Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

22
Introduction to Introduction to Visible Visible Watermarking Watermarking IPR Course: TA Lecture IPR Course: TA Lecture 2002/12/18 2002/12/18 NTU CSIE R105 NTU CSIE R105

Transcript of Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

Page 1: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

Introduction to Introduction to Visible Visible

Watermarking Watermarking IPR Course: TA LectureIPR Course: TA Lecture

2002/12/182002/12/18

NTU CSIE R105NTU CSIE R105

Page 2: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

OutlineOutline

IntroductionIntroduction State-of-the-ArtState-of-the-Art Characteristics of Visible Characteristics of Visible

Watermarking SchemesWatermarking Schemes Attacking Visible Watermarking Attacking Visible Watermarking

SchemesSchemes Discussions and ConclusionsDiscussions and Conclusions

Page 3: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

Classifying Watermarking Classifying Watermarking SchemesSchemes

Data hiding

Fragilewatermarking

Watermarking

Imperceptiblewatermarking

Visiblewatermarking

Robustwatermarking

Visibledata embedding

Steganography

Non-robust data embedding

Robustdata embedding

Imperceptibledata embedding

Page 4: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

Visible WatermarkingVisible Watermarking

+

• IPR protection schemes for images and video that have to be released for certain purposes• Unobtrusive copyright patterns can be recognized on embedded contents

Page 5: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

Invisible Watermarking v.s. Invisible Watermarking v.s. Visible WatermarkingVisible Watermarking

Invisible Watermarking Visible Watermarking

Watermark Perceptibility

Protection

Robustness

Imperceptible distortion

Visibly Meaningful pattern

Intentional attacks and

common signal processing

User-intervention based

watermark removal

Passive Active

Current Research Status

Hot Only few papers

ExtractionExplicit

extraction module

Direct viewing

Page 6: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

Requirements of Requirements of Visible WatermarkingVisible Watermarking

Perceptibility of host image details Perceptibility of host image details Contents should not be rendered useless after Contents should not be rendered useless after

being visibly watermarked being visibly watermarked Visibility of watermark patterns in Visibility of watermark patterns in

embedded contents embedded contents No explicit watermark extraction techniques No explicit watermark extraction techniques

are requiredare required RobustnessRobustness

Difficult to remove unless exhaustive and Difficult to remove unless exhaustive and expensive human interventions are involvedexpensive human interventions are involved

Page 7: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

A General Model of A General Model of Visible WatermarkingVisible Watermarking

I’: the watermarked contentI’: the watermarked content I: the un-watermarked original contentI: the un-watermarked original content W: the watermark pattern W: the watermark pattern KKii: the weighting factor: the weighting factor D: a distance function measuring the perceptual difference of its two paraD: a distance function measuring the perceptual difference of its two para

metersmeters EEii: image feature extraction operators: image feature extraction operators ThresholdThresholdII: the largest allowable distortion of image details that observers : the largest allowable distortion of image details that observers

can tolerate and, at the same time, the signature of can be maintained. can tolerate and, at the same time, the signature of can be maintained. ThresholdThresholdWW: the largest allowable distortion of the embedded watermark p: the largest allowable distortion of the embedded watermark p

attern that the copyright information can be clearly recognized. attern that the copyright information can be clearly recognized.

WKIKI **' 21

III ThresholdIEIED ))(),'((

WWW ThresholdWEIED ))( ),'((

Page 8: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

State-of-the-ArtState-of-the-Art G. Braudaway, K.A. Magerlein, and F. Mintzer, "Protecting Publicly G. Braudaway, K.A. Magerlein, and F. Mintzer, "Protecting Publicly

Available Images with a Visible Image Watermark," Proceedings of Available Images with a Visible Image Watermark," Proceedings of the SPIE International Conference on Electronic Imaging, San Jose, the SPIE International Conference on Electronic Imaging, San Jose, CA, Feb.,1996 CA, Feb.,1996

J. Meng and S. F. Chang, “Embedding visible watermarks in the coJ. Meng and S. F. Chang, “Embedding visible watermarks in the compressed domain,” Proc. of ICIP 98.mpressed domain,” Proc. of ICIP 98.

M. S. Kankanhalli, Rajmohan and J. R. Ramakrishnan, “Adaptive VM. S. Kankanhalli, Rajmohan and J. R. Ramakrishnan, “Adaptive Visible Watermarking of Images,” IEEE International Conference oisible Watermarking of Images,” IEEE International Conference on Multimedia Computing and Systems, 1999n Multimedia Computing and Systems, 1999

S. P. Mohanty, J. R. Ramakrishnan, and M. S. Kankanhalli, “A DCT S. P. Mohanty, J. R. Ramakrishnan, and M. S. Kankanhalli, “A DCT domain visible watermarking technique for images,” Proc. of ICMdomain visible watermarking technique for images,” Proc. of ICME 2000.E 2000.

S. P. Mohanty, J. R. Ramakrishnan, and M. S. Kankanhalli, “A Dual S. P. Mohanty, J. R. Ramakrishnan, and M. S. Kankanhalli, “A Dual

Watermarking Technique for Images, “ Proc. ACM, pp. 49-51, 1999Watermarking Technique for Images, “ Proc. ACM, pp. 49-51, 1999

Page 9: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

The Scheme Proposed by G. BraudawaThe Scheme Proposed by G. Braudaway et al y et al

*)(667.38

)(' 3/2,,

,, LY

YYYY

w

mnw

A

mnmnmn

An approximately uniform color space is used, such as the CIE An approximately uniform color space is used, such as the CIE 1976 (L*u*v*) space and the CIE 1976(L*a*b*)-space, so amoun1976 (L*u*v*) space and the CIE 1976(L*a*b*)-space, so amounts of brightness increasing and decreasing are perceptually eqts of brightness increasing and decreasing are perceptually equal for a fixed change occurred everywhere in the color spaceual for a fixed change occurred everywhere in the color space

DefinitionsDefinitions YYn,mn,m and Y’ and Y’n,mn,m: the brightness values of each pixel in the unmark: the brightness values of each pixel in the unmark

ed original and the watermarked imageed original and the watermarked image YYww: the brightness of the “scene white” : the brightness of the “scene white”

Page 10: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

Other Enhancing Other Enhancing SchemesSchemes

[Meng and Chang] [Meng and Chang] The same embedding model is extended to the DCT domain by simple statThe same embedding model is extended to the DCT domain by simple stat

istic model approximation for the convenience of processing directly in thistic model approximation for the convenience of processing directly in the MPEG-compressed domain.e MPEG-compressed domain.

[Kankanhalli et al] [Kankanhalli et al] Local features related to the degree of distortion tolerances, such as edge lLocal features related to the degree of distortion tolerances, such as edge l

ocations, texture distributions and luminance sensitivity, are taken into coocations, texture distributions and luminance sensitivity, are taken into consideration so that more unobtrusive watermarked images can be generatnsideration so that more unobtrusive watermarked images can be generated. ed.

Simple statistics of block-DCT coefficients are calculated and analyzed to Simple statistics of block-DCT coefficients are calculated and analyzed to decide the watermark embedding energy of each block. decide the watermark embedding energy of each block.

Edge integrity will be preserved, in these approaches, since the edge inEdge integrity will be preserved, in these approaches, since the edge information is essential to maintain the image quality. formation is essential to maintain the image quality.

And the energy of the embedded watermark is larger in highly textureAnd the energy of the embedded watermark is larger in highly textured areas than in smooth ones due to different noise sensitivity. d areas than in smooth ones due to different noise sensitivity.

In additions, the watermark energy of mid-gray regions is also smaller In additions, the watermark energy of mid-gray regions is also smaller than other areas since the noises are more visible against a mid-gray bthan other areas since the noises are more visible against a mid-gray background ackground

[S. P. Mohanty et al][S. P. Mohanty et al] in addition to the visibly embedded watermark, a fragile invisible watermin addition to the visibly embedded watermark, a fragile invisible waterm

ark is also adopted to check if the visible watermark is altered or not ark is also adopted to check if the visible watermark is altered or not

Page 11: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

Important observations Important observations (1/4)(1/4)

Attacking visible watermarking Attacking visible watermarking scheme means successfully recover scheme means successfully recover the watermarked area.the watermarked area.

Implication:Implication: Similar image processing techniques Similar image processing techniques

can be adoptedcan be adopted Image recoveryImage recovery Object removalObject removal

Page 12: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

Important Important observations(2/4)observations(2/4)

To clearly recognize the copyright To clearly recognize the copyright patterns, the patterns, the contours of contours of embedded patternsembedded patterns must be must be preserved. preserved.

Implication:Implication: An attacking scheme is effective if An attacking scheme is effective if

1.1.The pattern is completely removed The pattern is completely removed

2.2.The shape is seriously distorted without The shape is seriously distorted without seriously degrading visual quality.seriously degrading visual quality.

Page 13: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

Important Important observations(3/4)observations(3/4)

The perceptibility of the host image The perceptibility of the host image details within watermarked area details within watermarked area depends on the depends on the preservation of preservation of edge informationedge information..

Implication:Implication: Available information while attackingAvailable information while attacking

Surrounding pixels around watermarked Surrounding pixels around watermarked area. area.

Edge information within watermarked area Edge information within watermarked area is available while attacking. is available while attacking.

Page 14: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

Important Important observations(4/4)observations(4/4)

The robustness lies in the The robustness lies in the inevitability of exhaustive and inevitability of exhaustive and expensive laborsexpensive labors..

Implication:Implication: Only minimum user intervention should Only minimum user intervention should

be adopted during attacking be adopted during attacking User selection of watermarked areas User selection of watermarked areas

Page 15: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

Averaging AttacksAveraging Attacks

Refill the watermarked areas by Refill the watermarked areas by averaging surrounding pixels.averaging surrounding pixels. Good approximations for small areas.Good approximations for small areas. Blurring effects across object boundariesBlurring effects across object boundaries

Page 16: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

Image InpaintingImage Inpainting M. Bertalmio, V. Caselles, and C. Ballester, “M. Bertalmio, V. Caselles, and C. Ballester, “II

mage inpaintingmage inpainting,” ,” SIGGRAPH 2000SIGGRAPH 2000, Aug. 2000, Aug. 2000

Image inpainting Image inpainting is an is an iterativeiterative image recovery technique. image recovery technique. prolongs the approaching isophotes into damaged aprolongs the approaching isophotes into damaged a

reas.reas. successfully reconstruct the edges of damaged area.successfully reconstruct the edges of damaged area.

),(),,(

),,(),(),( jiI

njiN

njiNjiLjiI nnn

t

Page 17: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

Basic Inpainting AttacksBasic Inpainting Attacks

Attacks against visible watermarking are regarded as Attacks against visible watermarking are regarded as common image recovery problems.common image recovery problems.

Good results can be obtained for areas composed of Good results can be obtained for areas composed of thinthin copyright patterns, but areas composed of copyright patterns, but areas composed of thickthick patterns patterns cannot be successfully recovered. cannot be successfully recovered.

Page 18: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

General AttacksGeneral Attacks

Classifying flat areas within watermarked area Classifying flat areas within watermarked area by analyzing remaining edge information of host by analyzing remaining edge information of host imagesimages

Directly extend colors of surrounding flat areas Directly extend colors of surrounding flat areas into watermarked areasinto watermarked areas

Edge Area

Watermark Area

Page 19: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

Further ImprovementFurther Improvement

Page 20: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

Experimental Results (I)Experimental Results (I)

Page 21: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

Experimental Results (II)Experimental Results (II)

Page 22: Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.

Experimental Results Experimental Results (III)(III)