colored watermarking technology based on visual cryptography author: hsien-chu wu, chwei-shyong...
TRANSCRIPT
![Page 1: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/1.jpg)
Colored Watermarking Technology Based on Visual Cryptography
Author: Hsien-Chu Wu , Chwei-Shyong Tsai , Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May 4 , 2005
![Page 2: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/2.jpg)
Outline
• Introduction
• The proposed method
• Experimental results
• Conclusions
![Page 3: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/3.jpg)
Introduction
• Watermarking Technology
• Colored Visual Cryptography
![Page 4: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/4.jpg)
Watermarking Technology
primitive image
watermarkstego-image
Good digital watermarking :
1. Perceptual invisible
2. Security
3. Blindness
4. Multiple watermarks
5. Robustness
![Page 5: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/5.jpg)
Colored Visual Cryptography
![Page 6: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/6.jpg)
Colored Visual Cryptography (cont.)
![Page 7: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/7.jpg)
Colored Visual Cryptography (cont.)
![Page 8: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/8.jpg)
The proposed method
The primitive gray-level image “Lena” Colored watermark
![Page 9: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/9.jpg)
The proposed method (cont.)
![Page 10: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/10.jpg)
Random
![Page 11: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/11.jpg)
The proposed method (cont.)
Range of mean value
Mask
[0, 63]
[64, 127]
[128, 191]
[192, 255]
Mean:186
The color Masks of four kinds of mean values
![Page 12: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/12.jpg)
coding table
The proposed method (cont.)
![Page 13: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/13.jpg)
Experimental Results
Share image 1 Share image 2
![Page 14: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/14.jpg)
Experimental Results
The recovered image from two share images
![Page 15: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/15.jpg)
Experimental Results (cont.)
( a ) The cropping attacked “Lena” ( b ) The recovered image from two share images of cropped “Lena”
![Page 16: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/16.jpg)
Experimental Results (cont.)
( a ) The blurring attacked “Lena” ( b ) The recovered image from two share images of blurred “Lena”
![Page 17: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/17.jpg)
Experimental Results (cont.)
( b ) The recovered image from two share images of sharpened “Lena”
( a ) The sharpening attacked “Lena”
![Page 18: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/18.jpg)
Conclusions
• Provide high robustness by using Visual
Cryptography technique in Digital Watermarking.
• Keep the quality of primitive image.
![Page 19: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/19.jpg)
Watermarking Technology
Based on BTC MethodAuthor: Hsien-Chu Wu, Chwei-Shyong Tsai, I-Su LeeSpeaker: I-Su LeeDate: May 4, 2005
![Page 20: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/20.jpg)
Outline
Introduction
The Proposed method
Experimental results
Conclusions
![Page 21: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/21.jpg)
Block Truncation Coding, BTC
221 212 189 177
213 194 182 184
192 179 187 199
179 186 200 169
512×512
Mean = (221+212+189+…+200+169)/16 = 191M1 = (221+212+213+194+192+199+200)/7 = 204M0 = (189+177+182+184+179+187+179+186+169)/9 = 181
<191 0
>191 1
1 1 0 0
1 1 0 0
1 0 0 1
0 0 1 0
bitmap
![Page 22: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/22.jpg)
BTC decompression
204 204 181 181
204 204 181 181
204 181 181 204
181 181 204 181
bitmap
<191 0
>191 1
0 181
1 204
1 1 0 0
1 1 0 0
1 0 0 1
0 0 1 0
Mean = (221+212+189+…+200+169)/16 = 191M1 = (221+212+213+194+192+199+200)/7 = 204M0 = (189+177+182+184+179+187+179+186+169)/9 = 181
![Page 23: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/23.jpg)
The Proposed method
8-bit grayscale image
binary watermark
![Page 24: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/24.jpg)
Codebook design
min distance
128×128cover-image
codebook
![Page 25: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/25.jpg)
Codebook design (cont.)
codebook
codebook0
codebook1
0
1
![Page 26: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/26.jpg)
Watermark Embedding
codebook0
codebook1
cover-image
binary watermark
0
1stego-image
cover-image
binary watermark
![Page 27: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/27.jpg)
Watermark Extraction (cont.)
stego-image
codebook0
codebook1
0
1
binary watermark
![Page 28: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/28.jpg)
Experimental results
(a) Lena (b) Girl (c) F16
(d) Pepper (e) Splash (f) Tiffany
![Page 29: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/29.jpg)
Experimental results (cont.)
Cover-image stego-image (unit:dB)BTC compression i
mage (unit:dB)
Lena 33.41009155 33.69390363
Girl 37.79463397 37.91506876
F16 30.92604062 31.29763583
Peppers 33.07814946 33.49940908
Splash 36.76107951 37.12370245
Tiffany 33.01723640 33.67697558
Comparison results (PSNR)
![Page 30: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/30.jpg)
Experimental results (cont.)
(a) cropping attack
watermark
bit correct rate
= 0.89063
watermark
bit correct rate
= 0.88672
(b) cropping attack
![Page 31: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/31.jpg)
Experimental results (cont.)
bit correct rate
= 0.88964
bit correct rate
= 0.86230
watermark
watermark
(c) cropping attack
(d) cropping attack
![Page 32: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/32.jpg)
Experimental results (cont.)
bit correct rate
= 0.92969
bit correct rate
= 0.86035
watermark
watermark
(e) sharpening attack
(f) blurring attack
![Page 33: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/33.jpg)
Experimental results (cont.)
Cover image
Lena 0.89063 0.88672 0.88964 0.86230 0.92969 0.86035
Girl 0.88965 0.87891 0.89063 0.86133 0.91406 0.81641
F16 0.88574 0.88769 0.88672 0.86035 0.92188 0.84375
Peppers 0.88574 0.88672 0.88965 0.86230 0.92578 0.73730
Splash 0.88574 0.88672 0.88671 0.86328 0.91992 0.81152
Tiffany 0.85253 0.85351 0.85352 0.84766 0.93554 0.87890
Average 0.88167 0.88005 0.88281 0.85954 0.92448 0.82471
Correct rate of six kinds of attacked watermark
(a) cropping
attack
(b) cropping
attack
(c) cropping
attack
(d) cropping
attack
(f) sharpening
attack
(g) blurring
attack
![Page 34: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May](https://reader035.vdocument.in/reader035/viewer/2022062314/56649eb35503460f94bbb09b/html5/thumbnails/34.jpg)
Conclusions
The proposed method can embed watermark in compressed images directly.
It is simple and efficient to embed watermark in images with using BTC.
Stego-image has good image quality.