N-Secure Fingerprinting for Copyright Protection of Multimedia

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Fifth International Conference on Information
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
Interword Distance Changes Represented by Sine Waves for Watermarking Text Images Author: Ding Huang Supervisor: Prof. Hong Yan.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Protection for Web Delivered Music Patcharinee Tientrakool EE 6886: Topics in Signal Processing - Multimedia Security System.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Damageless Information Hiding Technique using Neural Network Keio University Graduate School of Media and Governance Kensuke Naoe.
Modified Patchwork Algorithm: Anovel Audio Watermarking Scheme In-Kwon Yeo and Hyoung Joong Kim.
Mesh Watermarking based on 2D Transferred Domain Jongyun Jun Tae-Joon Kim CS548 Term Project Presentation 2010/05/13.
Anti-collusion fingerprinting for Multimedia W. Trappe, M. Wu, J. Wang and K.J. R. Liu, IEEE Tran. Signal Processing, Vol. 51, No. 4, April 2003.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Watermarking Text Document Images Using Edge Direction Histograms Young-Won Kim and Il-Seok Oh Pattern Recognition Letters, Vol. 25, 2004, pp – 1251.
Digital Watermarking
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.
Multiple-description iterative coding image watermarking Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 20, No. 4, pp , 2010.
Jaroslaw Kutylowski 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Robust Undetectable Interference Watermarks Ryszard Grząślewicz.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
1 Traitor Tracing. 2 Outline  Introduction  State of the art  Traceability scheme  Frameproof code  c-secure code  Combinatorial properties  Tracing.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Basic Message Coding 《 Digital Watermarking: Principles & Practice 》 Chapter 3 Multimedia Security.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Date of download: 6/2/2016 Copyright © 2016 SPIE. All rights reserved. Watermarking the intensity component of a color image using the IHS color coordinate.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
DEPARTMENT OF ECE, BEC, BAGALKOT
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
DONE BY S.MURALIRAJAN M.NIRMAL
Image Watermarking Chu, Hsi-Cheng.
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Information Hiding and Its Applications
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Novel Multiple Spatial Watermarking Technique in Color Images
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Authors: J.J. Murillo-Fuentes
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

N-Secure Fingerprinting for Copyright Protection of Multimedia 2004. 08. 23 Won-gyum Kim

Contents Watermarking vs. Fingerprinting Collusion attacks Collusion-secure fingerprinting code N-secure fingerprinting code Experimental results Conclusion

Watermarking vs. Fingerprinting Information hiding technique to protect copyright protection of multimedia Watermarking Embed owner’s information Protect owner’s copyright Only one watermarked content Fingerprinting Embed customer’s information Trace customer who re-distributes contents illegally Many different fingerprinted contents

Watermarking vs. Fingerprinting Distribute same contents O Customer 1 Content O Customer 2 . . . Owner’s information O Customer N

Watermarking vs. Fingerprinting Distribute different contents 1 Customer 1 Content 2 Customer 2 . . . Customer’s information N Customer N

Collusion attacks Use differences among fingerprinted contents Averaging attack Min-Max attack Negative correlation attack Zero-correlation attack

Collusion Attack Averaging Attack Min-Max Attack Average fingerprinted contents together Min-Max Attack Average min and max value of the fingerprinted contents Embedding and retrieving in the frequency domain are similar to that in the spatial domain, but it is different in the point that the watermark is embedded in the frequency domain after FFT. At first, transform the original image into the frequency domain using FFT Next, multiply bit sequence generated by secret key with seal image and embed the results to amplitude value Then recover original image using inverse FFT. Retrieving process is also similar to that in the embedding process. Firstly, transform watermarked image into the frequency domain using FFT and estimate approximate original from amplitude value. Then finally, extract seal image by multiplying the difference value with bit sequence generated by secret key.

Averaging attack ………… N Averaging image 1 2 As a second experiment, above is the result of embedding and extracting seal image in the frequency domain.

Collusion Attack Negative-correlation attack Zero-correlation attack Use median value Zero-correlation attack Use a target fingerprinted content to compare

Collusion-secure FC Marking Assumption The aim of collusion-secure FC By colluding, users can detect a specific mark if it differs between their copies; otherwise a mark can not be detected. The aim of collusion-secure FC After colluding, identify all colluders or at least more than one colluder

Collusion-secure FC To make robust to collusion Basic idea After colluding, the location of detectible code is unique according to all combinations of collusion Basic idea For 3 customers and 2 colluders C1 : 1 0 1 Collude C1 & C2 : 1 0 0 C2 : 1 1 0 Collude C2 & C3 : 0 1 0 C3 : 0 1 1 Collude C1 & C3 : 0 0 1

Collusion-secure FC 2-detecting code (Dittman, 2000) Based on the finite projective space Code for 3 customers with 2 colluders C1 : 1 0 0 0 1 1 0 C2 : 1 1 1 0 0 0 0 C3 : 0 0 1 1 1 0 0 Fingerprint 1 Fingerprint 2 Fingerprint 3 Points Lines 1 2 6 7 5 4 3

N-secure FC Use the location of undetectable code Content ID + Customer ID Code length is N+1 Content ID Customer ID

N-secure FC Code example For 7 customers with 7 colluders

All customers : 1 X X X X X X X N-secure FC Collusions X : undetectable C1 & C2 : 1 X X 1 1 1 1 1 C2 & C5 & C7 : 1 1 X 1 1 X 1 X C3 & C4 & C5 & C6 : 1 1 1 X X X X 1 All customers : 1 X X X X X X X

Embedding HVS MF(α) Original Image Fingerprinted Image W Code Customer index Code Generator Shuffle Key Produce pattern

Extracting Fingerprinted Image Correlator Filter De-shuffle Key Customer index

Experimental Results 512x512 Gray-scale Lena image For 15 users with 15 colluders Use general watermarking scheme Embed fingerprinting code into spatial domain of the image Divide into blocks and use shuffling to improve security level Do not consider the other watermarking attacks (a) Customer 1 without collusion (b) Collude Customer 1 & 2 (c) Collude all customers (1…15)

Conclusion Proposed fingerprinting code robust to collusion attack of N customers Trace user(s), who joined collusion Content ID + Customer ID Code length is N+1 Further study Consider the other watermarking attacks JPEG, RST, Filtering... Reduce code length