Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking,...
-
Upload
amanda-joseph -
Category
Documents
-
view
216 -
download
1
Transcript of Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking,...
![Page 1: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/1.jpg)
Digital Watermarking for Multimedia Security
R. Chandramouli
MSyNC:Multimedia Systems, Networking, and Communications Lab
Stevens Institute of Technology
![Page 2: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/2.jpg)
Encoding
LSB (Least Significant Bit) Modification MSB ( Most Significant Bit) Modification
Eg : 11010010
LSBMSB
![Page 3: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/3.jpg)
Example:LSB Encoding
Original Image Watermark
![Page 4: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/4.jpg)
Replace 4 and 7 LSBs of Original
4 LSBs Watermarked 7 LSBs Watermarked
![Page 5: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/5.jpg)
What is a Watermark?
A watermark is a “secret message” that is embedded into a “cover (original or host) message”.
Only the knowledge of a secret key allows us to extract the watermark from the cover message.
Effectiveness of a watermarking algorithm is a function of its» Resilience to attacks.» Capacity.» Stealth.
![Page 6: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/6.jpg)
What Can Be Watermarked?
Multimedia data.» Video.» Audio.» Still Images.» Documents.
Software. Hardware designs.
![Page 7: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/7.jpg)
Multimedia Watermarks
A digital watermark is a “secret key dependent” signal “inserted” into digital multimedia data.
Watermark can be later detected/extracted in order to make an assertion about the data.
A digital watermark can be.» Visible (perceptible).» Invisible (imperceptible).
![Page 8: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/8.jpg)
Watermark Applications
Proof of ownership.» Prove ownership in a court of law.» Simple copyright notice may not help for digital
multimedia data. Easily destroyed. Copy prevention or control.
» Recording device may inhibit recording a signal if detected watermark indicates that it is prohibited.
» DVD video and digital music distribution. Content protection (visible watermarks).
» Destruction of watermark destroys the content.
![Page 9: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/9.jpg)
Watermark Applications
Authentication.» Detect if image/video has been altered.» Digital cameras.
Media Bridging.» Bridge media such as magazines and the Internet.» Digimarc.
Broadcast Monitoring.» Keep track of when and where an advertisement is
played.» ConfirMedia from Verance.
![Page 10: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/10.jpg)
Watermark Applications
Fingerprinting.» Identify the source of an illegal copy.» Unique watermark embedded in each copy.» DiVX, a modified version of DVD.
Secret Communications.» Hide information such that general public do not
know its presence.» Bin Laden hides attack plans in images on the
web – USA Today, Feb. 26, 2001.
![Page 11: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/11.jpg)
Requirements
Requirements vary with application. For example:» Perceptually transparent - must not perceptually
degrade original content.» Robust - survive accidental or malicious attempts
at removal.» Oblivious or Non-oblivious - Recoverable with or
without access to original.» Capacity – Number of watermark bits embedded.» Efficient encoding and/or decoding.
![Page 12: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/12.jpg)
Contradicting Requirements
Perceptual Transparency
Oblivious vs. Non-Oblivious
RobustnessPayload Security
![Page 13: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/13.jpg)
Example: Additive Watermarks
W(x,y): Pseudo Random Pattern {-1,0,1}
kMultiply by gain
factork
I(x,y) IW(x,y)
IW(x,y)= I(x,y)+ k W(x,y)
W(x,y) detected T
' ( , ) ( , )WI x y W x yR T
No W(x,y) detected
![Page 14: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/14.jpg)
fh
fv
Additive watermarks in transform domain: Spread
Spectrum
![Page 15: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/15.jpg)
Watermark Attacks
Active Attacks.» Hacker attempts to remove or destroy the
watermark.» Watermark detector unable to detect watermark.» Key issue in proof of ownership, fingerprinting,
copy control.» Not serious for authentication or covert
communication.
![Page 16: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/16.jpg)
Watermark Attacks
Passive Attacks.» Hacker tries to find if a watermark is present.» Removal of watermark is not an aim.» Serious for covert communications.
Collusion Attacks.» Hacker uses several copies of watermarked data
(images, video etc.) to construct a copy with no watermark.
» Uses several copies to find the watermark.» Serious for fingerprinting applications.
![Page 17: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/17.jpg)
Watermark Attacks
Forgery Attacks.» Hacker tries to embed a valid watermark.» Serious in authentication.» If hacker embeds a valid authentication
watermark, watermark detector can accept bogus or modified media.
![Page 18: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/18.jpg)
Example: Forging Photo I.D.
Bad Forgery!
Millionaire with Swiss bank
account
Assistant Professor
Thanks
Hong Man, for this picture!
![Page 19: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/19.jpg)
Content-based Watermarking
Original Watermark
![Page 20: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/20.jpg)
JPEG Compression Attack
![Page 21: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/21.jpg)
Watermarking Research
Information Theoretic Issues.» Compute “watermarking capacity”» How many watermark bits can be hidden in a
watermark channel ?» Capacity when multiple watermarks are used.
Decision Theoretic Issues.» Robust watermark detector.» Quickest possible watermark detection.» Invariant to statistical uncertainties.» Achieves desired false alarm and detection
probabilities.
![Page 22: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/22.jpg)
Watermarking Research Signal Processing Issues.
» What transforms to use ? – wavelet, DCT etc.» Geometric invariant transform – scale, translation, and
rotation invariance. Watermarking protocols and system issues.
» Protocol used by sender and receiver for secure transmission.
Steganalysis.» How to analyze multimedia data for the presence of
watermark(s).» Secure Digital Music Initiative (SDMI) has been hacked!
![Page 23: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/23.jpg)
Robust Watermarking Techniques - A
Communications Framework
+
Media Carrier
HVS
Watermark
Media Carrier
Noise/Attack Channel
Water-
mark
Coding and
Modulation
Decoding and
DemodulationX
![Page 24: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/24.jpg)
Techniques Developed at MSyNC Lab
(some results are in collaboration with Iowa State U. and Polytechnic U.)
![Page 25: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/25.jpg)
Information Theoretic Formulation
A new watermark channel model.» Multiplicative and additive attacks.» Models geometric attacks (“killer” attack).
Attack parameters assumed imperfectly known. Lower and upper bounds on watermarking
capacity. Many current capacity estimates are specific
cases of proposed estimates. Capacity in the presence of multiple
watermarks using multiuser information theory.
![Page 26: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/26.jpg)
Multiple Description Watermarking
A new framework for watermarking using multiple description codes.» Partition the source into multiple descriptions.» Each description carries enough information.» Allocate watermarking bits to descriptions subject
to distortion constraints.» Experiments for secure wireless media
transmission is promising.
Rate-distortion theory formulation.
![Page 27: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/27.jpg)
Decision Theoretic Formulation
How many pixels to watermark ?» A new measure for watermarking capacity.» Different from standard information theoretic
formulation.» Perhaps a more practical measure.
Fast watermark detector.» Computation reduction.» Useful for hardware implementation.
![Page 28: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/28.jpg)
Steganalysis
A distributed detection framework for analyzing images for presence of watermarks.
Theoretical formulation and practical algorithm for steganalysis of LSB based image watermarking.
A new watermarking capacity measure called “steganographic capacity”.
![Page 29: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/29.jpg)
Projected Applications of Proposed Techniques
Secure media streaming. Wireless multimedia security. Watermark error resilience coding. Error concealment for wireless multimedia
transmission. Refer to
» http://www.ece.stevens-tech.edu/~mouli/msync/index.html
![Page 30: Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.](https://reader035.fdocuments.us/reader035/viewer/2022062714/56649d215503460f949f6493/html5/thumbnails/30.jpg)
Million Dollar Question
Watermarking or Encryption or Combination?