Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.

Slides:



Advertisements
Similar presentations
DIGITAL BLIND AUDIO WATERMARKING FOR E-LEARNING MEDIA By: Youngseock Lee, Jongweon Kim Research done at: Chungwoon University, Sangmyung University.
Advertisements

[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Digital rights management Audio watermark Jiamian.
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
Information Hiding: Watermarking and Steganography
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Technical Aspects of Digital Rights Management
Digital watermarking technique for protecting digital images
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
CSE331: Introduction to Networks and Security Lecture 36 Fall 2002.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Secure Spread Spectrum Watermarking for Multimedia Ishani Vyas CS590 Winter 2008.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Digital Watermarking By: Li Yang
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Edward J. Delp Panasonic January 13, 2000 Slide 1 Watermarking: What is the Future? Edward J. Delp Purdue University School of Electrical and Computer.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Digital Steganography
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Concepts of Multimedia Processing and Transmission IT 481, Lecture #9 Dennis McCaughey, Ph.D. 2 April, 2007.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Digital Watermarking
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
A Partial Survey of the Perfect Digital Watermark Problem.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Technical Aspects of Digital Rights Management
DONE BY S.MURALIRAJAN M.NIRMAL
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Multimedia Data Hiding: What, Why, and How?
Information Theoretical Analysis of Digital Watermarking
Digital Watermarking Lecture 2
Presentation transcript:

Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology

Encoding l LSB (Least Significant Bit) Modification l MSB ( Most Significant Bit) Modification Eg : LSB MSB

Example:LSB Encoding Original Image Watermark

Replace 4 and 7 LSBs of Original 4 LSBs Watermarked 7 LSBs Watermarked

What is a Watermark? l A watermark is a “secret message” that is embedded into a “cover (original or host) message”. l Only the knowledge of a secret key allows us to extract the watermark from the cover message. l Effectiveness of a watermarking algorithm is a function of its »Resilience to attacks. »Capacity. »Stealth.

What Can Be Watermarked? l Multimedia data. »Video. »Audio. »Still Images. »Documents. l Software. l Hardware designs.

Multimedia Watermarks l A digital watermark is a “secret key dependent” signal “inserted” into digital multimedia data. l Watermark can be later detected/extracted in order to make an assertion about the data. l A digital watermark can be. »Visible (perceptible). » Invisible (imperceptible).

Watermark Applications l Proof of ownership. »Prove ownership in a court of law. »Simple copyright notice may not help for digital multimedia data. Easily destroyed. l Copy prevention or control. »Recording device may inhibit recording a signal if detected watermark indicates that it is prohibited. »DVD video and digital music distribution. l Content protection (visible watermarks). »Destruction of watermark destroys the content.

Watermark Applications l Authentication. »Detect if image/video has been altered. »Digital cameras. l Media Bridging. »Bridge media such as magazines and the Internet. »Digimarc. l Broadcast Monitoring. »Keep track of when and where an advertisement is played. »ConfirMedia from Verance.

Watermark Applications l Fingerprinting. »Identify the source of an illegal copy. »Unique watermark embedded in each copy. »DiVX, a modified version of DVD. l Secret Communications. »Hide information such that general public do not know its presence. »Bin Laden hides attack plans in images on the web – USA Today, Feb. 26, 2001.

Requirements l Requirements vary with application. For example: »Perceptually transparent - must not perceptually degrade original content. »Robust - survive accidental or malicious attempts at removal. »Oblivious or Non-oblivious - Recoverable with or without access to original. »Capacity – Number of watermark bits embedded. »Efficient encoding and/or decoding.

Contradicting Requirements Perceptual Transparency Oblivious vs. Non-Oblivious Robustness Payload Security

Example: Additive Watermarks I W ( x, y )= I ( x, y )+ k  W ( x, y ) W(x,y) detected No W(x,y) detected

Additive watermarks in transform domain: Spread Spectrum

Watermark Attacks l Active Attacks. »Hacker attempts to remove or destroy the watermark. »Watermark detector unable to detect watermark. »Key issue in proof of ownership, fingerprinting, copy control. »Not serious for authentication or covert communication.

Watermark Attacks l Passive Attacks. »Hacker tries to find if a watermark is present. »Removal of watermark is not an aim. »Serious for covert communications. l Collusion Attacks. »Hacker uses several copies of watermarked data (images, video etc.) to construct a copy with no watermark. »Uses several copies to find the watermark. »Serious for fingerprinting applications.

Watermark Attacks l Forgery Attacks. »Hacker tries to embed a valid watermark. »Serious in authentication. »If hacker embeds a valid authentication watermark, watermark detector can accept bogus or modified media.

Example: Forging Photo I.D. Bad Forgery! Millionaire with Swiss bank account Assistant Professor Thanks Hong Man, for this picture!

Content-based Watermarking Original Watermark

JPEG Compression Attack

Watermarking Research l Information Theoretic Issues. »Compute “watermarking capacity” »How many watermark bits can be hidden in a watermark channel ? »Capacity when multiple watermarks are used. l Decision Theoretic Issues. »Robust watermark detector. »Quickest possible watermark detection. »Invariant to statistical uncertainties. »Achieves desired false alarm and detection probabilities.

Watermarking Research l Signal Processing Issues. »What transforms to use ? – wavelet, DCT etc. »Geometric invariant transform – scale, translation, and rotation invariance. l Watermarking protocols and system issues. »Protocol used by sender and receiver for secure transmission. l Steganalysis. »How to analyze multimedia data for the presence of watermark(s). »Secure Digital Music Initiative (SDMI) has been hacked!

Robust Watermarking Techniques - A Communications Framework + Media Carrier HVS Watermark Media Carrier Noise/Attack Channel Water- mark Coding and Modulation Decoding and Demodulation X

Techniques Developed at MSyNC Lab (some results are in collaboration with Iowa State U. and Polytechnic U.)

Information Theoretic Formulation l A new watermark channel model. »Multiplicative and additive attacks. »Models geometric attacks (“killer” attack). l Attack parameters assumed imperfectly known. l Lower and upper bounds on watermarking capacity. l Many current capacity estimates are specific cases of proposed estimates. l Capacity in the presence of multiple watermarks using multiuser information theory.

Multiple Description Watermarking l A new framework for watermarking using multiple description codes. »Partition the source into multiple descriptions. »Each description carries enough information. »Allocate watermarking bits to descriptions subject to distortion constraints. »Experiments for secure wireless media transmission is promising. l Rate-distortion theory formulation.

Decision Theoretic Formulation l How many pixels to watermark ? »A new measure for watermarking capacity. »Different from standard information theoretic formulation. »Perhaps a more practical measure. l Fast watermark detector. »Computation reduction. »Useful for hardware implementation.

Steganalysis l A distributed detection framework for analyzing images for presence of watermarks. l Theoretical formulation and practical algorithm for steganalysis of LSB based image watermarking. l A new watermarking capacity measure called “steganographic capacity”.

Projected Applications of Proposed Techniques l Secure media streaming. l Wireless multimedia security. l Watermark error resilience coding. l Error concealment for wireless multimedia transmission. l Refer to »

Million Dollar Question Watermarking or Encryption or Combination?