Overview of State-of-the-Art Watermarking Technologies. Majid Rabbani Eastman Kodak Company

Size: px
Start display at page:

Download "Overview of State-of-the-Art Watermarking Technologies. Majid Rabbani Eastman Kodak Company"

Transcription

1 Overview of State-of-the-Art Watermarking Technologies Majid Rabbani Eastman Kodak Company

2 Data Embedding and Steganography Data embedding and watermarking techniques are particular embodiments of digital steganography, a composite word from the Greek words stegano (στεγανω) meaning covered, and graphos, meaning to write

3 Types of Watermarks Visible Invisible: perceptually transparent Fragile: (breaks down by slightest image alteration) Robust: (survives severe manipulation or tampering) Private: requires original or reference image for watermark detection Public (oblivious): does not require the original image

4 Applications of Watermarking Copyright and content protection Authentication and integrity verification Image tagging (tracing original that has been illegally copied) Security (e.g., passport photos) Metadata tagging (info about content, website address, etc.) Usage control Secret communication Many more.

5 Example of IBM s Visible Watermarking* *Downloaded from the IBM Website

6 Fragile Watermarking The slightest alteration of the image destroys the watermark. Used for authentication (at a pixel level or small block). Image X Watermark W Secret key Fragile Watermark Insertion Scheme Watermarked Image X Watermarked Image X Watermark W Secret (or Public) key Fragile Watermark Detection Scheme Authentication

7 Yueng Mintzer Fragile Watermarking (ref 1) A random key is used to build a lookup table that maps image pixel values to a binary value. The watermark is a binary image with the same dimensions as the original image (e.g., tiled version of a binary logo). For every pixel in the original image, the output of the LUT is found (with that pixel value as input) and compared to the watermark binary value at that location: If the same, the pixel value is left unchanged If different, the pixel value is altered by the smallest amount needed to create the desired output. The processed image replaces the original image as original.

8 Yueng Mintzer Fragile Watermarking Advantages Authentication is done on a pixel-by-pixel basis Disadvantages Cryptographic strength of the algorithm has not been widely studied - might be vulnerable to attacks. Difficult to adapt to applications where JPEG compression (or any other form of lossy compression) is used. The original image after watermarking can be perceptually different from the truly original image depending on the LUT used.

9 Example of Yeung-Mintzer Technique* Original Watermarked *Courtesy of M. Yeung and F. Mintzer, IBM.

10 Example of Yeung-Mintzer Technique* Watermarked, unaltered Watermarked, altered *Courtesy of M. Yeung and F. Mintzer, IBM.

11 Wong s Fragile Watermarking Technique (ref 2) Partition the image into blocks of n x n pixels (e.g., n = 8). For each block, strip-off the LSB of each pixel, Concatenate the remaining higher-order bits, the image size parameters, any metadata, and find its hashed value, Encrypt the first n 2 hashed values with the private key of a public-key encryption system (e.g., RSA), Exclusive OR the encrypted bitstream with a binary watermark, and Insert back the resulting bit stream in the least significant bit of the pixels in the image block.

12 Example of Wong s Fragile Watermarking* *Courtesy of P. Wong, Hewlett-Packard Company

13 Robust Watermarking Image X Watermark W Secret key Robust Watermark Insertion Scheme Watermarked Image X Watermarked Image X Secret (or Public) key Robust Watermark Extraction Extracted Watermark Watermarked Image X Watermark W Secret (or Public) key Robust Watermark Detection Yes or No

14 Robust Watermarking Desirable Properties Perceptual transparency Data capacity Robustness to unintentional image processing operations (e.g., compression, linear and nonlinear filtering, random noise, rotation and scale, cropping, analog conversion, etc.) Tamper resistance: difficulty for an attacker to destroy and remove, alter, or forge a message once it has been embedded as a watermark in an image. Computational complexity Need for an original (reference) image

15 Robust Watermarking Spatial domain techniques, examples include: MIT Patchwork (ref 3) Digimarc algorithm (ref 4) Kodak s algorithm Frequency domain techniques, examples include: Cox et al. spread spectrum technique (ref 5) IA-DCT and IA-W: perceptual watermarking of linear transforms (e.g., block DCT, wavelets) (ref 6)

16 The MIT Patchwork Technique A secret key is used to randomly select a subset of pixels in an image and then divide it into two distinct sets. The brightness of one set of pixels is shifted by a positive number, while the brightness of those in the other set are shifted by the corresponding negative number. Detection consists of partitioning the image into the corresponding sets using the secret key and computing the mean intensities of the pixels in each groups and finding their difference (for an unmarked image, the difference ~0). Only a limited amount of information can be embedded, even if the image is divided into several sets and a different bit is embedded in each set.

17 Watermarking Insertion Technique of Digimarc To embed N bits of information, N sequences of random numbers, each with the same dimension and extent as the original image, are generated (e.g., a user private key can be used to generate Gaussian numbers). The random numbers in each sequence are multiplied by their corresponding message bit values and added together to create a message image. The amplitude of the message image is attenuated down to an acceptable perceived noise amplitude to create the watermark image which is then added to the original image.

18 Digimarc s Watermarking Extraction Technique The original image is needed for watermark extraction, otherwise, small-signal detection techniques can be used to recover the watermark with a smaller probability of success. The image in question is first normalized both in scale and in RMS sense and is then subtracted from the original. The difference signal is cross-correlated with each of the N embedded message bits and the peak cross correlation value is recorded and used to decide the presence of 0 or 1. The code 0101 is always used as the first four bits, both as a calibrator (on the mean values of the 0 and 1, and on further registration of the two signals) and as an indication of the probable existence of the N-bit message.

19 Kodak s Robust Watermarking (Embedding) OR ICONIC BINARY Convolve Scale to small amplitude Flat spectrum / Random phase + Original image Data embedded image

20 Kodak s Robust Watermarking (Extraction) Sum of sections Flat spectrum / Random phase Correlate ICONIC Display OR BINARY Data embedded image

21 Example of Kodak s Robust Watermarking Original color image, 768x 512

22 Example of Kodak s Robust Watermarking Watermarked image bits embedded

23 Example of Kodak s Robust Watermarking Watermarked image with 20:1 JPEG compression bits extracted

24 Example of Kodak s Robust Watermarking Watermarked image with (20:1) JPEG + noise bits extracted

25 Example of Kodak s Robust Watermarking Watermarked image with JPEG + noise + scratches bits extracted

26 Example of Kodak s Robust Watermarking (20:1) JPEG + noise + scratches + 2-bit FS halftoning bits extracted

27 Cox et al. s Spread Spectrum Technique Compute the full-frame DCT of the original image and identify the perceptually significant coefficients (usually ~1000 coefficients) suitable for watermark embedding. Construct the watermark X = x 1, x 2,, x n, where each x i is chosen according to a Gaussian distribution with mean µ and variance σ 2, generated with a user private key. Insert the watermark in the DCT domain by modifying the DCT coefficient ν i according to : (α i is a scaling factor) ν i ν i (1+α i x i ). Compute the inverse DCT of the modified coefficients to construct a transparently marked image.

28 Cox s Technique Watermark Extraction Watermark detection requires access to the original image. Compute the DCT of a possibly watermarked image. Compute the DCT of the original image. Compute the difference between the results of the previous two steps and scale at each frequency according to ν i α i to create a potential watermark X*. Compare the original watermark X to X* using a similarity (correlation) measure defined by sim (X, X*) = X X* X* X*

29 Example of Cox s Robust Watermarking* Original Watermarked with α = 0.1 *Courtesy of C. Podilchuk, Bell Labs, Lucent Technologies

30 IA-DCT: Example of Perceptual Watermarking The image is partitioned into 8x8 blocks and the DCT of each block is computed (processing by blocks provides local control for incorporating local visual masking). Denoting by X u,v,b the DCT coefficients of the original image at position (u,v) of block b, by X* u,v,b the watermarked DCT coefficient, by W u,v,b the sequence of watermark values (generated according to a Gaussian distribution with a user secret key), and by J u,v,b the just noticeable differences computed from the original image, the insertion process is described as: X * u, v, b = X u, v, b + Ju, v, bwu, v, b, X u, v, b > J X u, v, b, otherwise u, v, b

31 IA-DCT Watermark Extraction The original image is required for best results (since the J values depend on the DCT coefficients in the original image), but authors claim that reasonable performance can also be obtained in the absence of the original. The detection scheme is similar to the spread spectrum technique and is based on classical detection theory. The image in question is subtracted from the original and the correlation between the signal difference and a specific watermark sequence is determined. The correlation value is compared to a threshold to determine presence/absence of the watermark.

32 Example of IA-DCT Robust Watermarking* IA-DCT watermarked (Original - Watermarked) scaled up *Courtesy of E. Delp, Purdue University & C. Podilchuk, Bell Labs, Lucent Technologies

33 Steganalysis Steganalysis is the science of attacking steganographic methods by detection, destruction, extraction, or alteration of the embedded data. It is assumed that the attacker understands the steganographic technique, so the effectiveness of the used method should lie in the selection of the of the setgo-key and not in the proprietary and secret nature of the method (Kerkhoff s principle in cryptography). stego-only known cover known message chosen stego chosen message

34 References 1 M. Yeung and F. Mintzer, An invisible watermarking technique for image verification, Proceedings of ICIP, Santa Barbara, CA, Oct , 1997, vol. 2, pp P. W. Wong, A public key watermark for image verification and authentication, Proceedings of ICIP, 1998, Chicago, pp W. Bender, D. Gruhl, and N. Morimoto, Techniques for data hiding, Technical Report, Massachusetts Institute of Technology Media Lab, G. B. Rhoads, Method and apparatus responsive to a code signal conveyed through a graphic image, US Patent 5,710,834, Issued January 20, I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol. 6, no. 12, December, 1997, pp R. B. Wolfgang, C. I. Podilchuk, and E. Delp, Perceptual watermarks for digital images and video, IEEE Proceedings, vol 87, no 7, July of M. D. Swanson, M. Kobayashi, and A. H. Tewfik, Multimedia data embedding and watermarking technologies, Proceedings of the IEEE, vol. 86, no. 6, June, 1998, pp R. Anderson and F. Petitcolas, On the limits of steganography, IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, May, 1998, pp F. Mintzer, G. W. Braudaway and M. Yeung, Effective and ineffective digital watermarks, Proceedings of ICIP, October 26-29, 1997, Santa Barbara, CA, vol. 3, pp S. Craver, N. Memon, B.-L. Yeo and M. Yeung. Can invisible watermarks resolve rightful ownerships? Proceedings of the SPIE International Conference on Storage and Retrieval for Image and Video Databases V, Feb , 1997, San Jose, CA, vol. 3022, pp

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and

More information

WATERMARKING FOR IMAGE AUTHENTICATION

WATERMARKING FOR IMAGE AUTHENTICATION WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data

More information

Image Authentication Scheme using Digital Signature and Digital Watermarking

Image Authentication Scheme using Digital Signature and Digital Watermarking www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for

More information

Security and protection of digital images by using watermarking methods

Security and protection of digital images by using watermarking methods Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking

More information

Multimedia Document Authentication using On-line Signatures as Watermarks

Multimedia Document Authentication using On-line Signatures as Watermarks Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and

More information

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.

More information

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

A Digital Audio Watermark Embedding Algorithm

A Digital Audio Watermark Embedding Algorithm Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China tangxh@hziee.edu.cn,

More information

Watermark Design Pattern for Intellectual Property Protection in Electronic Commerce Applications

Watermark Design Pattern for Intellectual Property Protection in Electronic Commerce Applications Design Pattern for Intellectual Property Protection in Electronic Commerce Applications S.H. Kwok Department of Information and Systems Management The Hong Kong University of Science and Technology Clear

More information

Multi-factor Authentication in Banking Sector

Multi-factor Authentication in Banking Sector Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering

More information

Safer data transmission using Steganography

Safer data transmission using Steganography Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: arul.bharathi@yahoo.com,

More information

CHAPTER 7 CONCLUSION AND FUTURE WORK

CHAPTER 7 CONCLUSION AND FUTURE WORK 158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section

More information

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE

More information

Generating Robust Digital Signature for Image/Video Authentication

Generating Robust Digital Signature for Image/Video Authentication Generating Robust Digital Signature for Image/Video Authentication Ching-Yung Lin and Shih-Fu Chang Department of Electrical Engineering and New Media Technology Center Columbia University New York, NY

More information

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero

More information

AN OVERVIEW OF IMAGE STEGANOGRAPHY

AN OVERVIEW OF IMAGE STEGANOGRAPHY AN OVERVIEW OF IMAGE STEGANOGRAPHY T. Morkel 1, J.H.P. Eloff 2, M.S. Olivier 3 Information and Computer Security Architecture (ICSA) Research Group Department of Computer Science University of Pretoria,

More information

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah

More information

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,

More information

Digimarc for Images. Best Practices Guide (Chroma + Classic Edition)

Digimarc for Images. Best Practices Guide (Chroma + Classic Edition) Digimarc for Images Best Practices Guide (Chroma + Classic Edition) Best Practices Guide (Chroma + Classic Edition) Why should you digitally watermark your images? 3 What types of images can be digitally

More information

International Journal of Computer Sciences and Engineering Open Access. A novel technique to hide information using Daubechies Transformation

International Journal of Computer Sciences and Engineering Open Access. A novel technique to hide information using Daubechies Transformation International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 A novel technique to hide information using Daubechies Transformation Jyotsna

More information

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2012/2013 1 ABSTRACT Steganography is the art or science in hiding. It is origin from

More information

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.

More information

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know

More information

Security Based Data Transfer and Privacy Storage through Watermark Detection

Security Based Data Transfer and Privacy Storage through Watermark Detection Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant

More information

Technical aspects of Digital Rights Management

Technical aspects of Digital Rights Management Technical aspects of Digital Rights Management Emilija Arsenova MI, RWTH-Aachen Table of content 1 Introduction... 3 2 Digital Rights Management (DRM)... 3 2.1 DRM Architecture...4 2.2 DRM Techniques...5

More information

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010 Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication

More information

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity

More information

A Concept of Digital Picture Envelope for Internet Communication

A Concept of Digital Picture Envelope for Internet Communication A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,

More information

Steganography and Visual Cryptography in Computer Forensics

Steganography and Visual Cryptography in Computer Forensics 2010 Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering Steganography and Visual Cryptography in Computer Forensics George Abboud Department of Computer Engineering and

More information

Triple Security of Information Using Stegnography and Cryptography

Triple Security of Information Using Stegnography and Cryptography Triple Security of Information Using Stegnography and Cryptography Abstract In this growing age information sharing and transfer has increased exponentially so, security is a primary requirement for all

More information

International ejournals

International ejournals ISSN 0976 1411 Available online at www.internationalejournals.com International ejournals International ejournal of Mathematics and Engineering 227 (2013) 2216-2222 EFFICIENT METHOD OF AUDIO STEGANOGRAPHY

More information

JPEG Image Compression by Using DCT

JPEG Image Compression by Using DCT International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-4 E-ISSN: 2347-2693 JPEG Image Compression by Using DCT Sarika P. Bagal 1* and Vishal B. Raskar 2 1*

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

Steganography And Digital Watermarking

Steganography And Digital Watermarking Steganography And Digital Watermarking Copyright 2004, Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett, School of Computer Science, The University of Birmingham. Permission is granted to

More information

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Based Novel

More information

A Secure Data Transmission By Integrating Cryptography And Video Steganography

A Secure Data Transmission By Integrating Cryptography And Video Steganography A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India shabanapk9999@gmail.com Abstract Advances

More information

Using fractal compression scheme to embed a digital signature into an image

Using fractal compression scheme to embed a digital signature into an image Using fractal compression scheme to embed a digital signature into an image Joan Puate, Fred Jordan Swiss federal institute of technology Signal Processing Laboratory CH-1015 Lausanne Switzerland Email:

More information

Audio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking?

Audio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking? ENEE408G Lecture-9 Last Lecture Digital Watermarking and Fingerprinting for Digital Rights Protection of Multimedia URL: http://www.ece.umd.edu/class/enee408g/ Slides included here are based on Spring

More information

Online Voting System Using Three Factor Authentication

Online Voting System Using Three Factor Authentication ISSN(Online): 232-98 Vol. 3, Issue 3, March 25 Online Voting System Using Three Factor Authentication Rashmi Nade, Monali Raut, Punam Agawane, Jayshree Shinde Student, Dept. of I.T., BVCOEW, Savitribai

More information

Soumendu Chakraborty, Anand Singh Jalal* and Charul Bhatnagar

Soumendu Chakraborty, Anand Singh Jalal* and Charul Bhatnagar ----------------------------------------------------------------------------- An Efficient Bit Plane X-ORing Algorithm for Irreversible Image Steganography -----------------------------------------------------------------------------

More information

Secure Digital Camera

Secure Digital Camera Secure Digital Camera Paul Blythe and Jessica Fridrich Department of Electrical and Computer Engineering SUNY Binghamton, Binghamton, NY 13902-6000 {pblythe, fridrich}@binghamton.edu ABSTRACT In this paper,

More information

Combating Anti-forensics of Jpeg Compression

Combating Anti-forensics of Jpeg Compression IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng

More information

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM BARJINDER SINGH 1, BALPREET KAUR 2, RANJOT KAUR 3 1 Research Scholar at BBSBEC, Fatehgarh sahib 2 Lecturer at BBSBEC Fatehgarh

More information

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Side Channel Analysis and Embedded Systems Impact and Countermeasures Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side

More information

Wissenschaftliche Bewertung von DRM-Systemen Scientific evaluation of DRM systems

Wissenschaftliche Bewertung von DRM-Systemen Scientific evaluation of DRM systems Wissenschaftliche Bewertung von DRM-Systemen Scientific evaluation of DRM systems Hannes Federrath http://www.inf.tu-dresden.de/~hf2/ Adversary model Strength of existing systems Tendencies DRM technologies

More information

Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT

Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT Ammar Jameel Hussein, Seda Yuksel, and Ersin Elbasi Abstract In order to achieve a good imperceptibility and robustness, using 4-level

More information

Experimental DRM Architecture Using Watermarking and PKI

Experimental DRM Architecture Using Watermarking and PKI Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,

More information

Steganography- A Data Hiding Technique

Steganography- A Data Hiding Technique Steganography- A Data Hiding Technique Arvind Kumar Assistant Professor Vidya College of engineering, Meerut, India Km. Pooja Vankateshwara institute of computer Science and technology, Meerut, India ABSTRACT

More information

Secret Communication through Web Pages Using Special Space Codes in HTML Files

Secret Communication through Web Pages Using Special Space Codes in HTML Files International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a

More information

Multiple Embedding Using Robust Watermarks for Wireless Medical Images

Multiple Embedding Using Robust Watermarks for Wireless Medical Images Multiple Embedding Using Robust Watermarks for Wireless Medical Images Dominic Osborne and Derek Abbott Centre for Biomedical Engineering (CBME) The University of Adelaide, SA 5005, Australia Matthew Sorell

More information

An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP

An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP Rui Miao Department of Electronic Engineering, Tsinghua University, Beijing, China rm870725@gmail.com Yongfeng

More information

INTELLECTUAL PROPERTY PROTECTION FOR ELECTRONIC COMMERCE APPLICATIONS

INTELLECTUAL PROPERTY PROTECTION FOR ELECTRONIC COMMERCE APPLICATIONS INTELLECTUAL PROPERTY PROTECTION FOR ELECTRONIC COMMERCE APPLICATIONS S.H. Kwok Department of Information and Systems Management The Hong Kong University of Science and Technology jkwok@ust.hk C.C. Yang

More information

Image Compression through DCT and Huffman Coding Technique

Image Compression through DCT and Huffman Coding Technique International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul

More information

Data Masking: A New Approach for Steganography?

Data Masking: A New Approach for Steganography? Journal of VLSI Signal Processing 41, 293 303, 2005 c 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands. DOI: 10.1007/s11265-005-4153-1 Data Masking: A New Approach for Steganography?

More information

Steganography Detection for Digital Forensics

Steganography Detection for Digital Forensics Sage LaTorra Digital Forensics Steganography Detection for Digital Forensics Steganography is the pursuit of cryptography that doesn't appear to be cryptography. In essence, steganography is hiding a message

More information

SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of

SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2010 APPROVED:

More information

Modeling the Print-Scan Process for Resilient Data Hiding

Modeling the Print-Scan Process for Resilient Data Hiding Modeling the Print-Scan Process for Resilient Data Hiding Kaushal Solanki, Upamanyu Madhow, Banglore S. Manjunath, and Shiv Chandrasekaran Department of Electrical and Computer Engineering University of

More information

International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 9, September 2012)

International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 9, September 2012) Authentication of Medical Images using Integer Transforms A.Kannammal 1, Dr.S.Subha Rani 2 1 Assistant professor, 2 Professor and Head, ECE Department, PSG College of Technology, Peelamedu, Coimbatore

More information

International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 Least Significant Bit algorithm for image steganography

International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 Least Significant Bit algorithm for image steganography Champakamala.B.S, Padmini.K, Radhika.D. K Asst Professors, Department of TCE, Don Bosco Institute of Technology,Bangalore, India Abstract Steganography is one of the most powerful techniques to conceal

More information

Research Journal of Recent Sciences ISSN 2277-2502 Vol. 4(12), 71-76, December (2015)

Research Journal of Recent Sciences ISSN 2277-2502 Vol. 4(12), 71-76, December (2015) Research Journal of Recent Sciences ISSN 2277-2502 Digital Medical Image Security in Teleradiology using Tamper Localization and Lossless Recovery Watermarking based on LZW lossless compressed Watermark

More information

An Incomplete Cryptography based Digital Rights Management with DCFF

An Incomplete Cryptography based Digital Rights Management with DCFF An Incomplete Cryptography based Digital Rights Management with DCFF Ta Minh Thanh Department of Computer Science Tokyo Institute of Technology 2-12-2, Ookayama, Meguro, Tokyo, 152-8552, Japan. Email:thanhtm@ks.cs.titech.ac.jp

More information

Information Hiding by Stochastic Diffusion and its Application to Printed Document Authentication

Information Hiding by Stochastic Diffusion and its Application to Printed Document Authentication ISSC 2009, UCD, June 10-11th Information Hiding by Stochastic Diffusion and its Application to Printed Document Authentication SFI Stokes Professor of DSP Faculty of Engineering Dublin Institute of Technology

More information

Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography

Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography 502 Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography 1 Vinay Wadekar, 2 Ajinkya Jadhavrao, 3 Sharad Ghule, 4 Akshay Kapse 1,2,3,4 Computer Engineering, University Of Pune, Pune,

More information

ROBUST CONTENT-BASED VIDEO WATERMARKING EXPLOITING MOTION ENTROPY MASKING EFFECT

ROBUST CONTENT-BASED VIDEO WATERMARKING EXPLOITING MOTION ENTROPY MASKING EFFECT ROBUST CONTENT-BASED VIDEO WATERMARKING EXPLOITING MOTION ENTROPY MASKING EFFECT Amir Houmansadr, Hamed Pirsiaash Department of electrical engineering, Sharif Uniersity of Technology, Azadi Ae., Tehran,

More information

MULTIFACTOR AUTHENTICATION FOR SOFTWARE PROTECTION

MULTIFACTOR AUTHENTICATION FOR SOFTWARE PROTECTION Diyala Journal of Engineering Sciences Second Engineering Scientific Conference College of Engineering University of Diyala 16-17 December. 2015, pp. 479-492 ISSN 1999-8716 Printed in Iraq MULTIFACTOR

More information

Real-Time Audio Watermarking Based on Characteristics of PCM in Digital Instrument

Real-Time Audio Watermarking Based on Characteristics of PCM in Digital Instrument Journal of Information Hiding and Multimedia Signal Processing 21 ISSN 273-4212 Ubiquitous International Volume 1, Number 2, April 21 Real-Time Audio Watermarking Based on Characteristics of PCM in Digital

More information

Image Information Hiding: An Survey

Image Information Hiding: An Survey Image Information Hiding: An Survey D. Saravanan*, A. Ronald Doni** & A. Abisha Ajith*** *Assistant Professor, Department of MCA, Sathyabama University, Chennai, Tamilnadu, INDIA. E-Mail: sa_roin@yahoo.com

More information

DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com

DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com DIGITAL WATERMARKING: FOSTERING AND ENHANCING LEGITIMATE PEER-TO-PEER (P2P) ECOSYSTEMS DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com Copyright 2006 1 TABLE OF CONTENTS

More information

Alternative security architecture for IP Telephony based on digital watermarking

Alternative security architecture for IP Telephony based on digital watermarking Alternative security architecture for IP Telephony based on digital watermarking Wojciech Mazurczyk 1, Zbigniew Kotulski 1,2 1 Warsaw University of Technology, Faculty of Electronics and Information Technology,

More information

Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS

Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Authentication

More information

Data Hiding: Current Status and Key Issues

Data Hiding: Current Status and Key Issues International Journal of Network Security, Vol.4, No.1, PP.1 9, Jan. 2007 1 Data Hiding: Current Status and Key Issues Nan-I Wu 1 and Min-Shiang Hwang 2 (Corresponding author: Min-Shiang Hwang) Institute

More information

Stegosaurus Development Report

Stegosaurus Development Report Stegosaurus Development Report Final Report Word Count: 2489 Dhaval Miyani (Programmer) Abhishek Rudra (Programmer) Brendan Smith (Apper) University of Toronto April 09, 2015 Introduction Stegosaurus is

More information

Study on Image Steganography Techniques

Study on Image Steganography Techniques Study on Image Steganography Techniques C.Gayathri #1, V.Kalpana #2 Computer Science & Engineering, School of Computing, SASTRAUNIVERSITY, Tirumalaisamudram, Thanjavur - 613401.Tamilnadu, India 1 infotechgayathri@gmail.com

More information

Reversible Data Hiding for Security Applications

Reversible Data Hiding for Security Applications Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.

More information

Euler Vector: A Combinatorial Signature for Gray-Tone Images

Euler Vector: A Combinatorial Signature for Gray-Tone Images Euler Vector: A Combinatorial Signature for Gray-Tone Images Arijit Bishnu, Bhargab B. Bhattacharya y, Malay K. Kundu, C. A. Murthy fbishnu t, bhargab, malay, murthyg@isical.ac.in Indian Statistical Institute,

More information

An SDMI-based Rights Management Systems for Electronic Media Using Digital Watermarking

An SDMI-based Rights Management Systems for Electronic Media Using Digital Watermarking An SDMI-based Rights Management Systems for Electronic Media Using Digital Watermarking S. H. Kwok, C.C. Yang, K.Y. Tam, and Jason S.W. Wong Department of Information and Systems Management The Hong Kong

More information

A Feature Selection Methodology for Steganalysis

A Feature Selection Methodology for Steganalysis A Feature Selection Methodology for Steganalysis Yoan Miche 1, Benoit Roue 2, Amaury Lendasse 1, Patrick Bas 12 1 Laboratory of Computer and Information Science Helsinki University of Technology P.O. Box

More information

Friendly Medical Image Sharing Scheme

Friendly Medical Image Sharing Scheme Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer

More information

Reliable Detection of LSB Steganography in Color and Grayscale Images

Reliable Detection of LSB Steganography in Color and Grayscale Images Reliable Detection of LSB Steganography in Color and Grayscale Images Jessica Fridrich SUNY Binghamton fridrich@binghamton.edu Miroslav Goljan SUNY Binghamton mgoljan@binghamton.edu Rui Du SUNY Binghamton

More information

A comprehensive survey on various ETC techniques for secure Data transmission

A comprehensive survey on various ETC techniques for secure Data transmission A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and

More information

ROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS

ROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS ROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS J Sravanthi #1, Dr. MHM Krishna Prasad *2 # Dept. of Computer Science, UCEV Vizianagaram, Andhra Pradesh, India * Associate

More information

Modern Steganography

Modern Steganography Modern Steganography Miroslav Dobšíček Department of Computer Science and Engineering, Faculty of Electrical Engineering, Czech Technical University in Prague, Karlovo náměstí 13, 121 35 Prague 2, Czech

More information

Turgut Ozal University. Computer Engineering Department. TR-06010 Ankara, Turkey

Turgut Ozal University. Computer Engineering Department. TR-06010 Ankara, Turkey Dr. YILDIRAY YALMAN Associate Professor CONTACT INFORMATION Turgut Ozal University Computer Engineering Department TR-06010 Ankara, Turkey Phone: +90 (0)312-5515437 E-mail: yyalman@turgutozal.edu.tr RESEARCH

More information

Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes

Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes International Journal of Network Security, Vol.10, No.1, PP.1 10, Jan. 2010 1 Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control

More information

Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images

Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images Sergio Vicente D. Pamboukian 1, Hae Yong Kim 2 1 Universidade Presbiteriana Mackenzie, Brazil. 2 Universidade de São

More information

Digital Image Integrity

Digital Image Integrity WHITEPAPER Digital Image Integrity TABLE OF CONTENTS 1 Viability of digital images 2 Best practices 2 Archive image 3 Audit trail 4 Repeatability of image adjustments 5 History of tools to address issues

More information

Video Authentication- An Overview

Video Authentication- An Overview Video Authentication- An Overview Saurabh Upadhyay *, Sanjay Kumar Singh *Associate Professor, SIT, Gujarat s4upadhyay@gmail.com Associate Professor, IT BHU, Varanasi sks.cse@itbhu.ac.in ABSTRACT With

More information

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING Development of a Software Tool for Performance Evaluation of MIMO OFDM Alamouti using a didactical Approach as a Educational and Research support in Wireless Communications JOSE CORDOVA, REBECA ESTRADA

More information

Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics

Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics Motion JPEG Video Authentication based on Quantization Matrix Watermarking: Application in Robotics Lamri Laouamer Lab-STICC,European University of Brittany Al Qassim University Buraydah,15452,KSA Abdelhamid

More information

HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER

HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia sjafari@ut.ee

More information

A Model of Unforgeable Digital Certificate Document System

A Model of Unforgeable Digital Certificate Document System A Model of Unforgeable Digital Certificate System Koichi Nozaki *, Hideki Noda **, Eiji Kawaguchi ** and Richard Eason *** *Nagasaki University, **Kyushu Institute of Technology, ***University of Maine

More information

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai

More information

IT Networks & Security CERT Luncheon Series: Cryptography

IT Networks & Security CERT Luncheon Series: Cryptography IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI

More information

Understanding and Integrating KODAK Picture Authentication Cameras

Understanding and Integrating KODAK Picture Authentication Cameras Understanding and Integrating KODAK Picture Authentication Cameras Introduction Anyone familiar with imaging software such as ADOBE PHOTOSHOP can appreciate how easy it is manipulate digital still images.

More information

A Novel Security Scheme for Secret Data using Cryptography and Steganography

A Novel Security Scheme for Secret Data using Cryptography and Steganography I. J. Computer Network and Information Security, 2012, 2, 36-42 Published Online March 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2012.02.06 A Novel Security Scheme for Secret Data using

More information

Two-Factor Biometric Recognition with Integrated Tamper-protection Watermarking

Two-Factor Biometric Recognition with Integrated Tamper-protection Watermarking Two-Factor Biometric Recognition with Integrated Tamper-protection Watermarking Reinhard Huber 1, Herbert Stögner 1, and Andreas Uhl 1,2 1 School of CEIT, Carinthia University of Applied Sciences, Austria

More information

Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents

Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, o, January 01 www.ijcsi.org 394 Hybrid Watermarking and IDEA Encryption of Internet Contents M.A. Mohamed and A.M. El-Mohandes Electronics

More information

MovieLabs Specification for Enhanced Content Protection Version 1.0

MovieLabs Specification for Enhanced Content Protection Version 1.0 MovieLabs Specification for Enhanced Content Protection Version 1.0 Introduction Digital content distribution technologies are evolving and advancing at a rapid pace. Content creators are using these technologies

More information

http://www.springer.com/0-387-23402-0

http://www.springer.com/0-387-23402-0 http://www.springer.com/0-387-23402-0 Chapter 2 VISUAL DATA FORMATS 1. Image and Video Data Digital visual data is usually organised in rectangular arrays denoted as frames, the elements of these arrays

More information