Sorry, you need to enable JavaScript to visit this website.

Watermarking and Steganography

Introduction to Digital Watermarking - Lecture Slides


Lecture notes for undergraduate and first-year graduate students on digital watermarking and data embedding in multimedia data.

Based on lectures developed at University of Maryland, College Park, USA.

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

408S12_lec9_MMwmk.pdf

(451 downloads)

Keywords

Subscribe

[1] , "Introduction to Digital Watermarking - Lecture Slides", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/133. Accessed: Aug. 17, 2017.
@article{133-15,
url = {http://sigport.org/133},
author = { },
publisher = {IEEE SigPort},
title = {Introduction to Digital Watermarking - Lecture Slides},
year = {2015} }
TY - EJOUR
T1 - Introduction to Digital Watermarking - Lecture Slides
AU -
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/133
ER -
. (2015). Introduction to Digital Watermarking - Lecture Slides. IEEE SigPort. http://sigport.org/133
, 2015. Introduction to Digital Watermarking - Lecture Slides. Available at: http://sigport.org/133.
. (2015). "Introduction to Digital Watermarking - Lecture Slides." Web.
1. . Introduction to Digital Watermarking - Lecture Slides [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/133

STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE

Paper Details

Authors:
Tomas Denemark, Jessica Fridrich
Submitted On:
11 March 2017 - 8:47pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

ICASSP_2017_v1.2.pdf

(51 downloads)

Keywords

Subscribe

[1] Tomas Denemark, Jessica Fridrich, "STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE", IEEE SigPort, 2017. [Online]. Available: http://sigport.org/1658. Accessed: Aug. 17, 2017.
@article{1658-17,
url = {http://sigport.org/1658},
author = {Tomas Denemark; Jessica Fridrich },
publisher = {IEEE SigPort},
title = {STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE},
year = {2017} }
TY - EJOUR
T1 - STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE
AU - Tomas Denemark; Jessica Fridrich
PY - 2017
PB - IEEE SigPort
UR - http://sigport.org/1658
ER -
Tomas Denemark, Jessica Fridrich. (2017). STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE. IEEE SigPort. http://sigport.org/1658
Tomas Denemark, Jessica Fridrich, 2017. STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE. Available at: http://sigport.org/1658.
Tomas Denemark, Jessica Fridrich. (2017). "STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE." Web.
1. Tomas Denemark, Jessica Fridrich. STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE [Internet]. IEEE SigPort; 2017. Available from : http://sigport.org/1658

Benchmarking of Scoring Functions for Bias-Based Fingerprinting Code

Paper Details

Authors:
Submitted On:
19 March 2016 - 5:08am
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

icassp16.pdf

(147 downloads)

Keywords

Subscribe

[1] , "Benchmarking of Scoring Functions for Bias-Based Fingerprinting Code", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/793. Accessed: Aug. 17, 2017.
@article{793-16,
url = {http://sigport.org/793},
author = { },
publisher = {IEEE SigPort},
title = {Benchmarking of Scoring Functions for Bias-Based Fingerprinting Code},
year = {2016} }
TY - EJOUR
T1 - Benchmarking of Scoring Functions for Bias-Based Fingerprinting Code
AU -
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/793
ER -
. (2016). Benchmarking of Scoring Functions for Bias-Based Fingerprinting Code. IEEE SigPort. http://sigport.org/793
, 2016. Benchmarking of Scoring Functions for Bias-Based Fingerprinting Code. Available at: http://sigport.org/793.
. (2016). "Benchmarking of Scoring Functions for Bias-Based Fingerprinting Code." Web.
1. . Benchmarking of Scoring Functions for Bias-Based Fingerprinting Code [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/793

Checking Up the Health of Multimedia Security


The terminology "multimedia security" gained a new popularity in the mid-90s with the rapid rise of digital watermarking in an attempt to combat piracy of copyrighted content. This milestone incarnates the mutation of content protection techniques from conventional cryptography to signal processing techniques. Today, multimedia security encompasses a much wider range of techniques such as multimedia encryption, content fingerprinting, anti-camcording, passive forensic analysis.

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:38pm
Short Link:
Type:

Document Files

multimediaSecurity_INRIA2014.pdf

(282 downloads)

Keywords

Subscribe

[1] , "Checking Up the Health of Multimedia Security", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/230. Accessed: Aug. 17, 2017.
@article{230-15,
url = {http://sigport.org/230},
author = { },
publisher = {IEEE SigPort},
title = {Checking Up the Health of Multimedia Security},
year = {2015} }
TY - EJOUR
T1 - Checking Up the Health of Multimedia Security
AU -
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/230
ER -
. (2015). Checking Up the Health of Multimedia Security. IEEE SigPort. http://sigport.org/230
, 2015. Checking Up the Health of Multimedia Security. Available at: http://sigport.org/230.
. (2015). "Checking Up the Health of Multimedia Security." Web.
1. . Checking Up the Health of Multimedia Security [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/230

Forensic Watermarking for UHD Video


Forensic watermarking is a technology that deters piracy by providing means to copyright owners to trace back the identity of the original recipient of a video in case it appears on unauthorized sharing platforms. Historically, its use has been somewhat limited to professional environments e.g. for pre-release material movie distribution and in digital cinemas. MovieLabs recently released a specification that mandates the use of such forensic watermarks to deliver premium UHD content, thereby opening doors for mass market deployment of watermarking in CE environment.

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:38pm
Short Link:
Type:

Document Files

wm4uhd_vsf2015.pdf

(297 downloads)

Keywords

Subscribe

[1] , "Forensic Watermarking for UHD Video", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/229. Accessed: Aug. 17, 2017.
@article{229-15,
url = {http://sigport.org/229},
author = { },
publisher = {IEEE SigPort},
title = {Forensic Watermarking for UHD Video},
year = {2015} }
TY - EJOUR
T1 - Forensic Watermarking for UHD Video
AU -
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/229
ER -
. (2015). Forensic Watermarking for UHD Video. IEEE SigPort. http://sigport.org/229
, 2015. Forensic Watermarking for UHD Video. Available at: http://sigport.org/229.
. (2015). "Forensic Watermarking for UHD Video." Web.
1. . Forensic Watermarking for UHD Video [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/229

Outlier Aggregation to Pick Up Scattered Watermark Energy


Correlation-based watermark detection inherently assumes that a pseudo-random watermark pattern is present in the cover signal at a given location. However, disparity-coherent watermarks for stereo video content are broken into pieces which are offset one with respect to the others. Acoustic transmission yields echoes due to multi-path propagation and may thus introduce watermark replicates in the recorded audio track. In such cases, the watermark energy is not concentrated in a single element of the cross-correlation array but rather distributed over a number of them.

Paper Details

Authors:
Hasan Sheikh-Faridul
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:
Event:
Presenter's Name:

Document Files

ICIP2015_poster_landscape.pdf

(305 downloads)

Keywords

Subscribe

[1] Hasan Sheikh-Faridul, "Outlier Aggregation to Pick Up Scattered Watermark Energy", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/228. Accessed: Aug. 17, 2017.
@article{228-15,
url = {http://sigport.org/228},
author = {Hasan Sheikh-Faridul },
publisher = {IEEE SigPort},
title = {Outlier Aggregation to Pick Up Scattered Watermark Energy},
year = {2015} }
TY - EJOUR
T1 - Outlier Aggregation to Pick Up Scattered Watermark Energy
AU - Hasan Sheikh-Faridul
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/228
ER -
Hasan Sheikh-Faridul. (2015). Outlier Aggregation to Pick Up Scattered Watermark Energy. IEEE SigPort. http://sigport.org/228
Hasan Sheikh-Faridul, 2015. Outlier Aggregation to Pick Up Scattered Watermark Energy. Available at: http://sigport.org/228.
Hasan Sheikh-Faridul. (2015). "Outlier Aggregation to Pick Up Scattered Watermark Energy." Web.
1. Hasan Sheikh-Faridul. Outlier Aggregation to Pick Up Scattered Watermark Energy [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/228

Anti-cropping Blind Resynchronization for 3D Watermarking


Center of mass recovery with a cropped object

Radial-based 3D watermarking alters the distances between the center of mass of the 3D mesh and its vertices. These watermarking systems are inherently sensitive to cropping. To address this limitation, this paper introduces a complementary blind resynchronization module to transmit critical synchronization information to the watermark decoder. Spherical patterns formed by several secret landmark vertices are embedded alongside the payload and blindly retrieved by the decoder, thereby conveying the synchronization information needed.

Paper Details

Authors:
Xavier Rolland-Nevière, Pierre Alliez
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

presentation.pdf

(673 downloads)

Keywords

Subscribe

[1] Xavier Rolland-Nevière, Pierre Alliez, "Anti-cropping Blind Resynchronization for 3D Watermarking", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/187. Accessed: Aug. 17, 2017.
@article{187-15,
url = {http://sigport.org/187},
author = {Xavier Rolland-Nevière; Pierre Alliez },
publisher = {IEEE SigPort},
title = {Anti-cropping Blind Resynchronization for 3D Watermarking},
year = {2015} }
TY - EJOUR
T1 - Anti-cropping Blind Resynchronization for 3D Watermarking
AU - Xavier Rolland-Nevière; Pierre Alliez
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/187
ER -
Xavier Rolland-Nevière, Pierre Alliez. (2015). Anti-cropping Blind Resynchronization for 3D Watermarking. IEEE SigPort. http://sigport.org/187
Xavier Rolland-Nevière, Pierre Alliez, 2015. Anti-cropping Blind Resynchronization for 3D Watermarking. Available at: http://sigport.org/187.
Xavier Rolland-Nevière, Pierre Alliez. (2015). "Anti-cropping Blind Resynchronization for 3D Watermarking." Web.
1. Xavier Rolland-Nevière, Pierre Alliez. Anti-cropping Blind Resynchronization for 3D Watermarking [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/187

Watermarking-based Traitor Tracing to Deter Piracy of Entertainment Content


Piracy forensic workflow

This talk will be organized in three main parts. To begin with, I will review the ecosystem of the Entertainment industry, survey the different tools available to combat piracy and introduce the multimedia forensics workflow typically in use today. Next, I will focus on digital watermarking, a technology used to introduce imperceptible machine-readable markers in multimedia content. After briefly going through fundamentals, I will describe in more details the 2-step watermarking strategy adopted by Technicolor and discuss its pros and cons e.g.

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

invitedTalk_UGriffith.pdf

(336 downloads)

Keywords

Subscribe

[1] , "Watermarking-based Traitor Tracing to Deter Piracy of Entertainment Content", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/186. Accessed: Aug. 17, 2017.
@article{186-15,
url = {http://sigport.org/186},
author = { },
publisher = {IEEE SigPort},
title = {Watermarking-based Traitor Tracing to Deter Piracy of Entertainment Content},
year = {2015} }
TY - EJOUR
T1 - Watermarking-based Traitor Tracing to Deter Piracy of Entertainment Content
AU -
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/186
ER -
. (2015). Watermarking-based Traitor Tracing to Deter Piracy of Entertainment Content. IEEE SigPort. http://sigport.org/186
, 2015. Watermarking-based Traitor Tracing to Deter Piracy of Entertainment Content. Available at: http://sigport.org/186.
. (2015). "Watermarking-based Traitor Tracing to Deter Piracy of Entertainment Content." Web.
1. . Watermarking-based Traitor Tracing to Deter Piracy of Entertainment Content [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/186