Randomized Detection for Spread- Spectrum Watermarking: Defending Against Sensitivity and Other Attacks Ramarathnam Venkatesan and Mariusz H. Jakubowski.

Slides:



Advertisements
Similar presentations
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Advertisements

MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Assumptions underlying regression analysis
Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Equivalence Partitioning
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Addition 1’s to 20.
Detecting Spam Zombies by Monitoring Outgoing Messages Zhenhai Duan Department of Computer Science Florida State University.
SURE-LET for Orthonormal Wavelet-Domain Video Denoising Florian Luisier, Member, IEEE, Thierry Blu, Senior Member, IEEE, and Michael Unser, Fellow, IEEE.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Tamper-Tolerant Software: Modeling and Implementation International Workshop on Security (IWSEC 2009) October 28-30, 2009 – Toyama, Japan Mariusz H. Jakubowski.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Maximizing Strength of Digital Watermarks Using Neural Network Presented by Bin-Cheng Tzeng 5/ Kenneth J.Davis; Kayvan Najarian International Conference.
Randomized Radon Transforms for Biometric Authentication via Fingerprint Hashing 2007 ACM Digital Rights Management Workshop Alexandria, VA (USA) October.
Ghunhui Gu, Joseph J. Lim, Pablo Arbeláez, Jitendra Malik University of California at Berkeley Berkeley, CA
Fifth International Conference on Information
Enhanced images watermarking based on amplitude modulation Image and Vision Computing, 24 (2006), 111 – 119 Authors :T. Amornraksa, K. Janthawongwilai.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Cryptanalysis of Correlation-Based Watermarking Schemes Using Single Watermarked Copy Author: Tanmoy Kanti Das and Subhamoy Maitra From IEEE SIGNAL PEOCESSING.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Session 6: Introduction to cryptanalysis part 1. Contents Problem definition Symmetric systems cryptanalysis Particularities of block ciphers cryptanalysis.
Yinglei Wang, Wing-kei Yu, Sarah Q. Xu, Edwin Kan, and G. Edward Suh Cornell University Tuan Tran.
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
Kyle Wesson, Mark Rothlisberger, and Todd Humphreys
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
How to Achieve Robustness & Fragility in Watermarking Technology.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
Jaroslaw Kutylowski 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Robust Undetectable Interference Watermarks Ryszard Grząślewicz.
Detection of Image Alterations Using Semi-fragile Watermarks
A paper by: Paul Kocher, Joshua Jaffe, and Benjamin Jun Presentation by: Michelle Dickson.
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
1 Robust and transparent watermarking scheme for colour images Speaker : Po-Hung Lai Adviser : Chih-Hung Lin Date :
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Basic Message Coding 《 Digital Watermarking: Principles & Practice 》 Chapter 3 Multimedia Security.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
EE5393, Circuits, Computation, and Biology Computing with Probabilities 1,1,0,0,0,0,1,0 1,1,0,1,0,1,1,1 1,1,0,0,1,0,1,0 a = 6/8 c = 3/8 b = 4/8.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Yandell – Econ 216 Chap 15-1 Chapter 15 Multiple Regression Model Building.
Watermarking Scheme Capable of Resisting Sensitivity Attack
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Vishal Monga, Divyanshu Vats and Brian L. Evans
Robustness Evaluation of Perceptual Watermarks
Image Watermarking Chu, Hsi-Cheng.
Basic Concepts of Audio Watermarking
Increasing Watermarking Robustness using Turbo Codes
Spread Spectrum Watermarking
Source: Pattern Recognition Letters, Article In Press, 2007
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking IEEE Trans. On Signal Processing, April 2003 Multimedia Security.
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Randomized Detection for Spread- Spectrum Watermarking: Defending Against Sensitivity and Other Attacks Ramarathnam Venkatesan and Mariusz H. Jakubowski {venkie, Cryptography and Anti-Piracy Group Microsoft Research March 20, 2005

2 Overview Introduction Spread-spectrum methodology Enhancements and analysis Experimental results Conclusion

3 Spread-Spectrum Watermarking + = = Original imageWatermarkWatermarked image Detection The watermark is a pseudorandom sequence of positive and negative chips. The dot (*) represents correlation (normalized dot product). Robustness is typically achieved via redundancy, synchronization grids, error correction, visual models, embedding in special domains, and other techniques. WatermarkTest image ~0 if WM is absent ~1 if WM is present Embedding pseudorandom generatorsecret key *

4 Overview Introduction Spread-spectrum methodology Enhancements and analysis Experimental results Conclusion

5 Spread-Spectrum Enhancements Strategies against cryptanalytic attacks –Pseudorandom embedding into portions of available domain –Pseudorandom detection Many correlations over pseudorandom WM subsets Median value from subsets returned as WM response –Image-dependent WM keys from image hashes Some resistance against signal-processing attacks –Contrast enhancement to boost WM –Some randomized redundant embedding into regions –Note: Redundancy, synchronization grids, and related techniques tend to make cryptanalysis easier. –Is provable resistance against both cryptanalytic and signal-processing attacks possible?

6 Cryptanalysis Model Pseudorandom black-box detector Adversarial inputs... Results: Yes/No WM WM strength Adversarial processing: Coefficient changes WM estimation Arbitrary analysis

7 Detection Scheme Let n = total number of chips (or number of WMed coefficients). Detection: –Choose m WM subsets S 1, S 2, …, S m, each of size k << n. –Compute correlations Y 1, Y 2, …, Y m over the subsets. –Output median Y med of Y 1, Y 2, …, Y m. Overall correlation average over subsets Median approximates average well: Pr [|Y med E(Y)| ] e cn (c = constant)

8 Security Against Black-Box Attacks Assume subsets contain k out of n total watermarked coefficients. The following limits the information attacker can obtain during each query to the black-box detector: Lemma (Threshold Phenomenon): Consider a watermarked image, and set p = k/n. Assume the attacker changes X coefficients in the transform plane, and |pX 1/2| > L, where L is a constant. Let S i, where i n, be the random subsets choosen by the detector. Let D 1 and D 2 denote the detector values that are output to the attacker. For every r > 0, we have Pr [|D 1 D 2 | r] e cn for some constant c, where is the space of coin flips used by the detector. Consequence: If the attacker changes too few coefficients, the attack will fail with high probability (i.e., values output by detector change little despite attackers arbitrary modifications to coefficients).

9 Overview Introduction Spread-spectrum methodology Enhancements and analysis Experimental results Conclusion

Watermarking Example No watermark: 3%Watermark: 257% StirMark attack: 195% StirMark + low-quality JPEG: 103% WM response: enhanced correlation measure

11 Results on Typical Images Results of watermark tests on 100 images Each image was watermarked and StirMarked. 19 incorrect watermark keys yield low watermark responses (whether or not watermark enhancement is applied). One proper watermark key yields high watermark responses, generally significantly higher after enhancement.

12 Black-Box Attack: Brute-Force Chip Estimation Attack image 001Test image * Attack image 010Test image * Attack image 111 (2 X )Test image *... 1.Choose X watermark chips to estimate (e.g., X = 3). 2.For each of the 2 X possible chip sequences, create an attack image: In DCT domain, set all coefficients to zero, except for ones corresponding to selected chips. Set each chip coefficient to an artificially large value (+ or -) to boost overall correlation. 3.Use the black-box WM correlation detector to compute WM response over each attack image. 4.The attack image with the highest WM response provides estimated chip signs. - large positive attack chip - large negative attack chip

13 Results of Attack on 10 Test Images A. Plain imagesB. Watermarked imagesC. Attack images ( X = 10 correct coefficients) A: Overall correlation response (blue) and subset-median response (green) both correctly reveal no WM. B: Overall response and subset response both correctly reveal WM. C: Overall response incorrectly reveals WM on well-guessed attack chips. Subset response correctly reveals no WM, foiling the attack.

14 Conclusion New methods proposed to enhance the security of spread-spectrum watermarking against cryptanalysis. Ultimate security of spread-spectrum watermarking remains an open problem. Are there practical spread-spectrum methods provably robust against both cryptanalysis and signal-processing attacks?