Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements ...

48
Thái Chí Minh Trần Lương Khiêm 1

Transcript of Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements ...

Page 1: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Thái Chí MinhTrần Lương Khiêm

1

Page 2: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Content

Introduction History Applications Requirements Techniques Attacks

2

Page 3: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Content

Introduction History Applications Requirements Techniques Attacks

3

Page 4: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Introduction

4

Page 5: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Introduction

5

Page 6: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Introduction

6

Page 7: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Introduction

Relation between embedded message and cover work

Goal and assumption

7

Page 8: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Content

Introduction History Applications Requirements Techniques Attacks

8

Page 9: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

History

Histiæus & the slave

Paper watermark, 1282

Banknote. 18th century

9

Page 10: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

History In 1954, Emil Hembrooke of the Muzak Corporation filed a patent for

watermarking” musical Works The first Information Hiding Workshop (IHW) ,which included digital

watermarking as one of its primary topics, was held in 1996

10

Page 11: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Content

Introduction History Applications Requirements Techniques Attacks

11

Page 12: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Applications

Broadcast monitoring Owner identification Proof of ownership Transaction tracking Content authentication Copy control

12

Page 13: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Broadcast monitoring

13

Page 14: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Owner identification

14

Page 15: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Proof of ownership

15

Page 16: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Transaction tracking

16

Page 17: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Transaction tracking

17

Page 18: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Content authentication

Digital signature is NOT enough

18

Page 19: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Content authentication

19

Page 20: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Copy control

Cryptography is NOT enough

20

Page 21: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Copy control

21

Page 22: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Content

Introduction History Applications Requirements Techniques Attacks

22

Page 23: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Requirements

Perceptual Transparency Robustness Data payload With / Without originals Security

23

Page 24: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Perceptual Transparency

24

Page 25: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Robustness

Fragile Semi-fragile Robust

25

Page 26: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Data payload

Data payload refers to the number of bits a watermark encodes within a unit of time or within a Work

Different applications may require very different data payloads

26

Page 27: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

With / Without originals

Non-blind watermarkingType I

Type II

Semi-blind watermarking

Blind watermarking

27

Page 28: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Security

28

Page 29: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

The mutual dependencies among the elements

29

Page 30: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Content

Introduction History Applications Requirements Techniques Attacks

30

Page 31: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Techniques

LSB Spread spectrum Applying on Vietnamese documents

31

Page 32: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Techniques

32

Page 33: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Techniques

There are many techniques to do watermarking in digital things:Spatial domain watermarking: LSB, in text

data, …Transform domain watermarking: frequency-

based watermarking, wavelet based watermarking○ Embedding the watermark in the transform

domain from carrier object (using DCT, DFT, DWT, …)

33

Page 34: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Techniques

LSB:Embedding:

○ Choosing some representation values (e.g pixels) of carrier object.

○ Embed the bits of message (watermark) to LSBs of representation valueMessage ‘A’: 100 0001Carrier object: RGB (2 bits)

100000 010101 101100

010001 100001 000100

101110 011010 111000

34

Page 35: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Techniques

LSB:Embedding:

○ Choosing some representation values (e.g pixels) of carrier object.

○ Embed the bits of message (watermark) to LSBs of representation valueMessage ‘A’: 100 0001Carrier object: RGB (2 bits)

100001 010100 101100

010000 100001 000100

101111 011010 111000

35

Page 36: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Techniques

LSB:Detector:

○ Retrieve the watermark by having the knowledge of the representation values (e.g pixels) used for embedding individuals bits

36

Page 37: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Techniques

Spread spectrumUsing frequency domain transform to

convert the input image into another domain and embedding the watermark to this domain.

37

Page 38: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Techniques

• Apply on Vietnamese documents

38

Page 39: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Techniques

• Apply on Vietnamese documents

39

Page 40: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Techniques

• Apply on Vietnamese documents○ Besides, we can use some methods:

Vertically shifting text lines Horrizontally shifting words

40

Page 41: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Content

Introduction History Applications Requirements Techniques Attacks

41

Page 42: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Attacks

From processing From attackers

42

Page 43: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Attacks

The actions take effect on the watermark embedded in carrier objects.Affects:

○ Destroying the watermark or modifying the watermark with new wrong information.

○ Removing the watermark entirely.But: not degrading the quality of carrier

objects (image, audio, video)Relating to a requirements of watermarking:

Robustness

43

Page 44: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Attacks Classification:

From proscessing carrier objects○ Common signal processing: digital-to-analog and

analog-to-digital conversion, or change image contrast, color, JPEG compression, …

○ Common geometric distortions: scaling, rotating, cropping, dithering …

From attacker○ Mosaic○ Collusion attacks: get the watermark or remove

watermarks entirely to get the original work.○ …

44

Page 45: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Attacks

45

Page 46: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

AttacksMosaic attack

46

Page 47: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

Attacks How to protect watermarks from attacks

Understanding and applying new researchs in watermarking

Using StirMark Benchmark evaluation engine to evaluate your watermarking scheme○ “All vendors of digital watermarks have their

products benchmarked by Stirmark and as of August 2001, no watermark from any vendor survives the test, ie: the watermarks are all removed without degradation to image quality occurring. “

47

Page 48: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.

48