podilchuk01_05
TRANSCRIPT
-
8/11/2019 podilchuk01_05
1/36
Digital watermarking:
algorithms and applications
Park, Jungjin
-
8/11/2019 podilchuk01_05
2/36
Index
Watermarking embedding
Watermarking detection
Document Graphic
Audio
Video
Image
-
8/11/2019 podilchuk01_05
3/36
Watermark embedding
Watermark embedding scheme
embed the watermark directly into the host data or to a transformed version
of the host data
(DCT, wavelet)-popular due to the natural framework for incorporating
perceptual knowledge into the embedding algorithm
-Many of compression techniques such as JPEG work in the same framework
and this allows for watermarking of the compressed bit stream with only
partial decoding
-
8/11/2019 podilchuk01_05
4/36
Watermark embedding
S: original host signal (image luminance values or DCT coefficients)M: watermark message (serial number or credit card number logo)
K: secret key
WSX
-
8/11/2019 podilchuk01_05
5/36
Watermark embedding
Secret key is used to generate a random sequence to embed in the host
signal
It is also used to determine a random sequence which identifies locations in
the host signal for watermarking embedding
-without knowledge of the key, it should be difficult to remove or alter theembedded message without destroying the original content
no-key or public-key (QIM) may be desirable .
-
8/11/2019 podilchuk01_05
6/36
Watermark detection
Detection or verification: the process of making a binary decision at the
decoder, it check whether a specific watermark
is or not present in the received data
Type I (false positive) : the case where a watermark is detected when it
does not existType 2 (false negative) : the case when a existing watermark is not
detected
Identification: the process of being able to decode one of N possible
choices at the receiver.
Open set : the possibility that one of N or no watermark exists in the data
Closed set : the problems where one of N possible watermarks is known to
be in the received data and the detector has to pick the most likely one
-
8/11/2019 podilchuk01_05
7/36
Watermark detection
Blind detection
S is not available at the decoder,
S acts as an additive noise component in the watermarking detection process
S is available at the decoderIt could be used to estimate the channel distortions and invert them to
provide better detection performance
-
8/11/2019 podilchuk01_05
8/36
Watermark detection
WW
WWEE
WW
SW
Typical watermarking detector
Watermark detection is performed by comparing the correlation coefficient
to a threshold value which can be modified according to the tradeoff
between probability of detection and the probability of false alarm
pWW
pWW
TT
Watermark W detected
Watermark W is not detected
-
8/11/2019 podilchuk01_05
9/36
Documents watermarking
Document watermarking can be achieved by altering the text formatting or by altering
certain characteristics of textual elements
Line- Shift Coding
The most easily discernible by readers
The most robust type of encoding in the presence of noisethe long lengths of text lines provide a relatively easily detectable feature
Altering a document by vertically shifting the locations of text lines
decoding without need of the original image
Original image is known to have uniform line spacing
-
8/11/2019 podilchuk01_05
10/36
Documents watermarking
Word-Shift Coding
Altering a document by horizontally shifting the locations of words within
text lines
The spacing between adjacent words on a line is often varied to support textjustification.
less discernible to the reader than line-shifting
Decoding need the original image
variable spacing
-
8/11/2019 podilchuk01_05
11/36
Documents watermarking
Feature coding
Chosen text features are altered by extending or shorting the lengths by one
or more pixels
Decoding require the original image
Ex) vertical end line top of letters, b,d,h,etc
Altered by expending or shorting lengths
-
8/11/2019 podilchuk01_05
12/36
Graphics watermarking
Watermarking of facial animation parameters (FAP) defined by the
MPEG-4 standard
66 FAPs
global head motion parameters
- Head pitch and yaw angles
local face motion parameters
-opening of eyelids , opening of lips, movement of innerlip corners
16 FAPs (jaw, chin, inner lips and cornerlips)
12 FAPs (eyeballs pupils eyelids), 8 FAPs eyebrows ,
4 FAPs cheeks , 5 FAPs tongue , 3 FAPs global head rotation,
10 FAPS outer lip position, 4 FAPs nose, 4 FAPs ears
-
8/11/2019 podilchuk01_05
13/36
Graphics watermarking
)](),()/,/([)()( ktkPNNtMkWMtFAPtFAP kWM
k
Embedding
One bit of watermark information is embedded in a block of facial
animation parameters (FAPs) -using PN sequence
generated by any random number generator that produces binary output
values -1 and +1)
Minimize visible distortion
-apply an amplitude adaptation
Limit the maximum deviation of the watermarked FAPs from the
unwatermarked FAPs to 3% of dynamic range for local FAPs like lip
movement, and 1% of the dynamic range for global FAPs like head
rotation.
-
8/11/2019 podilchuk01_05
14/36
Graphics watermarking
),())()((),(
1)1( 1)1(
tkPNtFAPtFAPsignnmWM
Mm
Mmk
k
Nn
Nnt
WM
k
Detection
Extracted from the watermarked parameters directly by
Subtraction of the unwatermarked FAPs from the watermarked FAPs
Subsequent correlation with the same filtered PN sequence that has been used
for embedding
Thresholding as a bit decision
-
8/11/2019 podilchuk01_05
15/36
Video watermarking
Current issue
Design of an effective copy control system for DVD include s the
placement of the detector
Two proposals for detector placement
Watermark detection in the drive
Advantage : Pirated content cannot leave the drive in playback mode
or recording mode
Watermark detection within the application
Advantage : ability to provide a more complex detector and
flexibility of extending the scheme to other data type
-
8/11/2019 podilchuk01_05
16/36
Video watermarking
Unique requirement for DVD application
Copy generation management
Ability to detect the copy once state and change it to copy no more state after
the recording
Two approach
Secondary watermarks, Ticket
-
8/11/2019 podilchuk01_05
17/36
Video watermarking
Scene-adaptive video watermarking technique
based on temporal wavelet transform
using a tow-band perfect reconstruction filter bank
Separates static areas from dynamic areas so that separate watermarkingstrategies can be applied to the different areas.
constant watermarking apply for static, varying watermark apply for the
dynamic areas to defeat watermark deletion through frame averaging
-
8/11/2019 podilchuk01_05
18/36
Video watermarking
Real time watermark embedding of compressed video
adding the watermark by modifying the fixed length and variable length
codes in the compressed video bit stream
allow for a computationally efficient way of real-time watermark insertion
allow for a relatively high payload
drawback: decoding the bit stream removes the watermark
-
8/11/2019 podilchuk01_05
19/36
Video watermarking
More robust technique for real time watermark embedding
adding the watermark by enforcing energy differences between various
video regions
This technique is done by discarding high frequency components
only partial decoding of a compressed video bit stream is necessary to
apply this watermark
-
8/11/2019 podilchuk01_05
20/36
Audio watermarking
Audio watermarking requirements
Inaudible
Robust :filtering, resampling, compression, noise, cropping, A/D-D/A
conversion
Embedded directly in the data
self-clocking for ease of detection in the presence of cropping and time-
scale change operations
-
8/11/2019 podilchuk01_05
21/36
Audio watermarking
Phase coding
Work by substituting the phase
of an initial audio segment with
a reference phase that
represents the data
For the decodingprocess
The synchronization of the
sequence is done before
decoding
The length of the segment and
the data interval must be
known at the receiver
The value of the phase of segment is detected as a binary string
-
8/11/2019 podilchuk01_05
22/36
Audio watermarking
Spread spectrum
Direct Sequence Spread Spectrum
encoding(DSSS)
spreads the signal by multiplying it by a chip(key),
a maximal length pseudorandom sequence- applied tothe coded information to modulate the sequence into
a spread spectrum sequence
The spectrum of the data is spread over the
available band
the spread data sequence is attenuated and added tothe original file as additive random noise
decoderpseudorandom key(chip) is needed to decode
signal synchronization is done
-
8/11/2019 podilchuk01_05
23/36
Audio watermarking
Unlike phase coding, DSSS introduced additive random noise to the
sound
to keep the noise level low, inaudible
The spread code is attenuated to roughly 0.5 percent of the dynamic
range of the host sound file
-
8/11/2019 podilchuk01_05
24/36
Audio watermarking
Echo data hiding
Embedding data into a host audio signal by
introducing an echo
-data are hidden by varying three parameters of
the echo
Initial amplitude, offset, decay rate
Zero represent a binary zero ,one represent a binary one < threshold (human ear can
resolve the echo)
It is possible to encode and decode information in the form of binary digits into amedia stream with minimal alteration to the original signal
to minimize alteration
Addition of resonance simply gives the signal a slightly richer sound
-
8/11/2019 podilchuk01_05
25/36
-
8/11/2019 podilchuk01_05
26/36
Image watermarking
Texture block coding Detection
1. Autocorrelate the image with itself. This will produce peaks at every point
in the autocorrelation where identical regions of the image overlap.
2. Shift the image as indicated by the peaks in Step 1.
Now subtract the image from its shifted copy
3. Square the result and threshold it to recover only those values quite close to
zero. The copied region will be visible as these values.
-
8/11/2019 podilchuk01_05
27/36
Image watermarking
Transform domain watermarking
robust to common compression techniques
block-based DCT which is the fundamental building block of current image
coding standard JPEG and MPEG
a pseudorandom subset of the blocks are chosen and a triplet of midrange
frequencies are altered to encode a binary sequence
Watermarks inserted in the high frequencies are vulnerable to attack
The low frequency components are perceptually significant and sensitive toalterations
-
8/11/2019 podilchuk01_05
28/36
Image watermarking
two watermarking techniques based on visual models
Image-adaptive DCT approach
Image-adaptive DWT approach
Utilizing visual models which have been developed in the context of image
compression
Very effective visual models have been developed for compression
applications that take into account frequency sensitivity, local luminance
sensitivity, contrast masking
-
8/11/2019 podilchuk01_05
29/36
-
8/11/2019 podilchuk01_05
30/36
Image watermarking
otherwiseX
tXifwtXX
bvu
C
bvubvubvu
C
bvubvu
bvu ,
,
,,
,,,,,,,,,,*
,,
bvuX ,, DCT coefficient
Watermarked DCT coefficients
Sequence of watermark values
Computed JND from the visual model
bvuw ,,
C
bvut ,,
*
,, bvuX
IA-DCT
embedding
The watermark is only inserted into the luminance component of the image
-
8/11/2019 podilchuk01_05
31/36
Image watermarking
ectednotiswwatermarkT
ectedwwatermarkT
EE
ww
t
ww
XXw
ww
ww
ww
ww
C
bvu
bvus
bvu
bvubvubvus
det
det
*
*
*
*
*
,,
*,,,*
,,
*
,,,,
*
,,,
Detection
Normalized correlation detection scheme based on classical detection for the
IA-DCT scheme
Received watermark
Normalized correlation coefficient between two
signals
-
8/11/2019 podilchuk01_05
32/36
Image watermarking
otherwiseX
tXifwtXX
flvu
F
flflvuflvu
F
flflvu
flvu,
,
,,,
,,,,,,,,,,,*
,,,
flvuX ,,,
flvuw ,,,
*
,,, flvuX
F
flt ,
IA W embedding
Wavelet coefficient at position (u,v) in resolution level l, frequency
orientation f
Watermarked wavelet coefficient
Computed frequency weight at level l and frequency orientation f
Watermark sequence
watermark is inserted only in the luminance component of the image
-
8/11/2019 podilchuk01_05
33/36
Image watermarking
flfl ww
flfl
ww
F
fl
flvus
flvus
flvuflvuflvus
EE
wwfl
t
w
w
XXw
,,
*
,
*
,
,
*
,,,,*
,,,,
*
,,,,,,
*
,,,,
),(
)}(),({max
1
1
***
**
**
,
*
1),(
1),(
fl
N
N
wwwwflww
N
lflww
lww
N
fflww
fww
f
f
IA W detection
Correlation is performed separately
IA-W scheme is based on a much simpler visual model which only takes into
account frequency sensitivity, the multi resolution structure of the watermark
and the watermark detection scheme results in a very robust scheme
-
8/11/2019 podilchuk01_05
34/36
Image watermarking
Digital watermarking by geometric warping
Embeds information in an image by changing the geometric features of the image
the watermark is formed by a predefined dense pixel pattern, such as a
collection of lines
Salient points in an image are warped into the vicinity of the line pattern in
such a way that the changes to the image are imperceptible
subdivide the image in a number of blocks. Find a fixed number of most
significant pixels, these are called salient points
-
8/11/2019 podilchuk01_05
35/36
Image watermarking
Detection
Determining whether a significantly large number of points are within the
vicinity of the line patterns
Advantage
detection is computationally fasterEasier to detect the watermark in images have been rotated, scaled, or
distorted by a geometric transformation
-
8/11/2019 podilchuk01_05
36/36
Questions?