EE 6886: Topics in Signal Processing --Multimedia Security ...
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
-
Upload
julia-sparks -
Category
Documents
-
view
258 -
download
1
Transcript of Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
![Page 1: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.](https://reader033.fdocuments.net/reader033/viewer/2022061616/56649e555503460f94b4bd82/html5/thumbnails/1.jpg)
Introduction to Multimedia Security Topics Covered in this Course
Multimedia Security
![Page 2: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.](https://reader033.fdocuments.net/reader033/viewer/2022061616/56649e555503460f94b4bd82/html5/thumbnails/2.jpg)
2
Digital Rights Management
Course Coverage
Digital Watermarking
MultimediaCryptography
DRM Standards
DRM Laws
Rights Languages
Steganography/ Steganalysis
Digital Forensics
Biometrics
Multimedia Security
Privacy-Preserving
Data Mining
![Page 3: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.](https://reader033.fdocuments.net/reader033/viewer/2022061616/56649e555503460f94b4bd82/html5/thumbnails/3.jpg)
3
Steganography
• Steganography=“Cover” + “Writing”– The art of hiding information in ways that prevent the detection of hidden
messages– Transmitting secret messages through innocuous cover carriers in such a
manner that the existence of the embedded message is undetectable• Examples
– Invisible inks, character arrangement, covert channels…
Examination
..oxx..
Cover Message
Heating
!!!
Genuine Message + Cover Message
Examination
..oxx..
Paper
..o xx..
Paper withMessages
Genuine Message
..o xx..
Normal Ink
!!!
Cover Message
Invisible Ink
Sender Supervised Channel
Receiver
![Page 4: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.](https://reader033.fdocuments.net/reader033/viewer/2022061616/56649e555503460f94b4bd82/html5/thumbnails/4.jpg)
4
Digital Steganography Schemes
• Various message carriers– Digital contents
• Texts, images, audio, video
– Storage devices• Unused space or hidden p
artition
– TCP/IP packets• Unused or reserved bits in
the headee
![Page 5: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.](https://reader033.fdocuments.net/reader033/viewer/2022061616/56649e555503460f94b4bd82/html5/thumbnails/5.jpg)
5
Steganalysis
• Hiding information within electronic media requires alternations of the media properties that may introduce some form of degradation or unusual characteristics
• Forms of attacks and analysis on hidden information– Detecting – Extracting– Disabling/destroying
• The attacking approaches vary depending upon the methods used to embed the information into the cover media– An arms race?
Alice Bob
Eve
![Page 6: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.](https://reader033.fdocuments.net/reader033/viewer/2022061616/56649e555503460f94b4bd82/html5/thumbnails/6.jpg)
6
Biometric Recognition
• Biometrics = “life”+”measure”• Automatic recognition of individuals based on
their physiological and/or behavior characteristics
face fingerprint iris
…
user input
![Page 7: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.](https://reader033.fdocuments.net/reader033/viewer/2022061616/56649e555503460f94b4bd82/html5/thumbnails/7.jpg)
7
Requirements of Biometrics
• A biological measurement qualifies to be a biometric if it satisfies– Universality– Distinctiveness– Permanence – Collectability
• A practical biometric system must satisfy– Performance– Acceptability– Circumvention
![Page 8: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.](https://reader033.fdocuments.net/reader033/viewer/2022061616/56649e555503460f94b4bd82/html5/thumbnails/8.jpg)
8
A Biometric System
![Page 9: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.](https://reader033.fdocuments.net/reader033/viewer/2022061616/56649e555503460f94b4bd82/html5/thumbnails/9.jpg)
9
Applications of Biometrics
• Secure access to– Buildings– Computer systems– Laptops– Cell phones– ATMs
• “who he is” instead if “what he possesses” and “what he remembers”
ID Card
Password
![Page 10: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.](https://reader033.fdocuments.net/reader033/viewer/2022061616/56649e555503460f94b4bd82/html5/thumbnails/10.jpg)
10
Content Tampering
• Image tampering– Object removing– Composition– Morphing– Re-touching– Enhancing– Computer graphics– Painting
![Page 11: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.](https://reader033.fdocuments.net/reader033/viewer/2022061616/56649e555503460f94b4bd82/html5/thumbnails/11.jpg)
11
Watermarking-Based Forensics
• Watermarking-based schemes– Fragile watermarking
• Watermarks will be undetectable when the content is changed in any way
– Semi-fragile watermarking• Watermark will survive only
legitimate distortion
– Watermarks enabling distortion localization or restoration
• A major drawback– Watermarks must be embedded
either at the time of recording or afterwards by a person authorized to do so Example: A Secure Digital Camera
![Page 12: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.](https://reader033.fdocuments.net/reader033/viewer/2022061616/56649e555503460f94b4bd82/html5/thumbnails/12.jpg)
12
Statistical Techniques for Detecting Traces
• Assumption – Digital forgeries, though visually imperceptible,
alter some underlying statistical properties of natural images
• Techniques– Re-sampled images
• Correlations between neighboring pixels
– Color Filter Array (CFA) interpolated images• Correlations are destroyed when the image is tampered
– Double compressions– Duplicated regions– Inconsistent noise patterns
![Page 13: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.](https://reader033.fdocuments.net/reader033/viewer/2022061616/56649e555503460f94b4bd82/html5/thumbnails/13.jpg)
13
References
• Neil F. Johnson and Sushil Jajodia , “Steganalysis: The Investigation of Hidden Information,” IEEE Information Technology Conference, New York, USA, September 1998
• Anil K. Jain, Arun Ross and Salil Prabhakar, “An Introduction to Biometric Recognition”, IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, January 2004
• Paul Blythe and Jessica Fridrich, “Secure Digital Camera,” Digital Forensic Research Workshop, 2004
• Alin C. Popescu, Statistic Tools for Digital Image Forensics, PhD Dissertation, December 2004