towards copy evident jpeg images
play

Towards copy-evident JPEG images Andrew B. Lewis and Markus G. Kuhn - PowerPoint PPT Presentation

Towards copy-evident JPEG images Andrew B. Lewis and Markus G. Kuhn Computer Laboratory Informatik 2009: Workshop Digitale Multimedia-Forensik Techniken und Anwendungsgebiete Physical document security Documents of value (currency,


  1. Towards copy-evident JPEG images Andrew B. Lewis and Markus G. Kuhn Computer Laboratory Informatik 2009: Workshop Digitale Multimedia-Forensik – Techniken und Anwendungsgebiete

  2. Physical document security ◮ Documents of value (currency, etc.) may use anti-counterfeiting security features ◮ Expensive to produce an identical copy ◮ Use special materials (e.g. metallic strips), intaglio printing, offset printing, chemicals, holograms, kinegrams, . . . ◮ Na¨ ıve duplication may reveal a hidden message, or simply cause visible artifacts to appear which de-value the document

  3. Security printing (1) ◮ Most counterfeiters try to use consumer equipment: digital scanning and printing ◮ Hidden information is modulated onto a printable carrier, consisting of screen elements (dots, lines, . . . ). original note Examples: ◮ Screen angle modulation ◮ Line frequency trap ◮ Frequency modulation of minimal dots ◮ Defeats anti-aliasing filter scan-trap countermeasure digital scan

  4. Security printing (2) ◮ Concentric screens (moir´ e), dot shape modulation, . . . 1 ◮ When the spatial frequency of carrier patterns is sufficiently high, the naked eye cannot resolve the carrier screen and a uniform field is observed. original document photocopy 1 Rudolf L. van Renesse Hidden and scrambled images – a review in Proceedings of SPIE , volume 6477, page 333, 2002.

  5. Copy evidence in digital media ◮ Are similar techniques possible with digital formats? ◮ Can we add imperceptible patterns to an original image, video or audio signal that are perceptible after copying? ◮ Copying means standard lossy signal processing, such as recompression and resampling. Applications: ◮ Protect valuable content which might be distributed to content sharing website ◮ Visible warning when quality has been degraded by a hidden processing step

  6. Possible techniques ◮ Regions of a single high spatial frequency are perceived as uniform ◮ Low frequency differences are more noticeable than high frequency differences ◮ Artifacts of lossy processing that could be exploited to uncover a message: ◮ Non-linearities: gamma correction, quantization, clipping ◮ Artifacts: aliasing, blocking

  7. Possible techniques ◮ Regions of a single high spatial frequency are perceived as uniform ◮ Low frequency differences are more noticeable than high frequency differences ◮ Artifacts of lossy processing that could be exploited to uncover a message: ◮ Non-linearities: gamma correction, quantization , clipping ◮ Artifacts: aliasing, blocking

  8. Approach Difficult problem: compression algorithms try to minimize perceptible distortion ◮ Know the compressor, so can select worst case ◮ Write bitstream directly to give precise control over values ◮ Targeted or untargeted: known recompression parameters? ◮ This paper: initial exploration ◮ JPEG recompression ◮ Known quantization matrix ◮ Uniform image region

  9. Outline of the JPEG algorithm Y DCT Q Encode Colour C b Image space ↓ 2 × 2 DCT Q Encode convert ↓ 2 × 2 DCT Q Encode C r

  10. Outline of the JPEG algorithm Y DCT Q Encode Colour C b Image space ↓ 2 × 2 DCT Q Encode convert ↓ 2 × 2 DCT Q Encode C r

  11. Discrete cosine transform DCT decomposes 8 × 8 block of samples s i , j into weighted sum: s = S 0 , 0 · + S 0 , 1 · + S 0 , 2 · + S 0 , 3 · + · · · + S 0 , 7 · + S 1 , 0 · + S 1 , 1 · + S 1 , 2 · + S 1 , 3 · + · · · + S 1 , 7 · + S 2 , 0 · + S 2 , 1 · + S 2 , 2 · + S 2 , 3 · + · · · + S 2 , 7 · + S 3 , 0 · + S 3 , 1 · + S 3 , 2 · + S 3 , 3 · + · · · + S 3 , 7 · + . . . S 7 , 0 · + S 7 , 1 · + S 7 , 2 · + S 7 , 3 · + · · · + S 7 , 7 · Weights S i , j are DCT coefficients.

  12. Discrete cosine transform DCT decomposes 8 × 8 block of samples s i , j into weighted sum: = 0 · + 0 · + 0 · + 0 · + · · · + 0 · + 0 · + 30 · + 0 · + 36 · + · · · + 154 · + 0 · + 0 · + 0 · + 0 · + · · · + 0 · + 0 · + 36 · + 0 · + 42 · + · · · + 181 · + . . . 0 · + 154 · + 0 · + 181 · + · · · + 775 · Weights S i , j are DCT coefficients.

  13. Discrete cosine transform DCT decomposes 8 × 8 block of samples s i , j into weighted sum: = 30 · + 36 · + · · · + 154 · + 36 · + 42 · + · · · + 181 · + . . . 154 · + 181 · + · · · + 775 · Weights S i , j are DCT coefficients.

  14. Quantization quantization with q 0 10 · q 0 (a) ◮ Quantization: (b) � | X i , j | + ⌊ Q i , j / 2 ⌋ � ˆ X i , j = sgn ( X i , j ) · 5 · q 0 Q i , j ◮ Dequantization i , j = Q i , j · ˆ X ′ X i , j 0 255 (a) (b) 0

  15. Requantization quantization with q 0 requantization with q 1 10 · q 0 2 · q 1 (a) (b) q 1 5 · q 0 0 0 255 (a) (b) 0

  16. Clipping after requantization (a) (b) 255 255 192 192 128 01234567 128 01234567 64 64 0 0 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 n n k k

  17. Marking algorithm ◮ Each bi-level message pixel maps to one 8 × 8 DCT block ◮ Add checkerboard pattern to block ◮ Amplitude of pattern chosen so that: ◮ Foreground message blocks use closest higher amplitude above some quantization decision boundary ◮ Background message blocks use closest lower amplitude below some quantization decision boundary ◮ Clipping occurs after IDCT in recompressed image foreground blocks ◮ In the recompressed image, foreground message blocks appear darker than background message blocks ◮ In the marked image, foreground and background blocks appear the same

  18. Example The message to be embedded: A uniform grey image is replaced with a checkerboard pattern with the same perceived brightness: The result of recompression with a particular lower quality factor:

  19. Summary ◮ We have demonstrated a copy-evident multimedia file, in which a human-readable message becomes visible after recompressing the original image. ◮ Our algorithm is applicable to uniform regions in images which will be recompressed with specific quantization settings. Further work: ◮ Extend the marking process to handle arbitrary photographs ◮ Untargeted mark for JPEG images, not tied to particular recompression quantization matrix ◮ Audio and video signals

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend