enee631 digital image processing (spring'09) data hiding in images spring ’09 instructor: min...

52
ENEE631 Digital Image Processing (Spring'09) Data Hiding in Images Data Hiding in Images Spring ’09 Instructor: Min Wu Electrical and Computer Engineering Department, University of Maryland, College Park bb.eng.umd.edu (select ENEE631 S’09) [email protected] ENEE631 Spring’09 ENEE631 Spring’09 Lecture 21 (4/20/2009) Lecture 21 (4/20/2009) UMCP ENEE631 Slides (created by M.Wu © 2004)

Upload: sydney-wiggins

Post on 28-Dec-2015

221 views

Category:

Documents


1 download

TRANSCRIPT

ENEE631 Digital Image Processing (Spring'09)

Data Hiding in ImagesData Hiding in Images

Spring ’09 Instructor: Min Wu

Electrical and Computer Engineering Department,

University of Maryland, College Park

bb.eng.umd.edu (select ENEE631 S’09) [email protected]

ENEE631 Spring’09ENEE631 Spring’09Lecture 21 (4/20/2009)Lecture 21 (4/20/2009)

UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

20

04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [2]

Overview and LogisticsOverview and Logistics

Last Time:

– Overview of content-based image retrieval– A quick guide on video communications– Introduction on data embedding in images

Today:

– Continue on data hiding in images

UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

20

04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [8]

Recall: Embedding Basics – Two Simple TriesRecall: Embedding Basics – Two Simple Tries

Data Hiding: To put secondary data in host signal

(1) Replace LSB

(2) Round a pixel value to closest even or odd numbers

Both equivalent to reduce effective pixel depth for representing host image

Detection scheme is same as LSB, but embedding brings less distortion in the quantized case, esp. for higher LSB bitplane

+ Simple embedding; Fragile to even minor changes

even “0”odd “1”

pixel value 98 99 100 101

odd-even mapping

lookup table mapping

0 1 0 1

… 0 1 1 0 …

UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

ba

sed

on

Re

sea

rch

Ta

lks

’98

-’04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [9]

How to Improve the Robustness?How to Improve the Robustness?

Introduce quantization to embedding process

– Make features being odd/even multiple of Q

Tradeoff between embedding distortion and robustness

Larger Q => Higher resilience to minor changes => Higher average changes required to embed

data

Questions: What’s the expected embedding distortion? Relation with distortion by quantization alone?

feature value 2kQ (2k+1)Q (2k+2)Q (2k+3)Q

odd-even mapping

lookup table mapping

0 1 0 1

… 0 1 1 0 …

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [10]

Distortion from Quantization-based EmbeddingDistortion from Quantization-based Embedding

Uniform quantization with step size Q

(Assume source’s distribution within each interval is approx. constant)

MSE = Q2 / 12

Odd-even embedding with quantization

MSE = ½ * (Q2/12) + ½ * (7Q2/12) = Q2 / 3

MSE equiv. to quantize with 2Q step size! “Predistort” via quantization to gain resilience [-Q/2, Q/2]

feature value 2kQ (2k+1)Q (2k+2)Q (2k+3)Q

odd-even mapping 0 1 0 1

-Q -Q/2 + Q/2 +Q

-Q/2 + Q/2

1/Q

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [11]

Two Views of Quantization-based EmbeddingTwo Views of Quantization-based Embedding

From decoder’s view

– Partition the signal space into two subsets labeled “0” & “1”– Decode according to which subset a sample belongs to

Embedder picks watermarked sample from the subset labeled with to-be-embedded bit, and tries to minimize the amount of changes

From embedder’s view

– Design two quantizers “#0”, “#1”: step size 2Q, offset by Q– Embedder perform quantization using the quantizer labeled

with to-be-embedded bit => “Quantization Index Modulation (QIM)” Decoder looks for closest representative

feature value 2kQ (2k+1)Q (2k+2)Q (2k+3)Q

“1”“0”

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [12]

Tampering Detection by Pixel-domain Fragile WmkTampering Detection by Pixel-domain Fragile Wmk

Downloaded from ICIP’97 CD-ROM paper by Yeung-Mintzer

UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

ba

sed

on

Re

sea

rch

Ta

lks

’98

-’04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [13]

Fight Against Forging Tamper-Detection Watermark?Fight Against Forging Tamper-Detection Watermark?

If using LSB to embed a fragile watermark for tampering detection, adversary can alter image but retain LSB

[Solution 1] Add uncertainty to the embedding mapping

– through a random look-up table with controlled run length

[Solution 2] Make watermark securely depend on host content

E.g. embed a robust/content-base hash of host image

feature value 2kQ (2k+1)Q (2k+2)Q (2k+3)Q

odd-even mapping

lookup table mapping

0 1 0 1

… 0 1 1 0 …

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [14]

Pixel-domain Table-lookup EmbeddingPixel-domain Table-lookup Embedding (Yeung-Mintzer ICIP’97)

– Simple to implement; be able to localize alteration extracted wmk from altered image

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [15]

Yeung’s Fragile Watermark for Tampering DetectionYeung’s Fragile Watermark for Tampering Detection

Basic idea:

– enforce certain relationship to embed data– minimize distortion: nearest neighbour, constrained runs– diffuse error incurred to surrounding pixels

v’=v+d1+d2: LUT(v’)=boriginal image

marked image

lookup table generator

LUT( )

seed

data to be embedded

table lookuptest

image

extracted data

LUT( )

visualize &decide

embed detect

d1: diffused error

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [16]

LUT Embedding: Distortion/Security/RobustnessLUT Embedding: Distortion/Security/Robustness

What’s new compared with odd-even embedding?– Mapping from feature to embedded bit is less predictable– Adjacent intervals may be mapped to the same bit value

How much security gained with proprietary LUT? =>

– Proprietary LUT brings uncertainty and makes it difficult for attackers to embed specific data at his/her will

How much MSE introduced by embedding? =>

– Larger than odd-even embedding How much resilience gained? =>

– Moving away by Q/2 step may not trigger detection error Due to possible continuous run in LUT

Ref: M. Wu: "Joint Security and Robustness Enhancement for Quantization Based Embedding," IEEE Trans. on Circuits and Systems for Video Technology, vol. 13, no. 8, pp.831-841, August 2003. (see ICIP’03 for shorter conf. version)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [20]

Case Study: Mintzer-Yeung Patent on Fragile WmkCase Study: Mintzer-Yeung Patent on Fragile Wmk

F. Mintzer and M.M. Yeung: “Invisible Image Watermark for Image Verification,” U.S. Patent 5,875,249, issued Feb. 1999.

Acquire knowledge on latest art in industry from patent– Especially useful when industry don’t publish all key

techniques (but they often aggressively patent these “IP”) Watermark is a good example: Digimarc, Verance, IBM, NEC …

– Complementary to literature search of journal/conf. papers

For details on how to patent your novel ideas– Talk to your supervisor & lawyers, and check univ./company policies

– Resource Online workshop on Patent 101 (see also the patent handout)

http://www.invent.org/workshop/3_0_0_workshop.asp

US Patent Officewww.uspto.gov (full-text patent search and patent doc. images)

ENEE698T – Technology Laws (first offered F’08; see future offering)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [21]

A Glimpse at the Patent SystemA Glimpse at the Patent System

Intended to add "the fuel of interest to the fire of genius" (Abraham Lincoln)

– In exchange for disclosing an invention to the public, the inventor receives the exclusive right to control exploitation of the invention and to realize any profits for a specific length of time

Common types of U.S. patent: http://www.uspto.gov/go/taf/patdesc.htm

– Utility patents of most interest to ECEer A term up to 20 years from the date the patent application was filed Granted to anyone who invents a new and useful process, machine,

manufacture, or composition of matter, or a new and useful improvement thereof

– Design patents new, original & ornamental design for 14 years’ protection

– Plant patents

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [22]

Patent ProcessPatent Process

Idea– Make sure your idea is new and practical/useful

Document– Keep records that document your discovery– File “Invention Disclosure” & Be careful with public disclosure

Research– Search existing literature & patents related to your invention– Analyze existing patents and literature

Apply– Prepare and file the patent application documents– Review by PTO examiner; amend your patent claims if needed

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [23]

Structure of A Utility PatentStructure of A Utility Patent

Title Page– Title, Patent Number, File & Issue Dates– Inventors, Assignees, Patent examiners– Related patents and references– Abstract, # of claims, # of drawings, representative drawing

Drawings

Main text– Field of the Invention (usually in one sentence)– Background– Summary– Brief description of drawings– Detailed description of the preferred embodiment– Claims

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [24]

Useful Contents for Technical StudiesUseful Contents for Technical Studies

Detailed descriptions of invention (process/method/apparatus)

– Along with drawings (and background/summary)– They are often intended to be written in an easily accessible

way

Technical discussions on “Preferred embodiment(s)” in Mintzer-Yeung’s patent

– Image stamping via LUT embedding– Image verification via Table lookup and visualization– Error diffusion to alleviate visual distortion incurred by

embedding– Apply the process to DC-image for embedding data in JPEG

image

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [25]

Claims: Crucial Part for Business ValuesClaims: Crucial Part for Business Values

Not always “fun” to read– Many legally speaking terms and wordings

Usually prefer broad (and allowable) claims

Claims are the hot spot examined by USPTO– Determines whether

(1) the proposed claims have been claimed by other patents? (2) anticipated by other already issued patents? (3) straightforward combination or extensions of existing methods for similar purposes by those “skilled in the art”

28 Claims in Mintzer-Yeung patent– “Root” claims and “child” claims

Claim Tree: useful tree visualization to illustrate relations between claims

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [27]

From Fragile to Robust WatermarkFrom Fragile to Robust Watermark

UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

ba

sed

on

Re

sea

rch

Ta

lks

’98

-’04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [28]

From Fragile/Semi-Fragile to Robust WatermarkFrom Fragile/Semi-Fragile to Robust Watermark

Applications of fragile/semi-fragile watermark

– Tampering detection– Secret communications => “Steganography” (covert writing)– Convey side info. in a seamless way: lyric, director’s notes

Situations demanding higher robustness

– Protect ownership (copyright label), prevent leak (digital fingerprint)

– Desired robustness against compression, filtering, etc.

How to make it robust?

– Use “quantization” from signal processing– Use error correcting coding – Borrow theories from signal detection & telecommunications

“Spread Spectrum Watermark”: use “noise” as watermark and add it to the host signal for improved invisibility and robustness

UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

ba

sed

on

Re

sea

rch

Ta

lks

’98

-’04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [29]

Background: Robust Watermark / Data-EmbeddingBackground: Robust Watermark / Data-Embedding

Embedding domain tailored to media characteristics & application requirement

10011010 …

© Copyright …

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [30]

Spread Spectrum Watermark: Spread Spectrum Watermark: Cox et al (NECI)Cox et al (NECI)

What to use as watermark? Where to put it?– Place wmk in perceptually significant spectrum (for robustness)

Modify by a small amount below Just-noticeable-difference (JND)

– Use long random noise-like vector as watermark for robustness/security against jamming+removal &

imperceptibility

Embedding v’i = vi + vi wi = vi (1+ wi)

– Perform DCT on entire image and embed wmk in DCT coeff.– Choose N=1000 largest AC coeff. and scale {vi} by a random factor

2D DCT sort v’=v (1+ w) IDCT & normalize

Original image

N largest coeff.

other coeff.

marked image

random vector generator

wmk

seed

1.0nceunit varia zeromean, iid,~iw

UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

ba

sed

on

Re

sea

rch

Ta

lks

’98

-’04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [31]

Watermarking Example by Cox et al.Watermarking Example by Cox et al.

Original Cox Difference between

whole image DCT marked & original Embed in 1000 largest coeff.

UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

ba

sed

on

Re

sea

rch

Ta

lks

’98

-’04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [32]

Cox et al’s Scheme (cont’d): DetectionCox et al’s Scheme (cont’d): Detection Subtract original image from the test one before feeding to

detector (“non-blind detection”)

Correlation-based detection a correlator normalized by |Y| in Cox et al. paper

DCT

compute similarity

thresholdtest image

decision

wmk

DCT select N largest

original unmarked image

select N largest

preprocess

YY

WYWYsim

,

,),(

k watermar

watermarkno

:1

:0

NWYH

NYHXXY

–orig X

test X’

X’=X+W+N ?

X’=X+N ?

To think

UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

ba

sed

on

Re

sea

rch

Ta

lks

’98

-’04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [33]

Performance of Cox et al’s SchemePerformance of Cox et al’s Scheme

Robustness

– (claimed) scaling, JPEG, dithering, cropping, “printing-xeroxing-scanning”, multiple watermarking

– No big surprise with high robustness equivalent to sending just 1-bit {0,1} with O(103) samples

Comment– Must store orig. unmarked image “private wmk”, “non-blind” detection– Perform image registration if necessary– Adjustable parameters: N and

Distortion none scale25%

JPG10%

JPG 5% dither crop25%

print-xerox-scan

similarity 32.0 13.4 22.8 13.9 10.5 14.6 7.0 threshold = 6.0 (determined by setting false alarm probability)

UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

ba

sed

on

Re

sea

rch

Ta

lks

’98

-’04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [34]

Comments on Cox et al’s SchemesComments on Cox et al’s Schemes

“1000 largest coeff.” before and after embedding– May not be identical (and order may also changes)– Solutions: use original as ref; use “embeddable” mask to maintain synch.

Detection without using original/host image– Treat host image as part of the noise/interference ~ Blind detection

need long wmk signal to combat severe host interference [Zeng-Liu]

– Can do better than blind detection, as embedder knows the host signal => “Embedding with Side Info.”

./(:blind-non

;/:blind

22

22

www)y

wwy

TdN

dT

N

T

T

H0: <(x + noise), w >H1: < y + noise, w > = < w + (x + noise), w >

vs.H0: < (x + noise) - x, w > = < noise, w > H1: < y + noise - x, w > = < w + noise, w >

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [35]

Improve Invisibility and Robustness on Cox schemeImprove Invisibility and Robustness on Cox scheme

Apply better Human Perceptual Model– Global scaling factor is not suitable for all coefficients

– More explicitly compute just-noticeable-difference (JND) JND ~ max amount each coefficient can be modified invisibly Employ human visual model: freq. sensitivity, masking, …

– Use more localized transform => fine tune wmk for each region

block-based DCT; wavelet transform

Improve robustness: detection performance depends on ||s|| / d Add a watermark as strong as JND allows Embed in as many “embeddable” coefficients => improve

robustness

Block-DCT schemes: Podichuk-Zeng; Swanson-Zhu-Tewfik ’97

– Leverage existing visual model for block DCT from JPEG

iiii wJNDvv '

UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

ba

sed

on

Re

sea

rch

Ta

lks

’98

-’04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [36]

Perceptual Comparison: Cox vs. PodilchukPerceptual Comparison: Cox vs. Podilchuk

Original Cox Podilchukwhole image DCT block-DCTEmbed in 1000 largest coeff. Embed to all “embeddables”

UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

ba

sed

on

Re

sea

rch

Ta

lks

’98

-’04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [37]

Compare Cox & Podilchuk Schemes (cont’d)Compare Cox & Podilchuk Schemes (cont’d)

Cox Podilchuk

Amplified pixel-wise difference between marked and original (gray~0)

UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

ba

sed

on

Re

sea

rch

Ta

lks

’98

-’04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [38]

Comments on Cox & Podilchuk’s SS WmkComments on Cox & Podilchuk’s SS Wmk

Robustness

– Very robust against additive noise (seen from detection theory)

– Sensitive to synchronization errors, esp. under blind detection jitters (line dropping/addition) geometric distortion (rotation, scale, translation)

Question: How to improving synchronization resilience?

=> add registration pattern; embed in RST-invariant domain; …

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [39]

Suggested ReadingsSuggested Readings

1. I. Cox, J. Kilian, T. Leighton, T. Shamoon: “Secure Spread Spectrum Watermarking for Multimedia'', IEEE Trans. on Image Proc., vol.6, no.12, pp.1673-1687, 1997.

2. M. M. Yeung and F. Mintzer: “An Invisible Watermarking Technique for Image Verification", Proc. of the IEEE Int’l Conf. on Image Processing (ICIP), Oct. 1997.

3. M. Wu and B. Liu: "Data Hiding in Image and Video: Part-I -- Fundamental Issues and Solutions", IEEE Trans. on Image Proc., vol.12, no.6, pp.685-695, June 2003.

4. M. Wu, W. Trappe, Z.J. Wang, and K.J.R. Liu: “Collusion-resistant fingerprinting for Multimedia,” IEEE Signal Proc Magazine, March 2004.

5. M. Wu and B. Liu: Multimedia Data Hiding, Springer-Verlag, 2003.

6. I. Cox, M. Miller, and J. Bloom: Digital Watermarking, Morgan Kauffman, 2002.

And the related references cited by these publications.UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

20

04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [40]

Localized Embedding: Double-Edge SwordLocalized Embedding: Double-Edge Sword

“Innocent Tools” exploited by attackers: block concealment

Recovery of lost blocks

– for resilient multimedia transmission of JPEG/MPEG– good quality by edge-directed interpolation: Jung et al; Zeng-Liu

Remove robust watermark by block replacement

edge estimation

edge-directed interpolation

UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

ba

sed

on

Re

sea

rch

Ta

lks

’98

-’04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [41]

Block Replacement AttackBlock Replacement Attack

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [42]

Attack effective on block-DCT based spread-spectrum watermark

marked original (no distortion)JPEG 10% after proposed attack

JPEG 10% w/o distort Interp.

w/ orig 34.96 138.51 6.30

w/o orig 12.40 19.32 4.52

512x512 lenna Threshold: 3 ~ 6

Recall: claimed high robustness&quality by fine tuning wmk strength for each region

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [44]

Watermark Attacks: What and Why?Watermark Attacks: What and Why?

Attacks: intentionally obliterate watermarks

– remove a robust watermark– make watermark undetectable (e.g., miss synchronization)

– uncertainty in detection (e.g., multiple ownership claims)

– forge a valid (fragile) watermark– bypass watermark detector

Why study attacks?

– identify weaknesses– propose improvement– understand pros and

limitation of tech. solution

To win each campaign, To win each campaign, a generala generalshould know both his should know both his troop and troop and the opponent’s as well the opponent’s as well as possible.as possible.

-- -- Sun Tzu, Sun Tzu, The Art of War, The Art of War, 500 B.C.500 B.C.

UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

ba

sed

on

Re

sea

rch

Ta

lks

’98

-’04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [45]

Summary: Spread Spectrum EmbeddingSummary: Spread Spectrum Embedding

Main ideas– Place wmk in perceptually significant spectrum (for robustness)

Modify by a small amount below Just-noticeable-difference (JND)

– Use long random vector of low power as watermark to avoid artifacts (for imperceptibility, robustness, and security)

Cox’s approach

– Perform DCT on entire image & embed wmk in large DCT AC coeff.– Embedding: v’i = vi + vi wi = vi (1+ wi)

– Detection: subtract original and perform correlation w/ wmk

Podilchuk’s improvement– Embed in many “embeddable” coeff. in block-DCT domain– Adjust watermark strength by explicitly computing JND

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [46]

Suggested ReadingsSuggested Readings

1. I. Cox, J. Kilian, T. Leighton, T. Shamoon: “Secure Spread Spectrum Watermarking for Multimedia'', IEEE Trans. on Image Proc., vol.6, no.12, pp.1673-1687, 1997.

2. M. M. Yeung, F. Mintzer: “An Invisible Watermarking Technique for Image Verification", Proc. of the IEEE Int’l Conf. on Image Processing (ICIP), Oct. 1997.

3. M. Wu and B. Liu: "Data Hiding in Image and Video: Part-I -- Fundamental Issues and Solutions", IEEE Trans. on Image Proc., vol.12, no.6, pp.685-695, June 2003.

4. M. Wu, W. Trappe, Z.J. Wang, and K.J.R. Liu: “Collusion-resistant fingerprinting for Multimedia,” IEEE Signal Proc Magazine, March 2004.

5. M. Wu and B. Liu: Multimedia Data Hiding, Springer-Verlag, 2003.

6. I. Cox, M. Miller, and J. Bloom: Digital Watermarking, Morgan Kauffman, 2002.

And the related references cited by these publications.UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

20

04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [47]

Summary: Type-I Additive EmbeddingSummary: Type-I Additive Embedding

Add secondary signal in host media

Representative: spread spectrum embedding

– Add a noise-like signal and detection via correlation– Good tradeoff between security, imperceptibility & robustness– Limited capacity: host signal often appears as major interferer

modulationmodulation

data to be hidden

Xoriginal source

X’ = X + marked copy

10110100 ...10110100 ...

< X’ + noise, > = < + (X + noise), >

< X’ + noise - X, > = < + noise, >

UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

ba

sed

on

Re

sea

rch

Ta

lks

’98

-’04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [48]

Type-II Relationship Enforcement EmbeddingType-II Relationship Enforcement Embedding

Deterministically enforcing relationship – Secondary information carried solely in watermarked signal– Typical relationship: parity/modulo in quantized features

Representative: odd-even (quantized) embedding– Alternative view: switching between two quantizers w/ step size 2Q

“Quantization Index Modulation”

– Robustness achieved by quantization or tolerance zone– High capacity but limited robustness

even “0”odd “1”

feature value 2kQ (2k+1)Q (2k+2)Q (2k+3)Q

odd-even mapping

lookup table mapping

0 1 0 1

… 0 1 1 0 …

UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

ba

sed

on

Re

sea

rch

Ta

lks

’98

-’04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [49]

Robustness vs. PayloadRobustness vs. Payload Blind/non-coherent detection ~ original copy unavailable Robustness and payload tradeoff Advanced embedding: quantization w/ distortion-compensation

– Combining the two types with techniques suggested by info. theory

RobustnessRobustness

PayloadPayload

ImperceptibilityImperceptibility

stronger noisenoise weaker

-15 -10 -5 0 5 10 15 200

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

10log10

(E2/2) (dB)

Capacity C

(bits/c

h.

use)

Capacity of Type-I (host=10E) and Type-II AWGN ch. (wmk MSE E2)

Type-I (C-i C-o, blind detection)Type-II (D-i D-o)

-4 -3 -2 -1 0 1

0

0.02

0.04

0.06

0.08

0.1

UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

ba

sed

on

Re

sea

rch

Ta

lks

’98

-’04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [50]

Distortion Compensated Quantization EmbeddingDistortion Compensated Quantization Embedding

Distortion compensation technique– Increase quantization step by a factor for higher robustness– Compensate the extra distortion by dragging the enforced feature

toward the original feature value

Overall embedding distortion unchanged

Choose alpha to maximize a distortion-compensation SNR

odd/even mapping 0 1 0UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

ba

sed

on

Re

sea

rch

Ta

lks

’98

-’04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [51]

Improved Robustness by Distortion CompensationImproved Robustness by Distortion Compensation

– ICS (ideal Costa’s scheme)– SS (spread spectrum additive

embedding)– binary DM (odd-even quantized

embedding)– binary SCS (odd-even quantized

embedding with distortion compensation)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [52]

Issues to AddressIssues to Address

Tradeoff among conflicting requirements– Imperceptibility– Robustness & security– Capacity

Key elements of data hiding– Perceptual model– Embedding one bit– Multiple bits– Uneven embedding capacity– Robustness and security– What data to embed

Up

per

L

ayer

s

Uneven capacity equalization

Error correction

Security

……

Low

er

Lay

ers

Imperceptible embeddingof one bit

Multiple-bit embedding

Coding of embedded data

Robustness

Capacity

Imperceptibility

UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

ba

sed

on

Re

sea

rch

Ta

lks

’98

-’04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [54]

Embedded Fingerprint for Tracing TraitorsEmbedded Fingerprint for Tracing Traitors

Insert special signals to identify recipients

– Deter leak of proprietary documents– Complementary protection to encryption– Consider imperceptibility, robustness, traceability

– Attacks mounted by single and multiple users

Collusion Attack Collusion Attack (to remove fingerprints)(to remove fingerprints)

AliceAlice

BobBob

Colluded CopyColluded Copy

Unauthorized Unauthorized rere--distributiondistribution

Fingerprinted docfor different users

Collusion Attack Collusion Attack (to remove fingerprints)(to remove fingerprints)

AliceAlice

BobBob

Colluded CopyColluded Copy

Unauthorized Unauthorized rere--distributiondistribution

Fingerprinted docfor different users

Extract Extract FingerprintsFingerprints

Suspicious Suspicious CopyCopy

101110 …101110 …

Codebook

Alice, Bob, …

Identify Identify TraitorsTraitors

Extract Extract FingerprintsFingerprints

Suspicious Suspicious CopyCopy

101110 …101110 …

Codebook

Alice, Bob, …

Identify Identify TraitorsTraitors

Multi-user Attacks

Traitor Tracing

President

Satellite Image

Alice

Bob

Carl

w1

w2

w3

LeakLeak

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [56]

Collusion Attacks by Multiple UsersCollusion Attacks by Multiple Users Collusion: A cost-effective attack against multimedia fingerprints

– Users with same content but different fingerprints come together to produce a new copy with diminished or attenuated fingerprints

– Fairness: Each colluder contributes equal share through averaging, interleaving, and nonlinear combining

Collusion byaveraging 1/3

Alice ChrisBob

Colluded copy

Originally fingerprinte

dcopies

Alice Chris

Collage

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [57]

Key IssuesKey Issues

How to construct fingerprints?

– Identify individual users– Resist multi-user collusion

How to embed fingerprints in media data?

– Tailor to media characteristics for robustness & imperceptibility

Interaction between choices of fingerprint construction, embedding, and detection

– esp. to combat collusion attacks– Analogous to “cross-layer” methods in communications

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [58]

Road Map on Media Fingerprinting ResearchRoad Map on Media Fingerprinting Research

Robust EmbeddingOrthogonal Fingerprints

Represent how many users?Resist how many colluders?

“most effective” collusions?

Amount of resources used?

Group-based FP to exploit Attacker Behavior

Coded FP

Joint Coding-Embedding Framework

overcome prior work’s problems of long code length, low resilience, and limited scalability

adapt to media characteristics

Combinatorial codes + CDM

Error correcting codes + TDM

Correlated Fingerprints

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [59]

Example: Orthogonal Fingerprint for Curves/GraphicsExample: Orthogonal Fingerprint for Curves/Graphics

Use (approx.) orthogonal sequences as FPs for different users

– Detection by looking for high correlation result

Embed in parametric modeling domain of curve

– Perturb B-spline parameters according to spread spectrum sequences

Detection Statistics

Typical threshold is 3~6 for false alarm of 10-3 ~ 10-9

Original Curve(captured by TabletPC)

Fingerprinted Curve(100 control points)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [60]

Fingerprinting Topographic MapFingerprinting Topographic Map– Traditional protection: intentionally alter geospatial content– Embed much less intrusive digital fingerprint for a modern protection

• 9 long curves are marked; 1331 control points used to carry the fingerprint

1100x1100 Original Map Fingerprinted Map

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [61]

Collusion-Resistant Fingerprinting of MapsCollusion-Resistant Fingerprinting of Maps

2-User Interleaving Attack5-User Averaging Attack

. . .

Can survive combined attacks of collusion + print + scan

Can extend to 3-D Digital Elevation Map

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [63]

16-bit ACC for Detecting 16-bit ACC for Detecting 3 Colluders Out of 20 3 Colluders Out of 20

User-1 ( -1,-1, -1, -1, 1, 1, 1, 1, …, 1 ) ( -1, 1, 1, 1, 1, 1, …, -1, 1, 1, 1 ) User-4

Extracted fingerprint code ( -1, 0, 0, 0, 1, …, 0, 0, 0, 1, 1, 1 )

Collude by AveragingUniquely Identify User 1 & 4

Embed fingerprint via HVS-based spread spectrum embedding in block-DCT domain

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [64]

Suggested ReadingsSuggested Readings

1. I. Cox, J. Kilian, T. Leighton, T. Shamoon: “Secure Spread Spectrum Watermarking for Multimedia'', IEEE Trans. on Image Proc., vol.6, no.12, pp.1673-1687, 1997.

2. M. M. Yeung, F. Mintzer: “An Invisible Watermarking Technique for Image Verification", Proc. of the IEEE Int’l Conf. on Image Processing (ICIP), Oct. 1997.

3. M. Wu and B. Liu: "Data Hiding in Image and Video: Part-I -- Fundamental Issues and Solutions", IEEE Trans. on Image Proc., vol.12, no.6, pp.685-695, June 2003.

4. M. Wu, W. Trappe, Z.J. Wang, and K.J.R. Liu: “Collusion-resistant fingerprinting for Multimedia,” IEEE Signal Proc Magazine, March 2004.

5. M. Wu and B. Liu: Multimedia Data Hiding, Springer-Verlag, 2003.

6. I. Cox, M. Miller, and J. Bloom: Digital Watermarking, Morgan Kauffman, 2002.

And the related references cited by these publications.UM

CP

EN

EE

63

1 S

lide

s (c

rea

ted

by

M.W

u ©

20

04

)

ENEE631 Digital Image Processing (Spring'09) Lec 21 – Data Hiding [65]