Steganography and Watermarking

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
Technical Aspects of Digital Rights Management
Blue Spike © 2001 Blue Spike, Inc. - 1 Copyright Protection? What are the technologies which can address copyright management in a world of digital copies?
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Internet Resources Discovery (IRD) IBM DB2 Digital Library Thanks to Zvika Michnik and Avital Greenberg.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Digital Steganography
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital Watermarking
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
A Partial Survey of the Perfect Digital Watermark Problem.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
DEPARTMENT OF ECE, BEC, BAGALKOT
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Technical Aspects of Digital Rights Management
STEGANOGRAPHY.
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
DONE BY S.MURALIRAJAN M.NIRMAL
Steganography.
Visit for more Learning Resources
Recent Developments on Multimedia and Secure Networking Technologies
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Spread Spectrum Watermarking
An Introduction to Cryptography
Recent Developments on Multimedia and Secure Networking Technologies
Information Theoretical Analysis of Digital Watermarking
Fun Stuff: Digital Media
STEGANOGRAPHY IN IMAGES
Introduction to Multimedia Security Topics Covered in this Course
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Steganography and Watermarking CSCI284 Spring 2004 GWU

CS284/Spring04/GWU/Vora/RSA Various Logistics Project presentations on: 26th April, Monday, 6:10-7:40 27th April, Tuesday, 6:10-7:40 (make-up day) and 28th April, Wednesday, 6:10-7:40 (another make-up day) 11/7/2018 CS284/Spring04/GWU/Vora/RSA

CS284/Spring04/GWU/Vora/RSA What is steganography? Hide not just the message, but also the existence of the message. Steganographic message in another message Outer message (“carrier”) can be: text, image, audio, video, binary 11/7/2018 CS284/Spring04/GWU/Vora/RSA

CS284/Spring04/GWU/Vora/RSA Text Steganography Minor details about format encode the message: Margins Space between lines, paras, words Infra-red or other non-perceptible marks Can be broken without knowing the specific minor details, by intentionally changing margins, space between lines, paras, words, etc. Infra-red marks can be detected by putting through infra-red detection 11/7/2018 CS284/Spring04/GWU/Vora/RSA

CS284/Spring04/GWU/Vora/RSA Media Steganography For secret messages and copyright protection Reqt: message should remain undetected and/or in the media after transformations that do not “degrade” the carrier. What is meant by “degrade”? Unanswered. 11/7/2018 CS284/Spring04/GWU/Vora/RSA

CS284/Spring04/GWU/Vora/RSA Definitions Imperceptible digital watermark Information inserted in a digital media asset (text, audio, video, image, typically denoted as a `signal') so that it is not detectable by the human perceptual systems. 2. Robust watermark 2a. Most ambitious statement A watermark that can be removed only by degrading the perceptual quality of the signal. (i.e., if the signal retains perceptual quality, watermark is detectable and/or readable). Not solved - far from being solved. Issues with problem statement include: definition of perceptible, perceptual quality - formulae/models do not exist. 11/7/2018 CS284/Spring04/GWU/Vora/RSA

CS284/Spring04/GWU/Vora/RSA Definitions 2b. Less ambitious statement A watermark that is retained by a finite set of transformations that do not alter the perceptual quality of a signal (for example, printing and rescanning only; colour transformations only; filtering only: sharpening, blurring; geometric transformations only). Sometimes called semi-fragile watermarking. Reasonably well-solved. Useful in copyright protection when all attempts to change signal are honest, i.e. not to remove watermark, or system is closed, and signal is accessible only on low computation device.   Note: Robust watermark usually imperceptible because if it is perceptible, an attacker can detect where it is and removing is easier. 11/7/2018 CS284/Spring04/GWU/Vora/RSA

CS284/Spring04/GWU/Vora/RSA Definitions 3. Copyright protection using robust watermarking Detecting the presence of a robust watermark in assets suspected to be infringing copyright. Problems: Does not typically prevent copyright infringement, though hypothetically can if watermark detectors in everything used to get to signal. Probably easier to use a recognition or similar algorithm to find similar assets and then claim copyright. 11/7/2018 CS284/Spring04/GWU/Vora/RSA

Application: Robust, imperceptible watermarking Prevention of digital media piracy Physical media piracy Quality deterioration with each copy Distribution visible and expensive, legal enforcement easier Digital media piracy Perfect copies Distribution unsupervised; no clear laws; no means of enforcing them, most important no easy way of locating distribution centers Current OS and digital copies: Any object that needs a PC for viewing can be copied perfectly through file copies, and imperfectly through screen captures 11/7/2018 CS284/Spring04/GWU/Vora/RSA

Multimedia Copyright Protection Widespread, cheap, Internet access requires a means of copyright protection. Is this image being used the way the buyer promised the seller it would be used? Has it been copied illegitimately? Has the owner been provided adequate compensation for the kind of use (no of copies, resale)? Used in commercial scenarios for sale/resale/distribution 11/7/2018 CS284/Spring04/GWU/Vora/RSA

Copyright protection with a robust, invisible watermark Owner looks for the watermark - either all over the Internet, or on an individual picture that she suspects was stolen from her. Original picture to be sold on the Internet contains an invisible mark: If she finds it with/being sold by an unauthorized person, she could seek legal recourse. `watermark’ - something that identifies owner or copyright owner All existing methods can be busted by free software available on the Internet; it is not a preventive measure, it merely aids in finding the culprit after the fact; 11/7/2018 CS284/Spring04/GWU/Vora/RSA

Watermark should survive accidental attacks Original, legal, buyer performs operations on image - sharpening, brightness/colour adjustment, filtering, cropping, resizing, rotation - while retaining perceptual quality of image. Watermark should survive such operations - called accidental attacks - and should remain invisible; ie.e watermark should be robust 11/7/2018 CS284/Spring04/GWU/Vora/RSA

Image quality degrades if watermark removed (intentional attack) Illegal reseller trys to destroy watermark before reselling. Watermark should damage perceptual quality of image when being removed (detection procedure does not detect the existence of a watermark) or sufficiently altered (the information contained in it is altered sufficiently - identity of owner is changed). Intentional attack. 11/7/2018 CS284/Spring04/GWU/Vora/RSA

CS284/Spring04/GWU/Vora/RSA Problem Statement Copyright protection by insertion of an imperceptible mark in digital media that is robust to intentional and accidental attacks/transformations which preserve the quality of the media Not clear if the above goal is achievable Achievement of the goal requires at least a good understanding of : Models of quality Models of (in)visibility Models of accidental attacks Models of intentional attacks The amount/nature of information that needs to be hidden At present, all of the above are not understood well enough. 11/7/2018 CS284/Spring04/GWU/Vora/RSA

CS284/Spring04/GWU/Vora/RSA The Problem- contd. The problem involves looking at the trade-offs between: information content and invisibility robustness and invisibility information content and robustness The requirement of robustness to intentional attacks also requires hiding the information so that an attacker cannot find it - or, if she knows where to look, to hide it so that getting rid of it requires image degradation. The problem has been posed in the communications framework as the transmission and detection/estimation of a small signal (the watermark) in a noisy channel (the image). 11/7/2018 CS284/Spring04/GWU/Vora/RSA

A communications channel model Small amplitude signal §(signature) = W(α, β), the watermark Original image: I(α, β) + W(α, β) = Î (α, β) Marked image Π(Î (α, β)) + noise Transformed image Ð(Π(Î (α, β)) + noise) ? Signature transmitted signal carrier transmitted signal corrupted by channel distortion and additive noise Detection 11/7/2018 CS284/Spring04/GWU/Vora/RSA

Traditional Signal Transmission Methods AM (Amplitude Modulation) T(t) = (1 + s(t) ) cos(wt + ) FM (Frequency Modulation) T(t) = cos((w + s(t) )dt + ) signal carrier 11/7/2018 CS284/Spring04/GWU/Vora/RSA

CS284/Spring04/GWU/Vora/RSA Prior Art All except one are additive (or linear) methods - a watermark is added to the image in some domain. The one that is not performs `amplitude modulation’ by multiplying each pixel by a number slightly larger or smaller than unity. In some constraint-based methods, (Pitas et al, Koch et al) the watermark is in the form of constraints on the image coefficients in some domain. Some coefficients satisfy a set of linear equations whose coefficents form the watermark. Enforcing the constraints on the coefficients in the watermarked image is done by addition. 11/7/2018 CS284/Spring04/GWU/Vora/RSA

CS284/Spring04/GWU/Vora/RSA Prior Art - (contd.) Space-Domain-Based Methods - where operations to the image are done in the spatial domain. Easier to implement; white noise nature of added watermark necessary for invisibility. Frequency-(usually DCT)-Domain-Based Methods - operations done in the Fourier domain. White noise nature of mark not as necessary. The newer methods (most notably the NEC-Princeton method due to Cox et al) embed the watermark in the most perceptual regions of the image - the argument is that watermark removal will destroy image quality. 11/7/2018 CS284/Spring04/GWU/Vora/RSA

CS284/Spring04/GWU/Vora/RSA Main Issues Kalker et al, Phillips Research labs., Eindhoven, have shown that all method whose detection is linear can be busted by someone with access to a detector. No existing methods are reasonably robust to geometric transformations (cropping, rotation, scaling). Perhaps nonlinear methods that are based on the image skeleton and other such attributes could be more successful; but the main issue is that the problem is not well-defined enough. 11/7/2018 CS284/Spring04/GWU/Vora/RSA

Problems with model for copyright protection Even if a perfect robust watermarking technique were found, one would need to look for the watermark in every relevant file on the Internet often enough to detect violations. 11/7/2018 CS284/Spring04/GWU/Vora/RSA

Uses of robust watermarking Robust watermarking can possibly be used as a deterrent, but it is not clear if it is worth the investment - time will tell. It could perhaps be used in closed systems that allowed only certain kinds of operations - those that preserve the watermark. These ideas are not well-formulated in the industry or in academia yet. 11/7/2018 CS284/Spring04/GWU/Vora/RSA

CS284/Spring04/GWU/Vora/RSA Step back a little The problem is that current viewers of multimedia (PCs, mostly) also allow other operations on the media. Can we somehow do viewing without allowing other operations? Secure hardware/software viewers - but the operating system still allows copies and screen captures 11/7/2018 CS284/Spring04/GWU/Vora/RSA

Problems with robust watermarking Watermark must be imperceptible Changes that affect the imperceptible watermark substantially should damage the perceptual quality of image It appears difficult at best to achieve both together. No existing methods do for a large enough amount of hidden information. There are Internet sites that bust every watermarking method. 11/7/2018 CS284/Spring04/GWU/Vora/RSA

aCd9Tof3trefgu Evariste Galois aCd9Tof3trefgu Evariste Galois Encapsulated Content: Better Security, More Expensive – Prevents Unauthorized Use Content encrypted during transmission and in storage on buyer’s local disk User without decryption sees garbage aCd9Tof3trefgu Evariste Galois aCd9Tof3trefgu Content decrypted in hardware or software to allow viewing and manipulation. Pay per view possible Evariste Galois 11/7/2018 CS284/Spring04/GWU/Vora/RSA

Classification of Rights Management Systems Complexity of access specifications Low Medium High Personal Family Multimedia Archives Personal publishing using templates Personal metadata? Lessons/hw by students and teachers Mixed Wedding videos professionally filmed Aggregated Personal metadata? Type of Content (Read only) Entertainment Magazine subscriptions Commercial Photography Publishing Press Ebooks Scientific publishing Commercial Use password protection Use secure encapsulation Use secure encapsulation + watermarking 11/7/2018 CS284/Spring04/GWU/Vora/RSA

CS284/Spring04/GWU/Vora/RSA Major IP holders InterTrust – well-patented encapsulation and asset economy material. Just settled with Microsoft. Xerox subsidiary ContentGuard (with Microsoft investment) - well-patented rights management language technology. IBM – well-patented smaller collection of secure encapsulation technology. Partners with Xerox. Digimarc – well-patented watermarking technology. They are part of an international group of banks, which is considering their technology for counterfeit deterral. Planning to use watermarking as a non-secure data transmission tool across media boundaries. HP: Owns patent on the idea of any kind of watermaking, Morris. 11/7/2018 CS284/Spring04/GWU/Vora/RSA

CS284/Spring04/GWU/Vora/RSA 11/7/2018 CS284/Spring04/GWU/Vora/RSA

CS284/Spring04/GWU/Vora/RSA Another problem: Authentication of digital media given cheap access to capable processing systems Was this image changed in any way after it was captured? 11/7/2018 CS284/Spring04/GWU/Vora/RSA

Authentication with a fragile, invisible watermark In a court of law, a judge checks the watermark hidden in the presented image to see if it is associated in the same way with each pixel of the image presented as evidence Original picture contains an invisible mark inserted at `source’: If she finds that the hidden watermark is not what it should be for the presented image, the presented image is not authentic and has been changed since it was obtained. `watermark’ - something that is associated with the value of each pixel of the image 11/7/2018 CS284/Spring04/GWU/Vora/RSA

CS284/Spring04/GWU/Vora/RSA Definitions 4. Fragile watermark 4a. Most ambitious statement A watermark that indicates any perceptual changes to the signal Unsolved. Issues with problem statement include: definition of perceptible, perceptual quality - formulae/models do not exist.   4b. More ambitious statements A watermark that indicates any change in the image except certain, finite set of transformations that are also known to (somewhat) maintain perceptual quality. Sometimes called semi-fragile watermarking. Solved in some versions. A watermark that indicates any change in the signal while localizing the change. Solved after a few false starts 11/7/2018 CS284/Spring04/GWU/Vora/RSA

CS284/Spring04/GWU/Vora/RSA Definitions  4c. Least ambitious statement A watermark that indicates any change to signal. Very well-solved using digital signatures that have been around a long time and are more well-tested and far better understood than any watermarking method.   5. Authentication using fragile watermarking Check watermark to see if signal has changed Issues: Do not need watermark for a digital asset, can store information in header. Need watermark only for non-digital assets, but it needs to survive D2A2D and be fragile to everything else. 11/7/2018 CS284/Spring04/GWU/Vora/RSA

CS284/Spring04/GWU/Vora/RSA Summary Copyright protection watermarking problem: Not well-defined Not solved Thought to be inconsistency in problem definition Not efficient Image authentication: requires closed, trusted system These results are relevant to steg in general, which did not have commercially viable applications before this (might still not have) 11/7/2018 CS284/Spring04/GWU/Vora/RSA