Top Banner
Multimedia Multimedia Watermarking Watermarking Techniques Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung
80

Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Jan 11, 2016

Download

Documents

Stephen Tate
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Multimedia Multimedia Watermarking Watermarking TechniquesTechniques

Frank Hartung and Martin Kutter

ECE 738In Young Chung

Page 2: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

OutlineOutline

1. Terminology2. Requirement3. Basic Watermarking Principles4. Watermarking techniques for

1. Text Document2. Image3. Video4. Audio5.other media

5. Conclusion

Page 3: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

TerminologyTerminology

Watermarkingtechniques that allow secret communication, usually by embedding or hiding the secret information

Data hiding and data embeddingapplications where the existence of the embedded data are publicly known, but there is no need to protect it

Fingerprinting and Labelingspecial application of watermarking related to copyright protection

Embedded signaturesstand for watermark in early publication

Visible watermarksvisible pattern, like logos, inserted into images or video

Page 4: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Watermarking RequirementsWatermarking Requirements

1) As much information as possible Capacity

2) Only be accessible by authorized parties by means of cryptographic key security

3) Resist against hostile attacks Robusteness

4) Invisibility Imperceptibility

Robustness

Capacity

Imperceptibility

Page 5: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Supplemental W. RequirementsSupplemental W. Requirements

1) Watermark Recovery may or may not allowed to use the original data.

2) Real time watermarking requirementse.g., video fingerprinting (We will see this later)

Page 6: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Design IssuesDesign Issues

Watermark Security and Keys Robustness Imperceptability Capacity Watermark Detection

Robustness

Capacity

Imperceptibility

Page 7: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Basic Watermarking PrinciplesBasic Watermarking Principles

Three issues in the design of a watermarking system

1) Design of the Watermark signal

2) Design of the embedding method

3) Design of the corresponding extraction method

• Where, W: watermark signal, I: watermark information.• K: key, X: host data, Y: watermarked signal

),,(),( 00 XKIfWorKIfW

),(1 WXfY

),(),,(^^

KYgIorKYXgI

Page 8: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Basic Watermarking PrinciplesBasic Watermarking Principles

The public or secret key is used to enforce security

Many watermarking schemes use spread-spectrum methods they add a PN signal with low amplitude to the host data.

Correlator is used for watermark detection

Page 9: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Watermarking TechniquesWatermarking Techniques1. Text Document 1. Text Document

WatermarkingWatermarking

Page 10: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Text Document WatermarkingText Document Watermarking

Two methods to hide information1) in the semantics; in the meaning and

ordering or the words2) in the format

* In the layout and the appearance

- Example of word shifting coding -

Page 11: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Text Document Watermarking;Text Document Watermarking;Three coding methodsThree coding methods

1) Line shift coding*Assumption; lines are uniformly spaced doesn’t need original for watermark extraction

2) word-shift coding

*Assumption; space between words are usually variable needs original for Watermark extraction

3) feature coding; slightly modifies the features

Goal: making watermark removal more expensive than obtaining the right to copy from the copy right owner

Page 12: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Watermarking TechniquesWatermarking Techniques2. Image Watermarking2. Image Watermarking

Page 13: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Why is Image watermarking so important?1) There is a large demand and

productions2) Most of watermarking research much more than video or audio watermark

Page 14: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Common ideas for Image Common ideas for Image watermarkingwatermarking

A lot of watermarking methods are very similar and differ only in parts

Three topics 1) watermark signal design 2) embedding 3) recovery (Detection)

I. Watermark signal designThe watermark signal; typically a pseudorandom signal with low amplitude

e.g., Gaussian, uniform, or bipolar pdf* The watermark signal: often designed in spatial domain, sometimes in DCT or block-wise DCT

Page 15: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Common ideas of Image Common ideas of Image watermarkingwatermarking

ii. Signal embedding (where?)

* embed watermark signal mostly to the luminance channel alone* sometimes in color channels

* in the spatial domain * or in the DCT,DFT and DWT (full-image DCT or block wise DCT domain) advantage in terms of visibility and security

Page 16: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Common ideas of Image Common ideas of Image watermarkingwatermarking

Argue? about embedding domain Low, medium or high freq.?

For maximum robustness embed watermark signal adaptively where the host data populate (typically the low frequency)

Page 17: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Common ideas of Image Common ideas of Image watermarkingwatermarking

iii. Recovery (Detection)* Usually done by correlation method; a correlation receiver or a matched filter

Page 18: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

AcknowledgementsAcknowledgements

The Following slides organized by Author name

The author of this paper put stress on embedding domain/methods So, we will mainly deal with embedding domain/method of numerous watermarking methods

Page 19: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

TirkelTirkel

Publication: “Electrical Water Mark” in 1993

Proposal m-sequence PN code embedding in LSB

plane* To gain full access to the LSB plane without much distortion compress original image to 7 bits through histogram manipulation

the decoding process use the unique and optimal autocorrelation of m-sequences

Page 20: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Matsui and TanakaMatsui and Tanaka

Publication: “Video Steganography: How to secretly Embed a Signature in a picture”

Proposal Predictive code schemes using key table

* exploit correlation between adjacent pixels by coding the prediction error instead of coding the individual gray scale value

And embed a watermark in forms of a binary string1 iii XX

Page 21: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

SmithSmith

New approach

Digital watermarking and digital modulation (especially, direct sequence spread spectrum modulation) share similar concepts

More in depth analysis of 2-D amplitude modulation was given by Hernandez

Page 22: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

BenderBender

Proposal 2 MethodsI. Patchwork

1. randomly selected pairs of pixels Are used to hide 1 bit by increasing the ai’s by one and decreasing the bi’s by one

2. The expected value of the sum of N pixel pairs

),( ii ba

Page 23: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Cont-Cont-

II. Texture Block Coding

1. Watermark is embedded by copying one image texture block to another area in the image with similar texture

2. Recovery- autocorrelation

* Remarkable point- high robustness to any kind of distortion, since both image area distorted in a similar way autocorrelation still works

Page 24: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Pitas and KaskalisPitas and Kaskalis

Proposal

Signature casting on digital images- based on same basic idea as the patchwork

1. The watermark is the same size as the original image (here, # of ones = # of zero)

2. The original image is divided into two sets A and B of equal size

I : Original Image , xmn : Luminance value

}{ ,nmsS

Page 25: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Contn-Contn-3. The watermark is superimposed by changing the elements of the subset A by positive factor k

*k is positive integer

4. The watermarked image is given by the union of A’ and B

},{' AxkxA mnmn

Page 26: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

LangelaarLangelaar

Proposal Block base spatial watermarking

- Improved version of previous method

1. The image is tiled into square blocks (8x8)2. Each block is selected pseudorandomly3. To embed “1”, k x P added to the block4. To embed “0”, k x P subtracted to the block 5. Each selected block has a PN pattern P

* k: scaling factor, P : PN pattern

Page 27: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

BruyndonckxBruyndonckx

Proposal Watermarking with the use of pixel classification

Purpose- increase the performance of the block base spatial watermarking methods

1. Select blocks (PN) & classify the block based on three types of contrast between zones; hard, progressive and noise contrast2. Each zone subdivided into two categories A and B based on gird defined by the coder3. Each pixel is assigned to one of four zone/category combinations e.g., 1/A,…2/B

Page 28: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.
Page 29: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Cont-Cont-

4. A bit b is embedded by modifying the zone/category means to satisfy the following constraints

: the modified zone/category mean values S: the watermark embedding strength

5. the modification of the mean values is done by applying equal luminance variations for all pixels belonging to the same zone

7. To increase robustness the authors suggest to perform redundant bit embedding and use error correcting codes

6. Good robustness to JPEG compression is reported

*2

*1 ... BA mm

Page 30: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

KutterKutter

ProposalImproved spread-spectrum watermarking in the spatial domain

* Exclusively works with the blue image component, in the RGB color space maximize the watermarking strength and minimize visual artifacts

* preprocess the image prior to watermark decoding increased robustness, applicable to any spread-spectrum spatial domain watermarking

Page 31: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Cont-Cont-

1. A single bit b is embedded at a pseudorandomly selected location (I,j) by either adding or subtracting (Amplitude modulation)

Where describes the blue value at location (I,j):the Luminance at the same location : the embedding strength

jiB ,

jiL ,

Page 32: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Cont-Cont-

2. To recover an embedded bit, an estimate of original value is computed

c : the size of the cross-shaped neighborhood

3. The bit value is determined by looking at the sign of the difference

*To increase robustness, (Author suggest) each signature bit is embedded several times and to extract, the sum of all differences is used

jijiji BB,

^

,,

ji ,

Page 33: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

MacqMacq

ProposalWatermarking adapted to the HVS using masking and modulation

1. The watermark in spatial domain is low-pass filtered, frequency modulated, masked and then added to the host image

2. A secret key is used to determine the modulation freq.

3. Masking uses an extension of the masking phenomena for monochromatic signals, called gratings

Recovery- demodulation followed by a correlation function

Page 34: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Voyatzis and PitasVoyatzis and Pitas

ProposalWatermarking by inserting logo like patterns using torus automorphism

* A 2-D torus automorphism: a kind of spatial transformation

* It is defined by

* Iterated action of A on a point form a dynamical system expressed by 0

Page 35: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Cont-Cont-

* This system mixes the point in chaotic way.

* Under certain circumstances, the automorphisms may have periodicity

1-iteration 2-iteration 10-iteration T-iteration

Page 36: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Cont-Cont-

How/where to embed?

1. Watermark is mixed using the automophism

2. then, overlaid on a selected block in the original image e.g., LSB

Recovery- extracting the mixed watermark then, reconstruct the watermark using the automorphism

* Where, T is the automorphism period.

NA

NTA

Page 37: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Raymond and WolfgangRaymond and Wolfgang

Proposal Watermarking technique to verify image

authenticity based on an approach similar to the m-sequence approach

1. A random sequence generated is mapped from {0,1} to {-1,1}, arranged into a suitable block and added to image

Recovery – overlays the watermarked block with the watermark block and compute inner product and compares the result with ideal value

Page 38: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Cont-Cont-

The test statistics is defined as

If the watermark is unchanged , =0 When is greater than a defined tolerance,

the block fails the watermark test

Page 39: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Chen and WornellChen and Wornell Proposal Quantized Index Watermark (QIM)

*Please recall even-odd embedding and predictive coding scheme using table*Not based on spread-spectrum modulation but,quantization modulation*Based on a set of N-dimensional quantizers.*Quantizers – satisfy a distortion constraint

- each reconstruction values from one quantizer are ‘’far away’’ from the others

1. The message to be transmitted is used as in index for quantizer section

2. Selected quantizer is used to embed information

3. Spatial or DCT domain used

Page 40: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

KochKoch Proposal Efficient watermarking in DCT domain for JPEG (first introduction)

1. The image is divided into square blocks of size 8x8 for which the DCT is computed

2. From a pseudoramdomly selected blocks, a pair of midfrequency coefficients are selected from 12 predetermined pairs

3. To embed a bit- the coefficient are modified such that the difference between them (a pair of coefficient) is positive or negative

* Good robustness – JPEG (Q=50%)

Page 41: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

SwansonSwanson Proposal DCT domain watermarking technique, Based on

frequency masking of DCT blocks

1. Input image is split up in to square matrix and DCT is computed

2. Frequency mask is computed based on the knowledge that a masking grating raises the visual threshold for signal gratings around the mask freq.

3. The resulting perceptual mask is scaled and multiplied by PN(DCT)-sequence

4. This watermark is added to the corresponding DCT block

Page 42: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

PodilchukPodilchuk Proposal Perceptual watermarking using the just noticeable

difference (JND) to determine an image-dependent watermark modulation mask

; the transform coefficients of the original image; the computed JND based on visual models; the watermark values

Recovery- based on the correlation

* Robust to JPEG compression, cropping, scaling and additive noise

vuI ,

vuJND ,

vuw ,

Page 43: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Boland and CoxBoland and Cox

Proposal Frequency-domain watermarking (First)

perceptual adaptive methods which is based on modulation

1. Generate the watermark with statistical distribution ; e.g., N(0,1)

2. The watermark is inserted into the image

Page 44: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Cont-Cont-

; determine the strength

* The watermark embedded 1000 strongest DCT coefficients

Detection- given by the normalized correlation coefficient

* Boland propose a similar techniques – DCT, DWT, Walsh-Hadamard, FFT

Page 45: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

SummarySummary

Several different image watermarking methods Most watermarking methods are based on the same

basic principle- small, pseudorandom changes are applied to selected region; spatial or transform domain

Recovery – correlation-like similarity measures. Usually, the number of modified coefficient is much

larger than the number of bits to be encoded Embedding domain have a influence on the robustness spatial – less robust to noise like attack / E.g.- JPEG

- more robust to cropping, translating. freq. – less robust to cropping which destroy the

embedding water mark (DCT,DFT,DWT)

Page 46: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Watermarking TechniquesWatermarking Techniques3. Video Watermarking3. Video Watermarking

Page 47: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Common idea for video Common idea for video watermarkingwatermarking

Video sequences consists of a series of consecutive and equally time-spaced still images in general, very similar with image watermarking so, image watermark method is applicable to video directly

Important differences* available signal space;

for image; very limitedfor video; much larger signal space (# of pixels)

*video watermark imposes real or near real-time watermarking system complexity issue is much more important

Page 48: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Cont-Cont-

The structure of video as a sequence of images give rise to particular attacks frame averaging, frame dropping and frame swapping (Only in video)

Two competing requirements*A good watermarking scheme1. may recover the full watermark from a short part of the sequence2. distribute watermark information over several consecutive frame to have robustness against frame dropping depends on application

Compressed/ uncompressed video

Page 49: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Hartung and GirodHartung and Girod Proposal Watermarking of compressed video for fingerprint

application

* Used spread spectrum approach and added an additive watermark into video

* The watermark is generated using a PN signal with the same dimension as the video signal

*Each information bit is redundantly embedded into many pixels

1. For each compressed video fame, 8x8 DCT transformed watermark signal is added to DCT coefficient of the video

Page 50: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Cont-Cont-

*This method done for I,P, and B frames

* Rate control- by comparing each encoded watermarked DCT coefficient versus the corresponding encoded unwatermarked coefficient

(because video steam use variable length coding, the watermarked signal may or may not need more bits encoding than the unwatermarked one)

If more bits required, the coefficient is not used for embedding

Recovery – correlation using the same PN sequence used for generation of watermark

Page 51: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

JordanJordan Proposal Watermarking of compressed video that embed

information in motion vector of motion -compensated prediction schemes.

1. Motion vectors slightly modified in pseudorandom way

Watermark embedding/detection available as long as the video is in compressed format

After decompression? the watermark still be recovered by recompressing and detecting

Artifacts? Because the blocks pointed to by the original and the modified vector are very similar no visible artifacts

Page 52: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Hsu and WuHsu and Wu Proposal Watermarking for compressed video using middle-freq DCT

* Extension of their image watermarking method

1. modifies middle freq DCT coefficients in relation to spatially (I-frames) or temporally ( for P- and B- blocks) neighboring block

* Prior to embedding, the watermark signal is spatially scrambled to make it robust to cropping

Drawback- for watermark extraction, original video and watermark should be known

Page 53: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

LangelaarLangelaar

Proposal 2 methods

1) data hiding method

1. adds the label directly in the MPEG bit stream by replacing variable length codes (VLC) of DCT coefficient

* In MPEG-2 code tables there are pairs of code which represent the same run and levels that deviate only by one from each other

We can choose one as bit “1” the other as “0”

Drawback- the label can be easily removed by decompression and recompression

Page 54: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Cont-Cont-

2) watermarking1. for each bit to be embedded, a set of n 8x8-block is pseudorandomly taken from the video frame(here, n typically 16~64)

2. Seudorandomly divide into two subsets of equal size.

3. For each subset, the energy of the high-freq. DCT coefficient is measured

4. In order to embed the bit, the energy of the high-freq coefficient in one or the other subset is reduced by removing high freq. coefficients

Page 55: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Cont-Cont-

Block diagram of watermark embedding into DCT coefficients of compressed video

Recovery - 1. select the same set of blocks 2. divide it into the same subsets 3. Compare the energy of the high-freq.

coefficient in each of the subsets * Here, We can use the secret key for the selection of

blocks

Page 56: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Cont-Cont-

Drawbacks1. robustness is limited2. Re-encoding increases the error rate of the embedded signal much

Page 57: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

SwansonSwanson Proposal Multiscale watermarking method working on uncompressed video

*Same scheme as Image watermarking

1. video sequence is segmented into scenes

2. temporal wavelet transform is applied to each scenes, yielding temporal low-pass and high-pass frames

3. the watermark is embedded into each of the temporal components (here, low-freq.)

4.Inverse transform the watermarked components to get the watermarked video

Page 58: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Cont-Cont-

Interesting properties

The watermark has some components that change over time, since they are embedded in low frequency coefficient this allow robustness against frame averaging, frame dropping

Drawback- very high complexity

Page 59: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

LinnartzLinnartz

Proposal Embed information in the GOP structure of

the MPEG-2 compressed video

*There is a maximum distance between two successive I-frames

*The frame type signaled in the frame header and can be switched randomly from frame to frame.

Page 60: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Cont-Cont-

* A typical GOP in display order (N=12)

* If I-frame is fixed we have 2048 variations

*However, most available video codecs never use most of the admissible GOP structure purposely use irregular GOP structure, that are very unlikely, to embed information

Drawback- use this method only during compression - decompress and recompression will remove this information completely

Merit - Low complexity

Page 61: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

DarmstaedterDarmstaedter Proposal Embed a spatial-domain low-pass spread spectrum

watermark into 8x8 pixel blocks of video sequences

1. The blocks are classified according to their activity*Low activity are not watermarked

2. Low-pass pseudorandom pattern is added to each block

* Each block conveys one bit watermark information

Page 62: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Cont-Cont-

* The block repeated over several blocks and several frames for robustness

Recovery-done in spatial domain after decompression using correlation concept with threshold

Page 63: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

DeguillaumeDeguillaume

Proposal Spread spectrum watermark into 3-D

block of video using 3-D DFT

* Embed a spread spectrum watermark into 3-D blocks of video by employing a 3-D DFT and add to the transform coefficients

Page 64: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

BuschBusch

Proposal Apply a still-image watermarking method working on

DCT blocks to video sequences

1. The watermarks are embedded into the luminance component of umcompressed video and retrieved after decompression

*In order to improve the invisibility of the watermarks, especially at edge, blocks are selected depend on activity (high-activity block selected)

Page 65: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Cont-Cont-

Recovery- 0~50% error rate are reported depend on the sequencethe author propose to embed the watermark into several consecutive frames (over 50frame a few percent error rate reported)

Page 66: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

KalkerKalker

Proposal Video Watermark for video broadcasting

monitoring application

*Called JAWS (just another watermarking system)

* For low complexity, both watermarking and detection are performed in the spatial domainwatermarking before compressiondetection after decompression

Page 67: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Cont-Cont-

* The watermark size is 128x128 and repeated (tiled) to fill whole video frame

* To avoid visible artifacts, the watermark is, on a pixel-by-pixel basis, scaled with scale factor

* Scale factor is derived from an activity measure

* Activity measure is computed using a Laplacian high-pass filter

Detection- correlation detector is used - in case of presence of spatial shift, a search over all possible shift is performed (128x128 position)

Page 68: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

SummarySummary

The proposed methods span a wide complexity range from low complexity to considerable complexity In general, the more complex methods provide higher robustness

Most methods operate on uncompressed video; a few methods embed watermark directly into compressed video e.g., DCT embedding or the motion vector embedding, GOP structure embedding

Page 69: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Watermarking TechniquesWatermarking Techniques3. Audio Watermarking3. Audio Watermarking

Page 70: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Common ideas for audio Common ideas for audio watermarkingwatermarking

Compared to image and video, audio signal has much less samples per time interval amount of information which can be embedded is much lower

HAS (Human Audible System) is much more sensitive than the HVS

Page 71: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

BoneyBoney

Propose A spread spectrum approach

* PN sequence is filtered in several stage to exploit masking effects of the HAS

* The watermark is low-pass filtered by using full audio compression/decompression scheme to guarantee that it survive audio compression

Page 72: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Tilki and BeexTilki and Beex Propose interactive television application where they embed information

into the audio components of a television signal

1. The information to be embedded is partitioned in blocks of 35bits

2. Each information bit is modulated using a sinusoidal carrier of a specific frequency with low amplitude and added to audio signal if the sinusoidal carrier for a specific bit is present=> “1” otherwise => “0”

* The frequencies of the sinusoidal carrier are above 2.4 kHz To reduce interference from the audio signal , the audio signal is attenuated at frequencies above 2.4 kHz

Page 73: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

BenderBender

Propose phase coding

; use the phase information as a data space

1. For encoding, a Fourier Transform is applied and the phase value of each freq. component are lined up as matrix

2. Binary information can be added into this matrix by modifying the phase component.

* HAS is not very sensitive to the phase distortion of the sound

Page 74: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Watermarking TechniquesWatermarking Techniques4. other Multimedia DATA4. other Multimedia DATA

Page 75: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

OhbuchiOhbuchi Propose embed visible and invisible watermarks into 3-D polygonal model

s

* This model comprise primitives like points, lines, ploygons, and ployhedrons

* Modify geometry or topology for watermarking

2 methods1) pseudorandomly selects sets of four adjacent triangles* embed information by displacing the vertices of the four triangles up to 1% of the shortest edge of the rectangular bounding box of the entire 3-D model

Page 76: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Cont-Cont-

2) pseudorandomly selects tetrahedron from the mesh and embeds information in the volume ratio of consecutive tetrahedron by modification of the vertices

Page 77: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

HartungHartung Proposal

A spread-spectrum method for watermarking of MPEG-4 FAP’s

*MPEG-4 features model-based animation 3-D head modules using FAP (Facial Animation Parameter)

*There are FAP like “rotate head”, “open mouth” or “raise right corner-lip”

1. In order to embed information, the parameters first have to be estimated from the sequence

2. The watermarks are embedded into the animation parameter

*Adaptive amplitude attenuation prevent visible distortion of animated head level.

Page 78: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Cont-Cont-

* Interesting point is that the watermark is not embedded in pixels but in the semantics( the way the head and face move)

Page 79: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

ConclusionConclusion

We reviewed the most important aspects design requirements, system issues, and techniques for digital watermarking

We have elaborated on numerous watermarking techniques for still images, video, audio, text, and other multimedia data.

Majority of techniques are similar and based on modulation with a PN signal.

Hypothesis test using correlation is used in the watermark recovery

Although working systems are available, research has to continue

Page 80: Multimedia Watermarking Techniques Frank Hartung and Martin Kutter ECE 738 In Young Chung.

Thanks for your attention

- Questions? -