Security Issues for Visual Data: Copyright and Access Control

Slides:



Advertisements
Similar presentations
A Graduate Course on Multimedia Technology 3. Multimedia Communication © Wolfgang Effelsberg Media Scaling and Media Filtering Definition of.
Advertisements

Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Automatic Video Shot Detection from MPEG Bit Stream Jianping Fan Department of Computer Science University of North Carolina at Charlotte Charlotte, NC.
VIPER DSPS 1998 Slide 1 A DSP Solution to Error Concealment in Digital Video Eduardo Asbun and Edward J. Delp Video and Image Processing Laboratory (VIPER)
On the use of hierarchical prediction structures for efficient summary generation of H.264/AVC bitstreams Luis Herranz, Jose´ M. Martı´nez Image Communication.
Compressed-domain-based Transmission Distortion Modeling for Precoded H.264/AVC Video Fan li Guizhong Liu IEEE transactions on circuits and systems for.
Issues for Multimedia Privacy & Security ---- Video Content Privacy Protection, Copyright Protection & Database Access Control Jianping Fan Dept of Computer.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Traditional Database Indexing Techniques for Video Database Indexing Jianping Fan Department of Computer Science University of North Carolina at Charlotte.
LYU 0102 : XML for Interoperable Digital Video Library Recent years, rapid increase in the usage of multimedia information, Recent years, rapid increase.
Internet Resources Discovery (IRD) IBM DB2 Digital Library Thanks to Zvika Michnik and Avital Greenberg.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
Video Streaming via Transcoding Jianping Fan Department of Computer Science University of North Carolina at Charlotte Charlotte, NC 28223
Digital Watermarking Parag Agarwal
MPEG MPEG-VideoThis deals with the compression of video signals to about 1.5 Mbits/s; MPEG-AudioThis deals with the compression of digital audio signals.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Media Protection Media Encryption Media Watermark Media Protection Media Encryption Media Watermark Lesson 10.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Multiple Image Watermarking Applied to Health Information Management
IBM QBIC: Query by Image and Video Content Jianping Fan Department of Computer Science University of North Carolina at Charlotte Charlotte, NC 28223
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Watermarking Part 2: Future Work Electrical and Computer Engineering Department Villanova University 18 August 2004 Robert J. Berger II Michael P. Marcinak.
Digital Watermarking
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Video Watermarking Real-time Labeling of MPEG-2 Compressed Video G. C. Langelaar, R. L. Lagendijk, and J. Biemond ITS, ICTG, Delft University of Technology.
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
Digital Video Library Network Supervisor: Prof. Michael Lyu Student: Ma Chak Kei, Jacky.
Overview of Fine Granularity Scalability in MPEG-4 Video Standard Weiping Li Presented by : Brian Eriksson.
Soon Joo Hyun Database Systems Research and Development Lab. US-KOREA Joint Workshop on Digital Library t Introduction ICU Information and Communication.
Video Compression and Standards
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
A Partial Survey of the Perfect Digital Watermark Problem.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
H. 261 Video Compression Techniques 1. H.261  H.261: An earlier digital video compression standard, its principle of MC-based compression is retained.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Introduction to H.264 / AVC Video Coding Standard Multimedia Systems Sharif University of Technology November 2008.
Automatic Video Shot Detection from MPEG Bit Stream
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
CS644 Advanced Topics in Networking
Physical Changes That Don’t Change the Logical Design
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Welcome
Data and Applications Security Developments and Directions
Ivanov Sergey.
Watermarking for Image Authentication ( Fragile Watermarking )
Pei Qi ECE at UW-Madison
Research Topic Error Concealment Techniques in H.264/AVC for Wireless Video Transmission Vineeth Shetty Kolkeri EE Graduate,UTA.
A User Attention Based Visible Watermarking Scheme
ENEE 631 Project Video Codec and Shot Segmentation
Standards Presentation ECE 8873 – Data Compression and Modeling
Parag Agarwal Digital Watermarking Parag Agarwal
15 Data Compression Foundations of Computer Science ã Cengage Learning.
Authors:Tae-Yun Chung; Min-Suk Hong; Young-Nam Oh;
Fun Stuff: Digital Media
15 Data Compression Foundations of Computer Science ã Cengage Learning.
Digital Watermarking Lecture 2
Presentation transcript:

Security Issues for Visual Data: Copyright and Access Control Jianping Fan

1. Why we need security for visual data? We need to protect copyrights for visual data It is easy for us to copy a digital image without losing! ------- data level b. Different use class should have permission to access different visual data in database! Even the same visual data with different quality! -------- access control at database level Traditional techniques, such as encryption, are good enough?

Encryption key key plaintext cyber text plaintext Alice Encrypt Decrypt Bob source destination encrypt What you want to show us? I cannot pay for this!

Suppose you are good photographer, you want to show your work, but do not want other people make an illegal copy for this! I have no interesting on this!! I want to make a schedule to visit Arizona this summer!! It is so beautiful!! Arizona state government will have different opinion for these two photos!! Your children may get benefit from this photo!!!!!!!!

Jianping Fan 11/12/2002 watermarking

2. What’s the watermarking? Invisible & copyright protection

2. What’s the watermarking?

2. What’s the watermarking? Original image!

2. What’s the watermarking? Watermarked image!! Can you find the difference?

2. What’s the watermarking? Why we cannot damage the image quality? How we can do this? How to measure image perceptional quality? How to characterize human perceptional system? How to use this to watermark images?

2. What’s the watermarking?

2. What’s the watermarking?

2. What’s the watermarking?

2. What’s the watermarking? Why we need the maximum value? ---other people can also add watermarking to claim their copyrights! ---too large may damage images! What happen for the last two images?

2. What’s the watermarking? Requirements for watermarking Invisible Maximum value Deep Image Analysis Noises on edges & textural areas are not easy to be recognized! Small noises on homogeneous areas are easy to be visible!

2. What’s the watermarking? Homogeneous Background

2. What’s the watermarking? Texture Background

2. What’s the watermarking? a. How we can generate the watermarking signal? b. Where we should put watermarking signal in?

Edge Detection Edge Detection Results

Edge Detection Edge Detection Results

2. What’s the watermarking? If it is not maximum, I can also put my watermarking there!!!!!!

2. What’s the watermarking?

2. What’s the watermarking?

2. What’s the watermarking?

How to detect watermarking signal from an image? Watermarked image Original image If we do not have original one, how we can do this? Jianping Fan 11/12/2002

2. What’s the watermarking? What’s the key problem for this approach?

2. What’s the watermarking? 121 DCT Each DCT coefficient consists of information from all the pixels!!!!!!

2. What’s the watermarking?

2. What’s the watermarking? How to perform video watermarking? Is it too expensive for a 2 hours video?

Structure for MPEG Video Encoding GOP 1 GOP 2 GOP 3 GOP 4 time I B B P B B P B B B P GOP

2. What’s the watermarking? You cannot decode MPEG videos without I frames! You cannot decode B & P frames without P frames! Can we only watermark I frames? Can we only watermark I and P frames?

Structure for MPEG Video Encoding GOP 1 GOP 2 GOP 3 GOP 4 time I B B P B B P B B B P GOP

2. What’s the watermarking? P P I B P

Structure for MPEG Video Encoding B B P B B P B B B P GOP Error (noise for watermarking) propagation over time! Mistakes on motion estimation and compensation on objects’ boundaries Mistakes on temporal prediction and compensation

Technical Requirements for Watermarking Invisibility Robustness Capacity

3. What’s the access control? Visual Data in Disk client Access Control client client Access Policy: who can access what under which conditions

3. What’s the access control? Visual data in database Rules Users

3. What’s the access control? Visual data in database Rules Users Grouping users & visual data into a set of categories & providing tree-based indexing for such huge access control table!

3. What’s the access control? Integrating access control with database indexing structure!!! Video in Database Cluster 1 Cluster i Cluster n Subcluster n1 Subcluster 11 Subcluster 1j Subcluster nl Subregion nl1 Subregion nlm Subregion 11k object1111 object nlm1 Disk for Cluster 1 Disk for Cluster i Disk for Cluster n

3. What’s the access control? Integrating access control with video transmission and packaging!!! query object query processing feature extraction Cluster 1 Cluster i Cluster n Subcluster i1 Subcluster ij Subcluster im Subregion ij1 Subregion ijl Subregion ijr Object ijrm Disk for cluster 1 Disk for cluster i

3. What’s the access control? Integrating with encryption and networks!!! Query & Delivery Delivery Access control & rights management Query Presentation Query Processing Visual Summarization Indexing MPEG Encoder Video Collections

3. What’s the access control? Video Shot n Unsuitable for people under 18!!! Generating different versions? Repackaged MPEG Video Bit Stream!!!