Forensic Data Hiding Optimized for JPEG 2000 Dieter Bardyn, Johann - - PowerPoint PPT Presentation

forensic data hiding optimized for jpeg 2000
SMART_READER_LITE
LIVE PREVIEW

Forensic Data Hiding Optimized for JPEG 2000 Dieter Bardyn, Johann - - PowerPoint PPT Presentation

Forensic Data Hiding Optimized for JPEG 2000 Dieter Bardyn, Johann A. Briffa, Ann Dooms and Peter Schelkens May 18, 2011 Overview Image adaptive data hiding Overview Image adaptive data hiding Overview Image adaptive data hiding


slide-1
SLIDE 1

Forensic Data Hiding Optimized for JPEG 2000

Dieter Bardyn, Johann A. Briffa, Ann Dooms and Peter Schelkens May 18, 2011

slide-2
SLIDE 2

Overview

◮ Image adaptive data hiding

slide-3
SLIDE 3

Overview

◮ Image adaptive data hiding

slide-4
SLIDE 4

Overview

◮ Image adaptive data hiding ⇒ tuned to image statistics

slide-5
SLIDE 5

Overview

◮ Image adaptive data hiding ⇒ tuned to image statistics

◮ better fidelity

slide-6
SLIDE 6

Overview

◮ Image adaptive data hiding ⇒ tuned to image statistics

◮ better fidelity ◮ better robustness

slide-7
SLIDE 7

Overview

◮ Image adaptive data hiding ⇒ tuned to image statistics

◮ better fidelity ◮ better robustness

◮ New technique suited for JPEG2000 compressed media

slide-8
SLIDE 8

Overview

◮ Image adaptive data hiding ⇒ tuned to image statistics

◮ better fidelity ◮ better robustness

◮ New technique suited for JPEG2000 compressed media ◮ IDS codes for synchronization

slide-9
SLIDE 9

The Basics

Quantization Index Modulation

◮ Embed information M into a coverwork c by modifying its

content imperceptibly

slide-10
SLIDE 10

The Basics

Quantization Index Modulation

◮ Embed information M into a coverwork c by modifying its

content imperceptibly

◮ Embed m = 0 or 1 in a sample x using Scalar QIM1

xw = Q

  • x − m∆

2

  • + m∆

2

1Chen and Wornell

slide-11
SLIDE 11

The Basics

Quantization Index Modulation

◮ Embed information M into a coverwork c by modifying its

content imperceptibly

◮ Embed m = 0 or 1 in a sample x using Scalar QIM1

xw = Q

  • x − m∆

2

  • + m∆

2 ◮ Choose samples (coefficients) to embed log2(M) bits

1Chen and Wornell

slide-12
SLIDE 12

The Basics

Perceptual Shaping

◮ Psychovisual studies on perceptually similar signals

2Distortion should remain imperceptible

slide-13
SLIDE 13

The Basics

Perceptual Shaping

◮ Psychovisual studies on perceptually similar signals ◮ Complex models of human visual system

2Distortion should remain imperceptible

slide-14
SLIDE 14

The Basics

Perceptual Shaping

◮ Psychovisual studies on perceptually similar signals ◮ Complex models of human visual system ◮ First applied to quantization in compression schemes

2Distortion should remain imperceptible

slide-15
SLIDE 15

The Basics

Perceptual Shaping

◮ Psychovisual studies on perceptually similar signals ◮ Complex models of human visual system ◮ First applied to quantization in compression schemes ◮ How to apply to Scalar QIM?

2Distortion should remain imperceptible

slide-16
SLIDE 16

The Basics

Perceptual Shaping

◮ Psychovisual studies on perceptually similar signals ◮ Complex models of human visual system ◮ First applied to quantization in compression schemes ◮ How to apply to Scalar QIM?

◮ Operate in transform domain 2Distortion should remain imperceptible

slide-17
SLIDE 17

The Basics

Perceptual Shaping

◮ Psychovisual studies on perceptually similar signals ◮ Complex models of human visual system ◮ First applied to quantization in compression schemes ◮ How to apply to Scalar QIM?

◮ Operate in transform domain ◮ Determine maximum allowable2 distortion ǫ 2Distortion should remain imperceptible

slide-18
SLIDE 18

The Basics

Perceptual Shaping

◮ Psychovisual studies on perceptually similar signals ◮ Complex models of human visual system ◮ First applied to quantization in compression schemes ◮ How to apply to Scalar QIM?

◮ Operate in transform domain ◮ Determine maximum allowable2 distortion ǫ ◮ Determine quantizer stepsize ∆ to be ǫ

2

2Distortion should remain imperceptible

slide-19
SLIDE 19

Perceptual Shaping and Data Hiding

Blind data hiding

◮ Watermark extractor does not need original data (key-based)

slide-20
SLIDE 20

Perceptual Shaping and Data Hiding

Blind data hiding

◮ Watermark extractor does not need original data (key-based) ◮ No performance loss3

3Data Hiding Codes, Moulin and Koeter

slide-21
SLIDE 21

Perceptual Shaping and Data Hiding

Blind data hiding

◮ Watermark extractor does not need original data (key-based) ◮ No performance loss3 ◮ Perceptual Shaping ⇒ image dependent coefficient selection

3Data Hiding Codes, Moulin and Koeter

slide-22
SLIDE 22

Perceptual Shaping and Data Hiding

Blind data hiding

◮ Watermark extractor does not need original data (key-based) ◮ No performance loss3 ◮ Perceptual Shaping ⇒ image dependent coefficient selection ◮ Use mask values to select coefficients

3Data Hiding Codes, Moulin and Koeter

slide-23
SLIDE 23

Perceptual Shaping and Data Hiding

Blind data hiding

◮ Watermark extractor does not need original data (key-based) ◮ No performance loss3 ◮ Perceptual Shaping ⇒ image dependent coefficient selection ◮ Use mask values to select coefficients ◮ Compare to threshold determined by payload size

3Data Hiding Codes, Moulin and Koeter

slide-24
SLIDE 24

Perceptual Shaping and Data Hiding

Perceptual Shaping: Lewis-Barni

◮ Lewis-Barni mask on DWT coefficients

l (i, j)

= Θ(l, θ)∆(l, i, j)Ξ(l, i, j)0.2

slide-25
SLIDE 25

Perceptual Shaping and Data Hiding

Perceptual Shaping: Lewis-Barni

◮ Lewis-Barni mask on DWT coefficients

l (i, j)

= Θ(l, θ)∆(l, i, j)Ξ(l, i, j)0.2

◮ Θ depends on resolution level and orientation

slide-26
SLIDE 26

Perceptual Shaping and Data Hiding

Perceptual Shaping: Lewis-Barni

◮ Lewis-Barni mask on DWT coefficients

l (i, j)

= Θ(l, θ)∆(l, i, j)Ξ(l, i, j)0.2

◮ Θ depends on resolution level and orientation ◮ ∆ measures local brightness

slide-27
SLIDE 27

Perceptual Shaping and Data Hiding

Perceptual Shaping: Lewis-Barni

◮ Lewis-Barni mask on DWT coefficients

l (i, j)

= Θ(l, θ)∆(l, i, j)Ξ(l, i, j)0.2

◮ Θ depends on resolution level and orientation ◮ ∆ measures local brightness ◮ Ξ factors in texture activity

slide-28
SLIDE 28

Perceptual Shaping and Data Hiding

Perceptual Shaping: Lewis-Barni

◮ Lewis-Barni mask on DWT coefficients

l (i, j)

= Θ(l, θ)∆(l, i, j)Ξ(l, i, j)0.2

◮ Θ depends on resolution level and orientation ◮ ∆ measures local brightness ◮ Ξ factors in texture activity

◮ + Accurate representation of HVS.

slide-29
SLIDE 29

Perceptual Shaping and Data Hiding

Perceptual Shaping: Lewis-Barni

◮ Lewis-Barni mask on DWT coefficients

l (i, j)

= Θ(l, θ)∆(l, i, j)Ξ(l, i, j)0.2

◮ Θ depends on resolution level and orientation ◮ ∆ measures local brightness ◮ Ξ factors in texture activity

◮ + Accurate representation of HVS. ◮ + DWT Based

slide-30
SLIDE 30

Perceptual Shaping and Data Hiding

Perceptual Shaping: Lewis-Barni

◮ Lewis-Barni mask on DWT coefficients

l (i, j)

= Θ(l, θ)∆(l, i, j)Ξ(l, i, j)0.2

◮ Θ depends on resolution level and orientation ◮ ∆ measures local brightness ◮ Ξ factors in texture activity

◮ + Accurate representation of HVS. ◮ + DWT Based ◮ - High Complexity.

slide-31
SLIDE 31

Perceptual Shaping and Data Hiding

Perceptual Shaping: Solanki

◮ Solanki mask on DCT coefficients of 8 by 8 blocks

Eblock =

7

  • i,j=0

||C(i, j)||2 − ||C(0, 0)||2

slide-32
SLIDE 32

Perceptual Shaping and Data Hiding

Perceptual Shaping: Solanki

◮ Solanki mask on DCT coefficients of 8 by 8 blocks

Eblock =

7

  • i,j=0

||C(i, j)||2 − ||C(0, 0)||2

◮ + Low Complexity

slide-33
SLIDE 33

Perceptual Shaping and Data Hiding

Perceptual Shaping: Solanki

◮ Solanki mask on DCT coefficients of 8 by 8 blocks

Eblock =

7

  • i,j=0

||C(i, j)||2 − ||C(0, 0)||2

◮ + Low Complexity ◮ - DCT based

slide-34
SLIDE 34

Perceptual Shaping and Data Hiding

Perceptual Shaping: Solanki

◮ Solanki mask on DCT coefficients of 8 by 8 blocks

Eblock =

7

  • i,j=0

||C(i, j)||2 − ||C(0, 0)||2

◮ + Low Complexity ◮ - DCT based ◮ - Block based

slide-35
SLIDE 35

Perceptual Shaping and Data Hiding

Perceptual Shaping: Tree Based

◮ Tree based mask on DWT coefficients

Etree(l, θ, i, j) =

l−1

  • k=1+a

2l−k−1

  • x,y=0

||I θ

k (i + x, j + y)||2 ,

(1)

slide-36
SLIDE 36

Perceptual Shaping and Data Hiding

Perceptual Shaping: Tree Based

◮ Tree based mask on DWT coefficients

Etree(l, θ, i, j) =

l−1

  • k=1+a

2l−k−1

  • x,y=0

||I θ

k (i + x, j + y)||2 ,

(1)

◮ + Low Complexity

slide-37
SLIDE 37

Perceptual Shaping and Data Hiding

Perceptual Shaping: Tree Based

◮ Tree based mask on DWT coefficients

Etree(l, θ, i, j) =

l−1

  • k=1+a

2l−k−1

  • x,y=0

||I θ

k (i + x, j + y)||2 ,

(1)

◮ + Low Complexity ◮ + DWT based

slide-38
SLIDE 38

Perceptual Shaping and Data Hiding

Perceptual Shaping: Tree Based

◮ Tree based mask on DWT coefficients

Etree(l, θ, i, j) =

l−1

  • k=1+a

2l−k−1

  • x,y=0

||I θ

k (i + x, j + y)||2 ,

(1)

◮ + Low Complexity ◮ + DWT based ◮ + Good visual performance

slide-39
SLIDE 39

Perceptual Shaping and Data Hiding

Perceptual Shaping: the masks (a) Lewis-Barni (b) Solanki (c) Tree Based

slide-40
SLIDE 40

Perceptual Shaping and Data Hiding

Insertion, Deletion and Substitution Codes (IDS)

◮ Synchronization issues modeled by IDS channel

slide-41
SLIDE 41

Perceptual Shaping and Data Hiding

Insertion, Deletion and Substitution Codes (IDS)

◮ Synchronization issues modeled by IDS channel ◮ Conventional ECC expect a substitution-only channel

slide-42
SLIDE 42

Perceptual Shaping and Data Hiding

Insertion, Deletion and Substitution Codes (IDS)

◮ Synchronization issues modeled by IDS channel ◮ Conventional ECC expect a substitution-only channel ◮ We use an improved Davey-MacKay construction:

slide-43
SLIDE 43

Perceptual Shaping and Data Hiding

Insertion, Deletion and Substitution Codes (IDS)

◮ Synchronization issues modeled by IDS channel ◮ Conventional ECC expect a substitution-only channel ◮ We use an improved Davey-MacKay construction:

◮ outer non-binary error-correcting code

slide-44
SLIDE 44

Perceptual Shaping and Data Hiding

Insertion, Deletion and Substitution Codes (IDS)

◮ Synchronization issues modeled by IDS channel ◮ Conventional ECC expect a substitution-only channel ◮ We use an improved Davey-MacKay construction:

◮ outer non-binary error-correcting code ◮ sparse code

slide-45
SLIDE 45

Perceptual Shaping and Data Hiding

Insertion, Deletion and Substitution Codes (IDS)

◮ Synchronization issues modeled by IDS channel ◮ Conventional ECC expect a substitution-only channel ◮ We use an improved Davey-MacKay construction:

◮ outer non-binary error-correcting code ◮ sparse code ◮ pseudo-random binary marker sequence

slide-46
SLIDE 46

Overview

  • f the complete system

◮ Payload: 300 bits ◮ Modified coefficients: 3000 (rate 1/10 IDS code)

slide-47
SLIDE 47

Results

IDS performance

◮ High error rate, especially for Tree-based ◮ Still within capabilities of ECC

slide-48
SLIDE 48

Results

Decoding performance

◮ Robustness as good as Lewis-Barni, at reduced complexity ◮ Poor robustness of Solanki – domain mismatch

slide-49
SLIDE 49

Results

Other attacks

◮ We have seen effect of JPEG 2000 compression

slide-50
SLIDE 50

Results

Other attacks

◮ We have seen effect of JPEG 2000 compression ◮ Effect of other attacks is similar:

slide-51
SLIDE 51

Results

Other attacks

◮ We have seen effect of JPEG 2000 compression ◮ Effect of other attacks is similar:

◮ JPEG compression

slide-52
SLIDE 52

Results

Other attacks

◮ We have seen effect of JPEG 2000 compression ◮ Effect of other attacks is similar:

◮ JPEG compression ◮ AWGN noise addition

slide-53
SLIDE 53

Results

Visual Performance

PSNR SSIM Lewis-Barni 59 dB 1.0000 Solanki 55 dB 0.9996 Tree Based 59 dB 1.0000

(d) Lewis Barni (e) Solanki (f) Tree Based

slide-54
SLIDE 54

Conclusion

◮ Data hiding and IDS codes to solve synchronization issues

slide-55
SLIDE 55

Conclusion

◮ Data hiding and IDS codes to solve synchronization issues ◮ Novel perceptual mask

slide-56
SLIDE 56

Conclusion

◮ Data hiding and IDS codes to solve synchronization issues ◮ Novel perceptual mask

◮ Low complexity

slide-57
SLIDE 57

Conclusion

◮ Data hiding and IDS codes to solve synchronization issues ◮ Novel perceptual mask

◮ Low complexity ◮ Good visual performance

slide-58
SLIDE 58

Conclusion

◮ Data hiding and IDS codes to solve synchronization issues ◮ Novel perceptual mask

◮ Low complexity ◮ Good visual performance

◮ Readily applicable for forensic applications

slide-59
SLIDE 59

Appendix: Bibliography (1/2)

  • 1. Chen, B. and Wornell, G., “Quantization Index Modulation: A

class of provably good methods for digital watermarking and information embedding”, IEEE Trans. Inf. Theory 47(4), 1423–1443 (2001).

  • 2. Moulin, P. and Koetter, R., “Data-Hiding Codes”, Proc. of

IEEE 93, 2083–2126 (2005).

  • 3. Solanki et al., “Robust image-adaptive data hiding using

erasure and error correction”, IEEE Trans. Im. Proc. 13(12), 1627–1639 (2004).

  • 4. Barni et al., “Improved Wavelet-based watermarking through

pixel-wise masking”, IEEE Trans. Im. Proc. 10(5), 783–791 (2001).

slide-60
SLIDE 60

Appendix: Bibliography (2/2)

  • 5. Lewis, A. and Knowles, G., “Image compression using the 2-d

wavelet transform”, IEEE Trans. Im. Proc. 1(2), 224–250 (1992).

  • 6. Davey, M.C. and MacKay, D.J.C., “Reliable communication
  • ver channels with insertions, deletions and substitutions”,

IEEE Trans. Inf. Th. 47(2), 687–698 (2001).