Information System Security AABFS-Jordan Summer 2006 Watermarking Presented To: Dr. Lo'ai Tawalbeh Prepared By: Sami Qawasmeh 1 Outline Information Hiding overview Introduction: History , Definition, and Motivation Watermarking Classification : Paper and Digital WM Desired Properties of Watermark Digital Watermarking Types Watermarking Process – Embedding and Extraction. Watermarking Techniques Watermarking Attackers and Attacks Limitations and Conclusions Future Researches References 2 What is Information Hiding? Classical: Embedding information so that it cannot be visually perceived Modern : Embedding information in digital data so that it cannot be visually or audibly perceived 3 Why Hide Information? There are two major issues Because you want to protect it from malicious use protect intellectual property rights(IPR) Because you do not want any one to even know about its existence Avoid observation by unintended recipients “Security through obscurity” 4 Information Hiding Main Disciplines Steganography- (covered writing) the process of secretly embedding information into a data source in such a way its very existence is concealed. Watermarking: 5 Definitions Watermark : is a “secret message” that is embedded into a “cover message”. Digital watermark: is a visible or perfectly invisible, identification code that is permanently embedded in the data and remains present within the data after any decryption process. 6 History The Italians where the 1st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote production by the Bank of England in 1697. It is a good security feature because the watermark cannot be photocopied or scanned effectively. 7 Why Watermark? Motivation (1/2) The rapid revolution in digital multimedia and the ease of generating identical and unauthorized digital data. For example: USA Today, Jan. 2000: Estimated lost revenue from digital audio piracy $8,5 billions Digital objects can be copied and distributed, transmitted, manipulated anonymously with no way to identify the criminals. Copyright protection of multimedia data Copyright owners want to be compensated every time their work is used. 8 Why Watermark? Motivation (2/2) The need to limit the number of copies created whereas the watermarks are modified by the hardware and at some point would not create any more copies (i.e. DVD) - the reading device must be able to modify the watermark Content protection – content stamped with a visible watermark that is very difficult to remove so that it can be publicly and freely distributed 9 Watermarks Classification 1. Paper Watermark: Intended to be somewhat visible. 2. Digital Watermark: A digital signal or pattern imposed on a digital document ( text, graphics, multimedia presentations , … 10 Paper Watermark The technique of impressing into the paper a form, image, or text. “Cannot be photocopied or scanned effectively” Purpose: To make forgery more difficult to record the manufacturer’s trademark, Copyright protection, logos, ect … Used in : Currency, Banknotes , Passports, … 11 Paper watermark Example Some Digital Watermarking Types (1/2) Visible vs. Invisible: Visible such as a company logo stamped on an image or Video. Invisible intended to be imperceptible to the human eye or inaudible. the watermark can only be determined through watermark extraction or detection by computers. Fragile vs. Robust : Fragile watermarks break down easily. Robust survive manipulations of content. 13 Some Digital Watermarking Types (2/2) ● Public vs. private – Private watermarking techniques require that the original be used as a basis of encryption whereas public does not ● Public-key vs. secret-key – Secret-key watermarking uses the same watermarking key to read the content as the key that was inserted into the image; public key uses different keys for watermarking the image and reading the image 14 Some Desired Properties of (DW) ( 1/3) 1. Robustness 2. Tamper Resistance 3. Economically Implementable 4. Unambiguous 5. Capacity 6. Quality 15 Desired Properties ( 2/3) (1) Robustness: A watermark must be difficult or impossible to remove, at least without visibly degrading the original image. A watermark must survive image modifications. Geometric distortions: rotation, scaling, translation, etc. (2) Tamper Resistance: The watermark must resist any type of attacks, what ever the intentions are: remove or modify 16 Desired Properties ( 3/3) (3) Economically implementable: Time and effort, cost. (4) Unambiguous: The watermark, when retrieved, should unambiguously identify the owner. (5) Capacity: The amount of information that can be embedded (6) Quality: (High Quality) - Quality not degraded 17 Properties Tradeoff Robustness Quality Capacity Embedding and Extraction Complexity 18 Important Definitions Cover : Audio-video, text in which data will be hidden Watermark: What is actually added to the cover Information: message to be added Watermarking key: Secret parameter needed for embedding & detecting the watermark & extracting the information Watermarking Function: Embedding & Extraction algorithms. 19 Watermarking Process Two major steps: Location Selection : Where to embed watermark Processing : How to modify original data to embed watermark 20 Watermarking Embedding & Extraction Cover Image Cover + WM Cover + WM Embedding F : Watermarked Image = Function (Cover, Watermark, Key) Extraction F : Watermark = Function (Watermarked Image, Key( 21 Watermarking Techniques Text – Varying spaces after punctuation, spaces in between lines of text, spaces at the end of sentences, etc. Audio – Low bit coding, random. Images / Video – Least-significant bit, random 22 Text Watermarking Techniques: Varying spaces after punctuation, spaces in between lines of text, spaces at the end of sentences, etc. Examples: Line Shift Coding : Shift every other line up or down slightly in order to encode data Word Shift Coding: Shifts some words slightly left or right in order to encode data 23 Image Watermarking / LSB LSB: Using the least significant bits of each pixel in one image to hide the most significant bits of another. Pixels may be chosen randomly according to a key Steps: 1. 2. 3. Load up both the host image and the image you need to hide. Chose the number of bits you wish to hide the secret image in. Combine the pixels from both images 24 LSB - Example 0 0 1 1 1 1 0 0 0 1 0 0 0 0 1 0 1 0 1 1 1 1 0 1 1 0 1 0 0 1 0 1 1 0 1 0 0 1 0 1 1 0 1 0 0 1 0 1 0 1 0 0 0 0 1 0 0 0 1 1 1 1 0 0 25 Audio Watermarking Low Bit Coding Echo Data Hiding 26 Audio Watermarking Low Bit Coding Most digital audio is created by sampling the signal and quantizing the sample with a 16-bit quantizer. The rightmost bit, or low order bit, of each sample can be changed from 0 to 1 or 1 to 0 This modification from one sample value to another is not perceptible by most people and the audio signal still sounds the same 27 Audio Watermarking Echo Data Hiding Discrete copies of the original signal are mixed in with the original signal creating echoes of each sound. By using two different time values between an echo and the original sound, a binary 1 or binary 0 can be encoded. 28 Video Watermarking Video sequences consists of a series of consecutive and equally time-spaced (Frames) still images in general, very similar with image watermarking so, image watermark method is applicable to video directly Video watermark imposes real or near real-time watermarking system 29 Attackers Main Goal Attackers seek to destroy watermark for the purposes of use without having to pay royalties to the originator of the content. 30 Why do we need to study attacks? Identify weakness Propose improvement – Security Attackers are knowledgeable, creative, have lots of time, and are numerous 31 Attacks on Watermarking Two Sets of Attacks Unintentional All image manipulations commonly used to prepare images for print publication. For example: Resizing, rotation, sharpening, contrast modification, compression, ect. Intentional (Malicious) All the well-known intentional attacks include: Disabling, altering, embedding new watermark, ect. 32 Intentional Watermark Attacks (1/2) Active Attacks – hacker tries to remove the watermark or make it undetectable. Applying Geometric transformation: rotation, scaling, translation, change aspect ratio. Passive Attacks – hacker tries to determine whether there is a watermark and identify it. However, no damage or removal is done. Collusion Attacks – hacker uses several copies of one piece of media, each with a different watermark, to construct a copy with no watermark. 33 Intentional Watermark Attacks (2/2) Forgery Attacks – Attacher tries to embed a valid watermark of their own rather than remove one. Conspiracy Attacks : several conspirators, each of whom has procured a copy of the same image (differing only in the watermark which is unique to each copy). Presentation Attacks: Watermark detection failure. Geometric transformation, rotation, scaling, translation, change aspect ratio, etc. 34 Limitations / Conclusions Rapidly growing field of digitized images, video and audio has urged for the need of protection. Watermarking is a key process in the protection of copyright ownership of electronic data (image, videos, audio, ...). Digital watermarking does not prevent copying or distribution. Digital watermarking alone is not a complete solution for access/copy control or copyright protection. Digital watermarks cannot survive every possible attack. 35 Challenges in Watermarking Research Watermark survival for all types of attacks – intentional and unintentional. Embedding a Color image watermarking Multiple layers watermark that aim to protect each other from being analyzed -The more robust and reliable the implementation is, the longer it will last. 36 References 1. M. Kutter, S. Voloshynovskiy and A. Herrigel, The watermark Copy Attack, Security and Watermarking of Multimedia Contents, II, SPIE-3971: 371-280, 2000. 2. S. Craver, N. Memon, B.-L. Yeo, and M. Yeung. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications. IEEE Trans. on Selected Areas of Communications, 16(4):573–586, 1998. 3. I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing, 6(12):1673–1687, 1997. 4. I. J. Cox and J.-P. Linnartz. Some general methods for tampering with watermarks. IEEE Trans. on Selected Areas of Communications, 16(4):587– 593, 1998. 37 References http://www-nt.e-technik.uni-erlangen.de/~su/seminar /ws99/slides/su.pdf 6. http://www.compris.com/TextHide 7. http://www.infosyssec.com/infosyssec/Steganography/ watermarkingAttack.htm 8. http://www.lnt.de/~hartung/ProcIEEEHartungKutter.pdf 9. http://www.watermarkingworld.org 10. http://wwwstu.hatii.arts.gla.ac.uk/Courses/digitisation 11. http://www.inria.fr/Watermarking 12. http://www.isg.rhul.ac.uk/msc/teaching/opt5/archive/20 02-03/slides/watermarking.pdf 38 5. Thanks for your kind attention any Comments ??? 39