Professional Documents
Culture Documents
2002/10/24
Room 418, NTU Library Building
Data hiding
Steganography Watermarking
Encryption ? Decryption
Under Protection
Definitions about digital watermarking
Digital watermarking:
– The practice of imperceptually alternating a
Work to embed a message about the Work.
– Related terms
Work: a specific copy of some electronic signal,
such as a song, a video sequence, or a picture
Cover Work: the original un-watermarked work,
since it covers (hides) the watermark
Watermark: the messages being embedded,
indicating some information about the work
A digital watermarking system
Cover Work
Watermark
Message Recording, transmissions,
or processing
History of digital watermarking
The first watermarking example similar to the
digital methods nowadays appeared in 1954.
The Muzak Corporation filed a patent for
“watermarking” musical Work. An
identification Work was inserted in music by
intermittently applying a narrow notch filter
centered at 1KHz.
About 1995, interest in digital watermarking
began to mushroom.
The watermarking fever
Owner identification
Proof of ownership
Broadcast monitoring
Transaction tracking
Content authentication
Copy control
Device control
Owner identification (I)
Under the U.S. law, although the copyright notice is
not required in every distributed copy to protect the
rights of copyright holders, the award to the copyright
holders whose work is misused will be significantly
limited without a copyright notice found on the
distributed materials.
Traditional textual copyright notices
– “Copyright date owner”
– “© date owner”
– “Copr. date owner”
Owner identification (II)
Disadvantages for textual copyright notices
– Easily removed from a document when it is copied
E.g. the Lena Sjooblom picture (see the next slide)
Compliant recorder
Non-Compliant player
Illegal, decrypted copy
Device control
Copy control belongs to a broader
category - device control
Other applications of device control
– Automatically turning on/off functions
related to special contents
E.g Including watermark to skip advertisements
– Action toys interactive with the TV program
– Digimarc’s MediaBridge
Properties of digital watermarking
Correct detection result
– Embedding effectiveness
– False-alarm rate
Fidelity (perceptual similarity)
Resisting distortions
– Robustness
– Security
Data payload (capacity)
Blind/informed watermarking
Cost
Effectiveness
Effectiveness of a watermarking system
– The probability of detection after embedding
– A 100% effectiveness is desirable, but it is
often not the case due to other conflict
requirements, such as perceptual similarity
E.g. watermarking system for a stock photo
house
False-alarm rate
Detection of watermark in a work that do not
actually contain one
– The number of false positives occur in a given
number of runs of watermark detector
The false alarm rate of the watermarking
system used in DVD recorder should be lower
than 1/1012
– E.g. a false alarm occurred in a world-series
baseball game
Fidelity (perceptual similarity)
The fidelity of the watermarking system
– The perceptual similarity between the
original and the watermarked version of the
cover work
– It is the similarity at the point at which the
watermarked content is provided to the
customer that counts
E.g. NTSC video or AM radio has different
perceptual similarity requirements from the
HDTV or DVD video and audio
Problems to determine the fidelity
Commonly Nused image similarity index
1
– MSE:
N
(
i 1
c[i ] c ' [i ]) 2
– SNR: (
i 1
c[i ] c ' [i ]) 2
c[i ] i 1
2
– Embedder/detector constraint
Copy protection v.s. transaction tracking (DIV-X)
Watermarking techniques in current standards
Text watermarking
Audio watermarking
Image watermarking
– LSB based scheme
– Spread spectrum scheme
– DCT-based scheme
Video watermarking
3D-mesh watermarking
Watermarking for text
Line-Shift Coding
Word-Shift Coding
Feature coding
Watermarking for images & videos
spatial domain
Watermarking in
transform domain
raw data
Watermarking in
compressed data
random number
Watermarking with
visually recognizable pattern
An generic image watermarking
system
Distortions
•Image processing
Embedding •Compression
•…...
Watermark Comparison
Requirements
– Invisibility
Watermark Extraction
– Robustness
– No ambiguity
LSB Flipping Method
0 1 2 3 4 5 0 1 2 3 4 5
55 73 71 123 123 205
Bit 1 0 71 0
120 123 70 72 147 199
Bit 0 1 121 1
130 123 67 68 73 123
Watermark 1 Bit 1 Bit 2 2 123 68 2
140 133 120 72 70 117
Watermark 2 Bit 3 3 70 3
158 142 123 123 69 71
Bit 0 Bit 2 Bit 3 4 159 122 70 4
195 178 150 112 67 70
5 5
Generate the random walk sequence for each watermark (e.g.. 00112)
Force the LSB to match the watermark bit
FFT/DCT FFT/DCT
Determine Perceptually
Significant Regions -
Watermark Original Extracted
Watermark Watermark
Inverse FFT/DCT
Similar
Watermarked
Image
Spread Spectrum Method (cont.)
Watermark detector
w
PN M(w)
sequence × × +
Extract
Envelop
Watermarking for Audio
(cont.)
Watermark detection
Watermarking for Polygonal
Models
3D models watermarking
– vertex coordinates
– vertex topology (connectivity)
FDCT FDCT
FDCT Pseudo-random
Permutation
Extract the
Permutated
Block-based
Data (XOR)
Mapping
Embedding
(Polarity
Reversing)
Reverse Block-
based
Permutation
IDCT
Permuted
The 14-bit Shift Register that Watermark
permutes 1-16384
Block-based Mapping
Watermark blocks with more signal pixels are
embedded into image blocks with higher
variances
– to achieve better perceptual invisibility.
Polarity Reversing
Polarity: the inequality relationship between DC &
corresponding AC values within each DCT block.
watermark bits: 0 1 0 1 0 0 1
polarity: 1100101
XOR
reversed polarity: 1001100
Embedding Extraction
Embedding(1/2)
Choices of embedding
positions within each block: Embedding 4 watermark pixels
– Low-frequency 0 1 5 6 14 15 27 28
2 4 7 13 16 26 29 42
Bad invisibility 3 8 12 17 25 30 41 43
9 11 18 24 31 40 44 53
– High-frequency 10 19 23 32 39 45 52 54
20 22 33 38 46 51 55 60
Bad robustness 21
35
34
36
37
48
47
49
50
57
56
58
59
62
61
63
=> Middle-frequency
Fix positions in each block
Embedding(2/2)
Polarity:the inequality relations between the scaled
DC value and the selected AC coefficients
AC (i, j ) DC
1, if * Q (i , j ) ScaleFactor * Q(0,0) * Q(0,0)
P(i, j ) Q(i, j )
0, otherwise
Each output
panorama picture
has been embedded Extraction
with an invisible
watermark.
Difficulty in Applying the
Original Algorithms
Original Image Suspected Image
FDCT FDCT
pictures embedded
Data (XOR)
available.
based
Permutation
Reverse Pseudo-
random Extracted
Permutation Watermark
A Blind Version of the
Watermarking Algorithm
Original Image Watermark Image Suspected Image
Readout the
Embedding
Permutated Data
Parameter Adjusting
(XOR)
Embedding
(Watermark
Labeling)
Reverse Pseudo-
random Extracted
IDCT Permutation Watermark
Watermarked Image
Watermark Labeling
Corresponding polarities are set
according to the watermark sequence.
watermark bits: 0 1 0 1 0 0 1
polarity: 1100101
reversed polarity: 0101001 Read Out
Embedding Extraction
Removing Block-Based
Permutation
Removing the block-based permutation
to eliminate the need of original images
– The image quality loss is compensated by
carefully adjusting watermarking
parameters
– The experimental results show that no
perceptible quality loss was found
Experimental Results(1/2)
+
I ' K 1 * I K 2 *W
D ( E I ( I ' ), E I ( I )) Threshold I
D( EW ( I ' ), EW (W )) Threshold W
• For a good visible watermarking scheme, the embedding
parameters are assumed to be unknown.
An visible watermarking system
~ ( n ,m ) Yw Yn ,m 2 / 3
Y n ,m Yn ,m ( ) L *
A 38.667 Yw
Important observations (1/4)
Attacking visible watermarking scheme
means successfully recover the
watermarked area.
Implication:
– Similar image processing techniques can
be adopted
Image recovery
Object removal
Important observations(2/4)
To clearly recognize the copyright
patterns, the contours of embedded
patterns must be preserved.
Implication:
– An attacking scheme is effective if
1. The pattern is completely removed
Mathematical
morphology +