Multimedia Watermarking Techniques

advertisement
Multimedia Watermarking
Techniques
Frank Hartung and Martin Kutter
ECE 738
In Young Chung
Outline
1.
2.
3.
4.
Terminology
Requirement
Basic Watermarking Principles
Watermarking techniques for
1. Text Document
2. Image
3. Video
4. Audio
5.other media
5.
Conclusion
Terminology

Watermarking

Data hiding and data embedding

Fingerprinting and Labeling

Embedded signatures

Visible watermarks
techniques that allow secret communication, usually by embedding or hiding
the secret information
applications where the existence of the embedded data are publicly known, but
there is no need to protect it
special application of watermarking related to copyright protection
stand for watermark in early publication
visible pattern, like logos, inserted into images or video
Watermarking Requirements
1)
2)
3)
As much information as possible
 Capacity
Only be accessible by authorized parties
by means of cryptographic key
 security
Resist against hostile attacks
 Robusteness
Invisibility
Imperceptibility
Robustness
Capacity
4)
Imperceptibility
Supplemental W. Requirements
1)
2)
Watermark Recovery may or may not
allowed to use the original data.
Real time watermarking requirements
e.g., video fingerprinting (We will see this
later)
Design Issues





Watermark Security and Keys
Robustness
Imperceptability
Capacity
Watermark Detection
Robustness
Capacity
Imperceptibility
Basic Watermarking Principles

Three issues in the design of a watermarking system
1) Design of the Watermark signal
W  f0 (I , K )
or W  f 0 ( I , K , X )
2) Design of the embedding method
Y  f1 ( X ,W )
3) Design of the corresponding extraction method
^
I  g( X ,Y , K )
•
•
^
or
I  g (Y , K )
Where, W: watermark signal, I: watermark information.
K: key, X: host data, Y: watermarked signal
Basic Watermarking Principles

The public or secret key is used to enforce security

Many watermarking schemes use spread-spectrum methods
they add a PN signal with low amplitude to the host data.

Correlator is used for watermark detection
Watermarking Techniques
1. Text Document Watermarking
Text Document Watermarking
Two methods to hide information
1)
in the semantics; in the meaning and ordering
or the words
2)
in the format
* In the layout and the appearance
- Example of word shifting coding -
Text Document Watermarking;
Three coding methods
1)
2)
Line shift coding
*Assumption; lines are uniformly spaced
 doesn’t need original for watermark extraction
word-shift coding
*Assumption; space between words are usually variable
 needs original for Watermark extraction
3)
feature coding; slightly modifies the features

Goal: making watermark removal more expensive than obtaining
the right to copy from the copy right owner
Watermarking Techniques
2. Image Watermarking
Why is Image watermarking so important?
1) There is a large demand and productions
2) Most of watermarking research
 much more than video or audio watermark
Common ideas for Image
watermarking

A lot of watermarking methods are very similar and differ
only in parts

Three topics 1) watermark signal design
2) embedding
3) recovery (Detection)
I.
Watermark signal design
The watermark signal; typically a pseudorandom signal with
low amplitude
e.g., Gaussian, uniform, or bipolar pdf
* The watermark signal: often designed in spatial domain,
sometimes in DCT or block-wise DCT
Common ideas of Image
watermarking
ii.
Signal embedding (where?)
* embed watermark signal mostly to the
luminance channel alone
* sometimes in color channels
* in the spatial domain
* or in the DCT,DFT and DWT
(full-image DCT or block wise DCT domain)
advantage in terms of visibility and security
Common ideas of Image
watermarking

Argue?
about embedding domain
 Low, medium or high freq.?

For maximum robustness
 embed watermark signal adaptively
where the host data populate (typically the
low frequency)
Common ideas of Image
watermarking
iii.
Recovery (Detection)
* Usually done by correlation method; a
correlation receiver or a matched filter
Acknowledgements

The Following slides organized by Author
name

The author of this paper put stress on
embedding domain/methods So, we will
mainly deal with embedding domain/method of
numerous watermarking methods
Tirkel

Publication: “Electrical Water Mark” in 1993

Proposal
m-sequence PN code embedding in LSB plane

* To gain full access to the LSB plane without much distortion
 compress original image to 7 bits through histogram manipulation

the decoding process use the unique and
optimal autocorrelation of m-sequences
Matsui and Tanaka

Publication: “Video Steganography: How to secretly Embed
a Signature in a picture”

Proposal
Predictive code schemes using key table
* exploit correlation between adjacent pixels by coding the
prediction error instead of coding the individual gray scale
value

 i  X i  X i 1

And embed a watermark in forms of a binary string
Smith

New approach

Digital watermarking and digital
modulation (especially, direct sequence
spread spectrum modulation) share
similar concepts

More in depth analysis of 2-D amplitude
modulation was given by Hernandez
Bender


I.
Proposal
2 Methods
Patchwork
1. randomly selected pairs of pixels (ai , bi ) Are
used to hide 1 bit by increasing the ai’s by one
and decreasing the bi’s by one
2. The expected value of the sum of N pixel
pairs
ContII.
Texture Block Coding
1. Watermark is embedded by copying one
image texture block to another area in the
image with similar texture
2. Recovery- autocorrelation
* Remarkable point- high robustness to any
kind of distortion, since both image area
distorted in a similar way autocorrelation still
works
Pitas and Kaskalis

Proposal

Signature casting on digital images
- based on same basic idea as the patchwork
1. The watermark S  {sm,n } is the same size as the original
image (here, # of ones = # of zero)
2. The original image is divided into two sets A and B of
equal size
I : Original Image , xmn : Luminance value
Contn3. The watermark is superimposed by changing
the elements of the subset A by positive factor k
A'  {xmn  k , xmn  A}
*k is positive integer
4. The watermarked image is given by the union of
A’ and B
Langelaar


Proposal
Block base spatial watermarking
- Improved version of previous method
1.
2.
3.
4.
5.
The image is tiled into square blocks (8x8)
Each block is selected pseudorandomly
To embed “1”, k x P added to the block
To embed “0”, k x P subtracted to the block
Each selected block has a PN pattern P
* k: scaling factor, P : PN pattern
Bruyndonckx


Proposal
Watermarking with the use of pixel classification
Purpose- increase the performance of the block base spatial
watermarking methods
1. Select blocks (PN) & classify the block based on three types of
contrast between zones; hard, progressive and noise contrast
2. Each zone subdivided into two categories A and B based on
gird defined by the coder
3. Each pixel is assigned to one of four zone/category
combinations e.g., 1/A,…2/B
Cont4. A bit b is embedded by modifying the zone/category means
to satisfy the following constraints
m1*A ...m2* B: the modified zone/category mean values
S: the watermark embedding strength
5. the modification of the mean values is done by applying equal
luminance variations for all pixels belonging to the same zone
7. To increase robustness the authors suggest to perform
redundant bit embedding and use error correcting codes
6. Good robustness to JPEG compression is reported
Kutter

Proposal
Improved spread-spectrum watermarking in the spatial
domain
* Exclusively works with the blue image component, in the
RGB color space maximize the watermarking strength and
minimize visual artifacts
* preprocess the image prior to watermark decoding
increased robustness, applicable to any spread-spectrum
spatial domain watermarking
Cont1. A single bit b is embedded at a
pseudorandomly selected location (I,j) by either
adding or subtracting (Amplitude modulation)
Where Bi, j describes the blue value at location (I,j)
Li , j :the Luminance at the same location
 : the embedding strength
Cont2. To recover an embedded bit, an estimate of original value is
computed
c : the size of the cross-shaped neighborhood
3. The bit value is determined by looking at the sign of the difference
^
 i , j  Bi , j  Bi , j
*To increase robustness, (Author suggest) each signature bit is
embedded several times and to extract, the sum of all differences  i, j is
used
Macq

Proposal
Watermarking adapted to the HVS using masking and
modulation
1. The watermark in spatial domain is low-pass filtered,
frequency modulated, masked and then added to the host
image
2. A secret key is used to determine the modulation freq.
3. Masking uses an extension of the masking phenomena
for monochromatic signals, called gratings

Recovery- demodulation followed by a correlation function
Voyatzis and Pitas

Proposal
Watermarking by inserting logo like patterns using torus
automorphism
* A 2-D torus automorphism: a kind of spatial
transformation
* It is defined by
* Iterated action of A on a point
system expressed by
 0 form a dynamical
Cont* This system mixes the point in chaotic way.
* Under certain circumstances, the
automorphisms may have periodicity
1-iteration

2-iteration
10-iteration
T-iteration
…
Cont
How/where to embed?
1. Watermark is mixed using the automophism
AN
2. then, overlaid on a selected block in the original image
e.g., LSB

Recovery- extracting the mixed watermark
then, reconstruct the watermark using the automorphism AT  N
* Where, T is the automorphism period.
Raymond and Wolfgang


Proposal
Watermarking technique to verify image
authenticity based on an approach similar to the
m-sequence approach
1. A random sequence generated is mapped
from {0,1} to {-1,1}, arranged into a suitable
block and added to image

Recovery – overlays the watermarked block with
the watermark block and compute inner product
and compares the result with ideal value
Cont-


The test statistics

If the watermark is unchanged ,
=0
When  is greater than a defined tolerance, the
block fails the watermark test

is defined as

Chen and Wornell


Proposal
Quantized Index Watermark (QIM)
*Please recall even-odd embedding and predictive coding
scheme using table
*Not based on spread-spectrum modulation but,quantization
modulation
*Based on a set of N-dimensional quantizers.
*Quantizers – satisfy a distortion constraint
- each reconstruction values from one
quantizer are ‘’far away’’ from the others
1. The message to be transmitted is used as in index for quantizer
section
2. Selected quantizer is used to embed information
3. Spatial or DCT domain used
Koch


Proposal
Efficient watermarking in DCT domain for JPEG (first
introduction)
1. The image is divided into square blocks of size 8x8 for
which the DCT is computed
2. From a pseudoramdomly selected blocks, a pair of
midfrequency coefficients are selected from 12 predetermined
pairs
3. To embed a bit- the coefficient are modified such that the
difference between them (a pair of coefficient) is positive or
negative
* Good robustness – JPEG (Q=50%)
Swanson


Proposal
DCT domain watermarking technique, Based on frequency
masking of DCT blocks
1. Input image is split up in to square matrix and DCT is
computed
2. Frequency mask is computed based on the knowledge
that a masking grating raises the visual threshold for signal
gratings around the mask freq.
3. The resulting perceptual mask is scaled and multiplied by
PN(DCT)-sequence
4. This watermark is added to the corresponding DCT block
Podilchuk


Proposal
Perceptual watermarking using the just noticeable difference
(JND) to determine an image-dependent watermark modulation
mask
I u ,v ; the transform coefficients of the original image
wu ,v ; the computed JND based on visual models
JNDu ,v
; the watermark values

Recovery- based on the correlation
* Robust to JPEG compression, cropping, scaling and additive
noise
Boland and Cox

Proposal
Frequency-domain watermarking (First)

perceptual adaptive methods which is based on modulation

1. Generate the watermark with statistical distribution ; e.g.,
N(0,1)
2. The watermark is inserted into the image
Cont* ; determine the strength
* The watermark embedded 1000 strongest DCT
coefficients

Detection- given by the normalized correlation
coefficient
* Boland propose a similar techniques – DCT,
DWT, Walsh-Hadamard, FFT
Summary







Several different image watermarking methods
Most watermarking methods are based on the same basic
principle
- small, pseudorandom changes are applied to selected
region; spatial or transform domain
Recovery – correlation-like similarity measures.
Usually, the number of modified coefficient is much larger
than the number of bits to be encoded
Embedding domain have a influence on the robustness
 spatial – less robust to noise like attack / E.g.- JPEG
- more robust to cropping, translating.
 freq. – less robust to cropping which destroy the
embedding water mark (DCT,DFT,DWT)
Watermarking Techniques
3. Video Watermarking
Common idea for video watermarking

Video sequences consists of a series of consecutive and
equally time-spaced still images
 in general, very similar with image watermarking so,
image watermark method is applicable to video directly

Important differences
* available signal space;
for image; very limited
for video; much larger signal space (# of pixels)
*video watermark imposes real or near real-time
watermarking system
 complexity issue is much more important
Cont
The structure of video as a sequence of images give rise to
particular attacks
 frame averaging, frame dropping and frame swapping
(Only in video)

Two competing requirements
*A good watermarking scheme
1. may recover the full watermark from a short part of the
sequence
2. distribute watermark information over several consecutive
frame to have robustness against frame dropping
 depends on application

Compressed/ uncompressed video
Hartung and Girod


Proposal
Watermarking of compressed video for fingerprint
application
* Used spread spectrum approach and added an additive
watermark into video
* The watermark is generated using a PN signal with the
same dimension as the video signal
*Each information bit is redundantly embedded into many
pixels
1. For each compressed video fame, 8x8 DCT transformed
watermark signal is added to DCT coefficient of the video
Cont*This method done for I,P, and B frames
* Rate control- by comparing each encoded watermarked
DCT coefficient versus the corresponding encoded
unwatermarked coefficient
(because video steam use variable length coding, the
watermarked signal may or may not need more bits
encoding than the unwatermarked one)
 If more bits required, the coefficient is not used for
embedding

Recovery – correlation using the same PN sequence used
for generation of watermark
Jordan


Proposal
Watermarking of compressed video that embed information in
motion vector of motion -compensated prediction schemes.
1. Motion vectors slightly modified in pseudorandom way

Watermark embedding/detection available as long as the video
is in compressed format

After decompression?
 the watermark still be recovered by recompressing and
detecting

Artifacts? Because the blocks pointed to by the original and the
modified vector are very similar no visible artifacts
Hsu and Wu


Proposal
Watermarking for compressed video using middle-freq DCT
* Extension of their image watermarking method
1. modifies middle freq DCT coefficients in relation to spatially
(I-frames) or temporally ( for P- and B- blocks) neighboring
block
* Prior to embedding, the watermark signal is spatially
scrambled to make it robust to cropping

Drawback- for watermark extraction, original video and
watermark should be known
Langelaar


Proposal
2 methods
1) data hiding method
1. adds the label directly in the MPEG bit stream by
replacing variable length codes (VLC) of DCT coefficient
* In MPEG-2 code tables there are pairs of code which
represent the same run and levels that deviate only by one
from each other
We can choose one as bit “1” the other as “0”

Drawback- the label can be easily removed by
decompression and recompression
Cont2) watermarking
1. for each bit to be embedded, a set of n 8x8-block is
pseudorandomly taken from the video frame
(here, n typically 16~64)
2. Seudorandomly divide into two subsets of equal size.
3. For each subset, the energy of the high-freq. DCT
coefficient is measured
4. In order to embed the bit, the energy of the high-freq
coefficient in one or the other subset is reduced by
removing high freq. coefficients
Cont-
Block diagram of watermark embedding into DCT coefficients of compressed video

Recovery - 1. select the same set of blocks
2. divide it into the same subsets
3. Compare the energy of the high-freq.
coefficient in each of the subsets
* Here, We can use the secret key for the selection of blocks
Cont
Drawbacks
1. robustness is limited
2. Re-encoding increases the error rate of the embedded
signal much
Swanson


Proposal
Multiscale watermarking method working on uncompressed
video
*Same scheme as Image watermarking
1. video sequence is segmented into scenes
2. temporal wavelet transform is applied to each scenes,
yielding temporal low-pass and high-pass frames
3. the watermark is embedded into each of the temporal
components (here, low-freq.)
4.Inverse transform the watermarked components to get the
watermarked video
Cont
Interesting properties
The watermark has some components that change over time,
since they are embedded in low frequency coefficient
 this allow robustness against frame averaging, frame
dropping

Drawback- very high complexity
Linnartz


Proposal
Embed information in the GOP structure of the
MPEG-2 compressed video
*There is a maximum distance between two
successive I-frames
*The frame type signaled in the frame header
and can be switched randomly from frame to
frame.
Cont* A typical GOP in display order (N=12)
* If I-frame is fixed we have 2048 variations
*However, most available video codecs never use most of the admissible
GOP structure
 purposely use irregular GOP structure, that are very unlikely, to embed
information

Drawback- use this method only during compression
- decompress and recompression will remove this information
completely

Merit - Low complexity
Darmstaedter


Proposal
Embed a spatial-domain low-pass spread spectrum
watermark into 8x8 pixel blocks of video sequences
1. The blocks are classified according to their activity
*Low activity are not watermarked
2. Low-pass pseudorandom pattern is added to each block
* Each block conveys one bit watermark information
Cont* The block repeated over several blocks and
several frames for robustness

Recovery-done in spatial domain after
decompression using correlation concept with
threshold
Deguillaume


Proposal
Spread spectrum watermark into 3-D
block of video using 3-D DFT
* Embed a spread spectrum watermark
into 3-D blocks of video by employing a
3-D DFT and add to the transform
coefficients
Busch


Proposal
Apply a still-image watermarking method
working on DCT blocks to video sequences
1. The watermarks are embedded into the
luminance component of umcompressed video
and retrieved after decompression
*In order to improve the invisibility of the
watermarks, especially at edge, blocks are
selected depend on activity (high-activity block
selected)
Cont
Recovery- 0~50% error rate are reported
depend on the sequence
the author propose to embed the watermark
into several consecutive frames
(over 50frame a few percent error rate
reported)
Kalker


Proposal
Video Watermark for video broadcasting
monitoring application
*Called JAWS (just another watermarking system)
* For low complexity, both watermarking and
detection are performed in the spatial domain
watermarking before compression
detection after decompression
Cont* The watermark size is 128x128 and repeated (tiled) to fill
whole video frame
* To avoid visible artifacts, the watermark is, on a pixel-bypixel basis, scaled with scale factor
* Scale factor is derived from an activity measure
* Activity measure is computed using a Laplacian high-pass
filter

Detection- correlation detector is used
- in case of presence of spatial shift, a search
over all possible shift is performed
(128x128 position)
Summary

The proposed methods span a wide complexity
range from low complexity to considerable
complexity
 In general, the more complex methods
provide higher robustness

Most methods operate on uncompressed video;
a few methods embed watermark directly into
compressed video
e.g., DCT embedding or the motion vector
embedding, GOP structure embedding
Watermarking Techniques
3. Audio Watermarking
Common ideas for audio
watermarking

Compared to image and video, audio
signal has much less samples per time
interval
 amount of information which can be
embedded is much lower

HAS (Human Audible System) is much
more sensitive than the HVS
Boney


Propose
A spread spectrum approach
* PN sequence is filtered in several stage to
exploit masking effects of the HAS
* The watermark is low-pass filtered by using
full audio compression/decompression scheme
to guarantee that it survive audio compression
Tilki and Beex


Propose
interactive television application where they embed information into
the audio components of a television signal
1. The information to be embedded is partitioned in blocks of 35bits
2. Each information bit is modulated using a sinusoidal carrier of a
specific frequency with low amplitude and added to audio signal
 if the sinusoidal carrier for a specific bit is present=> “1”
 otherwise => “0”
* The frequencies of the sinusoidal carrier are above 2.4 kHz
 To reduce interference from the audio signal , the audio signal is
attenuated at frequencies above 2.4 kHz
Bender


Propose
phase coding
; use the phase information as a data space
1. For encoding, a Fourier Transform is applied and the
phase value of each freq. component are lined up as matrix
2. Binary information can be added into this matrix by
modifying the phase component.
* HAS is not very sensitive to the phase distortion of the
sound
Watermarking Techniques
4. other Multimedia DATA
Ohbuchi


Propose
embed visible and invisible watermarks into 3-D polygonal
models
* This model comprise primitives like points, lines, ploygons,
and ployhedrons
* Modify geometry or topology for watermarking

2 methods
1) pseudorandomly selects sets of four adjacent triangles
* embed information by displacing the vertices of the four
triangles
 up to 1% of the shortest edge of the rectangular
bounding box of the entire 3-D model
Cont
2) pseudorandomly selects tetrahedron from the
mesh and embeds information in the volume
ratio of consecutive tetrahedron by modification
of the vertices
Hartung

Proposal

A spread-spectrum method for watermarking of MPEG-4 FAP’s
*MPEG-4 features model-based animation 3-D head modules using
FAP (Facial Animation Parameter)
*There are FAP like “rotate head”, “open mouth” or “raise right cornerlip”
1. In order to embed information, the parameters first have to be
estimated from the sequence
2. The watermarks are embedded into the animation parameter
*Adaptive amplitude attenuation prevent visible distortion of animated
head level.
Cont* Interesting point is that the watermark is not
embedded in pixels but in the semantics( the
way the head and face move)
Conclusion





We reviewed the most important aspects
 design requirements, system issues, and
techniques for digital watermarking
We have elaborated on numerous watermarking
techniques for still images, video, audio, text,
and other multimedia data.
Majority of techniques are similar and based on
modulation with a PN signal.
Hypothesis test using correlation is used in the
watermark recovery
Although working systems are available,
research has to continue
Thanks for your attention
- Questions? -
Download