concepts of multimedia processing and transmission it 481, lecture #9 dennis mccaughey, ph.d. 2...

30
Concepts of Multimedia Concepts of Multimedia Processing and Processing and Transmission Transmission IT 481, Lecture #9 Dennis McCaughey, Ph.D. 2 April, 2007

Upload: sherman-matthews

Post on 31-Dec-2015

217 views

Category:

Documents


1 download

TRANSCRIPT

Concepts of Multimedia Concepts of Multimedia Processing and TransmissionProcessing and Transmission

IT 481, Lecture #9Dennis McCaughey, Ph.D.

2 April, 2007

04/02/2007IT 481, Spring 20072

ProjectProject

Project will be recovering a student specific watermark from the bird image.

MATLAB code will be provided you only have to execute it. This is not a programming project.

e-mail me at [email protected]– I will reply with the code.

Criteria:– Recover the watermark– Assess the visibility and robustness of the

watermarking method

04/02/2007IT 481, Spring 20073

Homework #4Homework #4

E-mail “[email protected]” requesting MATLAB code and “bird” picture.

I will reply with the code. Load these on a CD and bring to 4/9 class Review the following instructions

– Insert the CD – Open Matlab– Under “file” open D\:watermarkread.m– Under “debug” click “run”– When prompted, set the search path to the top of the Matlab

search order, click “ok”– When prompted, enter your student ID #

Project– Answer the following questions

What is the embedded message? How many errors are reported? The number of errors may not equal the misspelled words, Why?

– E-mail your answers to me by 4/13

04/02/2007IT 481, Spring 20074

WatermarkingWatermarking

Watermarking is a secret code described by a digital signal carrying information about the copyright property of the product.

The watermark is embedded in the digital data in such a way that it is not visually perceptible.

The copyright owner should be the only person who can show the existence of his own watermark and to prove then origin of the product.

04/02/2007IT 481, Spring 20075

Watermark RequirementsWatermark Requirements

Alterations introduced into the image or audio should be perceptually invisible.

A water mark must be undetectable and not removable by an attacker.

A sufficient number of watermarks in the same image or audio, detectable by their own key, can be produced.

The detection of the watermark should not require the original image or audio.

A watermark should be robust against attacks which preserve the desired quality of the image or audio.

04/02/2007IT 481, Spring 20076

Main Features of WatermarkingMain Features of Watermarking

Perceptual Invisibility Trustworthy Detection Associated Key Automated Detection/Search Statistical Invisibility Multiple Watermarks Robustness

04/02/2007IT 481, Spring 20077

Perceptual InvisibilityPerceptual Invisibility

Watermark should not degrade the perceived image/audio quality

Differences may become apparent when the original and watermarked versions are directly compared

04/02/2007IT 481, Spring 20078

Trustworthy DetectionTrustworthy Detection

Watermarks should constitute a sufficient and trustworthy part of ownership.

False alarms should be extremely rare. Watermarks signatures/signals should be

complex. An enormous set of watermarks prevents

recovery by trial-and-error methods.

04/02/2007IT 481, Spring 20079

Associated keyAssociated key

Watermarks should be associated with an identifiable number called the watermark key.

Key used to cast, detect and remove the watermark.

The key should be private and should exclusively characterize the legal owner.

Any signal removed from the image/audio is assumed to be valid only if it can be associated with the key via a well established algorithm

04/02/2007IT 481, Spring 200710

Automated Detection/SearchAutomated Detection/Search

Watermark should combine with a search algorithm.

04/02/2007IT 481, Spring 200711

Statistical InvisibilityStatistical Invisibility

Watermark should not be recoverable using statistical methods.

The possession of a great number of watermarked images, embedded with the same key should not enable the recovery of the watermark through statistical methods.– Watermarks should be image/audio

independent.

04/02/2007IT 481, Spring 200712

Multiple WatermarksMultiple Watermarks

Multiple watermarks assist in the case where someone illicitly watermarks and already watermarked image/audio.

Convenient in transferring copyrighted material.

04/02/2007IT 481, Spring 200713

RobustnessRobustness

A watermark should survive some modifications to the data.

Common manipulations to image/video– Data Compression– Filtering– Color, quantization , brightness modifications,

geometric distortions, etc– Other trans-coding operations.

04/02/2007IT 481, Spring 200714

Application DomainsApplication Domains

A1: Carrying value-added metadata– Additional information such as hyperlinks, content based

indexing– Malicious and non-malicious attacks– Survive MPEG encoding

A2: Copy protection and conditional access– Control Intellectual Property Management and Protection– View and copy options– Every compliant decoder must be able to trigger protection

or royalty collection mechanisms at the time of decoding– Unauthorized individuals should not be able to defeat the

watermarks by any means A3: Ownership assertion, recipient tracking

– Establish ownership and determine origin of unauthorized duplication.

– Prosecution of copyright infringement

04/02/2007IT 481, Spring 200715

Application Domains Cont’dApplication Domains Cont’d

A4: Authentication and verification– Allows fragile watermarks; if contents modified watermarks

should disappear. – Helps in identifying areas that wer modified

A5: Broadcast monitoring– Monitor where and when the contents are played– Advertisements. Here heavy content degradation is less of an

issue.– Watermark removal, invalidation and forgery can be significant

concern– Counterfeiting should be intractable for the system to be effective

A6: Secret communication or steganography– Data hiding may require higher capacity watermarks than other

applications– Secrecy may be the overriding concern in some applications

04/02/2007IT 481, Spring 200716

AttacksAttacks

AT1: Basic attacks– Lossy compression, frame dropping & temporal rescaling

AT2: Simple attacks– Blurring, median filtering, noise addition gamma correction

and sharpening AT3: Normal attacks

– Translation, cropping and scaling AT4: Enhanced attacks

– Aspect ratio change & random geometric perturbations (Stirmark)

AT5: Advanced Attacks– Delete/insert watermarks, single document watermark

estimation attacks & multiple-document statistical attacks

04/02/2007IT 481, Spring 200717

Robustness, Resilience & DetectionRobustness, Resilience & Detection

Applications Domain

Unintentional Attacks

Intentional Attacks Every

DecoderHigh

CapacityApplications

ExampleAT1 AT2 AT3 AT4 AT5

A1 Yes Yes Maybe No No Yes Yes Value-added metadata

A2 Yes Yes Yes Yes Yes Yes No Copy Protection

A3 Yes Yes Yes Yes Yes No No Ownership/fingerprint

A4 Yes No No No Some Yes No Authentication

A5 Yes Yes NO No Yes Yes Yes Broadcasting

A6 Yes Yes Maybe Maybe Yes No Yes Secret Communication

04/02/2007IT 481, Spring 200718

Human PerceptionHuman Perception

Watermarking schemes take advantage of the fact that the human audio and visual systems are imperfect detectors.

Audio & visual signals must have a minimum intensity or contrast before they are perceptible.

These minima are spatially, temporally and frequency dependent.

These dependencies are either implicitly or explicitly exploited

04/02/2007IT 481, Spring 200719

Transform Domain ConsiderationsTransform Domain Considerations

The human eye is more sensitive to noise in the lower frequency range than in the higher frequency counterparts

However, energy in most images is concentrated in the lower frequency range.

Quantization used in DCT based compression reflects the HVS which is less sensitive in the higher frequencies

A trade is required to balance watermark invisibility and survivability resulting in the use of the mid-frequency terms.

04/02/2007IT 481, Spring 200720

Transform Domain ConsiderationsTransform Domain Considerations

An alteration of a transform coefficient is spread across the entire spatial block

A one dimensional example:

0 20 40 60 80 100 120 1400

0.5

1DCT Spectrum

0 20 40 60 80 100 120 1400

0.5

1Time Sequence

04/02/2007IT 481, Spring 200721

Data Embedding AlgorithmData Embedding Algorithm

Embedding Algorithm

Perceptual Analysis

Key

SignalWith embedded data

Information

Signal(image, audio or video)

04/02/2007IT 481, Spring 200722

Embedded Data ExamplesEmbedded Data Examples

Multilingual soundtracks within a motion picture

Copyright data Distribution permissions Data used for accounting and billing and

royalties Etc.

04/02/2007IT 481, Spring 200723

Watermarking TechniquesWatermarking Techniques

Non-Blind: Watermark recovery requires the original

Blind: Watermark recovery does not require the original

Spatial domain or transform domain embedding

Spatial domain:– LSB, color pallet, geometric

Transform Domain:– FFT, DCT, Wavelet

04/02/2007IT 481, Spring 200724

An Algorithm Proposed by Busch, Funk An Algorithm Proposed by Busch, Funk and Wolthusenand Wolthusen

A/DQuantize Y-

DCTRGB to YCbCr

Block DCT

EmbedInverse

Quantize Y-DCT

Inverse Block DCT

YCbCr to RGB

Camera

Digitized Video to MPEG-2

04/02/2007IT 481, Spring 200725

Algorithm ConsiderationsAlgorithm Considerations

Watermark embedding position determined through a pseudo-random number generator that determines the order of block processing and the coefficient to be modified– Embed all available blocks

Key may be public or secret leading to a public or secret watermark

Redundantly embed the watermark to achieve survivability to MPEG-2 compression

04/02/2007IT 481, Spring 200726

Selected Block EmbeddingSelected Block Embedding

1. Block is transformed using the DCT2. Perform edge detection3. Select pair of DCT coefficients from the sub-band

used using a Pseudo random permutation4. Quantize the selected coefficients using the

MPEG-2 algorithm5. Determine if the coefficient pair is suitable for

embeddingAvoid “Edge” and “Plain” blocks

6. Enforce a differential relationship between the coefficients in the pair to encode a “1” or a “0”

7. Inverse quantize the modified coefficients

04/02/2007IT 481, Spring 200727

Busch Watermarking DCT CoefficientsBusch Watermarking DCT Coefficients

0

1

2

3

4

5

6

7

0 1 2 3 4 5 6 7

0

1

2

3

4

5

6

7

0 1 2 3 4 5 6 7

Level 1

Level 2

Level 3

Public

Coefficients Used For Edge Detection

If the absolute value of one of the highlighted coefficients is greater than 39, the block is classified as an “edge” and not used.If the quantized value of one

of the coefficients in the selected band is zero the block is classified as a “plain” block

04/02/2007IT 481, Spring 200728

VisibilityVisibility

“Edge” blocks, if modified, are highly visible in video and are to be avoided

“Plain” blocks are not so sensitive, so they can be used if care is exercised– In one of the bands randomly select a pair of coefficients and

randomly select one to be the “first” (DCT1) and another to the “second” (DCT2)

– To encode a “one” set DCT1 = (ABS(DCT1)+ ABS(DCT2))/2 + K, Preserving the sign(DCT1)

– To encode a “zero” set DCT1 = (ABS(DCT1)+ ABS(DCT2))/2 - K, Preserving the sign(DCT1)

– K is elected as a compromise between visibility and robustness to MPEG-2 compression

04/02/2007IT 481, Spring 200729

ReferenceReference

C. Busch, W. Funk, and S. Wolthusen: “Digital Watermarking: From Concepts to Real-Time Video Applications”; IEEE Computer Graphics and Applications, 1999

Matlab OverviewMatlab Overview