Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta

Slides:



Advertisements
Similar presentations
Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Advertisements

Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Khan, Mohammed Minhajuddin
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Robust Digital Right Management Scheme (DRM) for Multimedia Anuj Maheshwari Victor Sutan
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
Reza Mohammadi Shiraz University Of Technology
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Digital Watermarking
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
DEPARTMENT OF ECE, BEC, BAGALKOT
Introduction to Steganography
Information Hiding Technology: Current Research and Future Trend
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
IMAGE PROCESSING IMAGE WATERMARKING
Welcome
Technical Aspects of Digital Rights Management
DONE BY S.MURALIRAJAN M.NIRMAL
Visit for more Learning Resources
Recent Developments on Multimedia and Secure Networking Technologies
Khan, Mohammed Minhajuddin
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Steganography in digital images
Parag Agarwal Digital Watermarking Parag Agarwal
Recent Developments on Multimedia and Secure Networking Technologies
Authors: J.J. Murillo-Fuentes
Recent Developments in Information Hiding
STEGANOGRAPHY IN IMAGES
Introduction to Multimedia Security Topics Covered in this Course
Digital Watermarking Lecture 2
Presentation transcript:

Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta Digital Watermarking Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta

Agenda Background Terminology Applications Techniques Research topics References

Information Hiding Information Hiding…..started with Steganography (art of hidden writing): The art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. The existence of information is secret. Stego – Hidden , Graphy – Writing  ‘art of hidden writing’

Steganography (dates back to 440 BC) Histaeus used his slaves (information tattooed on a slave’s shaved head ) Initial Applications of information hiding  Passing Secret messages

Microchip - Application Germans used Microchips in World War II Initial Applications of information hiding  Passing Secret messages

What is a watermark ? What is a watermark ? A distinguishing mark impressed on paper during manufacture; visible when paper is held up to the light (e.g. $ Bill) Application for print media  authenticity of print media

What is a watermark ? Digital Watermarking: Application of Information hiding (Hiding Watermarks in digital Media, such as images) Digital Watermarking can be ? - Perceptible (e.g. author information in .doc) - Imperceptible (e.g. author information in images) Visibility is application dependent Invisible watermarks are preferred ?

Applications Copyright Protecton:To prove the ownership of digital media Eg. Cut paste of images Hidden Watermarks represent the copyright information

Applications Tamper proofing: To find out if data was tampered. Eg. Change meaning of images Hidden Watermarks track change in meaning Issues: Accuracy of detection

Applications Quality Assessment: Degradation of Visual Quality Loss of Visual Quality Hidden Watermarks track change in visual quality

Comparison Watermarking Vs Cryptography Watermark D  Hide information in D Encrypt D  Change form of D

Watermarking Process Data (D), Watermark (W), Stego Key (K), Watermarked Data (Dw) Embed (D, W, K) = Dw Extract (Dw) = W’ and compare with W (e.g. find the linear correlation and compare it to a threshold) Q. How do we make this system secure ? A. K is secret (Use cryptography to make information hidden more secure)

Watermarking Process Example – Embedding (Dw = D + W) Matrix representation (12 blocks – 3 x 4 matrix) (Algorithm Used: Random number generator RNG), Seed for RNG = K, D = Matrix representation, W = Author’s name 1 2 3 4 5 6 7 8 9 10 11 12

Watermarking Process Example – Extraction The Watermark can be identified by generating the random numbers using the seed K 1 6 8 10

Data Domain Categorization Spatial Watermarking Direct usage of data to embed and extract Watermark e.g. voltage values for audio data Transform Based Watermarking Conversion of data to another format to embed and extract. e.g. Conversion to polar co-ordinate systems of 3D models, makes it robust against scaling

Extraction Categorization Informed (Private) Extract using {D, K, W} Semi - Blind (Semi-Private) Extract using {K, W} Blind (Public) Extract using {K} - Blind (requires less information storage) - Informed techniques are more robust to tampering

Robustness Categorization Fragile (for tamper proofing e.g. losing watermark implies tampering) Semi-Fragile (robust against user level operations, e.g. image compression) Robust (against adversary based attack, e.g. noise addition to images) This categorization is application dependent

Categorization of Watermark Eg1. Robust Private Spatial Watermarks Eg2. Blind Fragile DCT based Watermarks Eg3. Blind Semi-fragile Spatial Watermarks

Watermarking Example Application: Copyright Protection Design Requirements: - Imperceptibility - Capacity - Robustness - Security

Imperceptibility Watermarking Stanford Bunny 3D Model Visible Watermarks in Bunny Model  Distortion Watermarking Invisible Watermarks in Bunny Model  Minimal Distortion Stanford Bunny 3D Model

Robustness Adversaries can attack the data set and remove the watermark. Attacks are generally data dependent e.g. Compression that adds noise can be used as an attack to remove the watermark. Different data types can have different compression schemes.

Robustness Value Change Attacks - Noise addition e.g. lossy compression - Uniform Affine Transformation e.g. 3D model being rotated in 3D space OR image being scaled If encoding of watermarks are data value dependent  Watermark is lost  Extraction process fails

Robustness Sample loss Attacks - Cropping e.g. Cropping in images - Smoothing e.g. smoothing of audio signals e.g. Change in Sample rates in audio data change in sampling rat results in loss of samples If watermarks are encoded in parts of data set which are lost  Watermark is lost  Extraction process fails

Robustness Reorder Attack - Reversal of sequence of data values e.g. reverse filter in audio signal reverses the order of data values in time 1 1 1 1 Attack 1 2 3 3 2 1 Samples in time Samples in time If encoding is dependent on an order and the order is changed  Watermark is lost Extraction process fails

Capacity Multiple Watermarks can be supported. More capacity implies more robustness since watermarks can be replicated. Spatial Methods are have higher capacity than transform techniques ?

Security In case the key used during watermark is lost anyone can read the watermark and remove it. In case the watermark is public, it can be encoded and copyright information is lost.

Watermarking Algorithm Design Requirements As much information (watermarks) as possible  Capacity Only be accessible by authorized parties  Security Resistance against hostile/user dependent changes  Robustness Invisibility  Imperceptibility

Tamper proofing Robustness against user related operations – compression, format conversion Accuracy of Detection – Only changes in meaning should be detected

References http://en.wikipedia.org/wiki/Steganography http://en.wikipedia.org/wiki/Digital_watermark http://www.cypak.com/pictures/med/Cypak%20microchip.jpg THANK YOU !