SlideShare a Scribd company logo
1 of 17
Download to read offline
Protection of digital watermarking,
based on SVD against false positive
detection vulnerability
UNIVERSITY HADJ LAKHDER -BATNA-
SCIENCES FACULTY
COMPUTER SCIENCE DEPARTEMENT
By: Belferdi Wassila
Dr Behloul Ali
INTERNATIONAL CONFERENCE ON
ADVANCED COMMUNICATION AND
INFORMATION SYSTEMS
Plan
• Introduction:
• Singular Value Décomposition:
• False Positive Détection Vulnerability:
• Proposed Method:
• Sharing Secret Principle:
• Experiment Results :
• Robustness Conditions Of The Proposed Method:
• Conclusion and perspectives:
2
Introduction
• Day by day, the digital watermarking is becoming a
promising technique to protect digital data.
• It has seen numerous novel article covering new
techniques; each one of those techniques have there
advantages and inconveniences.
• In recent years, the techniques using linear algebra
has attracted attention of researchers to use it for
watermarking(e.g. SVD).
3
• From the viewpoint of linear algebra we can observe that.
a discrete image is an array of non-negative scalar entries
which may be regarded as a matrix.
M=USV’=S li UiVi
4
Singular Value Décomposition (1)
M U S V’
m
n
=
m r
n
5
SVD Based Watermarking Example
Watermark
Hôst image
Uw
Sw
Vw
U
S
V
Insertion of
watermark in
hôst image
Watermarked
Image
False Positive Détection Vulnerability
• Duo to the watermark insertion method, another
watermark rather than the original can be reconstructed as
the embedded watermark; causing the false positive
detection vulnerability .
• If an attacker use U* and V* matrices of his own
watermark in place of reserved ones he can show his own
watermark.
6
False Positive Détection Vulnerability (2)
7
Proposed Method
• To avoid that an attacker reconstruct his watermark
using their own matrices U* and V*; the idea is to share
a secret key D between matrices Uw, Sw and Vw of
watermark.
• During the embedding phase, for each matrices Uw, Sw
and Vw of watermark a key is inserted, then use the
modified S* to reconstruct the watermarked image,
those keys are calculated using sharing secret principle.
8
Sharing Secret Principle
• The goal is to divide a secret key D into pieces.
• The coefficients a1... ak-1 are randomly chosen from a uniform
distribution over the integers in [0, p-1]
• Pick a random k-1 degree polynomial q(x)=a0+alx+ . . . ak-1xk-1
in which a0=D.
• The values D1,..., Dn are evaluate:
D1= q(1) ,..., Di = q(i) ,..., Dn = q(n).
• Given any subset of k of these Di, we can find the
coefficients of q(x) by interpolation, and evaluate D=q (0).
9
Embedding Phase
10
Extraction Phase
11
Experiment Results
12
Robustness results of the proposed method against attacks
Attacks We W*e |D-Dc| |D-D*c|
Cropping 5 188037
Gaussian
noise 5 1888037
Rotation
0,2° 46568 234611
Resizing
44095 232139
Contrast
adjustment 425 188469
13
Experiment Results(2)
the size
of
image
We W*e |D-Dc| |D-D*c|
512×512 5 188037
256×256 36 188007
128×128 913 187131
64×64 2406 185638
Results of the influence of image size on the robustness of the proposed method
Robustness Conditions Of The Proposed
Method
14
• In the SVD, the biggest
part of energy is
concentrated in low
frequencies of images,
the watermarking profit
this property to insert
watermark in low and
middle frequencies
according to
robustness/invisibility
compromiser
influence of the inserted secret on the quality of the watermarked image
Conclusion
• The novelty of our scheme is the use of the sharing secret
principle in watermark embedding, that is adaptively chosen
according to the local features of the image.
• The aim of our solution is to hide the watermark and insure
their robustness against the false positive detection
vulnerability.
• The experimental results obtained give evidence that our
scheme is robust against several attacks.
15
Perspectives
Our perspective turns around:
• increasing the robustness of our solution using block based
SVD scheme.
• Conceive a méthode to choose coefficients a1... ak-1 randomly
to obtain better results.
16
QUESTIONS ?
17

More Related Content

Similar to icacis2012.pdf

Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Universitat Politècnica de Catalunya
 
TunUp final presentation
TunUp final presentationTunUp final presentation
TunUp final presentation
Gianmario Spacagna
 
Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networks
mourya chandra
 
Declarative data analysis
Declarative data analysisDeclarative data analysis
Declarative data analysis
South West Data Meetup
 
Compressed learning for time series classification
Compressed learning for time series classificationCompressed learning for time series classification
Compressed learning for time series classification
學翰 施
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
Mukul Jindal
 

Similar to icacis2012.pdf (20)

Aaa ped-17-Unsupervised Learning: Dimensionality reduction
Aaa ped-17-Unsupervised Learning: Dimensionality reductionAaa ped-17-Unsupervised Learning: Dimensionality reduction
Aaa ped-17-Unsupervised Learning: Dimensionality reduction
 
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder Piracy
 
Cluster Analysis for Dummies
Cluster Analysis for DummiesCluster Analysis for Dummies
Cluster Analysis for Dummies
 
TunUp final presentation
TunUp final presentationTunUp final presentation
TunUp final presentation
 
Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networks
 
Declarative data analysis
Declarative data analysisDeclarative data analysis
Declarative data analysis
 
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
 
A0360105
A0360105A0360105
A0360105
 
Compressed learning for time series classification
Compressed learning for time series classificationCompressed learning for time series classification
Compressed learning for time series classification
 
Knn 160904075605-converted
Knn 160904075605-convertedKnn 160904075605-converted
Knn 160904075605-converted
 
Machine Learning Foundations for Professional Managers
Machine Learning Foundations for Professional ManagersMachine Learning Foundations for Professional Managers
Machine Learning Foundations for Professional Managers
 
Introduction to Big Data Science
Introduction to Big Data ScienceIntroduction to Big Data Science
Introduction to Big Data Science
 
SVD and the Netflix Dataset
SVD and the Netflix DatasetSVD and the Netflix Dataset
SVD and the Netflix Dataset
 
Introduction to Sparse Methods
Introduction to Sparse Methods Introduction to Sparse Methods
Introduction to Sparse Methods
 
Machine Learning: Classification Concepts (Part 1)
Machine Learning: Classification Concepts (Part 1)Machine Learning: Classification Concepts (Part 1)
Machine Learning: Classification Concepts (Part 1)
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Data Mining Lecture_10(b).pptx
Data Mining Lecture_10(b).pptxData Mining Lecture_10(b).pptx
Data Mining Lecture_10(b).pptx
 

Recently uploaded

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 

Recently uploaded (20)

Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 

icacis2012.pdf

  • 1. Protection of digital watermarking, based on SVD against false positive detection vulnerability UNIVERSITY HADJ LAKHDER -BATNA- SCIENCES FACULTY COMPUTER SCIENCE DEPARTEMENT By: Belferdi Wassila Dr Behloul Ali INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION AND INFORMATION SYSTEMS
  • 2. Plan • Introduction: • Singular Value Décomposition: • False Positive Détection Vulnerability: • Proposed Method: • Sharing Secret Principle: • Experiment Results : • Robustness Conditions Of The Proposed Method: • Conclusion and perspectives: 2
  • 3. Introduction • Day by day, the digital watermarking is becoming a promising technique to protect digital data. • It has seen numerous novel article covering new techniques; each one of those techniques have there advantages and inconveniences. • In recent years, the techniques using linear algebra has attracted attention of researchers to use it for watermarking(e.g. SVD). 3
  • 4. • From the viewpoint of linear algebra we can observe that. a discrete image is an array of non-negative scalar entries which may be regarded as a matrix. M=USV’=S li UiVi 4 Singular Value Décomposition (1) M U S V’ m n = m r n
  • 5. 5 SVD Based Watermarking Example Watermark Hôst image Uw Sw Vw U S V Insertion of watermark in hôst image Watermarked Image
  • 6. False Positive Détection Vulnerability • Duo to the watermark insertion method, another watermark rather than the original can be reconstructed as the embedded watermark; causing the false positive detection vulnerability . • If an attacker use U* and V* matrices of his own watermark in place of reserved ones he can show his own watermark. 6
  • 7. False Positive Détection Vulnerability (2) 7
  • 8. Proposed Method • To avoid that an attacker reconstruct his watermark using their own matrices U* and V*; the idea is to share a secret key D between matrices Uw, Sw and Vw of watermark. • During the embedding phase, for each matrices Uw, Sw and Vw of watermark a key is inserted, then use the modified S* to reconstruct the watermarked image, those keys are calculated using sharing secret principle. 8
  • 9. Sharing Secret Principle • The goal is to divide a secret key D into pieces. • The coefficients a1... ak-1 are randomly chosen from a uniform distribution over the integers in [0, p-1] • Pick a random k-1 degree polynomial q(x)=a0+alx+ . . . ak-1xk-1 in which a0=D. • The values D1,..., Dn are evaluate: D1= q(1) ,..., Di = q(i) ,..., Dn = q(n). • Given any subset of k of these Di, we can find the coefficients of q(x) by interpolation, and evaluate D=q (0). 9
  • 12. Experiment Results 12 Robustness results of the proposed method against attacks Attacks We W*e |D-Dc| |D-D*c| Cropping 5 188037 Gaussian noise 5 1888037 Rotation 0,2° 46568 234611 Resizing 44095 232139 Contrast adjustment 425 188469
  • 13. 13 Experiment Results(2) the size of image We W*e |D-Dc| |D-D*c| 512×512 5 188037 256×256 36 188007 128×128 913 187131 64×64 2406 185638 Results of the influence of image size on the robustness of the proposed method
  • 14. Robustness Conditions Of The Proposed Method 14 • In the SVD, the biggest part of energy is concentrated in low frequencies of images, the watermarking profit this property to insert watermark in low and middle frequencies according to robustness/invisibility compromiser influence of the inserted secret on the quality of the watermarked image
  • 15. Conclusion • The novelty of our scheme is the use of the sharing secret principle in watermark embedding, that is adaptively chosen according to the local features of the image. • The aim of our solution is to hide the watermark and insure their robustness against the false positive detection vulnerability. • The experimental results obtained give evidence that our scheme is robust against several attacks. 15
  • 16. Perspectives Our perspective turns around: • increasing the robustness of our solution using block based SVD scheme. • Conceive a méthode to choose coefficients a1... ak-1 randomly to obtain better results. 16