Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong...

34
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu , Chwei-Shyong Tsai , Shu-Chuan Hu ang Speaker: Shu-Chuan Huang Date: May 4 , 2005

Transcript of Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong...

Page 1: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Colored Watermarking Technology Based on Visual Cryptography

Author: Hsien-Chu Wu , Chwei-Shyong Tsai , Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May 4 , 2005

Page 2: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Outline

• Introduction

• The proposed method

• Experimental results

• Conclusions

Page 3: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Introduction

• Watermarking Technology

• Colored Visual Cryptography

Page 4: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Watermarking Technology

primitive image

watermarkstego-image

Good digital watermarking :

1. Perceptual invisible

2. Security

3. Blindness

4. Multiple watermarks

5. Robustness

Page 5: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Colored Visual Cryptography

Page 6: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Colored Visual Cryptography (cont.)

Page 7: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Colored Visual Cryptography (cont.)

Page 8: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

The proposed method

The primitive gray-level image “Lena” Colored watermark

Page 9: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

The proposed method (cont.)

Page 10: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Random

Page 11: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

The proposed method (cont.)

Range of mean value

Mask

[0, 63]

[64, 127]

[128, 191]

[192, 255]

Mean:186

The color Masks of four kinds of mean values

Page 12: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

coding table

The proposed method (cont.)

Page 13: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Experimental Results

Share image 1 Share image 2

Page 14: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Experimental Results

The recovered image from two share images

Page 15: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Experimental Results (cont.)

( a ) The cropping attacked “Lena” ( b ) The recovered image from two share images of cropped “Lena”

Page 16: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Experimental Results (cont.)

( a ) The blurring attacked “Lena” ( b ) The recovered image from two share images of blurred “Lena”

Page 17: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Experimental Results (cont.)

( b ) The recovered image from two share images of sharpened “Lena”

( a ) The sharpening attacked “Lena”

Page 18: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Conclusions

• Provide high robustness by using Visual

Cryptography technique in Digital Watermarking.

• Keep the quality of primitive image.

Page 19: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Watermarking Technology

Based on BTC MethodAuthor: Hsien-Chu Wu, Chwei-Shyong Tsai, I-Su LeeSpeaker: I-Su LeeDate: May 4, 2005

Page 20: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Outline

Introduction

The Proposed method

Experimental results

Conclusions

Page 21: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Block Truncation Coding, BTC

221 212 189 177

213 194 182 184

192 179 187 199

179 186 200 169

512×512

Mean = (221+212+189+…+200+169)/16 = 191M1 = (221+212+213+194+192+199+200)/7 = 204M0 = (189+177+182+184+179+187+179+186+169)/9 = 181

<191 0

>191 1

1 1 0 0

1 1 0 0

1 0 0 1

0 0 1 0

bitmap

Page 22: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

BTC decompression

204 204 181 181

204 204 181 181

204 181 181 204

181 181 204 181

bitmap

<191 0

>191 1

0 181

1 204

1 1 0 0

1 1 0 0

1 0 0 1

0 0 1 0

Mean = (221+212+189+…+200+169)/16 = 191M1 = (221+212+213+194+192+199+200)/7 = 204M0 = (189+177+182+184+179+187+179+186+169)/9 = 181

Page 23: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

The Proposed method

8-bit grayscale image

binary watermark

Page 24: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Codebook design

min distance

128×128cover-image

codebook

Page 25: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Codebook design (cont.)

codebook

codebook0

codebook1

0

1

Page 26: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Watermark Embedding

codebook0

codebook1

cover-image

binary watermark

0

1stego-image

cover-image

binary watermark

Page 27: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Watermark Extraction (cont.)

stego-image

codebook0

codebook1

0

1

binary watermark

Page 28: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Experimental results

(a) Lena (b) Girl (c) F16

(d) Pepper (e) Splash (f) Tiffany

Page 29: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Experimental results (cont.)

Cover-image stego-image (unit:dB)BTC compression i

mage (unit:dB)

Lena 33.41009155 33.69390363

Girl 37.79463397 37.91506876

F16 30.92604062 31.29763583

Peppers 33.07814946 33.49940908

Splash 36.76107951 37.12370245

Tiffany 33.01723640 33.67697558

Comparison results (PSNR)

Page 30: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Experimental results (cont.)

(a) cropping attack

watermark

bit correct rate

= 0.89063

watermark

bit correct rate

= 0.88672

(b) cropping attack

Page 31: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Experimental results (cont.)

bit correct rate

= 0.88964

bit correct rate

= 0.86230

watermark

watermark

(c) cropping attack

(d) cropping attack

Page 32: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Experimental results (cont.)

bit correct rate

= 0.92969

bit correct rate

= 0.86035

watermark

watermark

(e) sharpening attack

(f) blurring attack

Page 33: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Experimental results (cont.)

Cover image

Lena 0.89063 0.88672 0.88964 0.86230 0.92969 0.86035

Girl 0.88965 0.87891 0.89063 0.86133 0.91406 0.81641

F16 0.88574 0.88769 0.88672 0.86035 0.92188 0.84375

Peppers 0.88574 0.88672 0.88965 0.86230 0.92578 0.73730

Splash 0.88574 0.88672 0.88671 0.86328 0.91992 0.81152

Tiffany 0.85253 0.85351 0.85352 0.84766 0.93554 0.87890

Average 0.88167 0.88005 0.88281 0.85954 0.92448 0.82471

Correct rate of six kinds of attacked watermark

(a) cropping

attack

(b) cropping

attack

(c) cropping

attack

(d) cropping

attack

(f) sharpening

attack

(g) blurring

attack

Page 34: Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.

Conclusions

The proposed method can embed watermark in compressed images directly.

It is simple and efficient to embed watermark in images with using BTC.

Stego-image has good image quality.