Multimedia Security Part I: Digital Watermarking Subrata Acharya CS 2310, Spring 2007.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Prepared for DA 201  Introduction to Digital Watermarking.
Digital rights management Audio watermark Jiamian.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Auditing Computer-Based Information Systems
Blue Spike © 2001 Blue Spike, Inc. - 1 Copyright Protection? What are the technologies which can address copyright management in a world of digital copies?
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Jau-Wu Huang1 Digital Rights Management for Visual Content in Mobile Applications Trimeche, M.; Chebil, F.; Nokia Research Center Control, Communications.
Applied Cryptography for Network Security
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Protection for Web Delivered Music Patcharinee Tientrakool EE 6886: Topics in Signal Processing - Multimedia Security System.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 14 Recording and Editing Sound. Getting Started FAQs: − How does audio capability enhance my PC? − How does your PC record, store, and play digital.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Cryptography and Network Security
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
IMA - Digital Libraries February 13, 2001 Slide 1 Multimedia Security: Is Their Hope In Securing Our Digital Future? Edward J. Delp Purdue University School.
Audio Compression Usha Sree CMSC 691M 10/12/04. Motivation Efficient Storage Streaming Interactive Multimedia Applications.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
MIME Object Security Services (MOSS). Privacy Enhanced Mail (PEM) was the first Internet standard to address security in messages. The MOSS protocol.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
CMPD273 Multimedia System Prepared by Nazrita Ibrahim © UNITEN2002 Multimedia System Characteristic Reference: F. Fluckiger: “Understanding networked multimedia,
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Chapter 15 Recording and Editing Sound. 2Practical PC 5 th Edition Chapter 15 Getting Started In this Chapter, you will learn: − How sound capability.
Outline Kinds of Coding Need for Compression Basic Types Taxonomy Performance Metrics.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
VOCODERS. Vocoders Speech Coding Systems Implemented in the transmitter for analysis of the voice signal Complex than waveform coders High economy in.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Chapter 1. SIGNAL PROCESSING:  Signal processing is concerned with the efficient and accurate extraction of information in a signal process.  Signal.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
A Partial Survey of the Perfect Digital Watermark Problem.
1 Speech Compression (after first coding) By Allam Mousa Department of Telecommunication Engineering An Najah University SP_3_Compression.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Welcome
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
DONE BY S.MURALIRAJAN M.NIRMAL
ONLINE SECURE DATA SERVICE
Digital Watermarking Lecture 2
Security in Wide Area Networks
Presentation transcript:

Multimedia Security Part I: Digital Watermarking Subrata Acharya CS 2310, Spring 2007

Digital Watermarking? Allows users to embed some data into digital contents Allows users to embed some data into digital contents When data is embedded, it is not written at header part but embedded directly into digital media itself by changing media contents data When data is embedded, it is not written at header part but embedded directly into digital media itself by changing media contents data

How It Works

Data Hiding

Types of Watermark Visible Visible A visible translucent image which is overlaid on the primary image A visible translucent image which is overlaid on the primary image Invisible Invisible An overlaid image which cannot be seen, but which can be detected algorithmically An overlaid image which cannot be seen, but which can be detected algorithmically

Visible Watermark Logo or seal of the organization which holds the rights to the primary image, it allows the primary image to be viewed, but still marks it clearly as the property of the owning organization. Logo or seal of the organization which holds the rights to the primary image, it allows the primary image to be viewed, but still marks it clearly as the property of the owning organization. Overlay the watermark in a way which makes it difficult to remove, if the goal of indicating property rights is to be achieved. Overlay the watermark in a way which makes it difficult to remove, if the goal of indicating property rights is to be achieved.

Visible Watermark

Invisible Watermark Embedding level is too small to notice Embedding level is too small to notice Can be retrieved by extraction software Can be retrieved by extraction software Applications: Applications: Authentication Authentication Copyrighting Copyrighting Etc… Etc…

Invisible Watermark

Embedding Techniques Spatial domain Spatial domain Original needed Original needed Original not needed Original not needed Frequency domain Frequency domain Original needed Original needed Original not needed Original not needed Spread domain Spread domain

Spatial Domain

Frequency Domain Watermarking signal to embed Watermarking signal to embed Host signal Host signal Frequency components Frequency components Embedding Embedding Extraction Extraction

Frequency Domain

Spread Spectrum

Applications of Watermarking Rights management Rights management Contents management Contents management Access/copy control Access/copy control Authentication Authentication

Features of Watermarking Invisible/Inaudible Invisible/Inaudible Information is embedded without digital content degradation, because of the level of embedding operation is too small for human to notice the change. Information is embedded without digital content degradation, because of the level of embedding operation is too small for human to notice the change. Inseparable Inseparable The embedded information can survive after some processing, compression and format transformation. The embedded information can survive after some processing, compression and format transformation. Unchanging data file size Unchanging data file size Data size of the media is not changed before and after embedding operation because information is embedded directly into the media. Data size of the media is not changed before and after embedding operation because information is embedded directly into the media.

Technical Requirements for Watermarking Invisibility CapacityRobustness

Digital Watermarking Alliance Represents applications and solutions for: Audio and Music Content Audio and Music Content Video, Movies and TV Content Video, Movies and TV Content Digital Imagery Digital Imagery Identity Documents Identity Documents Value Documents Value Documents

Digital Watermarking Alliance Members

Digital Watermarking Examples Copyright Communication Copyright Communication Copy Protection Copy Protection Monitoring Monitoring Filtering/Classification Filtering/Classification Authentication/Integrity Authentication/Integrity Product Serialization & Tracking Product Serialization & Tracking Asset/Content Management Asset/Content Management Rights Management Rights Management Remote Triggering Remote Triggering Linking/E-Commerce Linking/E-Commerce

Potential Usage Models and Benefits User Software Usage Models Detect Copyright DWM Detect Content ID Copyright Communication P2P systems only distribute non-copyright content Licensed Content P2P systems can resell copyrighted content with license agreements with content owners Enhanced Content P2P systems provide or sell media content information and related items

Copyright Digital Watermark Architecture Audio/Video Master Embed Copyright and Content ID DWM Content Owner Provider Index Database Location (Centralized or Distributed) User’s PC Rip Software Compressed Audio/Video File (e.g. MP3 file) User Software Detect Copyright and Content ID DWM for Secure and Enhanced content Rights & Info Database Content ID linked to rights, information and related content Can be used to address P2P and social network content Identification needs as well as providing identification of orphan works and access to metadata/networked information

Filtering & Classification Can support existing, established and/or new Classification Systems or content identifiers such as MPAA film ratings, ISAN or ad identification codes, etc. Can support existing, established and/or new Classification Systems or content identifiers such as MPAA film ratings, ISAN or ad identification codes, etc. Filtering can occur at the whole content level and/or at a more granular level identifying copyrighted, sensitive and/or questionable material for the given audience Filtering can occur at the whole content level and/or at a more granular level identifying copyrighted, sensitive and/or questionable material for the given audience May be key element of identifying copyrighted content to support legitimate P2P distribution May be key element of identifying copyrighted content to support legitimate P2P distribution  Copyrighted Non-Copyrighted Content Filter Access Legitimate Copy or License

Connected Content/Linking Captured CD e-logo links to web and music downloads DOWNLOAD  Ring tones  Buy tickets  Reviews  Tour dates  Samples  Band info Promoting & Facilitating M-Commerce Promoting & Facilitating M-Commerce Location based services Location based services Multimedia access Multimedia access Streaming audio Streaming audio Music Music Multimedia Multimedia Bookmarking Bookmarking

Digital Media Serialization & Tracking Protected for privacy Identifies content owners and rights while communicating copyright information Identifies content owners and rights while communicating copyright information Awareness of watermarked content by consumer creates deterrent against unauthorized copying and distribution Awareness of watermarked content by consumer creates deterrent against unauthorized copying and distribution Provides accurate identification of source of unauthorized content discovered on the Internet and/or physical media Provides accurate identification of source of unauthorized content discovered on the Internet and/or physical media (1) At Point of Distribution (2) At point of copying/re-distribution Recordable Media Embed Serial # (2) Embed Serial # (1) Content ID Retail Content Content Provider Track and take proper action Detect Serial Number

Multimedia Security Part II: Encryption Subrata Acharya CS 2310, Spring 2007

Goals Person authentication Person authentication Assurance that the communicating entity is the one claimed Assurance that the communicating entity is the one claimed Access control Access control Prevention of unauthorized use of a resource Prevention of unauthorized use of a resource Data confidentiality Data confidentiality Protection of data from unauthorized disclosure Protection of data from unauthorized disclosure Data integrity Data integrity Assurance that data received is as sent Assurance that data received is as sent Non-repudiation Non-repudiation Protection against denial by the parties in a communication Protection against denial by the parties in a communication

Multimedia Data What separates multimedia data from traditional alpha numeric data? Large in file size Large in file size May require real-time processing (especially for continuous media) May require real-time processing (especially for continuous media) Portable and mobile applications Portable and mobile applications

Multimedia Encryption Approach Signal scrambling Signal scrambling Historical approach Historical approach Not compatible with modern multimedia compression Not compatible with modern multimedia compression Fast speed but low security Fast speed but low security Total encryption with cryptographic ciphers Total encryption with cryptographic ciphers Trivial solution Trivial solution High security but slow speed High security but slow speed Selective encryption Selective encryption Most popular approach today Most popular approach today Limited in its range of application Limited in its range of application Integrating encryption into entropy coding Integrating encryption into entropy coding Complementary to selective encryption Complementary to selective encryption Very fast computation speed Very fast computation speed

Selective Encryption Select the most important coefficients and then encrypt them with traditional ciphers such as DES Select the most important coefficients and then encrypt them with traditional ciphers such as DES Advantages Advantages Lower complexity Lower complexity High security level provided by traditional cryptology High security level provided by traditional cryptology Less error correction coding redundancy Less error correction coding redundancy Compatible with existing software and hardware modules Compatible with existing software and hardware modules Media Compression System Coefficient Selection Cryptographic Cipher Error Correction Coding Digitized Audiovisual data Coefficients Selected Coefficients Non- selected Coefficients Transmission channel or storage media

Example: Selective Encryption for G Speech Coder ITU-T Recommendation G ITU-T Recommendation G A popular low bit rate speech codec A popular low bit rate speech codec Based on the human voice generation model Based on the human voice generation model Vocoder Vocoder Decoder synthesizes speech using the model Decoder synthesizes speech using the model LSP Decoder Pitch Decoder Excitation Decoder + Synthesis Filter Pitch Postfilter LSP Interpolator Formant Postfilter Gain Scaling Unit LSP codebook indices Lag of pitch predictors Gain vectors Fixed codebook gains and others Vocal Cord Excitation signal generation Vocal Tract Linear filter

Randomized Huffman Table Encryption A 0 1 B C D E F G A 0 1 B C D E F G 0 0 BADCAEFG Huffman code #0 Huffman code # isomorphic tree!

Multimedia Encryption with Randomized Entropy Coder Select a good PRBG Select a good PRBG Select an r-bit random seed s (encryption key) Select an r-bit random seed s (encryption key) Pseudo-random sequence output from PRBG(s) becomes the key hoping sequence (KHS) Pseudo-random sequence output from PRBG(s) becomes the key hoping sequence (KHS) Entropy Coder PRBG s KHS = … Input symbol …

Challenges Real time constraint Real time constraint Potential cost constraint Potential cost constraint Potential bit rate increase Potential bit rate increase Rate variation challenge Rate variation challenge Dynamic network conditions Dynamic network conditions Transcoding challenge Transcoding challenge

Conclusion Multimedia security relevance Multimedia security relevance Tradeoff approach based on application Tradeoff approach based on application Goal is the design of an Goal is the design of an efficient, efficient, secure and secure and cost effective technique for multimedia security using digital watermarking and encryption cost effective technique for multimedia security using digital watermarking and encryption

Thank you !!!