Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting...

31
Digital Watermarking Presented by Melinos Averkiou

Transcript of Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting...

Page 1: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Digital Watermarking

Presented by Melinos Averkiou

Page 2: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

History

• 1282 – Paper Watermarks

• 1779 – Counterfeiting

• 1954 – Watermarking music

• 1988 – First use of the term Digital Watermark

• End of 1990s – large interest in watermarking

Page 3: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Applications

• Broadcast monitoring

• Owner identification

• Transaction Tracking

• Content Authentication

• Copy Control

• ..many more

Page 4: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Watermarking Properties

• Embedding effectiveness

• Fidelity

• Payload

• Blind or informed detection

• False positive rate

• Robustness

Page 5: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Watermarking models

1. Communication-Based • Without side-information

• With side-information

Page 6: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Watermarking Models

2. Geometric• Media Space

– Embedding Region

– Detection Region

– Region of acceptable fidelity

• Marking Space

Page 7: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Watermarking without side-information

Page 8: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Blind Embedding and Linear Correlation Detection

Embedder:

1. Choose one random reference pattern(wr)

2. Choose message mark for 1 and 0

α controls the embedding strength

Detector:

1. Calculate linear correlation zlc

2. Detect message according to zlc

Page 9: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Geometric Interpretation

Page 10: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

+

α = 1

Page 11: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Effectiveness

400 images (112 x 92 pixels)

-3 -2 -1 0 1 2 30

5

10

15

m=0

No watermark

m=1

Detection value

Per

cent

age

of im

ages

Page 12: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

-3 -2 -1 0 1 2 30

2

4

6

8

10

12

14

16

m=0

No watermark

Detection value

Per

cent

age

of im

ages

m=1

Reference pattern is very important

Low pass reference pattern

Page 13: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

-3 -2 -1 0 1 2 30

2

4

6

8

10

12

14

m=0No watermark

Detection value

Per

cent

age

of im

ages

m=1

α is very important

α = 2

Page 14: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

-3 -2 -1 0 1 2 30

2

4

6

8

10

12

14

m=0

No watermark

Detection value

Per

cent

age

of im

ages

m=1

Adding noise

Page 15: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Watermarking with side-information

Page 16: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Informed Embedding and Linear Correlation Detection

Embedder:

1. Choose one random reference pattern(wr)

2. Calculate α so that we have 100% effectiveness

3. Choose message mark for 1 and 0

Detector:

1. Calculate linear correlation zlc

2. Detect message according to zlc

Page 17: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Geometric Interpretation

Page 18: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

+

Page 19: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Effectiveness

-3 -2 -1 0 1 2 30

10

20

30

40

50

60

70

80

90

100

m=0

No watermark

m=1

Detection Value

Per

cent

age

of im

ages

Page 20: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Adding Noise

-3 -2 -1 0 1 2 30

10

20

30

40

50

60

70

80

90

100

m=0

No watermark

m=1

Detection value

Per

cent

age

of im

ages

Page 21: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Exploiting Marking Space

Page 22: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Dirty Paper Codes

• One code book comprised of subcode books for each message

• Select the code most similar to the original work

Page 23: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Block-Based/Fixed Robustness Embedding –Correlation Coefficient Detection

Embedder1. Extract a watermark vector vo by summing 8 x 8 blocks2. Find the highest correlation between vo and a set of reference

marks (one set for 1, one set for 0)3. Embed the highest correlation mark into the image using a fixed

robustness algorithm

Detector1. Extract a watermark vector vo by summing 8 x 8 blocks2. Find the highest correlation between vo and the two sets of

reference marks3. If it’s above the threshold then the message is detected

Page 24: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Geometric Interpretation

Page 25: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Before embedding After embedding

Page 26: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Fidelity

0 5 10 15 20 25 30 35 4015

15.5

16

16.5

17

17.5

18

Number of reference marks per message

MS

E a

fter e

mbe

ddin

g

Page 27: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

0.9993 0.9994 0.9995 0.9996 0.9997 0.9998 0.9999 10

20

40

60

80

100

120

140

160

180

Detection value

Num

ber o

f im

ages

Effectiveness

• tnc=0.95 R2=30

Page 28: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Orthogonal Lattice Dirty Paper Code

Embedder1. Encode the message into a sequence of coded bits using Trellis

coding2. Divide the image into 8 x 8 blocks3. Modify each block to embed a bit using the reference mark

Detector1. Compute correlation of each block with the reference mark and

use it to find zz= floor (corr / α + 0.5 )

2. If z is odd then we have a 1, else we have a 03. Decode the message using the Viterbi decoder

Page 29: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Original message: 1024 bitsEmbedded message: 4096 bits

MSE = 1.6927Errors = 0

Before embedding After embedding

Page 30: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Other Methods

• Frequency Domain Based – Using DCT Coefficients

– Using Wavelets

Page 31: Presented by Melinos Averkiou...History • 1282 – Paper Watermarks • 1779 – Counterfeiting • 1954 – Watermarking music • 1988 – First use of the term Digital Watermark

Thank You!