Media Protection Media Encryption Media Watermark Media Protection Media Encryption Media Watermark Lesson 10.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Blue Spike © 2001 Blue Spike, Inc. - 1 Copyright Protection? What are the technologies which can address copyright management in a world of digital copies?
Fifth International Conference on Information
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Issues for Multimedia Privacy & Security ---- Video Content Privacy Protection, Copyright Protection & Database Access Control Jianping Fan Dept of Computer.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Digital Watermarking Parag Agarwal
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Dr. Khalid A. Kaabneh Amman Arab University
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Chapter 20 Symmetric Encryption and Message Confidentiality.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
PART VII Security.
Parag Agarwal Digital Watermarking Parag Agarwal
Digital Watermarking Lecture 2
Presentation transcript:

Media Protection Media Encryption Media Watermark Media Protection Media Encryption Media Watermark Lesson 10

What is Media Protection? New technologies bring with them new issues: –Advances in compression techniques make it possible to create high-quality digital content (audio, video, still pictures, etc.) –Advances in the network protocols and infrastructure makes it possible to store, stream and distribute this content in a very large scale. Media protection or Digital Rights Management (DRM) is the set of techniques used to: –Control access to content: Viewing rights Reproduction (copying) rights Essentially, media protection is the management of the author’s and publisher’s intellectual property (IP) in the digital world.

Media Protection Principles Encryption of the content to disallow uncontrolled access. Decryption key management. Access control according to flexible usage rules –Number of times content can be accessed; times it can be accessed; trading of access rights. Copy control or copy prevention –Management of the number of copies that can be made of the content. Identification and tracing of multimedia data. –May be a requirement even if the copy is made from the analog version of the content, e.g., recording the analog outputs of a digital playback.

Underlying Technologies DRM is based on two fundamental underlying technologies: –Encryption –Watermarking Encryption is used to “lock” the content and deny access to it to those parties that do not possess the appropriate keys –Encryption enforces the restrictions placed on the content by the author/publisher Watermarking is used to “mark” the content so that a particular copy can be traced back to the original user –Digital Watermarking is used as a deterrent to large-scale unauthorized copying of copyrighted material.

Encryption Encryption is the process of “obscuring” a message (content, media, file, etc.) so that it is undecipherable without the key. Plaintext Encryption Algorithm Encryption Key Cyphertext Decryption Algorithm Decryption Key Plaintext

Types of Encryption Symmetric (Secure Key) Encryption: encryption and decryption keys are the same. Asymmetric (Public Key ) Encryption: keys come in pairs, one to encrypt, another to decrypt. –Used in Public-Key cryptography, where one key in the pair is kept secret, and another is published. –Whatever is encrypted with one key can only be decrypted with the other and vice-versa. Symmetric keys are very efficient, but need to remain a secret and must be securely communicated between the participants. Asymmetric Encryption is much slower than Symmetric Encryption and requires much larger key lengths to achieve the same level of protection. Asymmetric keys (public/private) are slow and inappropriate for actual content exchange. Idea: use asymmetric keys to encrypt the symmetric keys, in order to securely communicate them.

Secure Key Encryption Message M Encryption Function F() Decryption Function F -1 () Message M K Secure key K Secure key secure channel insecure channel E=F(M,K) Encryption Standards DES (Data Encryption Standard) - designed originally by IBM, and adopted by the US government in 1977 and by ANSI in bit block (encryption unit) and 56-bit key - not recommended use after 1998 because it can be broken Triple-DES - three keys and three executions of DES IDEA (International Data Encryption Algorithm) bit block/key AES (Advanced Encryption Standard) bit block/key

Public Key Encryption Message M Encryption Function F() Decryption Function G() Message M K Pub Public key open to all K Pri Private key kept secret by owner insecure channel E=F(M,K Pub ) RSA (Rivest, Shamir, Adleman, 1978) Key Generation - Select p, q which are primes - Calculate n=pxq, and t(n)=(p-1)x(q-1) - Select integer e satisfied gcd(t(n), e)=1 and e<t(n) - Calculate d satisfied exd=1 mod t(n) - Public key: KU={e, n} - Private key: KR={d, n} Encryption - Plaintext: M < n - Ciphertext: C = M e (mod n) Decryption - M = C d (mod n) G(E,K Pri ) Hard to factor n into 2 primes p and q RSA key size: 128 to 300 decimal digitals i.e., 425 to 1024 bits RSA needs more computations than DES much slower than DES Example - Given M=19 - Select two prime numbers p=7 and q=17 - Calculate n=7x17=119, and t(n)=6x16=96 - Select e=5 - Determine d=77 since 5x77=385=4x Ciphertext C=19 5 (mod 119)=66 - Decryption (mod 119)=19

MPEG Video Encryption Example Encrypted MPEG Stream picture header Slice header Macro- block header Block header coef. i coef. i+1 coef. i+2 coef. i DES MPEG Stream picture header Slice header Macro- block header Block header coef. i coef. i+1 coef. i+2 coef. i+3

Watermarking Watermarking is the addition of unremovable data to multimedia content, for the purposes of copy identification and tracking. Visible watermark and invisible watermark Special Mark:, e.g., Owner’s name/sign Added to the image But imperceptible Hidden mark!! Visible even very light

Watermarking Principle and Requirements Principle: insert information that travels with the protected data, wherever it goes The requirements for such a system are: –Imperceptibility: the addition of the watermark must not degrade the content in a perceptible way. –Security: the watermark must only be accessible by authorized parties. –Robustness: the watermark must survive data manipulation, including malicious manipulation with the intent of removing the watermark. original data hidden information protected data distribution protected data embedding W W Watermark (W)

Watermarking of Text Watermarking of formatted text is done using one of the following techniques: –Line shift coding: moving the lines of text up or down slightly; information is encoded in the way lines are shifted. –Word shift coding: same idea, but using spaces between words; much harder to extract. –Feature coding: slightly modify features such as the end line lengths of characters such as b, d and h. These techniques survive printing, consecutive photocopying up to 10 generations, and scanning. Easy to defeat, however: retype the text (OCR or manual).

Watermarking of Still Images There is a large body of techniques and literature on watermarking of still images. In general terms, the watermark is applied to the original, uncompressed image. –Some watermarks are designed in the space domain, while others are applied in the frequency domain. Some watermarks are designed to survive still image compression (JPEG), while others cannot. Simplest technique: replace the LSB of each pixel by a bit from the watermark. –Watermarks will be encoded in sequences of bits. –Image may be compressed to less bits prior to the injection of the watermark.

Additive Watermark with Spread Spectrum Watermark Spread watermark to whole image region

Sample Images OriginalWatermarked Source: Prof. Edward J. Delp’s research group

Video Watermarking In general, the same techniques used for still images can be applied to video. Considerations: –The signal space for video is much larger than for still images; there is no need to use very complex schemes to minimize distortion while maximizing capacity. –Video watermarking schemes need to be less complex because in most cases they need to run in real time and need to address compressed video. –Video watermarks must be able to survive frame averaging, dropping and swapping - spread information over multiple frames –Depending on application, it is desirable to retrieve the watermark from short sequences from the material.

Video Watermarking Techniques DCT-based method: –Use the watermark to modulate a pseudo-noise signal of the same dimensions as the video. –Compute the DCT of the watermark and add it to the DCT of the original video. –Do not use the coefficient if this increases data rate too much. –Add drift compensation to avoid artifacts. –Typically capable of achieving around 50 bits/sec watermark. Motion-Vector method: –Find motion vectors that point to flat areas. –Slightly modify them to add the watermark information (randomized). –Watermark can be derived directly from motion vectors.

Audio Watermarking When compared with video, audio introduces the following issues: –Much less samples resulting in lower watermark capacity. –Humans are much less tolerant to audio changes than to video changes; harder to achieve imperceptibility. Basic spread-spectrum technique is also used for audio, but needs to be refined. –Example: making the power of the watermark signal vary with the overall power of the audio. Lot of activity in this area –See the “Secure Digital Music Initiative” (SDMI), at

Demos of Image Watermark