Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books:...

24
Fundamentals of Watermarking and Data Hiding Pierre Moulin University of Illinois at Urbana–Champaign Dept of Electrical and Computer Engineering [email protected] July 9, 2006 ISIT Tutorial, Seattle c 2006 by Pierre Moulin. All rights reserved. 1

Transcript of Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books:...

Page 1: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

Fundamentals of Watermarking and Data Hiding

Pierre Moulin

University of Illinois at Urbana–ChampaignDept of Electrical and Computer Engineering

[email protected]

July 9, 2006 ISIT Tutorial, Seattle

c©2006 by Pierre Moulin. All rights reserved.

1

Page 2: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

Outline

1. Overview

2. Basic Techniques

3. Binning Schemes and QIM Codes

4. Performance Analysis: Error Probabilities

5. Performance Analysis: Capacity

6. Applications to Images & Advanced Topics

2

Page 3: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

SESSION 1: OVERVIEW

• Data hiding, watermarking, steganography

• Basic properties: fidelity, payload, robustness, security

3

Page 4: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

Some Reading

• Books:

Digital Watermarking, by I. Cox, M. Miller, J. Bloom,Morgan-Kaufmann, 2002

Information Hiding Techniques for Steganography and DigitalWatermarking, by S. Katzenbeisser and F. Petitcolas, Eds.,Artech House, 2000

Information Hiding: Steganography and Watermarking,by N. Johnson, Z. Duric and S. Jajodia, Kluwer, 2000

4

Page 5: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

• New IEEE Transactions on Information Forensics and Security(quarterly, inaugural issue in March 2006)

• Special issues of various IEEE journals, 1999 – 2005

• Annual Information Hiding Workshops

• Watermarking newsletter: www.watermarkingworld.org

• www.ifp.uiuc.edu/˜moulin

• Tutorial paper “Data Hiding Codes” by P. Moulin andR. Koetter, Proceedings IEEE, December 2005.

5

Page 6: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

Multimedia Security

• Dissemination of digital documents

• Owner identification

• Forgery detection

• Identification of illegal copies

• Intellectual protection

6

Page 7: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

Authentication

7

Page 8: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

8

Page 9: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

Media Elements

• Audio

• Images

• Video

• Graphics

• Documents

• Computer programs

9

Page 10: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

Nonadversarial Applications

• Database annotation

• Information embedding, e.g., audio in images, text in hostsignals (movie subtitles, financial data, synchronization signals)

10

Page 11: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

Data Hiding

• Embed data in covertext (high payload)

• Perceptual similarity requirement

• Multimedia database management

• Covert communications (military, spies, etc.)

• Steganography (στεγανω γραφω, covert writing):conceal existence of hidden message

11

Page 12: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

Watermarking

• Hide a few bits of information

• Original and modified signals should be perceptually similar

• Application to digital cameras, TV, DVD video, audio

• Authentication

• Transaction tracking

• Broadcast monitoring

12

Page 13: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

Fingerprinting

• Fingerprinter marks several copies of original and distributescopies to users 1, 2, · · · , L

• Each mark is different

• Users may collude to “remove” watermarks

• Applications: copy control, traitor tracing

13

Page 14: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

Summary of Applications

Applications

Watermarking authentication, copyright protection

Data hiding covert communications, database annotation,

information embedding

Steganography covert communications

Fingerprinting copy control, traitor tracing

14

Page 15: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

A Brief History

• Tattoo hidden message on head of slave (ancient Greeks)

• Invisible ink

• Secret point patterns

• Watermarks in paper (Italy, 13th century)

• Digital watermarking: early 1990’s

• Standardization attempts:SDMI (music), ISO (MPEG video)

15

Page 16: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

Hiding Data in Images

secretkey k

Encoderoriginal image S watermarked image X

Picture taken by Alice on January 1, 2000. This messageis going to be embedded foreverin this picture. I challenge youto remove the message withoutsubstantially altering the picture.

1001001101001110100...............101

binary representation

Decoder

Picture taken by Alice on January 1, 2000. This messageis going to be embedded foreverin this picture. I challenge youto remove the message withoutsubstantially altering the picture.

Decoded message

1001001101001110100...............101

Decoded binarymessage

secret key k

Attack

Pirate

11011000...01

16

Page 17: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

Decoder’s Task

17

Page 18: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

Attacks on Images

Original JPEG, QF=10 4× 4 median filtering

Gaussian filter (σ = 3) Rotated by 10 degrees Random bend

18

Page 19: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

Basic Properties

• Fidelity (in terms of signal distortion metric)

• Payload (number of transmitted bits)

• Robustness (against adversary)

• Security (cryptanalysis of randomized code)

• Detectability (by steganalyzers/eavesdroppers)

19

Page 20: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

System Issues

• System complexity

• Does decoder know host signal?(public vs private watermarking)

• Security level?

• Reliance on private or public cryptographic system?

20

Page 21: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

Attack Models

• No attack

• Deterministic attacks (reversible & irreversible)

• Stochastic attacks (memoryless & stationary)

• Code breaking

• System attacks (e.g., ambiguity, sensitivity & scrambling)

• Benchmarking (e.g., Stirmark)

21

Page 22: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

Attacks

Attack Type Examples

Memoryless independent noise,

random pixel replacement

Blockwise memoryless JPEG compression

Attacks with stationary noise,

”statistical regularity” spatially invariant filtering,

some estimation attacks

Deterministic compression, format changes

Arbitrary attacks cropping, permutations,

desynchronization,

nonstationary noise

22

Page 23: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

Basic Theoretical Concepts

• Information theory

• Game theory

• Detection and estimation theory

• Coding theory

• Cryptography

23

Page 24: Fundamentals of Watermarking and Data Hidingmoulin/isit06/isit1.pdf · Some Reading † Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information

Purposes of an Information-Theoretic Approach

• make appropriate simplifying assumptions to understandfundamental limits of IH and optimally design algorithms

• provide new insights into IH

• provide a precise framework for evaluating any IH algorithm

• develop approach that generalizes easily to related problems

Caution: cost of mismodeling may be severe in game withopponent!

24