Digital Watermarking Presented by Melinos Averkiou History 1282 - - PowerPoint PPT Presentation

digital watermarking
SMART_READER_LITE
LIVE PREVIEW

Digital Watermarking Presented by Melinos Averkiou History 1282 - - PowerPoint PPT Presentation

Digital Watermarking Presented by Melinos Averkiou History 1282 Paper Watermarks 1779 Counterfeiting 1954 Watermarking music 1988 First use of the term Digital Watermark End of 1990s large interest in


slide-1
SLIDE 1

Digital Watermarking

Presented by Melinos Averkiou

slide-2
SLIDE 2

History

  • 1282 – Paper Watermarks
  • 1779 – Counterfeiting
  • 1954 – Watermarking music
  • 1988 – First use of the term Digital Watermark
  • End of 1990s – large interest in watermarking
slide-3
SLIDE 3

Applications

  • Broadcast monitoring
  • Owner identification
  • Transaction Tracking
  • Content Authentication
  • Copy Control
  • ..many more
slide-4
SLIDE 4

Watermarking Properties

  • Embedding effectiveness
  • Fidelity
  • Payload
  • Blind or informed detection
  • False positive rate
  • Robustness
slide-5
SLIDE 5

Watermarking models

  • 1. Communication-Based
  • Without side-information
  • With side-information
slide-6
SLIDE 6

Watermarking Models

  • 2. Geometric
  • Media Space

– Embedding Region – Detection Region – Region of acceptable fidelity

  • Marking Space
slide-7
SLIDE 7

Watermarking without side- information

slide-8
SLIDE 8

Blind Embedding and Linear Correlation Detection

Embedder:

  • 1. Choose one random reference pattern(wr)
  • 2. Choose message mark for 1 and 0

α controls the embedding strength Detector:

  • 1. Calculate linear correlation zlc
  • 2. Detect message according to zlc
slide-9
SLIDE 9

Geometric Interpretation

slide-10
SLIDE 10

+

α = 1

slide-11
SLIDE 11

Effectiveness

400 images (112 x 92 pixels)

  • 3
  • 2
  • 1

1 2 3 5 10 15 m=0 No watermark m=1 Detection value Percentage of images

slide-12
SLIDE 12
  • 3
  • 2
  • 1

1 2 3 2 4 6 8 10 12 14 16 m=0 No watermark Detection value Percentage of images m=1

Reference pattern is very important

Low pass reference pattern

slide-13
SLIDE 13
  • 3
  • 2
  • 1

1 2 3 2 4 6 8 10 12 14 m=0 No watermark Detection value Percentage of images m=1

α is very important

α = 2

slide-14
SLIDE 14
  • 3
  • 2
  • 1

1 2 3 2 4 6 8 10 12 14 m=0 No watermark Detection value Percentage of images m=1

Adding noise

slide-15
SLIDE 15

Watermarking with side-information

slide-16
SLIDE 16

Informed Embedding and Linear Correlation Detection

Embedder:

  • 1. Choose one random reference pattern(wr)
  • 2. Calculate α so that we have 100% effectiveness
  • 3. Choose message mark for 1 and 0

Detector:

  • 1. Calculate linear correlation zlc
  • 2. Detect message according to zlc
slide-17
SLIDE 17

Geometric Interpretation

slide-18
SLIDE 18

+

slide-19
SLIDE 19

Effectiveness

  • 3
  • 2
  • 1

1 2 3 10 20 30 40 50 60 70 80 90 100 m=0 No watermark m=1 Detection Value Percentage of images

slide-20
SLIDE 20

Adding Noise

  • 3
  • 2
  • 1

1 2 3 10 20 30 40 50 60 70 80 90 100 m=0 No watermark m=1 Detection value Percentage of images

slide-21
SLIDE 21

Exploiting Marking Space

slide-22
SLIDE 22

Dirty Paper Codes

  • One code book comprised of subcode books for each

message

  • Select the code most similar to the original work
slide-23
SLIDE 23

Block-Based/Fixed Robustness Embedding – Correlation Coefficient Detection

Embedder 1. Extract a watermark vector vo by summing 8 x 8 blocks 2. Find the highest correlation between vo and a set of reference marks (one set for 1, one set for 0) 3. Embed the highest correlation mark into the image using a fixed robustness algorithm Detector 1. Extract a watermark vector vo by summing 8 x 8 blocks 2. Find the highest correlation between vo and the two sets of reference marks 3. If it’s above the threshold then the message is detected

slide-24
SLIDE 24

Geometric Interpretation

slide-25
SLIDE 25

Before embedding After embedding

slide-26
SLIDE 26

Fidelity

5 10 15 20 25 30 35 40 15 15.5 16 16.5 17 17.5 18 Number of reference marks per message MSE after embedding

slide-27
SLIDE 27

0.9993 0.9994 0.9995 0.9996 0.9997 0.9998 0.9999 1 20 40 60 80 100 120 140 160 180 Detection value Number of images

Effectiveness

  • tnc=0.95 R2=30
slide-28
SLIDE 28

Orthogonal Lattice Dirty Paper Code

Embedder 1. Encode the message into a sequence of coded bits using Trellis coding 2. Divide the image into 8 x 8 blocks 3. Modify each block to embed a bit using the reference mark Detector 1. Compute correlation of each block with the reference mark and use it to find z z= floor (corr / α + 0.5 ) 2. If z is odd then we have a 1, else we have a 0 3. Decode the message using the Viterbi decoder

slide-29
SLIDE 29

Original message: 1024 bits Embedded message: 4096 bits MSE = 1.6927 Errors = 0

Before embedding After embedding

slide-30
SLIDE 30

Other Methods

  • Frequency Domain Based

– Using DCT Coefficients – Using Wavelets

slide-31
SLIDE 31

Thank You!