DOC PREVIEW
SJSU CS 265 - Watermarking

This preview shows page 1-2-3-4-5 out of 15 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 15 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 15 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 15 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 15 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 15 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 15 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Digital Watermarking for ImagesAgendaMotivationDigital WatermarkingConceptsDiscrete Cosine Transform(DCT)DCT coding systemSemi Fragile Watermark (LPD)Semi Fragile Watermark (ctd.)Watermark DetectionBlock classificationExampleAttacksPrecautionsReferencesDigital Watermarking for ImagesAarathi RaghuCS 265Spring 2005Agenda1. Motivation2. What is digital watermarking?3. DCT4. A Semi-fragile watermarking algorithm5. Attacks and countermeasures6. ConclusionMotivationAnalog Digital Photographs JPEG imagesDistribution net requiredFree to distribute using internetHard to modify Easily modifiableSome level of copyright protectionNo copyright protectionDigital WatermarkingProcess of embedding information Information embedded is :•Imperceptible•Secure•RobustSemi-fragile watermarking–Uses:•Tamper detection•Image authenticationScenarioConceptsCompression is inevitable to accommodatedisk space, bandwidth and transmission time.Based on:–Redundancy reduction–Irrelevancy reductionDiscrete Cosine Transform(DCT)Divides image into parts based on the visual quality of the imageInput image is N*Mf(i,j) = intensity of pixel in row i and column jF(u,v) is DCT coefficient in DCT matrixLarger amplitudes closer to F(0,0) Compression possible because higher order coefficients are generally negligibleDCT coding systemimageDCT Transformation8*8 DCTQuantizationEntropy encodingLossy compressed dataSemi Fragile Watermark (LPD)Designed by Lin, Podilchuk, DelpWatermark:Pseudo-random zero-mean, unit variance Gaussian distributed numbersConstructed in DCT domainWatermark embedded in each DCT block selectivelySemi Fragile Watermark (ctd.)High frequency coefficients and DC coefficient – unmarkedInverse DCT produces spatial domain watermark WY = X + ßW, where ß is the strengthWatermark DetectionDone block-by-block(col)(B(x,y))=B(x,y)-B(x+1,y) if x E {1,2, …., blocksize –1}, 0 otherwise(row)(B(x,y))=B(x,y)- B(x,y+1) if y E {1,2,……,blocksize –1}, 0 otherwiseTb*= [(col)(Tb(x,y)) | (row)(Tb(x,y))]Wb*= [(col)(Wb(x,y)) | (row)(Wb(x,y))]C = (Tb*.Wb*) sqrt ((Tb*.Tb*) (Wb*.Wb*))Block classificationCorrelation statistic, C, is compared to a threshold TC > = T : Block is authenticC < T : Block is alteredExampleDetection Original image Altered imageAttacksRemoval attacksGeometric attacksCryptographic attacksProtocol attacksPrecautionsWatermark should be present over more number of pixelsUsed keys should be secureUse of collusion-secure watermarksWatermarks should be non-invertiblePossible attacks need to be foreseenReferences1. ftp://skynet.ecn.purdue.edu/pub/dist/delp/ei00-water/paper.pdf2. http://www-nt.e-technik.uni-erlangen.de/~su/seminar/ws99/slides/amon.pdf3. http://www.lnt.de/~eggers/texte/IEEEcom2.pdf4.


View Full Document

SJSU CS 265 - Watermarking

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

SECURITY

SECURITY

19 pages

Rsync

Rsync

18 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download Watermarking
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Watermarking and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Watermarking 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?