Robust Digital Right Management Scheme (DRM) for Multimedia Anuj Maheshwari Victor Sutan

Slides:



Advertisements
Similar presentations
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Advertisements

Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Tamper Detection and Localization for Categorical Data Using Fragile Watermarks.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Watermarking Techniques Digital Rights Seminar © April 28, 2006 Mahmoud El-Gayyar.
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Technical Aspects of Digital Rights Management
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Fifth International Conference on Information
Digital Image Watermarking for Copyright Protection A web-based approach Matthew Willbrand Project Advisors: Prof. Zeng, Prof Banks.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Secure Spread Spectrum Watermarking for Multimedia Ishani Vyas CS590 Winter 2008.
Internet Resources Discovery (IRD) IBM DB2 Digital Library Thanks to Zvika Michnik and Avital Greenberg.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
WATERLOO ELECTRICAL AND COMPUTER ENGINEERING 10s: Communications and Information Systems 1 WATERLOO ELECTRICAL AND COMPUTER ENGINEERING 10s Communications.
Paul Blythe and Jessica Fridrich Secure Digital Camera.
Copy Protection for DVD Video Aline Martin ECE 738 Project – Spring 2005 J.Bloom, I.Cox,T.Kalker,J.P.Linnartz,M.Miller, and C.B.S.Traw.
Digital Watermarking Parag Agarwal
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
DRM Building Blocks - Protecting and Tracking Content Adopted from Chapter 5, Digital Rights Management Business and Technology.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Digital Steganography
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Damageless Information Hiding Technique using Neural Network Keio University Graduate School of Media and Governance Kensuke Naoe.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Copyright 2000, Odyssey Research Associates, Inc. SL Semantic Data Integrity DARPA Program Review Cornell Business & Technology Park 33 Thornwood.
MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles Marwen HASNAOUI Maher BELHAJ Mihai MITREA Françoise PRETEUX ARTEMIS.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Cryptographic Anonymity Project Alan Le
International Journal of Smart Home Vol.7, No.5 (2013), pp Digital Watermarking for Image Tamper Detection.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
A Partial Survey of the Perfect Digital Watermark Problem.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Technical Aspects of Digital Rights Management
STEGANOGRAPHY.
DONE BY S.MURALIRAJAN M.NIRMAL
Reversible Information Hiding Techniques for Digital
Dept. of Elec. & Comp. Engineering
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Digital Watermarking for Image Authentication with Localization
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Digital Watermarking Lecture 2
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Robust Digital Right Management Scheme (DRM) for Multimedia Anuj Maheshwari Victor Sutan

Presentation Overview Introduction Project methodology Previous work Plan of action Project Design Flow Conclusion Questions

Introduction Motivation: Facilitating control of ownership of multimedia over the internet. Altering existing Digital Rights Management (DRM) schemes Main issues:  Security  Robustness  Efficiency Project goal: To have a software that would provide more security and protection features to existing media players.

Project methodology Concepts used:  Watermarking (focusing on Audio)  Robustness against following attacks: MPEG Audio compression Quantization Filtering A/D, D/A conversion  Encryption Cryptographic algorithm (look for this)

Previous work – Steinebach [1] Audio watermarking and partial encryption [Steinebach2005]  Transparency between watermarked and encrypted data  Need only one key to decrypt / extract watermark  Lack of robustness against format compression

Steinebach 2005 (II)

Previous Work – Memon (1998) [2] Authentication Techniques for Multimedia Content [1]  Many techniques for DRM  Visible / Invisible watermarking (Yeung- Mintzer scheme, Wong scheme)  Fragile / Robust watermarking  Possible Attacks

Memon (1998) (II)

Previous work – Bassia (1999) [3] Robust audio watermarking in the time domain  Embedding of information in audio  Robustness against Lossy compression Quantization and re-quantization Low-pass filtering  Results

Bassia (1999) (II)

Plan of Action (I) Shortcomings of previous DRM schemes  Non robust to: MPEG compression Quantization Filtering Key issues to be remembered  Security  Efficiency  Robustness

Plan of Action (II) Robustness issues to be tackled  Most papers use LSB method  Possible problem associated with LSB Blind retrieval of watermark information  Weighted watermarking to resist attacks from: Compression Quantization and Re-Quantization  Other methods?

Plan of Action (III) Efficiency issues to be tackled  Level of computation required on server side large for encryption and watermark generation  Attempt to move computation to client machine?  Alter the format to allow for appending of watermark?

Plan of Action (IV) Security issues to be tackled  Investigate other encryption schemes  Allow for less intensive computations  Offer more security than shuffling tables  Allow for minimum probability of random intrusion

Project Design Flow

Project Design Flow (II)

Challenges Anticipated A lot of work has been done Security Robustness Efficiency

Project timeline April:  Week of 11 th : Finalize project flow Finalize watermarking and encryption algorithms  Week of 18 th : Implementation of watermarking and encryption  Week of 25 th : Rigorous testing Preparation of final report Preparation for final presentation May  Week of 2 nd: Submission of final report

Conclusions Come up with alternate DRM Address the issues of  Robustness  Security  Efficiency

References [1] Stienebach M., Zmudzinski S., Bolke T. Audio watermarking and partial encryption Security, Steganography and watermarking of multimedia conference VII, Processing of SPIE-IS&T Electronic Imaging, SPIE Vol. 5681, March 2005 [2] Memon N., Vora P. Authentication Techniques for Multimedia Content, SPIE conference for multimedia systems and applications, SPIE Vol. 3528, Nov [3] Bassia P., Pitas I., Robust Audio Watermarking in the time domain 1999 [4] Picard J., Robert A., On the Public Key Watermarking Issue Security and Watermarking of Multimedia Contents III, Proceedings of SPIE Vol. 4314, 2001

Questions anyone?