Tamper Detection and Localization for Categorical Data Using Fragile Watermarks.

Slides:



Advertisements
Similar presentations
Rob Farraher Ken Pickering Lim Vu
Advertisements

1 40T1 60T2 30T3 10T4 20T5 10T6 60T7 40T8 20T9 R S C C R JOIN S?
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
1 Watermarking Relational Databases Acknowledgement: Mohamed Shehab from Purdue Univ.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Watermarking Techniques Digital Rights Seminar © April 28, 2006 Mahmoud El-Gayyar.
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
Information Hiding: Watermarking and Steganography
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Technical Aspects of Digital Rights Management
1 Audio Watermarking for Copyright Protection 報告人:鄒昇龍.
Applications of Data Hiding in Digital Images
UCB Security Jean Walrand EECS. UCB Outline Threats Cryptography Basic Mechanisms Secret Key Public Key Hashing Security Systems Integrity Key Management.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Robust Digital Right Management Scheme (DRM) for Multimedia Anuj Maheshwari Victor Sutan
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
Watermarking Relational Databases CSC 574/474 Information System Security.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
All rights reserved. Copyright (c) 1999, Hitachi, Ltd. Slide 1 Internet/Marks Hitachi, Ltd ,16 - Visual Marks for Cyber World -
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
A study for Relational Database watermarking scheme Speaker: Pei-Feng Shiu Date: 2012/09/21.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Digital Watermarking
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
The Content Scrambling System (CSS) Carlos Garcia Jurado Suarez 03/10/2006.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
A Partial Survey of the Perfect Digital Watermark Problem.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Introduction to Steganography
Watermarking Relational Databases
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Information Hiding Technology: Current Research and Future Trend
Welcome
Visit for more Learning Resources
Recent Developments on Multimedia and Secure Networking Technologies
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Recent Developments on Multimedia and Secure Networking Technologies
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Secret image sharing with steganography and authentication
Recent Developments in Information Hiding
Digital Watermarking Lecture 2
Presentation transcript:

Tamper Detection and Localization for Categorical Data Using Fragile Watermarks

What is Digital watermarking? A digital watermark is technique of embedding an invisible signal directly into the data, thus providing a promising way to protect digital data from illicit copying and manipulation. A digital watermark is technique of embedding an invisible signal directly into the data, thus providing a promising way to protect digital data from illicit copying and manipulation.

Why is it required? It is used to detect data tampering and illicit copying of data. It is used to detect data tampering and illicit copying of data. It complements cryptography and steganography. It complements cryptography and steganography. Cryptography- once the encrypted data is decrypted, the data is clear and no longer under protection. Cryptography- once the encrypted data is decrypted, the data is clear and no longer under protection. Steganography :The problem is that it cannot extract the hidden data if the stego data undergo some distortions. Steganography :The problem is that it cannot extract the hidden data if the stego data undergo some distortions.

Applications Copy protection Copy protection Authentication Authentication Tamper detection Tamper detection

Classifications of Digital Watermarks Fragile watermarks for tamper detection Fragile watermarks for tamper detection Robust watermarks for ownership verification Robust watermarks for ownership verification

Difference between multimedia and Database Watermarking Multimedia data are highly correlated, there is a lot of redundant information present in multimedia data. Multimedia data are highly correlated, there is a lot of redundant information present in multimedia data. Database relations contain large number of independent tuples and all tuples are equally important. Database relations contain large number of independent tuples and all tuples are equally important.

Challenges Embedding watermarks in database relations is a challenging problem because there is little redundancy present in a database relation. Embedding watermarks in database relations is a challenging problem because there is little redundancy present in a database relation.

Watermark Embedding Algorithm Algorithm 1 Watermark embedding 1: For all k ∈ [1, g] qk = 0 2: for i = 1 to ω do 3: hi = HASH(K, ri.A1, ri.A2, · · ·, ri.Aγ) // row hash 4: hpi = HASH(K, ri.P ) // primary key hash 5: k = hpi mod g 6: ri → Gk 7: qk ++ 8: end for 9: for k = 1 to g do 10: watermark embedding in Gk // See Algorithm 2 11: end for

Watermark Embedding Algorithm(cont…) Algorithm 2 Watermark embedding in Gk sort tuples in Gk in ascendant order according to their primary key hash // Virtual operation H = HASH(K, h1, h2, · · ·, hqk) W = extractBits(H, qk/2) // See line for i = 1, i < qk, i = i + 2 do if (W[i/2] == 1 and hi hi+1) then switch the position of ri and ri end if end for extractBits(H, l) { 10: if length(H) ≥ l then W = concatenation of first l selected bits from H else m = l - length(H) W = concatenation of H and extractBits(H,m) end if return W }

Example Figure 1: A table before and after watermark embedding WM={0,1}

Watermark Detection Algorithm 3 Watermark detection 1: For all k ∈ [1, g] qk = 0 2: for i = 1 to ω do 3: hi = HASH(K, ri.A1, ri.A2, · · ·, ri.Aγ) // tuple hash 4: hp i = HASH(K, ri.P ) // primary key hash 5: k = hp i mod g 6: ri → Gk 7: qk ++ 8: end for 9: for k = 1 to g do 10: watermark verification in Gk // See Algorithm 4 11: end for

Watermark Detection Algorithm 4 Watermark verification in Gk 1: sort tuples in Gk in ascendant order according to their primary key hash // Virtual operation 2: H = HASH(K, h1, h2, · · ·, hqk) // hi(i = 1, · · · qk) is the tuple hash of ith tuple after ordering 3: W = extractBits(H, qk/2) //See line 9-16 in Algorithm 2 4: for i = 1, i < qk, i = i + 2 do 5: if hi ≤ hi+1 then 6: W[i/2] = 0 7: else 8: W[i/2] = 1 9: end if 10: end for 11: ifW == W then 12: V = TRUE 13: else 14: V = FALSE 15: end if