الشريحة 1

advertisement
Information System Security
AABFS-Jordan
Summer 2006
Watermarking
Presented To: Dr. Lo'ai Tawalbeh
Prepared By: Sami Qawasmeh
1
Outline











Information Hiding overview
Introduction: History , Definition, and Motivation
Watermarking Classification : Paper and Digital WM
Desired Properties of Watermark
Digital Watermarking Types
Watermarking Process – Embedding and Extraction.
Watermarking Techniques
Watermarking Attackers and Attacks
Limitations and Conclusions
Future Researches
References
2
What is Information Hiding?
 Classical: Embedding information so that it
cannot be visually perceived
 Modern : Embedding information in digital data so
that it cannot be visually or audibly perceived
3
Why Hide Information?
There are two major issues
 Because you want to protect it from malicious use

protect intellectual property rights(IPR)
 Because you do not want any one to even know
about its existence

Avoid observation by unintended recipients
“Security through obscurity”
4
Information Hiding Main Disciplines
 Steganography- (covered writing) the process of
secretly embedding information into a data source
in such a way its very existence is concealed.
 Watermarking:
5
Definitions
 Watermark : is a “secret message” that is
embedded into a “cover message”.
 Digital watermark: is a visible or perfectly invisible,
identification code that is permanently embedded
in the data and remains present within the data
after any decryption process.
6
History
 The Italians where the 1st to use watermarks in the
manufacture of paper in the 1270's.
 A watermark was used in banknote production by the
Bank of England in 1697.
It is a good security feature because the watermark
cannot be photocopied or scanned effectively.
7
Why Watermark? Motivation (1/2)
 The rapid revolution in digital multimedia and the ease of
generating identical and unauthorized digital data.
For example: USA Today, Jan. 2000: Estimated lost
revenue from digital audio piracy $8,5 billions
 Digital objects can be copied and distributed, transmitted,
manipulated anonymously with no way to identify the
criminals.
 Copyright protection of multimedia data

Copyright owners want to be compensated every time
their work is used.
8
Why Watermark? Motivation (2/2)
 The need to limit the number of copies created whereas
the watermarks are modified by the hardware and at
some point would not create any more copies (i.e. DVD)
- the reading device must be able to modify the watermark
 Content protection – content stamped with a visible
watermark that is very difficult to remove so that it can
be publicly and freely distributed
9
Watermarks Classification
1. Paper Watermark: Intended to be somewhat visible.
2. Digital Watermark: A digital signal or pattern imposed on
a digital document ( text, graphics, multimedia
presentations , …
10
Paper Watermark
The technique of impressing into the paper a form,
image, or text.
“Cannot be photocopied or scanned effectively”
Purpose: To make forgery more difficult to record
the manufacturer’s trademark, Copyright
protection, logos, ect …
Used in :
Currency, Banknotes , Passports, …
11
Paper watermark
Example
Some Digital Watermarking Types (1/2)

Visible vs. Invisible:

Visible such as a company logo stamped on an image or
Video.
 Invisible intended to be imperceptible to the human eye
or inaudible. the watermark can only be determined through
watermark extraction or detection by computers.

Fragile vs. Robust :

Fragile watermarks break down easily.
 Robust survive manipulations of content.
13
Some Digital Watermarking Types (2/2)
●
Public vs. private – Private watermarking techniques
require that the original be used as a basis of
encryption whereas public does not
●
Public-key vs. secret-key – Secret-key
watermarking uses the same watermarking key to read
the content as the key that was inserted into the image;
public key uses different keys for watermarking the
image and reading the image
14
Some Desired Properties of (DW) ( 1/3)
1. Robustness
2. Tamper Resistance
3.
Economically Implementable
4. Unambiguous
5. Capacity
6. Quality
15
Desired Properties ( 2/3)
(1) Robustness: A watermark must be difficult or
impossible to remove, at least without visibly
degrading the original image. A watermark must
survive image modifications.

Geometric distortions: rotation, scaling, translation, etc.
(2) Tamper Resistance: The watermark must resist any
type of attacks, what ever the intentions are: remove
or modify
16
Desired Properties ( 3/3)
(3) Economically implementable: Time and
effort, cost.
(4) Unambiguous: The watermark, when
retrieved, should unambiguously identify the
owner.
(5) Capacity: The amount of information that can be
embedded
(6) Quality: (High Quality) - Quality not degraded
17
Properties Tradeoff
Robustness
Quality
Capacity
Embedding and Extraction Complexity
18
Important Definitions
 Cover : Audio-video, text in which data will be hidden
 Watermark: What is actually added to the cover
 Information: message to be added
 Watermarking key: Secret parameter needed for
embedding & detecting the watermark & extracting the
information
 Watermarking Function: Embedding & Extraction
algorithms.
19
Watermarking Process
 Two major steps:

Location Selection : Where to embed watermark

Processing : How to modify original data to
embed watermark
20
Watermarking Embedding &
Extraction
Cover Image
Cover + WM
Cover + WM
Embedding F : Watermarked Image = Function (Cover, Watermark, Key)
Extraction F : Watermark = Function (Watermarked Image, Key(
21
Watermarking Techniques
 Text – Varying spaces after punctuation, spaces in
between lines of text, spaces at the end of
sentences, etc.
 Audio – Low bit coding, random.
 Images / Video – Least-significant bit, random
22
Text Watermarking
Techniques: Varying spaces after punctuation, spaces in
between lines of text, spaces at the end of sentences,
etc.
Examples:
 Line Shift Coding : Shift every other line up or down
slightly in order to encode data
 Word Shift Coding: Shifts some words slightly left or
right in order to encode data
23
Image Watermarking / LSB
LSB: Using the least significant bits of each pixel in
one image to hide the most significant bits of
another.

Pixels may be chosen randomly according to a
key
Steps:
1.
2.
3.
Load up both the host image and the image you
need to hide.
Chose the number of bits you wish to hide the
secret image in.
Combine the pixels from both images
24
LSB - Example
0
0
1
1
1
1
0
0
0
1
0
0
0
0
1
0
1
0
1
1
1
1
0
1
1
0
1
0
0
1
0
1
1
0
1
0
0
1
0
1
1
0
1
0
0
1
0
1
0
1
0
0
0
0
1
0
0
0
1
1
1
1
0
0
25
Audio Watermarking
 Low Bit Coding
 Echo Data Hiding
26
Audio Watermarking
 Low Bit Coding



Most digital audio is created by sampling the signal
and quantizing the sample with a 16-bit quantizer.
The rightmost bit, or low order bit, of each sample
can be changed from 0 to 1 or 1 to 0
This modification from one sample value to another
is not perceptible by most people and the audio
signal still sounds the same
27
Audio Watermarking
 Echo Data Hiding


Discrete copies of the original signal are
mixed in with the original signal creating
echoes of each sound.
By using two different time values between
an echo and the original sound, a binary 1 or
binary 0 can be encoded.
28
Video Watermarking
 Video sequences consists of a series of consecutive
and equally time-spaced (Frames) still images
in general, very similar with image watermarking so,
image watermark method is applicable to video directly
Video watermark imposes real or near real-time
watermarking system
29
Attackers Main Goal
Attackers seek to destroy watermark for the
purposes of use without having to pay royalties
to the originator of the content.
30
Why do we need to study attacks?
Identify weakness
 Propose improvement – Security
 Attackers are knowledgeable, creative, have
lots of time, and are numerous

31
Attacks on Watermarking
Two Sets of Attacks
 Unintentional
All image manipulations commonly used to
prepare images for print publication. For
example:

Resizing, rotation, sharpening, contrast
modification, compression, ect.
 Intentional (Malicious)

All the well-known intentional attacks include:
Disabling, altering, embedding new watermark, ect.
32
Intentional Watermark Attacks (1/2)
 Active Attacks
– hacker tries to remove the watermark
or make it undetectable. Applying Geometric
transformation: rotation, scaling, translation, change
aspect ratio.
 Passive Attacks – hacker tries to determine whether
there is a watermark and identify it. However, no
damage or removal is done.
 Collusion Attacks – hacker uses several copies of one
piece of media, each with a different watermark, to
construct a copy with no watermark.
33
Intentional Watermark Attacks (2/2)
 Forgery Attacks – Attacher tries to embed a valid watermark of
their own rather than remove one.
 Conspiracy Attacks : several conspirators, each of whom has
procured a copy of the same image (differing only in the
watermark which is unique to each copy).
 Presentation Attacks: Watermark detection failure. Geometric
transformation, rotation, scaling, translation, change aspect ratio,
etc.
34
Limitations / Conclusions
 Rapidly growing field of digitized images, video and audio has
urged for the need of protection.
 Watermarking is a key process in the protection of copyright
ownership of electronic data (image, videos, audio, ...).
 Digital watermarking does not prevent copying or distribution.
 Digital watermarking alone is not a complete solution for
access/copy control or copyright protection.
 Digital watermarks cannot survive every possible attack.
35
Challenges in Watermarking Research
 Watermark survival for all types of attacks –
intentional and unintentional.
 Embedding a Color image watermarking
 Multiple layers watermark that aim to protect
each other from being analyzed -The more
robust and reliable the implementation is, the
longer it will last.
36
References
1.
M. Kutter, S. Voloshynovskiy and A. Herrigel, The watermark Copy Attack,
Security and Watermarking of Multimedia Contents, II, SPIE-3971: 371-280,
2000.
2.
S. Craver, N. Memon, B.-L. Yeo, and M. Yeung. Resolving rightful
ownerships with invisible watermarking techniques: Limitations, attacks
and implications. IEEE Trans. on Selected Areas of Communications,
16(4):573–586, 1998.
3.
I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon. Secure spread spectrum
watermarking for multimedia. IEEE Trans. on Image Processing,
6(12):1673–1687, 1997.
4.
I. J. Cox and J.-P. Linnartz. Some general methods for tampering with
watermarks. IEEE Trans. on Selected Areas of Communications, 16(4):587–
593, 1998.
37
References
http://www-nt.e-technik.uni-erlangen.de/~su/seminar
/ws99/slides/su.pdf
6. http://www.compris.com/TextHide
7. http://www.infosyssec.com/infosyssec/Steganography/
watermarkingAttack.htm
8. http://www.lnt.de/~hartung/ProcIEEEHartungKutter.pdf
9. http://www.watermarkingworld.org
10. http://wwwstu.hatii.arts.gla.ac.uk/Courses/digitisation
11. http://www.inria.fr/Watermarking
12. http://www.isg.rhul.ac.uk/msc/teaching/opt5/archive/20
02-03/slides/watermarking.pdf
38
5.
Thanks for your kind attention
any Comments
???
39
Download