http://isrc.ulster.ac.uk steganography for secure digital watermarking 1 pratheepan yogarajah, dr....

13
http://isrc.ulster.ac.uk Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt University of Ulster, UK Dr. Abbas Cheddad Umea University, Sweden

Upload: job-mosley

Post on 31-Dec-2015

219 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Http://isrc.ulster.ac.uk Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt

http://isrc.ulster.ac.uk

Steganography for Secure Digital Watermarking

1

Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt

University of Ulster, UK

Dr. Abbas CheddadUmea University, Sweden

Page 2: Http://isrc.ulster.ac.uk Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt

http://isrc.ulster.ac.uk2

Steganography

Key

Encoder

Cover Image

Secret Data

Stego Object

Decoder

Secret Data

Communications Channel

Page 3: Http://isrc.ulster.ac.uk Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt

http://isrc.ulster.ac.uk

Secure Digital Watermarking

Cover Image

Secret Data

Protected Image

Page 4: Http://isrc.ulster.ac.uk Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt

http://isrc.ulster.ac.uk

Digital content authentication

4

Sorry - this is NOT original.

Test image Original image

Original Image Attacked Image

Page 5: Http://isrc.ulster.ac.uk Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt

http://isrc.ulster.ac.uk5

Secret Data Cover Image Stego Object

Self-Embedding

Page 6: Http://isrc.ulster.ac.uk Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt

http://isrc.ulster.ac.uk 6

How to detect alterations (1/2)

Final ResultGrayscale image of

Altered image

Altered image

Extracted grayscale

image

Page 7: Http://isrc.ulster.ac.uk Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt

http://isrc.ulster.ac.uk7

Original image Extracted image

How to detect alterations (2/2)

Page 8: Http://isrc.ulster.ac.uk Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt

http://isrc.ulster.ac.uk

Self-Embedding - Temporal information

UU SDW:American Beauty-045/789+0

8

Key Frames

Page 9: Http://isrc.ulster.ac.uk Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt

http://isrc.ulster.ac.uk9

Temporal content change detection

Original Video Attacked Video

Detected Video

Page 10: Http://isrc.ulster.ac.uk Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt

http://isrc.ulster.ac.uk

Conclusion A steganography based self-embedding technique

provides a solution for digital content authentication. Benefits

- Protects commercial value of digital content- Protects the secrecy of digital content- Protects digital content from modification

Applicable fields: film/animation, TV, games, music, images

10

Page 11: Http://isrc.ulster.ac.uk Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt

http://isrc.ulster.ac.uk11

Thank You

Page 12: Http://isrc.ulster.ac.uk Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt

http://isrc.ulster.ac.uk12

Secret Data Cover Image Stego Object

Self-Embedding

Page 13: Http://isrc.ulster.ac.uk Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt

http://isrc.ulster.ac.uk13

How to detect alterations (1/3)

Altered Document

Recovered Document

Grayscale image of Altered Document

Final Result

Altered Document

Recovered Document

Grayscale image of Altered Document

Altered Document

Recovered Document