Security and protection of digital images by using watermarking methods



Similar documents
CHAPTER 7 CONCLUSION AND FUTURE WORK

Image Authentication Scheme using Digital Signature and Digital Watermarking

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

AN Application Note: FCC Regulations for ISM Band Devices: MHz. FCC Regulations for ISM Band Devices: MHz

Safer data transmission using Steganography

Multimedia Document Authentication using On-line Signatures as Watermarks

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

CDMA TECHNOLOGY. Brief Working of CDMA

Pradipta Biswas Roll No. 04IT6007 M. Tech. (IT) School of Information Technology Indian Institute of Technology, Kharagpur

Workshop: Defining the Medical Imaging Requirements for a Health Center. Teleradiology and Networking

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING

Side Channel Analysis and Embedded Systems Impact and Countermeasures

How To Understand The Theory Of Time Division Duplexing

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1

Mobile Communications Chapter 2: Wireless Transmission

Review of Medical Image Watermarking Requirements of Teleradiology

SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of

Wireless Medical Telemetry Laboratory

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Revision of Lecture Eighteen

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

Security Based Data Transfer and Privacy Storage through Watermark Detection

SECURE AND EFFICIENT TRANSMISSION OF MEDICAL IMAGES OVER WIRELESS NETWORK

New security and control protocol for VoIP based on steganography and digital watermarking

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM

WATERMARKING FOR IMAGE AUTHENTICATION

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

Design and Implementation of FHSS and DSSS for Secure Data Transmission

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

CS263: Wireless Communications and Sensor Networks

Multi-factor Authentication in Banking Sector

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Lecture 1. Introduction to Wireless Communications 1

Smart LNB. White Paper. May 2014

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

RF Communication System. EE 172 Systems Group Presentation

Chapter 17. Transport-Level Security

A Digital Audio Watermark Embedding Algorithm

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii xvii

Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics:

INTERNATIONAL TELECOMMUNICATION UNION

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

An Incomplete Cryptography based Digital Rights Management with DCFF

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

A versatile telemetric system based on mixed Internet and wireless transmission

Experimental DRM Architecture Using Watermarking and PKI

Alternative security architecture for IP Telephony based on digital watermarking

How To Understand The Differences Between A Fax And A Fax On A G3 Network

MSB MODULATION DOUBLES CABLE TV CAPACITY Harold R. Walker and Bohdan Stryzak Pegasus Data Systems ( 5/12/06) pegasusdat@aol.com

INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6

CHAPTER 1 INTRODUCTION

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Sampling Theorem Notes. Recall: That a time sampled signal is like taking a snap shot or picture of signal periodically.

Software Defined Radio

INTERNATIONAL TELECOMMUNICATION UNION

Implementation of Digital Signal Processing: Some Background on GFSK Modulation

A WEB BASED TRAINING MODULE FOR TEACHING DIGITAL COMMUNICATIONS

Multiple Access Techniques

Physical Layer, Part 2 Digital Transmissions and Multiplexing

Voice Encryption over GSM:

CRYPTOGRAPHY IN NETWORK SECURITY

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA

For Your Eyes Only: Protecting Data-in-Motion with Dispersive Virtualized Networks

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

PCM Encoding and Decoding:

RECOMMENDATION ITU-R SM Measuring sideband emissions of T-DAB and DVB-T transmitters for monitoring purposes

Digital Modulation. David Tipper. Department of Information Science and Telecommunications University of Pittsburgh. Typical Communication System

GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving

Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS

Wireless Local Area Networking For Device Monitoring

International Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 9, September 2012)

Secured Lossless Medical Image Compression Based On Adaptive Binary Optimization

VoIP Security. Seminar: Cryptography and Security Michael Muncan

Experiment # (4) AM Demodulator

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications

Overview. SSL Cryptography Overview CHAPTER 1

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

ROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS

Basic principles of Voice over IP

Digital Subscriber Line (DSL) Transmission Methods

Multiple Embedding Using Robust Watermarks for Wireless Medical Images

Image Area. View Point. Medical Imaging. Advanced Imaging Solutions for Diagnosis, Localization, Treatment Planning and Monitoring.

Lecture 1: Introduction

E-Option Multi-taps Conditioning at the Tap

Data Transmission via Modem. The Last Mile Problem. Modulation of Digital Signals. Modem Standards (CCITT)

Reversible Data Hiding for Security Applications

Voice services over Adaptive Multi-user Orthogonal Sub channels An Insight

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet

Security in Near Field Communication (NFC)

Wireless LAN Concepts

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Effective Management of Medical Information through ROI-Lossless Fragile Image Watermarking Technique

Multiplexing on Wireline Telephone Systems

Transcription:

Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014.

Digital watermarking in telemedicine: applications and security Bilateral project with the University of Ljubljana, Slovenia

I. Introduction Digital watermarking - process of hiding a watermark in multimedia Robust watermarking Should not be possible to be removed Copyright information Secret information Multimedia communication Telemedicine health care when distance separates

I. Introduction Recent advances in telemedicine Need for multimedia communication Security - one of the most significant problems in multimedia Confidently (unauthorized information revealing), Integrity (unauthorized withholding of information or resources), Availability (unauthorized withholding of information or resources

I. Introduction European Information Technology Security Evaluation Criteria Careful analysis of security requirements Multimedia - related security problems Protect multimedia systems against incoming attacks How much a multimedia file differs from its original

II. Watermarking techniques Mark is inserted into an original digital content Data payload, key size, transparency, robustness, false positive rate, complexity, capacity, verification procedure, and invertibility General key requirements Cryptography

II. Watermarking techniques Transparency - human sensory factors Attacks are transforms designed by malicious users Active attacks - the hacker tries to remove the watermark Passive attacks - to determine whether a mark is present or not Collusion attacks Forgery attacks

II. Watermarking techniques Complexity is the effort and the time we need to embed and retrieve a watermark Capacity - how many information bits we can embed Verification procedure Invertibility is the possibility of producing the original data Spread Spectrum and the Informed Embedding methods

MESSAGE PROCESSING MODULA- TION CHANNEL #1 CHANNEL #2 DETECTION KEY MARK MARKED IMAGE PROCESSED AND ATTACKED IMAGE MESSAGE ORIGINAL IMAGE ATTACKS KEY Figure 1. Watermarking method as a noisy channel

III. Security Security requirements Confidentiality, data integrity, data origin authenticity, entity authenticity, and nonrefudiation Cipher systems - private-key and some public-key cryptosystems In medical applications, we can change media data with compression and scaling without content manipulation

III. Security Message authentication codes (MACs), digital structures, fragile digital watermarks, and robust digital watermarks MAC is a one-way hash function that is parameterized by a secret key private key cryptosystems Authentication protocols Digital signatures - public key cryptosystems

IV. Applications Integrate multiple media Multimedia communication technology Patient history, demographics, billing, scheduling, laboratory reports Teleconsultation and telediagnosis Telediagnosis primary diagnosis at the location of patient Telediagnosis at remote location

IV. Applications The entire range of telemedicine applications, including the transfer of large medical images Bursty nature of transferring medical images Teleconsultation and remote monitoring guaranteed QoS Transfer of the medical image Statistical multiplexing - video, audio, image and patient data, transport cost can be reduced

IV. Applications Interactive sharing of medical images and patient through a telemedicine system Synchronous telediagnosis - high communication bandwidth Asynchronous telediagnosis - lower communication bandwidth Emergency medicine

IV. Applications Examples of clinical applications Teleradiology X-ray, computer tomography (CT), magnetic resonance imaging (MRI), ultrasound (US), positron emission tomography (PET), singlephoton emission-computed tomography (SPECT) Relevant patient information

V. Concluding remarks Medical imaging modalities 3D image processing and visualization techniques Telemedicine applications from the multimedia communication perspective Telemedicine systems are able to offer many health care services that could only be dreamed just a few years ago Teleconsultation, teleradiology and teleelectroneuromiography

V. Concluding remarks Watermarking a viable solution Medical data security Medicals data structure and complexity Security mechanisms Enhanced multimedia communication capability

Digital Image Watermarking by Spread Spectrum method

I Spread Spectrum Techniques Watermark should not be placed in perceptually insignificant regions of an image Problem how to insert a watermark Frequency domain communication channel Spread spectrum communications Narrowband signal is transmitted over much larger bandwidth Similarly, watermark is spread over many frequency coefficients Energy in one coefficient is undetectable

I Spread Spectrum Techniques Direct Sequence Spread Spectrum (DS-SS) Frequency Hopping Spread Spectrum (FH-SS) DS-SS low level wideband signal can be hidden within the same spectrum as high power signal Core component Pseudo Random Noise Sequence (PRNS) Original bit stream is multiplied by PRNS At the receiver, low level wideband signal will be accompained by the noise Suitable detector signal can be squezzed back

I Spread Spectrum Techniques FH-SS algorithm periodic change of transmission frequency Hopset set of possible carrier frequencies Each channel spectral region with central frequency in the hopset Bandwidth includes most of the power in a narrow band modulation burst Data is sent by hopping the transmitter carrier On each channel, small bursts of data are sent using narrowband modulation

II Watermarking Embedding DS-SS is used in the watermarking generating FH-SS determines embedding positions Sequence of information bits is spread by multiplying with large factor, called chip-rate Size of the sequence is equal to the value of chip-rate multiplied by number of information bits Spread sequence is modulated with binary pseudo-noise sequence Amplified with a locally adjustable amplitude factor

INFORMATION BITS {-1,1} A SECRET KEY B SPREADING WITH C R GENERATING RANDOM POSITIONS AMPLITUDE WATERMARKED IMAGE PSEUDO RANDOM NOISE SEQUENCE ORIGINAL IMAGE Fig.2 Block diagram of the watermarking scheme, with blocks A) watermarking generating, B) determining of locations

II Watermarking Embedding Watermark process is illustrated in the block A Each bit of the watermark signal will be embedded into some assigned locations Randomly determined by a key-based FH-SS within the image frame Each watermark bit will be dispersed over its corresponding locations Location determining process is shown in the block B 256 x 256 pixels 65536 available pixels are considered as hopset

II Watermarking Embedding If 10 % of image frame is required to embed the watermark, 6544 locations will be pseudo-randomly determined Selected locations are used to perform watermark embedding Each watermark bit is embedded by additive operation Some of the selected pixels will carry the watermark signal Correlation is performed by demodulation

III Some Results 8-bit standard images (Airplane, Barbara, Boat) PSNR is used to evaluate the quality of the watermarked images Embedding the watermarking signal into parts of the Barbara at different levels Image area is decreased, reduced the amount of information rate Reducing the block size is used to carry the watermark signal Some selected bits are used to carry the watermark signal

50 PSNR (db) 45 40 35 Fig.3. PSNR value at various level of embedding area within the image Barbara 30 10 20 30 40 50 60 70 80 90 100 Embedding area (%) PSNR (db) 48 46 44 42 40 38 36 34 32 Fig.4. PSNR values at different block sizes (the highest curve corresponds to 3, in the middle to 4, while the lowest corresponds to 5 block size) 30 10 20 30 40 50 60 70 80 90 100 Embedding area (%)

Table 1. The smallest value of chip-rate required at various block sizes ORIGINAL IMAGE BLOCK SIZE 3 BLOCK SIZE 4 BLOCK SIZE 5 AIRPLANE 20 65 235 BOAT 20 95 270 BARBARA 18 68 245

III Some Results Since a smaller chip-rate is used, amount of information bits would be increased Table shows the smallest value of chip-rate required to correctly recover the embedded bits Fig.4 block size used to carry the watermark signal was changed The quality of watermark signal is improved when watermark is embedded into some parts Security level is the same as in the whole image frame

III Some Results Advantage of FH-SS: embedded signal is robust to some potentional attacks Watermark could be extracted without using the original in spread spectrum The input image is highpass filtered to remove major components Filtered image is then demodulated with the pseudo-noise signal

IV Conclusion Watermarking based on spread spectrum FH-SS to locate watermark embedding DS-SS to generate the watermark signal Improved the quality of watermarked image The same level of security Decreasing of the embedding area could be compensated by adding the watermark signal into some selected bits within a pixel