SSIM=0.58 CW-SSIM=0.63 MSE= 873 SSIM= 0.399 CW-SSIM=0.933 MSE=694 SSIM=0.505 CW-SSIM=0.925 • Structural similarity norm can be useful for estimation of the quality of the extracted watermark N (M,MA”) • Metrology benchmark image library and software tools have to be created

  26. Noiseproof edge detector Edge watermarking withstand some attacks like cropping, rotation, displacement easily For blind watermarking this approach needs a noise proof edge detector Concept of the neuron like adaptive noise proof edge detector was proposed and investigated “The teaching by showing” methodology was used : this approach is very flexible : different samples can be used during initial learning filter can increase experience due to additional learning with new samples This approach can be classified as “open algorithm approach”

  27. Canny edge detector • Canny filter is the best edge detector, but ….. Clean image Clean image edges Noisy image Noisy image edges

  28. S1 (S,W) S2 SNSEN 1 THmin THmax Neuron adaptive linear filter Filter 3*3 S1 S2 S3 S4 S5 S6 S7 S8 S9 image Initial learning min II Sw – F II w W = (ST S +  E) –1 ST F Adding the new experience is not very expensive procedure Let us Sek = ∑ SkTSk- experience matrix for k samples Fek = ∑ SkTFk – experience vector for k samples New filter weights Wk+1 = (Sek + S k+1T Sk+1 +  E) –1 * (Fek+Sk+1T Fk+1)

  29. Neuron like adaptive noise proof edge detector • Methodology is universal and has no limits on size of edge filter • Example of 5*5 filter, learned with one and two sample noised images Results of filtering for the clean and noisy test image with H51 and H52 filters with different low threshold (Trmin) TRmin=30 TRmin=40 TRmin=40

  30. Real image test • Two linear 5*5 filter were used to find the edges • with different prescribed low thresholds • Artificial generated pictures with added noise were • used to generate the learning samples • Different teacher samples were used Filter, learned with hand pointed edge Filter, learned with LAPLAS edge detector low threshold : 30 and 60

  31. Conclusion : result is the vector Method component • The fingerprinting based on multiple description subband ( wavelet decomposition) image coding, that is embedded to edge domain with modified Kutter algorithm has to be investigated as the possible solution • Some preliminary estimates demonstrate a good robustness against the various signal processing and geometrical attacks • 2D embedding process (spatial + time) domains has to be investigated as the defense against the set of attacks (includes collusion) Theory component • Vector approach for robustness measurements has to be developed and investigated • Adaptive algorithm on base of neuron net approach for edge detector has to be developed and investigated Practice component • Metrology base has to be created • The demo version of the digital fingerprinting tool has to be created

More Related