SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Digital watermarking methods  applied to non-additive channels Ph.D. candidate: M. Scagliola       Tutor: P. Guccione Research Doctorate Course in Information Engineering
[object Object],[object Object],[object Object],[object Object],[object Object],Michele Scagliola, DEE – Politecnico di Bari Torino , February 25 2010 Outline
At a very general level digital watermarking, or data hiding, is a way of hiding a message (the  watermark ) within a multimedia content (the  host signal ) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Digital watermarking: a brief introduction
Definition:   watermarking is a mechanism to create a communication    channel that is multiplexed into original content By adopting a communication point of view: Watermark signal Watermarked signal Attacked signal Estimated message Host signal Error probability Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Watermarking as communications Message
According to a communication approach:  MSE-based metrics Data to Watermark Ratio: Watermark to Noise Ratio: being Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Distortion measures
[object Object],[object Object],[object Object],[object Object],Attacks to robustness:  every processing applied to the marked content that increases the probability of error of the data hiding channel Constraint:  the attacked content has an acceptable perceptual quality ,[object Object],[object Object],Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Attack channel
It aims to change the reference of the watermarked signal, so that the decoder is no more able to retrieve the hidden information  ,[object Object],[object Object],[object Object],[object Object],[object Object],Weak perceptual effect but heavy impact on watermark retrieving  Achieving robustness to desynchronization is an important challenge Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Desynchronization attack channel
Realizes  side-informed data hiding  exploiting the knowledge of the host signal at the embedder to minimize the introduced distortion ,[object Object],[object Object],[object Object],2 Δ Δ m=1 m= -1 m=-1 m=1 Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Quantization-based data hiding
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],applied pointwise to all the host samples modifying the original value, i.e. gain scaling  Decoding errors occur for Δ m=-1 m=1 Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Quantization-based data hiding
It can be considered somewhat solved in literature by various approaches, such as  Rational Dither Modulation   (RDM) RDM uses a variable quantization step-size which scales according to the gain on the channel. Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Fixed gain attack and RDM
RDM asymptotically approaches the BER of DM but being also invariant to constant gain scaling Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Fixed gain attack and RDM
The  power-law attack  consists of a constant exponentiation and a constant gain scaling of the amplitudes of the watermarked signal: Open problem:   Coping with nonlinear distortions The power-law attack models common processings such as gamma compression  Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Power-law attack
[object Object],[object Object],Hyperbolic RDM:  using hyperbolic mapping in conjunction with RDM, the decoder output is expected to be intrinsically invariant to both gain scaling and exponentiation.   Gain is cancelled out by the ratio Exponent becomes a gain scaling The idea:  perform the embedding in a power-law attack invariant    domain Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Providing robustness to power-law attack
k-th  host sample Function computed on the previous watermarked samples The  k-th  sample in the hyperbolic angle representation results Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Hyperbolic RDM: hyperbolic mapping The function  h  belongs to the set  : The geometric mean belongs to this set:
Inverse mapping:   Host signal   Watermaked signal   Transformed domain   h RDM encoder Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Hyperbolic RDM: embedding
The information bits are retrieved applying the RDM decoder to the estimated marked samples in the hyperbolic angle domain:   The decoder output results intrinsically invariant to the power-law attack: RDM decoder h Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Hyperbolic RDM: decoding
For large   memory vectors, the Data to Watermark Ratio has been analytically evaluated: Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Performance analysis: DWR
Under the hypothesis of Gaussian host, high DWRs and memory vectors going to infinity, the error probability has been analytically evaluated Additive noise in hyperbolic domain results in having pdf the error probability has been computed from Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Performance analysis: bit-error rate
[object Object],[object Object],For Gaussian i.i.d. distributed host samples and DWR = 25 dB Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Experimental results: AWGN channel
[object Object],[object Object],For Gaussian host, DWR = 25 dB,   and Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Experimental results: power-law attack
Quantization-based data hiding schemes are not designed to cope with desynchronization channels, such as filtering LTI filtering attack: Linear time invariant (LTI) filtering adds to the watermarked signal a host-dependent noise that increases with the host power  Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 LTI filtering attack Discrete Fourier Transform – Rational Dither Modulation (DFT-RDM) was designed to cope with LTI filtering attack Attack filter is totally unknown at both the embedder and the decoder
[object Object],[object Object],LTI filtering can be addressed by applying RDM in the Fourier domain ,[object Object],[object Object],[object Object],[object Object],Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 DFT-RDM: the key idea
An RDM-like channel is constructed on each DFT channel: Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 DFT-RDM
DFT-RDM exhibits low per-channel error probabilities for white Gaussian host   But  it is also shown that high error probability occurs for non-white, non-Gaussian and non-stationary hosts (audio signals are used as case study) Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Performance analysis of DFT-RDM
We consider non-white Gaussian host signal  X  modeled by an AR process: Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 DFT-RDM for non-white hosts Per-channel host signal power Per-channel host watermark power, from the properties of RDM, is
Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 DFT-RDM for non-white hosts A larger watermark signal is produced on those DFT channels having stronger spectral content  Different RDM-like channel have different robustness against additive noise Per-channel host signal power Per-channel host watermark power, from the properties of RDM, is
Received signal:  Per-channel multiplication error power Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 DFT-RDM for non-white hosts Depends on the host psd: multiplication error is a self-noise term Depends on the attack filter
The knowledge of the per-channel host power and of the per-channel multiplication error power allow to analytically predict the per-channel error probability Per-channel BER with N=256  and DWR =25 dB Low-pass attack filter with  Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 DFT-RDM for non-white hosts
[object Object],[object Object],[object Object],Perform DFT-RDM on the host signal after whitening filtering W-DFT-RDM does not incur in any penalty in terms of embedding distortion and payload w.r.t. DFT-RDM  W-DFT-RDM for non-white hosts is expected to have the same performance of DFT-RDM for white hosts Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Whitened DFT-RDM
[object Object],[object Object],[object Object],[object Object],Whitening does not assure the best BER for every attack filter Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Experimental results
[object Object],[object Object],[object Object],Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Experimental results
Then we  tested W-DFT-RDM with audio clips in order to verify the performance improvement w.r.t. DFT-RDM The whitening filter    resembles the psd of an average audio signal Overall error probabilities for band-pass filter The BERs for W-DFT-RDM are always lower than those for DFT-RDM Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Experimental results for audio signals
Then we tested W-DFT-RDM and DFT-RDM with a ten-band audio equalizer as attack filter Overall error probabilities for audio equalizer The improvement given by W-DFT-RDM is increased and acceptable BERs are achieved Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Experimental results for audio signals
[object Object],[object Object],[object Object],[object Object],Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Conclusions
[object Object],[object Object],[object Object],[object Object],[object Object],Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Guidelines for future works
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Publications

Weitere ähnliche Inhalte

Was ist angesagt?

Statistical signal processing(1)
Statistical signal processing(1)Statistical signal processing(1)
Statistical signal processing(1)Gopi Saiteja
 
Design of IIR filters
Design of IIR filtersDesign of IIR filters
Design of IIR filtersop205
 
DSP_FOEHU - Lec 07 - Digital Filters
DSP_FOEHU - Lec 07 - Digital FiltersDSP_FOEHU - Lec 07 - Digital Filters
DSP_FOEHU - Lec 07 - Digital FiltersAmr E. Mohamed
 
Chapter1 - Signal and System
Chapter1 - Signal and SystemChapter1 - Signal and System
Chapter1 - Signal and SystemAttaporn Ninsuwan
 
Warping Concept (iir filters-bilinear transformation method)
Warping Concept  (iir filters-bilinear transformation method)Warping Concept  (iir filters-bilinear transformation method)
Warping Concept (iir filters-bilinear transformation method)ZunAib Ali
 
OPTICAL COMMUNICATION -UNIT-III(detectors) by S.SESHA VIDHYA/ASP/ECE/RMKCET
OPTICAL COMMUNICATION -UNIT-III(detectors) by S.SESHA VIDHYA/ASP/ECE/RMKCETOPTICAL COMMUNICATION -UNIT-III(detectors) by S.SESHA VIDHYA/ASP/ECE/RMKCET
OPTICAL COMMUNICATION -UNIT-III(detectors) by S.SESHA VIDHYA/ASP/ECE/RMKCETSeshaVidhyaS
 
Gerd Keiser - Optical Fiber Communications-McGraw-Hill Education (2010).pdf
Gerd Keiser - Optical Fiber Communications-McGraw-Hill Education (2010).pdfGerd Keiser - Optical Fiber Communications-McGraw-Hill Education (2010).pdf
Gerd Keiser - Optical Fiber Communications-McGraw-Hill Education (2010).pdfArunKumar674066
 
Basic Electronics Interview Questions.pdf
Basic Electronics Interview Questions.pdfBasic Electronics Interview Questions.pdf
Basic Electronics Interview Questions.pdfEngineering Funda
 
RF Module Design - [Chapter 7] Voltage-Controlled Oscillator
RF Module Design - [Chapter 7] Voltage-Controlled OscillatorRF Module Design - [Chapter 7] Voltage-Controlled Oscillator
RF Module Design - [Chapter 7] Voltage-Controlled OscillatorSimen Li
 
Analog communications lab
Analog communications labAnalog communications lab
Analog communications labVishal kakade
 
Simulating communication systems with MATLAB: An introduction
Simulating communication systems with MATLAB: An introductionSimulating communication systems with MATLAB: An introduction
Simulating communication systems with MATLAB: An introductionAniruddha Chandra
 
Dft and its applications
Dft and its applicationsDft and its applications
Dft and its applicationsAgam Goel
 
High Speed Amplifiers Part 1
High Speed Amplifiers Part 1High Speed Amplifiers Part 1
High Speed Amplifiers Part 1Premier Farnell
 
Semiconductor optical amplifier (SOA)
Semiconductor optical amplifier (SOA)Semiconductor optical amplifier (SOA)
Semiconductor optical amplifier (SOA)Paulo_Vangui
 
Computing DFT using Matrix method
Computing DFT using Matrix methodComputing DFT using Matrix method
Computing DFT using Matrix methodSarang Joshi
 
non parametric methods for power spectrum estimaton
non parametric methods for power spectrum estimatonnon parametric methods for power spectrum estimaton
non parametric methods for power spectrum estimatonBhavika Jethani
 

Was ist angesagt? (20)

S parameters
S parametersS parameters
S parameters
 
Statistical signal processing(1)
Statistical signal processing(1)Statistical signal processing(1)
Statistical signal processing(1)
 
Design of IIR filters
Design of IIR filtersDesign of IIR filters
Design of IIR filters
 
DSP_FOEHU - Lec 07 - Digital Filters
DSP_FOEHU - Lec 07 - Digital FiltersDSP_FOEHU - Lec 07 - Digital Filters
DSP_FOEHU - Lec 07 - Digital Filters
 
Chapter1 - Signal and System
Chapter1 - Signal and SystemChapter1 - Signal and System
Chapter1 - Signal and System
 
Sampling
SamplingSampling
Sampling
 
Warping Concept (iir filters-bilinear transformation method)
Warping Concept  (iir filters-bilinear transformation method)Warping Concept  (iir filters-bilinear transformation method)
Warping Concept (iir filters-bilinear transformation method)
 
OPTICAL COMMUNICATION -UNIT-III(detectors) by S.SESHA VIDHYA/ASP/ECE/RMKCET
OPTICAL COMMUNICATION -UNIT-III(detectors) by S.SESHA VIDHYA/ASP/ECE/RMKCETOPTICAL COMMUNICATION -UNIT-III(detectors) by S.SESHA VIDHYA/ASP/ECE/RMKCET
OPTICAL COMMUNICATION -UNIT-III(detectors) by S.SESHA VIDHYA/ASP/ECE/RMKCET
 
Gerd Keiser - Optical Fiber Communications-McGraw-Hill Education (2010).pdf
Gerd Keiser - Optical Fiber Communications-McGraw-Hill Education (2010).pdfGerd Keiser - Optical Fiber Communications-McGraw-Hill Education (2010).pdf
Gerd Keiser - Optical Fiber Communications-McGraw-Hill Education (2010).pdf
 
Basic Electronics Interview Questions.pdf
Basic Electronics Interview Questions.pdfBasic Electronics Interview Questions.pdf
Basic Electronics Interview Questions.pdf
 
RF Module Design - [Chapter 7] Voltage-Controlled Oscillator
RF Module Design - [Chapter 7] Voltage-Controlled OscillatorRF Module Design - [Chapter 7] Voltage-Controlled Oscillator
RF Module Design - [Chapter 7] Voltage-Controlled Oscillator
 
Analog communications lab
Analog communications labAnalog communications lab
Analog communications lab
 
Simulating communication systems with MATLAB: An introduction
Simulating communication systems with MATLAB: An introductionSimulating communication systems with MATLAB: An introduction
Simulating communication systems with MATLAB: An introduction
 
Dft and its applications
Dft and its applicationsDft and its applications
Dft and its applications
 
High Speed Amplifiers Part 1
High Speed Amplifiers Part 1High Speed Amplifiers Part 1
High Speed Amplifiers Part 1
 
COMMUNICATION LED
COMMUNICATION LEDCOMMUNICATION LED
COMMUNICATION LED
 
Semiconductor optical amplifier (SOA)
Semiconductor optical amplifier (SOA)Semiconductor optical amplifier (SOA)
Semiconductor optical amplifier (SOA)
 
Computing DFT using Matrix method
Computing DFT using Matrix methodComputing DFT using Matrix method
Computing DFT using Matrix method
 
VLSI lab report using Cadence tool
VLSI lab report using Cadence toolVLSI lab report using Cadence tool
VLSI lab report using Cadence tool
 
non parametric methods for power spectrum estimaton
non parametric methods for power spectrum estimatonnon parametric methods for power spectrum estimaton
non parametric methods for power spectrum estimaton
 

Ähnlich wie Ph.D. thesis defense

Power Designation for Noma Based Multi Client Mimo Frameworks Using Secure Le...
Power Designation for Noma Based Multi Client Mimo Frameworks Using Secure Le...Power Designation for Noma Based Multi Client Mimo Frameworks Using Secure Le...
Power Designation for Noma Based Multi Client Mimo Frameworks Using Secure Le...Associate Professor in VSB Coimbatore
 
MartinDickThesis
MartinDickThesisMartinDickThesis
MartinDickThesisMartin Dick
 
Robust audio watermarking based on transform domain and SVD with compressive ...
Robust audio watermarking based on transform domain and SVD with compressive ...Robust audio watermarking based on transform domain and SVD with compressive ...
Robust audio watermarking based on transform domain and SVD with compressive ...TELKOMNIKA JOURNAL
 
Modified DCT-based Audio Watermarking Optimization using Genetics Algorithm
Modified DCT-based Audio Watermarking Optimization using Genetics AlgorithmModified DCT-based Audio Watermarking Optimization using Genetics Algorithm
Modified DCT-based Audio Watermarking Optimization using Genetics AlgorithmTELKOMNIKA JOURNAL
 
Data Communications and Matlab
Data Communications and MatlabData Communications and Matlab
Data Communications and MatlabChanaka Lasantha
 
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...optljjournal
 
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...optljjournal
 
Performance Analysis of Visible Light Communication (Vlc) with and Without Co...
Performance Analysis of Visible Light Communication (Vlc) with and Without Co...Performance Analysis of Visible Light Communication (Vlc) with and Without Co...
Performance Analysis of Visible Light Communication (Vlc) with and Without Co...Associate Professor in VSB Coimbatore
 
Iisrt jona priyaa(1 5)
Iisrt jona priyaa(1 5)Iisrt jona priyaa(1 5)
Iisrt jona priyaa(1 5)IISRT
 
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...INFOGAIN PUBLICATION
 
Thesis A. Rinaldi (PDF Slides)
Thesis A. Rinaldi (PDF Slides)Thesis A. Rinaldi (PDF Slides)
Thesis A. Rinaldi (PDF Slides)Arturo Rinaldi
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMijfcstjournal
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform ijfcstjournal
 
Comparison between Trigonometric and Traditional DDS, in 90 nm Technology
Comparison between Trigonometric and Traditional DDS, in 90 nm TechnologyComparison between Trigonometric and Traditional DDS, in 90 nm Technology
Comparison between Trigonometric and Traditional DDS, in 90 nm TechnologyTELKOMNIKA JOURNAL
 
A 15 bit third order power optimized continuous time sigma delta modulator fo...
A 15 bit third order power optimized continuous time sigma delta modulator fo...A 15 bit third order power optimized continuous time sigma delta modulator fo...
A 15 bit third order power optimized continuous time sigma delta modulator fo...eSAT Publishing House
 
computer networks module 1 . fundamentals of networking and data communication
computer networks module 1 . fundamentals of networking and data communicationcomputer networks module 1 . fundamentals of networking and data communication
computer networks module 1 . fundamentals of networking and data communicationNishaJaiswal34
 
Hybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaHybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaIAEME Publication
 

Ähnlich wie Ph.D. thesis defense (20)

Power Designation for Noma Based Multi Client Mimo Frameworks Using Secure Le...
Power Designation for Noma Based Multi Client Mimo Frameworks Using Secure Le...Power Designation for Noma Based Multi Client Mimo Frameworks Using Secure Le...
Power Designation for Noma Based Multi Client Mimo Frameworks Using Secure Le...
 
MartinDickThesis
MartinDickThesisMartinDickThesis
MartinDickThesis
 
Robust audio watermarking based on transform domain and SVD with compressive ...
Robust audio watermarking based on transform domain and SVD with compressive ...Robust audio watermarking based on transform domain and SVD with compressive ...
Robust audio watermarking based on transform domain and SVD with compressive ...
 
Modified DCT-based Audio Watermarking Optimization using Genetics Algorithm
Modified DCT-based Audio Watermarking Optimization using Genetics AlgorithmModified DCT-based Audio Watermarking Optimization using Genetics Algorithm
Modified DCT-based Audio Watermarking Optimization using Genetics Algorithm
 
Data Communications and Matlab
Data Communications and MatlabData Communications and Matlab
Data Communications and Matlab
 
F5242832
F5242832F5242832
F5242832
 
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
 
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
 
Performance Analysis of Visible Light Communication (Vlc) with and Without Co...
Performance Analysis of Visible Light Communication (Vlc) with and Without Co...Performance Analysis of Visible Light Communication (Vlc) with and Without Co...
Performance Analysis of Visible Light Communication (Vlc) with and Without Co...
 
Iisrt jona priyaa(1 5)
Iisrt jona priyaa(1 5)Iisrt jona priyaa(1 5)
Iisrt jona priyaa(1 5)
 
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
 
Thesis A. Rinaldi (PDF Slides)
Thesis A. Rinaldi (PDF Slides)Thesis A. Rinaldi (PDF Slides)
Thesis A. Rinaldi (PDF Slides)
 
Impulse Noise over xDSL Systems
Impulse Noise over xDSL SystemsImpulse Noise over xDSL Systems
Impulse Noise over xDSL Systems
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
 
Comparison between Trigonometric and Traditional DDS, in 90 nm Technology
Comparison between Trigonometric and Traditional DDS, in 90 nm TechnologyComparison between Trigonometric and Traditional DDS, in 90 nm Technology
Comparison between Trigonometric and Traditional DDS, in 90 nm Technology
 
Digital communication unit 1
Digital communication unit 1Digital communication unit 1
Digital communication unit 1
 
A 15 bit third order power optimized continuous time sigma delta modulator fo...
A 15 bit third order power optimized continuous time sigma delta modulator fo...A 15 bit third order power optimized continuous time sigma delta modulator fo...
A 15 bit third order power optimized continuous time sigma delta modulator fo...
 
computer networks module 1 . fundamentals of networking and data communication
computer networks module 1 . fundamentals of networking and data communicationcomputer networks module 1 . fundamentals of networking and data communication
computer networks module 1 . fundamentals of networking and data communication
 
Hybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaHybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pca
 

Ph.D. thesis defense

  • 1. Digital watermarking methods applied to non-additive channels Ph.D. candidate: M. Scagliola Tutor: P. Guccione Research Doctorate Course in Information Engineering
  • 2.
  • 3.
  • 4. Definition: watermarking is a mechanism to create a communication channel that is multiplexed into original content By adopting a communication point of view: Watermark signal Watermarked signal Attacked signal Estimated message Host signal Error probability Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Watermarking as communications Message
  • 5. According to a communication approach: MSE-based metrics Data to Watermark Ratio: Watermark to Noise Ratio: being Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Distortion measures
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. It can be considered somewhat solved in literature by various approaches, such as Rational Dither Modulation (RDM) RDM uses a variable quantization step-size which scales according to the gain on the channel. Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Fixed gain attack and RDM
  • 11. RDM asymptotically approaches the BER of DM but being also invariant to constant gain scaling Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Fixed gain attack and RDM
  • 12. The power-law attack consists of a constant exponentiation and a constant gain scaling of the amplitudes of the watermarked signal: Open problem: Coping with nonlinear distortions The power-law attack models common processings such as gamma compression Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Power-law attack
  • 13.
  • 14. k-th host sample Function computed on the previous watermarked samples The k-th sample in the hyperbolic angle representation results Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Hyperbolic RDM: hyperbolic mapping The function h belongs to the set : The geometric mean belongs to this set:
  • 15. Inverse mapping: Host signal Watermaked signal Transformed domain h RDM encoder Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Hyperbolic RDM: embedding
  • 16. The information bits are retrieved applying the RDM decoder to the estimated marked samples in the hyperbolic angle domain: The decoder output results intrinsically invariant to the power-law attack: RDM decoder h Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Hyperbolic RDM: decoding
  • 17. For large memory vectors, the Data to Watermark Ratio has been analytically evaluated: Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Performance analysis: DWR
  • 18. Under the hypothesis of Gaussian host, high DWRs and memory vectors going to infinity, the error probability has been analytically evaluated Additive noise in hyperbolic domain results in having pdf the error probability has been computed from Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Performance analysis: bit-error rate
  • 19.
  • 20.
  • 21. Quantization-based data hiding schemes are not designed to cope with desynchronization channels, such as filtering LTI filtering attack: Linear time invariant (LTI) filtering adds to the watermarked signal a host-dependent noise that increases with the host power Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 LTI filtering attack Discrete Fourier Transform – Rational Dither Modulation (DFT-RDM) was designed to cope with LTI filtering attack Attack filter is totally unknown at both the embedder and the decoder
  • 22.
  • 23. An RDM-like channel is constructed on each DFT channel: Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 DFT-RDM
  • 24. DFT-RDM exhibits low per-channel error probabilities for white Gaussian host But it is also shown that high error probability occurs for non-white, non-Gaussian and non-stationary hosts (audio signals are used as case study) Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Performance analysis of DFT-RDM
  • 25. We consider non-white Gaussian host signal X modeled by an AR process: Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 DFT-RDM for non-white hosts Per-channel host signal power Per-channel host watermark power, from the properties of RDM, is
  • 26. Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 DFT-RDM for non-white hosts A larger watermark signal is produced on those DFT channels having stronger spectral content Different RDM-like channel have different robustness against additive noise Per-channel host signal power Per-channel host watermark power, from the properties of RDM, is
  • 27. Received signal: Per-channel multiplication error power Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 DFT-RDM for non-white hosts Depends on the host psd: multiplication error is a self-noise term Depends on the attack filter
  • 28. The knowledge of the per-channel host power and of the per-channel multiplication error power allow to analytically predict the per-channel error probability Per-channel BER with N=256 and DWR =25 dB Low-pass attack filter with Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 DFT-RDM for non-white hosts
  • 29.
  • 30.
  • 31.
  • 32. Then we tested W-DFT-RDM with audio clips in order to verify the performance improvement w.r.t. DFT-RDM The whitening filter resembles the psd of an average audio signal Overall error probabilities for band-pass filter The BERs for W-DFT-RDM are always lower than those for DFT-RDM Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Experimental results for audio signals
  • 33. Then we tested W-DFT-RDM and DFT-RDM with a ten-band audio equalizer as attack filter Overall error probabilities for audio equalizer The improvement given by W-DFT-RDM is increased and acceptable BERs are achieved Michele Scagliola, DEE – Politecnico di Bari Torino, February 25 2010 Experimental results for audio signals
  • 34.
  • 35.
  • 36.

Hinweis der Redaktion

  1. Brief introduction to Composed by Focused on The conclusions are drawn
  2. Brief introduction to Composed by Focused on The conclusions are drawn
  3. Brief introduction to Composed by Focused on The conclusions are drawn
  4. Brief introduction to Composed by Focused on The conclusions are drawn
  5. Brief introduction to Composed by Focused on The conclusions are drawn
  6. Brief introduction to Composed by Focused on The conclusions are drawn
  7. Brief introduction to Composed by Focused on The conclusions are drawn
  8. Brief introduction to Composed by Focused on The conclusions are drawn
  9. Brief introduction to Composed by Focused on The conclusions are drawn
  10. Brief introduction to Composed by Focused on The conclusions are drawn
  11. Brief introduction to Composed by Focused on The conclusions are drawn
  12. Brief introduction to Composed by Focused on The conclusions are drawn
  13. Brief introduction to Composed by Focused on The conclusions are drawn
  14. Brief introduction to Composed by Focused on The conclusions are drawn
  15. Brief introduction to Composed by Focused on The conclusions are drawn
  16. Brief introduction to Composed by Focused on The conclusions are drawn
  17. Brief introduction to Composed by Focused on The conclusions are drawn
  18. Brief introduction to Composed by Focused on The conclusions are drawn
  19. Brief introduction to Composed by Focused on The conclusions are drawn
  20. Brief introduction to Composed by Focused on The conclusions are drawn
  21. Brief introduction to Composed by Focused on The conclusions are drawn
  22. Brief introduction to Composed by Focused on The conclusions are drawn
  23. Brief introduction to Composed by Focused on The conclusions are drawn
  24. Brief introduction to Composed by Focused on The conclusions are drawn
  25. Brief introduction to Composed by Focused on The conclusions are drawn
  26. Brief introduction to Composed by Focused on The conclusions are drawn
  27. Brief introduction to Composed by Focused on The conclusions are drawn
  28. Brief introduction to Composed by Focused on The conclusions are drawn
  29. Brief introduction to Composed by Focused on The conclusions are drawn
  30. Brief introduction to Composed by Focused on The conclusions are drawn
  31. Brief introduction to Composed by Focused on The conclusions are drawn
  32. Brief introduction to Composed by Focused on The conclusions are drawn
  33. Brief introduction to Composed by Focused on The conclusions are drawn
  34. Brief introduction to Composed by Focused on The conclusions are drawn
  35. Brief introduction to Composed by Focused on The conclusions are drawn