Spread Spectrum Watermarking. Information Technologies for IPR Protection

Similar documents
Information Theoretical Analysis of Digital Watermarking. Multimedia Security

University of Siena. Multimedia Security. Watermark extraction. Mauro Barni University of Siena. M. Barni, University of Siena

Wavelet Packet Based Digital Image Watermarking

Digital Image Watermarking Algorithm Based on Wavelet Packet

Research Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack

Abstract The aim of this paper is to improve the performance of spatial domain watermarking. To this end, a new perceptual mask

Witsenhausen s counterexample and its links with multimedia security problems

Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding

Double Sided Watermark Embedding and Detection with Perceptual Analysis

ROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION

Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG

CS6956: Wireless and Mobile Networks Lecture Notes: 2/4/2015

Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels

Research Article A New QIM-Based Watermarking Method Robust to Gain Attack

A Hypothesis Testing Approach for Achieving Semi-fragility in Multimedia Authentication

Overview. Analog capturing device (camera, microphone) PCM encoded or raw signal ( wav, bmp, ) A/D CONVERTER. Compressed bit stream (mp3, jpg, )

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking

Frequency Domain Speech Analysis

Watermark Detection after Quantization Attacks

Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography

3.8 Combining Spatial Enhancement Methods 137

Dirty Paper Writing and Watermarking Applications

Rotation, scale and translation invariant digital image watermarking. O'RUANAIDH, Joséph John, PUN, Thierry. Abstract

1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai.

This is a repository copy of The effect of quality scalable image compression on robust watermarking.

SCALE INVARIANT AND ROTATION INVARIANT IMAGE WATERMARKING. Spandana Bodapati. Bachelor of Science. Jawaharlal Nehru Technological University

TCQ PRACTICAL EVALUATION IN THE HYPER-CUBE WATERMARKING FRAMEWORK. 161, rue Ada, Montpellier cedex 05, France contact:

Nature Methods: doi: /nmeth Supplementary Figure 1. Fragment indexing allows efficient spectra similarity comparisons.

RFI Mitigation for the Parkes Galactic All-Sky Survey (GASS)

Perceptual Feedback in Multigrid Motion Estimation Using an Improved DCT Quantization

A Vision-Based Masking Model for Spread-Spectrum Image Watermarking

Intensity Transformations and Spatial Filtering: WHICH ONE LOOKS BETTER? Intensity Transformations and Spatial Filtering: WHICH ONE LOOKS BETTER?

Ranging detection algorithm for indoor UWB channels

Image Compression. Fundamentals: Coding redundancy. The gray level histogram of an image can reveal a great deal of information about the image

Compression and Coding

Novelty detection. Juan Pablo Bello EL9173 Selected Topics in Signal Processing: Audio Content Analysis NYU Poly

1782 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 18, NO. 8, AUGUST 2009

A NO-REFERENCE SHARPNESS METRIC SENSITIVE TO BLUR AND NOISE. Xiang Zhu and Peyman Milanfar

X 1 Q 3 Q 2 Y 1. quantizers. watermark decoder N S N

Use of Agilent Feature Extraction Software (v8.1) QC Report to Evaluate Microarray Performance

Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability

NAS Report MTI FROM SAR. Prof. Chris Oliver, CBE NASoftware Ltd. 19th January 2007

SIGNAL COMPRESSION. 8. Lossy image compression: Principle of embedding

However, reliability analysis is not limited to calculation of the probability of failure.

Quantization Based Watermarking Methods Against Valumetric Distortions

Transform Coding. Transform Coding Principle

Burst Markers in EPoC Syed Rahman, Huawei Nicola Varanese, Qualcomm

Novelty detection. Juan Pablo Bello MPATE-GE 2623 Music Information Retrieval New York University

Digital Watermark Detection in Visual Multimedia Content

The peculiarities of the model: - it is allowed to use by attacker only noisy version of SG C w (n), - CO can be known exactly for attacker.

Quantization Index Modulation using the E 8 lattice

NOISE can sometimes improve nonlinear signal processing

Practical Watermarking scheme based on Wide Spread Spectrum and Game Theory

GAUSSIANIZATION METHOD FOR IDENTIFICATION OF MEMORYLESS NONLINEAR AUDIO SYSTEMS

Watermarking in the Space/Spatial-Frequency Domain Using Two-Dimensional Radon Wigner Distribution

Improving Resolution with Spectral Balancing- A Case study

Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix

2. Definition & Classification

An Information-Theoretic Analysis of Dirty Paper Coding for Informed Audio Watermarking

Lecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments

Adaptive Audio Watermarking via the Optimization. Point of View on the Wavelet-Based Entropy

AB SCIEX SelexION Technology Used to Improve Mass Spectral Library Searching Scores by Removal of Isobaric Interferences

Last updated: Copyright

Lecture 2: Introduction to Audio, Video & Image Coding Techniques (I) -- Fundaments. Tutorial 1. Acknowledgement and References for lectures 1 to 5

Automatic Speech Recognition (CS753)

Secure Multiuser MISO Communication Systems with Quantized Feedback

Research Article Reverse-Engineering a Watermark Detector Using an Oracle

Natural Image Statistics and Neural Representations

ML Detection of Steganography

Lecture 5. Ideal and Almost-Ideal SG.

New polynomials for strong algebraic manipulation detection codes 1

Performance analysis and improvement of dither modulation under the composite attacks

Speech Signal Representations

Hiding Data in a QImage File

Feasibility study: Use of Sigma 0 and radar images to extract and classify roads in Central Africa. Progress Reports

Part II. Probability, Design and Management in NDE

Linear and Nonlinear Oblivious Data Hiding

Research Article NSCT Domain Additive Watermark Detection Using RAO Hypothesis Test and Cauchy Distribution

APPLICATIONS. Quantum Communications

Detection theory. H 0 : x[n] = w[n]

This file is part of the following reference: Access to this file is available from:

A. Dong, N. Garcia, A.M. Haimovich

Image Data Compression. Steganography and steganalysis Alexey Pak, PhD, Lehrstuhl für Interak;ve Echtzeitsysteme, Fakultät für Informa;k, KIT

Capacity of Full Frame DCT Image Watermarks

Lecture 27 Frequency Response 2

Distributed Detection of Information Flows

Simplified Approaches to Impurity Identification using Accurate Mass UPLC/MS

Content-based document signature: ongoing work

Detection of Cosmic-Ray Hits for Single Spectroscopic CCD Images

Product Obsolete/Under Obsolescence. Quantization. Author: Latha Pillai

Agilent MassHunter Profinder: Solving the Challenge of Isotopologue Extraction for Qualitative Flux Analysis

New Traceability Codes against a Generalized Collusion Attack for Digital Fingerprinting

at Some sort of quantization is necessary to represent continuous signals in digital form

The Duality Between Information Embedding and Source Coding With Side Information and Some Applications

"Robust Automatic Speech Recognition through on-line Semi Blind Source Extraction"

Cochlear modeling and its role in human speech recognition

New Steganographic scheme based of Reed- Solomon codes

The verification of the MASS spectral response

INTRODUCTION TO DELTA-SIGMA ADCS

Transcription:

Spread Spectrum Watermarking Information Technologies for IPR Protection

Spread Spectrum Communication A Narrow-band signal is transmitted over a much larger bandwidth such that the signal energy presented in any signal frequency is undetectable. 2

Watermarking (1/3) A watermark is spread over many frequency bins so that the energy in one bin is very small and certainly undetectable. 3

Watermarking (2/3) Because the watermark verification process knows the location and content of the watermark, it is possible to concentrate these weak signals into a single output with high SNR. 4

Watermarking (3/3) Remark: To destroy such a watermark would require noise of high amplitude to be added to all frequency bins. 5

Why it is secure? The location of the watermark is not obvious Frequency regions should be selected that ensures degradation of the original data following any attack on the watermark 6

Why/How it is imperceptible? (1/2) The energy in the watermark is sufficiently small in any single frequency coefficient It is possible to increase the energy present in particular frequencies by exploiting knowledge of masking phenomena in human auditory and visual systems 7

Why/How it is imperceptible? (2/2) Upon applying a frequency transformation (FFT/DCT) to the data, a perceptual mask is computed that highlights perceptual significant regions in the spectrum that can support the watermark without affecting perceptual fidelity. 8

Why it is robust? (1/2) To be confident of eliminating a watermark, an attack must attack all possible frequency bins with modifications of certain strength create visible defects in the data 9

Why it is robust? (2/2) Unintentional signal distortions due to compression or image manipulation, must leave the perceptually significant spectra components intact, otherwise the resulting image will be severely degraded. 10

Spread Spectrum Watermarking (1/2) In order to place a length n watermark into an N N image, the N N DCT of the image is computed and watermark is placed into the n highest magnitude coefficients (which are data dependent) of the transformed image, excluding the DC component (not necessary). 11

Spread Spectrum Watermarking (2/2) A watermark consists of a sequence of real numbers X = x 1,, x n, where each value x i is chosen independently according to N(0,1) : normal distribution assumption 12

Watermark Insertion (1/2) When we insert X into V to obtain V we specify a scaling parameter α, which determines the extent to which X alters V. 13

Watermark Insertion (2/2) (1) v i = v i + α x i (2) v i = v i (1 +α x i ) = v i +α x i v i (3) v i = v i ( e α x i ) or log v i = log v i + α x i (1) may not be appropriate when the values of v i varying widely!! Insertion based on (2) or (3) are more robust against different in scales. 14

Determination of α (1/5) A single α may not be applicable for perturbing all of the values v i, since different spectral components may exhibit more or less tolerance to modification 15

Determination of α (2/5) v i = v i (1 +α i x i ) Where α i can be viewed as a relative measure of how much one must alter v i to alter the perceptual quality of the host. 16

Determination of α (3/5) A large α i means that one can perceptually get away with altering v i by a large factor without degrading the host. (2) can be viewed as a special case of the generalized (1) ( v i = v i (1 +α i x i ) ), for α i = α v i 17

Determination of α (4/5) A large value is less sensitive to additive alternations than a small value 18

Determination of α (5/5) Question How sensitive a image to various additive alternations is highly related to Human perceptual systems. Subjective distance measurement : JND Objective distance measurement mean α j ~ median v j * - v j max 19

Choice of n (1/2) The choice of n indicated the degree to which the watermark is spread out among the relevant components of the image. In general, as the number of altered components are increased the extent to which they must be altered decreases - the ability to against attacks 20

Choice of n (2/2) Information theoretic assessment Channel Capacity Rate-Distortion Theory 21

Evaluating the Similarity : Detection scheme X* : the extracted mark Sim ( X, X* ) = ( X* X ) / sqrt ( X* X* ) X and X* match, if Sim ( X, X* ) > T Minimize the rate of False Negatives (missed detections) False Positive (false alarms) 22

Other Issues Is there any post processing that can improve the watermark detection performance? Statistical approach Optimization approach: NN, GA With the aid of the knowledge of the host : Communication with side information Game Theory 23

Attacks (1/2) Collision attack Image Scaling JPEG Compression Dithering Distortion Cropping attack Print, Xerox, and Scan 24

Attacks (2/2) Attack by Watermarking Watermarked Image - multiple watermarking Sometimes, this is a must Sometimes, this produces Watermark Dilemma 25