EE 6886: Topics in Signal Processing -- Multimedia Security System Lecture I: Introduction Ching-Yung Lin Columbia University New York, NY 10027, USA 1/18/2006 | Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. © 2006 Columbia University E 6886 Topics in Signal Processing: Multimedia Security Systems Course Outline Multimedia Security : Multimedia Standards – Ubiquitous MM Encryption and Key Management – Confidential MM Watermarking – Uninfringible MM Authentication – Trustworthy MM Security Applications of Multimedia: Audio-Visual Person Identification – Access Control, Identifying Suspects Surveillance Applications – Abnormality Detection Media Sensor Networks – Event Understanding, Information Aggregation 2 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 1 E 6886 Topics in Signal Processing: Multimedia Security Systems About this course Instructor: Ching-Yung Lin Email: cylin@ee.columbia.edu Office Hour: Wednesday 6:40 – 7:10 pm, Mudd 1312, or by appointment Course Webpage: http://www.ee.columbia.edu/~cylin/course/mss/ Course Time: Wednesday 4:10 – 6:40 pm Course Format: Lecture 100 – 120 mins + Presentation/Discussion 20 – 40 mins Location: Mudd 535 TA: TBD TA Office Hour: TBD Grading: 3 homeworks: 50%, final project: 50% 3 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. E 6886 Topics in Signal Processing: Multimedia Security Systems Homeworks HW #1: Image compression and encryption experiments. HW #2: Video watermarking experiments HW #3: Audio speaker authentication experiments Software Requirements: C, C++, Java, Matlab, or others Hardware Requirements: Windows, Unix/Linux or Mac 4 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 2 E 6886 Topics in Signal Processing: Multimedia Security Systems Final Project Team work is encouraged (1 – 3 students) Implement components of multimedia security systems or surveys of emerging technologies Oral presentations at the mid-term project proposal and the final presentation. Final project report due at the end of semester. © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 1/18/06: Lecture 1 -- Introduction 5 E 6886 Topics in Signal Processing: Multimedia Security Systems Examples of Final Project Topic Digital Rights Management in Mobile Environment Steganography and steganoanalysis Multimedia Forensics Human Vision Systems – implementations and experiments Art authentication Types of paintings: modern, abstract, impression, etc. Tampering detection, Natural / CG detection Face recognition in videos Fingerprint recognition Human behavior authentication: Keyboard Email records Event detection from camera(s) Audio/Visual Sensor Network 6 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 3 E 6886 Topics in Signal Processing: Multimedia Security Systems Outline -- Introduction Multimedia Security : Multimedia Standards – Ubiquitous MM Encryption and Key Management – Confidential MM Watermarking – Uninfringible MM Authentication – Trustworthy MM Security Applications of Multimedia: Audio-Visual Person Identification – Access Control, Identifying Suspects Surveillance Applications – Abnormality Detection Media Sensor Networks – Event Understanding, Information Aggregation © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 1/18/06: Lecture 1 -- Introduction 7 E 6886 Topics in Signal Processing: Multimedia Security Systems Multimedia Standards: Towards Knowledge Management and Transaction Enrichment for Digital Media Signals Signals Features Features Semantics Semantics Knowledge Knowledge Near future Recent past Applications MPEG-1,-2,-4 Video storage Broadband Streaming video delivery MPEG-4,-7 Content-based retrieval Multimedia filtering Content adaptation Compression Coding Communications Similarity searching Object- and featurebased coding MPEG-7 Semantic-based retrieval and filtering Enterprise content mgmt. MPEG-21 E-commerce of Electronic content Digital items Problems and Innovations MPEG Modeling and classification Personalization and summarization Media mining Decision support IPMP (rights) - 1, - 2 MPEG -4 MPEG - 7 MPEG 8 1/18/06: Lecture 1 -- Introduction - 21 © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 4 E 6886 Topics in Signal Processing: Multimedia Security Systems MPEG-1,2 Overview I B B P B B P B B P B B I Intraframe: I frames Interframe: P and B frames MPEG-1: 352x240 or 352x264 – for VCD MPEG-2: (1) multiple resolutions, e.g., 1024x768 – for compatibility with TV. (2) field-based compression MPEG-1 Audio Layer 3 – MP3 9 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. E 6886 Topics in Signal Processing: Multimedia Security Systems MPEG-4 Overview Object-based compression --- x Low-bit rate coding for mobile applications Natural-Synthetic hybrid compression --- x The latest MPEG-4 standard: H.264/AVC 10 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 5 E 6886 Topics in Signal Processing: Multimedia Security Systems MPEG-7 Overview XML Metadata for Multimedia Content Description Compression Coding MPEG-1,-2,-4 Management Filtering Transmission Retrieval Streaming MPEG-7 Normative elements: Acquisition Authoring Editing Descriptors and Description Schemes DDL for defining Description Schemes Extensible for application domains MPEG-7 Standard DDL DS DS MPEG-7 Searching Indexing D Browsing Navigation DS D Time Axis Segment Tree Shot1 Shot2 D D Application domain D Event Tree i.e., Medical imaging Remotesensing images Surveillance video Computer animations and graphics Shot3 Rich, highly granular descriptions: Segment 1 • Introduction Sub-segment 1 • Summary Sub-segment 2 • Program logo • Studio Sub-segment 3 Video segments, moving regions, shots, frames, … Audio-visual features: color, texture, shape, … Semantics: people, events, objects, scenes, … • Overview Sub-segment 4 • News Presenter segment 2 • News Items • International Segment 3 • Clinton Case • Pope in Cuba Segment 4 • National Segment 5 • Twins • Sports Segment 6 • Closing Reference Region Reference Region Reference Region Motion Motion Motion Segment 7 © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 1/18/06: Lecture 1 -- Introduction 11 E 6886 Topics in Signal Processing: Multimedia Security Systems MPEG-21 Multimedia Framework “Transactions of Digital Items” Users and participants in the content value chain seamlessly exchange content in form of “digital items” across networks and devices Framework supporting all forms of electronic content/intellectual property (video, music, learning objects, on-line reports, etc.) Digital Item = bundling of: Essence (i.e., media resources) Metadata Rights expressions Identifiers Example: Digital music package Descriptor text/xml MPEG-7 Creation Information Item Descriptor text/plain Music package (one song plus two photos) Item music.mp3 Item photo1.jpg Item photo2.jpg 12 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 6 E 6886 Topics in Signal Processing: Multimedia Security Systems Types of Security Computer Security Protect data on a computer Network Security Multimedia Security Protect data during transmission Content Security Protect intellectual property Provide Trustworthiness COMPUTER SECURITY + + NETWORK SECURITY CONTENT SECURITY Courtesy of Prof. Kundur, Texas A&M 1/18/06: Lecture 1 -- Introduction 13 © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. E 6886 Topics in Signal Processing: Multimedia Security Systems Multimedia Security Content Provider N N N 14 ??? Content Receiver Data Authentication: -- assure the credibility of multimedia content. Confidentiality: -- secure content transmission privacy. Copy Control: -- protect multimedia data from illegal distribution and theft. 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 7 E 6886 Topics in Signal Processing: Multimedia Security Systems Digital Rights Management (DRM) System Definition (from Iannella, 2001) Digital Rights Management (DRM) involves the description, identification, trading, protection, monitoring, and tracking of all forms of rights usages over both tangible and intangible assets – both in physical and digital form – including management of Rights Holders relationships. Digital management of use rights to content Links specific user rights to media to control access, viewing, duplication, and sharing. Ideally, balances information protection, usability, and cost to provide a beneficial environment for all parties involved. 15 © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 1/18/06: Lecture 1 -- Introduction E 6886 Topics in Signal Processing: Multimedia Security Systems An Example of Digital Rights Management System Creator Creation Unique Number Creation Description Unique Unique? Number Issuer Creation Provider Value As Va si g lu nm e en to fR ig ht s Rights Holder IMPRIMATUR DRM Model 16 1/18/06: Lecture 1 -- Introduction Certification Authority ck he C ID of Creation D M Check P identity Media Distributor ce lue cen e Va or li nc f i ce l. L p l Ap na itio nd o C IPR data C au he th ck or isa MD tio n Value T & Cs of use Creation R IP Purchaser Lo g fo In Monitoring Service Provider IPR Database Log © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 8 E 6886 Topics in Signal Processing: Multimedia Security Systems Multiple Aspects of DRM Technical Enforcement by engineering mechanisms/systems Business Commercially viable products/services Social User privacy, limits on user behavior, etc. Legal Enforcement by legislation 17 © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 1/18/06: Lecture 1 -- Introduction E 6886 Topics in Signal Processing: Multimedia Security Systems Outline -- Introduction Multimedia Security : Multimedia Standards – Ubiquitous MM Encryption and Key Management – Confidential MM Watermarking – Uninfringible MM Authentication – Trustworthy MM Security Applications of Multimedia: Audio-Visual Person Identification – Access Control, Identifying Suspects Surveillance Applications – Abnormality Detection Media Sensor Networks – Event Understanding, Information Aggregation 18 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 9 E 6886 Topics in Signal Processing: Multimedia Security Systems Security Services (X.800) Person Authentication Assurance that communicating entity is the one claimed Access Control Prevention of unauthorized use of a resource Data Confidentiality Protection of data from unauthorized disclosure Data Integrity Assurance that data received is as sent Non-Repudiation Protection against denial by the parties in a communication 19 © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 1/18/06: Lecture 1 -- Introduction E 6886 Topics in Signal Processing: Multimedia Security Systems Confidentiality Encryption Real-time requirements Integration with compression EAVESDROPPING Courtesy of Prof. Kundur, Texas A&M 20 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 10 E 6886 Topics in Signal Processing: Multimedia Security Systems Access Control Encryption Authentication Query??? Courtesy of Prof. Kundur, Texas A&M 21 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. E 6886 Topics in Signal Processing: Multimedia Security Systems Revocation Early detection and reaction Courtesy of Prof. Kundur, Texas A&M 22 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 11 E 6886 Topics in Signal Processing: Multimedia Security Systems Conventional Encryption Algorithms Data Encryption Standard (DES) The most widely used encryption scheme DES is a block cipher – the plaintext is processed in 64-bit blocks The key is 56-bits in length Based on Feistel Cipher Structure Triple DES Effective key length of 112/168 bits Advanced Encryption Standard (AES) 128-bit data, 128/192/256-bit keys Stronger & faster than Triple-DES Public key encryption: asymmetric key key key plaintext 23 plaintext ciphertext © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 1/18/06: Lecture 1 -- Introduction E 6886 Topics in Signal Processing: Multimedia Security Systems Outline -- Introduction Multimedia Security : Multimedia Standards – Ubiquitous MM Encryption and Key Management – Confidential MM Watermarking – Uninfringible MM Authentication – Trustworthy MM Security Applications of Multimedia: Audio-Visual Person Identification – Access Control, Identifying Suspects Surveillance Applications – Abnormality Detection Media Sensor Networks – Event Understanding, Information Aggregation 24 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 12 E 6886 Topics in Signal Processing: Multimedia Security Systems Piracy Protection Compliant Players Courtesy of Prof. Kundur, Texas A&M 25 © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 1/18/06: Lecture 1 -- Introduction E 6886 Topics in Signal Processing: Multimedia Security Systems Copyright Protection and Copy Control Scramble Tx Rx Descramble VCR Because of content-preserving transcoding: Ownership Identification, Copy Control have to survive multi-stage transcoding Use robust watermarking 26 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 13 E 6886 Topics in Signal Processing: Multimedia Security Systems Watermarking • Embedding Visible/Invisible Codes in Multimedia Data for (or not for) Security Purpose PIL or content- based feature codes Tx Verify the watermark Watermark 27 1/18/06: Lecture 1 -- Introduction Rx © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. E 6886 Topics in Signal Processing: Multimedia Security Systems Visible Watermark Purpose: Claim the ownership and prevent content piracy. Properties: Robust: Watermarks must be very difficult, if not impossible, to be removed. Non-obtrusive: Watermarks must not affect the audiovisual contents too much. 28 Visible: It must be visible, but it had better to be insensible. 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 14 E 6886 Topics in Signal Processing: Multimedia Security Systems Visible Watermark Example Description: ♦ Robustness: Pixel brightness were altered pixel by pixel. Depending on the brightness of each mask pixel, if it is larger than a threshold, then we add a value to the corresponding pixel of the original image to make it brighter. Otherwise, if it is smaller than a threshold, then we subtract a value to make the corresponding pixel darker. – – – Randomly set the adjustment factor. Randomly locate the mask. The mask pixels may depend on the image contents. Alternation Function: Watermark mask 29 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. E 6886 Topics in Signal Processing: Multimedia Security Systems Invisible Watermark Purpose: Protect ownership and trace illegal use. Properties -- Transmit a bitstream through a very noisy channel, i.e. the original picture. Robust: The watermark must be very difficult, if not impossible, to remove. It must be able to survive manipulations to the images, such as: lossy compression, format transformation, shifting, scaling, cropping, quantization, filtering, xeroxing, printing, and scanning. Invisible: The watermark should not visually affect the image/video content. 30 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 15 E 6886 Topics in Signal Processing: Multimedia Security Systems What is Watermarking ? – Multimedia as a Communication Channel Basic communication system: Information W Decoder W Analog Communication - Channel Encoder Encoder/ Decoder: Amplitude Modulation (AM), Frequency Modulation (FM). Multiplexing: use different carrier frequencies. Channel: air, wire, water, space, … Watermarking: Information W Encoder Decoder W Image/Video/Audio © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 1/18/06: Lecture 1 -- Introduction 31 E 6886 Topics in Signal Processing: Multimedia Security Systems Watermarking -- Multimedia as Communication Channel X ≤P Sw Sw Encoder W Decoder W Information S Perceptual Model Distortion Model Z ≤N Private/ Public S: Source Image (Side Information) W: Embedded Information X: Watermark (Power Constraint: P) Z: Noise (Power Constraint: N ) Source Image Encoder may include two stages: Coding and Modulation. Coding: Error Correction Codes, Scrambling (use cryptographic keys). Modulation: Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Code Division Multiple Access (CDMA). Spread Spectrum is a CDMA technique, which needs modulation keys for Frequency Hopping or other specific codes. 32 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 16 E 6886 Topics in Signal Processing: Multimedia Security Systems Example: Watermark surviving Print-and-Scan Original Image [384x256] Watermarked Image, PSNR 43.8dB, ρ=0.84, Z=7.02 After PS, Crop to 360x240 & JPEG CR: 95:1 => ρ=0.64, Z=4.30 After Print & Scan, Crop to 402x266 => ρ=0.80, Z=6.46 33 © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 1/18/06: Lecture 1 -- Introduction E 6886 Topics in Signal Processing: Multimedia Security Systems Example: IBM Digital Music Content Platform Project •Automatic generation of cue sheets using audio watermarking •Secure and easy distribution of music content •Japanese government funding the project •Cooperation by popular FM radio stations and major Japanese labels FM Radio Broadcast Host Audio Stream ThinkPad Audio-in Content Authoring (Watermark Embedding) AD Conversion Audio-out Real-time Watermark Embedder Watermarked Audio Stream Broadcast Monitoring (Watermark Detection) DA Conversion Monitoring Center 34 1/18/06: Lecture 1 -- Introduction Content ID © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 17 E 6886 Topics in Signal Processing: Multimedia Security Systems DMCP Audio Data Hiding Performance Data Payload Standard Version : 72bit/30second (for STEP and DMCP) Short Window Detection : 27bit/2-5second Benchmarking: STEP – JASRAC (Japan), BIEM, CISAC (France) Robustness: Analogue Conversion Down-mixing (2ch->1ch) Time scaling (10%) Pitch shifting (10%) Down-sampling (16kHz) ATRAC3 compression MP3 compression (96kbps) AAC compression 128kbps ATRAC compression RealAudio compression (64kbps) Windows Media Audio compression (64kbps) Dynamic range compression FM broadcast AM broadcast PCM broadcast Noise addition (-30dB) Acoustic Quality DVD-Audio quality Psycho-acoustic model Joint evaluation test at a Audio device maker’s DVD-Audio studio in 2000 Reliability Controllable false alarm rate (e.g. 10-5-10-12) Low bit error rate achieved through built-in Error Correcting Code 35 © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 1/18/06: Lecture 1 -- Introduction E 6886 Topics in Signal Processing: Multimedia Security Systems Outline -- Introduction Multimedia Security : Multimedia Standards – Ubiquitous MM Encryption and Key Management – Confidential MM Watermarking – Uninfringible MM Authentication – Trustworthy MM Security Applications of Multimedia: Audio-Visual Person Identification – Access Control, Identifying Suspects Surveillance Applications – Abnormality Detection Media Sensor Networks – Event Understanding, Information Aggregation 36 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 18 E 6886 Topics in Signal Processing: Multimedia Security Systems A Photographer’s Shot President Clinton and First Lady strolled in the White House 37 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. E 6886 Topics in Signal Processing: Multimedia Security Systems Somebody Manipulates It…. Another proof of their relationship ??? 38 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 19 E 6886 Topics in Signal Processing: Multimedia Security Systems Hillary’s Revenge??? Hillary and Ching-Yung walked together??? 39 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. E 6886 Topics in Signal Processing: Multimedia Security Systems Integrity Hash Functions Traditional approaches sensitive to format conversion and minor bit changes Existing software tools enable seamless tampering TAMPERING Courtesy of Prof. Kundur, Texas A&M 40 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 20 E 6886 Topics in Signal Processing: Multimedia Security Systems Person Authentication Digital signatures Biometrics IMPERSONATION Courtesy of Prof. Kundur, Texas A&M 41 © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 1/18/06: Lecture 1 -- Introduction E 6886 Topics in Signal Processing: Multimedia Security Systems Nonrepudiation Digital certificates Biometrics Courtesy of Prof. Kundur, Texas A&M 42 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 21 E 6886 Topics in Signal Processing: Multimedia Security Systems (Robust) Digital Signature Digital Signature, Diffie and Hellman (1976). Verify the data integrity which is endorsed by the signer. Trustworthy Digital Camera, Friedman (1993). Non-Repudiation Signature to prove reality Content-Based Digital Signature, Schneider, Lin, Chang (1996, 1997) Using content-related feature codes instead of the hash values. Image Private Key Encrypted Hash Feature Codes Extraction Digital Camera Digital Signature Digital Image Public Key Decrypted Digital Signature Digital Image Comparator Feature Hash Codes Extraction Result Image Authenticator 43 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. E 6886 Topics in Signal Processing: Multimedia Security Systems Self Authentication-and-Recovery Images (SARI) add watermark watermarked SARI image original image manipulation authentication authentication & recovery image after crop-and-replacement and JPEG lossy compression 44 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 22 E 6886 Topics in Signal Processing: Multimedia Security Systems Other Applications Semantic Authentication Image/Document Forensics Who is the actual author of a picture or a novel? Is the media data manipulated? 45 © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 1/18/06: Lecture 1 -- Introduction E 6886 Topics in Signal Processing: Multimedia Security Systems Outline -- Introduction Multimedia Security : Multimedia Standards – Ubiquitous MM Encryption and Key Management – Confidential MM Watermarking – Uninfringible MM Authentication – Trustworthy MM Security Applications of Multimedia: Audio-Visual Person Identification – Access Control, Identifying Suspects Surveillance Applications – Abnormality Detection Media Sensor Networks – Event Understanding, Information Aggregation 46 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 23 E 6886 Topics in Signal Processing: Multimedia Security Systems Biometric Features for Person Authentication 47 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. E 6886 Topics in Signal Processing: Multimedia Security Systems Example: Fingerprint-based Authentication Fingerprint Match Fingerprint minutiae 48 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 24 E 6886 Topics in Signal Processing: Multimedia Security Systems Speaker Recognition Speaker Verification and Speaker Identification: IBM system Basic Model Unit Speech Signal Feature Extraction Clustering GMM GMM + T Population Counts Gradient Descent T Transformation Enhanced Model Unit Features: (TREC2002) 38 dimensional MFCC, (Journal 1/03) 19 GMM: (TREC 2002) 1536 or 2048 mixtures, (Journal 1/03) 64 mixtures Universal Background model (UBM): [TREC2002] trained by 60 speakers (two minutes for training, one minute for testing), 49 © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 1/18/06: Lecture 1 -- Introduction E 6886 Topics in Signal Processing: Multimedia Security Systems Outline -- Introduction Multimedia Security : Multimedia Standards – Ubiquitous MM Encryption and Key Management – Confidential MM Watermarking – Uninfringible MM Authentication – Trustworthy MM Security Applications of Multimedia: Audio-Visual Person Identification – Access Control, Identifying Suspects Surveillance Applications – Abnormality Detection Media Sensor Networks – Event Understanding, Information Aggregation 50 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 25 E 6886 Topics in Signal Processing: Multimedia Security Systems Event Understanding Another View Event Understanding: Objects: Visual Objects:, Tree, Person, Hands, … Audio Objects: Music, Speech, Sound, … Scenes: Background: Building, Outdoors, Sky Relationships: The (time, spatial) relationships between objects & scenes Activities: Holding Hand in Hand, Looking for Stars 1/18/06: Lecture 1 -- Introduction 51 © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. E 6886 Topics in Signal Processing: Multimedia Security Systems Example: Low-cost Multimodality Sensors for Sleep Situation Monitoring Understand human night-time activity – Sleep What we have done: What we are going to do: 52 Using visual, audio, heartbeat, infrared sensors to monitor a person’s sleep patterns Measurement of sleep quality Logging and retrieval of sleep situation Early detection and long term monitoring of sleep related diseases 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 26 IBMUnit Research Business or Product Name Distributed Video Signal Understanding TV broadcast, VCR, DVD discs, Video File Database, Webcam (Distributed Smart Sensors) Block diagram of the smart sensors (Server) Concept Detection Processing Elements PE1: 9.2.63.66: 1220 PE4: 9.2.63.66:1235 Face MPEGCDS PE2: 9.2.63.67 Encod- 1/2 GOP Feature Event Features ing Extraction Extraction 22.4 Extraction 2.8 Outdoors 1.5 320 Mbps Kbps Kbps Kbps Female PE5: 9.2.63.66: 1240 Meta- PE3: 9.2.63.68 Indoors data Male PE6: 9.2.63.66 Airplane Sensor 1 PE7: 9.2.63.66 Sensor 2 Sensor N Smart Cam 600 bps Chair Sensor 3 PE100: 9.2.63.66 Clock Display and Information Aggregation Modules User Interests Control Modules Resource Constraints Learning and Mining from Multimodal Sensing Signals | Ching-Yung Lin | IBM © 2003 2005 IBM Corporation E 6886 Topics in Signal Processing: Multimedia Security Systems References • K. Hill, “Imprimatur Business Model,” MCPS 2nd Consensus Forum, Stockholm, May 1997. • ISO/IEC JTC 1/SC 29/WG 11 N4269, “Information Technology – Multimedia Framework (MPEG-21) – Part 4: Intellectual Property Management and Protection,” July 2001. G. Kesden, “Introduction on Content Scrambling System,” Lecture on Operating Systems: Design and Implementation, CMU, Dec. 2000. R. Tachibana, “Audio Watermarking for Live Performance,” SPIE Security and Watermarking of Multimedia Contents V, San Jose, January 2003. J. A. Bloom, I. J. Cox, T. Kalker, J.-P. Linnartz, M. L. Miller and B. Traw, “Copy Protection for DVD Video,” Proceedings of the IEEE, July 1999. J. A. Bloom, M. L. Miller and I. J. Cox, “Digital Watermarking”, Morgan Kaufmann Publishers, 2001. C.-Y. Lin and S.-F. Chang, “Semi-Fragile Watermarking for Authenticating JPEG Visual Content,” SPIE Security and Watermarking in Multimedia Contents II, Vol. 3971, Jan. 2000. U. Uludag, S. Pankanti, S. Prabhakar and A. K. Jain, “Biometric Cryptosystems: Issues and Challenges,” Prof. of the IEEE, June 2004. 54 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 27 E 6886 Topics in Signal Processing: Multimedia Security Systems M.S. Research Projects Available (Spring 2006, 3Pts) Developing Distributed Smart Video Cameras (Phase II): Large-Scale Data Mining, Community Modeling, Human Behavior Modeling 55 © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 1/18/06: Lecture 1 -- Introduction E 6886 Topics in Signal Processing: Multimedia Security Systems Other Related Research Issues Issues in multimedia security copyright protection, authentication, fingerprinting: system, theory and techniques public watermarking techniques, watermarking attacks, quality evaluations and benchmarks perceptual models, noise models, information theoretical models conditional access Traitor tracing legal aspects watermarking protocols security in JPEG2000, MPEG-4, MPEG-7 or MPEG21 biometrics and multimedia security watermarking/ information hiding applications http://www.research.ibm.com/people/c/cylin Acknowledgment: Thanks for Prof. Deepa Kundur’s (Texas A&M U.) assistance on the graphical examples of MM security objectives. 56 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 28 E 6886 Topics in Signal Processing: Multimedia Security Systems Columbia and IBM T. J. Watson Research Center The first supercomputer (1954) 1953-1970 (612 W115th St.) 1945-1953 The first computer science course (1947) The founding of ACM (1947) The first “personal” computer (1948) 1970 – (Yorktown Heights) (612 W116th St.) 57 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. E 6886 Topics in Signal Processing: Multimedia Security Systems Open Discussion 58 1/18/06: Lecture 1 -- Introduction © 2006 Ching-Yung Lin, Dept. of Electrical Engineering, Columbia Univ. 29