- Kshitij Koushik Kota: GitHub
- Pranav Hemanth: GitHub
- Sampriti Saha: GitHub
- Pranav Rajesh Narayan: GitHub
- Roshini Ramesh: GitHub
Topic: Digital Watermarking of Images
In the AI-driven media landscape, digital forgery, deep fakes, copyright infringement, and plagiarism present significant challenges. Verifying the originality and integrity of images is essential to combat misinformation and protect intellectual property. This documentation provides a comprehensive overview of our digital watermarking system designed to authenticate images by embedding hashes. The system maintains image integrity and authenticity, even through compressions and data transfers.
Images on the internet have become a significant source of misinformation, posing challenges for authenticity verification. Current watermarking methods are inadequate. This deficiency allows for the dissemination of altered or misleading content, undermining trust in digital media.
Develop a robust watermarking system for raw images that can be embedded at the image's inception. This system will enable any individual on the internet to verify the image's source and if it has been tampered with.
- Imperceptible yet robust watermarks: Embed watermarks into images that withstand common manipulations.
- Compatibility: Support a wide range of image formats.
- Verification: Provide an online platform for easy verification of watermarked images.
- Scalability: Ensure the system can adapt to future advancements in AI and image processing.
- Embedding at Creation: Watermarks are embedded at the point of image creation.
- Imperceptibility: Watermarks are invisible to the human eye but resistant to tampering.
- Format Compatibility: Supports various image formats and resolutions.
- Easy Verification: Accessible online verification process.
- Scalability: Designed to handle large-scale usage and advancements in technology.
- Content Creators and Artists: Protect original work from unauthorized use.
- Media Organizations and Journalists: Verify authenticity of news images.
- Social Media Platforms: Curb misinformation.
- General Internet Users: Verify image authenticity online.
An effective watermarking system for AI-generated images will combat misinformation, protect intellectual property rights, and foster trust in digital media.
- Ease of Removal: Watermarks are easily removed by advanced AI algorithms.
- Image Quality: Watermarks can degrade image quality.
- Limited Robustness: Vulnerable to common image processing operations.
- Risk of Alteration: Watermarks can be altered or removed.
- Limited Compatibility: May not work with all image types or require specific software.
- User Experience: Watermarks can interfere with viewing experience.
Purpose: Authenticate images by embedding a unique hash as a digital watermark, ensuring originality and verification.
- Technology: Use AI platforms like DALL-E for high-quality image generation or standard cameras for capturing raw images.
- Process: Generate or capture images based on user inputs or predefined criteria.
- Timing: Embed the hash at the final layer of image generation or capturing.
- Method: Derive a hash from the image properties and embed it as a digital watermark.
- Purpose: Identify optimal locations for hash embedding.
- Functionality: Recognize significant areas in the image that are less prone to distortion/compression.
- Current Method: Use LSB substitution to embed the hash.
- Extraction: Reverse the embedding process to retrieve the hash.
- Authentication: Utilize the embedded hashes to verify image authenticity.
By combining these steps, our solution provides a coherent and reliable method for ensuring image authenticity, making it a valuable tool in combating misinformation and verifying digital content.
Object Identification
- Objective: Identify objects within images, such as animals, landscapes, and humans.
- Method: Employ convolutional neural networks (CNNs) trained on labeled image datasets for accurate object detection.
Attention Algorithm
- Objective: Determine the critical parts of an image that are optimal for hash embedding.
- Method: Use the ML model to segment the image into its constituent parts and identify areas that are less likely to be altered or distorted.
Hash Generation
- Objective: Create a unique identifier for each image.
- Method: Generate a hash using the SHA256 hashing algorithm based on the image's properties.
Hash Embedding
- Objective: Embed the hash into the image in a manner that is imperceptible to the human eye.
- Method:
- Utilize the attention algorithm to pinpoint optimal embedding coordinates.
- Embed the hash using Least Significant Bit (LSB) embedding techniques.
- Extract the Embedded Hash: Use the same coordinates and techniques to retrieve the hash from the image.
- Compute the Hash Independently: Generate a hash using SHA256 on the current state of the image.
- Match the Hashes: Compare the extracted hash with the independently computed hash to verify the image's integrity.
- Robust Verification: Ensures the authenticity of images through a secure embedding process.
- Imperceptible Watermarks: Embedding is done in a manner that is invisible to the human eye, resistant to tampering.
- Independent Verification: Allows any user to verify image authenticity without specialized tools.
- Current Solution: Use simple LSB substitution.
- Future Enhancements: Explore frequency-based methods and combine with LSB for robustness.
- Strategy: Embed in areas less prone to compression, such as edges, low-frequency areas, color channels, salient features, key points, and descriptors.
- Initial Implementation: Use PNG format for stable embedding.
- Attention Algorithm: Identify least altering areas for embedding.
- Current Data: Embed SHA256 hash of the image.
- Additional Data: Embed source and related information.
- Initial Release: Large companies first.
- Staggered Release: Gradually extend to smaller companies.
- Future Expansion: Make accessible to individual users.
- Raw Images: Unprocessed images at the source of inception (e.g., camera pictures, AI-generated images).
- Meta's Solution - Stable Signatures
- Google DeepMind Watermarking Tool
- AI Watermarks on DALL-E
- Internals of Image Steganography - Codementor
- How does Syndrome-Trellis Code (STC) work? - Cryptography Stack Exchange
- Detection of tamper forgery image in security digital image - ScienceDirect
- Image Tampering - ScienceDirect
- Digital Steganography and Watermarking for Digital Images: A Review of Current Research Directions | IEEE Journals & Magazine | IEEE Xplore
- A New Approach of Steganography on Image Metadata | Fernando | JOIV
- A Survey of Image Steganography Techniques - ResearchGate
- The Stable Signature: Rooting Watermarks in Latent Diffusion Models - arXiv
- A blind spatial domain-based image watermarking using texture analysis and association rules mining - ResearchGate
- ARM Controller Based Image Steganography Using LSB Algorithm - ResearchGate
- A New Method of Image Steganography Using 7th Bit of a Pixel as Indicator by Introducing the Successive Temporary Pixel in the Gray Scale Image - ResearchGate
- Securing and Hiding Secret Message in Image using XOR Transposition Encryption and LSB Method - IOPscience
- Understanding DCT and Quantization in JPEG compression - DEV Community
- How are Images Compressed? [46MB ↘↘ 4.07MB] JPEG In Depth - YouTube
- JPEG DCT, Discrete Cosine Transform (JPEG Pt2)- Computerphile - YouTube
- How Computers Compress Text: Huffman Coding and Huffman Trees -YouTube