tailieunhanh - Lecture Steganography: Watermarking techniques - Ho Dac Hung
Lecture Steganography: Watermarking techniques deal with contents such as the choice of host locations in the cover and the choice of a workspace, discrete Fourier transform, discrete cosine transform, Mellin-Fourier transform | Watermarking Techniques Ho Dac Hung 1 Contents Introduction The Choice of Host Locations in the Cover The Choice of a Workspace 2 1. Introduction Over the past few years watermarking has emerged as the leading candidate to solve problems of ownership and content authentications for digital multimedia documents. 3 1. Introduction Ratio between the information contained in the watermark and in the host signal. Image degradation due to watermarking. Robustness. 4 2. The Choice of Host Locations in the Cover In many implementations a pseudorandom number generator initialized from a secret key determines these locations. This secret key is only known by the owner of the document and correspondingly he is the only one who can access the watermark in both the insertion and the recovery processes. 5 2. The Choice of Host Locations in the Cover Besides security aspects a good choice of watermark locations is crucial with respect to the visual distortion of the original image. The accuracy of the human visual system varies according to the texture nature of the images. 6 2. The Choice of Host Locations in the Cover The Patchwork Algorithm proposed in 1995 by Bender et al. This algorithm does not as such allow a message to be hidden in a cover but it simply allows the following binary question to be answered quot Does this person know the key which was used to embed and build a watermark quot 7 2. The Choice of Host Locations in the Cover In the insertion process the owner selects n- pixel pairs pseudorandomly according to a secret key . He then modifies the luminance values of the n pairs of pixels by using the following formula 1 1 8 2. The Choice of Host Locations in the Cover In the extraction process the n-pixel pairs which were used in the encoding step to host the watermark are retrieved again using the secret key Ks. Then the sum 1 9 2. The Choice of Host Locations in the Cover Watermarking algorithms based on a secret key present a major drawback they do not allow a
đang nạp các trang xem trước