ECE738 Advanced Image Processing Data Hiding (3 of 3) Curtsey of Professor Min Wu Electrical & Computer Engineering Univ. of Maryland, College Park.

Slides:



Advertisements
Similar presentations
Watermarking 3D Objects for Verification Boon-Lock Yeo Minerva M. Yeung.
Advertisements

Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
1 A video authentication scheme for H.264/AVC Main profile Nandakishore Ramaswamy Multimedia Processing Lab July 9 th, 2004.
Information Hiding: Watermarking and Steganography
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Digital Signatures and Hash Functions. Digital Signatures.
Information Security Principles & Applications Topic 4: Message Authentication 虞慧群
N-Secure Fingerprinting for Copyright Protection of Multimedia
Collusion-resistant fingerprinting for multimedia Wade Trappe, Min Wu, K.J. Ray Liu.
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Announcements: 1. HW7 due next Tuesday. 2. Inauguration today! Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman,
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Announcements:Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman, ElGamal Hash Functions and SHA-1 Hash Functions.
CSE331: Introduction to Networks and Security Lecture 21 Fall 2002.
Chapter 4  Hash Functions 1 Overview  Cryptographic hash functions are functions that: o Map an arbitrary-length (but finite) input to a fixed-size output.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Announcements: 1. HW6 due now 2. HW7 posted Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman, ElGamal Hash Functions.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
1 Information System Security AABFS-Jordan Summer 2006 Digital Signature and Hashing Functions Prepared by: Maher Abu Hamdeh & Adel Hamdan Supervised by:
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
1 Message Authentication and Hash Functions Authentication Requirements Authentication Functions Message Authentication Codes Hash Functions Security of.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Digital Signatures (DSs) The digital signatures cannot be separated from the message and attached to another The signature is not only tied to signer but.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Digital Watermarking Parag Agarwal
Bob can sign a message using a digital signature generation algorithm
Lecture 15 Lecture’s outline Public algorithms (usually) that are each other’s inverse.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
ECE738 Advanced Image Processing Data Hiding (2 of 3) Curtsey of Professor Min Wu Electrical & Computer Engineering Univ. of Maryland, College Park.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
Cryptography, Authentication and Digital Signatures
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Anti-collusion fingerprinting for Multimedia W. Trappe, M. Wu, J. Wang and K.J. R. Liu, IEEE Tran. Signal Processing, Vol. 51, No. 4, April 2003.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 2: Message integrity.
ELE 488 F06 ELE 488 Fall 2006 Image Processing and Transmission (12 – 7 – 06) Digital Watermarking What? Why? How? Attacks, Legal issues 12/7.
Lecture 2: Introduction to Cryptography
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Prepared by Dr. Lamiaa Elshenawy
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
Hash Functions Ramki Thurimella. 2 What is a hash function? Also known as message digest or fingerprint Compression: A function that maps arbitrarily.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 11 September 23, 2004.
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
Data Integrity / Data Authentication. Definition Authentication (Signature) algorithm - A Verification algorithm - V Authentication key – k Verification.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Cryptographic Hash Function
NET 311 Information Security
ICS 454 Principles of Cryptography
Watermarking for Image Authentication ( Fragile Watermarking )
ICS 454 Principles of Cryptography
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

ECE738 Advanced Image Processing Data Hiding (3 of 3) Curtsey of Professor Min Wu Electrical & Computer Engineering Univ. of Maryland, College Park

ECE738 Advanced Image Processing Min U. Maryland Watermark-Based Authentication

ECE738 Advanced Image Processing Min U. Maryland Document Authentication –Embed pre-determined pattern or content features beforehand –Verify hidden data’s integrity to decide on authenticity (f) alter (a) (b) (g) after alteration (e) (c) (d)

ECE738 Advanced Image Processing Min U. Maryland Image/Video Authentication via Watermarking Motivation –“Picture never lies”? Easy to edit digital media ~ Photoshop –Important to detect tampering ~ evidence in litigation, insurance & government archive –Original “true” image cannot be used to convince judge Basic idea for detecting tampering –Recall authentication problem in crypto –Embed some data in the image and certain relationship/property gets changed upon tampering –Rely on fragility of embedding scheme, and/or embedding content features of original true image Two issues to address – how to embed data? – what data to embed?

ECE738 Advanced Image Processing Min U. Maryland Useful Crypto Tools/Building-Blocks Crypto’ly strong hash or digest function H( ) –One-way “compression” function M-bit input to N-bit output often with fixed N and M >> N Often used to produce a short ID for identifying the input –Properties to be satisfied: 1) Given a message m, H(m) can be calculated very quickly 2) Given a digest y, it is computationally infeasible to find a message m s.t. H(m) = y (i.e., H is one-way) 3) It is computationally infeasible to find messages m1 & m2 s.t. H(m1) = H(m2) (i.e. H is strongly collision-free) –Keyed Hash: H( k, m ) = Hash( concatenated string derived from k & m ) –Commonly used crypto hash 160-bit SHA (Secure Hash Algorithm) by NIST 128-bit MD4 and MD5 by Rivest

ECE738 Advanced Image Processing Min U. Maryland Data Integrity Verification (data authentication) Authentication is always “relative” –with respect to a reference How to establish and use a reference [Method-1] Give a “genuine” copy to a trusted 3 rd party [Method-2] Append “check bits” –Want hard to find a different meaningful msg. with same “check bits” => use crypto’ly strong hash –Want tamper-proof if hash func. is public Encrypt concatenated version of message and hash Keyed Hash (Message Authentication Code) ~ no extra encryption needed Digital signature algorithm (using public-key crypto) Signed Msg|Hash ~ i.e., encrypt by private key s.t. others can’t forge

ECE738 Advanced Image Processing Min U. Maryland Extension to Grayscale/Color Images “Semi-fragile” watermarking –Want to distinguish content-preserving changes (e.g. moderate compression) vs. content tampering –Achieve controlled robustness often via quantization How to embed –One approach: enforce pre-quantized DCT coefficients using a look-up table What to embed –A visually meaningful pattern and/or a pre-selected one facilitate quick visual check and locate alteration –Content features to avoid malicious counterfeiting attack limited precision (e.g., most significant bits) DCT coefficient 23Q 24Q 25Q 26Q lookup table mapping… …

ECE738 Advanced Image Processing Min U. Maryland unchangedcontent changed –Embed patterns and content features using a lookup-table –High embedding capacity/security via shuffling locate alteration differentiate content vs. non-content change (compression) Watermark-based Authentication

ECE738 Advanced Image Processing Min U. Maryland Issues Beyond Embedding Mechanism

ECE738 Advanced Image Processing Min U. Maryland Issues and Challenges Tradeoff among conflicting requirements –Imperceptibility –Robustness & security –Capacity Key elements of data hiding –Perceptual model –Embedding one bit –Multiple bits –Uneven embedding capacity –Robustness and security –What data to embed Upper Layers Uneven capacity equalization Error correction Security …… Lower Layers Imperceptible embedding of one bit Multiple-bit embedding Coding of embedded data Robustness Capacity Imperceptibility

ECE738 Advanced Image Processing Min U. Maryland Techniques For Multi-bit Embedding Amplitude modulation –Use M different amplitude of watermark to represent log 2 M bits  i  {- J, -(M-3)J/(M-1), …, (M-3)J/(M-1), J} where J is JND accurate detection require clear distinction in received amplitudes use modulo-M operation for enforcement embedding Orthogonal and Biorthogonal –Embed one of M orth. patterns representing log 2 M or log 2 (2M) bits TDMA-type (temporal or spatial or both) –Embed each bit in different non-overlapped region or frame –Unevenness in embedding capacity due to non-stationarity CDMA-type (Coded Modulation) –Use plus vs. minus a pattern to embed one bit detector need to know the mutually orthogonal patterns 1st bit 2nd bit...

ECE738 Advanced Image Processing Min U. Maryland Comparison (brief) TDMA vs. CDMA –Equivalent in terms of watermark energy allocation –Need to handle uneven embedding capacity for TDMA –Need to set up and store orthogonal vectors for CDMA Orthogonal vs. TDMA/CDMA –Orthogonal modulation has higher energy efficiency  To explore further, See Section V and the reference therein of M. Wu, B. Liu: "Data Hiding in Image and Video: Part-I -- Fundamental Issues and Solutions'', submitted to IEEE Trans. on Image Proc., Jan Orthogonal Modulation TDMA/CDMA

ECE738 Advanced Image Processing Min U. Maryland Comparison (1) Applicable Media Types –not always easy to find many CDMA orthogonal directions (e.g., binary image) –Amplitude is applicable to most features –TDMA can be applied temporally and spatially TDMA vs. CDMA –Equivalent in terms of watermark energy allocation –Need to handle uneven embedding capacity for TDMA Variable Embedding Rate (need to embed some side info.) Constant Embedding Rate (shuffling helps increase embed.rate) –Need to set up and store orthogonal vectors for CDMA

ECE738 Advanced Image Processing Min U. Maryland Orthogonal Modulation TDMA/CDMA Comparison (2) TDMA / CDMA vs. Orthogonal Modulation –Constant minimum separation for orthogonal modulation as # of embedded bits B increases but total wmk energy  unchanged –Orthogonal modulation require book-keeping more orthogonal vectors and more computation in classic detection –Combining the two to improve embedding rate with small increase in computation and storage

ECE738 Advanced Image Processing Min U. Maryland Comparison (3) Amplitude Modulation vs. Other Techniques –Amplitude modulation can embed multiple bits on a single feature/direction Without the need of many orthogonal vectors –Minimum separation for same avg. wmk energy  and # embedding bits B O( 2 -B  1/2 ) for amplitude modulation O( B -1/2  1/2 ) for TDMA/CDMA O(  1/2 ) for orthogonal modulation Modulation techniques for communications [Proakis] –Bandwidth-efficient techniques vs. Energy-efficient techniques –Non-trivial amplitude modulation is not good when signal energy is limited (very low SNR), esp. for blind detection

ECE738 Advanced Image Processing Min U. Maryland What Data to Embed? Recall: Important to determine what data to embed in authentication applications

ECE738 Advanced Image Processing Min U. Maryland Tracing Traitors Robustly embed digital fingerprint –Insert ID or “fingerprint” to identify each customer –Prevent improper redistribution of multimedia content Collusion: A cost-effective attack –Users with same content but different fingerprints come together to produce a new copy with diminished or attenuated fingerprints Anti-collusion fingerprinting –Trace traitors and colluders to actively deter collusion/redistribution –Rely on joint fingerprint encoding & embedding cable co. Shakespeare in Love Alice Bob Carl w1w1 w2w2 w3w3 Sell

ECE738 Advanced Image Processing Min U. Maryland Embedded Fingerprinting for Multimedia embed Fingerprint original mediacompress extract … Customer: Eve Sell Content Suspicious Suspicious … CandidateFingerprint Search Database Customer: Eve Fingerprint Tracing:

ECE738 Advanced Image Processing Min U. Maryland Collusion Scenarios... Averaging Attack Interleaving Attack Result of collusion: Fingerprint energy decreases Jointly design encoding and embedding of fingerprints

ECE738 Advanced Image Processing Min U. Maryland bit ACC Example for Detecting ≤ 3 Colluders User-1 ( -1,-1, -1, -1, 1, 1, 1, 1, …, 1 ) ( -1, 1, 1, 1, 1, 1, …, -1, 1, 1, 1 ) User-4 Extracted fingerprint code ( -1, 0, 0, 0, 1, …, 0, 0, 0, 1, 1, 1 ) Collude by Averaging Uniquely Identify User 1 & 4

ECE738 Advanced Image Processing Min U. Maryland Anti-Collusion Fingerprint Codes Simplified assumption –Assume fingerprint codes follow logic-AND op in colluded images K-resilient AND ACC code –A binary code C={c 1, c 2, …, c n } such that the logical AND of any subset of K or fewer codevectors is non-zero and distinct from the logical AND of any other subset of K or fewer codevectors –Example: {(1110), (1101), (1011), (0111)} ACC code via combinatorial design –Balanced Incomplete Block Design (BIBD) Simple Example ACC code via (7,3,1) BIBD for handling up to 2 colluders among 7 users To explore further, see Trappe-Wu-Liu paper (2001).

ECE738 Advanced Image Processing Min U. Maryland Anti-Collusion Fingerprint Codes (cont’d) (v,k, )-BIBD code is an (k-1)-resilient ACC –Defined as a pair (X,A) –X is a set of v points –A is a collection of blocks of X, each with k points –Every pair of distinct points is in exactly blocks –# blocks Example (7,3,1) BIBD code –X={1,2,3,4,5,6,7} –A={123, 145, 167, 246, 257, 347, 356} Code length for n=1000 users –This code O( n 0.5 ) ~ dozens bits –Prior art by Boneh-Shaw O( (log n) 4 ) ~ thousands bits

ECE738 Advanced Image Processing Min U. Maryland Efficient Collusion Detection for Orth. Mod. EffDet(y,S): Break S into S 0 and S 1 if then if |S j | =1 then Output S j, else EffDet(y,S j ); Amount of correlations needed:  Considerable reductions in computation!