Top Banner
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy [email protected]
19
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy suhail@ccse.kfupm.edu.sa.

Multimedia Copyright Protection Technologies

M. A. Suhail, I. A. Niazy

[email protected]

Page 2: Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy suhail@ccse.kfupm.edu.sa.

Introduction

There are various watermarking schemes applied to images.

The purpose is to give an overview about the field of invisible watermarking.

I will discuss the basic concept, procedure, applications, and requirements needed.

Page 3: Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy suhail@ccse.kfupm.edu.sa.

Digital Watermarking Concept

An identification code carrying information about the copyright owner, the creator of the work, etc., embedded permanently into digital data.

The purpose of embedding WM is to protect copyright or checking for modifications.

Page 4: Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy suhail@ccse.kfupm.edu.sa.

Types of Watermarks

There are two major categories for digital watermarking:– Visible Watermarking

• Like stamping on paper

– Invisible Watermarking• Far more complex• I will focus on this category

Page 5: Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy suhail@ccse.kfupm.edu.sa.

Invisible Watermarking

Used to identify copyright data The most suitable media for Watermarking

are still images, video, and audio. Unsuitable media include:

– Executable files• Converting it to conical format

– Text• Can be overcome by any commercial OCR.

Page 6: Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy suhail@ccse.kfupm.edu.sa.

How to Embed a Watermark

Encoder (E)

Key (PN)

Original MediaSignal

(I0)

Watermarked Media signal

(I water)

Watermark W

Page 7: Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy suhail@ccse.kfupm.edu.sa.

How to Embed a Watermark (continued) The previous figure may be expressed

as follows:– E(I0, W) = Iwater

– Embedding function ‘E’ modifies I0 according to W.

Page 8: Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy suhail@ccse.kfupm.edu.sa.

How to Detect a Watermark

Pirate product Attacked Content Decoder

Decryption Key

Decoder response:Is the watermark W present? (Yes/No) Z

Page 9: Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy suhail@ccse.kfupm.edu.sa.

How to Detect a Watermark (continued) Detection Function (Decoder) ‘D’ is

defined as: D(R, I0) = W’, where R is the watermarked signal.

W’ is compared with W, based on a correlation measure:

where c is the value of the correlation, and 0 is a threshold.

otherwise

cWWZ

0

1),'( 0

Page 10: Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy suhail@ccse.kfupm.edu.sa.

Robust Watermarking Scheme Requirements Imperceptibility (Perceptual Invisibility)

– Penalty: less robustness Robustness

– Should survive intentional or unintentional attacks.– With images, resistance with geometric

manipulation is still an open issue Detectability

– Small probability of failing

Page 11: Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy suhail@ccse.kfupm.edu.sa.

Digital Watermarking Techniques

D ig ita l W ate rm ark in g Tech n iq u es

V is ib le W ate rm ark in g

W ave le t Tran s fo rm D isc re te C os in eTran s fo rm (D C T)

F rac ta l Tran s fo rm

Tran s fo rm D om ain

L eas t S ig n fican t B itM od ifica tion (L S B )

S p atia l D om a in

In vis ib le W ate rm ark in g

D ig ita l W ate rm ark in g

Page 12: Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy suhail@ccse.kfupm.edu.sa.

Digital Watermarking Techniques (continued) Spatial Domain Techniques

– The modification of LSB (Least Significant Bit) of the host data techniques are used in the spatial domain.

– LSB is modified using fixed magnitude NP sequence.

– The LSB is insignificant, so the WM will be invisible.

– WM easily corrupted by signal processing.

Page 13: Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy suhail@ccse.kfupm.edu.sa.

Digital Watermarking Techniques (continued) Transform Domain Techniques

– DCT (Discrete Cosine Transform) is based on dividing the image to square blocks of size 88, then modifying middle range frequency DCT coefficients of selected blocks.

– Wavelet Transform: Multi-resolution based technique.

– Fractal Transform: Very few works, because computationally expensive.

Page 14: Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy suhail@ccse.kfupm.edu.sa.

DCT Transform WatermarkOrginal Image Watermarked Image

Absolute difference

0 200 400 6000

0.05

0.1

0.15

0.2

0.25

Watermarks

DetectorRespose

Magnitude of the detectorresponse

OutputThreshold

A mosque and its watermarked image with the detector response.

Page 15: Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy suhail@ccse.kfupm.edu.sa.

Commercial Software for Watermarking Direct-Sequence

– Adds noise to every element in the document. and Frequency-Hopping

– Selects a pseudorandom subset of data to be watermarked.

Direct-Sequence and Frequency-Hopping spread-spectrum are the methods used for most commercial watermarking.

Page 16: Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy suhail@ccse.kfupm.edu.sa.

Common Commercial Software

Digimarc® Uses Direct-Sequence methods to superimpose a watermark over an image.

SysCoP® is also another common software.

Commercial software lack some means of security in order to keep their prices within a reasonable bound.

Page 17: Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy suhail@ccse.kfupm.edu.sa.

Digimarc® Software Example

a b

(a) A watermarked image using Digimarc® software, and (b) the watermark information of (a) by Digimarc® displayed in a window. The bar in the bottom of the window displays the robustness of the watermark.

Page 18: Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy suhail@ccse.kfupm.edu.sa.

Conclusion

The concept and types of digital watermarking is defined.

Next, The usage and suitable media for invisible Watermarking is discussed.

Also the Digital Watermarking techniques were described.

Finally, some Commercial Software and their drawbacks were described.

Page 19: Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy suhail@ccse.kfupm.edu.sa.

Any Questions:

Please forward any questions to the following E-mail:– [email protected]