MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.

Slides:



Advertisements
Similar presentations
Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
Advertisements

H IGH CAPACITY WATERMARKING H YPERSPECTRAL I MAGES AUTHENTICATION Mehdi Fallahpour Jordi Serra-Ruiz David Megías.
Spread Spectrum Chapter 7. Spread Spectrum Input is fed into a channel encoder Produces analog signal with narrow bandwidth Signal is further modulated.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Watermarking Techniques Digital Rights Seminar © April 28, 2006 Mahmoud El-Gayyar.
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Bit-Plane Watermarking for SPIHT-Coded Images 台北科技大學資工所 指導教授:楊士萱 學生:廖武傑 2003/07/29.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Spread Spectrum Steganography
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
SIMS-201 Audio Digitization. 2  Overview Chapter 12 Digital Audio Digitization of Audio Samples Quantization Reconstruction Quantization error.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
A Review on: Spread Spectrum Watermarking Techniques
Digital Watermarking Parag Agarwal
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY * By: Ricardo A. Garcia *Research done at: University.
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY By: Ricardo A. Garcia University of Miami School.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Media Protection Media Encryption Media Watermark Media Protection Media Encryption Media Watermark Lesson 10.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles Marwen HASNAOUI Maher BELHAJ Mihai MITREA Françoise PRETEUX ARTEMIS.
Spread Spectrum Spread-spectrum techniques are methods by which energy generated in a particular bandwidth is deliberately spread in the frequency domain,
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Outline Kinds of Coding Need for Compression Basic Types Taxonomy Performance Metrics.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
Digital Watermarking
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
Quantization Watermarking Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems Brian Chen, Ph. D. Dissertation,
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Spread Spectrum Chapter.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Introduction to Audio Watermarking Schemes N. Lazic and P
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
K. ZEBBICHE , F. KHELIFI and A. BOURIDANE
Basic Concepts of Audio Watermarking
A Data Hiding Scheme Based Upon Block Truncation Coding
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Spread Spectrum Watermarking
Multimedia Data Hiding: What, Why, and How?
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Hiding and Its Applications
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY By: Ricardo A. Garcia University of Miami School.
Presentation transcript:

MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2

Crypto Problem for Multimedia Once decrypted, the multimedia data becomes vulnerable for distribution. Cryptography 9/09/2015 | pag. 3 Watermarking, which is imperceptible message embedding within the work, complements encryption.

Watermarking Cryptography 9/09/2015 | pag. 4 Channel Detect Watermark Embed Watermark

Modern Applications Copyright Protection Fingerprinting or Traitor Tracing Content Authentication Media Forensics Steganography Database Annotation Device Control … Cryptography 9/09/2015 | pag. 5

Basic Technical Issues (1) Transparency (fidelity): embedding information should not cause perceptual degradation of host signal Payload (bit-rate): number of bits that can be embedded in signal Robustness: refers to ability of embedding algorithms to survive common signal processing operations (compression, filtering, noise, cropping, insertions,…) Cryptography 9/09/2015 | pag. 6

Basic Technical Issues (2) Security: refers to ability of an adversary to crack information hiding code and design devastating attack to wipe out hidden information (e.g. recovery of host signal which contains no trace of message). Detectability: is the fact of information embedding a secret (cfr. Steganography)?  There exist fundamental trade-offs between transparency, payload or bit rate, robustness, security and detectability. Cryptography 9/09/2015 | pag. 7

System issues Does decoder have full, partial, or no knowledge of host signal? Availability of side information generally improves detection BUT introduces communication and storage burden. What security level is needed? What are the attacker’s computational resources? Does attacker have repeated access to decoder? Cryptography 9/09/2015 | pag. 8

Standards and Benchmarking So far: NO foolproof watermarking due to lag between theory and practice. Examples: Music industry used watermarking to protect digital music Watermarking as part of international MPEG-4 video standard Recent research groups have developed benchmark tools: Stirmark European Certimark WET project at Purdue university … Cryptography 9/09/2015 | pag. 9

Mathematical Models Encoders and decoders: Encoding function x=f(s,m,k) Decoder function m’=g(y,k) *source:Data-Hiding codes (Moulin) Cryptography 9/09/2015 | pag. 10

Mathematical Models Attacks: *source:Data-Hiding codes (Moulin) Cryptography 9/09/2015 | pag. 11

Mathematical Models Distortion (to characterize perceptual closeness): Squared Euclidian metric (audio, grayscale images (PSNR),…): Hamming distance (binary images):  Fail to capture complexities of human perception  Perceptual models are needed: Popular example is Watson’s metric SSIM Cryptography 9/09/2015 | pag. 12

Early Work 1990’s: First papers on data hiding appeared Least significant bit (LSB) techniques Problem: not robust against noise : Spread-spectrum modulation (SSM) codes More robust 1998-…: Quantization Index Modulation Very good performance Cryptography 9/09/2015 | pag. 13

LSB codes Host signal s = {s 1, s 2, …,s N } Each s i uses b bits (integer value between 0 and 2 b -1) e.g.: s i = 65 = ( ) LSB plane is length-N binary sequence made of all LSB’s Information rate is 1 bit per sample. Payload can be increased by replacing second LSB  increase of embedding distortion!  Very weak against noise Cryptography 9/09/2015 | pag. 14

LSB codes Channel Detection Embedding

1 bitplane

2 bitplanes

3 bitplanes

4 bitplanes

5 bitplanes

6 bitplanes

7 bitplanes

8 bitplanes

LSB Cryptography 9/09/2015 | pag. 24

LSB Cryptography 9/09/2015 | pag. 25

Spread-Spectrum Codes Watermarking problem ≈ communication problem with a jammer:  Apply techniques from communications domain  Spread-Spectrum Modulation! Jamming problem: Classic radio/TV transmitter sends signal in relatively narrow frequency band Inappropriate with jammer that allocates all power to that particular band of frequencies Cryptography 9/09/2015 | pag. 26

Spread-Spectrum Codes SSM-system: Allocates secret sequences (with broad frequency spectrum) to transmitter. Transmitter sends data by modulating these sequences. Receiver demodulates data using filter matched to secret sequences.  Jammer must spread power over broad frequency range but only small fraction of it will have an effect on communication performance. Cryptography 9/09/2015 | pag. 27

Spread-Spectrum Codes Sender: x n = s n + αp n (m,k), 1 ≤ n ≤ N Receiver: y = x + w, w noise Knows secret key k Matching of y to all possible waveforms p(m,k) *source:Data-Hiding codes (Moulin) Cryptography 9/09/2015 | pag. 28

Spread-Spectrum Codes Detection: Correlation: Informed detector: *source:Data-Hiding codes (Moulin) Cryptography 9/09/2015 | pag. 29

Binning Schemes An important information-theoretic technique, which is widely used. Especially for blind data hiding, which is related/complementary to the problem of transmission with side information. Cryptography 9/09/2015 | pag. 30

Binning Schemes Quantization on source sequence S of length N Quantization codebook C of length-N vectors U j Distortion function D VQ problem = find vector U j within codebook C that minimizes distortion D(S, U j ) between observed S and reconstruction vector U j Next, consider M different codebooks C m (= bins) consisting of length-N vector U m,j within C  now we can choose which codebook we want to use!  With M codebooks we can embed k (=log 2 M) bits Cryptography 9/09/2015 | pag. 31

Example: Binning Schemes S = binary sequence of length N = 3 (8 possible sequences). We want to embed a information into S, producing a new sequence X. We must satisfy distortion constraint that X and S differ in 1 bit. Transmission of X to a receiver which must decode embedded info without knowledge of original host data S.  Question 1: how many bits can we embed in S?  Question 2: How can we design appropriate scheme? Cryptography 9/09/2015 | pag. 32

Binning Schemes example Under distortion constraint, S can be modified in 4 ways: S=010 => X = {000, 110, 010, 011}  2 bits of info can be embedded Consider partition of eight possible X into 4 bins. e.g.: S = 010 and Hamming distance of one Cryptography 9/09/2015 | pag. 33

Binning Schemes example Embedding 1-bit message into 7-bit length sequences S. 2 bins allow us to modify 3 bits of S. In this way, it resists the noise with Hamming weight at most 1. Cryptography 9/09/2015 | pag. 34

QIM Quantization-Based Codes have been introduced in 1999, by Chen and Wornell, known as Dither Modulation or Quantization Index Modulation (QIM) codes. QIM is a binning scheme. Theses methods embed signal-dependent watermarks using quantization techniques. Cryptography 9/09/2015 | pag. 35

Scalar QIM Embedding one bit in a real-valued sample: Here we have 1-bit message m ∈ {0,1}. A scalar, uniform quantizer Q(s) with step size △ is defined as Q(s) = △ [s/ △ ]. We use the function Q(s) to generate two new dithered quantizers. Cryptography 9/09/2015 | pag. 36

Scalar QIM The two new dithered Quantizers Q 0 and Q 1 are shown as sets of circles and crosses on the real line. Cryptography 9/09/2015 | pag. 37

Original QIM The noisy signal Y = X (Marked signal)+ W. The QIM decoder is a minimum-distance decoder. It finds the quantizer point closest to Y. The quantization errors are uniformly distributed over [- △ /2, △ /2]. This scheme works perfectly, if |W| < △ /4. Cryptography 9/09/2015 | pag. 38

Distortion-Compensated Scalar QIM A binning scheme with some error protection against noise (exceeds △ /4). The embedding function is defined as: Cryptography 9/09/2015 | pag. 39

Distortion-Compensated Scalar QIM Cryptography 9/09/2015 | pag. 40

Other QIM Schemes Sparse QIM Lattice QIM –Another extension of Scalar QIM to the vector case. –Replace the scalar quantizer with a L-dimensional VQ quantizer Cryptography 9/09/2015 | pag. 41

Data Hiding in Images Quantization-based codes are widely used to embed data in images. Cryptography 9/09/2015 | pag. 42

Data Hiding in Images Lena after data embedding and after attack Cryptography 9/09/2015 | pag. 43

Data Hiding in Images 6301 bits was embedded in Lena and tampered with the marked image in various ways Cropping Resizing Substitutions Compression Moderate noise levels All 6301 bits could be successfully decoded. Cryptography 9/09/2015 | pag. 44

Conclusion The information-theoretic concept of binning known as the best methods, when the host signal is unavailable to the receiver (blind data hiding). Practical binning schemes show good performance under noise attacks. Spread-spectrum techniques are popular, but have limitations for blind data hiding. Cryptography 9/09/2015 | pag. 45

Thank you! … the vast majority of security failures occur at the level of implementation … Cryptography 9/09/2015 | pag. 46