• Aucun résultat trouvé

Watermarking methods

N/A
N/A
Protected

Academic year: 2022

Partager "Watermarking methods"

Copied!
11
0
0

Texte intégral

(1)

Joe O’Ruanaidh Siemens Corporate

Research Princeton, NJ

Digital

Watermarking:

How it works!

SIGGRAPH’99 Panel

Friday 13 August 2:15pm - 4:00pm

Gabriella Csurka CUI, University of

Geneva

Switzerland

(2)

Agend a

Some Examples: almost but not quite!

Glyphs

Easter EggsMoney Dots

Spread Spectrum

Image Watermarking

Video Watermarking

Security

Conclusions

(3)

Goals

Context: distribution of documents over Internet

Goal: copyright enforcement

image

video

audio

text

Framework:

security architecture (e.g. DCT Switzerland, Fraunhof Institute);

public and private watermark.

(4)

The Holy Grail

No original image!

watermark resistant to e.g.:photometric transformations, scanning; JPEG, MPEG compression; geometric transformations:

cropping, translation, rotation, scaling, aspect ratio change, flip, general linear or affine transformation; regular removal of rows/columns or videoframes, shearing

video frame rate change (temporal scaling);

cryptographic attacks.

(5)

Spread Spectrum

Looks like noise!

Technically it’s a symmetric key cryptosystem

Very very robust.

(6)

Original Images

(7)

Transformations of images

(8)

Basic approach

spread-spectrum sequence inserted in transform

domain;

template: key- based grid to

recover geometric

transformations,

inserted and detected

in transform domain

(9)

Template: key- based grid to recover aspect ratio and frame- rate changes,

•Inserted in

transform domain

Detected in log-

log-log mapping of transform domain;

Video

watermarking:

frame by frame or

as 3D object

(10)

Detecting a Watermark

-20dB SNR -40dB SNR

(11)

Review

We need a fully integrated and secure system. Complete

solution involves aspects of:

Cryptography

Communications

Spatial Transformations

Statistical Decision Theory

Références

Documents relatifs

The present study aims to investigate whether creativity is domain general or domain specific, by relating stu- dents’ performance on two tests: the Creative Thinking Test and

In other situations, the outstanding behavior of class B is caused by a phenomenon, which lasts for a finite period during which the intensity ratio of class B expresses

We present evidences that integrability in this case can persist at higher loops due to the presence of the oscillator algebra which is expected to be robust under loop corrections

Wang, “Robust Digital Video Watermarking Scheme for H.264 Advanced Video Coding Standard,” Journal of Electronic Imaging 16(4), 2007... H.264 video watermarking - Marc Chaumont

Méthode : Construire l’image d’une figure par une translation sur papier quadrillé Soit la translation qui transforme A en A’ schématisée par la flèche rouge. Construire

Our strategy would be to decompose V into a direct sum of invariant subspaces for each of which ϕ has only one eigenvalue, proving the following result..

From our proof, one sees that for computing the Jordan normal form and a Jordan basis of a linear trans- formation ϕ on a vector space V, one can use the following plan:.. • Find

We illustrate in particular the number of trades for a given Sharpe level that provides statistical significance as well as the impact of auto-correlation by providing reference