Introduction to Multimedia Security Topics Covered in this Course. Multimedia Security

Similar documents
Image Authentication Scheme using Digital Signature and Digital Watermarking

Multimedia Document Authentication using On-line Signatures as Watermarks

Steganography- A Data Hiding Technique

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

On Covert Data Communication Channels Employing DNA Steganography with Application in Massive Data Storage

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Online Voting System Using Three Factor Authentication

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Topics in Security: Forensic Signal Analysis

Security and protection of digital images by using watermarking methods

Safer data transmission using Steganography

Combating Anti-forensics of Jpeg Compression

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

Audio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking?

Triple Security of Information Using Stegnography and Cryptography

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING

Study on Image Steganography Techniques

Steganography Detection for Digital Forensics

International ejournals

Image Information Hiding: An Survey

A Concept of Digital Picture Envelope for Internet Communication

CHAPTER 1 INTRODUCTION

A Secure Data Transmission By Integrating Cryptography And Video Steganography

A Model-based Methodology for Developing Secure VoIP Systems

Framework for Biometric Enabled Unified Core Banking

DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon

New security and control protocol for VoIP based on steganography and digital watermarking

Practical Internet Steganography: Data Hiding in IP

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

Multi-factor Authentication in Banking Sector

Wireless Medical History Tracker and Token Generator Using Finger Biometric Technology and Arm

Steganography and Visual Cryptography in Computer Forensics

WATERMARKING FOR IMAGE AUTHENTICATION

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access

Secure Data Transmission by using Steganography

Two-Factor Biometric Recognition with Integrated Tamper-protection Watermarking

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Security of Biometric Authentication Systems Parvathi Ambalakat

MULTIFACTOR AUTHENTICATION FOR SOFTWARE PROTECTION

Turgut Ozal University. Computer Engineering Department. TR Ankara, Turkey

Modern Steganography

Reversible Data Hiding for Security Applications

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM

A Model of Unforgeable Digital Certificate Document System

Index Terms Audio streams, inactive frames, steganography, Voice over Internet Protocol (VoIP), packet loss. I. Introduction

Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2

Multimodal Biometric Recognition Security System

AN OVERVIEW OF IMAGE STEGANOGRAPHY

International Journal of Advanced Computer Technology (IJACT) ISSN: Least Significant Bit algorithm for image steganography

Technical Points about Adaptive Steganography by Oracle (ASO)

Online Voting System Powered by Biometric Security using Cryptography and Stegnography

Development of Academic Attendence Monitoring System Using Fingerprint Identification

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

A Feature Selection Methodology for Steganalysis

Secret message in a ping: creation and prevention

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

COMPARISON OF VARIOUS BIOMETRIC METHODS

Color Image Stegananalysis Using Correlations between RGB Channels

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

Content Control: Digital

Computers and Society: Security and Privacy

Course Title: Computer Forensic Specialist: Data and Image Files

Digital Image Analysis for Evidence: A MATLAB toolbox

Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis

MULTIMEDIA CONTENT PROTECTION VIA BIOMETRICS-BASED ENCRYPTION. Umut Uludag and Anil K. Jain

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

CHAPTER 7 CONCLUSION AND FUTURE WORK

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

Reliable Detection of LSB Steganography in Color and Grayscale Images

Technical aspects of Digital Rights Management

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP

Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security

Data Masking: A New Approach for Steganography?

Network Security. Chapter 12. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of

Lost Packets Recovery during Video Broadcasting Over Data Network

Multi-Factor Biometrics: An Overview

Text Localization & Segmentation in Images, Web Pages and Videos Media Mining I

Soumendu Chakraborty, Anand Singh Jalal* and Charul Bhatnagar

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

A Digital Audio Watermark Embedding Algorithm

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM

Application-Specific Biometric Templates

A Novel Method for Identifying Exact Sensor Using Multiplicative Noise Component

Transcription:

Introduction to Multimedia Security Topics Covered in this Course Multimedia Security

Course Coverage Multimedia Security Digital Rights Management Steganography/ Steganalysis DRM Standards Rights Languages Digital Forensics DRM Laws Digital Watermarking Multimedia Cryptography Biometrics Privacy-Preserving Data Mining 2

Steganography Steganography= Cover + Writing The art of hiding information in ways that prevent the detection of hidden messages Transmitting secret messages through innocuous cover carriers in such a manner that the existence of the embedded message is undetectable Examples Invisible inks, character arrangement, covert channels..o xx.. Sender Cover Message Genuine Message!!! Supervised Channel..o xx.. Cover Message Receiver..o xx..!!! Genuine Message + Cover Message Paper Normal Ink Invisible Ink Paper with Messages Examination Heating Examination 3

Digital Steganography Schemes Various message carriers Digital contents Texts, images, audio, video Storage devices Unused space or hidden partition TCP/IP packets Unused or reserved bits in the header 4

Steganalysis Hiding information within electronic media requires alternations of the media properties that may introduce some form of degradation or unusual characteristics Forms of attacks and analysis on hidden information Detecting Extracting Disabling/destroying Alice Eve The attacking approaches vary depending upon the methods used to embed the information into the cover media An arms race? Bob 5

Biometric Recognition Biometrics = life + measure Automatic recognition of individuals based on their physiological and/or behavior characteristics face fingerprint iris user input 6

Requirements of Biometrics A biological measurement qualifies to be a biometric if it satisfies Universality Distinctiveness Permanence Collectability A practical biometric system must satisfy Performance Acceptability Circumvention 7

A Biometric System 8

Applications of Biometrics Secure access to Buildings Computer systems Laptops Cell phones ATMs ID Card Password who he is instead of what he possesses and what he remembers 9

Content Tampering Image tampering Object removing Composition Morphing Re-touching Enhancing Computer graphics Painting 10

Watermarking-Based Forensics Watermarking-based schemes Fragile watermarking Watermarks will be undetectable when the content is changed in any way Semi-fragile watermarking Watermark will survive only legitimate distortion Watermarks enabling distortion localization or restoration A major drawback Watermarks must be embedded either at the time of recording or afterwards by a person authorized to do so Example: A Secure Digital Camera 11

Statistical Techniques for Detecting Traces Assumption Digital forgeries, though visually imperceptible, alter some underlying statistical properties of natural images Techniques Re-sampled images Correlations between neighboring pixels Color Filter Array (CFA) interpolated images Correlations are destroyed when the image is tampered Double compressions Duplicated regions Inconsistent noise patterns 12

References Neil F. Johnson and Sushil Jajodia, Steganalysis: The Investigation of Hidden Information, IEEE Information Technology Conference, New York, USA, September 1998 Anil K. Jain, Arun Ross and Salil Prabhakar, An Introduction to Biometric Recognition, IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, January 2004 Paul Blythe and Jessica Fridrich, Secure Digital Camera, Digital Forensic Research Workshop, 2004 Alin C. Popescu, Statistic Tools for Digital Image Forensics, PhD Dissertation, December 2004 13