Académique Documents
Professionnel Documents
Culture Documents
2002/10/24 Room 418, NTU Library Building Lecturer: Chun-Hsiang Huang Communication and Multimedia Lab. Department of CSIE, NTU
Outline (I)
l Introduction
to digital watermarking
History and interesting facts Definitions, models, and importance Applications of digital watermarking Properties of digital watermarking
Outline (II)
l
What is a watermark?
l
Watermarking is an important mechanism applied to physical objects like bills, papers, garment labels, product packing Physical objects can be watermarked using special dyes and inks or during paper manufacturing.
Characteristics of watermarks
l
The watermark is hidden from view during normal use, only become visible by adopting a special viewing process.
E.g. hold the bill up to light
The term watermark was probably originated from the German term wassermarke. Since watermark is of no importance in the creation of the mark, the name is probably given because the marks resemble the effects of water on paper. Papers are invented in China over a thousand years ago. However, the first paper watermark did not appear until 1282, in Italy.
the 18th century, watermarks on paper in Europe and America had been used as trademarks, to record the manufactured date, or to indicate the size of original sheets. l Watermarks are commonly used on bills nowadays to avoid counterfeiting
Images
Video
Audio
Steganography Imperceptible data embedding Non-robust data embedding Visible data embedding
Fragile watermarking
Robust watermarking
Information hiding
l Data hiding Containing a large range of problem
Steganography
l
A term derived from the Greek words steganos and graphia (The two words mean covered and writing, respectively)
The art of concealed communication. The very existence of a message is kept secret. E.g. a story from Herodotus
l
messages contain information related the cover work l In steganographic systems, the very existence of the message is kept secret.
If the message tatooed on the slave is the
The sudden increase in watermarking interest is most likely due to the increase in concern over copyright protection of content copyright-protected digital contents are easily recorded and distributed due to:
Cryptography is the most common method of protecting digital content and is one of the best developed science. However, encryption cannot help the seller monitor how a legitimate customer handles the content after decryption. Digital watermarking can protect content even after it is decrypted.
Encryption
Decryption
Under Protection
watermarking:
Work: a specific copy of some electronic signal, such as a song, a video sequence, or a picture Cover Work: the original un-watermarked work, since it covers (hides) the watermark Watermark: the messages being embedded, indicating some information about the work
Watermark Embedder
Watermarked Work
Watermark Detector
Watermark Message
The first watermarking example similar to the digital methods nowadays appeared in 1954. The Muzak Corporation filed a patent for watermarking musical Work. An identification Work was inserted in music by intermittently applying a narrow notch filter centered at 1KHz. About 1995, interest in digital watermarking began to mushroom.
are imperceptible l Watermarks are inseparable from the works in which they are embedded l Watermarks undergo the same transformations as the work
Under the U.S. law, although the copyright notice is not required in every distributed copy to protect the rights of copyright holders, the award to the copyright holders whose work is misused will be significantly limited without a copyright notice found on the distributed materials. Traditional textual copyright notices Copyright date owner date owner Copr. date owner
Since watermarks are imperceptible and inseparable from the work, they are obviously superior to textual copyright notices.
Proof of ownership
copyright notices cannot be used to solve the copyright dispute since they can be easily forged l Registering every work to a central repository is too costly!
http://www.loc.gov/copyright $30 per document
l Textual
TV or radio advertisements should be monitored to prevent airtime overbooking! In 1997, a scandal broke out in Japan. Advertisers are paying for thousands of commercials that were never aired!
Broadcast monitoring
By human watchers Passive monitoring Active monitoring
monitoring
Comparing is not trivial Signal degraded due to broadcasting Management and maintenance of the database is quite expensive
Active monitoring
Simpler to implement Identification information can be directly decoded
reliably E.g.
l
Transaction tracking
l l
Watermarks recording the recipient in each legal sale or distribution of the work. If the work is misused (leaked to the press or illegally distributed), the owner could find out who is the traitor. Visible watermarking is often adopted in this application, but Invisible watermark is even better
DIVX Corporation sold a enhanced DVD player that implements a pay-perview model. l Each player will place a unique watermark in the video disk it played. l Once the video disk is recorded and sold, the adversary can be tracked!
Encryption is the first and strongest line of defense against illegal copy
Overcome an encryption mechanism
l
in copy control
watermark detector When a copy-prohibit watermark is detected, the recording device will refuse to copy The system has been envisioned by CPTWG and SDMI to protect DVD and audio
l Solution
Include the requirement for a watermark
Compliant player
Compliant recorder
Compliant recorder
Device control
l Copy
control belongs to a broader category - device control l Other applications of device control
Automatically turning on/off functions
l l
l l l
Effectiveness
l Effectiveness
of a watermarking system
often not the case due to other conflict requirements, such as perceptual similarity
l
False-alarm rate
l
The false alarm rate of the watermarking system used in DVD recorder should be lower than 1/1012
E.g. a false alarm occurred in a world-series
baseball game
original and the watermarked version of the cover work It is the similarity at the point at which the watermarked content is provided to the customer that counts
l
E.g. NTSC video or AM radio has different perceptual similarity requirements from the HDTV or DVD video and audio
similarity index
( c [ i ] - c ' [ i ])
N 2
i=1
c[i] l Finding a quality index completely reflecting the characteristics of the human perceptual model is difficult
i=1
Robustness (I)
l The
Robustness (II)
l Not
all watermarking applications require robustness to all possible signal processing operations. l There is a special class of watermarking techniques where robustness is undesirable
The fragile watermarking
Security
l
Eliminating attacks Masking attacks Collusion attacks Embed forgery watermarks into works that should not contain watermarks E.g. fragile watermarks for Authentication
Unauthorized embedding
l
Unauthorized detection
Data capacity
l The
number of bits a watermarking scheme encodes within a unit of time or within a work. l Different applications require different data capacities, e.g.
4-8 bits for a 5-minutes video of copy
Blind/informed detection
l Informed watermarking schemes The detector requires access to the un-
watermarked original
l
E.g.DVD copy control module E.g. An automatic image IPR checking robot
Multiple watermarks
l In
TV viewers to make a single copy of broadcast programs for time-shift watch. But further copies is not allowed .
l
Adding two watermarks instead of alternating the original watermark to avoid the risk caused by easily changing watermarks
Cost
l The
costs in deploying watermark embedders and detectors depends on the scenario and the business model.
Real-time constraint l Broadcast monitoring v.s. proof of copyright Embedder/detector constraint l Copy protection v.s. transaction tracking (DIV-X)
The CPTWG (Copy Protection Technical Working Group) tested watermarking systems for protection of video on DVD disks. The SDMI (Secure Digital Music Initiative) made watermarking a core component in their system for music protection. Two projects sponsored by the European Union, VIVA and Talisman, tested watermarking for broadcast monitoring. The ISO (International Organization for Standardization) took an interest in the context of designing advanced MPEG standards. (MPEG-21)
Companies with watermarking products bundled its watermarking system with Adobes Photoshop l Technology from the Verance Corporation was adopted into the first phase of SDMI and used by some Internet music distributors
l Digimarc
Watermarking for different media types watermarking l Audio watermarking l Image watermarking
LSB based scheme Spread spectrum scheme DCT-based scheme
l Text
l Video
spatial domain transform domain raw data compressed data random number visually recognizable pattern
Watermark
Comparison
Requirements
Invisibility Robustness No ambiguity
Watermark
Extraction
1
73 123 123 123 133 142 178
2
71 71 70 67 120 123 122 150
3
123 72 68 68 72 123 112
4
123 147 73 70 70 69 67
5
205 199 123 117 71 70 70
0 1 2 3 4 5
l l
Generate the random walk sequence for each watermark (e.g.. 00112) Force the LSB to match the watermark bit
m
Watermark
Original Watermark
Extracted Watermark
Watermark detector
Watermark generator
Audio Signal Hanning Window FFT Frequency Masking Information Scale Factor PN sequence M(w) w Quantization w+ original signal
Extract Envelop
Watermark detection
Embedded pattern
Simplified polygonal
Reference
C.T.Hsu and J. L. Wu, Hidden digital watermarks in
images, IEEE Trans. On Image Processing, vol 8., No.1, January 1999 C. H. Huang and J. L. Wu, A Blind Watermarking Algorithm with Semantic Meaningful Watermarks, 34th Asilomar Conference on Signals. Systems, and Computers, Pacific Grove, October, 2000. D. Y. Chen, M. Ouhyoung, and J. L. Wu, "A Shift-Resisting Public Watermark System for Protecting Image Processing Software", IEEE Trans. on Comsumer Electronics, Vol. 46, No. 3, pp. 404-414, Aug. 2000.
System overview
l Watermarks
are randomly permuted to spread their spatial relationship, and then embedded in the DCT domain of the host image, with consideration of invisibility/robustness
Watermarked Image
Extracted Watermark
Block DCT/IDCT
l Advantages
Fast Suitable for robustness against JPEG
compression
l Disadvantages
Block effect Effect of picture cropping
Watermarks can be verified with naked eyes by understanding the semantics of the extracted watermark patterns
Pseudo-Random Permutation
lA
n-bit Linear Feedback Shift Register (LFSR) is used to generate the maximal length (2n-1) sequence
+
Block-based Mapping
l
Watermark blocks with more signal pixels are embedded into image blocks with higher variances
to achieve better perceptual invisibility.
Polarity Reversing
l
Polarity: the inequality relationship between DC & corresponding AC values within each DCT block.
watermark bits: 0 1 0 1 0 0 1 polarity: reversed polarity: 1100101 1001100 XOR Extraction
Embedding
Embedding(1/2)
l
Low-frequency
l
High-frequency
l
=> Middle-frequency
l
Embedding(2/2)
l
Polarity:the inequality relations between the scaled DC value and the selected AC coefficients
AC (i, j ) DC * Q(i, j ) > * Q(0,0) 1, if P(i, j ) = Q(i, j ) ScaleFactor * Q(0,0) 0, otherwise
Extraction
l Exclusive-or
(XOR) operations are performed on the two polarity patterns to obtain the permuted binary data.
values is changed after embedding. The watermark extraction needs both polarity information from the original and the embedded images.
VideoVR System
l
Extraction
l Only
Extracted Watermark
IDCT
Extracted Watermark
Watermarked Image
Watermark Labeling
l Corresponding
reversed polarity:
Embedding
carefully adjusting watermarking parameters The experimental results show that no perceptible quality loss was found
Experimental Results(1/2)
System Demonstration
G. Braudaway, K.A. Magerlein, and F. Mintzer, "Protecting Publicly Available Images with a Visible Image Watermark," IS&T/SPIE Symposium on Elect. Imaging Sci. and Tech., Proceedings of Symposium on Optical Security and Counterfeit Deterrence Techniques, Feb. 1996. C. H. Huang and J. L. Wu, Attacking Visible Watermarking Schemes, accepted by IEEE Transactions on Multimedia
Visible Watermarking
+
l l
IPR protection mechanisms for images and videos that have to be released. Unobtrusive copyright patterns are recognizable after embedding.
perceptibility of copyright patterns (watermarks) l The perceptibility of host image details l Robustness
Difficult to remove unless exhaustive and
l Attacking
be adopted
l l
Important observations(2/4)
clearly recognize the copyright patterns, the contours of embedded patterns must be preserved. l Implication:
An attacking scheme is effective if 1. The pattern is completely removed 2. The shape is seriously distorted without seriously degrading visual quality.
l To
Important observations(3/4)
l The
perceptibility of the host image details within watermarked area depends on the preservation of edge information. l Implication:
Available information while attacking l Surrounding pixels around watermarked area. l Edge information within watermarked area is available while attacking.
Important observations(4/4)
l The
Averaging Attacks
Image Inpainting
n N (i , j , n ) n I (i, j ) I ( i , j ) = dL ( i , j ) N (i , j , n )
n t
M. Bertalmio, V. Caselles, and C. Ballester, Image inpainting, SIGGRAPH 2000, Aug. 2000 l Image inpainting
l is an iterative image recovery technique. prolongs the approaching isophotes into damaged areas. successfully reconstruct the edges of damaged area.
Inpainting Attacks
Attacks against visible watermarking are regarded as common image recovery problems. l Good results can be obtained for areas composed of thin copyright patterns, but areas composed of thick patterns cannot be successfully recovered.
l
After the user selects the watermarked areas, decompose watermarked areas into parts:
Areas composed of thin patterns
l
Classifying flat areas within watermarked area by analyzing remaining edge information of host images
Pixel values of the flat areas connecting the unwatermarked areas can be appropriately approximated by propagating that of surrounding unwatermarked areas.
The remaining areas can only be recovered by approximated prediction. The edge areas are recovered automatically by preserving the differences of intensity between edges and their surrounding flat areas, which may originally be unmarked or recovered in the previous step In order to recover the fully contained flat areas, the same algorithms applied to watermarked edge areas are adopted again.
Fragile Watermarks
l
Definition
A watermark likely to be undetectable after a work
is modified in anyway. If a watermark is found, we can infer that this work is probably not altered.
l
Applications
Content authentication against malicious
alternation
Example
LSB embedding
Resource
l
Books
Digital Watermarking, Ingemar Cox, Jeffrey Bloom, Matthew Miller,
Morgan Kauffmann Publishers,2002 Information hiding techniques for steganography and digital watermarking, Stefan Katzenbeisser, Fabien A. P. Petitcolas (Editors), Artech House Books, 1999
l
Website
Digital Watermarking World Digital Watermarking Links by Alessandro Piva Watermarking and Data Hiding by Frank Hartung
Papers