Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
-
Upload
osborne-patrick -
Category
Documents
-
view
213 -
download
1
Transcript of Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
![Page 1: Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.](https://reader036.fdocuments.us/reader036/viewer/2022072014/56649eb35503460f94bbb06a/html5/thumbnails/1.jpg)
Watermarking
Matt Elliott
Brian Schuette
![Page 2: Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.](https://reader036.fdocuments.us/reader036/viewer/2022072014/56649eb35503460f94bbb06a/html5/thumbnails/2.jpg)
Overview
• Goals
• Methods
• Comparison
• Attacks
• References
![Page 3: Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.](https://reader036.fdocuments.us/reader036/viewer/2022072014/56649eb35503460f94bbb06a/html5/thumbnails/3.jpg)
Goals
Watermark Goals• Robust• Invisible• Recovery
Project Goals• Watermark Types
– Fragile
– Robust
• Techniques– Frequency Domain
– Spatial domain
![Page 4: Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.](https://reader036.fdocuments.us/reader036/viewer/2022072014/56649eb35503460f94bbb06a/html5/thumbnails/4.jpg)
Bit-Plane Slicing
• Spatial Domain• LSB contains
watermark• Simple detection
• Many options– Image blocks
– Encode Text
– Specific Areas
![Page 5: Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.](https://reader036.fdocuments.us/reader036/viewer/2022072014/56649eb35503460f94bbb06a/html5/thumbnails/5.jpg)
Cox Method
– Frequency Domain
– Transformation
– AC Coefficients• Sorted by size
• Largest 1000 selected
• Psuedo-random watermark embedded
– Reverse transformation
2D DCT sort v’=v (1+ w) IDCT & normalize
Original image
N largest coeff.
other coeff.
marked image
random vector generator
wmk
seed
![Page 6: Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.](https://reader036.fdocuments.us/reader036/viewer/2022072014/56649eb35503460f94bbb06a/html5/thumbnails/6.jpg)
Comparison
• Fragile Watermark– Very susceptible to attack– Used for tampering detection
• Robust Watermark– Resistant to tampering– Used with public images– Provides proof of ownership
![Page 7: Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.](https://reader036.fdocuments.us/reader036/viewer/2022072014/56649eb35503460f94bbb06a/html5/thumbnails/7.jpg)
Bit-Plane Slicing
![Page 8: Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.](https://reader036.fdocuments.us/reader036/viewer/2022072014/56649eb35503460f94bbb06a/html5/thumbnails/8.jpg)
Methods of Attack
• Scaling
• Cropping
• JPEG
• Print/Xerox
![Page 9: Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.](https://reader036.fdocuments.us/reader036/viewer/2022072014/56649eb35503460f94bbb06a/html5/thumbnails/9.jpg)
References
• ECE 738 Advanced Digital Image Processing• Professor Hu• Wikipedia• Digital Image Processing, Gonzalez and Woods• I. Cox, J. Kilian, T. Leighton, T. Shamoon:
“Secure Spread Spectrum Watermarking for Multimedia'', IEEE Transaction on Image Processing, vol.6, no.12, pp.1673-1687, 1997.
![Page 10: Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.](https://reader036.fdocuments.us/reader036/viewer/2022072014/56649eb35503460f94bbb06a/html5/thumbnails/10.jpg)
Questions?