Secure Spread Spectrum

16
SECURE SPREAD SPECTRUM WATERMARKING FOR MULTIMEDIA PRESENTERS : Mahhek Tahir ,Khizra Samad , Asma Shaheen

description

 

Transcript of Secure Spread Spectrum

Page 1: Secure Spread Spectrum

SECURE SPREAD SPECTRUMWATERMARKING FOR MULTIMEDIA

PRESENTERS : Mahhek Tahir ,Khizra Samad , Asma Shaheen

Page 2: Secure Spread Spectrum

Ingemar J.Cox – Senior Member IEEEJoe Kilian – Member IEEEF.Thomson Leighton – Member IEEETalal Shamoon – Member IEEE

IEEE TRANSATIONS ON IMAGE PROCESSING , VOL 6 - DECEMBER 1997

Authors :

Page 3: Secure Spread Spectrum

INTRODUCTION

This paper presents a secure algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video and multimedia data. A watermark should be constructed as an independent and identically distributed Gussain random vector that is imperceptibly inserted in a spread spectrum like fashion into the perceptually most significant spectral components of data. It argue that insertion of a watermark under this rule makes the watermark robust to signal processing operations and common geometric transformation provided that the original image is available and it can be successfully registered against the transform image.

Page 4: Secure Spread Spectrum

SPREAD SPECTRUM WATERMARK

The problem: how to insert watermark into most perceptually significant region of spectrum in a reliability protective manner.

To solve: this problem, frequency domain of the image or sound at hand is viewed as communication channel, and the mark is viewed as a signal that is transmitted through it

Page 5: Secure Spread Spectrum

SECURE SPREAD SPECTRUM WATERMARKS FOR MULTIMEDIA Spread spectrum watermark based on DCT In order for a watermark to be robust, it

needs to be placed in the most significant part of the image.

The watermark will be composed of random numbers drawn from a Gaussian N(0,1) distribution

Inserting the watermark to the image. Inverse DCT

Page 6: Secure Spread Spectrum
Page 7: Secure Spread Spectrum
Page 8: Secure Spread Spectrum

Image and Watermarked Image

Page 9: Secure Spread Spectrum

METHODOLOGY

Embedding Detection and Comparison

Page 10: Secure Spread Spectrum

EMBEDDINGYCrCb Y DC

T

Convert to vector

Descending order of DCT values

Reshape back

Page 11: Secure Spread Spectrum

EXTRACTION

YCrCb Y DCT

Convert to vector

Descending order of DCT values

X =

Page 12: Secure Spread Spectrum

COMPARISON

Watermark detected

Watermark not detected

Page 13: Secure Spread Spectrum

EXPERIMENTS

Uniqueness of Watermark

Scaling

Print Xerox and Scan

Crop

Collision Attack

Page 14: Secure Spread Spectrum

IMPLEMENTED EXPERIMENT - SCALING

Half size Double size

Page 15: Secure Spread Spectrum

IMPLEMENTED EXPERIMENT - COPPING

Page 16: Secure Spread Spectrum