8/14/2019 Watermarking 1
1/20
Watermarking
IT6902;SemesterB,2004/2005;Leung
8/14/2019 Watermarking 1
2/20
Information Hiding:Information Hiding:SteganographySteganography and Watermarkingand Watermarking
Dr. Mohammed AlDr. Mohammed Al--MuallaMualla and Prof.and Prof. HussainHussainAlAl--AhmadAhmad
Multimedia Communication and Signal Processing (MCSP)Multimedia Communication and Signal Processing (MCSP)
Research GroupResearch Group
EtisalatEtisalat College of EngineeringCollege of EngineeringP.O.Box: 980,P.O.Box: 980, SharjahSharjah, UAE, UAE
Tel: +971 6 5611333, Fax: +971 6 5611789,Tel: +971 6 5611333, Fax: +971 6 5611789,
ee--mail: {mail: {almuallaalmualla,, alahmadalahmad}@}@eceece.ac..ac.aeae
8/14/2019 Watermarking 1
3/20
OutlineOutline
Introduction to Information HidingIntroduction to Information Hiding
SteganographySteganography
Definition and HistoryDefinition and History
ApplicationsApplications
Basic PrinciplesBasic Principles
Examples of TechniquesExamples of Techniques DemosDemos
WatermarkingWatermarking
Definition and HistoryDefinition and History
ApplicationsApplications
Basic PrinciplesBasic Principles
RequirementsRequirements
AttacksAttacks Evaluation and BenchmarkingEvaluation and Benchmarking
ExamplesExamples
8/14/2019 Watermarking 1
4/20
Information HidingInformation Hiding
Information HidingInformation Hiding is a general term encompassingis a general term encompassingmanymany subdisciplinessubdisciplines
Two importantTwo important subdisciplinessubdisciplines are:are: steganographysteganography andandwatermarkingwatermarking
SteganographySteganography:: Hiding: keeping theHiding: keeping the existenceexistence of the information secretof the information secret
Watermarking:Watermarking:
Hiding: making the informationHiding: making the information imperceptibleimperceptible
Information hidingInformation hiding is different thanis different than cryptographycryptography(cryptography is about(cryptography is aboutprotectingprotecting the content ofthe content of
messages)messages)
8/14/2019 Watermarking 1
5/20
Watermarking:Watermarking:
DefinitionDefinition Watermarking:Watermarking: is the practice of imperceptibly altering a cover tois the practice of imperceptibly altering a cover to
embed a message about that coverembed a message about that cover
Watermarking is closely related toWatermarking is closely related to steganographysteganography, but there are, but there aredifferences between the two:differences between the two: In watermarking the message isIn watermarking the message is relatedrelated to the coverto the cover
SteganographySteganography typically relates totypically relates to covert pointcovert point--toto--point communicationpoint communication
between two partiesbetween two parties Therefore,Therefore, steganographysteganography requires onlyrequires only limited robustnesslimited robustness
Watermarking is often used whenever theWatermarking is often used whenever the cover is availablecover is available to partiesto partieswhowho know the existenceknow the existence of the hidden data and may have anof the hidden data and may have an interest ininterest inremoving itremoving it
Therefore, watermarking has the additional notion ofTherefore, watermarking has the additional notion ofresilienceresilience againstagainstattempts to remove the hidden dataattempts to remove the hidden data
Watermarks areWatermarks are inseparableinseparable from the cover in which they arefrom the cover in which they areembedded. Unlike cryptography, watermarks can protect contentembedded. Unlike cryptography, watermarks can protect contenteveneven afterafter they are decodedthey are decoded
8/14/2019 Watermarking 1
6/20
Watermarking:Watermarking:
HistoryHistory More than 700 years ago, watermarks were used in Italy to indicaMore than 700 years ago, watermarks were used in Italy to indicatete
the paper brand and the mill that produced itthe paper brand and the mill that produced it
By the 18By the 18thth century watermarks began to be used ascentury watermarks began to be used asanticounterfeitinganticounterfeiting measures on money and other documentsmeasures on money and other documents
The term watermark was introduced near the end of the 18The term watermark was introduced near the end of the 18thth century.century.
It was probably given because the marks resemble the effects ofIt was probably given because the marks resemble the effects ofwater on paperwater on paper
The first example of a technology similar to digital watermarkinThe first example of a technology similar to digital watermarking isg isa patent filed in 1954 by Emila patent filed in 1954 by Emil HembrookeHembrooke for identifying musicfor identifying music
worksworks In 1988, Komatsu andIn 1988, Komatsu andTominagaTominaga appear to be the first to use theappear to be the first to use the
term digital watermarkingterm digital watermarking
About 1995, interest in digital watermarking began to mushroomAbout 1995, interest in digital watermarking began to mushroom
8/14/2019 Watermarking 1
7/20
Watermarking:Watermarking:
ApplicationsApplications1.1. Copyright protectionCopyright protection
Most prominent applicationMost prominent application
Embed information about the owner to prevent others from claiminEmbed information about the owner to prevent others from claiminggcopyrightcopyright
Require very high level of robustnessRequire very high level of robustness
2.2. Copy protectionCopy protection Embed watermark to disallow unauthorized copying of the coverEmbed watermark to disallow unauthorized copying of the cover
For example, a compliant DVD player will not playback or copy daFor example, a compliant DVD player will not playback or copy datatathat carry a copy never watermarkthat carry a copy never watermark
3.3. Content AuthenticationContent Authentication
Embed a watermark to detect modifications to the coverEmbed a watermark to detect modifications to the cover
The watermark in this case has low robustness, fragileThe watermark in this case has low robustness, fragile
8/14/2019 Watermarking 1
8/20
Watermarking:Watermarking:
ApplicationsApplications4.4. Transaction TrackingTransaction Tracking
Embed a watermark to convey information about the legalEmbed a watermark to convey information about the legalrecipient of the coverrecipient of the cover
This is useful to monitor or trace back illegally producedThis is useful to monitor or trace back illegally producedcopies of the covercopies of the cover
This is usually referred to as fingerprintingThis is usually referred to as fingerprinting
5.5. Broadcast MonitoringBroadcast Monitoring
Embed a watermark in the cover and use automaticEmbed a watermark in the cover and use automaticmonitoring to verify whether cover was broadcasted asmonitoring to verify whether cover was broadcasted asagreedagreed
8/14/2019 Watermarking 1
9/20
Watermarking:Watermarking:
Basic PrinciplesBasic Principles
Encoder(Embedding)
cover c
Decoder(Extraction)
InsecureChannel(Attacks)
watermark w key k
watermarked datas
watermarked dataS
TRANSMITTER RECEIVER
key k watermark w
orconfidence measure
watermark w orcover c
8/14/2019 Watermarking 1
10/20
Watermarking:Watermarking:
RequirementsRequirements ImperceptibilityImperceptibility
The modifications caused by watermark embedding shouldThe modifications caused by watermark embedding shouldbebe below the perceptible thresholdbelow the perceptible threshold
RobustnessRobustness
The ability of the watermark toThe ability of the watermark to resistresist distortion introduceddistortion introducedbyby standardstandard oror maliciousmalicious data processingdata processing
SecuritySecurity
A watermark is secure ifA watermark is secure ifknowing the algorithmsknowing the algorithms forforembedding and extractingembedding and extracting does not help unauthorised partydoes not help unauthorised partyto detect or remove the watermarkto detect or remove the watermark
8/14/2019 Watermarking 1
11/20
Watermarking:Watermarking:
RequirementsRequirements PayloadPayload
The amount of information that can be stored in aThe amount of information that can be stored in awatermarkwatermark
Informed (Informed (nonobliviousnonoblivious, or private) Watermarking:, or private) Watermarking:
The originalThe original unwatermarkedunwatermarked cover iscover is requiredrequired to performto performthe extraction processthe extraction process
Blind (oblivious, or public) Watermarking:Blind (oblivious, or public) Watermarking:
The originalThe original unwatermarkedunwatermarked cover iscover is NOT requiredNOT required totoperform the extraction processperform the extraction process
8/14/2019 Watermarking 1
12/20
Watermarking:Watermarking:
AttacksAttacks Signal enhancement (sharpening, contrast enhancement, etc.)Signal enhancement (sharpening, contrast enhancement, etc.)
Additive and multiplicative noise (Additive and multiplicative noise (gaussiangaussian, uniform, etc.), uniform, etc.)
Filtering (High pass, low pass, linear, nonlinear, etc.)Filtering (High pass, low pass, linear, nonlinear, etc.)
LossyLossy compression (JPEG, MPEGcompression (JPEG, MPEG--x, H.26x, etc.)x, H.26x, etc.)
Geometric transforms (translation, rotation, etc.)Geometric transforms (translation, rotation, etc.)
Data reduction (cropping, clipping, etc.)Data reduction (cropping, clipping, etc.)
TranscodingTranscoding (MPEG2(MPEG2 H.263, etc.)H.263, etc.)
D/A and A/D conversion (printD/A and A/D conversion (print--scan, etc.)scan, etc.)
Multiple watermarkingMultiple watermarking
Collusion attackCollusion attack
Mosaic attackMosaic attack
8/14/2019 Watermarking 1
13/20
Watermarking:Watermarking:
Evaluation and BenchmarkingEvaluation and Benchmarking
Subjective Evaluation:Subjective Evaluation:
Subject is asked to rate the perceptibility of theSubject is asked to rate the perceptibility of the artefactsartefacts(5=imperceptible, 4=perceptible but not annoying,(5=imperceptible, 4=perceptible but not annoying,3=slightly annoying, 2=annoying, 1=very annoying)3=slightly annoying, 2=annoying, 1=very annoying)
Objective Evaluation:Objective Evaluation:
MSE, SNR, PSNR, NCC, etc.MSE, SNR, PSNR, NCC, etc.
Benchmarking Software:Benchmarking Software:
UnzignUnzign StirMarkStirMark
CheckMarkCheckMark
OptiMarkOptiMark
8/14/2019 Watermarking 1
14/20
Watermarking:Watermarking:
EExamplesxamples Informed Watermarking Method of CoxInformed Watermarking Method of Cox et alet al..
Originalimage
DDCT
Extractlargest N
coefficients
key kRandomNumber
Generator
[ ]N
vvv ,,, 21 K=V
Embed
)1(iii
xvv +=
[ ]N
xxx ,,, 21 L=X
Insert backNmodifiedcoefficients
IDCTWatermarked
ImageD
V
ENCODER
8/14/2019 Watermarking 1
15/20
Watermarking:Watermarking:
EExamplesxamples Informed Watermarking Method of CoxInformed Watermarking Method of Cox et alet al..
Originalimage
DDCT
Extractlargest N
coefficients
key kRandomNumber
Generator
[ ]N
vvv ,,, 21 K=V
Extract
/)1*
(* =i
i
i
v
vx
[ ]N
xxx ,,, 21 L=X
X*
DECODER
Attackedimage
D*DCT
ExtractNcoeff. fromsame locations
[ ]Nvvv *,,*,** 21K
=V
Calculatesimilaritymeasure
Decision
8/14/2019 Watermarking 1
16/20
Watermarking:Watermarking:
EExamplesxamples
original = 0.1 = 0.4 = 0.6
original N= 2000 N= 4000 N= 6000
8/14/2019 Watermarking 1
17/20
Watermarking:Watermarking:
EExamplesxamples
original JPEG q=100NC=0.999
JPEG q=80NC=0.993
JPEG q=10NC=0.557
original WatermarkedNC=0.999
CroppedNC=0.672
8/14/2019 Watermarking 1
18/20
Watermarking:Watermarking:
EExamplesxamples
Original Image
512 X 512
Watermark
128 X 64
Watermarked
ImageDCT
IDCT
Original Image
512 X 512
Watermarked
ImageDCT
IDCT
Walsh
Coding
128 x 64
DCT-domain
Embeddingwithout
Walsh Coding
DCT-domainEmbedding
withWalsh Coding
8/14/2019 Watermarking 1
19/20
Watermarking:Watermarking:
EExamplesxamples
8/14/2019 Watermarking 1
20/20
WatermarkingIT6902;SemesterB,2004/2005;Leung
References
Originalsourceoftheslides:
http://www.emirates.org/ieee/events.html#Digital_Watermarking
Additionalreferences: S. P. Mohanty, "Digital Watermarking: A Tutorial Review", Report, Dept. of
Electrical Engineering, Indian Institute of Science, Bangalore, India, 1999.
http://www.cs.unt.edu/~smohanty/research/Reports/MohantyWatermarkingSurve
y1999.pdf Podilchuk, C.I. and Delp, E.J. "Digital watermarking: algorithms and
applications",IEEE Signal Processing Magazine, Vol. 18, Issue 4, pp.33-46,
July 2001
Perez-Gonzalez, F. and Hernandez, J.R. "A tutorial on digital watermarking",Proc. IEEE 33rd Annual 1999 Int. Carnahan Conf. on Security Technology,
pp.286-292, Oct. 1999
Nikolaidis, N. and Pitas, I. "Digital image watermarking: an overview",IEEE
Int. Conf. on Multimedia Computing and Systems, Vol. 1, pp.1-6, June 1999