Multimedia Data Hiding



Similar documents
WATERMARKING FOR IMAGE AUTHENTICATION

Audio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking?

Image Authentication Scheme using Digital Signature and Digital Watermarking

CHAPTER 7 CONCLUSION AND FUTURE WORK

Multimedia Document Authentication using On-line Signatures as Watermarks

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

Generating Robust Digital Signature for Image/Video Authentication

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Security and protection of digital images by using watermarking methods

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet

Experimental DRM Architecture Using Watermarking and PKI

A Digital Audio Watermark Embedding Algorithm

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

Example #1: Controller for Frequency Modulated Spectroscopy

Using fractal compression scheme to embed a digital signature into an image

Combating Anti-forensics of Jpeg Compression

Digital Audio and Video Data

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.

Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs

Real-Time DMB Video Encryption in Recording on PMP

Multi-factor Authentication in Banking Sector

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

An Algorithm for Data Hiding in Binary Images. Eman Th. Sedeek Al-obaidy Veterinary Medicine College University of Mosul

Parametric Comparison of H.264 with Existing Video Standards

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

5 Digital Rights Management

A Dynamic Approach to Extract Texts and Captions from Videos


Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

Assessment of Camera Phone Distortion and Implications for Watermarking

A Secure Data Transmission By Integrating Cryptography And Video Steganography

Open issues and research trends in Content-based Image Retrieval

Security Based Data Transfer and Privacy Storage through Watermark Detection

Circle Object Recognition Based on Monocular Vision for Home Security Robot

A Look at Emerging Standards in Video Security Systems. Chris Adesanya Panasonic Network Systems Company

Classes of multimedia Applications

IMPACT OF COMPRESSION ON THE VIDEO QUALITY

Index Terms Audio streams, inactive frames, steganography, Voice over Internet Protocol (VoIP), packet loss. I. Introduction

Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images

Understanding Network Video Security Systems

Algorithms for the resizing of binary and grayscale images using a logical transform

Robust Blind Watermarking Mechanism For Point Sampled Geometry

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

Figure 1: Relation between codec, data containers and compression algorithms.

Understanding Megapixel Camera Technology for Network Video Surveillance Systems. Glenn Adair

Performance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder

Automatic Extraction of Signatures from Bank Cheques and other Documents

Introduction. Impact of Link Failures on VoIP Performance. Outline. Introduction. Related Work. Outline

TRANSPARENT ENCRYPTION FOR HEVC USING BIT-STREAM-BASED SELECTIVE COEFFICIENT SIGN ENCRYPTION. Heinz Hofbauer Andreas Uhl Andreas Unterweger

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA

UNIVERSITY OF CENTRAL FLORIDA AT TRECVID Yun Zhai, Zeeshan Rasheed, Mubarak Shah

Quality Estimation for Scalable Video Codec. Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden)

Video compression: Performance of available codec software

Data Storage 3.1. Foundations of Computer Science Cengage Learning

Video Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201

White paper. H.264 video compression standard. New possibilities within video surveillance.

Multimedia Data Transmission over Wired/Wireless Networks

Video Encryption Exploiting Non-Standard 3D Data Arrangements. Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl

Voice over IP: RTP/RTCP The transport layer

OBJECTIVE VIDEO QUALITY METRICS: A PERFORMANCE ANALYSIS

Taking Inverse Graphics Seriously

Very Low Frame-Rate Video Streaming For Face-to-Face Teleconference

Chapter 3 ATM and Multimedia Traffic

Study and Implementation of Video Compression standards (H.264/AVC, Dirac)

Introduction to image coding

Video-Conferencing System

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches

Advanced Networking Voice over IP: RTP/RTCP The transport layer

A Concept of Digital Picture Envelope for Internet Communication

Data Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to:

Signature Region of Interest using Auto cropping

Text Localization & Segmentation in Images, Web Pages and Videos Media Mining I

Multiple Description Coding (MDC) and Scalable Coding (SC) for Multimedia

Jeff M. Smith

Super-resolution method based on edge feature for high resolution imaging

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

Friendly Medical Image Sharing Scheme

Transcription:

Multimedia Data Hiding Introduction! Digital Watermarking / Multimedia Data Hiding Hide secondary data in digital image/video/audio/3d! Uses of hidden data: ownership verification, alteration detection access control, annotation, side info. delivery Min Wu Dept. of Electrical Engineering Committee: Profs. B.Liu, P.Ramadge, S.Kulkarni! Issues and challenges: imperceptibility, robustness & security, capacity tradeoff between the conflicting requirements Robustness Imperceptibility Capacity 2 General Framework Key Elements of Data Hiding 1111 Hello, World original media data to be hidden extracted 1111 data Hello, World player embed play/ record/ extract marked media (w/ hidden data) compress process / attack! Perceptual model! Embedding one bit! Multiple bits! Uneven embedding capacity! Robustness and security! What data to embed Upper Layers security error correction uneven capacity equalization Physical Layer how to embed one or multiple bits? 3 4 1

Thesis Outline " Fundamental issues and solutions # embedding strategy classification and capacity issues # handling uneven capacity # modulation/multiplexing techniques for hiding multiple bits " Algorithm and system designs # binary images # image authentication # video copy/access control and fingerprinting # applications in video communication " Attacks and countermeasures # innocent tools block replacement and double-capturing # countermeasure against rotation/scale/translation # robustness & security analysis on SDMI audio watermarking Algorithm and System Designs " Demonstrating solutions to fundamental issues 5 6 Data Hiding in Binary Image Example-1: Signature in Signature! A simple yet important class of images scanned documents, drawings, signatures! Challenges E-PAD (InterLink Electronics) little room for invisible changes uneven distribution of changeable pixels Clinton electronically signed Electronic Signatures Act - Yahoo News 6/3/ http://www.whitehouse.gov/ media/gif/bil.gif as of 7/ 7 Annotating digitized signature with content info. of the signed document (Finkelstein - Princeton U.) 8 2

Our Approach! Block-based pixel-domain method hide a fixed number of bits in each block extract hidden data without the use of original copy Robustness is not a major requirement for authentication and annotation applications. Preserve Visual Quality! Assign flippability score to each pixel determine how noticeable the flipping of a pixel is based on smoothness and connectivity Hierarchical! Three issues determine which pixels to flip for invisibility embed data in each block using flippable pixels handle uneven embedding capacity via shuffling (a) (b)! Sort pixels in each block according to the scores flip high-score pixels with high priority 9 1 Embedding Mechanism! Extracting data without original image hard to directly encode data in flippable pixels # flippability may change after encoding! Our approach manipulate flippable pixels to enforce block-based property # enforce the total number of black pixels to be odd/even to hide 1 bit / block, or use more general mapping # incorporate quantization or tolerance zone for robustness # of black pixel per blk 2kQ (2k+1)Q (2k+2)Q (2k+3)Q odd-even mapping 1 1 lookup table mapping 1 1 11 Shuffling for Binary Image! Uneven distribution of flippable pixels most are on rugged boundary! Embedding rate (per block) variable: need side info. constant: require larger blk! Random shuffling equalizes distribution embed more bits enhance security portion of blocks Important!.25.2.15.1.5 Pixels with high flippability score are shown in the images. image size 288x48, red block size 16x16 before shuffle after shuffle 5 1 15 2 25 3 35 4 45 5 embeddble coeff. # per block (signature img) 12 3

Analysis of Shuffling Compare Analysis with Simulation for Shuffling Mean follows hypergeometric distribution m /N ( th bin) m 1/N (1 st bin) m 2/N (2 nd bin) before shuffle 2.37% 1.85% 5.56% mean after shuffle analysis simulation 5.16x1-5 % % 7.77x1-4 % % 5.81x1-3 % 5.56x1-3 % std after shuffle analysis simulation 9.78x1-5 3.79x1-4.1.1 m r ~ # of blocks each having r blue balls out of q balls q balls... pick w/o replacement N = S/q blocks portion of blocks (x 1%).25.2.15.1 before shuffle before shuff simulation mean simulation std analytic mean analytic std mean after shuffle std after shuffle q = 16 x 16 S = 288 x 48 N = S/q = 18 x 3 p = 5.45%.5 unchangeable pixel/coeff. changeable pixel/coeff. S balls in total n = ps blue balls 13 Simulation: 1 indep. random shuff. 5 1 15 2 25 3 35 4 # of flippable pixels per block (signature img) 14 Example-1: Signature in Signature Each block is 32- pixel large, 1bit / blk. Example-2: Document Authentication (c) (a) alter (d) (f) (b) after alteration (e) (g) Annotating digitized signature with content info. of the signed document (Finkelstein - Princeton U.) 15 Embed pre-determined pattern or content features beforehand Verify hidden data s integrity to decide on authenticity 16 4

Robustness vs. Capacity! Blind/non-coherent detection ~ original copy unavailable! Single robustness-capacity setting over-estimates and/or under-estimates actual noise not all embedded data are equally important Robustness Capacity Capacity C (bits/ch. use) 1.9.8.7.6.5.4.3.2.1 Capacity of Type-I (host=1e) and Type-II AWGN ch. (wmk MSE E 2 ) Type-I (C-i C-o, blind detection) Type-II (D-i D-o).1.8.6.4.2 grayscale/color image/video -4-3 -2-1 1 Experimental Results 6-frame 352 x 24 flower garden sequence 66-frame 352 x 24 concatenated sequence Level-1: high capacity Level-2: high robustness embed. rate robustness embed. rate robustness 64 bits (91 char.) 332 bits avg. chunk size = 6 frames Video Examples MPEG-2 4.5Mbps; frame dropping 132 bits (18 char.) 1266 bits MPEG-2 1.5Mbps; frame dropping Notes also embed control info. Imperceptibility -15-1 -5 5 1 15 2 1log 1 (E 2 /σ 2 ) (db) stronger noise weaker 17 18 Video Example Robust Video Data Hiding embed b i & (i mod M) embed b i+1 & (i+1 mod M) 1st & 3th Mpeg4.5Mbps frame of original, marked, and their luminance difference human visual model for imperceptibility: protect smooth areas and sharp edges 19! Embedding domain partition video into segments of similar consecutive frames for each frame of a segment, embed same data in block-dct domain embed segment index to detect frame jitter! Multi-level embedding light processing data extractable from just a few frames severe processing extractable by processing more frames! Uneven embedding capacity seg. i seg. i+1 within a frame: constant embedding rate per region & shuffling between frames: embed # of hidden bit per frame as side info.! Modulation/Multiplexing techniques TDMA, CDMA, orthogonal/bi-orthogonal modulation 2 5

Watermark Attacks: What and Why? Attacks & Countermeasures! Attacks: intentionally obliterate watermarks remove a robust watermark make watermark undetectable (e.g., miss synchronization) uncertainty in detection (e.g., multiple ownership claims) forge a valid (fragile) watermark bypass watermark detector 21! Why study attacks? identify weaknesses propose improvement understand pros and limitation of tech. solution To win each campaign, a general should know both his troop and the opponent s as well as possible. -- Sun Tzu, The Art of War, 5 B.C. 22 Innocent Tools Used by Attackers! Recovery of lost blocks for resilient multimedia transmission of JPEG/MPEG good quality by edge-directed interpolation: Jung et al; Zeng-Liu! Remove robust watermark by block replacement JPEG 1% marked original (no distortion) after proposed attack edge estimation edge-directed interpolation JPEG 1% w/o distort Interp. w/ orig 34.96 138.51 6.3 w/o orig 12.4 19.32 4.52 512x512 lenna Threshold: 3 ~ 6! Attack effective on block-dct based spread-spectrum watermark 23 claimed high robustness&quality by fine tuning wmk strength for each region 24 6

Secure Digital Music Initiative Challenge SDMI Challenge Setup Obtained From SDMI Job for Attackers Black Box (unknown)! International consortium ~ 18+companies/organizations currently pursuing watermark based solution for access and copy control on digital music Sample-1 (original) Watermark (special signal) Embed Sample-2 (marked)! Public challenge ( 9/15-1/8/2 ) attacks on four robust watermark technologies Any Marked Audio Detect Watermark Found! Non-traditional research values reveal real industrial problem and state-of-art technologies present an emulated rivalry environment for better understanding on audio watermarking lead to a few research problems Sample-3 (marked) Attack Sample-4 (attacked) Detect GOAL Watermark NOT Found 25 26 Observation on One SDMI Watermark Difference between original and marked samples given by SDMI 27 Learning from SDMI Challenge! Our successful attacks blind attacks: warping, jittering attacks based on studying orig.-marked pairs # deliberate filtering / subtraction / randomization! Noteworthy issues duality between embedding and attacks secrecy of embedding can t rely on orig. being unknown double-watermarking used by SDMI # robust wmk should resist processing/attacks # fragile wmk indicate audio experience compression attacks and countermeasures on forging fragile wmk # relate to watermark-based authentication 28 7

Is Watermark Useful?! Not an answer to all our attacks pointed out weaknesses of specific proposals and demonstrated general approaches! For copy/access control hard to get complete solution with technology alone # business model, pricing model, etc. Summary improved watermark tech. could be part of the solution # make attack non-trivial and keep honest people honest! Other applications detecting alteration # digital camera/camcorder; digitized signature/ binary doc. convey side information # for performance enhancement or additional funtionality 29 3 Summary & Conclusion! Data hiding in digital multimedia for a variety of purposes, involving multiple disciplines! Tradeoff among many criterions! Important to think both as designer and as attacker! Data hiding in market digital cameras with authentication watermark module plug-in for image editors video watermark proposals for DVD copy control on-going SDMI effort for digital music Digital Rights Management (DRM) for multimedia data 31 Other Data Hiding Works in Thesis! Watermark-based image/video authentication, attack & countermeasures hide auth. data via look-up table in quantized coeff. (ICIP 98 & 99) double capturing attack and countermeasure (Asilomar 99)! Rotation/Scale/Translation resilient watermarking (w/ NECI) add spread-spectrum wmk in log-polar of FFT magnitude (Trans. IP 1, SPIE )! Data hiding for video communication (w/ P. Yin) real-time video transcoding via downsizing # send subblock motion for better visual quality error concealment # protect motion vectors by embedding parity bits 32 8

Publication List Fundamental Issues 1. M. Wu, B. Liu: Data Hiding in Images and Videos: Part I Fundamental Issues and Solutions, draft, to be submitted to IEEE Trans. on Circuits & Systems for Video Technology, Feb. 21. 2. M. Wu, H. Yu, A. Gelman: Multi-level Data Hiding for Digital Image and Video, SPIE 99. 3. M. Wu, B. Liu: Digital Watermarking Using Shuffling, IEEE ICIP'99. Designs 1. C-Y. Lin, M. Wu, Y-M. Lui, J.A. Bloom, M.L. Miller, I.J. Cox: Rotation, Scale, and Translation Resilient Public Watermarking for Images, to appear in IEEE Transactions on Image Processing, May 21. 2. M. Wu, B. Liu: Data Hiding in Binary Images, submitted to IEEE Trans. on Multimedia, Apr. 21. 3. M. Wu, H. Yu, B. Liu: Data Hiding in Images and Videos: Part II Designs and Applications, draft, to be submitted to IEEE Trans. on Circuits & Systems for Video Technology, Feb. 21. 4. M. Wu, B. Liu: Data Hiding for Image and Video Authentication, to be submitted to IEEE Trans. on Image Processing, Jan. 21 5. M. Wu, E. Tang, B. Liu: Data Hiding in Digital Binary Image, IEEE ICME'. 6. M. Wu, H. Yu: Video Access Control via Multi-level Data Hiding, IEEE ICME'. 7. P. Yin, M. Wu, B. Liu: Video Transcoding by Reducing Spatial Resolution, IEEE ICIP. 8. C-Y. Lin, M. Wu, J.A. Bloom, M.L. Miller, I.J. Cox, and Y-M. Lui: Rotation, Scale, and Translation Resilient Public Watermarking for Images, SPIE 2. www.ee.princeton.edu/~minwu/research.html 33 (list of design papers - cont d) 9. M. Wu, B. Liu: Watermarking for Image Authentication, ICIP'98. 1. P. Yin, M. Wu, B. Liu: Error Concealment for MPEG Video Over Internet, submitted to ICIP 1. Attacks & Countermeasures 1. M. Wu, S. Craver, E. Felten, B. Liu: Analysis of Attacks on SDMI Audio Watermarks, to appear in IEEE ICASSP'1. 2. S. Craver, P. McGregor, M. Wu, B. Liu, A. Stubblefield, B. Swartzlander, D.S. Wallach, D. Dean, E.W. Felten: Reading Between the Lines: Lessons from the SDMI Challenge, to appear in 4 th Info. Hiding Workshop, 21. 3. M. Wu, B. Liu, Attacks on Digital Watermarks, Asilomar 99. Non-watermark Works on Video (not included in thesis) 1. M. Wu, R. Joyce, H-S. Wong, L. Guan, S-Y. Kung: Dynamic Resource Allocation Via Video Content and Short-term Traffic Statistics, to appear in IEEE Trans. on Multimedia, special issues on multimedia over IP, June 21. 2. M. Wu, R. Joyce, S-Y. Kung: Dynamic Resource Allocation Via Video Content and Short-term Traffic Statistics, ICIP, invited paper. 3. H-S. Wong, M. Wu, R. Joyce, L. Guan, S-Y. Kung: A Neural Network Approach For Predicting Network Resource Requirement in Video Transmission, IEEE Pacific Rim Conference on Multimedia (PCM ). 4. M. Wu, W. Wolf, B. Liu, "An Algorithm of Wipe Detection", IEEE ICIP'98. 34 Questions? Comments? Welcome! Acknowledgement Prof. Bede Liu (advisor) Dr. Wenjun Zeng (HVS and error concealment) Prof. Adam Finkelstein, Ed Tang, Mishella Yoshi (binary image) Dr. Heather Yu (multilevel data hiding) PengYin (transcoding and error concealment) Scott Craver, Prof. Ed Felten (SDMI attacks) Drs. I. Cox, M. Miller, J. Bloom, H. Stone (data hiding & RST wmk) 35 9