Académique Documents
Professionnel Documents
Culture Documents
Digital Watermarking?
Allows users to embed some data into digital contents When data is embedded, it is not written at header part but embedded directly into digital media itself by changing media contents data
How It Works
Data Hiding
Types of Watermark
Visible
A visible translucent image which is overlaid on the primary image An overlaid image which cannot be seen, but which can be detected algorithmically
Invisible
Visible Watermark
Logo or seal of the organization which holds the rights to the primary image, it allows the primary image to be viewed, but still marks it clearly as the property of the owning organization. Overlay the watermark in a way which makes it difficult to remove, if the goal of indicating property rights is to be achieved.
Visible Watermark
Invisible Watermark
Embedding level is too small to notice Can be retrieved by extraction software Applications:
Invisible Watermark
Embedding Techniques
Spatial domain
Frequency domain
Spread domain
Spatial Domain
Frequency Domain
V ! v0 , v1 ,..., v N
F ! f 0 , f1 ,..., f N
Frequency Domain
Spread Spectrum
Spread Spectrum
Applications of Watermarking
Features of Watermarking
Invisible/Inaudible
Information is embedded without digital content degradation, because of the level of embedding operation is too small for human to notice the change. The embedded information can survive after some processing, compression and format transformation. Data size of the media is not changed before and after embedding operation because information is embedded directly into the media.
Inseparable
Robustness
Capacity
Audio and Music Content Video, Movies and TV Content Digital Imagery Identity Documents Value Documents
Copyright Communication
Copy Protection Monitoring Filtering/Classification Authentication/Integrity Asset/Content Management Rights Management Remote Triggering Linking/ELinking/E-Commerce
Enhanced Content
P2P systems provide or sell media content information and related items
Users PC
Rip Software
Compressed Audio/Video File (e.g. MP3 file)
User Software
Detect Copyright and Content ID DWM for Secure and Enhanced content
Can be used to address P2P and social network content Identification needs as well as providing identification of orphan works and access to metadata/networked information
Copyrighted
Content Filter
Non-Copyrighted
Can support existing, established and/or new Classification Systems or content identifiers such as MPAA film ratings, ISAN or ad identification codes, etc. Filtering can occur at the whole content level and/or at a more granular level identifying copyrighted, sensitive and/or questionable material for the given audience May be key element of identifying copyrighted content to support legitimate P2P distribution
Connected Content/Linking
Identifies content owners and rights while communicating copyright information Awareness of watermarked content by consumer creates deterrent against unauthorized copying and distribution Provides accurate identification of source of unauthorized content discovered on the Internet and/or physical media
Retail Content Embed Serial # (1) Embed Serial # (2) Recordable Media
Content ID
(1) At Point of Distribution Content Provider Track and take proper action Protected for privacy Detect Serial Number (2) At point of copying/re-distribution
Multimedia Security
Part II: Encryption
Goals
Person authentication
Assurance that the communicating entity is the one claimed Prevention of unauthorized use of a resource Protection of data from unauthorized disclosure Assurance that data received is as sent Protection against denial by the parties in a communication
Access control
Data confidentiality
Data integrity
NonNon-repudiation
Multimedia Data
What separates multimedia data from traditional alpha numeric data? Large in file size
May require real-time processing (especially realfor continuous media) Portable and mobile applications
Signal scrambling
Historical approach Not compatible with modern multimedia compression Fast speed but low security Trivial solution High security but slow speed Most popular approach today Limited in its range of application Complementary to selective encryption Very fast computation speed
Selective encryption
Selective Encryption
Select the most important coefficients and then encrypt them with traditional ciphers such as DES
Digitized Audiovisual data Media Compression System Coefficients Coefficient Selection Selected Coefficients Cryptographic Cipher
Nonselected Coefficients
Advantages
Lower complexity High security level provided by traditional cryptology Less error correction coding redundancy Compatible with existing software and hardware modules
A popular low bit rate speech codec Vocoder Decoder synthesizes speech using the model
LSP Decoder
LSP Interpolator
Pitch Decoder
Pitch Postfilter
Synthesis Filter
Formant Postfilter
Excitation Decoder
Huffman code #0
isomorphic tree!
Huffman code #1
Select a good PRBG Select an r-bit random seed s (encryption key) Pseudo-random sequence output from PRBG(s) becomes seudothe key hoping sequence (KHS)
Entropy Coder
Input symbol
s PRBG
KHS = 011000110
Challenges
Real time constraint Potential cost constraint Potential bit rate increase Rate variation challenge Dynamic network conditions Transcoding challenge
Conclusion
Multimedia security relevance Tradeoff approach based on application Goal is the design of an
efficient, efficient, secure and cost effective technique for multimedia security using digital watermarking and encryption