CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

H IGH CAPACITY WATERMARKING H YPERSPECTRAL I MAGES AUTHENTICATION Mehdi Fallahpour Jordi Serra-Ruiz David Megías.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Watermarking Techniques Digital Rights Seminar © April 28, 2006 Mahmoud El-Gayyar.
Information Hiding: Watermarking and Steganography
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
AFOSR PROGRAM REVIEW JUNE 5-7, 2003 PRINCETON, NJ DATA HIDING IN TIME-FREQUENCY DISTRIBUTION OF IMAGES Bijan Mobasseri ECE Department Villanova University.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
AFOSR PROGRAM REVIEW DATA HIDING IN COMPRESED DIGITAL VIDEO Bijan Mobasseri, PI Dom Cinalli, Aaron Evans, Dan Cross, Sathya Akunuru ECE Department Villanova.
Domenick Cinalli ECE Department Villanova University Intelligent Ship Symposium V Monday, May 12, 2003 Metadata Embedding in Compressed UAV Video via Digital.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Compression video overview 演講者:林崇元. Outline Introduction Fundamentals of video compression Picture type Signal quality measure Video encoder and decoder.
Watermarking Part 2: Future Work Electrical and Computer Engineering Department Villanova University 18 August 2004 Robert J. Berger II Michael P. Marcinak.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
ELE 488 F06 ELE 488 Fall 2006 Image Processing and Transmission (12 – 7 – 06) Digital Watermarking What? Why? How? Attacks, Legal issues 12/7.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Introduction to Audio Watermarking Schemes N. Lazic and P
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
IMAGE PROCESSING IMAGE WATERMARKING
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Welcome
DONE BY S.MURALIRAJAN M.NIRMAL
Watermarking for Image Authentication ( Fragile Watermarking )
Recent Developments on Multimedia and Secure Networking Technologies
Dept. of Elec. & Comp. Engineering
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Information Hiding and Its Applications
Recent Developments on Multimedia and Secure Networking Technologies
Digital Watermarking Lecture 2
Authors:Bijan G. Mobasseri、Domenick Cinalli
Presentation transcript:

CAC ANNUAL MEETING DATA HIDING IN COMPRESSED MULTIMEDIA SIGNALS Bijan Mobasseri, PI S. R. Nelatury Dom Cinalli Dan Cross Aaron Evans Colin O’Connor Sathya Akunuru ECE Department Villanova University Villanova, PA October 30, 2002

2/46 Background info Funding agency: The US Air Force Office of Scientific Research(AFOSR) Monitor: AFRL/IFEC, Information Directorate, Rome, NY Project: Smart Digital Video PI: Bijan Mobasseri

3/46 Outline Data hiding/watermarking requirements Established watermarking approaches Project summaries: –Compressed media watermarking –Video authentication through self-watermarking –Lossless watermarking using error-resilient coding –Time-frequency watermarking –Metadata embedding

4/46 Data hiding/watermarking requirements Data hiding must at least meet the following three conditions: –Transparency; no visible impact on cover signal –Robustness; filtering, compression, cropping –Security; must assume the algorithm is known Places to hide data are: –Spatial- pixel amplitudes, LSB, QIM –Transform domain- spread spectrum, Fourier/wavelet, LPM –Joint- time/frequency distribution

5/46 Applications of watermarking Here are few, and growing list –Copyright protection- prevent unauthorized duplication –Fingerprinting-to find out who gave it away –Copy protection- to keep a tab on the number of copies made –Broadcast monitoring- automatic monitoring of commercials –Authentication- insuring data integrity and tamper resistance/detection –Indexing- helping multimedia search capability –Metadata hiding- embedding patient’s records in their medical images –Data hiding- covert communications in plain sight

6/46 Basic idea

7/46 Watermark Embedding and Extraction Cover image: f Watermark: w Embedding function:E Secret key:k Stego image= S=E(f,w,k) Authentication T(S): tampered signal

8/46 Detector response to forgeries Let’s say someone attempts to forge a watermarked document using their own signature We then have None of the two terms register significant response

9/46 Block Diagram Embedding Watermark extraction SOURCE WATER MARKING TAMPERING CORRUPTED WM SOURCE CORRUPTED WM SOURCE - SOURCE DISTORTED WM X ORIGINAL WM

10/46 Quality of extracted watermark

11/46 Trade-offs

12/46 LSB watermarking Probably the earliest attempt at watermarking was to flip the least significant bit of each pixel LSB being at noise level, would have no impact on quality. However, the slightest change in pixel intensity would make the watermark unreadable Pixel 1Pixel 2 LSB

13/46 BITPLANE WATERMAKRING

14/46 Hiding information in 24 bit images A 1024x bit color image can potentially hide 2,359,296 bits How would you hide the letter A? “A” can be hidden in the LSB of 3 pixels such as The binary value of A is Changed bits are shown

15/46 Transform domain watermarking Spatial watermarking is fast but brittle. It is best to do watermarking in transformed domains DFT –DCT –DWT The first successful implementation was done by Cox et al at NEC/Princeton under spread spectrum watermarking

16/46 Basic idea Instead of tweaking pixels, alter selected coefficients of image transform Then do inverse transform. This way, watermark spreads throughout the image affecting every pixel in some way It is not possible to find the watermark in the spatial domain

17/46 SPREAD SPECTRUM WATERMARKING (Cox, NEC) 55 DCT Quan Original frame

18/46 Challenges Which DCT coefficients should you choose? We have to worry about two competing requirements –Robustness - means low frequency terms should be modified –Imperceptibility - means low frequency terms should be avoided

19/46 DFT watermarking

20/46 Watermarking DWT

VIDEO WATERMAKING

22/46 Tampering scenarios: cut and splice of surveillance video A block of frames removed and video spliced Video must be embedded with proper sequencing codes so as to reveal the breakage

23/46 Cut, insert and splice Incriminating/sensitive portion is removed and replaced

24/46 Cut, swap and splice

25/46 Collusion attack

26/46 MPEG bitstream syntax

27/46 Embedding watermark bits in VLCs Variable length codes are the lynchpin of MPEG There is a subset of MPEG VLC codes that represent identical runs but differ in level by just one From: Langelaar et al, IEEE SP Magazine September 2000

28/46 Data hiding capacities

SELF-WATERMARKING * * D. Cross, B. Mobasseri, “Watermarking for self- authentication of compressed video,” IEEE ICIP2002, Rochester, NY, September 22-25, 2002,

30/46 Self-watermarking:the concept In self-watermarking, the watermark is extracted from the source itself Self-watermarking prevents watermark pirating Most work on self-watermarking has been done on images.

31/46 Self-watermarking of compressed video 10 VLC (0,5) VLC (0,16) VLC (1,15) VLC (0,6) VLC (1,10) VLC (1,11) VLC (0,12)

Lossless Watermarking of Compressed Media* * B. Mobasseri, D. Cinalli “Watermarking of Compressed Multimedia using Error- Resilient VLCs,” MMSP02, December 9-11, 2002

33/46 The idea:watermark as intentional bit errors A close look reveals that watermarking of VLCs is essentially equivalent to channel errors. Bit errors and watermark bits have identical impact. They both cause bit errors in affected VLCs.

34/46 The solution:lossless watermarking Embed watermark bits in the VLCs as controlled bit errors MPEG-2 VLCs, however, have no inherent error protection. Any bit error will cause detection failure up to start code Bidirectionally decodable codewords are capable of isolating and reversing channel errors This approach leads to lossless watermarking

35/46 Bi-directional VLCs Each VLC is represented twice in the new bitstream. It is this property that allows error resiliency Burst error shall not be so long to simultaneously affect the same bit of identical VLC

36/46 Watermarking capacity If watermarking begins with the first bit of the VLC and L=l, every bit of the VLC may be watermarked, then C=L bits/packet We define packet as one macroblock

37/46 Data

TIME-FREQUENCY WATERMARKING B. Mobasseri, “Digital watermarking in joint time-frequency domain,”,IEEE ICIP, Rochester, NY, September, 22-25, 2002

39/46 The Idea

40/46 TF watermarking WD + D WD - 1 WD WM JPEG

41/46 Results

42/46 Effect of compression JPEG:Q=5

Metadata Embedding

44/46 Background Video images & metadata recorded and handled as two separate streams –Storage overhead –Bookkeeping issues –Accuracy and human error –Cumbersome to display It would be nice to permanently attach metadata to video and make it available during playback Metadata Video

45/46 Sample Metadata and video footage Surveillance VideoXML Coded Metadata

THE END