Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt.

Slides:



Advertisements
Similar presentations
Abbas Cheddad, Joan Condell, Kevin Curran and Paul Mc Kevitt Intelligent Systems Research Centre Faculty of Computing and Engineering University of Ulster.
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Fifth International Conference on Information
Slide 1 Joe O’Ruanaidh Siemens Corporate Research Princeton, NJ Digital Watermarking: How it works! SIGGRAPH’99 Panel Friday 13 August 2:15pm - 4:00pm.
Interword Distance Changes Represented by Sine Waves for Watermarking Text Images Author: Ding Huang Supervisor: Prof. Hong Yan.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Data Hiding within Audio Signals Matthew Wiedemer CSE691 November 20, 2001.
Security 3 Distributed Systems Lecture # 16. Overview Steganography Digital Watermarking.
Enhancing Biometric Security Using Watermarking By Shivankush Aras.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Digital Watermarking Parag Agarwal
Reza Mohammadi Shiraz University Of Technology
Information Security Principles (ESGD4222)
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot May 2011 May 2011 Steganalysis ITSS 4201 Internet Insurance and Information.
Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss Authors: Avinash Srinivasan, Jie Wu, and Justin.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Introduction to Steganography
Steganography in WebP image using LSB embedding
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Welcome
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Security Issues for Visual Data: Copyright and Access Control
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Recent Developments on Multimedia and Secure Networking Technologies
Steganography with Digital Images
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Steganography Techniques and their use in Anonymity
Embedding Secrets Using Magic Matrices
Reversible Data Hiding Scheme Using Two Steganographic Images
Information Steganography Using Magic Matrix
Information Hiding and Its Applications
Recent Developments on Multimedia and Secure Networking Technologies
Digital Watermarking for Image Authentication with Localization
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
De-clustering and Its Application to Steganography
Secret image sharing with steganography and authentication
Information Hiding Techniques Using Magic Matrix
Image Based Steganography Using LSB Insertion Technique
Recent Developments in Information Hiding
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A Quadratic-Residue-based Fragile Watermarking Scheme
Presentation transcript:

Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt University of Ulster, UK Dr. Abbas Cheddad Umea University, Sweden

2 Steganography Key Encoder Cover Image Secret Data Stego Object Decoder Secret Data Communications Channel

Secure Digital Watermarking Cover Image Secret Data Protected Image

Digital content authentication 4 Sorry - this is NOT original. Test image Original image Original Image Attacked Image

5 Secret Data Cover Image Stego Object Self-Embedding

6 How to detect alterations (1/2) Final Result Grayscale image of Altered image Altered image Extracted grayscale image

7 Original image Extracted image How to detect alterations (2/2)

Self-Embedding - Temporal information UU SDW:American Beauty-045/ Key Frames

9 Temporal content change detection Original Video Attacked Video Detected Video

Conclusion  A steganography based self-embedding technique provides a solution for digital content authentication.  Benefits - Protects commercial value of digital content - Protects the secrecy of digital content - Protects digital content from modification  Applicable fields: film/animation, TV, games, music, images 10

11 Thank You

12 Secret Data Cover Image Stego Object Self-Embedding

13 How to detect alterations (1/3) Altered Document Recovered Document Grayscale image of Altered Document Final Result Altered Document Recovered Document Grayscale image of Altered Document Altered Document Recovered Document