digital watermarking: algorithms and applications park, jungjin

36
Digital watermarking: algorithms and applications Park, Jungjin

Upload: chester-ward

Post on 03-Jan-2016

217 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Digital watermarking: algorithms and applications Park, Jungjin

Digital watermarking: algorithms and applications

Park, Jungjin

Page 2: Digital watermarking: algorithms and applications Park, Jungjin

Index

Watermarking embedding Watermarking detection Document Graphic Audio Video Image

Page 3: Digital watermarking: algorithms and applications Park, Jungjin

Watermark embedding

Watermark embedding scheme

► embed the watermark directly into the host data or to a transformed version of the host data

(DCT, wavelet)-popular due to the natural framework for incorporating perceptual knowledge into the embedding algorithm

-Many of compression techniques such as JPEG work in the same framework and this allows for watermarking of the compressed bit stream with only partial decoding

Page 4: Digital watermarking: algorithms and applications Park, Jungjin

Watermark embedding

S: original host signal (image luminance values or DCT coefficients)

M: watermark message (serial number or credit card number logo)

K: secret key

WSX

Page 5: Digital watermarking: algorithms and applications Park, Jungjin

Watermark embedding

► Secret key is used to generate a random sequence to embed in the host signal

► It is also used to determine a random sequence which identifies locations in the host signal for watermarking embedding

-without knowledge of the key, it should be difficult to remove or alter the embedded message without destroying the original content

► no-key or public-key (QIM) may be desirable .

Page 6: Digital watermarking: algorithms and applications Park, Jungjin

Watermark detection

Detection or verification : the process of making a binary decision at the decoder, it check whether a specific watermark is or not present in the received data

▪ Type I (false positive) : the case where a watermark is detected when it does not exist

▪ Type 2 (false negative) : the case when a existing watermark is not detected

Identification : the process of being able to decode one of N possible choices at the receiver.

▪ Open set : the possibility that one of N or no watermark exists in the data

▪ Closed set : the problems where one of N possible watermarks is known to be in the received data and the detector has to pick the most likely one

Page 7: Digital watermarking: algorithms and applications Park, Jungjin

Watermark detection

Blind detection

►S is not available at the decoder,

→S acts as an additive noise component in the watermarking detection process

►S is available at the decoder

→It could be used to estimate the channel distortions and invert them to provide better detection performance

Page 8: Digital watermarking: algorithms and applications Park, Jungjin

Watermark detection

WW

WW EE

WW

SW

ˆ

ˆ

ˆ

ˆ

Typical watermarking detector

Watermark detection is performed by comparing the correlation coefficient to a threshold value which can be modified according to the tradeoff between probability of detection and the probability of false alarm

pWW

pWW

T

T

ˆ

ˆ

Watermark W detected

Watermark W is not detected

Page 9: Digital watermarking: algorithms and applications Park, Jungjin

Documents watermarking

Document watermarking can be achieved by altering the text formatting or by altering certain characteristics of textual elements

Line- Shift Coding►The most easily discernible by readers►The most robust type of encoding in the presence of noise→the long lengths of text lines provide a relatively easily detectable feature ►Altering a document by vertically shifting the locations of text lines►decoding without need of the original image→Original image is known to have uniform line spacing

Page 10: Digital watermarking: algorithms and applications Park, Jungjin

Documents watermarking

Word-Shift Coding

► Altering a document by horizontally shifting the locations of words within text lines

► The spacing between adjacent words on a line is often varied to support text justification.

→less discernible to the reader than line-shifting

► Decoding need the original image

→variable spacing

Page 11: Digital watermarking: algorithms and applications Park, Jungjin

Documents watermarking

Feature coding

► Chosen text features are altered by extending or shorting the lengths by one or more pixels

► Decoding require the original image

Ex) vertical end line top of letters, b,d,h,etc

Altered by expending or shorting lengths

Page 12: Digital watermarking: algorithms and applications Park, Jungjin

Graphics watermarking

Watermarking of facial animation parameters (FAP) defined by the MPEG-4 standard

► 66 FAPs

▪ global head motion parameters

- Head pitch and yaw angles

▪ local face motion parameters

-opening of eyelids , opening of lips, movement of innerlip corners

16 FAPs (jaw, chin, inner lips and cornerlips)

12 FAPs (eyeballs pupils eyelids), 8 FAPs eyebrows ,

4 FAPs cheeks , 5 FAPs tongue , 3 FAPs global head rotation,

10 FAPS outer lip position, 4 FAPs nose, 4 FAPs ears

Page 13: Digital watermarking: algorithms and applications Park, Jungjin

Graphics watermarking

)](),()/,/([)()( ktkPNNtMkWMtFAPtFAP kWMk

Embedding

► One bit of watermark information is embedded in a block of facial animation parameters (FAPs) -using PN sequence

→generated by any random number generator that produces binary output values -1 and +1)

► Minimize visible distortion

-apply an amplitude adaptation

Limit the maximum deviation of the watermarked FAPs from the unwatermarked FAPs to 3% of dynamic range for local FAPs like lip movement, and 1% of the dynamic range for global FAPs like head rotation.

Page 14: Digital watermarking: algorithms and applications Park, Jungjin

Graphics watermarking

),())()((),(1)1( 1)1(

tkPNtFAPtFAPsignnmWMMm

Mmkk

Nn

Nnt

WMk

Detection

► Extracted from the watermarked parameters directly by

→Subtraction of the unwatermarked FAPs from the watermarked FAPs

→Subsequent correlation with the same filtered PN sequence that has been used for embedding

→Thresholding as a bit decision

Page 15: Digital watermarking: algorithms and applications Park, Jungjin

Video watermarking

Current issue

► Design of an effective copy control system for DVD include s the placement of the detector

Two proposals for detector placement

▪ Watermark detection in the drive

→Advantage : Pirated content cannot leave the drive in playback mode or recording mode

▪ Watermark detection within the application

→Advantage : ability to provide a more complex detector and flexibility of extending the scheme to other data type

Page 16: Digital watermarking: algorithms and applications Park, Jungjin

Video watermarking

Unique requirement for DVD application

► Copy generation management

Ability to detect the copy once state and change it to copy no more state after the recording

►Two approach

Secondary watermarks, Ticket

Page 17: Digital watermarking: algorithms and applications Park, Jungjin

Video watermarking

Scene-adaptive video watermarking technique

► based on temporal wavelet transform

► using a tow-band perfect reconstruction filter bank

→Separates static areas from dynamic areas so that separate watermarking strategies can be applied to the different areas.

► constant watermarking apply for static, varying watermark apply for the dynamic areas to defeat watermark deletion through frame averaging

Page 18: Digital watermarking: algorithms and applications Park, Jungjin

Video watermarking

Real time watermark embedding of compressed video

► adding the watermark by modifying the fixed length and variable length codes in the compressed video bit stream

→ allow for a computationally efficient way of real-time watermark insertion

→ allow for a relatively high payload

►drawback: decoding the bit stream removes the watermark

Page 19: Digital watermarking: algorithms and applications Park, Jungjin

Video watermarking

► More robust technique for real time watermark embedding

→adding the watermark by enforcing energy differences between various video regions

→ This technique is done by discarding high frequency components

→only partial decoding of a compressed video bit stream is necessary to apply this watermark

Page 20: Digital watermarking: algorithms and applications Park, Jungjin

Audio watermarking

Audio watermarking requirements

► Inaudible

► Robust :filtering, resampling, compression, noise, cropping, A/D-D/A conversion

► Embedded directly in the data

► self-clocking for ease of detection in the presence of cropping and time-scale change operations

Page 21: Digital watermarking: algorithms and applications Park, Jungjin

Audio watermarking

Phase coding

Work by substituting the phase of an initial audio segment with a reference phase that represents the data

For the decoding process

The synchronization of the sequence is done before decoding

The length of the segment and the data interval must be known at the receiver

The value of the phase of segment is detected as a binary string

Page 22: Digital watermarking: algorithms and applications Park, Jungjin

Audio watermarking

Spread spectrum

► Direct Sequence Spread Spectrum encoding(DSSS)

→spreads the signal by multiplying it by a chip(key), a maximal length pseudorandom sequence- applied to the coded information to modulate the sequence into a spread spectrum sequence

→The spectrum of the data is spread over the available band

→the spread data sequence is attenuated and added to the original file as additive random noise

►decoder→pseudorandom key(chip) is needed to decode→signal synchronization is done

Page 23: Digital watermarking: algorithms and applications Park, Jungjin

Audio watermarking

►Unlike phase coding, DSSS introduced additive random noise to the sound►to keep the noise level low, inaudible→The spread code is attenuated to roughly 0.5 percent of the dynamic range of the host sound file

Page 24: Digital watermarking: algorithms and applications Park, Jungjin

Audio watermarking

Echo data hiding

► Embedding data into a host audio signal by introducing an echo

-data are hidden by varying three parameters of the echo

Initial amplitude, offset, decay rate

Zero represent a binary zero ,one represent a binary one < threshold (human ear can resolve the echo)

► It is possible to encode and decode information in the form of binary digits into a media stream with minimal alteration to the original signal

►to minimize alteration

→ Addition of resonance simply gives the signal a slightly richer sound

Page 25: Digital watermarking: algorithms and applications Park, Jungjin

Image watermarking

Embed m-sequences into the least significant bit (LSB) of the data

► provide an effective transparent embedding technique

► good correlation properties (for detection)

► computationally inexpensive to implement

Texture block coding

► Hide data within the continuous random texture patterns of a picture

► Implemented by copying a region from a random texture pattern found in a picture to an area that has similar texture

Page 26: Digital watermarking: algorithms and applications Park, Jungjin

Image watermarking

Texture block coding Detection

1. Autocorrelate the image with itself. This will produce peaks at every point in the autocorrelation where identical regions of the image overlap.

2. Shift the image as indicated by the peaks in Step 1.Now subtract the image from its shifted copy

3. Square the result and threshold it to recover only those values quite close to zero. The copied region will be visible as these values.

Page 27: Digital watermarking: algorithms and applications Park, Jungjin

Image watermarking

Transform domain watermarking

► robust to common compression techniques

► block-based DCT which is the fundamental building block of current image coding standard JPEG and MPEG

► a pseudorandom subset of the blocks are chosen and a triplet of midrange frequencies are altered to encode a binary sequence

▪ Watermarks inserted in the high frequencies are vulnerable to attack

▪ The low frequency components are perceptually significant and sensitive to alterations

Page 28: Digital watermarking: algorithms and applications Park, Jungjin

Image watermarking

►two watermarking techniques based on visual models

▪ Image-adaptive DCT approach

▪ Image-adaptive DWT approach

► Utilizing visual models which have been developed in the context of image compression

► Very effective visual models have been developed for compression applications that take into account frequency sensitivity, local luminance sensitivity, contrast masking

Page 29: Digital watermarking: algorithms and applications Park, Jungjin

Image watermarkingVisual model

►frequency sensitivity : human eye’s sensitivity to sine wave gratings at various frequencies

▪depend on the modulation transfer function of the eye and is dependent of the image data

►Luminance sensitivity : measure the effect of the detectability threshold of noise on a constant background

►Contrast masking : the detectability of one signal in the presence of another signal and the effect is strongest when both signals are of the same spatial frequency , orientation, and location

►combination of the components –JND thresholds for the entire image

Page 30: Digital watermarking: algorithms and applications Park, Jungjin

Image watermarking

otherwiseX

tXifwtXX

bvu

Cbvubvubvu

Cbvubvu

bvu,

,

,,

,,,,,,,,,,*,,

bvuX ,, DCT coefficient

Watermarked DCT coefficients

Sequence of watermark values

Computed JND from the visual model

bvuw ,,

Cbvut ,,

*,, bvuX

IA-DCT

embedding

►The watermark is only inserted into the luminance component of the image

Page 31: Digital watermarking: algorithms and applications Park, Jungjin

Image watermarking

ectednotiswwatermarkT

ectedwwatermarkT

EE

ww

t

ww

XXw

ww

ww

wwww

Cbvu

bvusbvu

bvubvubvus

det

det

ˆ

*

*

*

*

*

,,

*,,,*

,,

*,,,,

*,,,

Detection

Normalized correlation detection scheme based on classical detection for the IA-DCT scheme

Received watermark

Normalized correlation coefficient between two signals

Page 32: Digital watermarking: algorithms and applications Park, Jungjin

Image watermarking

otherwiseX

tXifwtXX

flvu

Fflflvuflvu

Fflflvu

flvu,

,

,,,

,,,,,,,,,,,*,,,

flvuX ,,,

flvuw ,,,

*,,, flvuX

Fflt ,

IA-W embedding

Wavelet coefficient at position (u,v) in resolution level l, frequency orientation f

Watermarked wavelet coefficient

Computed frequency weight at level l and frequency orientation f

Watermark sequence

► watermark is inserted only in the luminance component of the image

Page 33: Digital watermarking: algorithms and applications Park, Jungjin

Image watermarking

flfl ww

flfl

ww

Ffl

flvusflvus

flvuflvuflvus

EE

wwfl

t

ww

XXw

,,

*

,*,

,

*,,,,*

,,,,

*,,,,,,

*,,,,

),(

ˆ

)}(),({max

1

1

***

**

**

,

*

1),(

1),(

fl

N

N

wwwwflww

N

lflww

lww

N

fflww

fww

f

f

IA-W detection

Correlation is performed separately

IA-W scheme is based on a much simpler visual model which only takes into account frequency sensitivity, the multi resolution structure of the watermark and the watermark detection scheme results in a very robust scheme

Page 34: Digital watermarking: algorithms and applications Park, Jungjin

Image watermarking

Digital watermarking by geometric warping

Embeds information in an image by changing the geometric features of the image

►the watermark is formed by a predefined dense pixel pattern, such as a collection of lines

►Salient points in an image are warped into the vicinity of the line pattern in such a way that the changes to the image are imperceptible

▪ subdivide the image in a number of blocks. Find a fixed number of most significant pixels, these are called salient points

Page 35: Digital watermarking: algorithms and applications Park, Jungjin

Image watermarking

Detection►Determining whether a significantly large number of points are within the vicinity of the line patterns

Advantage►detection is computationally faster►Easier to detect the watermark in images have been rotated, scaled, or distorted by a geometric transformation

Page 36: Digital watermarking: algorithms and applications Park, Jungjin

Questions?