Audio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking?

Size: px
Start display at page:

Download "Audio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking?"

Transcription

1 ENEE408G Lecture-9 Last Lecture Digital Watermarking and Fingerprinting for Digital Rights Protection of Multimedia URL: Slides included here are based on Spring 2012 offering in the order of introduction, image, video, speech, and audio. Copyrighted ENEE408G course was ECE Department, University of Maryland, College Park. Inquiries can be addressed to Profs. Ray Liu (kjrliu@isr.umd.edu) and Min Wu (minwu@eng.umd.edu). Audio synthesis: MIDI Digital Audio Coding/Compression Psychoacoustics properties used in perceptual audio coding MPEG-1 Audio coding Today: Digital Rights Management of Multimedia via Watermarking ENEE408G Capstone -- Multimedia Signal Processing ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [2] Demands on Info. Security and Protection Digital Watermarking/Data Hiding in Multimedia Intellectual property management for digital media Promising electronic marketplace for digital music and movies Advantages of digital: perfect reproduction, easy transmission, Napster controversy Conventional encryption alone still leaves many problems unsolved Protection from encryption vanishes once data is decrypted Still want establish ownership and restrict illegal re-distributions How to distinguish changes introduced by compression vs. malicious tampering? Bit-by-bit accuracy is not always desired authenticity criterion for MM What is Digital Watermarking? Examples: Picture in picture, words in words Silent message, invisible images Secondary information in perceptual digital media data The need of watermarking: robust vs. fragile Copyright protection: prove the ownership Fingerprinting: trace the source Copy protection: prevent illegal copying Data authentication: check authenticity of data Fragile or semi-fragile watermarking ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [3] ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [4]

2 Example on Invisible and Robust Watermark Fragile Watermark Example: Document Authentication (a) (c) alter (b) (d) (e) (f) after alteration Copyright Embed pre-determined d pattern or content features beforehand Verify hidden data s integrity to decide on authenticity (g) ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [5] ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [6] General Framework of Data Hiding Basic Requirements for (Robust) Watermarking Hello, World Hello, World host media data to be hidden extracted data embed Player; or Forensic Analyzer play/ record/ extract marked media (w/ hidden data) compress process / attack test media ENEE408G Sl lides (created by R. Liu & M.W Wu 2002) Imperceptibility (perceptual transparency) Payload the amount of information that can be stored in a watermark Robustness Security Kerckhoff Principle The method used to encrypt the data is known to an unauthorized party and that the security must lie in the choice of a key. Blind and non-blind detection (aka Oblivious vs Non-oblivious) Blind detection ~ does not use the original unmarked copy ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [7] ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [8]

3 search Talks 98-04) based on Res ated by M.Wu Data Embedding by Replacing LSBs search Talks 98-04) based on Res ated by M.Wu Data Embedding by Replacing LSBs (cont d) 31 Slides (crea ENEE63 Replace LSB with Pentagon s MSB 31 Slides (crea ENEE63 Replace 6 LSBs with Pentagon s 6 MSBs ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [10] ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [11] by R. Liu & M.W Wu 2002) lides (created b ENEE408G Sl => See Lab Project 4 for details A Simple Audio Watermark in Time Domain Put message in the Least-Significant-Bits (LSBs) Encode a message into bits e.g., represent a character string into bits using ASCII code Embedder puts in LSBs of audio samples Repeat embedding the same bit in a few samples if needed Detector retrieves embedded bits from LSBs Perform majority voting if repeated embedding is used Repack bits into message Tradeoff between perceptual quality and robustness Compare the embedding in 1 st LSBs, 2 nd LSBs, Security Can they see/hear your message? Can other people make imperceptible change to alter your message? ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [12] by M.Wu & R. ENEE408G Slides (created => See Design Project 4 for details A More Robust Watermark in Transform Domain Embedder: use HAS & embed in perceptually significant freq. Audio File Key/Seed Segmentation (frame size L) Noise-like seq. Watermark DCT W(j) added in midfrequency region V (j) = V(j) + a(j) W(j) e.g., a(j) = 0.05 V(j) Detector: determine the existence of a specific wmk Subtract host signal, measure similarity (via correlation), & threshold it Audio File in question DCT V + _ V(j) Extract t mid-frequency coefficients V (j) watermark detector idct Detection result Watermarked audio file V W Original A specific Similarity il it measures: DCT audio file watermark <V V, W>, or < (V V)./ a, W >, or ENEE408G Capstone -- Multimedia Signal Processing correlation MM Digital coeff. Rights [13]

4 Discussions Digital Fingerprinting and Tracing Traitors by M.Wu & R. L lides (created b ENEE408G Sl Why use noise-like sequence as watermark? Imperceptibility p Confidentiality of the embedded data Robustness against jamming Imperceptibility Frequency domain embedding: can take advantage of known perceptual properties such as masking Can apply sophisticated HAS models to improve perceptual quality Robustness and security Use attacks to find weaknesses and improve designs Case study: SDMI public challenge (Fall 00) ted by M.Wu 2005) Leak of information poses serious threats to government operations and commercial markets e.g., pirated content or classified document studio The Lord of the Ring Promising countermeasure: robustly embed digital it fingerprintsi w1 w2 w3 Alice Bob Insert ID or fingerprint (often through robust watermarking) to identify each user Purpose: deter information leakage; digital rights management provide post-delivery protection complementary to encryption Carl Sell Challenge: imperceptibility, robustness, tracing capability ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [14] ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [15] Fingerprinting Curves Embedded Fingerprinting for Multimedia 2005) 8G Slides (created by M.Wu Original Curve (captured by TabletPC) Fingerprinted Curve (100 control points) Detection Statistics Typical threshold is 3~6 for fl false alarm of f10-3 ~ 10-9 ted by M.Wu 2005) Embedded Fingerprinting Multi-user Attacks Traitor Tracing Customer s Multimedia ID: Alice Document Fingerprinted Copy Digital Distribute embed Fingerprint to Alice Alice Bob Fingerprinted doc for different users Unauthorized re-distribution Collusion Attack Colluded Copy (to remove fingerprints) Extract Identify Alice, Fingerprints Traitors Bob, Suspicious Copy Codebook ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [16] ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [17]

5 Collusion-Resistant Fingerprinting of Maps Example of Anti-Collusion Fingerprint Code: Embed 16-bit Code for Detecting ti 3C Colluders Out of f ) ted by M.Wu 8G Slides (crea MCP ENEE408 UM 5-User Averaging Attack 2-User Interleaving Attack... Also survive combination attacks of collusion + print + scan ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [18] 2005) 8G Slides (created by M.Wu User-1 ( -1,-1, -1, -1, 1, 1, 1, 1,, 1 ) Embed fingerprint via HVS-based spread spectrum embedding in block-dct domain Collude by Averaging ( -1, 1, 1, 1, 1, 1,, -1, 1, 1, 1 ) User-4 Extracted fingerprint code ( -1, 0, 0, 0, 1,, 0, 0, 0, 1, 1, 1 ) Uniquely Identify User 1 & 4 ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [19] ted by M.Wu 2005) 8G Slides (crea Case Study: Tracing Movie Screening Copies Potential civilian use for digital rights management (DRM) Copyright industry $500+ Billion business ~ 5% U.S. GDP Alleged Movie Pirate Arrested (23 January 2004) A real case of a successful deployment of 'traitor-tracing' mechanism in the digital realm Use invisible fingerprints to protect screener copies of pre-release movies Last Samurai w1 Carmine Caridi Russell friends Internet Hollywood studio traced pirated version Summary Multimedia watermarking for rights management Reading Assignment F. Hartung and M. Kutter: Multimedia Watermarking Techniques, Proc. of the IEEE,,pp pp , July M. Wu and B. Liu, Multimedia Data Hiding, Chapter 10 on SDMI audio watermark challenge, preprint, 2002 (electronic handout). M. Wu, W. Trappe, Z. Wang, and K.J.R. Liu: "Collusion Resistant Fingerprinting for Multimedia", IEEE Signal Processing Magazine, Special Issue on Digital Rights Management, pp.15-27, March p _paper/jnl/0403fpcollusionp _ IEEEfinal_ SPM.pdf This week s Lab session: Continue on audio project ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [20] ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [21]

6 To Explore Further: Type-I Additive Embedding Slides (created b P ENEE408G S For Further Explorations: General Formulation of Two Types of Watermarking Add secondary signal in host media Representative: spread spectrum embedding Add a noise-like signal and detection via correlation Good tradeoff between imperceptibility p and robustness Limited capacity: host signal often appears as major interferer data to be hidden modulation < X + noise, >= < + (X + noise), > X = X + marked copy X original source < X + noise - X, > = < + noise, > ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [23] ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [24] Type-II Relationship Enforcement Embedding Type-II Relationship Enforcement (cont d) 8G Slides (crea Deterministically enforcing relationship Secondary information carried solely in watermarked signal feature value 2kQ (2k+1)Q (2k+2)Q (2k+3)Q odd-even mapping lookup table mapping Representative: odd-even embedding No need to know host signal (no host interference) High capacity but limited robustness Robustness achieved by quantization or tolerance zone even 0 odd 1 E.g. enforcing black pixel# per block to odd/even to hide data in binary image General approach: Partition host signal space into sub-regions each region is labeled with 0 or 1 marked sig. is from a region close to orig. & labeled w/ the bit to hide Secondary info. carried solely in X difference (X -X) doesn t necessarily reflect the embedded data { b} data to 1 or 0 be hidden Advanced embedding: mapping X host sig. X = f( b ) marked copy Combining the two types with techniques suggested by info. theory ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [25] ENEE408G Capstone -- Multimedia Signal Processing MM Digital Rights [26]

WATERMARKING FOR IMAGE AUTHENTICATION

WATERMARKING FOR IMAGE AUTHENTICATION WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data

More information

An Incomplete Cryptography based Digital Rights Management with DCFF

An Incomplete Cryptography based Digital Rights Management with DCFF An Incomplete Cryptography based Digital Rights Management with DCFF Ta Minh Thanh Department of Computer Science Tokyo Institute of Technology 2-12-2, Ookayama, Meguro, Tokyo, 152-8552, Japan. Email:thanhtm@ks.cs.titech.ac.jp

More information

Multimedia Document Authentication using On-line Signatures as Watermarks

Multimedia Document Authentication using On-line Signatures as Watermarks Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and

More information

Security and protection of digital images by using watermarking methods

Security and protection of digital images by using watermarking methods Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking

More information

DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com

DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com DIGITAL WATERMARKING: FOSTERING AND ENHANCING LEGITIMATE PEER-TO-PEER (P2P) ECOSYSTEMS DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com Copyright 2006 1 TABLE OF CONTENTS

More information

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and

More information

Multimedia Data Hiding

Multimedia Data Hiding Multimedia Data Hiding Introduction! Digital Watermarking / Multimedia Data Hiding Hide secondary data in digital image/video/audio/3d! Uses of hidden data: ownership verification, alteration detection

More information

Wissenschaftliche Bewertung von DRM-Systemen Scientific evaluation of DRM systems

Wissenschaftliche Bewertung von DRM-Systemen Scientific evaluation of DRM systems Wissenschaftliche Bewertung von DRM-Systemen Scientific evaluation of DRM systems Hannes Federrath http://www.inf.tu-dresden.de/~hf2/ Adversary model Strength of existing systems Tendencies DRM technologies

More information

Image Authentication Scheme using Digital Signature and Digital Watermarking

Image Authentication Scheme using Digital Signature and Digital Watermarking www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for

More information

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know

More information

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.

More information

Experimental DRM Architecture Using Watermarking and PKI

Experimental DRM Architecture Using Watermarking and PKI Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,

More information

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity

More information

CHAPTER 7 CONCLUSION AND FUTURE WORK

CHAPTER 7 CONCLUSION AND FUTURE WORK 158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section

More information

Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12.

Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12. Digital Rights Management for Content Distribution Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003 Presented by An In seok. 2010.12.1 Contents

More information

Group Testing a tool of protecting Network Security

Group Testing a tool of protecting Network Security Group Testing a tool of protecting Network Security Hung-Lin Fu 傅 恆 霖 Department of Applied Mathematics, National Chiao Tung University, Hsin Chu, Taiwan Group testing (General Model) Consider a set N

More information

Content Control: Digital

Content Control: Digital White Paper Content Control: Digital Watermarking and Fingerprinting by Dominic Milano Content producers and publishers are continually seeking more reliable ways to control access to their valuable media

More information

Technical aspects of Digital Rights Management

Technical aspects of Digital Rights Management Technical aspects of Digital Rights Management Emilija Arsenova MI, RWTH-Aachen Table of content 1 Introduction... 3 2 Digital Rights Management (DRM)... 3 2.1 DRM Architecture...4 2.2 DRM Techniques...5

More information

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah

More information

A Digital Audio Watermark Embedding Algorithm

A Digital Audio Watermark Embedding Algorithm Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China tangxh@hziee.edu.cn,

More information

Security Based Data Transfer and Privacy Storage through Watermark Detection

Security Based Data Transfer and Privacy Storage through Watermark Detection Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant

More information

Safer data transmission using Steganography

Safer data transmission using Steganography Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: arul.bharathi@yahoo.com,

More information

Real-Time Audio Watermarking Based on Characteristics of PCM in Digital Instrument

Real-Time Audio Watermarking Based on Characteristics of PCM in Digital Instrument Journal of Information Hiding and Multimedia Signal Processing 21 ISSN 273-4212 Ubiquitous International Volume 1, Number 2, April 21 Real-Time Audio Watermarking Based on Characteristics of PCM in Digital

More information

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the

More information

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE

More information

encoding compression encryption

encoding compression encryption encoding compression encryption ASCII utf-8 utf-16 zip mpeg jpeg AES RSA diffie-hellman Expressing characters... ASCII and Unicode, conventions of how characters are expressed in bits. ASCII (7 bits) -

More information

Digital Rights Management

Digital Rights Management 2009 Levente Buttyán - piracy and DRM - basic model and architecture of DRM systems -MS Windows DRM -why DRM is bad? - content fingerprinting and watermarking - software protection techniques Introduction

More information

Digital Rights Management for the Online Music Business

Digital Rights Management for the Online Music Business Digital Rights Management for the Online Business Sai Ho Kwok Digital rights management has become a pressing concern for the online music business. Existing digital rights management systems are backed

More information

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Based Novel

More information

MovieLabs Specification for Enhanced Content Protection Version 1.0

MovieLabs Specification for Enhanced Content Protection Version 1.0 MovieLabs Specification for Enhanced Content Protection Version 1.0 Introduction Digital content distribution technologies are evolving and advancing at a rapid pace. Content creators are using these technologies

More information

An SDMI-based Rights Management Systems for Electronic Media Using Digital Watermarking

An SDMI-based Rights Management Systems for Electronic Media Using Digital Watermarking An SDMI-based Rights Management Systems for Electronic Media Using Digital Watermarking S. H. Kwok, C.C. Yang, K.Y. Tam, and Jason S.W. Wong Department of Information and Systems Management The Hong Kong

More information

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010 Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication

More information

A Robust Multimedia Contents Distribution over IP based Mobile Networks

A Robust Multimedia Contents Distribution over IP based Mobile Networks , pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering

More information

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero

More information

Combating Anti-forensics of Jpeg Compression

Combating Anti-forensics of Jpeg Compression IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng

More information

SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of

SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2010 APPROVED:

More information

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management

More information

Multi-factor Authentication in Banking Sector

Multi-factor Authentication in Banking Sector Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering

More information

A Secure Data Transmission By Integrating Cryptography And Video Steganography

A Secure Data Transmission By Integrating Cryptography And Video Steganography A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India shabanapk9999@gmail.com Abstract Advances

More information

Steganography And Digital Watermarking

Steganography And Digital Watermarking Steganography And Digital Watermarking Copyright 2004, Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett, School of Computer Science, The University of Birmingham. Permission is granted to

More information

Information Leakage in Encrypted Network Traffic

Information Leakage in Encrypted Network Traffic Information Leakage in Encrypted Network Traffic Attacks and Countermeasures Scott Coull RedJack Joint work with: Charles Wright (MIT LL) Lucas Ballard (Google) Fabian Monrose (UNC) Gerald Masson (JHU)

More information

IN THE recent decade, new devices and powerful software

IN THE recent decade, new devices and powerful software IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 12, NO. 6, JUNE 2003 685 Data Hiding in Image and Video: Part I Fundamental Issues and Solutions Min Wu, Member, IEEE, and Bede Liu, Fellow, IEEE Abstract In

More information

Reversible Data Hiding for Security Applications

Reversible Data Hiding for Security Applications Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.

More information

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.

More information

Digital Audio and Video Data

Digital Audio and Video Data Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each

More information

Robust Blind Watermarking Mechanism For Point Sampled Geometry

Robust Blind Watermarking Mechanism For Point Sampled Geometry Robust Blind Watermarking Mechanism For Point Sampled Geometry Parag Agarwal Balakrishnan Prabhakaran Department of Computer Science, University of Texas at Dallas MS EC 31, PO Box 830688, Richardson,

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

Next Tuesday. Digital Rights Management. Outline. Basic Problem. Copyright Crawler. Content hashing

Next Tuesday. Digital Rights Management. Outline. Basic Problem. Copyright Crawler. Content hashing CS 155 Spring 2006 Next Tuesday Digital Rights Management John Mitchell Paul Kocher President and Chief Scientist Cryptography Research, Inc. 2 Basic Problem Joey writes and records a song Song distributed

More information

Digital Rights Management. Introduction

Digital Rights Management. Introduction Digital Rights Management 12/1/2010 Digital Rights Management 1 Introduction Digital Rights Management (DRM) is a term used for systems that restrict the use of digital media DRM defends against the illegal

More information

A Concept of Digital Picture Envelope for Internet Communication

A Concept of Digital Picture Envelope for Internet Communication A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,

More information

MULTIMEDIA CONTENT PROTECTION VIA BIOMETRICS-BASED ENCRYPTION. Umut Uludag and Anil K. Jain

MULTIMEDIA CONTENT PROTECTION VIA BIOMETRICS-BASED ENCRYPTION. Umut Uludag and Anil K. Jain Copyright 22 IEEE. Published in the 23 International Conference on Multimedia and Expo (ICME 23), scheduled for July 6-9, 23 in Baltimore, Maryland, SA. Personal use of this material is permitted. However,

More information

INTELLECTUAL PROPERTY PROTECTION FOR ELECTRONIC COMMERCE APPLICATIONS

INTELLECTUAL PROPERTY PROTECTION FOR ELECTRONIC COMMERCE APPLICATIONS INTELLECTUAL PROPERTY PROTECTION FOR ELECTRONIC COMMERCE APPLICATIONS S.H. Kwok Department of Information and Systems Management The Hong Kong University of Science and Technology jkwok@ust.hk C.C. Yang

More information

Review of Medical Image Watermarking Requirements of Teleradiology

Review of Medical Image Watermarking Requirements of Teleradiology Chapter 2 Review of Medical Image Watermarking Requirements of Teleradiology 2.1 Introduction The technological advances in communication and digital system reflected radical change in facilitating medical

More information

A Survey of Error Resilient Coding Schemes for Image/Video Transmission Based on Data Embedding

A Survey of Error Resilient Coding Schemes for Image/Video Transmission Based on Data Embedding A Survey of Error Resilient Coding Schemes for Image/Video Transmission Based on Data Embedding Li-Wei Kang*( 康 立 威 ) and Jin-Jang Leou # ( 柳 金 章 ) *Institute of Information Science Academia Sinica, Taipei

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

WHITE PAPER MANAGING VALUABLE IMAGE ASSETS USING DIGITAL WATERMARKING FOR COPYRIGHT COMMUNICATION AND IMAGE SEARCH INTRODUCTION

WHITE PAPER MANAGING VALUABLE IMAGE ASSETS USING DIGITAL WATERMARKING FOR COPYRIGHT COMMUNICATION AND IMAGE SEARCH INTRODUCTION www.digitalwatermarkingalliance.org WHITE PAPER MANAGING VALUABLE IMAGE ASSETS USING DIGITAL WATERMARKING FOR COPYRIGHT COMMUNICATION AND IMAGE SEARCH INTRODUCTION Consider where you encounter digital

More information

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,

More information

Data Masking: A New Approach for Steganography?

Data Masking: A New Approach for Steganography? Journal of VLSI Signal Processing 41, 293 303, 2005 c 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands. DOI: 10.1007/s11265-005-4153-1 Data Masking: A New Approach for Steganography?

More information

What is Software Watermarking? Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks

What is Software Watermarking? Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks hat is Software atermarking? Software atermarking Through Register Allocation: Implementation, Analysis, and Attacks Ginger Myles Christian Collberg {mylesg,collberg}@cs.arizona.edu University of Arizona

More information

Steganography Detection for Digital Forensics

Steganography Detection for Digital Forensics Sage LaTorra Digital Forensics Steganography Detection for Digital Forensics Steganography is the pursuit of cryptography that doesn't appear to be cryptography. In essence, steganography is hiding a message

More information

THE PURPOSE of a digital watermark is to embed auxiliary

THE PURPOSE of a digital watermark is to embed auxiliary IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 1, FEBRUARY 2005 43 Statistical Invisibility for Collusion-Resistant Digital Video Watermarking Karen Su, Student Member, IEEE, Deepa Kundur, Senior Member,

More information

Secret Communication through Web Pages Using Special Space Codes in HTML Files

Secret Communication through Web Pages Using Special Space Codes in HTML Files International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a

More information

Video-Conferencing System

Video-Conferencing System Video-Conferencing System Evan Broder and C. Christoher Post Introductory Digital Systems Laboratory November 2, 2007 Abstract The goal of this project is to create a video/audio conferencing system. Video

More information

5 Digital Rights Management

5 Digital Rights Management 5 Digital Rights Management 5.1 Media Rights 5.2 Rights Models 5.3 Principles of Encryption-Based DRM Systems 5.4 Watermarking 5.5 DRM Standards and Selected Commercial Solutions Literature: Bill Rosenblatt,

More information

Data Hiding: Current Status and Key Issues

Data Hiding: Current Status and Key Issues International Journal of Network Security, Vol.4, No.1, PP.1 9, Jan. 2007 1 Data Hiding: Current Status and Key Issues Nan-I Wu 1 and Min-Shiang Hwang 2 (Corresponding author: Min-Shiang Hwang) Institute

More information

Steganography and Visual Cryptography in Computer Forensics

Steganography and Visual Cryptography in Computer Forensics 2010 Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering Steganography and Visual Cryptography in Computer Forensics George Abboud Department of Computer Engineering and

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ($Billion Dollars) Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com

More information

A comprehensive survey on various ETC techniques for secure Data transmission

A comprehensive survey on various ETC techniques for secure Data transmission A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and

More information

AN OVERVIEW OF IMAGE STEGANOGRAPHY

AN OVERVIEW OF IMAGE STEGANOGRAPHY AN OVERVIEW OF IMAGE STEGANOGRAPHY T. Morkel 1, J.H.P. Eloff 2, M.S. Olivier 3 Information and Computer Security Architecture (ICSA) Research Group Department of Computer Science University of Pretoria,

More information

Evaluating the Feasibility of Digital Watermarking To Enforce Music Copyright

Evaluating the Feasibility of Digital Watermarking To Enforce Music Copyright Evaluating the Feasibility of Digital Watermarking To Enforce Music Copyright CS 588: Final Project Rob Farraher Ken Pickering Lim Vu Date Due: 12/04/01 Introduction With the tremendous increase in the

More information

CSC574 - Computer and Network Security Module: Intrusion Detection

CSC574 - Computer and Network Security Module: Intrusion Detection CSC574 - Computer and Network Security Module: Intrusion Detection Prof. William Enck Spring 2013 1 Intrusion An authorized action... that exploits a vulnerability... that causes a compromise... and thus

More information

Real-Time DMB Video Encryption in Recording on PMP

Real-Time DMB Video Encryption in Recording on PMP Real-Time DMB Video Encryption in Recording on PMP Seong-Yeon Lee and Jong-Nam Kim Dept. of Electronic Computer Telecommunication Engineering, PuKyong Nat'l Univ. sylee9997@pknu.ac.kr, jongnam@pknu.ac.kr

More information

Controlled Sharing of Personal Content Using Digital Rights Management

Controlled Sharing of Personal Content Using Digital Rights Management Controlled Sharing of Personal Content Using Digital Rights Management Claudine Conrado, Milan Petkovic, Michiel van der Veen and Wytse van der Velde Department of Information and System Security Philips

More information

Triple Security of Information Using Stegnography and Cryptography

Triple Security of Information Using Stegnography and Cryptography Triple Security of Information Using Stegnography and Cryptography Abstract In this growing age information sharing and transfer has increased exponentially so, security is a primary requirement for all

More information

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication

More information

A Look at Emerging Standards in Video Security Systems. Chris Adesanya Panasonic Network Systems Company Chris.Adesanya@us.panasonic.

A Look at Emerging Standards in Video Security Systems. Chris Adesanya Panasonic Network Systems Company Chris.Adesanya@us.panasonic. A Look at Emerging Standards in Video Security Systems Chris Adesanya Panasonic Network Systems Company Chris.Adesanya@us.panasonic.com Standards Standards are published documents that establish specifications

More information

Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware

Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware Cumhur Doruk Bozagac Bilkent University, Computer Science and Engineering Department, 06532 Ankara, Turkey

More information

Data Storage 3.1. Foundations of Computer Science Cengage Learning

Data Storage 3.1. Foundations of Computer Science Cengage Learning 3 Data Storage 3.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: List five different data types used in a computer. Describe how

More information

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR

More information

Alternative security architecture for IP Telephony based on digital watermarking

Alternative security architecture for IP Telephony based on digital watermarking Alternative security architecture for IP Telephony based on digital watermarking Wojciech Mazurczyk 1, Zbigniew Kotulski 1,2 1 Warsaw University of Technology, Faculty of Electronics and Information Technology,

More information

A Lightweight Rao-Cauchy Detector for Additive Watermarking in the DWT-Domain

A Lightweight Rao-Cauchy Detector for Additive Watermarking in the DWT-Domain A Lightweight Rao-Cauchy Detector for Additive Watermarking in the DWT-Domain Roland Kwitt, Peter Meerwald, Andreas Uhl Dept. of Computer Sciences, University of Salzburg, Austria E-Mail: {rkwitt, pmeerw,

More information

HIGH-QUALITY FREQUENCY DOMAIN-BASED AUDIO WATERMARKING. Eric Humphrey. School of Music Engineering Technology University of Miami

HIGH-QUALITY FREQUENCY DOMAIN-BASED AUDIO WATERMARKING. Eric Humphrey. School of Music Engineering Technology University of Miami HIGH-QUALITY FREQUENCY DOMAIN-BASED AUDIO WATERMARKING Eric Humphrey School of Music Engineering Technology University of Miami ABSTRACT An investigation of current audio watermarking technology is provided,

More information

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate

More information

πωχ Notes on Domino Black Hat Las Vegas 2003 Aldora Louw PricewaterhouseCoopers

πωχ Notes on Domino Black Hat Las Vegas 2003 Aldora Louw PricewaterhouseCoopers Notes on Domino Black Hat Las Vegas 2003 Aldora Louw PricewaterhouseCoopers Lotus Domino is inherently secure...a Misconception!!! Security is Not Automatic!!!! Slide #2 Security Requires Planning Design

More information

AN EFFICIENT WEB MONITOR FOR LEAKAGE DETECTION AND VIDEO STREAMING IN TRUSTED NETWORKS

AN EFFICIENT WEB MONITOR FOR LEAKAGE DETECTION AND VIDEO STREAMING IN TRUSTED NETWORKS AN EFFICIENT WEB MONITOR FOR LEAKAGE DETECTION AND VIDEO STREAMING IN TRUSTED NETWORKS K.Bhavana Priya 1, M.Azhagiri 2 1 Student, Computer Science Engineering, Kingston Engineering College(India) 2 Assistant

More information

INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY. Implementation of Multi-Factor Authentication Scheme

INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY. Implementation of Multi-Factor Authentication Scheme IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY Implementation of Multi-Factor Authentication Scheme Vasundhara Bhele Prof. Nilesh Chaubey Prof. Shyam Dubey Computer Science &

More information

Digital Audio Compression: Why, What, and How

Digital Audio Compression: Why, What, and How Digital Audio Compression: Why, What, and How An Absurdly Short Course Jeff Bier Berkeley Design Technology, Inc. 2000 BDTI 1 Outline Why Compress? What is Audio Compression? How Does it Work? Conclusions

More information

!"#$"%&' What is Multimedia?

!#$%&' What is Multimedia? What is Multimedia? %' A Big Umbrella Goal of This Course Understand various aspects of a modern multimedia pipeline Content creating, editing Distribution Search & mining Protection Hands-on experience

More information

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant

More information

Content Protection and Security Considerations for 5G KILROY HUGHES 2015.08.20

Content Protection and Security Considerations for 5G KILROY HUGHES 2015.08.20 Content Protection and Security Considerations for 5G KILROY HUGHES 2015.08.20 5G Content Protection and Security Topics 1. Is that a computer in your pocket? (or, are you just happy to see me? Mae West)

More information

Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS

Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Authentication

More information

Chapter 6 CDMA/802.11i

Chapter 6 CDMA/802.11i Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

Comparison of Enterprise Digital Rights Management systems

Comparison of Enterprise Digital Rights Management systems Comparison of Enterprise Digital Rights Management systems M.H. van Beek Master Thesis Computer Science MT Advice report Aia Software Thesis number 565 June 22, 2007 Radboud University Nijmegen Computer

More information

Classes of multimedia Applications

Classes of multimedia Applications Classes of multimedia Applications Streaming Stored Audio and Video Streaming Live Audio and Video Real-Time Interactive Audio and Video Others Class: Streaming Stored Audio and Video The multimedia content

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

Privacy-Aware Peer-to-Peer Content Distribution Using Automatically Recombined Fingerprints

Privacy-Aware Peer-to-Peer Content Distribution Using Automatically Recombined Fingerprints Noname manuscript No. (will be inserted by the editor) Privacy-Aware Peer-to-Peer Content Distribution Using Automatically Recombined Fingerprints David Megías Josep Domingo-Ferrer Received: date / Accepted:

More information