Get PDF Attacks on Digital Watermarks Classification, Estimation-based Attacks and Benchmarks

Free download. Book file PDF easily for everyone and every device. You can download and read online Attacks on Digital Watermarks Classification, Estimation-based Attacks and Benchmarks file PDF Book only if you are registered here. And also you can download or read online all Book PDF file that related with Attacks on Digital Watermarks Classification, Estimation-based Attacks and Benchmarks book. Happy reading Attacks on Digital Watermarks Classification, Estimation-based Attacks and Benchmarks Bookeveryone. Download file Free Book PDF Attacks on Digital Watermarks Classification, Estimation-based Attacks and Benchmarks at Complete PDF Library. This Book have some digital formats such us :paperbook, ebook, kindle, epub, fb2 and another formats. Here is The CompletePDF Book Library. It's free to register here to get Book file PDF Attacks on Digital Watermarks Classification, Estimation-based Attacks and Benchmarks Pocket Guide.

This unique watermark is used to find the owner of the content since each owner of the electronic media has a unique watermark. An attack is some kind of manipulation on the object electronic media which aims at defeating the watermark detection system. The present application provides a robust system and method for detecting the watermark in the electronic media for each possible attacks and combinations thereof. The application discloses a new improvised watermark detection system and method to find the source of the content piracy effectively.

The robust watermark detection method consists of five operations: generation of watermark, estimation of distortions, generation of templates, correlation detection and score fusion. Each operation is explained as follows. A watermark 20 is generated using a random sequence and unique custom information. The random sequence can be generated from any deterministic random generator not shown in the figure.

For instance, the deterministic random generator generates a random sequence based on Leibniz Pi infinite series which was disclosed in the in the Indian patent application No.

Swipe to navigate through the articles of this issue

Additional information is fed as a seed to generate the deterministic random number based on Leibniz Pi infinite series. In a preferred embodiment the electronic media is video. Further, a compression means not shown in the figure reduces the size of the watermarked video content for distribution by using any one of the suitable compression method. Initially, the compressed watermarked video content can be decompressed to extract the watermarked video content 40 by a decompression means not shown in the figure.

A plurality of generated watermarks 1 through N can be compared with the watermarked video content 40 to generate a plurality scores 1 through N respectively. Then the scores can be compared with the predefined threshold value to determine the status of watermark detection. In this conventional watermark detection system 60 , the rate of watermark detection is poor and also the watermark 20 can only be detected with the help of exactly the same watermark 20 embedded with the video content. Initially, the system receives the compressed object media signals, wherein the compressed object media signals is being attacked with at least one type of attack or distortions.

The attack that are intended to remove the watermark comprises of geometrical attacks including rotation, scaling, translation, shearing, random bending, and change of aspect ratio, a signal processing attacks including filtering and compression and a cryptographic attacks including key search and oracle attacks.

The said object electronic media signal can be any one of the audio, video, image, speech, computer readable medium, Compact Disc CD , hard disk, Floppy drive, any kind of document or combination thereof. In a preferred embodiment, the object electronic media is video. The decompressing means not shown in the figure extracts watermarked video content from the compressed video signals. An estimation means not shown in the figure is adapted to instantaneously estimate plurality of parameters associated with at least one distortion or attack.

The estimation of the parameters helps in designing a plurality of the templates or plurality of the correlations filters which are used for detecting the watermark in the watermarked video content The detection method needs to generate an appropriate correlation filter for detecting the watermark in the distorted videos The correlation filter design takes into account the possible distortions that would have happened on the watermarked videos.

The detection template or correlation filter is different for different distortions and their range of values. The estimation means further comprising a feature based image matching algorithm adapted to instantaneously estimate a plurality of features associated with the plurality of synchronous attacks and combinations thereof comprising estimation of amount of rotation, size scaling and cropping, and signal processing algorithm.

In a preferred embodiment, the said rotation is the in-plane spatial rotation of video frame. In a preferred embodiment, the correlation filter is a random pattern trained to act against the attacks.


  • The Pantomime Life of Joseph Grimaldi: Laughter, Madness and the Story of Britains Greatest Comedian.
  • Thermodynamics of chaotic systems: An introduction!
  • Dubbele citaties.

A template generation means not shown in the figure is adapted to synchronously generate a set of plurality of candidate templates 1 through M in response to the estimated parameters, each template being a predictively designed cross correlation filter according to the estimated possible type and strength of distortion, attacks and combination thereof for an optimal correlation performance of at least one template there from.

The generated sample template is shown in the FIG. In an exemplary embodiment, using the training images and constraining the filter response to the required level, the correlation filter can be designed that can give optimal correlation performance, wherein the training images are the frames extracted from the video, and vary.

DIP Lecture 21: Digital watermarking

In a preferred embodiment, given a 2D image an optimal detection template or filter is designed by taking into account the attacks that might have happened on the video to partially of fully eliminate the watermark or to make it difficult for the watermark detection to find a watermark into that video The response of the filter is expected to be maximum i. In a preferred embodiment, the inventors used cross correlation to find the similarity response between the test image or video frames and the correlation filter.

A Review of Video Watermarking and a Benchmarking Framework

A correlation output determination means not shown in the figure is adapted to determine a correlation output characterized by a Peak to Side lobe Ratio PSR score associated with each successive correlated template for each frame of the said electronic media signal and to derive a maximum PSR score associated with each frame for each candidate templates and to calculate an average maximum PSR score therefor.

In a preferred embodiment, the correlation output is measured to determine whether a watermark 20 is detected or not. A measure called PSR is used to take the decision. If the PSR score is above some threshold which is obtained empirically then the watermark 20 is said to be detected in that image or video.

The correlation filter is expected to give clean peaks in the correlation output and a higher PSR score as shown in the FIG. Similarly the correlation output must not show any peak and a very low PSR score below the threshold as shown in the FIG. A decision fusion module not shown in the figure is adapted to facilitate decision of presence of the watermark, compares percentage of maximum PSR scores associated with each frame for each template to commensurate with predefined threshold percentage and alternatively comparing the average of the maximum PSR scores associated with each frame for each template to commensurate with a predefined threshold value thereof.

The threshold percentage can be configured according to the application. It also uses majority voting. The correlation detection enables to decide whether a watermark 20 is detected or not in the watermarked video content Since the video contains many frames so the detection template must take in to account all the frames in which the watermark 20 is added.

Each detection template is designed for single or a combination of watermark manipulation attacks. As there can be a large number of combinations possible, so it is required to generate a template for each combination and correlate them with the attacked watermarked video. Usually the watermark attacks are not known prior, so it is always required to perform correlation detection with several templates.

A Review of Video Watermarking and a Benchmarking Framework | SpringerLink

Correlating detection templates with the possibly attacked watermarked video will result in several scores that have to be combines in some sense to come up with the watermark detection results. The pre-processing of the correlation scores PSR before applying the thresholding operation is a critical part of the present disclosure. The proposed system of the present disclosure particularly focuses on processing the correlation scores of the individual templates generated for different kind of attacks.

This processing target improves the performance of the watermark detection by correlation or some other means. This processing tries to combine the detection scores of each template in the set in an optimal way to enhance the detection performance. This is essential due to the following reasons:. When there are multiple attacks happened on the watermarked video , since a normal watermark detection system does not know about the type and strength of attack, a template is generated for each attack and its strength.

These templates are used for detecting the watermark 20 in the given watermarked video content The single template works well for single attack as well as combination of attacks. When there are multiple attacks even if the system uses several individual templates for detection it may not detect the watermark As the multiple attack scenario leads to infinitely large set of combinations a method of combining the detection results against all these results is required.

Our disclosure pertains to using of a decision fusion rule to combine results from different detections. Detection with each template is considered to be a classification task and the classification result says whether the watermark is detected or not. A watermark detection means not shown in the figure is adapted to detect the watermark, encrypted in each frame of the said electronic media signal, based on at least one or combination of the decision fusion outputs.

Since the watermark detection rate is more important, and there is a large range of watermark attacks, the OR fusion rule with a set of correlation filter based templates is optimal. Specifically OR fusion rule works for a single image or independent video frame or a segment of data and also on complete data set by intelligently combining the individual decision results and scores.

Citaties per jaar

In one exemplary embodiment, the watermark detection means compares the PSR score associated with the each template of the said electronic media signal that results into one classifier per frame, wherein each classifier is configured to detect the watermark in a frame for score commensurating with a predefined threshold value.

The OR fusion decision on the decisions of N classifier is authentic if one or more of the classifiers is authentic and impostor if all the classifiers declare impostor.


  • Adobe InDesign CS6 Classroom in a Book!
  • Building Firearms?
  • The Marriage Bed (Avon Romantic Treasure);
  • 1. Introduction?
  • Secure and Robust Digital Watermarking: A Survey.
  • Summary of Selected Topics in Digital Watermarking for Copyright Protection.
  • Attacks on digital watermarks: classification, estimation based attacks, and benchmarks;

Here the threshold based decision on the PSR score for each template is considered as a classification task. In another embodiment, a method for detection of a plurality of attacks on a plurality of electronic media signals, characterized by a cross correlation based synchronous detection of watermark, the method comprising the various computer implemented steps.

Initial step of the proposed method, object electronic media signals from the compressed electronic media signals are extracted by employing at least one decompressing means , wherein the object electronic media comprises of audio, video, image, speech, computer readable medium, Compact Disc CD , hard disk, Floppy drive, any kind of document or combination thereof. In the next step, plurality of parameters associated with at least one distortion or attack are estimated instantaneously, wherein the attacks that are intended to remove the watermark 20 comprises of geometrical attacks including rotation, scaling, translation, shearing, random bending, and change of aspect ratio, a signal processing attacks including filtering and compression and a cryptographic attacks including key search and oracle attacks.

In the next step, a set of plurality of candidate templates of a cross correlation filter predictively designed according to the instantaneously estimated possible type and strength of distortion, attacks and combination thereof are generated synchronously for an optimal correlation performance of at least one template there from and a single detection template which reflects the watermark embedded and the changes occurred on the watermarked content is generated and used for correlation detection. In the next step, a Peak to Side lobe Ratio PSR score successively for each template are obtained to determine a correlation output associated therewith the each template In the next step, the PSR score associated with the each template for each frame of the said electronic media signal that result into one classifier per frame wherein each classifier is configured to detect the watermark in a frame for score commensurating with a predefined threshold value.

In the next step, an average of the scores of the plurality of the classifiers associated with the plurality of frames of each said template is calculated. In the next step, at least one fusion rule is applied to compare the averaged classifier score with the predefined threshold value or alternatively evaluate the percentage of maximum classifiers associated with plurality of frames commensurating with the predefined threshold percentage thereof to determine the watermark status in the plurality of frames of the electronic media signal.

In the final step, the presence of watermark 20 is decided alternatively using at least one or combination of fusion rules, for determination of true positive associated with the attack. This watermark detection method is flexible to incorporate the changes the watermarked image or video undergone in to the detection process itself. The watermark detection accuracy is typically depending on a precise estimation of the amount of rotation and other parameters of the attack.

Review of Robust Video Watermarking Techniques

Hence, the correlation filter in the present disclosure is designed to takes into account the range and types of distortions. So the probability of watermark detection is higher if the estimation of the distortion parameters is approximate. The watermark is detected even if there are multiple attacks operated on the media content. The watermark detection performance with multiple detection templates improves when the watermark attacks are unknown. Particularly, the watermark detection performance is improved by employing an OR fusion rule, which provides for combining all the PSR scores of the frames to come up with the detections results.

The watermark detection system and method would be able to detect a watermark till the point where the quality of the document is unacceptable or the document does not have any value after a set of attacks have been operated on that. Attack modelling: towards a second generation watermarking benchmark Sviatoslav Voloshynovskiy , Shelby Pereira , V.

Iquise , Thierry Pun. Power-spectrum condition for energy-efficient watermarking Jonathan K. Su , Bernd Girod. Analysis of digital watermarks subjected to optimum linear filtering and additive noise Jonathan K. Su , Joachim J. Eggers , Bernd Girod. A blind watermarking scheme based on structured codebooks Joachim J. Eggers , Jie Su , Bernd Girod.

Cox, I.

Digital Watermarking. Andrews and C. Chan and M.