حماية البيانات الإلكترونية نموذج البصمات المائية الهواري غوثي و د. جار الله الغامدي كلية علوم و هندسة الحاسب الآلي جامعة الملك فهد للبترول والمعادن شعبان.

Slides:



Advertisements
Similar presentations
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Advertisements

Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
 A public-key infrastructure ( PKI ) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store,
Safeguarding and Charging for Information on the Internet Hector Garcia-Molina, Steven P. Ketchpel, Narayanan Shivakumar Stanford University Presented.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Opening Presentation of Notary Reqs 8/5/2004 Tobias Gondrom.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
SMUCSE 5349/7349 Public-Key Infrastructure (PKI).
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
هندسة تصميم المؤسسة الإلكترونية تجربة جامعة الملك فهد للبترول والمعادن الهواري غوثي و د. جار الله الغامدي كلية علوم و هندسة الحاسب الآلي جامعة الملك فهد.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Security 3 Distributed Systems Lecture # 16. Overview Steganography Digital Watermarking.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Public Key Distribution and X.509 Wade Trappe. Distribution of Public Keys There are several techniques proposed for the distribution of public keys:
Steganography Rayan Ghamri.
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
HICSS 36 A Watermarking Infrastructure for Enterprise Document Management Presenter S.C. Cheung Department of Computer Science.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
ICEC 2002 A Watermarking Infrastructure for Digital Rights Protection Presenter S.C. Cheung Department of Computer Science.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Complex Security Policies Dave Andersen Advanced Operating Systems Georgia State University.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Chapter 31 Network Security
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Side Channels and Physical Security. Prosecutor’s Fallacy Joe’s fingerprints found at the site of a crime Prosecutor claims fingerprint test is 99.99%
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
153 Brooks Road, Rome, NY | | 153 Brooks Road, Rome, NY | |
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Chapter 21 Distributed System Security Copyright © 2008.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
DIGITAL SIGNATURE.
Creating and Managing Digital Certificates Chapter Eleven.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Network Security Celia Li Computer Science and Engineering York University.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
TAG Presentation 18th May 2004 Paul Butler
Key management issues in PGP
TAG Presentation 18th May 2004 Paul Butler
IS3230 Access Security Unit 9 PKI and Encryption
Security in ebXML Messaging
Public Key Infrastructure
Digital Certificates and X.509
PKI (Public Key Infrastructure)
Digital Watermarking for Image Authentication with Localization
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

حماية البيانات الإلكترونية نموذج البصمات المائية الهواري غوثي و د. جار الله الغامدي كلية علوم و هندسة الحاسب الآلي جامعة الملك فهد للبترول والمعادن شعبان 1425ه

E-Document Protection “Watermarking” Approach Mr. Lahouari Ghouti and Dr. Jarallah Al-Ghamdi College of Computer Science and Engineering KFUPM University September 2004

Outline Digital Watermarking Document Distribution Infrastructure Three Phases of Document Distribution Protocol: – Acquisition of Registration Certificates – Acquisition of Documents – Resolution of Policy Violation Conclusions

A Challenge Which is one is the original???

Another Challenge Original???

Introduction Enterprise document management across a large enterprise is difficult: Sensitive documents often found in photocopier rooms or public folders at file servers!!! Why? It involves both digital and non-digital forms. It covers both automated and manual procedures. It requires a truly distributed solution. It supports multimedia format. It must be flexible, allowing individual group to refine its own policies. It should protect privacy wherever applicable.

Secrecy Issues Consider the following WWII “press cable”: PRESIDENT’S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT IMMENSELY.

Secrecy Issues PRESIDENT’S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT IMMENSELY. PERSHING SAILS FROM NY JUNE 1

Proposed Solution We propose the use of “digital watermarking” to enforce enterprise document distribution policy. Document provider disseminates watermarked documents based on the registration certificate submitted by end user End User Document Provider

Watermarking??? Two common applications of digital watermarking: 1. Identify and claim the copyrights ownership. 2. Identify the origin of illegal distribution. Watermarks are exclusively owned by individuals.

Encryption Original Encrypted

Watermarking: Origins Digital Watermarking is originated from “Steganography” Stego. Graphos.

Watermarking: An Example

Minute alterations of letter, word, and line spacing. E.g., Change line spacing by 1/300 inch: imperceptible to the human eye, but easily detected by computers. Rumored to have been used by British government in 1980’s to catch leaks.

Watermarking Goals Cover DocumentSecret Document

Watermarking Goals

EDoc Server Office #1 Office #2 Office #n Copy #1 With digital watermark #1 Copy #2 With digital watermark #2 Copy #n With digital watermark #n Distribute Protected EDocs

Watermarking Principles

Authentic??? Manipulated???

Watermarking Principles insertiondetection

Watermarking Principles Original???

Watermarking Principles Original???

Watermarking Principles Audio MP3

Key Issues in Watermarked Document Distribution Protocol PhasesIssues Registration Certificate Acquisition - Secrecy of watermarks Watermarked Document Acquisition - End users cannot be trusted - Document providers cannot be trusted Policy Violation Resolution - End users cannot be trusted - Document providers cannot be trusted

Some Concerns Identify the origin of illegal distribution: –End user owning the origin is liable –End user’s watermark is analogous to a private key  Could we protect end user’s watermark in document distribution to prevent others (including the document provider) from abusing the watermark?

Our Solution End users need not release their watermarks Instead, end users release an encrypted version of their watermarks So, how does a document provider validate an encrypted watermark? Trusted Enterprise Registration Authority Use registration certificate to protect the integrity of encrypted watermark

Watermarked Document Distribution Infrastructure Obtain Once Document provider disseminates watermarked documents based on the registration certificate submitted by end user Enterprise registration authority generates registration certificate for end user End User Enterprise Registration Authority Document Provider Policy enforcer collects evidence of policy violation from document provider Policy Enforcer

Watermark Acquisition apply for registration certificate Registration Certificate Request generate watermark Registration Certificate Response obtain PKI certificate store certificate End User Enterprise Registration Authority activities data objects

Implementation Architecture Enterprise Registration Authority Request Registration Certificate Deliver Registration Certificate Encrypted watermarked document Document Registry Look up document access information and policy Check out Register document access information and policy End User Check in document with registration certificate Store and retrieve document access history Deliver permutation function and registration certificate Submit suspected document request for evidence Document Access Log Document Server of the Provider Policy Enforcer Certificate Repository Maintain directories of valid and revoked Registration Certificates

Registration Certificate Version (of Registration Certificate Format) Registration Certificate Serial Number Signature Algorithm Identifier (for Certificate Issuer’s Signature) Issuer Name Validity Period (Start and Expiry Dates/Times) Subject Name Roles Subject’s Public Key information (Algorithm Identifier & Public Key Value) One-Way Hash Value of Encrypted Secret Text Encrypted Image Watermark & Watermarking Algorithm Identifiers Encrypted Audio Watermark & Watermarking Algorithm Identifiers Encrypted Video Watermark & Watermarking Algorithm Identifiers Issuer’s Digital Signature Optional

What Else??? Study the integration of watermarking protocols and inter-organizational workflows and e-marketplace negotiations.

KFUPM Expertise

Patens filed in the area of document security. Patents filed in the area of document/imaging authentication. Ongoing work in multimedia document management/workflow/security/authentication. Published research work in International Referred journal and Conference proceedings such as IEEE/IEE/ACM.

Electronic Enterprise Architecture: KFUPM Experience Mr. L. Ghouti and Dr. J. Al-Ghamdi EDoc Forum Riyadh September Thank you! Feel free to contact: Questions? Talk Slides Will Be Available at: