How to Achieve Robustness & Fragility in Watermarking Technology.

17
How to Achieve Robustness & Fragility in Watermarking Technology

Transcript of How to Achieve Robustness & Fragility in Watermarking Technology.

Page 1: How to Achieve Robustness & Fragility in Watermarking Technology.

How to Achieve Robustness & Fragility in Watermarking Technology

Page 2: How to Achieve Robustness & Fragility in Watermarking Technology.

MarkAny Watermarking TechnologyMarkAny Watermarking TechnologyCPTWGCPTWG

Why watermarking ?

Secure Distribution of Digital Contents Unlimited copy of digital contents without

degradation of the original contents Light-Speed Distribution via internet CD quality compression technology

Contents Protection Authentication Encryption/Decryption, Mobile Agents Watermarking

Page 3: How to Achieve Robustness & Fragility in Watermarking Technology.

MarkAny Watermarking TechnologyMarkAny Watermarking TechnologyCPTWGCPTWG

Watermarking technology

Spatial watermarking Easy embedding/detecting algorithm Weak to general attack

Spread spectrum technique Complex embedding/detecting algorithm Robust to spatial and compression attack Weak to geometric attack : log-polar mapping

method FFT, DCT, Wavelet transform…

Page 4: How to Achieve Robustness & Fragility in Watermarking Technology.

MarkAny Watermarking TechnologyMarkAny Watermarking TechnologyCPTWGCPTWG

Robustness: Properties

Imperceptibility Audibility, Visibility

Resistance to Data Manipulations Audio, Image

Trade-off: between Imperceptibility and Resistance

Page 5: How to Achieve Robustness & Fragility in Watermarking Technology.

MarkAny Watermarking TechnologyMarkAny Watermarking TechnologyCPTWGCPTWG

Imperceptibility

Human Perception Model Psycho-Acoustic Model Psycho-Visual Model

Page 6: How to Achieve Robustness & Fragility in Watermarking Technology.

MarkAny Watermarking TechnologyMarkAny Watermarking TechnologyCPTWGCPTWG

Imperceptibility

Bit Error Rate False Positive Rate

Page 7: How to Achieve Robustness & Fragility in Watermarking Technology.

MarkAny Watermarking TechnologyMarkAny Watermarking TechnologyCPTWGCPTWG

Data Manipulations(Image)

Linear filtering Non-linear filtering Lossy Compressions Data Reduction Local and Global affine transforms Transcoding D/A, A/D conversion Multiple Watermarking

Page 8: How to Achieve Robustness & Fragility in Watermarking Technology.

MarkAny Watermarking TechnologyMarkAny Watermarking TechnologyCPTWGCPTWG

Data Manipulations(Audio)

Linear filtering Time-Scaling, Pitch-scaling Non-linear filtering Lossy Compressions Data Reduction Transcoding D/A, A/D conversion Multiple Watermarking

Page 9: How to Achieve Robustness & Fragility in Watermarking Technology.

MarkAny Watermarking TechnologyMarkAny Watermarking TechnologyCPTWGCPTWG

Enhancement of Resistance

Redundancy Spread-spectrum Method (DCT, Mellin-Fourier Transform, DWT)

Split in perceptual bands Phase Spectrum Embedding Magnitude Spectrum Embedding

Page 10: How to Achieve Robustness & Fragility in Watermarking Technology.

MarkAny Watermarking TechnologyMarkAny Watermarking TechnologyCPTWGCPTWG

Fragility

Two type of watermark Robust watermark Fragile watermark

Fragile watermark Detection of modification, compression,

and other attack of original contents Least significant bit change Weak magnitude embedding

Page 11: How to Achieve Robustness & Fragility in Watermarking Technology.

MarkAny Watermarking TechnologyMarkAny Watermarking TechnologyCPTWGCPTWG

MarkAny watermarking

Key embedding - conventional Watermark exist condition check Copy control information embedding Random number sequence watermark

Logo embedding – MarkAny technique Be able to check copyright information of digital

contents Visible authentication by detecting watermark Robust to compression technique

Page 12: How to Achieve Robustness & Fragility in Watermarking Technology.

MarkAny Watermarking TechnologyMarkAny Watermarking TechnologyCPTWGCPTWG

MarkAny watermarking

Embedding

Extracting

Page 13: How to Achieve Robustness & Fragility in Watermarking Technology.

MarkAny Watermarking TechnologyMarkAny Watermarking TechnologyCPTWGCPTWG

MarkAny watermarking

Original Image

Watermark Logo

Watermarked Image

Extracted Watermark Logo

Page 14: How to Achieve Robustness & Fragility in Watermarking Technology.

MarkAny Watermarking TechnologyMarkAny Watermarking TechnologyCPTWGCPTWG

Robustness: MarkAny

Three Versions SDMI: June 23 STEP 2000: Aug. 14 Current Version: Sept. 20 (PD Set)

Audibility Test SDMI vs. STEP2000 Reduce WM Strength by 80%

Page 15: How to Achieve Robustness & Fragility in Watermarking Technology.

MarkAny Watermarking TechnologyMarkAny Watermarking TechnologyCPTWGCPTWG

PD structure of MarkAny

DisplayDisplay

ControlCPU

Board

ControlCPU

Board

TI320VC5410

DSPBoard

TI320VC5410

DSPBoard

I/FL

HPI

Parallel

port

*HPI : Host Port Interface*I/FL : Interface Logic

Sound I/F

Amplifier

DVD or CD

Page 16: How to Achieve Robustness & Fragility in Watermarking Technology.

MarkAny Watermarking TechnologyMarkAny Watermarking TechnologyCPTWGCPTWG

PD GUI for SDMI

Page 17: How to Achieve Robustness & Fragility in Watermarking Technology.

MarkAny Watermarking TechnologyMarkAny Watermarking TechnologyCPTWGCPTWG

Have a Nice Day !

Thank You!!

• Contact Us

Tel No. : +82-2-2262-5222

Fax No. : +82-2-2262-5333

Email : [email protected]

http://www.markany.com

Address

10F., Ssanglim Bldg., 151-11 Ssanglim-dong, Chung-gu, Seoul, Korea, 100-400