IMA - Digital Libraries February 13, 2001 Slide 1 Multimedia Security: Is Their Hope In Securing Our Digital Future? Edward J. Delp Purdue University School.

Slides:



Advertisements
Similar presentations
Information Hiding and Covert Channels
Advertisements

CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Intermediate 2 Computing
Review of Chapter 2. Important concepts – The Internet is a worldwide collection of networks that links millions of businesses, government agencies, educational.
Multimedia Systems Irek Defee IPTV IP + TV Providing television over IP networks.
Prepared for DA 201  Introduction to Digital Watermarking.
Digital rights management Audio watermark Jiamian.
Rob Farraher Ken Pickering Lim Vu
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Confidentiality and Privacy Controls
INTERNATIONAL LAW ENFORCEMENT IP CRIME CONFERENCE SEPTEMBER 2014 LEN HYNDS CSO MODERN TIMES GROUP.
VIPER DSPS 1998 Slide 1 A DSP Solution to Error Concealment in Digital Video Eduardo Asbun and Edward J. Delp Video and Image Processing Laboratory (VIPER)
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Fifth International Conference on Information
Copyrights1 By Saud Al-Harbi & AbdulAziz Al-Shamrani.
FIT3105 Smart card based authentication and identity management Lecture 4.
Issues for Multimedia Privacy & Security ---- Video Content Privacy Protection, Copyright Protection & Database Access Control Jianping Fan Dept of Computer.
CSE331: Introduction to Networks and Security Lecture 36 Fall 2002.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Jau-Wu Huang1 Digital Rights Management for Visual Content in Mobile Applications Trimeche, M.; Chebil, F.; Nokia Research Center Control, Communications.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Protection for Web Delivered Music Patcharinee Tientrakool EE 6886: Topics in Signal Processing - Multimedia Security System.
Metadata Presentation by Rick Pitchford Chief Engineer, School of Communication COM 633, Content Analysis Methods Fall 2009.
Streaming media over the Internet A million channels and there is still nothing on! By Samuel Shiffman Streaming Technologist Seton Hall University
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Donald M. Whiteside Vice President, Corporate Technology Group Director, Technical Policy and Standards ITU and EBU Presentation A perspective on trends.
Edward J. Delp Panasonic January 13, 2000 Slide 1 Watermarking: What is the Future? Edward J. Delp Purdue University School of Electrical and Computer.
Copyright & Licensing. 2/18 Presentation Outline Copyright Law Software and copyright Licensing Software Piracy Copyright and the Internet.
Glencoe Introduction to Multimedia Chapter 9 Video 1 Chapter Video 9  Section 9.1 Video in Multimedia  Section 9.2 Work with Video Contents.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
CMPD273 Multimedia System Prepared by Nazrita Ibrahim © UNITEN2002 Multimedia System Characteristic Reference: F. Fluckiger: “Understanding networked multimedia,
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Module 4: Fundamentals of Communication Technologies.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Emily Adler, Megan Gasvoda, and Kristine McNally.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Edward J. Delp Intel December 3, 1999 Slide 1 Video and Image Processing At Purdue Edward J. Delp Video and Image Processing Laboratory (VIPER) School.
What is MediaCAST. MediaCAST is an on-demand learning platform purchased by the CCSD to enhance the delivery of lessons in the classroom. The system provides.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
Detection of Image Alterations Using Semi-fragile Watermarks
Copyright © 2002 Pearson Education, Inc. Slide 3-1 Internet II A consortium of more than 180 universities, government agencies, and private businesses.
Digital Rights Management / DMCA Anti-Circumvention Edward W. Felten Dept. of Computer Science Princeton University.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
Network Security Celia Li Computer Science and Engineering York University.
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
California State University, LA Presented by Amanda Steven StevenAamirObaid.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Copyright & Licensing.
Web Design and Development
Encryption, Cryptography, and Steganography:
Fun Stuff: Digital Media
Digital Watermarking Lecture 2
Presentation transcript:

IMA - Digital Libraries February 13, 2001 Slide 1 Multimedia Security: Is Their Hope In Securing Our Digital Future? Edward J. Delp Purdue University School of Electrical and Computer Engineering Video and Image Processing Laboratory (VIPER) West Lafayette, Indiana

IMA - Digital Libraries February 13, 2001 Slide 2 Outline Problem Overview What are the Issues? Is Their Hope?

IMA - Digital Libraries February 13, 2001 Slide 3 Multimedia Security “Everything” is digital these days - a copy of a digital media element is identical to the original How can an owner protect their content? Are images still “fossilized light”? (Can you believe something unless you see it or hear it in real-time?) What does all of this mean in terms of law? Does any security system really work or does it just make us feel good!

IMA - Digital Libraries February 13, 2001 Slide 4 Media Elements Audio Images Video Documents (including HTML documents) Graphics Graphic or Scene Models Programs (executable code)

IMA - Digital Libraries February 13, 2001 Slide 5 Attitude Problem People are giving up on content protection - we all need to think differently!  “Information needs to be free” –would you take something from my house? Napster DivX what does it mean to own “bits”? A massive assault on copyright occurred at universities this past Fall!!! (ABC Nightline - February 9, 2001)

IMA - Digital Libraries February 13, 2001 Slide 6 Attitude Problem “Information may want to be free as long as it does not belong to you” –should your personal information be “free” or just information that has a copyright? –“I have the right to take this information because the owner is greedy and makes too much money!” –not all users of file sharing programs share

IMA - Digital Libraries February 13, 2001 Slide 7

IMA - Digital Libraries February 13, 2001 Slide 8

IMA - Digital Libraries February 13, 2001 Slide 9

IMA - Digital Libraries February 13, 2001 Slide 10

IMA - Digital Libraries February 13, 2001 Slide 11

IMA - Digital Libraries February 13, 2001 Slide 12

IMA - Digital Libraries February 13, 2001 Slide 13 Digital Communication System

IMA - Digital Libraries February 13, 2001 Slide 14 Typical Network System: Trusted Users Source User Insecure Channel Attacker Is this a pirate?

IMA - Digital Libraries February 13, 2001 Slide 15 Network System: User Not Trusted Source User Insecure Channel Authentication

IMA - Digital Libraries February 13, 2001 Slide 16 Multimedia Security Applications Privacy Authentication Access Control Forgery Detection Copyright Protection Proof of Purchase (non-deniable) Proof of Delivery (non-deniable) Audit Trails Intruder Detection

IMA - Digital Libraries February 13, 2001 Slide 17 What Do We Want From a Multimedia Security System? Access Control Copy Control Auditing (fingerprinting) –Who did what and when? Playback Control Record Control Generation Control 

IMA - Digital Libraries February 13, 2001 Slide 18 Multimedia Security - Tools Set Encryption Authentication Hashing Time-stamping Watermarking SYSTEM

IMA - Digital Libraries February 13, 2001 Slide 19 Results - Girls  Original “Girls” Altered “Girls” 

IMA - Digital Libraries February 13, 2001 Slide 20

IMA - Digital Libraries February 13, 2001 Slide 21 New Applications Home Networks Streaming Media Digital Cinema Wireless e-books

IMA - Digital Libraries February 13, 2001 Slide 22 Digital Data in the Home Digital Television Server Satellite ComputerDVD PlayerAudio Telephone Home IP Network Broadcast Media Provider

IMA - Digital Libraries February 13, 2001 Slide 23 Streaming: Unicast

IMA - Digital Libraries February 13, 2001 Slide 24 Streaming: Multicast

IMA - Digital Libraries February 13, 2001 Slide 25 What is Needed? Models of complex end-to-end systems with to respect to security (this is very difficult) Cryptography in a noisy channel - can one still recover something? Models of watermarking/data hiding - model as a channel coding problem with side information How can one authenticate in a portable and/or wireless environment?

IMA - Digital Libraries February 13, 2001 Slide 26 What Is Needed? Renewable systems - if the system is “broken” can it be fixed without “product recall” The security system should exploit the unique properties of the media element with respect to how it is represented and transported (for example multicast) The security “features” should survive signal processing operations and conversion to analog Cryptography is not enough and certainly watermarking is not enough - must take a system approach - must understand the application

IMA - Digital Libraries February 13, 2001 Slide 27 Digital Millennium Copyright Act What does it mean to own bits? Will it be illegal to remove a security feature from a multimedia element?

IMA - Digital Libraries February 13, 2001 Slide 28 Conclusion We need to think differently about our attitudes towards “copyright” - particularly in how we train our students New “paying models” need to be developed We need to take a system approach - this is difficult