SlideShare a Scribd company logo
1 of 17
Protection of digital watermarking,
based on SVD against false positive
detection vulnerability
UNIVERSITY HADJ LAKHDER -BATNA-
SCIENCES FACULTY
COMPUTER SCIENCE DEPARTEMENT
By: Belferdi Wassila
Dr Behloul Ali
INTERNATIONAL CONFERENCE ON
ADVANCED COMMUNICATION AND
INFORMATION SYSTEMS
Plan
• Introduction:
• Singular Value Décomposition:
• False Positive Détection Vulnerability:
• Proposed Method:
• Sharing Secret Principle:
• Experiment Results :
• Robustness Conditions Of The Proposed Method:
• Conclusion and perspectives:
2
Introduction
• Day by day, the digital watermarking is becoming a
promising technique to protect digital data.
• It has seen numerous novel article covering new
techniques; each one of those techniques have there
advantages and inconveniences.
• In recent years, the techniques using linear algebra
has attracted attention of researchers to use it for
watermarking(e.g. SVD).
3
• From the viewpoint of linear algebra we can observe that.
a discrete image is an array of non-negative scalar entries
which may be regarded as a matrix.
M=USV’=S li UiVi
4
Singular Value Décomposition (1)
M U S V’
m
n
=
m r
n
5
SVD Based Watermarking Example
Watermark
Hôst image
Uw
Sw
Vw
U
S
V
Insertion of
watermark in
hôst image
Watermarked
Image
False Positive Détection Vulnerability
• Duo to the watermark insertion method, another
watermark rather than the original can be reconstructed as
the embedded watermark; causing the false positive
detection vulnerability .
• If an attacker use U* and V* matrices of his own
watermark in place of reserved ones he can show his own
watermark.
6
False Positive Détection Vulnerability (2)
7
Proposed Method
• To avoid that an attacker reconstruct his watermark
using their own matrices U* and V*; the idea is to share
a secret key D between matrices Uw, Sw and Vw of
watermark.
• During the embedding phase, for each matrices Uw, Sw
and Vw of watermark a key is inserted, then use the
modified S* to reconstruct the watermarked image,
those keys are calculated using sharing secret principle.
8
Sharing Secret Principle
• The goal is to divide a secret key D into pieces.
• The coefficients a1... ak-1 are randomly chosen from a uniform
distribution over the integers in [0, p-1]
• Pick a random k-1 degree polynomial q(x)=a0+alx+ . . . ak-1xk-1
in which a0=D.
• The values D1,..., Dn are evaluate:
D1= q(1) ,..., Di = q(i) ,..., Dn = q(n).
• Given any subset of k of these Di, we can find the
coefficients of q(x) by interpolation, and evaluate D=q (0).
9
Embedding Phase
10
Extraction Phase
11
Experiment Results
12
Robustness results of the proposed method against attacks
Attacks We W*e |D-Dc| |D-D*c|
Cropping 5 188037
Gaussian
noise 5 1888037
Rotation
0,2° 46568 234611
Resizing
44095 232139
Contrast
adjustment 425 188469
13
Experiment Results(2)
the size
of
image
We W*e |D-Dc| |D-D*c|
512×512 5 188037
256×256 36 188007
128×128 913 187131
64×64 2406 185638
Results of the influence of image size on the robustness of the proposed method
Robustness Conditions Of The Proposed
Method
14
• In the SVD, the biggest
part of energy is
concentrated in low
frequencies of images,
the watermarking profit
this property to insert
watermark in low and
middle frequencies
according to
robustness/invisibility
compromiser
influence of the inserted secret on the quality of the watermarked image
Conclusion
• The novelty of our scheme is the use of the sharing secret
principle in watermark embedding, that is adaptively chosen
according to the local features of the image.
• The aim of our solution is to hide the watermark and insure
their robustness against the false positive detection
vulnerability.
• The experimental results obtained give evidence that our
scheme is robust against several attacks.
15
Perspectives
Our perspective turns around:
• increasing the robustness of our solution using block based
SVD scheme.
• Conceive a méthode to choose coefficients a1... ak-1 randomly
to obtain better results.
16
QUESTIONS ?
17

More Related Content

Similar to icacis2012.pptx

Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Universitat Politècnica de Catalunya
 
TunUp final presentation
TunUp final presentationTunUp final presentation
TunUp final presentation
Gianmario Spacagna
 
Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networks
mourya chandra
 
Declarative data analysis
Declarative data analysisDeclarative data analysis
Declarative data analysis
South West Data Meetup
 
Compressed learning for time series classification
Compressed learning for time series classificationCompressed learning for time series classification
Compressed learning for time series classification
學翰 施
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
Mukul Jindal
 

Similar to icacis2012.pptx (20)

Aaa ped-17-Unsupervised Learning: Dimensionality reduction
Aaa ped-17-Unsupervised Learning: Dimensionality reductionAaa ped-17-Unsupervised Learning: Dimensionality reduction
Aaa ped-17-Unsupervised Learning: Dimensionality reduction
 
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
 
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandDWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
 
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder Piracy
 
Cluster Analysis for Dummies
Cluster Analysis for DummiesCluster Analysis for Dummies
Cluster Analysis for Dummies
 
TunUp final presentation
TunUp final presentationTunUp final presentation
TunUp final presentation
 
Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networks
 
Declarative data analysis
Declarative data analysisDeclarative data analysis
Declarative data analysis
 
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
 
A0360105
A0360105A0360105
A0360105
 
Compressed learning for time series classification
Compressed learning for time series classificationCompressed learning for time series classification
Compressed learning for time series classification
 
Knn 160904075605-converted
Knn 160904075605-convertedKnn 160904075605-converted
Knn 160904075605-converted
 
Machine Learning Foundations for Professional Managers
Machine Learning Foundations for Professional ManagersMachine Learning Foundations for Professional Managers
Machine Learning Foundations for Professional Managers
 
Introduction to Big Data Science
Introduction to Big Data ScienceIntroduction to Big Data Science
Introduction to Big Data Science
 
SVD and the Netflix Dataset
SVD and the Netflix DatasetSVD and the Netflix Dataset
SVD and the Netflix Dataset
 
Introduction to Sparse Methods
Introduction to Sparse Methods Introduction to Sparse Methods
Introduction to Sparse Methods
 
Machine Learning: Classification Concepts (Part 1)
Machine Learning: Classification Concepts (Part 1)Machine Learning: Classification Concepts (Part 1)
Machine Learning: Classification Concepts (Part 1)
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Data Mining Lecture_10(b).pptx
Data Mining Lecture_10(b).pptxData Mining Lecture_10(b).pptx
Data Mining Lecture_10(b).pptx
 

Recently uploaded

Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Hung Le
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
ZurliaSoop
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
David Celestin
 

Recently uploaded (17)

Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptx
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait Cityin kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 

icacis2012.pptx

  • 1. Protection of digital watermarking, based on SVD against false positive detection vulnerability UNIVERSITY HADJ LAKHDER -BATNA- SCIENCES FACULTY COMPUTER SCIENCE DEPARTEMENT By: Belferdi Wassila Dr Behloul Ali INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION AND INFORMATION SYSTEMS
  • 2. Plan • Introduction: • Singular Value Décomposition: • False Positive Détection Vulnerability: • Proposed Method: • Sharing Secret Principle: • Experiment Results : • Robustness Conditions Of The Proposed Method: • Conclusion and perspectives: 2
  • 3. Introduction • Day by day, the digital watermarking is becoming a promising technique to protect digital data. • It has seen numerous novel article covering new techniques; each one of those techniques have there advantages and inconveniences. • In recent years, the techniques using linear algebra has attracted attention of researchers to use it for watermarking(e.g. SVD). 3
  • 4. • From the viewpoint of linear algebra we can observe that. a discrete image is an array of non-negative scalar entries which may be regarded as a matrix. M=USV’=S li UiVi 4 Singular Value Décomposition (1) M U S V’ m n = m r n
  • 5. 5 SVD Based Watermarking Example Watermark Hôst image Uw Sw Vw U S V Insertion of watermark in hôst image Watermarked Image
  • 6. False Positive Détection Vulnerability • Duo to the watermark insertion method, another watermark rather than the original can be reconstructed as the embedded watermark; causing the false positive detection vulnerability . • If an attacker use U* and V* matrices of his own watermark in place of reserved ones he can show his own watermark. 6
  • 7. False Positive Détection Vulnerability (2) 7
  • 8. Proposed Method • To avoid that an attacker reconstruct his watermark using their own matrices U* and V*; the idea is to share a secret key D between matrices Uw, Sw and Vw of watermark. • During the embedding phase, for each matrices Uw, Sw and Vw of watermark a key is inserted, then use the modified S* to reconstruct the watermarked image, those keys are calculated using sharing secret principle. 8
  • 9. Sharing Secret Principle • The goal is to divide a secret key D into pieces. • The coefficients a1... ak-1 are randomly chosen from a uniform distribution over the integers in [0, p-1] • Pick a random k-1 degree polynomial q(x)=a0+alx+ . . . ak-1xk-1 in which a0=D. • The values D1,..., Dn are evaluate: D1= q(1) ,..., Di = q(i) ,..., Dn = q(n). • Given any subset of k of these Di, we can find the coefficients of q(x) by interpolation, and evaluate D=q (0). 9
  • 12. Experiment Results 12 Robustness results of the proposed method against attacks Attacks We W*e |D-Dc| |D-D*c| Cropping 5 188037 Gaussian noise 5 1888037 Rotation 0,2° 46568 234611 Resizing 44095 232139 Contrast adjustment 425 188469
  • 13. 13 Experiment Results(2) the size of image We W*e |D-Dc| |D-D*c| 512×512 5 188037 256×256 36 188007 128×128 913 187131 64×64 2406 185638 Results of the influence of image size on the robustness of the proposed method
  • 14. Robustness Conditions Of The Proposed Method 14 • In the SVD, the biggest part of energy is concentrated in low frequencies of images, the watermarking profit this property to insert watermark in low and middle frequencies according to robustness/invisibility compromiser influence of the inserted secret on the quality of the watermarked image
  • 15. Conclusion • The novelty of our scheme is the use of the sharing secret principle in watermark embedding, that is adaptively chosen according to the local features of the image. • The aim of our solution is to hide the watermark and insure their robustness against the false positive detection vulnerability. • The experimental results obtained give evidence that our scheme is robust against several attacks. 15
  • 16. Perspectives Our perspective turns around: • increasing the robustness of our solution using block based SVD scheme. • Conceive a méthode to choose coefficients a1... ak-1 randomly to obtain better results. 16