Top Banner
Thái Chí Minh Trần Lương Khiêm 1
48

Digital Watermarking

Jan 15, 2016

Download

Documents

reegan

Digital Watermarking. Thái Chí Minh Trần Lương Khiêm. Content. Introduction History Applications Requirements Techniques Attacks. Content. Introduction History Applications Requirements Techniques Attacks. Introduction. 499.99 = 0.99. Introduction. Introduction. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Digital  Watermarking

Thái Chí MinhTrần Lương Khiêm

1

Page 2: Digital  Watermarking

Content

Introduction History Applications Requirements Techniques Attacks

2

Page 3: Digital  Watermarking

Content

Introduction History Applications Requirements Techniques Attacks

3

Page 4: Digital  Watermarking

Introduction

4

Page 5: Digital  Watermarking

Introduction

5

Page 6: Digital  Watermarking

Introduction

6

Page 7: Digital  Watermarking

Introduction

Relation between embedded message and cover work

Goal and assumption

7

Page 8: Digital  Watermarking

Content

Introduction History Applications Requirements Techniques Attacks

8

Page 9: Digital  Watermarking

History

Histiæus & the slave

Paper watermark, 1282

Banknote. 18th century

9

Page 10: Digital  Watermarking

History In 1954, Emil Hembrooke of the Muzak Corporation filed a patent for

watermarking” musical Works The first Information Hiding Workshop (IHW) ,which included digital

watermarking as one of its primary topics, was held in 1996

10

Page 11: Digital  Watermarking

Content

Introduction History Applications Requirements Techniques Attacks

11

Page 12: Digital  Watermarking

Applications

Broadcast monitoring Owner identification Proof of ownership Transaction tracking Content authentication Copy control

12

Page 13: Digital  Watermarking

Broadcast monitoring

13

Page 14: Digital  Watermarking

Owner identification

14

Page 15: Digital  Watermarking

Proof of ownership

15

Page 16: Digital  Watermarking

Transaction tracking

16

Page 17: Digital  Watermarking

Transaction tracking

17

Page 18: Digital  Watermarking

Content authentication

Digital signature is NOT enough

18

Page 19: Digital  Watermarking

Content authentication

19

Page 20: Digital  Watermarking

Copy control

Cryptography is NOT enough

20

Page 21: Digital  Watermarking

Copy control

21

Page 22: Digital  Watermarking

Content

Introduction History Applications Requirements Techniques Attacks

22

Page 23: Digital  Watermarking

Requirements

Perceptual Transparency Robustness Data payload With / Without originals Security

23

Page 24: Digital  Watermarking

Perceptual Transparency

24

Page 25: Digital  Watermarking

Robustness

Fragile Semi-fragile Robust

25

Page 26: Digital  Watermarking

Data payload

Data payload refers to the number of bits a watermark encodes within a unit of time or within a Work

Different applications may require very different data payloads

26

Page 27: Digital  Watermarking

With / Without originals

Non-blind watermarkingType I

Type II

Semi-blind watermarking

Blind watermarking

27

Page 28: Digital  Watermarking

Security

28

Page 29: Digital  Watermarking

The mutual dependencies among the elements

29

Page 30: Digital  Watermarking

Content

Introduction History Applications Requirements Techniques Attacks

30

Page 31: Digital  Watermarking

Techniques

LSB Spread spectrum Applying on Vietnamese documents

31

Page 32: Digital  Watermarking

Techniques

32

Page 33: Digital  Watermarking

Techniques

There are many techniques to do watermarking in digital things:Spatial domain watermarking: LSB, in text

data, …Transform domain watermarking: frequency-

based watermarking, wavelet based watermarking○ Embedding the watermark in the transform

domain from carrier object (using DCT, DFT, DWT, …)

33

Page 34: Digital  Watermarking

Techniques

LSB:Embedding:

○ Choosing some representation values (e.g pixels) of carrier object.

○ Embed the bits of message (watermark) to LSBs of representation valueMessage ‘A’: 100 0001Carrier object: RGB (2 bits)

100000 010101 101100

010001 100001 000100

101110 011010 111000

34

Page 35: Digital  Watermarking

Techniques

LSB:Embedding:

○ Choosing some representation values (e.g pixels) of carrier object.

○ Embed the bits of message (watermark) to LSBs of representation valueMessage ‘A’: 100 0001Carrier object: RGB (2 bits)

100001 010100 101100

010000 100001 000100

101111 011010 111000

35

Page 36: Digital  Watermarking

Techniques

LSB:Detector:

○ Retrieve the watermark by having the knowledge of the representation values (e.g pixels) used for embedding individuals bits

36

Page 37: Digital  Watermarking

Techniques

Spread spectrumUsing frequency domain transform to

convert the input image into another domain and embedding the watermark to this domain.

37

Page 38: Digital  Watermarking

Techniques

• Apply on Vietnamese documents

38

Page 39: Digital  Watermarking

Techniques

• Apply on Vietnamese documents

39

Page 40: Digital  Watermarking

Techniques

• Apply on Vietnamese documents○ Besides, we can use some methods:

Vertically shifting text lines Horrizontally shifting words

40

Page 41: Digital  Watermarking

Content

Introduction History Applications Requirements Techniques Attacks

41

Page 42: Digital  Watermarking

Attacks

From processing From attackers

42

Page 43: Digital  Watermarking

Attacks

The actions take effect on the watermark embedded in carrier objects.Affects:

○ Destroying the watermark or modifying the watermark with new wrong information.

○ Removing the watermark entirely.But: not degrading the quality of carrier

objects (image, audio, video)Relating to a requirements of watermarking:

Robustness

43

Page 44: Digital  Watermarking

Attacks Classification:

From proscessing carrier objects○ Common signal processing: digital-to-analog and

analog-to-digital conversion, or change image contrast, color, JPEG compression, …

○ Common geometric distortions: scaling, rotating, cropping, dithering …

From attacker○ Mosaic○ Collusion attacks: get the watermark or remove

watermarks entirely to get the original work.○ …

44

Page 45: Digital  Watermarking

Attacks

45

Page 46: Digital  Watermarking

AttacksMosaic attack

46

Page 47: Digital  Watermarking

Attacks How to protect watermarks from attacks

Understanding and applying new researchs in watermarking

Using StirMark Benchmark evaluation engine to evaluate your watermarking scheme○ “All vendors of digital watermarks have their

products benchmarked by Stirmark and as of August 2001, no watermark from any vendor survives the test, ie: the watermarks are all removed without degradation to image quality occurring. “

47

Page 48: Digital  Watermarking

48