EXTRACTING SPREAD-SPECTRUM HIDDEN DATA FROM DIGITAL MEDIA

Slides:



Advertisements
Similar presentations
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
Advertisements

A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Fifth International Conference on Information
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
A Review on: Spread Spectrum Watermarking Techniques
Discovering Emerging Topics in Social Streams via Link Anomaly Detection.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Video Data Hiding using Forbidden Zone and Selective Embedding Submitted Under Team Members.
Digital Watermarking
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Twitsper: Tweeting Privately. Abstract Although online social networks provide some form of privacy controls to protect a user's shared content from other.
Under The Guidance of Smt. Ch.Ratna Kumari Asst.Professor Submitted by M Ravi Kumar Roll No:10021F0006 M.C.A.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
Guided By: Prof. Rajarshree Karande JSPM’S IMPERIAL COLLEGE OF ENGINEERING & RESEARCH WAGHOLI, PUNE Group MemberRoll No. Abhijeet Aralgundkar03.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
RATION CARD MANAGEMENT SYSTEM
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
INTRODUCTION TO COMPUTERS. A computer system is an electronic device used to input data, process data, store data for later use and produce output in.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
 Abstract  Introduction  Literature Survey  Conclusion on Literature Survey  Threat model and system architecture  Proposed Work  Attack Scenarios.
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
Secure and Practical Outsourcing of Linear Programming in Cloud Computing.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
BY S.S.SUDHEER VARMA (13NT1D5816)
DEPARTMENT OF ECE, BEC, BAGALKOT
Introduction to Steganography
Security Using Armstrong Numbers and Authentication using Colors
Towards Scalable Traffic Management in Cloud Data Centers
Introduction to Audio Watermarking Schemes N. Lazic and P
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Der-Chyuan Lou and Jiang-Lung Liu,
STEGANOGRAPHY.
DONE BY S.MURALIRAJAN M.NIRMAL
Basic Concepts of Audio Watermarking
NYMBLE: BLOCKING MISBEHAVING USERS IN ANONYMIZING NETWORKS
Visit for more Learning Resources
Mean value based reversible data hiding in encrypted images
Separable and error-free reversible data hiding in encrypted images
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Reversible Data Hiding
DISSERTATION ON CRYPTOGRAPHY.
High Capacity Data Hiding for Grayscale Images
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
New Framework for Reversible Data Hiding in Encrypted Domain
Information Protection and Recovery with Reversible Data Hiding
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Authors: J.J. Murillo-Fuentes
Digital Watermarking Lecture 2
A Quadratic-Residue-based Fragile Watermarking Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Adopting secret sharing for reversible data hiding in encrypted images
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

EXTRACTING SPREAD-SPECTRUM HIDDEN DATA FROM DIGITAL MEDIA Guide: Samrat Krishna Gaddam Presented By: M.Supriya (13FF1A0502) P.Anusha (13FF1A0505) T.Satya HariPrasad (13FF1A0507)

ABSTRACT: We consider the problem of extracting blindly data embedded over a wide band in a spectrum (transform) domain of a digital medium(image,audio,video) We develop a novel multicarrier/signature iterative generalized least- squares(M-IGLS)core procedure to seek unknown data hidden in hosts via multicarrier spread-spectrum embedding. Neither the original host nor the embedding carriers are assumed available

INTRODUCTION: Digital data embedding in digital media is an information technology field of rapidly growing commercial as well as national security interest. Applications may vary from annotation,copyright-marking,and watermarking, to single stream media merging(text,image) and convert communication. In annotation, secondary data are embedded in to digital multi media to provide a way to deliver side information for various purposes; copyright-marking act as permanent iron branding.

EXISTING SYSTEM: In the existing system reversible data hiding technique the image is compressed and encrypted by using the encryption key and the data to hide is embedded in to the image by using the same encryption key. The user who knows the secret encryption key used can access the image and decrypt it after extracting or removing the data hidden in the image. After extracting the data hidden in the image then only can be the original image is retrieved. 

PROPOSED SYSTEM: We propose the information hiding concept to reduce the risk of using cryptographic algorithms alone. Data hiding techniques embed information into another medium making it imperceptible to others, except for those that are meant to receive the hidden information and are aware of it presence. It focuses on methods of hidden data in which cryptographic algorithms are combined with the information hiding techniques to increase the security of transmitted data.

SOFTWARE REQUIREMENTS: Operating System :Windows XP/7. Front End : JAVA,RMI,SWING.

HARDWARE REQUIREMENTS: Processor : Pentium –III  Speed : 1.1 Ghz RAM : 256  MB(min) Hard Disk : 20 GB Floppy Drive : 1.44 MB Key Board : Standard Windows Keyboard Mouse : Two or Three Button Mouse Monitor : SVGA

CONCLUSION: We considered the problem of blindly extracting unknown messages hidden in image hosts via multi- carrier/signature spread-spectrum embedding. Neither the original host nor the embedding carriers are assumed available. We developed a low complexity multi-carrier iterative generalized least-squares (M-IGLS) core algorithm. Experimental studies showed that M-IGLS can achieve probability of error rather close to what may be attained with known embedding signatures and known original host autocorrelation matrix and presents itself as an effective countermeasure to conventional SS data embedding/ hiding5.

REFERENCES: M.D.Swanson, M.Kobayashi, and A.H.Tewfik, “Multimedia data- embedding and watermarking technologies,” Proc.IEEE,vol.86, pp.1064-1087, June 1998. I.J.Cox, M.L.Miller, A.L.McKellips, “Watermarkingas communications with side information,” Proc.IEEE (Special Issue on Identification and Protection of Multimedia Information), vol. 87, pp. 1127-1141, July 1999. 16. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding: A survey,” Proc IEEE (Special Issue on Protection of Multimedia Content), vol. 87, pp. 1062-1078, July 1999. I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking. San Francisco, CA: Morgan-Kaufmann, 2002.

THANK YOU