forensic data hiding optimized for jpeg 2000
play

Forensic Data Hiding Optimized for JPEG 2000 Dieter Bardyn, Johann - PowerPoint PPT Presentation

Forensic Data Hiding Optimized for JPEG 2000 Dieter Bardyn, Johann A. Briffa, Ann Dooms and Peter Schelkens May 18, 2011 Overview Image adaptive data hiding Overview Image adaptive data hiding Overview Image adaptive data hiding


  1. Forensic Data Hiding Optimized for JPEG 2000 Dieter Bardyn, Johann A. Briffa, Ann Dooms and Peter Schelkens May 18, 2011

  2. Overview ◮ Image adaptive data hiding

  3. Overview ◮ Image adaptive data hiding

  4. Overview ◮ Image adaptive data hiding ⇒ tuned to image statistics

  5. Overview ◮ Image adaptive data hiding ⇒ tuned to image statistics ◮ better fidelity

  6. Overview ◮ Image adaptive data hiding ⇒ tuned to image statistics ◮ better fidelity ◮ better robustness

  7. Overview ◮ Image adaptive data hiding ⇒ tuned to image statistics ◮ better fidelity ◮ better robustness ◮ New technique suited for JPEG2000 compressed media

  8. Overview ◮ Image adaptive data hiding ⇒ tuned to image statistics ◮ better fidelity ◮ better robustness ◮ New technique suited for JPEG2000 compressed media ◮ IDS codes for synchronization

  9. The Basics Quantization Index Modulation ◮ Embed information M into a coverwork c by modifying its content imperceptibly

  10. The Basics Quantization Index Modulation ◮ Embed information M into a coverwork c by modifying its content imperceptibly ◮ Embed m = 0 or 1 in a sample x using Scalar QIM 1 x − m ∆ + m ∆ � � x w = Q 2 2 1 Chen and Wornell

  11. The Basics Quantization Index Modulation ◮ Embed information M into a coverwork c by modifying its content imperceptibly ◮ Embed m = 0 or 1 in a sample x using Scalar QIM 1 x − m ∆ + m ∆ � � x w = Q 2 2 ◮ Choose samples (coefficients) to embed log 2 ( M ) bits 1 Chen and Wornell

  12. The Basics Perceptual Shaping ◮ Psychovisual studies on perceptually similar signals 2 Distortion should remain imperceptible

  13. The Basics Perceptual Shaping ◮ Psychovisual studies on perceptually similar signals ◮ Complex models of human visual system 2 Distortion should remain imperceptible

  14. The Basics Perceptual Shaping ◮ Psychovisual studies on perceptually similar signals ◮ Complex models of human visual system ◮ First applied to quantization in compression schemes 2 Distortion should remain imperceptible

  15. The Basics Perceptual Shaping ◮ Psychovisual studies on perceptually similar signals ◮ Complex models of human visual system ◮ First applied to quantization in compression schemes ◮ How to apply to Scalar QIM? 2 Distortion should remain imperceptible

  16. The Basics Perceptual Shaping ◮ Psychovisual studies on perceptually similar signals ◮ Complex models of human visual system ◮ First applied to quantization in compression schemes ◮ How to apply to Scalar QIM? ◮ Operate in transform domain 2 Distortion should remain imperceptible

  17. The Basics Perceptual Shaping ◮ Psychovisual studies on perceptually similar signals ◮ Complex models of human visual system ◮ First applied to quantization in compression schemes ◮ How to apply to Scalar QIM? ◮ Operate in transform domain ◮ Determine maximum allowable 2 distortion ǫ 2 Distortion should remain imperceptible

  18. The Basics Perceptual Shaping ◮ Psychovisual studies on perceptually similar signals ◮ Complex models of human visual system ◮ First applied to quantization in compression schemes ◮ How to apply to Scalar QIM? ◮ Operate in transform domain ◮ Determine maximum allowable 2 distortion ǫ ◮ Determine quantizer stepsize ∆ to be ǫ 2 2 Distortion should remain imperceptible

  19. Perceptual Shaping and Data Hiding Blind data hiding ◮ Watermark extractor does not need original data (key-based)

  20. Perceptual Shaping and Data Hiding Blind data hiding ◮ Watermark extractor does not need original data (key-based) ◮ No performance loss 3 3 Data Hiding Codes, Moulin and Koeter

  21. Perceptual Shaping and Data Hiding Blind data hiding ◮ Watermark extractor does not need original data (key-based) ◮ No performance loss 3 ◮ Perceptual Shaping ⇒ image dependent coefficient selection 3 Data Hiding Codes, Moulin and Koeter

  22. Perceptual Shaping and Data Hiding Blind data hiding ◮ Watermark extractor does not need original data (key-based) ◮ No performance loss 3 ◮ Perceptual Shaping ⇒ image dependent coefficient selection ◮ Use mask values to select coefficients 3 Data Hiding Codes, Moulin and Koeter

  23. Perceptual Shaping and Data Hiding Blind data hiding ◮ Watermark extractor does not need original data (key-based) ◮ No performance loss 3 ◮ Perceptual Shaping ⇒ image dependent coefficient selection ◮ Use mask values to select coefficients ◮ Compare to threshold determined by payload size 3 Data Hiding Codes, Moulin and Koeter

  24. Perceptual Shaping and Data Hiding Perceptual Shaping: Lewis-Barni ◮ Lewis-Barni mask on DWT coefficients q θ Θ( l , θ )∆( l , i , j )Ξ( l , i , j ) 0 . 2 l ( i , j ) =

  25. Perceptual Shaping and Data Hiding Perceptual Shaping: Lewis-Barni ◮ Lewis-Barni mask on DWT coefficients q θ Θ( l , θ )∆( l , i , j )Ξ( l , i , j ) 0 . 2 l ( i , j ) = ◮ Θ depends on resolution level and orientation

  26. Perceptual Shaping and Data Hiding Perceptual Shaping: Lewis-Barni ◮ Lewis-Barni mask on DWT coefficients q θ Θ( l , θ )∆( l , i , j )Ξ( l , i , j ) 0 . 2 l ( i , j ) = ◮ Θ depends on resolution level and orientation ◮ ∆ measures local brightness

  27. Perceptual Shaping and Data Hiding Perceptual Shaping: Lewis-Barni ◮ Lewis-Barni mask on DWT coefficients q θ Θ( l , θ )∆( l , i , j )Ξ( l , i , j ) 0 . 2 l ( i , j ) = ◮ Θ depends on resolution level and orientation ◮ ∆ measures local brightness ◮ Ξ factors in texture activity

  28. Perceptual Shaping and Data Hiding Perceptual Shaping: Lewis-Barni ◮ Lewis-Barni mask on DWT coefficients q θ Θ( l , θ )∆( l , i , j )Ξ( l , i , j ) 0 . 2 l ( i , j ) = ◮ Θ depends on resolution level and orientation ◮ ∆ measures local brightness ◮ Ξ factors in texture activity ◮ + Accurate representation of HVS.

  29. Perceptual Shaping and Data Hiding Perceptual Shaping: Lewis-Barni ◮ Lewis-Barni mask on DWT coefficients q θ Θ( l , θ )∆( l , i , j )Ξ( l , i , j ) 0 . 2 l ( i , j ) = ◮ Θ depends on resolution level and orientation ◮ ∆ measures local brightness ◮ Ξ factors in texture activity ◮ + Accurate representation of HVS. ◮ + DWT Based

  30. Perceptual Shaping and Data Hiding Perceptual Shaping: Lewis-Barni ◮ Lewis-Barni mask on DWT coefficients q θ Θ( l , θ )∆( l , i , j )Ξ( l , i , j ) 0 . 2 l ( i , j ) = ◮ Θ depends on resolution level and orientation ◮ ∆ measures local brightness ◮ Ξ factors in texture activity ◮ + Accurate representation of HVS. ◮ + DWT Based ◮ - High Complexity.

  31. Perceptual Shaping and Data Hiding Perceptual Shaping: Solanki ◮ Solanki mask on DCT coefficients of 8 by 8 blocks 7 || C ( i , j ) || 2 − || C (0 , 0) || 2 � = E block i , j =0

  32. Perceptual Shaping and Data Hiding Perceptual Shaping: Solanki ◮ Solanki mask on DCT coefficients of 8 by 8 blocks 7 || C ( i , j ) || 2 − || C (0 , 0) || 2 � = E block i , j =0 ◮ + Low Complexity

  33. Perceptual Shaping and Data Hiding Perceptual Shaping: Solanki ◮ Solanki mask on DCT coefficients of 8 by 8 blocks 7 || C ( i , j ) || 2 − || C (0 , 0) || 2 � = E block i , j =0 ◮ + Low Complexity ◮ - DCT based

  34. Perceptual Shaping and Data Hiding Perceptual Shaping: Solanki ◮ Solanki mask on DCT coefficients of 8 by 8 blocks 7 || C ( i , j ) || 2 − || C (0 , 0) || 2 � = E block i , j =0 ◮ + Low Complexity ◮ - DCT based ◮ - Block based

  35. Perceptual Shaping and Data Hiding Perceptual Shaping: Tree Based ◮ Tree based mask on DWT coefficients 2 l − k − 1 l − 1 k ( i + x , j + y ) || 2 , � � || I θ E tree ( l , θ, i , j ) = (1) k =1+ a x , y =0

  36. Perceptual Shaping and Data Hiding Perceptual Shaping: Tree Based ◮ Tree based mask on DWT coefficients 2 l − k − 1 l − 1 k ( i + x , j + y ) || 2 , � � || I θ E tree ( l , θ, i , j ) = (1) k =1+ a x , y =0 ◮ + Low Complexity

  37. Perceptual Shaping and Data Hiding Perceptual Shaping: Tree Based ◮ Tree based mask on DWT coefficients 2 l − k − 1 l − 1 k ( i + x , j + y ) || 2 , � � || I θ E tree ( l , θ, i , j ) = (1) k =1+ a x , y =0 ◮ + Low Complexity ◮ + DWT based

  38. Perceptual Shaping and Data Hiding Perceptual Shaping: Tree Based ◮ Tree based mask on DWT coefficients 2 l − k − 1 l − 1 k ( i + x , j + y ) || 2 , � � || I θ E tree ( l , θ, i , j ) = (1) k =1+ a x , y =0 ◮ + Low Complexity ◮ + DWT based ◮ + Good visual performance

  39. Perceptual Shaping and Data Hiding Perceptual Shaping: the masks (a) Lewis-Barni (b) Solanki (c) Tree Based

  40. Perceptual Shaping and Data Hiding Insertion, Deletion and Substitution Codes (IDS) ◮ Synchronization issues modeled by IDS channel

  41. Perceptual Shaping and Data Hiding Insertion, Deletion and Substitution Codes (IDS) ◮ Synchronization issues modeled by IDS channel ◮ Conventional ECC expect a substitution-only channel

  42. Perceptual Shaping and Data Hiding Insertion, Deletion and Substitution Codes (IDS) ◮ Synchronization issues modeled by IDS channel ◮ Conventional ECC expect a substitution-only channel ◮ We use an improved Davey-MacKay construction:

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend