thái chí minh trần lương khiêm 1. content introduction history applications requirements ...

48
Thái Chí Minh Trần Lương Khiêm 1

Upload: martha-anderson

Post on 16-Jan-2016

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Thái Chí MinhTrần Lương Khiêm

1

Page 2: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Content

Introduction History Applications Requirements Techniques Attacks

2

Page 3: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Content

Introduction History Applications Requirements Techniques Attacks

3

Page 4: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Introduction

4

Page 5: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Introduction

5

Page 6: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Introduction

6

Page 7: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Introduction

Relation between embedded message and cover work

Goal and assumption

7

Page 8: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Content

Introduction History Applications Requirements Techniques Attacks

8

Page 9: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

History

Histiæus & the slave

Paper watermark, 1282

Banknote. 18th century

9

Page 10: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

History In 1954, Emil Hembrooke of the Muzak Corporation filed a patent for

watermarking” musical Works The first Information Hiding Workshop (IHW) ,which included digital

watermarking as one of its primary topics, was held in 1996

10

Page 11: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Content

Introduction History Applications Requirements Techniques Attacks

11

Page 12: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Applications

Broadcast monitoring Owner identification Proof of ownership Transaction tracking Content authentication Copy control

12

Page 13: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Broadcast monitoring

13

Page 14: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Owner identification

14

Page 15: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Proof of ownership

15

Page 16: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Transaction tracking

16

Page 17: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Transaction tracking

17

Page 18: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Content authentication

Digital signature is NOT enough

18

Page 19: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Content authentication

19

Page 20: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Copy control

Cryptography is NOT enough

20

Page 21: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Copy control

21

Page 22: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Content

Introduction History Applications Requirements Techniques Attacks

22

Page 23: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Requirements

Perceptual Transparency Robustness Data payload With / Without originals Security

23

Page 24: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Perceptual Transparency

24

Page 25: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Robustness

Fragile Semi-fragile Robust

25

Page 26: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Data payload

Data payload refers to the number of bits a watermark encodes within a unit of time or within a Work

Different applications may require very different data payloads

26

Page 27: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

With / Without originals

Non-blind watermarkingType I

Type II

Semi-blind watermarking

Blind watermarking

27

Page 28: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Security

28

Page 29: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

The mutual dependencies among the elements

29

Page 30: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Content

Introduction History Applications Requirements Techniques Attacks

30

Page 31: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Techniques

LSB Spread spectrum Applying on Vietnamese documents

31

Page 32: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Techniques

32

Page 33: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Techniques

There are many techniques to do watermarking in digital things:Spatial domain watermarking: LSB, in text

data, …Transform domain watermarking: frequency-

based watermarking, wavelet based watermarking○ Embedding the watermark in the transform

domain from carrier object (using DCT, DFT, DWT, …)

33

Page 34: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Techniques

LSB:Embedding:

○ Choosing some representation values (e.g pixels) of carrier object.

○ Embed the bits of message (watermark) to LSBs of representation valueMessage ‘A’: 100 0001Carrier object: RGB (2 bits)

100000 010101 101100

010001 100001 000100

101110 011010 111000

34

Page 35: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Techniques

LSB:Embedding:

○ Choosing some representation values (e.g pixels) of carrier object.

○ Embed the bits of message (watermark) to LSBs of representation valueMessage ‘A’: 100 0001Carrier object: RGB (2 bits)

100001 010100 101100

010000 100001 000100

101111 011010 111000

35

Page 36: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Techniques

LSB:Detector:

○ Retrieve the watermark by having the knowledge of the representation values (e.g pixels) used for embedding individuals bits

36

Page 37: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Techniques

Spread spectrumUsing frequency domain transform to

convert the input image into another domain and embedding the watermark to this domain.

37

Page 38: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Techniques

• Apply on Vietnamese documents

38

Page 39: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Techniques

• Apply on Vietnamese documents

39

Page 40: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Techniques

• Apply on Vietnamese documents○ Besides, we can use some methods:

Vertically shifting text lines Horrizontally shifting words

40

Page 41: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Content

Introduction History Applications Requirements Techniques Attacks

41

Page 42: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Attacks

From processing From attackers

42

Page 43: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Attacks

The actions take effect on the watermark embedded in carrier objects.Affects:

○ Destroying the watermark or modifying the watermark with new wrong information.

○ Removing the watermark entirely.But: not degrading the quality of carrier

objects (image, audio, video)Relating to a requirements of watermarking:

Robustness

43

Page 44: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Attacks Classification:

From proscessing carrier objects○ Common signal processing: digital-to-analog and

analog-to-digital conversion, or change image contrast, color, JPEG compression, …

○ Common geometric distortions: scaling, rotating, cropping, dithering …

From attacker○ Mosaic○ Collusion attacks: get the watermark or remove

watermarks entirely to get the original work.○ …

44

Page 45: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Attacks

45

Page 46: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

AttacksMosaic attack

46

Page 47: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

Attacks How to protect watermarks from attacks

Understanding and applying new researchs in watermarking

Using StirMark Benchmark evaluation engine to evaluate your watermarking scheme○ “All vendors of digital watermarks have their

products benchmarked by Stirmark and as of August 2001, no watermark from any vendor survives the test, ie: the watermarks are all removed without degradation to image quality occurring. “

47

Page 48: Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2

48