multimedia copyright protection technologies m. a. suhail, i. a. niazy [email protected]

19
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy [email protected]

Upload: willa-scott

Post on 30-Dec-2015

220 views

Category:

Documents


1 download

TRANSCRIPT

Multimedia Copyright Protection Technologies

M. A. Suhail, I. A. Niazy

[email protected]

Introduction

There are various watermarking schemes applied to images.

The purpose is to give an overview about the field of invisible watermarking.

I will discuss the basic concept, procedure, applications, and requirements needed.

Digital Watermarking Concept

An identification code carrying information about the copyright owner, the creator of the work, etc., embedded permanently into digital data.

The purpose of embedding WM is to protect copyright or checking for modifications.

Types of Watermarks

There are two major categories for digital watermarking:– Visible Watermarking

• Like stamping on paper

– Invisible Watermarking• Far more complex• I will focus on this category

Invisible Watermarking

Used to identify copyright data The most suitable media for Watermarking

are still images, video, and audio. Unsuitable media include:

– Executable files• Converting it to conical format

– Text• Can be overcome by any commercial OCR.

How to Embed a Watermark

Encoder (E)

Key (PN)

Original MediaSignal

(I0)

Watermarked Media signal

(I water)

Watermark W

How to Embed a Watermark (continued) The previous figure may be expressed

as follows:– E(I0, W) = Iwater

– Embedding function ‘E’ modifies I0 according to W.

How to Detect a Watermark

Pirate product Attacked Content Decoder

Decryption Key

Decoder response:Is the watermark W present? (Yes/No) Z

How to Detect a Watermark (continued) Detection Function (Decoder) ‘D’ is

defined as: D(R, I0) = W’, where R is the watermarked signal.

W’ is compared with W, based on a correlation measure:

where c is the value of the correlation, and 0 is a threshold.

otherwise

cWWZ

0

1),'( 0

Robust Watermarking Scheme Requirements Imperceptibility (Perceptual Invisibility)

– Penalty: less robustness Robustness

– Should survive intentional or unintentional attacks.– With images, resistance with geometric

manipulation is still an open issue Detectability

– Small probability of failing

Digital Watermarking Techniques

D ig ita l W ate rm ark in g Tech n iq u es

V is ib le W ate rm ark in g

W ave le t Tran s fo rm D isc re te C os in eTran s fo rm (D C T)

F rac ta l Tran s fo rm

Tran s fo rm D om ain

L eas t S ig n fican t B itM od ifica tion (L S B )

S p atia l D om a in

In vis ib le W ate rm ark in g

D ig ita l W ate rm ark in g

Digital Watermarking Techniques (continued) Spatial Domain Techniques

– The modification of LSB (Least Significant Bit) of the host data techniques are used in the spatial domain.

– LSB is modified using fixed magnitude NP sequence.

– The LSB is insignificant, so the WM will be invisible.

– WM easily corrupted by signal processing.

Digital Watermarking Techniques (continued) Transform Domain Techniques

– DCT (Discrete Cosine Transform) is based on dividing the image to square blocks of size 88, then modifying middle range frequency DCT coefficients of selected blocks.

– Wavelet Transform: Multi-resolution based technique.

– Fractal Transform: Very few works, because computationally expensive.

DCT Transform WatermarkOrginal Image Watermarked Image

Absolute difference

0 200 400 6000

0.05

0.1

0.15

0.2

0.25

Watermarks

DetectorRespose

Magnitude of the detectorresponse

OutputThreshold

A mosque and its watermarked image with the detector response.

Commercial Software for Watermarking Direct-Sequence

– Adds noise to every element in the document. and Frequency-Hopping

– Selects a pseudorandom subset of data to be watermarked.

Direct-Sequence and Frequency-Hopping spread-spectrum are the methods used for most commercial watermarking.

Common Commercial Software

Digimarc® Uses Direct-Sequence methods to superimpose a watermark over an image.

SysCoP® is also another common software.

Commercial software lack some means of security in order to keep their prices within a reasonable bound.

Digimarc® Software Example

a b

(a) A watermarked image using Digimarc® software, and (b) the watermark information of (a) by Digimarc® displayed in a window. The bar in the bottom of the window displays the robustness of the watermark.

Conclusion

The concept and types of digital watermarking is defined.

Next, The usage and suitable media for invisible Watermarking is discussed.

Also the Digital Watermarking techniques were described.

Finally, some Commercial Software and their drawbacks were described.

Any Questions:

Please forward any questions to the following E-mail:– [email protected]