1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.

Slides:



Advertisements
Similar presentations
Information Hiding and Covert Channels
Advertisements

Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
 Data Storage  Steganography  Phishing.  How are files stored?  Each file is assigned one or more sectors in the disk.  If the file is small enough,
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Technical Aspects of Digital Rights Management
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Watermarking in E-commerce Systems. Outline Introduction, Applications Characteristics and classification Popular techniques for watermarking Attacks.
Interword Distance Changes Represented by Sine Waves for Watermarking Text Images Author: Ding Huang Supervisor: Prof. Hong Yan.
Security 3 Distributed Systems Lecture # 16. Overview Steganography Digital Watermarking.
Enhancing Biometric Security Using Watermarking By Shivankush Aras.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Steganography.
Steganography Paul Krzyzanowski
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Data and its manifestations. Storage and Retrieval techniques.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Digital Watermarking
Courtesy of Professors Chris Clifton & Matt Bishop INFSCI 2935: Introduction of Computer Security1 Nov 1, 2005 Computer Forensics (Lab 2 Related)
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Technical Aspects of Digital Rights Management
DONE BY S.MURALIRAJAN M.NIRMAL
Visit for more Learning Resources
Parag Agarwal Digital Watermarking Parag Agarwal
Fun Stuff: Digital Media
Introduction to Multimedia Security Topics Covered in this Course
Digital Watermarking Lecture 2
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security

2 IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 12.3 Nov 20, 2012 Digital Watermarning

3 Watermarking

4 Digital Watermarking A digital pattern or signal is inserted into an image Can serve as a digital signature Can identify the intended recipient (unique to each copy) Can identify document source (common to multiple copies)

5 Watermarking Watermarked image is transformed image Original image remains intact, recognizable Persistent in viewing, printing and re-transmission and dissemination Contrast to fingerprinting and encryption In digital fingerprinting, original file remains but a new file is created that describes the original file (e.g., checksum in Tripwire) Encryption transforms an image to an unrecognizable image

6 Watermarking Visible watermarks Similar to physical counterpart (digitally stamped!) Invisible watermarks Useful as for identifying the source, author, owner, distributor or authorized consumer Permanently, unalterably mark the image Also used for tracing images in the event of their illicit distribution Unique watermark for each buyer

7 Visible vs Invisible Watermarks Purposevisibleinvisible validation of intended recipient-Primary non-repudiable transmission-Primary deterrence against theftPrimary Secondary diminish commercial value without utility Primary discourage unauthorized duplicationPrimarySecondary digital notarization and authenticationSecondaryPrimary identify sourcePrimarySecondary

8 Requirements of Watermarks To protect intellectual property Watermark must be difficult or impossible to remove, at least without visibly degrading the original image Watermark must survive image modifications An invisible watermark should be imperceptible so as not to affect the experience of viewing Watermarks should be easily detectable by the proper authority

9 Watermarking techniques For image Spatial domain watermarking Simplest: flip the lowest order bit of chosen pixels Superimpose a watermark Color separation – watermark in only one color band - Picture cropping can be used to eliminate some spatial watermark Frequency domain watermarking Use Fast Fourier Transform – alter the values of chosen frequencies Watermarks will be dispersed spatially (cropping or spatial technique will not defeat it)

10 Watermarking for Text Text-line coding Text lines of a document page are shifted imperceptibly up or down Word-shift coding Spacing between words in a line text is altered Character coding E.g., endline at the top of a letter, say “t” is extended

11 Steganography Art of hiding information in the midst of irrelevant data This is NOT cryptography Useful to hide the existence of secret communication

12 Example of Steganography (Text – page 48) Dear George, Greetings to all at Oxford. Many thanks for your letter and for the summer examination package. All entry forms and fees forms should be ready for final dispatch to the syndicate by Friday 20 th or at the latest I am told by the 21 st. Admin has improved here though there is room for improvement still; just give us all two or three more years and we will really show you! Please don’t let these wretched 16+ proposals destroy your basic O and A pattern. Certainly this sort of change, if implemented immediately, would bring chaos. Sincerely yours,