Académique Documents
Professionnel Documents
Culture Documents
Visible Watermarking
IPR Course: TA Lecture
2002/12/18
NTU CSIE R105
Outline
n Introduction
n State-of-the-Art
n Characteristics of Visible Watermarking
Schemes
n Attacking Visible Watermarking Schemes
n Discussions and Conclusions
Classifying Watermarking Schemes
Data hiding
Steganography Watermarking
+ à
Watermark
Imperceptible distortion Visibly Meaningful pattern
Perceptibility
Current
Hot Only few papers
Research Status
Requirements of
Visible Watermarking
n Perceptibility of host image details
n Contents should not be rendered useless after being visibly
watermarked
n Visibility of watermark patterns in embedded contents
n No explicit watermark extraction techniques are required
n Robustness
n Difficult to remove unless exhaustive and expensive human
interventions are involved
A General Model of
Visible Watermarking
I ' = K 1 * I + K 2 *W
D ( E I ( I ' ), E I ( I )) < Threshold I
D( EW ( I ' ), EW (W )) < ThresholdW
n I’: the watermarked content
n I: the un-watermarked original content
n W: the watermark pattern
n Ki: the weighting factor
n D: a distance function measuring the perceptual difference of its two parameters
n Ei: image feature extraction operators
n ThresholdI: the largest allowable distortion of image details that observers can tolerate
and, at the same time, the signature of can be maintained.
n ThresholdW: the largest allowable distortion of the embedded watermark pattern that
the copyright information can be clearly recognized.
State-of-the-Art
n G. Braudaway, K.A. Magerlein, and F. Mintzer, "Protecting Publicly Available
Images with a Visible Image Watermark," Proceedings of the SPIE
International Conference on Electronic Imaging, San Jose, CA, Feb.,1996
n J. Meng and S. F. Chang, “Embedding visible watermarks in the compressed
domain,” Proc. of ICIP 98.
n M. S. Kankanhalli, Rajmohan and J. R. Ramakrishnan, “Adaptive Visible
Watermarking of Images,” IEEE International Conference on Multimedia
Computing and Systems, 1999
n S. P. Mohanty, J. R. Ramakrishnan, and M. S. Kankanhalli, “A DCT domain
visible watermarking technique for images,” Proc. of ICME 2000.
n S. P. Mohanty, J. R. Ramakrishnan, and M. S. Kankanhalli, “A Dual
Watermarking Technique for Images, “ Proc. ACM, pp. 49-51, 1999
The Scheme Proposed by G. Braudaway et al
( mn ,m - mt ) Yw Y
Y ' n ,m = Yn ,m + ( n ,m ) 2 / 3 DL *
m A - mt 38.667 Yw
n An approximately uniform color space is used, such as the CIE 1976 (L*u*v*)
space and the CIE 1976(L*a*b*)-space, so amounts of brightness increasing
and decreasing are perceptually equal for a fixed change occurred everywhere
in the color space
n Definitions
n Yn,m and Y’n,m: the brightness values of each pixel in the unmarked original and
the watermarked image
n Yw: the brightness of the “scene white”
white”
Other Enhancing Schemes
n [Meng and Chang]
n The same embedding model is extended to the DCT domain by simple statistic
model approximation for the convenience of processing directly in the MPEG-
compressed domain.
n [Kankanhalli et al]
n Local features related to the degree of distortion tolerances, such as edge locations,
texture distributions and luminance sensitivity, are taken into consideration so that
more unobtrusive watermarked images can be generated.
n Simple statistics of block-DCT coefficients are calculated and analyzed to decide
the watermark embedding energy of each block.
n Edge integrity will be preserved, in these approaches, since the edge
information is essential to maintain the image quality.
n And the energy of the embedded watermark is larger in highly textured areas
than in smooth ones due to different noise sensitivity.
n In additions, the watermark energy of mid-gray regions is also smaller than
other areas since the noises are more visible against a mid-gray background
n [S. P. Mohanty et al]
n in addition to the visibly embedded watermark, a fragile invisible watermark is also
adopted to check if the visible watermark is altered or not
Important observations (1/4)
n Attacking visible watermarking scheme means
successfully recover the watermarked area.
n Implication:
n Similar image processing techniques can be adopted
n Image recovery
n Object removal
Important observations(2/4)
n To clearly recognize the copyright patterns, the
contours of embedded patterns must be
preserved.
n Implication:
n An attacking scheme is effective if
1. The pattern is completely removed
2. The shape is seriously distorted without seriously
degrading visual quality.
Important observations(3/4)
n The perceptibility of the host image details
within watermarked area depends on the
preservation of edge information.
n Implication:
n Available information while attacking
n Surrounding pixels around watermarked area.
n Edge information within watermarked area is available
while attacking.
Important observations(4/4)
n The robustness lies in the inevitability of
exhaustive and expensive labors.
n Implication:
n Only minimum user intervention should be adopted
during attacking
n User selection of watermarked areas
Averaging Attacks
æ n N (i , j , n ) ö n
I (i, j ) = çç dL (i, j ) ×
t
n
÷ ÑI ( i , j )
÷
è N ( i , j , n ) ø
n Image inpainting
n is an iterative image recovery technique.
n prolongs the approaching isophotes into damaged areas.
n successfully reconstruct the edges of damaged area.
Basic Inpainting Attacks
Edge Area