ICMNS 2006 ITB Bandung
-
Upload
soetam-rizky -
Category
Technology
-
view
691 -
download
0
Transcript of ICMNS 2006 ITB Bandung
![Page 1: ICMNS 2006 ITB Bandung](https://reader035.fdocuments.net/reader035/viewer/2022062311/547835b4b4af9fe5018b45b1/html5/thumbnails/1.jpg)
IMAGE COPYRIGHT IMAGE COPYRIGHT PROTECTION USING PROTECTION USING WATERMARKING IN WATERMARKING IN WEB APPLICATION WEB APPLICATION WITH GDI+WITH GDI+
Soetam Rizky Wicaksono, S.Kom, MCP
Information System Faculty Information System Faculty STIKOM Surabaya STIKOM Surabaya Raya Kedung Baruk 98Raya Kedung Baruk 98SurabayaSurabaya
![Page 2: ICMNS 2006 ITB Bandung](https://reader035.fdocuments.net/reader035/viewer/2022062311/547835b4b4af9fe5018b45b1/html5/thumbnails/2.jpg)
Why Need Protection ?
• Too many images in web• Duplication, copyright fraud,
retouching / manipulation• Protection via login process or
subscription is not the best way anymore, too many ways to crack them, event with kiddies script
![Page 3: ICMNS 2006 ITB Bandung](https://reader035.fdocuments.net/reader035/viewer/2022062311/547835b4b4af9fe5018b45b1/html5/thumbnails/3.jpg)
Solution Options For Web
• Image serialization( already done at SITIA 2006 )
• Convert into machine unreadable format although human readable such as : base-64, HTML etc.( Will be done at SNIKTI 2007 )
• Steganography( Will be done at KNSI 2007 )
• Watermarking
![Page 4: ICMNS 2006 ITB Bandung](https://reader035.fdocuments.net/reader035/viewer/2022062311/547835b4b4af9fe5018b45b1/html5/thumbnails/4.jpg)
Chosen Option
On-the-fly watermarking :• Can be used not only in web
application, however, more appropriate applied in web application
• Using GDI+ in .NET Framework, thus it won’t charge additional time for webmaster in creating watermarking in upload process
![Page 5: ICMNS 2006 ITB Bandung](https://reader035.fdocuments.net/reader035/viewer/2022062311/547835b4b4af9fe5018b45b1/html5/thumbnails/5.jpg)
Why Watermarking ?
• The amount of embedded information has a direct influence on watermark robustness.
• Embedding strength – there is trade-off between watermark embedding robustness and quality.
Sagarmay, Deb (ed), “Multimedia System and Content-Based Image Retrieval”, Idea Group, London, 2004.
![Page 6: ICMNS 2006 ITB Bandung](https://reader035.fdocuments.net/reader035/viewer/2022062311/547835b4b4af9fe5018b45b1/html5/thumbnails/6.jpg)
Watermarking Weaknesses
• Selecting layers with the same pattern or same color
• Eliminate using imaging tools • Cropping technique
![Page 7: ICMNS 2006 ITB Bandung](https://reader035.fdocuments.net/reader035/viewer/2022062311/547835b4b4af9fe5018b45b1/html5/thumbnails/7.jpg)
Avoid Watermarking Attacks
• Avoid placing watermark layer only in the corner of original image to eliminate cropping attack
• Placing more than one watermark layer
• Make gradient in watermark layer to avoid same-pattern attack
![Page 8: ICMNS 2006 ITB Bandung](https://reader035.fdocuments.net/reader035/viewer/2022062311/547835b4b4af9fe5018b45b1/html5/thumbnails/8.jpg)
GDI+• An all-purpose drawing model for .NET
applications. • GDI+ has a number of uses in .NET, including
writing documents to the printer, displaying graphics in a Windows application, and rendering graphics in a web page.
• Using GDI+ code to draw a graphic is slower than using a static image file.
• However, it gives much more freedom and enables several possibilities that weren’t possible (or were prohibitively difficult) in earlier web development platforms
![Page 9: ICMNS 2006 ITB Bandung](https://reader035.fdocuments.net/reader035/viewer/2022062311/547835b4b4af9fe5018b45b1/html5/thumbnails/9.jpg)
GDI+ Basics
• Create the in-memory bitmap where to perform all drawing.
• Create a GDI+ graphics context for the image. This gives the System.Drawing.Graphics object
• Perform the drawing using the methods of the Graphics object. Draw and fill lines and shapes, and can even copy bitmap content from existing files.
• Write the binary data for the image to the browser by using the Response.OutputStream property.
![Page 10: ICMNS 2006 ITB Bandung](https://reader035.fdocuments.net/reader035/viewer/2022062311/547835b4b4af9fe5018b45b1/html5/thumbnails/10.jpg)
Watermarking Implementation
• Assuming that image file which will be protected already located at web server, GDI+ will read the original image as new layer
• Generate a new layer for watermark, which consist of copyright text
• Merge both layers
![Page 11: ICMNS 2006 ITB Bandung](https://reader035.fdocuments.net/reader035/viewer/2022062311/547835b4b4af9fe5018b45b1/html5/thumbnails/11.jpg)
Detail Implementation• Take place at zero pixel for x
coordinate from the original image and started from 40 pixel for y coordinate from the original image.
• Assuming that image file which will be protected from internet infringement copyright has size more than 100x100 pixels.
• Only aim to be example, in further development, it should be adjusted within the image size.
![Page 12: ICMNS 2006 ITB Bandung](https://reader035.fdocuments.net/reader035/viewer/2022062311/547835b4b4af9fe5018b45b1/html5/thumbnails/12.jpg)
Detail Implementation
Original image
Watermark layer
40
![Page 13: ICMNS 2006 ITB Bandung](https://reader035.fdocuments.net/reader035/viewer/2022062311/547835b4b4af9fe5018b45b1/html5/thumbnails/13.jpg)
ASP .NET 2.0 Implementation
• Create original image as the container for watermarking layer
• Create a new layer which will going to be a watermark layer, contains text with gradient brush in order to restraint layer-removing technique
![Page 14: ICMNS 2006 ITB Bandung](https://reader035.fdocuments.net/reader035/viewer/2022062311/547835b4b4af9fe5018b45b1/html5/thumbnails/14.jpg)
ASP .NET 2.0 Implementation
• Merging both layer into one layer and save it into a memory stream, and then display it into JPEG format.
• Assuming that the original file is also in JPEG format.
• For real application, result format should be the same with the original format of image file.
![Page 15: ICMNS 2006 ITB Bandung](https://reader035.fdocuments.net/reader035/viewer/2022062311/547835b4b4af9fe5018b45b1/html5/thumbnails/15.jpg)
Future Development
• Watermark layer should contain many constraint to restrict it from advanced layer removing tehcniques, and as well printing infringement abuse.
• Reserve another method to combine, in order to increase security in image layering
![Page 16: ICMNS 2006 ITB Bandung](https://reader035.fdocuments.net/reader035/viewer/2022062311/547835b4b4af9fe5018b45b1/html5/thumbnails/16.jpg)
Future Development ( II )
• Text variable in watermarking layer should be in better format, such as copyright author, date and also can include EXIF information.
• Integrate it into an XML Web Service
• Watermark layer can be encrypted using ligthweight algorithm such as TEA or XTEA
![Page 17: ICMNS 2006 ITB Bandung](https://reader035.fdocuments.net/reader035/viewer/2022062311/547835b4b4af9fe5018b45b1/html5/thumbnails/17.jpg)
Soetam Rizky WicaksonoSoetam Rizky Wicaksono
Information System Faculty Information System Faculty STIKOM Surabaya STIKOM Surabaya Raya Kedung Baruk 98Raya Kedung Baruk 98SurabayaSurabaya