Monday, 20 December 2010

LSB (least significant bit) Replacement Technique

Lately at university, I have been doing the watermarking project. Basically the project is focused on digital watermarking (on images).
One of the first tasks is about LSB (least significant bit) replacement. The idea behind this watermarking technique is the following: if you see you image as a matrix NxM (where N and M are the dimension of the image) you can represent the value of the pixel in the position (i,j) as a binary number; this binary can be then divided in all of its bit, so that you will have a most significant bit (the one that contains quite a lot of information, and a least significant bit that contains few information).
If your image is for example in gray scale, you can make changes to the value of the LSB without any perceptible distortion for the human user therefore you can think of taking the LSB of an image (the cover image) and change its value in every pixel with the MSB of another image, that we would like to embed in a secret/non perceptible way in the cover image. For my code I used two bitmap image, unfortunately wordpress doesn’t allow me to publish bmp images, so I’m just going to put them here: 


  1. Watermark:           


  2. Cover Image:




The code will follow soon with watermarked image... (still working on it...)

Watermarking Classification



Robust Watermarking

  • Design to survive various system processing and malicious attacks
  • Primary application: copyright protection
Fragile Watermarking
  • Design to detect any modifications (unintentional and malicious attacks) to the watermarked images
  • Primary application: content authentication
Semi-Fragile Watermarking
  • Design to survive system processes (such as JPEG and Wavelet compression) and detect malicious attacks (such as cut and paste) in watermarked image
  • Primary application: selective content authentication



Robust Watermarking

  • Conventional Transforms
  • Feature Extraction for Watermark Embedding and Retrieval
  • Image-in-Image Watermarking
  • Character-in-Image Watermarking
  • Benchmarking – Stirmark and Checkmark


Why Digital Watermarking?

Watermarking is used for: 
1) Copyright protection 
2) Authentication 






Culture Secretary James Purnell was late for the photo at Tameside General Hospital in Greater Manchester, turning up after three other MPs had to leave. James Purnell's image was added to the photograph later.





An NHS trust has admitted superimposing an image of a government minister into publicity photograph for a hospital building project (BBC News - 28 September 2007)

Friday, 17 December 2010

What is Digital Watermarking?

Digital Watermarking

Digital watermarking is a technique which allows an individual to add hidden copyright notices or other verification messages to digital audio, video, or image signals and documents. Such a message is a group of bits describing information pertaining to the signal or to the author of the signal (name, place, etc.). The technique takes its name from watermarking of paper or money as a security measure. Digital watermarking can be a form of steganography, in which data is hidden in the message without the end user's knowledge.
A simple example of a digital watermark would be a visible "seal" placed over an image to identify the copyright. However the watermark might contain additional information including the identity of the purchaser of a particular copy of the material. According to the human perception, the digital watermarks can be divided into two different types as follows: visible and invisible. Visible watermark is a secondary translucent overlaid into the primary image as shown in the figure.
Visible watermarks change the signal altogether such that the watermarked signal is totally different from the actual signal, e.g., adding an image as a watermark to another image. Stock photography agencies often add a watermark in the shape of a copyright symbol ("©") to previews of their images, so that the previews do not substitute for high-quality copies of the product included with a license.
Visible watermarks can be used in following cases :
* Visible watermarking for enhanced copyright protection.
In such situations, where images are made available through Internet and the content owner is concerned that the images will be used commercially (e.g. imprinting coffee mugs) without payment of royalties. Here the content owner desires an ownership mark, that is visually apparent, but which does not prevent image being used for other purposes (e.g. scholarly research).
* Visible watermarking used to indicate ownership originals.
In this case images are made available through the Internet and the content owner desires to indicate the ownership of the underlying materials (library manuscript), so an observer might be encouraged to patronize the institutions that owns the material.
Invisible watermarks do not change the signal to a perceptually great extent, i.e., there are only minor variations in the output signal. An example of an invisible watermark is when some bits are added to an image modifying only its least significant bits. Invisible watermarks that are unknown to the end user are steganographic. While the addition of the hidden message to the signal does not restrict that signal's use, it provides a mechanism to track the signal to the original owner.
Another application is to protect digital media by fingerprinting each copy with the purchaser's information. If the purchaser makes illegitimate copies, these will contain his name. Fingerprints are an extension to watermarking principle and can be both visible and invisible.
There are various spatial and frequency domain techniques used for adding watermarks to and removing them from signals. Purely spatial techniques are not robust to some attacks to the signal like cropping and zooming, whereas most frequency domain techniques and mixed-domain techniques are quite robust to such attacks.
The communication of a digital watermark may be viewed as an exercise in digital communication. The message bits are encoded and embedded in a suitable carrier. The properties that are desired of the watermark, such as imperceptibility, robustness to noise and to image editing such as cropping and rotation are the factors that drive the choice of carrier. In robust watermarks, it is the combination of low signal amplitude (because the watermark is invisible) and large bandwidth (because images are typically quite large), as well as the relatively short length of the message, that dictates the use of spread spectrum for encoding the message bits. Spread spectrum is a robust and secure form of communication. In image watermarking, the spread spectrum signal is typically placed in the frequency domain to produce a watermark that is immune to image processing.
Image compression techniques, such as JPEG, inspired the use of the frequency domain for embedding imperceptible watermarks in images. The first frequency domain technique was devised by Scott Burgett, Eckhard Koch, and Jian Zhao, who utilized the Discrete Cosine Transform. This and other transforms, such as the Wavelet transform, were used by Joseph O Ruanaidh, who later developed rotation and translation invariant watermarks based on the Fourier transform. Ingemar Cox popularized the use of Spread spectrum techniques for robust watermarking. Geoff Rhoads, Chief Technical Officer and founder of Digimarc Corporation, developed the PictureMarc technology.

History of digital watermarking

The term "Digital Watermark"... 


This was first introduced in 1992 by Andrew Tirkel and Charles Osborne, in their paper: A.Z.Tirkel, G.A. Rankin, R.M. Van Schyndel, W.J.Ho, N.R.A.Mee, C.F.Osborne. “Electronic Water Mark”. DICTA 93, Macquarie University. p.666-673.I


The famous term was used by in Japan by Tirkel and Osborne. This was from the Japanese-- "denshi sukashi" -- literally, an "electronic watermark".

Paul Levinson Future of the Information Revolution (1997), where he called for the use "smart patent numbers" (p. 202), or the embedding of electronic chips in every piece of technology, which would give an updated listing of all of its inventors.
Whereas a digital watermark can be a form of steganography, e.g., the digital watermark is hidden in plain view. Functionally, the term "digital watermark" is used to describe that which enables differentiation between copies of the "same" content in an imperceptible manner. Many watermarking systems take this a step further, hiding the data so that attempts at erasure results in degradation of the quality of the content.

Thursday, 16 December 2010

Objectives and Outlines

Project Objectives
  • Main aim is to provide a good working knowledge on theoretical background and practical applications relating to digital watermarking and authentication techniques for multimedia content and documents.
  • Project on design and implementation of digital watermarking and authentication systems

Project Outlines
  • Conventional/non-conventional orthogonal transform watermarking techniques of Images (greyscale, colour, halftone and binary)
  • Unintentional and intentional or malicious attacks.
  • Restoration and recovery techniques for watermarked Images.
  • Watermarking Applications

Monday, 13 December 2010

Digital Image Manipulation and Watermarking

During the final year of university, student would be presented with the project prospect to excel in both technical and non technical skills that will make the student more skilled and talented engineer in Digital Media Engineering sector. 


History
Due to development in technology and with invention of Internet, it has become increasingly easy and convenient for people to communicate and share resources. Therefore it also makes the system more vulnerable as technology available allows users to share copyrighted property without owner’s permission.

Proposal
The proposed project will tackle this issue by using the technique of ‘Digital Image Manipulation and Watermarking’. This technique will be used to address digital rights management, protect intellectual property of the user. This will help the property owner will be encoding a digital watermark (signature) into their work and prove the ownership when required.

Method
This project will look into inserting watermark into an image file, which will be used as authentication. In case of an attack to the image and then should be able to restore the attacked part of the image.

A semi-fragile watermarking method for authentication and restoration using DCT (Discrete Cosine Transform) and FHT (Fast Hadamard Transform) will be used to identify if the images have been tampered, and if they are then our algorithm will locate the attacked areas and restore them. In the end we will compare the two transform methods used and evaluate them to distinguish which one is superior.

Implementation
I will be using x32 bit Windows XP for operating system. The proposed software will be written in Matlab.

Block diagram of basic watermarking system.