Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.

Slides:



Advertisements
Similar presentations
Information Hiding and Covert Channels
Advertisements

DIGITAL BLIND AUDIO WATERMARKING FOR E-LEARNING MEDIA By: Youngseock Lee, Jongweon Kim Research done at: Chungwoon University, Sangmyung University.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Prepared for DA 201  Introduction to Digital Watermarking.
Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Applications of Data Hiding in Digital Images
Watermarking Technology Ishani Vyas CS590 Winter 2008.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Spread Spectrum Steganography
Audio Steganography Echo Data Hiding
Digital Watermarking Parag Agarwal
Reza Mohammadi Shiraz University Of Technology
Digital Watermarking By: Li Yang
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
CPS 182s 1.1 Digital Watermark l What is a watermark? A digital watermark?  Message about a work is embedded in the work l What is steganography?  The.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Steganography and Approaches of Data Hiding in Digital Images
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Digital Steganography
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking: Principles and Practices
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Damageless Information Hiding Technique using Neural Network Keio University Graduate School of Media and Governance Kensuke Naoe.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Digital Watermarking
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
CSE725.  Watermarking dates back in History.  Cryptography for protection.  Need of software for ownership protection.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Introduction to Steganography
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
DONE BY S.MURALIRAJAN M.NIRMAL
Visit for more Learning Resources
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Introduction to Multimedia Security Topics Covered in this Course
Digital Watermarking Lecture 2
Presentation transcript:

Watermarking University of Palestine Eng. Wisam Zaqoot May 2010

Data Hiding Secret message Secret message Key Carrier document Embedding algorithm Transmission via network Detector Key Information Hiding is a general term encompassing many sub-disciplines Two important sub-disciplines are: Steganography and Watermarking Steganography: Hiding: keeping the existence of the information secret Watermarking Hiding: making the information imperceptible Information hiding is different than cryptography (cryptography is about protecting the content of messages)

Why do we need Data Hiding? Covert communication using images (secret message is hidden in a carrier image) Ownership of digital images, authentication, copyright Data integrity, fraud detection, self-correcting images Traitor-tracing (fingerprinting video-tapes) Adding captions to images, additional information, such as subtitles, to video, embedding subtitles or audio tracks to video (video-in-video) Copy control (secondary protection for DVD)

Issues in Data Hiding Perceptibility: does embedding information “distort” cover medium to a visually unacceptable level (subjective) Capacity: how much information can be hidden relative to its perceptibility (information theory) Robustness to attacks: can embedded data survive manipulation of the stego medium in an effort to destroy, remove, or change the embedded data Trade-offs between the previous three: More robust => lower capacity Lower perceptibility => lower capacity etc.

The “Magic” Triangle Capacity Robustness Security Additional factors: There is a trade-off between capacity, invisibility, and robustness Naïve steganography Secure steganographic techniques Digital watermarking Robustness Security Additional factors: Complexity of embedding / extraction Undetectability

Watermarking Intent: data embedding conveys some information about the cover medium such as owner, copyright, or other information Watermark can be considered to be an extended attribute of the data Robustness of watermark is a main issue In some cases, you know watermark may be there Can be visible or invisible

Watermarking:Definition Watermarking is the practice of imperceptibly altering a cover to embed a message about that cover Watermarking is closely related to steganography but, there are differences between the two In watermarking the message is related to the cover Steganography typically relates to covert point-to-point communication between two parties. Therefore, steganography requires only limited robustness Watermarking is often used whenever the cover is available to parties who know the existence of the hidden data and may have an interest in removing it Therefore, watermarking has the additional notion resilience against attempts to remove the hidden data Watermarks are inseparable from the cover in which they are embedded. Unlike cryptography, watermarks can protect content even after they are decoded.

Watermarking:History More than 700 years ago, watermarks were used in Italy indicate the paper brand and the mill that produced it By the 18th century watermarks began to be used as anti-counterfeiting measures on money and other documents The term watermark was introduced near the end of the century. It was probably given because the marks resemble the effects of water on paper The first example of a technology similar to digital watermarking is a patent filed in 1954 by Emil Hembrooke for identifying works In 1988, Komatsu and Tominaga appear to be the first to use the term "digital watermarking" About 1995, interest in digital watermarking began to mushroom

Watermarking Motivations The need to establish reliable methods for copyright protection and authentication. The need to establish secure invisible channels for covert communications. Adding caption and other additional information.

Watermarking:Applications Copyright protection Most prominent application Embed information about the owner to prevent others from claiming copyright Require very high level of robustness Copy protection Embed watermark to disallow unauthorized copying of the cover For example, a compliant DVD player will not playback data that carry a "copy never" watermark Content Authentication Embed a watermark to detect modifications to the cover The watermark in this case has low robustness, "fragile"

Watermarking:Basic principles

Watermarking: Requirements Imperceptibility The modifications caused by watermark embedding should be below the perceptible threshold Robustness The ability of the watermark to resist distortion introduced by standard or malicious data processing Security A watermark is secure if knowing the algorithms for embedding and extracting does not help unauthorized party to detect or remove the watermark

Digital Watermarking - Examples Text – varying spaces after punctuation, spaces in between lines of text, spaces at the end of sentences, etc. Audio – low bit coding, random imperceptible noise, fragile & robust, etc. Images – least-significant bit, random noise, masking and filtering, etc.

Digital Watermarking – Qualities/Types Effect on quality of original content – how does watermarking technique impact level of degradation and what is the level of acceptability with the degradation Visible vs. invisible – visible such as a company logo stamped on an image or movie or invisible and imperceptible Fragile vs. robust – fragile watermarks break down easily whereas robust survive manipulations of content (in some watermarking of audio files, both are used)

Digital Watermarking –Qualities/Types. Public vs. private – private watermarking techniques require that the original be used as a basis of encryption whereas public does not Public-key vs. secret-key – secret-key watermarking uses the same watermarking key to read the content as the key that was inserted into the image; public key uses different keys for watermarking the image and reading the image

Digital watermarks categories Robust watermark- Used for copyright protection. Requirements: the watermark should be permanently intact to the host signal, removing the watermark result in destroying the perceptual quality of the signal. Fragile watermark- Used for tamper detection or as a digital signature. Requirements: Break very easily under any modification of the host signal. Semi Fragile watermark- used for data authentication. Requirements: Robust to some benign modifications, but brake very easily to other attacks. Provide information about the location and nature of attack

Attacks Attacks are carried out with an intension to destroy watermark for the purposes of use without having to pay royalties to the originator of the content. Must withstand various signal processing attacks: Compression Cropping, editing, composing. Printing. Adding small amounts of noise.