Top Banner
A Review on: Spread Spectrum Watermarking Techniques In the name of GOD 1/47
34

A Review on: Spread Spectrum Watermarking Techniques

Feb 23, 2016

Download

Documents

Barbra

In the name of GOD. A Review on: Spread Spectrum Watermarking Techniques . Table of contents. Introduction Spread Spectrum communication Cox method Adaptive watermarking Comparison Conclusion. Spread Spectrum Method. Introduction. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A Review on: Spread Spectrum  Watermarking Techniques

A Review on:

Spread Spectrum Watermarking Techniques

In the name of GOD

1/47

Page 2: A Review on: Spread Spectrum  Watermarking Techniques

Table of contents

• Introduction• Spread Spectrum communication

Cox method Adaptive watermarking

• Comparison• Conclusion

2/47

Page 3: A Review on: Spread Spectrum  Watermarking Techniques

Spread Spectrum Method

3/47

Page 4: A Review on: Spread Spectrum  Watermarking Techniques

Introduction

• The first papers on data hiding appeared in the early 1990s. (LSB) embedding techniques elementary and non-robust against noise.

• The period 1996–1998: The development of Spread Spectrum method

codes• image watermarking (Cox et al. 1997)• Video watermarking (Hartung and Girod 1998 )

more robust and have been used in several commercial products.

4/47

Page 5: A Review on: Spread Spectrum  Watermarking Techniques

Spread Spectrum Modulation (SSM)

• The watermarking problem is analogous to a communication problem with a jammer.

• motivated many researchers to apply techniques from SSM (successful against jammers.)

• SSM good for military communication systems (secrecy and robustness due to unauthorized person)

• The jamming problem:• Standard radio or TV communication system:

TX sends a signal in a relatively narrow frequency band. Inappropriate in a communication problem with a

jammer. The jammer would allocate all his power to that

particular band of frequencies.

5/47

Page 6: A Review on: Spread Spectrum  Watermarking Techniques

Spread Spectrum Modulation (Cont’d)

• SSM system: Allocates secret sequences (with a broad frequency

spectrum) to the TX, which sends data by modulating these sequences.

RX demodulates the data using a filter matched to the secret sequences. (The codes used for spreading have low cross correlation values and are unique to every user)

• Attacker must spread jamming power over all D dimensions.• Owner knows which N dimensions are important.

6/47

the message is spread over a wide frequency BW.

The SNR in every frequency band is small (difficult to detect)

Page 7: A Review on: Spread Spectrum  Watermarking Techniques

Advantages of Spread Spectrum Communication

• Resist intentional and unintentional interference.• Can share the same frequency band with other

users• Protect the privacy, due to the pseudo random code

sequence.

7/47

Page 8: A Review on: Spread Spectrum  Watermarking Techniques

Spread Spectrum technique for watermarking

• Adopt ideas from spread spectrum communication

• The WM message is spread over a wide frequency bandwidth (spectrum of the host image) Hide a D-dim. signal (information to embed) in an N-dim. space (part of

original document), N >> D

• The SNR in every frequency band is small (difficult to detect) RX knows the place of WM concentrate weak signals to high SNR

output.

• Generate noise like carrier or hopping sequence with cryptographically secure methods (Security )

• if parts of the message are removed from several bands, enough information is present in other bands to recover the message it is difficult to remove the message completely without entirely destroying

the cover (robustness) 8/47

Page 9: A Review on: Spread Spectrum  Watermarking Techniques

Embedding a Direct-Sequence Spread-Spectrum Watermark

9/47

Page 10: A Review on: Spread Spectrum  Watermarking Techniques

Recovering a Direct-Sequence Spread Spectrum Watermark

10/47

Page 11: A Review on: Spread Spectrum  Watermarking Techniques

Secure Spread Spectrum Watermarks for Multimedia

• The first spread spectrum watermarking method based on DCT Proposed by Cox.

• Cox et al. asserted that in order for a watermark to be robust, it need to be placed in the most significant part of the image.

• the watermark will be composed of random numbers drawn from a Gaussian N(0,1) distribution

11/47

Page 12: A Review on: Spread Spectrum  Watermarking Techniques

Insertion of the watermark

• Insert X (WM) into V (DCT coeffs.) results in V’• 3 natural formula for computing V’:

• The general form:

• Do not provide a solution for how to compute in order to maximize the robustness of the watermark. (set =0.1)

• How choose N?

i

i i i

xi

i i i

i

v ' v (v '

v

1 x )v x

v' ea

= +

==

a+a

ii i iv ' (1 x )v +a=

12/47

Page 13: A Review on: Spread Spectrum  Watermarking Techniques

Informed Watermarking Method of Cox et al.

13/47

Page 14: A Review on: Spread Spectrum  Watermarking Techniques

Secure Spread Spectrum Watermarks for Multimedia

• Evaluating the similarity of the watermark The extracted watermark might differ from the

original watermark.

• one should decide on a threshold T, and compare

• Set T to minimize the false positives and false negatives.

**

**

.

.),(WW

WWWWSim

*Sim(W, W ) T>

14/47

Page 15: A Review on: Spread Spectrum  Watermarking Techniques

Threshold Comparison

• Reducing False Positive (FP) error Selecting the appropriate threshold

n

iii wwWW

1

** .. ).,0())(,0(~. **

1

2** WWNwNWWn

ii

)1,0(~),( * NWWSim10

6

2/ 108659.9 d 21 2

te t

**

**

.

.),(WW

WWWWSim

SelectThreshold =6

15/47

Page 16: A Review on: Spread Spectrum  Watermarking Techniques

Experiments

• Watermarked image

16/47

Page 17: A Review on: Spread Spectrum  Watermarking Techniques

Compression and cropping attacks

17/47

Page 18: A Review on: Spread Spectrum  Watermarking Techniques

Uniqueness of the Watermark

0 100 200 300 400 500 600 700 800 900 1000-5

0

5

10

15

20

25

30

Random Watermarks

Sim

ilarit

y

Threshold (T=6)

18/47

Page 19: A Review on: Spread Spectrum  Watermarking Techniques

Disadvantages

• The need to have the original image to be able to detect the watermark.

• Since the DCT transform is based on the whole image , the transform does not allow for any local spatial control of the watermark.

• Does not provide a maximum use of the human visual system

19/47

Page 20: A Review on: Spread Spectrum  Watermarking Techniques

Image Adaptive Watermarking

• The image adaptive DCT based on 8x8 DCT framework (Wolfgang et al.) Wavelet (Podilchuk and Zheng)

• Use Just Noticeable Difference (JND) Matrix.

• The JND is derived from image independent frequency sensitivity and image dependent luminance sensitivity and contrast masking.

• This assists in determining the maximum amount of watermark signal that can be tolerated. the goal is to place the maximum strength watermark

sequence (Why?). 20/47

Page 21: A Review on: Spread Spectrum  Watermarking Techniques

Adaptive Image Watermarking

),(JND.),(),( vuwvuIvuI w

1)HVS models as image Adaptive weights of watermarks:

otherwise JND),( if

),(

),(.),(),(

vuI

vuIvuwvuI

vuI w

2) HVS models as filters of Perceptually important image components:

otherwise JND),( if

),(

),(.JND),(),(

vuI

vuIvuwvuI

vuI w

3) A combination of Previous two methods.

21

Page 22: A Review on: Spread Spectrum  Watermarking Techniques

Podilchuk-Zeng (P&Z) Method

• Watermark Embedding:

• : threshold calculated for each level & frequency orientation by

Watson for 9.7 Daubechies Filters.

otherwise if

. ,,,,

,,

,,,,,,,*,,,

,

TXX

wTXX vu

vu

vuvuvu

,T

22

Page 23: A Review on: Spread Spectrum  Watermarking Techniques

Watermark Detection

• Watermark detection:

• Again use similarity and appropriate threshold which is designed to balance false positives and false negatives.

otherwise ),( if

0

),(

ˆ,,,,

,

,,,*

,,,*

,,,

vuJXvuJXX

w vuvuvu

vu

23/47

Page 24: A Review on: Spread Spectrum  Watermarking Techniques

Experiment 1 (uniform image)

24/48

Page 25: A Review on: Spread Spectrum  Watermarking Techniques

Experiment 2 (non-uniform image)

25/48

Page 26: A Review on: Spread Spectrum  Watermarking Techniques

Podilchuk method (Attacks)

26/48

Quality 100 80 60 40 20 10 5Cropping(to 25%)+

Compression 1 0.9671 0.9300 0.9114 0.8843 N/A N/A

cropping(to 6.25%) +compression 1 0.9588 0.9200 0.8988 0.8600 N/A N/A

Compression N/A 0.9680 0.9120 0.8262 0.7050 0.4720 0.3020

Page 27: A Review on: Spread Spectrum  Watermarking Techniques

SSIS Method

27/47

Page 28: A Review on: Spread Spectrum  Watermarking Techniques

28/47

Page 29: A Review on: Spread Spectrum  Watermarking Techniques

Results

29/36

Original

watermarked

Page 30: A Review on: Spread Spectrum  Watermarking Techniques

JPEG Attack

30/36

Page 31: A Review on: Spread Spectrum  Watermarking Techniques

Noise Attack

31/36

Page 32: A Review on: Spread Spectrum  Watermarking Techniques

Conclusion

• Spread spectrum communication• watermarking problem is analogous to a

communication problem with a jammer.• the WM message is spread over a wide

frequency bandwidth (spectrum of the host image) Cox method. Adaptive watermarking

32/36

Page 33: A Review on: Spread Spectrum  Watermarking Techniques

References

• [1] I. J. Cox, J. Kilian, T. Leighton, T. Shamoon, “Secure spread spectrum watermarking”, in IEEE Transaction on Image Processing, vol. 6. 1997.

• [2] C. I. Podilchuk and W. Zeng, “Image adaptive watermarking using visual models”, IEEE journal on selected areas in communication, vol. 16, No. 4, pp. 525-538, May 1998.

• [3] L. M. Marvel, C. G. Boncelet, C. T. Retter, “Spread Spectrum Image Steganography,” IEEE Trans, on Image process., vol 8, no. 8, Aug. 1999.

• [4] W. Lu, H. T. Lu, F. Chang, “Chaos-Based Spread Spectrum Robust Watermarking in DWT Domain,” in Proc. Int. Conf. on Machine Learning and Cybernetics, Guangzhou, Aug, 2005.

33/36

Page 34: A Review on: Spread Spectrum  Watermarking Techniques

Any Question?

34/36