Information Hiding: Watermarking and Steganography

Slides:



Advertisements
Similar presentations
Information Hiding and Covert Channels
Advertisements

Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Prepared for DA 201  Introduction to Digital Watermarking.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Steganography and Watermarks Trust and Reputation.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Brodatz Textures Vistex Textures What is texture ? Texture can be considered to be repeating patterns of local variation of pixel intensities.
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Technical Aspects of Digital Rights Management
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Enhancing Biometric Security Using Watermarking By Shivankush Aras.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Digital Steganography
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Damageless Information Hiding Technique using Neural Network Keio University Graduate School of Media and Governance Kensuke Naoe.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Digital Watermarking
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Cryptographic Anonymity Project Alan Le
CSE725.  Watermarking dates back in History.  Cryptography for protection.  Need of software for ownership protection.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Introduction to Steganography
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Technical Aspects of Digital Rights Management
DONE BY S.MURALIRAJAN M.NIRMAL
Visit for more Learning Resources
Recent Developments on Multimedia and Secure Networking Technologies
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Recent Developments on Multimedia and Secure Networking Technologies
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

Information Hiding: Watermarking and Steganography Content may be borrowed from other resources. See the last slide for acknowledgements! Information Hiding: Watermarking and Steganography Amir Houmansadr CS660: Advanced Information Assurance Spring 2015

Principles of assurance: CIA Confidentiality Keeping data and resources hidden Integrity Data integrity (integrity) Origin integrity (authentication) Availability Enabling access to data and resources Confidentiality: a good example is cryptography, which traditionally is used to protect secret messages. But cryptography is traditionally used to protect data, not resources. Resources are protected by limiting information, for example by using firewalls or address translation mechanisms. Integrity: a good example here is that of an interrupted database transaction, leaving the database in an inconsistent state (this foreshadows the Clark-Wilson model). Trustworthiness of both data and origin affects integrity, as noted in the book’s example. That integrity is tied to trustworthiness makes it much harder to quantify than confidentiality. Cryptography provides mechanisms for detecting violations of integrity, but not preventing them (e.g., a digital signature can be used to determine if data has changed). Availability: this is usually defined in terms of “quality of service,” in which authorized users are expected to receive a specific level of service (stated in terms of a metric). Denial of service attacks are attempts to block availability.

Confidentiality Encryption is the main tool Examples: But, sometimes it is not enough! Examples: Drug dealer Military scenario Whistleblower Etc.

Information Hiding IH dates back to ancient Greece and Persia Well, not this type of hiding Ancient Chinese wrote messages on fine silk, which was then crunched into a tiny ball and covered in wax. The messenger then swallowed the ball of wax. In the sixteenth century, the Italian scientist Giovanni Porta described how to conceal a message within a hard-boiled egg by making an ink from a mixture of one ounce of alum and a pint of vinegar, and then using ink to write on the shell. The ink penetrated the porous shell, and left the message on the surface of the hardened egg albumen, which could be read only when the shell was removed. Special “inks” were important steganographic tools even during Second World War. During Second World War a technique was developed to shrink photographically a page of text into a dot less than one millimeter in diameter, and then hide this microdot in an apparently innocuous letter. (The first microdot has been spotted by FBI in 1941.)

(Digital) Information Hiding Definition: Concealing the very existence of some kind of information (e.g., a series of data bits, the identity of the communicating party, etc.) for some specific purpose (e.g., to prove ownership, to remain untraceable, etc.)

Information confidentiality protection IH does not intend to hide the contents of information Encryption Information confidentiality protection tools can be combined with information hiding techniques

Applications, or why we need to hide information Improve confidentiality by hiding the very existence of messages Prove ownership on digital media Fingerprint media for trace back Blocking resistance Forensics …

Classes of Information Hiding Steganography Digital watermarking Covert channels Anonymous communication Protocol obfuscation Not a class of information hiding: Encryption There are various classifications

Steganography Embedding some information (stegotext) within a digital media (covertext) so that the digital media looks unchanged (imperceptible) to a human/machine

General model

Why can we hide? Because there are unused/redundant data bits in digital media, that changing them will be imperceptible E.g., image compression significantly reduces the size of an image by removing some of the redundant information bits. The unused/redundant data can be used to hide some digital information

Example The human visual and auditory systems are not perfect.

Types of Cover Media We can hide information in pretty much any digital media: Audio Image Video Graphics Text files Software Digital events (e.g., timings) Network traffic

Classes of Information Hiding Steganography Digital watermarking Covert channels Anonymous communication Protocol obfuscation Not a class of information hiding: Encryption There are various classifications

Digital watermarking Embedding some information (watermark) within a digital media (covertext) so that the digital media looks unchanged (imperceptible) to a human/machine

Watermarking vs. Steganography The hidden information itself is not important by itself (no secure), it says something about the covertext Steganography: The covertext has no value, it is only there to convey the stegotext. Stegotext is the valuable information, and is independent of covertext.

Applications: Watermarking vs. Steganography Authenticity: proof of ownership Fingerprinting: piracy tracking Integrity: tamper detection Data augmentation: add meta-data Steganography Stealthy communication of messages Watermarking usually needs lower data capacity

Attacks: Watermarking vs. Steganography Attacker’s objective: Watermarking: remove the watermark without distorting the covertext, or change the covertext without distoring the watermark Steganography: detect the presence of the hidden message, and extract it

Types of watermarking/steganography Fragile vs. robust Fragile is expected to destroy with modifications. Robust is expected to survive noise.

Example application: tamper detection Original Image Tampered Image

Example application: tamper detection

Types of watermarking/steganography Fragile vs. robust Fragile is expected to destroy with modifications. Robust is expected to survive noise. Blind vs. semi-blind vs. non-blind Blind needs the original covertext for detection. Semi-blind needs some information from the insertion, but not the whole covertext.

A blind scheme

Types of watermarking/steganography Fragile vs. robust Fragile is expected to destroy with modifications. Robust is expected to survive noise. Blind vs. semi-blind vs. non-blind Blind needs the original covertext for detection. Semi-blind needs some information from the insertion, but not the whole covertext. Pure vs. secret key vs. public key Pure needs no key for detection. Secret key schemes needs a secret key for both embedding and detection. Public key schemes use a secret key for embedding, a secret key for detection.

Pure vs. secret key vs. public key

Example Steganography scheme LSB-based image steganography

A digital image

LSB-based steganography

Using multiple bits Bits used=1 Bits used=4 Host pixel: 10110001 Secret pixel: 01100110 Resulted pixel: 10110000 Resulted pixel: 10110110

Example scheme: LSB-based steganography

Transform-domain schemes This is fragile! Sources of noise: compression, resizing, cropping, rotating, AWGN, etc. For robust watermarking, embed into transform domains DWT DCT

Watermarking model Consider an image I, a watermark key k, and a watermark signal w produced by a watermark generated algorithm, e.g., a pseudorandom generator Watermark is embedded as Iw=F-1(F(I)*w) Detector should detect the presence of the watermark from the noisy image: IN=(F-1(F(I)*w))#N Sources of noise: compression, resizing, cropping, rotating, AWGN, etc.

DCT-based watermark

Wavelet-based watermark

Why is it more robust?

Watermark attacks Robustness attacks: remove or diminish the presence of watermark Presentation attacks: modify the content so that detector can not find the hidden watermark Interpretation attacks: prevent assertion of ownership, e.g., re-watermarking

Practical challenges of watermarks?

Classes of Information Hiding Digital watermarking Steganography Covert channels Anonymous communication Protocol obfuscation

Acknowledgement Some of the slides, content, or pictures are borrowed from the following resources, and some pictures are obtained through Google search without being referenced below: https://www.cs.bham.ac.uk/~mdr/teaching/modules03/security/students/SS5/Steganography.htm http://poseidon.csd.auth.gr/LAB_SEMINARS/DigDays/Lectures/Information_Hiding.ppt