530 likes | 808 Views
Multiple watermarking. Wu Dan 2007.10.10. Introduction (I). Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust) Verification watermarks( fragile) Multi-user watermarking The difficulty of multiple watermarking is the order.
E N D
Multiple watermarking Wu Dan 2007.10.10
Introduction (I) • Multipurpose watermarking • Ownership watermarks (very robust) • Captioning watermarks ( robust) • Verification watermarks( fragile) • Multi-user watermarking • The difficulty of multiple watermarking is the order.
Introduction (II) • The basic method of watermarking • SS (spread spectrum) x’=x+αw • QIM (quantization index module) Odd even odd even 0 1 0 1
Multipurpose Watermarking for Image Authentication and Protection Chun-Shien Lu, Member, IEEE, Hong-Yuan Mark Liao, Member, IEEE IEEE TRANSACTIONS ON IMAGE PROCESSING, OCTOBER 2001
I)cocktail watermarking scheme • Bipolar watermarking • Complementary modulation • Use of a wavelet-based human visual system to control the hiding strength
II) Proposed multipurposealgorithm • Wavelet transform
Quantization of wavelet coefficient S: scale o: orientation (x,y): position MTU: masking threshold units
Negative modulation Positive modulation
q(|p(x,y)|) is regarded as the embedded watermark values. Negative modulation positive modulation
Host image recovery The difference between a recovered wavelet coefficient and its corresponding original wavelet coefficient Watermark detection
Compare the hidden watermark (K) and the extracted one ( ) • Detection of robust watermark
A novel blind multiple watermarking technique for images Peter H. W. Wong, Member, IEEE, Oscar C. Au, Senior Member, IEEE, and Y. M. Yeung IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, AUGUST 2003
SWE (single watermarking embedding) • Select image pixels or transform coefficients • Watermark host vector: Watermark: A pseudorandom bit sequence:
The first key: a set of N pseudorandom positive real numbers • The second key: being zero-mean Gaussian with variance Split K and Y into N subvectors of equal length
Force the projection of Yi to be the center of the nearest cell of the desired watermark bits • Decode the watermark of SWE
II) MWE • Embed Q bits simultaneously in each subvector Yi. • The first key: • The second key:
Iterative approach Decode and detection
III) IWE in JPEG compressed domain • Problem: when the original image for the proposed watermarking algorithm is a JPEG-compressed image and the watermarked image needs to be JPEG recompressed to produce another .jpg. Would the watermark still be decodable?
Watermark host vector: • Y1=(f1(0,1),f2(0,1) ,……f32*32(0,1)) Y2=(f1(1,0),f2(1,0) ,……f32*32(1,0)) …… in zigzag order. • Y’i=Yi+Ni
Near optimal watermark estimation and its countermeasure: antidisclosure watermark for multiple watermark embedding Chun-Shien Lu, Member, IEEE, and Chao-Yung Hsu 2007.4 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY,
I) Watermark estimation • X: the original image; : the watermarked image. :the attacked image • Conventional attacks: The collusion attack
Copy attack: the estimated watermark can be inserted into unwatermarked media data to produce a counterfeit watermark data.
Compare denoising attack and copy attack • X: the original image; : the watermarked image. :the estimated watermark is the watermark extracted from if BER( , ) >threshold, the denosing attack succeed.
Z: the faked original image; : the faked watermarked image. is the watermark extracted from if BER( , ) <threshold, the copy attack succeed. A smaller threshold resist copy attack. A larger threshold resist denosing attack.
Necessary Condition for Optimal Watermark Estimation { } Sufficient and Necessary Condition for Optimal Watermark Estimation Perfect cover data recovery
A near-perfect cover data recovery algorithm For each embedding unit with index q. We adopt Weiner filtering for denosing purpose to get an estimation .
Collusion Estimation of Watermark Sign: Estimation of Watermark Magnitude via Visual Model for Complete Removal: the wavelet coefficient for the recovered image is:
III) Content dependent watermark • Media hash (MH) The magnitude relation ship between two AC coefficient at blocks u and v. This feature value is verified to be robust because this magnitude relationship can be mostly preserved under incidental modifications (e.g., compressions, filtering, and denoising).
CDW (content-dependent watermark) Resistant collusion attack
Conclusion • Non-uniform quantization • Design the perfect CDW
Thanks! Thanks!