1 / 20

Secure Spread Spectrum Watermarking for Multimedia

Secure Spread Spectrum Watermarking for Multimedia. Ishani Vyas CS590 Winter 2008. Agenda. To explain about watermarking characteristics How to insert watermark in spread spectrum Structure of the Watermark Experimental Result. Characteristics of Watermarking. Unobtrusive

moswen
Télécharger la présentation

Secure Spread Spectrum Watermarking for Multimedia

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SecureSpread SpectrumWatermarking for Multimedia Ishani Vyas CS590 Winter 2008

  2. Agenda • To explain about watermarking characteristics • How to insert watermark in spread spectrum • Structure of the Watermark • Experimental Result

  3. Characteristics of Watermarking • Unobtrusive Perceptually invisible or presence should not interfere with work being protected • Robust Difficult to remove. May be removed sufficient knowledge of the process of insertion. Available of Partial Knowledge-Result in degradation in data fidelity. Watermark should be robust to Common Signal Processing-should be retrievable even if its operations are applied to the data. For example D/A&A/D conversion,resampling ,requantization.  Common geometric distortions (image and video data)- Watermarks in image and video data should be immune from geometric image operations such as rotation, translation, cropping and scaling Collusion and Forgery- Watermark should be robust to collusion by multiple individuals who each posses a watermarked copy of data.

  4. Cont Watermark should be robust to combining copies of same data set to destroy the watermarks • Universal – apply same digital watermark algorithm to all three media under consideration. • Unambiguous- Retrieval of the watermark should unambiguously identify the owner.

  5. Why need of Spread Spectrum watermarking • The previous methods have not explicitly identified the perceptually most significant components of a signal as the destination for the watermark. • Key insight of this paper is that the watermark must be placed in perceptually significant regions of the data despite the risk of potential fidelity distortions. • Apply watermarking in significant spectral components of a signal. • How common signal transformations, (i.e compression, quantization and manipulation) affects the frequency spectrum of a signal. • Watermark should be embedded in the data`s perceptually significant frequency components. • But how to insert watermark into significant components of frequency spectrum without any distortions.

  6. Watermarking in frequency domain

  7. Lossy compression is an operation that usually eliminates perceptually non-salient components of an image or sound. • To preserve watermark in the face of such an operation, watermark must be placed in the perceptually significant regions of the data.Data loss usually occurs among the high frequency components . • Geometrics distortions specific to image and video.(Rotation,scaling ,translation,cropping)- minimum 4-9 points between the original and the distorted watermark image..Again loss of data at high frequency spectral regions of the image. • Common signal distortion(D/A&A/D, resampling ,requantization, including dithering and recompression and common signal enhancements to image contrast/or color)

  8. Spread Spectrum coding of watermark • How to insert the watermark into most significant region of an spectrum without such alteration become noticable.

  9. Structure of Watermark

  10. Experimental Result

  11. Watermarked image

  12. Experiment 1:Uniqueness of Watermark

  13. Experiment 2:Image Scaling

  14. Experiment3: JPEG coding distortion

  15. Experiment 4:Dithering Distortion

  16. Experiment 5:Clipping

  17. Experiment 6:Print ,Xerox or scan

  18. Experiment 7:Attack by watermarking watermarked image

  19. Experiment 8:Attack by collusion

More Related