1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.

Slides:



Advertisements
Similar presentations
DIGITAL BLIND AUDIO WATERMARKING FOR E-LEARNING MEDIA By: Youngseock Lee, Jongweon Kim Research done at: Chungwoon University, Sangmyung University.
Advertisements

[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Prepared for DA 201  Introduction to Digital Watermarking.
Digital rights management Audio watermark Jiamian.
Steganography and Watermarks Trust and Reputation.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
Information Hiding: Watermarking and Steganography
Brodatz Textures Vistex Textures What is texture ? Texture can be considered to be repeating patterns of local variation of pixel intensities.
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Technical Aspects of Digital Rights Management
DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 8. Cracking. Cracking Magnitude of piracy  All kinds of digital content (music, software, movies)  Huge economic repercussions.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
CSE331: Introduction to Networks and Security Lecture 36 Fall 2002.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Secure Spread Spectrum Watermarking for Multimedia Ishani Vyas CS590 Winter 2008.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Digital Signal Processing Final Project Proposal R 資工碩一 馬智釗 Reference : “Rotation, scale, and translation resilient digital watermarking based.
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Digital Watermarking By: Li Yang
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Digital Steganography
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
Digital Watermarking
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
A Partial Survey of the Perfect Digital Watermark Problem.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
DEPARTMENT OF ECE, BEC, BAGALKOT
Introduction to Steganography
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
IMAGE PROCESSING IMAGE WATERMARKING
Technical Aspects of Digital Rights Management
DONE BY S.MURALIRAJAN M.NIRMAL
Digital Forensics 2 Lecture 4:Watermarking Presented by : J.Silaa
Information and Network Security
Applying Digital Watermarking Technology to Control CD copying
Recent Developments on Multimedia and Secure Networking Technologies
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Fun Stuff: Digital Media
Introduction to Multimedia Security Topics Covered in this Course
Digital Watermarking Lecture 2
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

1 Digital Water Marks

2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote production by the Bank of England in It is a good security feature because the watermark cannot be photocopied or scanned effectively.

3 Why Watermark? Motivation (1/2) The rapid revolution in digital multimedia and the ease of generating identical and unauthorized digital data. For example: USA Today, Jan. 2000: Estimated lost revenue from digital audio piracy $8,5 billions Digital objects can be copied and distributed, transmitted, manipulated anonymously with no way to identify the criminals. Copyright protection of multimedia data Copyright owners want to be compensated every time their work is used.

4 Why Watermark? Motivation (2/2) The need to limit the number of copies created whereas the watermarks are modified by the hardware and at some point would not create any more copies (i.e. DVD) - the reading device must be able to modify the watermark Content protection – content stamped with a visible watermark that is very difficult to remove so that it can be publicly and freely distributed

Definition Digital watermarking is the act of hiding a message related to a digital signal (i.e. Text, an image, song, video) within the signal itself to show authenticity or proof of ownership

Watermarking applications Broadcast monitoring. Owner identification, instead of including copyright notices with every image or song, we could use watermarking to embed the copyright in the image or the song itself.

Watermarking applications Transaction tracking. In this case the watermark embedded in a digital work can be used to record one or more transactions taking place in the history of a copy of this work. For example, watermarking could be used to record the recipient of every legal copy of a movie by embedding a different watermark in each copy. If the movie is then leaked to the Internet, the movie producers could identify which recipient of the movie was the source of the leak.

Watermarking applications Copy control, watermarking can be used to prevent the illegal copying of songs, images or movies, by embedding a watermark in them that would instruct a watermarking-compatible DVD or CD writer to not write the song or movie because it is an illegal copy.

9 Some Digital Watermarking Types (1/2) Visible vs. Invisible: Visible such as a company logo stamped on an image or Video. Invisible intended to be imperceptible to the human eye or inaudible. the watermark can only be determined through watermark extraction or detection by computers. Fragile vs. Robust : Fragile watermarks break down easily. Robust survive manipulations of content.

10 Some Digital Watermarking Types (2/2) ● Public vs. private – Private watermarking techniques require that the original be used as a basis of encryption whereas public does not

11 Some Desired Properties of (DW) ( 1/3) 1. Robustness 2. Tamper Resistance 3. Economically Implementable 4. Unambiguous 5. Capacity 6. Quality

12 Desired Properties ( 2/3) (1) Robustness: A watermark must be difficult or impossible to remove, at least without visibly degrading the original image. A watermark must survive image modifications. Geometric distortions: rotation, scaling, translation, etc. (2) Tamper Resistance: The watermark must resist any type of attacks, what ever the intentions are: remove or modify

13 Desired Properties ( 3/3) (3) Economically implementable: Time and effort, cost. ( 4) Unambiguous: The watermark, when retrieved, should unambiguously identify the owner. (5) Capacity: The amount of information that can be embedded (6) Quality: (High Quality) - Quality not degraded

14 Properties Tradeoff Robustness Capacity Quality Embedding and Extraction Complexity

15 Important Definitions Cover : Audio-video, text in which data will be hidden Watermark: What is actually added to the cover Information: message to be added Watermarking key: Secret parameter needed for embedding & detecting the watermark & extracting the information Watermarking Function: Embedding & Extraction algorithms.

16 Watermarking Embedding & Extraction Cover Image Cover + WM F Embedding F : Watermarked Image = Function (Cover, Watermark, Key) F Extraction F : Watermark = Function (Watermarked Image, Key( Cover + WM

17 Attackers Main Goal Attackers seek to destroy watermark for the purposes of use without having to pay royalties to the originator of the content.

18 Why do we need to study attacks? Identify weakness Propose improvement – Security Attackers are knowledgeable, creative, have lots of time, and are numerous

19 Attacks on Watermarking Two Sets of Attacks Unintentional All image manipulations commonly used to prepare images for print publication. For example: Resizing, rotation, sharpening, contrast modification, compression, ect. Intentional (Malicious) All the well-known intentional attacks include: Disabling, altering, embedding new watermark, ect.

20 Intentional Watermark Attacks (1/2) Active Attacks – hacker tries to remove the watermark or make it undetectable. Applying Geometric transformation: rotation, scaling, translation, change aspect ratio. Passive Attacks – hacker tries to determine whether there is a watermark and identify it. However, no damage or removal is done. Collusion Attacks – hacker uses several copies of one piece of media, each with a different watermark, to construct a copy with no watermark.