Introduction to Multimedia Security Topics Covered in this Course

Slides:



Advertisements
Similar presentations
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Advertisements

Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
What is Steganography? def’n: the art and science of hiding information by embedding it in some other data. cryptography - render message unintelligible.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Enhancing Biometric Security Using Watermarking By Shivankush Aras.
CSE331: Introduction to Networks and Security Lecture 36 Fall 2002.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Paul Blythe and Jessica Fridrich Secure Digital Camera.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Karthiknathan Srinivasan Sanchit Aggarwal
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Digital Image Processing In The Name Of God Digital Image Processing Lecture1: Introduction M. Ghelich Oghli By: M. Ghelich Oghli
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
CMPD273 Multimedia System Prepared by Nazrita Ibrahim © UNITEN2002 Multimedia System Characteristic Reference: F. Fluckiger: “Understanding networked multimedia,
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Forgery & Forensics Hany Farid ACM Proceedings of the 8th Workshop on Multimedia and Security, Sep
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Exposing Digital Forgeries in Color Filter Array Interpolated Images By Alin C. Popescu and Hany Farid Presenting - Anat Kaspi.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Project Topic : Image Differentiation Name : Bo Li Supervisor: Dr. Jimmy Li.
Cryptographic Anonymity Project Alan Le
Chapter 1. SIGNAL PROCESSING:  Signal processing is concerned with the efficient and accurate extraction of information in a signal process.  Signal.
IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Digital Steganography
Introduction to Steganography
Authentication Schemes for Session Passwords using Color and Images
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
DONE BY S.MURALIRAJAN M.NIRMAL
Steganography.
Image and Video Processing – An Introduction
Visit for more Learning Resources
Recent Developments on Multimedia and Secure Networking Technologies
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Recent Developments on Multimedia and Secure Networking Technologies
STEGANOGRAPHY IN IMAGES
Digital Watermarking Lecture 2
Presentation transcript:

Introduction to Multimedia Security Topics Covered in this Course Lecture 1 Topics Covered in this Course

Course Coverage

Steganography • Steganography=“Cover” + “Writing” • Examples – The art of hiding information in ways that prevent the detection of hidden messages – Transmitting secret messages through innocuous cover carriers in such a manner that the existence of the embedded message is undetectable • Examples – Invisible inks, character arrangement, covert channels…

Digital Steganography Schemes • Various message carriers - Digital contents • Texts, images, audio,video - Storage devices • Unused space or hidden partition - TCP/IP packets • Unused or reserved bits in the header

Steganalysis • Hiding information within electronic media requires alternations of the media properties that may introduce some form of degradation or unusual characteristics • Forms of attacks and analysis on hidden information - Detecting - Extracting Disabling/destroying The attacking approaches vary depending upon the methods used to embed the information into the cover media - An arms race? Alice Bob Eve 5

Biometric Recognition • Biometrics = “life”+”measure” • Automatic recognition of individuals based on their physiological and/or behavior characteristics face fingerprint iris user input 6

Requirements of Biometrics • A biological measurement qualifies to be a biometric if it satisfies - Universality - Distinctiveness - Permanence - Collectability • A practical biometric system must satisfy - Performance - Acceptability - Circumvention 7

A Biometric System 8

Applications of Biometrics • Secure access to - Buildings - Computer systems - Laptops - Cell phones - ATMs Password • “who he is” instead of “what he possesses and “what he remembers” 9

Content Tampering Image tampering - Object removing - Composition - Morphing - Re-touching - Enhancing - Computer graphics - Painting 10

Watermarking-Based Forensics • Watermarking-based schemes - Fragile watermarking • Watermarks will be undetectable when the content is changed in any way - Semi-fragile watermarking • Watermark will survive only legitimate distortion - Watermarks enabling distortion localization or restoration • A major drawback - Watermarks must be embedded either at the time of recording or afterwards by a person authorized to do so Example: A Secure Digital Camera 11

Statistical Techniques for Detecting Traces • Assumption - Digital forgeries, though visually imperceptible, alter some underlying statistical properties of natural images • Techniques - Re-sampled images • Correlations between neighboring pixels - Color Filter Array (CFA) interpolated images • Correlations are destroyed when the image is tampered - Double compressions - Duplicated regions - Inconsistent noise patterns 12