Towards copy-evident JPEG images Andrew B. Lewis and Markus G. Kuhn - - PowerPoint PPT Presentation

towards copy evident jpeg images
SMART_READER_LITE
LIVE PREVIEW

Towards copy-evident JPEG images Andrew B. Lewis and Markus G. Kuhn - - PowerPoint PPT Presentation

Towards copy-evident JPEG images Andrew B. Lewis and Markus G. Kuhn Computer Laboratory Informatik 2009: Workshop Digitale Multimedia-Forensik Techniken und Anwendungsgebiete Physical document security Documents of value (currency,


slide-1
SLIDE 1

Towards copy-evident JPEG images

Andrew B. Lewis and Markus G. Kuhn Computer Laboratory Informatik 2009: Workshop Digitale Multimedia-Forensik – Techniken und Anwendungsgebiete

slide-2
SLIDE 2

Physical document security

◮ Documents of value (currency, etc.) may use

anti-counterfeiting security features

◮ Expensive to produce an identical copy ◮ Use special materials (e.g. metallic strips), intaglio printing,

  • ffset printing, chemicals, holograms, kinegrams, . . .

◮ Na¨

ıve duplication may reveal a hidden message, or simply cause visible artifacts to appear which de-value the document

slide-3
SLIDE 3

Security printing (1)

◮ Most counterfeiters try to use consumer

equipment: digital scanning and printing

◮ Hidden information is modulated onto a

printable carrier, consisting of screen elements (dots, lines, . . . ). Examples:

◮ Screen angle modulation ◮ Line frequency trap ◮ Frequency modulation of minimal dots

◮ Defeats anti-aliasing filter scan-trap

countermeasure

  • riginal note

digital scan

slide-4
SLIDE 4

Security printing (2)

◮ Concentric screens (moir´

e), dot shape modulation, . . . 1

◮ When the spatial frequency of carrier patterns is sufficiently

high, the naked eye cannot resolve the carrier screen and a uniform field is observed.

  • riginal document

photocopy

1Rudolf L. van Renesse Hidden and scrambled images – a review in

Proceedings of SPIE, volume 6477, page 333, 2002.

slide-5
SLIDE 5

Copy evidence in digital media

◮ Are similar techniques possible with digital formats? ◮ Can we add imperceptible patterns to an original image, video

  • r audio signal that are perceptible after copying?

◮ Copying means standard lossy signal processing, such as

recompression and resampling. Applications:

◮ Protect valuable content which might be distributed to

content sharing website

◮ Visible warning when quality has been degraded by a hidden

processing step

slide-6
SLIDE 6

Possible techniques

◮ Regions of a single high spatial frequency are

perceived as uniform

◮ Low frequency differences are more noticeable

than high frequency differences

◮ Artifacts of lossy processing that could be

exploited to uncover a message:

◮ Non-linearities:

gamma correction, quantization, clipping

◮ Artifacts:

aliasing, blocking

slide-7
SLIDE 7

Possible techniques

◮ Regions of a single high spatial frequency are

perceived as uniform

◮ Low frequency differences are more noticeable

than high frequency differences

◮ Artifacts of lossy processing that could be

exploited to uncover a message:

◮ Non-linearities:

gamma correction, quantization , clipping

◮ Artifacts:

aliasing, blocking

slide-8
SLIDE 8

Approach

Difficult problem: compression algorithms try to minimize perceptible distortion

◮ Know the compressor, so can select worst case ◮ Write bitstream directly to give precise control over values ◮ Targeted or untargeted: known recompression parameters? ◮ This paper: initial exploration

◮ JPEG recompression ◮ Known quantization matrix ◮ Uniform image region

slide-9
SLIDE 9

Outline of the JPEG algorithm

DCT Q Encode Image Colour space convert

↓ 2×2

DCT Q Encode

↓ 2×2

DCT Q Encode

Y Cb Cr

slide-10
SLIDE 10

Outline of the JPEG algorithm

DCT Q Encode Image Colour space convert

↓ 2×2

DCT Q Encode

↓ 2×2

DCT Q Encode

Y Cb Cr

slide-11
SLIDE 11

Discrete cosine transform

DCT decomposes 8 × 8 block of samples si,j into weighted sum: s = S0,0 · + S0,1 · + S0,2 · + S0,3 · + · · · + S0,7 · + S1,0 · + S1,1 · + S1,2 · + S1,3 · + · · · + S1,7 · + S2,0 · + S2,1 · + S2,2 · + S2,3 · + · · · + S2,7 · + S3,0 · + S3,1 · + S3,2 · + S3,3 · + · · · + S3,7 · + . . . S7,0 · + S7,1 · + S7,2 · + S7,3 · + · · · + S7,7 · Weights Si,j are DCT coefficients.

slide-12
SLIDE 12

Discrete cosine transform

DCT decomposes 8 × 8 block of samples si,j into weighted sum: = 0 · + 0 · + 0 · + 0 · + · · · + 0 · + 0 · + 30 · + 0 · + 36 · + · · · + 154 · + 0 · + 0 · + 0 · + 0 · + · · · + 0 · + 0 · + 36 · + 0 · + 42 · + · · · + 181 · + . . . 0 · + 154 · + 0 · + 181 · + · · · + 775 · Weights Si,j are DCT coefficients.

slide-13
SLIDE 13

Discrete cosine transform

DCT decomposes 8 × 8 block of samples si,j into weighted sum: = 30 · + 36 · + · · · + 154 · + 36 · + 42 · + · · · + 181 · + . . . 154 · + 181 · + · · · + 775 · Weights Si,j are DCT coefficients.

slide-14
SLIDE 14

Quantization

◮ Quantization:

ˆ Xi,j = sgn (Xi,j)· |Xi,j| + ⌊Qi,j/2⌋ Qi,j

  • ◮ Dequantization

X ′

i,j = Qi,j · ˆ

Xi,j 5 · q0 10 · q0 quantization with q0 (a) (b) 255 (a) (b)

slide-15
SLIDE 15

Requantization

5 · q0 10 · q0 quantization with q0 q1 2 · q1 requantization with q1 (a) (b) 255 (a) (b)

slide-16
SLIDE 16

Clipping after requantization

0 1 2 3 4 5 6 7 k 01234567 n

64 128 192 255

(a) 0 1 2 3 4 5 6 7 k 01234567 n

64 128 192 255

(b)

slide-17
SLIDE 17

Marking algorithm

◮ Each bi-level message pixel maps to one 8 × 8 DCT block ◮ Add checkerboard pattern to block ◮ Amplitude of pattern chosen so that:

◮ Foreground message blocks use closest higher amplitude above

some quantization decision boundary

◮ Background message blocks use closest lower amplitude below

some quantization decision boundary

◮ Clipping occurs after IDCT in recompressed image foreground

blocks

◮ In the recompressed image, foreground message blocks appear

darker than background message blocks

◮ In the marked image, foreground and background blocks

appear the same

slide-18
SLIDE 18

Example

The message to be embedded: A uniform grey image is replaced with a checkerboard pattern with the same perceived brightness: The result of recompression with a particular lower quality factor:

slide-19
SLIDE 19

Summary

◮ We have demonstrated a copy-evident multimedia file, in

which a human-readable message becomes visible after recompressing the original image.

◮ Our algorithm is applicable to uniform regions in images

which will be recompressed with specific quantization settings. Further work:

◮ Extend the marking process to handle arbitrary photographs ◮ Untargeted mark for JPEG images, not tied to particular

recompression quantization matrix

◮ Audio and video signals