Escolar Documentos
Profissional Documentos
Cultura Documentos
AABFS-Jordan
Summer 2006
Watermarking
Outline
Definitions
Watermark : is a secret message that is
History
The Italians where the 1st to use watermarks in the
Watermarks Classification
1. Paper Watermark: Intended to be somewhat visible.
10
Paper Watermark
The technique of impressing into the paper a form,
image, or text.
Cannot be photocopied or scanned effectively
Purpose: To make forgery more difficult to record
the manufacturers trademark, Copyright
protection, logos, ect
Used in :
Currency, Banknotes , Passports,
11
Paper watermark
Example
vs. Invisible:
Fragile
vs. Robust :
13
14
Economically Implementable
4. Unambiguous
5. Capacity
6. Quality
15
Properties Tradeoff
Robustness
Quality
Capacity
18
Important Definitions
Cover : Audio-video, text in which data will be hidden
Watermark: What is actually added to the cover
Information: message to be added
Watermarking key: Secret parameter needed for
embedding & detecting the watermark & extracting the
information
Watermarking Function: Embedding & Extraction
algorithms.
19
Watermarking Process
Two major steps:
20
Cover + WM
Cover + WM
Watermarking Techniques
Text Varying spaces after punctuation, spaces in
between lines of text, spaces at the end of
sentences, etc.
Audio Low bit coding, random.
Images / Video Least-significant bit, random
22
Text Watermarking
Techniques: Varying spaces after punctuation, spaces in
between lines of text, spaces at the end of sentences,
etc.
Examples:
Line Shift Coding : Shift every other line up or down
23
Steps:
1.
2.
3.
Load up both the host image and the image you need
to hide.
Chose the number of bits you wish to hide the secret
image in.
Combine the pixels from both images
24
LSB - Example
00111100
01000010
10111101
10100001
10100001
10111101
01000010
00111100
25
Audio Watermarking
Low Bit Coding
Echo Data Hiding
26
Audio Watermarking
Low Bit Coding
27
Audio Watermarking
Echo Data Hiding
28
Video Watermarking
Video sequences consists of a series of consecutive
29
30
31
Attacks on Watermarking
Two Sets of Attacks
Unintentional
All image manipulations commonly used to
prepare images for print publication. For
example:
Intentional (Malicious)
33
34
Limitations / Conclusions
Rapidly growing field of digitized images, video and audio has
References
1.
2.
3.
4.
I. J. Cox and J.-P. Linnartz. Some general methods for tampering with
watermarks. IEEE Trans. on Selected Areas of Communications, 16(4):587
593, 1998.
37
References
http://www-nt.e-technik.uni-erlangen.de/~su/seminar
/ws99/slides/su.pdf
6. http://www.compris.com/TextHide
7. http://www.infosyssec.com/infosyssec/Steganography/
watermarkingAttack.htm
8. http://www.lnt.de/~hartung/ProcIEEEHartungKutter.pdf
9. http://www.watermarkingworld.org
10. http://wwwstu.hatii.arts.gla.ac.uk/Courses/digitisation
11. http://www.inria.fr/Watermarking
12. http://www.isg.rhul.ac.uk/msc/teaching/opt5/archive/20
02-03/slides/watermarking.pdf
5.
38
???
39