![Page 2: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/2.jpg)
Agenda
• Background
• Terminology
• Applications
• Techniques
• Research topics
• References
![Page 3: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/3.jpg)
Information Hiding
• Information Hiding…..started with
Steganography (art of hidden writing):
The art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of
the message. The existence of information is secret.
Stego – Hidden , Graphy – Writing ‘art of hidden writing’
![Page 4: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/4.jpg)
Steganography (dates back to 440 BC)
• Histaeus used his slaves (information tattooed on a slave’s shaved head )
Initial Applications of information hiding Passing Secret messages
![Page 5: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/5.jpg)
Microchip - Application
• Germans used Microchips in World War II
Initial Applications of information hiding Passing Secret messages
![Page 6: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/6.jpg)
What is a watermark ?What is a watermark ? A distinguishing mark
impressed on paper during manufacture; visible when paper is held up to the light (e.g. $ Bill)
Application for print media authenticity of print media
![Page 7: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/7.jpg)
What is a watermark ?Digital Watermarking: Application of Information
hiding (Hiding Watermarks in digital Media, such as images)
Digital Watermarking can be ? - Perceptible (e.g. author information in .doc) - Imperceptible (e.g. author information in images)
Visibility is application dependent
Invisible watermarks are preferred ?
![Page 8: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/8.jpg)
Applications
Copyright Protecton:To prove the ownership
of digital media
Eg. Cut paste of images
Hidden Watermarks represent the copyright information
![Page 9: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/9.jpg)
Applications
Tamper proofing: To find out if data was tampered.
Eg. Change meaning of images
Hidden Watermarks track change in meaning
Issues: Accuracy of detection
![Page 10: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/10.jpg)
Applications
Quality Assessment: Degradation of Visual Quality
Loss of Visual Quality
Hidden Watermarks track change in visual quality
![Page 11: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/11.jpg)
Comparison
• Watermarking Vs Cryptography
Watermark D Hide information in D
Encrypt D Change form of D
![Page 12: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/12.jpg)
Watermarking Process
• Data (D), Watermark (W), Stego Key (K), Watermarked Data (Dw)
Embed (D, W, K) = Dw Extract (Dw) = W’ and compare with W (e.g. find the linear correlation and compare it to a
threshold)
Q. How do we make this system secure ? A. K is secret (Use cryptography to make information hidden more
secure)
![Page 13: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/13.jpg)
Watermarking ProcessExample – Embedding (Dw = D + W)
• Matrix representation (12 blocks – 3 x 4 matrix)
(Algorithm Used: Random number generator RNG), Seed for RNG = K, D = Matrix representation, W = Author’s name
1
5
2 43
6
10
7
11 12
8
9
![Page 14: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/14.jpg)
Watermarking ProcessExample – Extraction
• The Watermark can be identified by generating the random numbers using the seed K
1
6
10
8
![Page 15: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/15.jpg)
Data Domain Categorization
• Spatial WatermarkingDirect usage of data to embed and extract Watermark
e.g. voltage values for audio data
• Transform Based WatermarkingConversion of data to another format to embed and extract.
e.g. Conversion to polar co-ordinate systems of 3D models, makes it robust against scaling
![Page 16: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/16.jpg)
Extraction Categorization
• Informed (Private) Extract using {D, K, W} • Semi - Blind (Semi-Private) Extract using {K, W}• Blind (Public)
Extract using {K}
- Blind (requires less information storage)- Informed techniques are more robust to tampering
![Page 17: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/17.jpg)
Robustness Categorization
• Fragile (for tamper proofing e.g. losing watermark implies tampering)
• Semi-Fragile (robust against user level operations, e.g. image compression)
• Robust (against adversary based attack, e.g. noise addition to images)
This categorization is application dependent
![Page 18: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/18.jpg)
Categorization of Watermark
Eg1. Robust Private Spatial Watermarks
Eg2. Blind Fragile DCT based Watermarks
Eg3. Blind Semi-fragile Spatial Watermarks
![Page 19: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/19.jpg)
Watermarking Example
Application: Copyright Protection
Design Requirements:
- Imperceptibility
- Capacity
- Robustness
- Security
![Page 20: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/20.jpg)
Imperceptibility
Stanford Bunny 3D Model Visible Watermarks in Bunny Model Distortion
Watermarking
Stanford Bunny 3D Model
Watermarking
Invisible Watermarks in Bunny Model Minimal Distortion
![Page 21: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/21.jpg)
Robustness
Adversaries can attack the data set and
remove the watermark.
Attacks are generally data dependent
e.g. Compression that adds noise can be used as an attack to remove the watermark. Different data types can have different compression schemes.
![Page 22: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/22.jpg)
Robustness
• Value Change Attacks
- Noise addition e.g. lossy compression
- Uniform Affine Transformation e.g. 3D
model being rotated in 3D space OR
image being scaled If encoding of watermarks are data value dependent
Watermark is lost Extraction process fails
![Page 23: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/23.jpg)
Robustness
• Sample loss Attacks
- Cropping e.g. Cropping in images
- Smoothing e.g. smoothing of audio
signals e.g. Change in Sample rates
in audio data change in sampling rat
results in loss of samples
If watermarks are encoded in parts of data set which are
lost Watermark is lost Extraction process fails
![Page 24: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/24.jpg)
Robustness
• Reorder Attack- Reversal of sequence of data values e.g.
reverse filter in audio signal reverses the order of data values in time
If encoding is dependent on an order and the order is changed Watermark is lost Extraction process fails
1 2 3 123Attack
0 1 1 1 1 0
Samples in time Samples in time
![Page 25: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/25.jpg)
Capacity
• Multiple Watermarks can be supported.
• More capacity implies more robustness since watermarks can be replicated.
Spatial Methods are have higher capacity than transform techniques ?
![Page 26: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/26.jpg)
Security
• In case the key used during watermark is lost anyone can read the watermark and remove it.
• In case the watermark is public, it can be encoded and copyright information is lost.
![Page 27: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/27.jpg)
Watermarking Algorithm Design Requirements
As much information (watermarks) as possible
Capacity Only be accessible by authorized parties
Security Resistance against hostile/user dependent
changes Robustness Invisibility Imperceptibility
![Page 28: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/28.jpg)
Tamper proofing
• Robustness against user related operations – compression, format conversion
• Accuracy of Detection – Only changes in meaning should be detected
![Page 29: Digital Watermarking Parag Agarwal {pxa016500@utdallas.edu}](https://reader035.vdocuments.site/reader035/viewer/2022081419/56649dd95503460f94acf6d0/html5/thumbnails/29.jpg)
References
• http://en.wikipedia.org/wiki/Steganography
• http://en.wikipedia.org/wiki/Digital_watermark
• http://www.cypak.com/pictures/med/Cypak%20microchip.jpg
THANK YOU !