Beruflich Dokumente
Kultur Dokumente
Overview
1. Introduction
2. Digital Watermarking
3. Attacks
4. Algorithm of Zhao/Koch
5. Conclusion
Overview
Prelude
Prelude
1. Introduction
In former times...
Traditional content media yield degraded content when
copied:
1. Introduction
paper documents,
analogue recordings,
celluloid film,
canvas paintings, and
marble sculptures
Nowadays...
1. Introduction
Example
1. Introduction
Robbie Williams
Definition
Aspect of
Security
Description
Example
Access Control
Control of access to
a system and
limitations to system
functions and data
Proof of identity of
the author and
genuineness of a
document
Ensures that
unauthorized users
cannot access data
Proof that the data
are unaltered
Firewall
Protects intellectual
property
Digital
Watermarks
Authentification
1. Introduction
Confidentiality
Integrity
Copyright
Digital
signature,
digital
watermarks
Encryption
Digital
signature
2. Digital Watermarking
2. Digital Watermarking
Practical Approach
Substitutional steganography:
A noisy component of the digital message is substituted by an
encrypted secret message.
2. Digital Watermarking
Constructive steganography:
The secret message is not included by means of replacement, but
by means of reproduction of noisy signals, based on the model of
the original noise.
Types of watermarks
2. Digital Watermarking
3. Attacks: unintentional
3. Attacks
Attacks: intentional
Intentional attacks:
3. Attacks
watermark removal/interference:
denoising, compression, quantization, remodulation, blurring,
averaging,...
Desynchronization (detector disabling):
cropping, affine and projective transforms, jittering, mosaicing,
collage,...
Cryptographic:
key determination (brute force), Oracle attack (i.e., generate
unmarked data by trial and error)
Protocol:
copy attack, printing/rescanning,...
Example (I)
3. Attacks
original
original
wavelet compr.94%
warp
mosaic
3. Attacks
Example (II)
Constraints
visibility
3. Attacks
capacity
robustness
4. Algorithm of Zhao/Koch
4. Algorithm of Zhao/Koch
Jian Zhao and Eckhard Koch:
Embedding robust labels into images for copyright
protection.
In: Proc. of the International Congress on Intellectual
Property Rights for Specialized Information, Knowledge
and New Technologies. Vienna, Austria, August 1995.
http://www.mediasec.com/know/papers.html
4. Algorithm of Zhao/Koch
Fundamentals (I)
4. Algorithm of Zhao/Koch
Position
Sequence
Generator
Ts(y, Uk)
Position Sequence
(PS)
Label
Embeddin
g System
Labelled Image
(y)
Label Code
(C)
write a watermark
Fundamentals (II)
Image Data
(y)
4. Algorithm of Zhao/Koch
Position
Sequence
Generator
Ts(y, Uk)
Position Sequence
(PS)
Label
Retrieval
System
Embedded Code
(C)
read a watermark
Remarks
4. Algorithm of Zhao/Koch
Framework(write)
4. Algorithm of Zhao/Koch
Algorithm: Framework(write).
(1) If i n, return.
(2) Randomly select a block b, using the position sequence
generation function Ts(Uk, y).
(3) If b exists already in B, go to (2), otherwise add b to B.
(4) Call check_write(b, ci) to check weather b is a valid block: if
this function returns False, go to (2).
(5) Call write(b, ci) to embed a bit ci to the block b.
(6) Increment i, go to (1).
Framework(read)
4. Algorithm of Zhao/Koch
Algorithm: Framework(read).
(1) If i n, return.
(2) Randomly select a distributed or a contiguous 88 block b,
using the position sequence generation function Ts(Uk,y).
(3) If b exists already in B, then go to (2), otherwise add b to B.
(4) Call check_read(b, ci) to check weather b is a valid block: if
this function returns False, go to (2).
(5) Call read(b) to retrieve a bit from the block b.
(6) Increment i, and go to (1).
4. Algorithm of Zhao/Koch
check_write(b, ci)
write(b, ci)
check_read(b, ci)
read(b, ci)
Image
encoder
Pixel
DCT
Block
Quantization
Entropy
encoding:
run length
Huffman
arithmetic
4. Algorithm of Zhao/Koch
Visual Perception
Possible Positions
l
2 3
0
2 3
1
9 10 11
2 16 17 18
3
4
5
6
7
0
4. Algorithm of Zhao/Koch
4. Algorithm of Zhao/Koch
Demonstration
5. Conclusion
We have not...
... detailed any precise algorithm.
... discussed other media than images. For audio, this would e.g.
mean entering the field of research on human audible properties.
... discussed the various attacking algorithms like e.g.
STIRMARK.
5. Conclusion
We have...
... given an introduction and an overview on the purpose of digital
watermarking.
... outlined the challenge of creating a robust algorithms to
unintentional and intentional attacks.
... restricted our considerations on images.
Information...
Claudia Schremmer
University of Mannheim, Germany
Department Praktische Informatik IV
Information...
http://www.informatik.uni-mannheim.de/informatik/pi4
schremmer@informatik.uni-mannheim.de