Multimedia Network Security (Multimedia...

36
Multimedia Network Security (Multimedia Security) Instructor: Hamid R. Rabiee We have used the resources mentioned in the Reference section of this presentation (on page 55) to prepare this lecture. Spring 2012

Transcript of Multimedia Network Security (Multimedia...

Page 1: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Multimedia Network Security

(Multimedia Security)

Instructor: Hamid R. Rabiee

We have used the resources mentioned in the Reference section of this

presentation (on page 55) to prepare this lecture.

Spring 2012

Page 2: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

2

Outlines

Watermarking

Introduction

Applications

Characteristics

Algorithms

Attacks

Secure Media Streaming

Security-enabled networks

Digital Rights Management (DRM) encryption

Copy protection in home networks

dynamic watermarking

Secure Scalable Streaming

Digital Media Lab - Sharif University of Technology

Page 3: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Information Hiding

Information Hiding…..started with

Steganography (art of hidden writing):

The art and science of writing hidden messages in such a way that no one apart

from the intended recipient knows of the existence of the message. The

existence of information is secret.

3 Digital Media Lab - Sharif University of Technology

Page 4: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

What is Watermarking and Watermark?

A digital watermark is a “secret key dependent” signal “inserted” into digital

multimedia data.

Embedding Visible/Invisible Codes in Multimedia Data for Security Purpose

Digital Watermarking Media

Video

Audio

To design and implement a copyright protection scheme for music

Images

4 Digital Media Lab - Sharif University of Technology

Page 5: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Steganography vs. Watermarking

Information Hiding (no security concern)

Watermarking (with security concern)

5 Digital Media Lab - Sharif University of Technology

Page 6: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Watermarking Applications

Applications include

Rights management

Copyright protection and ownership Assertion

Authentication, verification and tamper proofing

Content labeling

Usage Control

Fingerprinting

6 Digital Media Lab - Sharif University of Technology

Page 7: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Copyright Protection

Copyright Protection: To prove the

ownership of digital media

The primary reason for using

watermarks is to identify the owner

of the content by an invisible

hidden “mark” that is imprinted

into the image

7

Eg. Cut paste of images

Hidden Watermarks represent

the copyright information

Digital Media Lab - Sharif University of Technology

Page 8: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Requirements of the Application

The watermark does not incur visible (or audible) artifacts to the ordinary

users.

The watermark is independent of the data format.

The information carried by the watermark is robust to content

manipulations, compression, and so on.

The watermark can be detected without the unwatermarked original

content.

The watermark can be identified by some kind of “keys” that are used to

identify large number of individual contents uniquely.

8 Digital Media Lab - Sharif University of Technology

Page 9: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Tamper Proofing

Tamper proofing: To find out if

data was tampered.

The objective is not to protect the

contents from being copied or

stolen, but is to provide a method to

authenticate the image and assure

the integrity of the image.

It is especially used by automobile

insurance companies

9

Eg. Change meaning of images

Hidden Watermarks track

change in meaning Issues: Accuracy of detection

Digital Media Lab - Sharif University of Technology

Page 10: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Tampering with images

The picture on the left shows an original photo of a car that has been protected

with a watermarking technology.

In the center, the same picture is shown but with a small modification: the

numbers on the license plate have been changed.

The picture on the right shows the photo after running the digital watermark

detection program on the tampered photo.

10 Digital Media Lab - Sharif University of Technology

Page 11: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Requirements of the Application

Invisible to the ordinary users,

Applicable to compressed image format (most digital cameras use JPEG

compatible format)

Sensitive to content manipulations, compression, and so on

11 Digital Media Lab - Sharif University of Technology

Page 12: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Quality Assessment

Quality Assessment: Degradation of Visual Quality

12

Loss of Visual Quality

Hidden Watermarks track change in visual quality

Digital Media Lab - Sharif University of Technology

Page 13: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Usage Control

The embedded watermark is transparently passing through the

conventional data path, and will only be detected at the digital recorders.

When the watermark detection is mandated in these recorders, this

watermark can be used to trigger the copy protection mechanism

implemented in it.

the data called Copy Control Information (CCI) is embedded into the

video data to indicate that the status of the contents is “Never Copy”,

“One Copy Allowed” or “Copy Freely”. Recording devices will be

mandated to facilitate a “watermark detector” to detect the embedded

CCI from the incoming and outgoing video data.

13 Digital Media Lab - Sharif University of Technology

Page 14: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Fingerprinting

Fingerprinting: Imperceptible watermarks used to label content for

identification purposes

If content is copied and improperly used, the watermark can be viewed

and the source of the copying can be found

14 Digital Media Lab - Sharif University of Technology

Page 15: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Visible Watermark

Purpose:

Claim the ownership and prevent content piracy.

Properties:

Robust: Watermarks must be very difficult, if not impossible, to be removed.

Non-obtrusive: Watermarks must not affect the audiovisual contents too much.

Visible: It must be visible, but it had better to be insensible.

15 Digital Media Lab - Sharif University of Technology

Page 16: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Visible reversible watermarking for electronic

distribution

Unlike other digital watermarking technologies

described above, the visible reversible watermark

is visible.

This unique form of watermarking technology

allows the content owners to embed a visible shape

or logo mark such as company’s logo on top of the

image

This mark is applied by modifying the Discrete

Cosine Transformation (DCT) coefficients of the

JPEG compressed image following certain pre-

defined rule and visual effect analysis

16 Digital Media Lab - Sharif University of Technology

Page 17: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Watermarking Requirements

Tranparency: the watermark is not visible in the image under

typical viewing conditions

Capacity: ability to detect watermarks with a low probability of

error as the number of watermarked versions of the image increases

Robust: the watermark can still be detected after the image has

undergone some linear or non linear operations

Security: Only be accessible by authorized parties

17 Digital Media Lab - Sharif University of Technology

Page 18: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Example:LSB Encoding

18

4 LSBs Watermarked 7 LSBs Watermarked

Digital Media Lab - Sharif University of Technology

Page 19: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Changing LSB in the block-based frequency domain

19 Digital Media Lab - Sharif University of Technology

Page 20: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Changing LSB in the global frequency domain

20 Digital Media Lab - Sharif University of Technology

Page 21: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Watermarking Example

Application: Copyright Protection

Design Requirements:

- Transparency

- Capacity

- Robustness

- Security

21 Digital Media Lab - Sharif University of Technology

Page 22: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Transparency

Stanford Bunny 3D Model Visible Watermarks in

Bunny Model Distortion

Watermarking

Stanford Bunny 3D Model

Watermarking

Invisible Watermarks in Bunny

Model Minimal Distortion

22 Digital Media Lab - Sharif University of Technology

Page 23: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Robustness

Adversaries can attack the data set and remove the

watermark.

Attacks are generally data dependent e.g.

Compression that adds noise can be used as an

attack to remove the watermark. Different data

types can have different compression schemes.

23 Digital Media Lab - Sharif University of Technology

Page 24: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Robustness

Value Change Attacks

Noise addition e.g. lossy compression

Uniform Affine Transformation e.g. 3D

Model being rotated in 3D space OR image being scaled

If encoding of watermarks are data value dependent

Watermark is lost Extraction process fails

24 Digital Media Lab - Sharif University of Technology

Page 25: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

SECURE MEDIA STREAMING

25 Digital Media Lab - Sharif University of Technology

Page 26: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Introduction

Before setting up a secure media distribution system, it is a good idea to

look at your goals.

security analysis

The content

The server infrastructure

Although cracking the encryption may appear to be a common threat,

it is difficult and can take a very long time. The more usual threat is

theft of the keys.

26 Digital Media Lab - Sharif University of Technology

Page 27: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Secure Streaming Techniques

Most popular secure video streaming techniques are

Security-enabled networks

Digital Rights Management (DRM) encryption

Copy protection in home networks

dynamic watermarking

Secure Scalable Streaming

It is important to understand that each represent a

different level of security and with higher security comes

more restricted distribution.

27 Digital Media Lab - Sharif University of Technology

Page 28: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Choosing Security Level

The greater the security method, the more restricted the distribution of

content can be

Restricting the access to the content by placing on a secure private network would

rank as a high level security measure

watermarking the video with a brand would rank as a low-level measure

28 Digital Media Lab - Sharif University of Technology

Page 29: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Secure Network Method

The easiest and most effective method of protecting your content is not to

allow anyone to be able access it

Restrict the ability for viewing to only those that you intend

The content is protected because only trusted viewers have access to the

network on which the content resides

Even if the intended viewer resides outside the network, they can use the

Microsoft Virtual Private Network (VPN) protocol

Another method of restricted access, even on a private network, is to

hide the IP address of the content

The streaming server itself provides additional security measures.

restricts the client’s ability to save the content

29 Digital Media Lab - Sharif University of Technology

Page 30: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

ENCRYPTION AND KEY METHOD (DRM)

In this model, the content is posted on a streaming media server residing

on the Internet

When a client clicks the link, they are required to perform an action such

as provide personal information or purchase a license to view the content

before the content is streamed to their PC.

DRM system components

Content that has been encrypted with DRM protection

License key that decrypts the DRM protected content

Third-party license provider

30 Digital Media Lab - Sharif University of Technology

Page 31: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

ENCRYPTION AND KEY METHOD (DRM)

The primary responsibilities of a DRM system are:

secure delivery of content to users

prevention of unauthorized access

enforcement of usage rules

monitoring of the use of content

A DRM system uses cryptography (symmetric key ciphers, public-key

ciphers and digital signatures) as the centerpiece for security-related

functions, which generally include secure delivery of content, secure

delivery of the content key and the usage rights, and client

authentication.

31 Digital Media Lab - Sharif University of Technology

Page 32: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

ENCRYPTION AND KEY METHOD (DRM)

DRM gives protection of the content and often includes the monetary

transaction.

First, you can encrypt content with DRM protection.

The license key itself will be created when the content is encrypted.

The license key is then securely transmitted or delivered to the third-party license

provider.

The encrypted content is placed on a streaming media server and the content access

link is placed on a web page.

When the client clicks the web link to view the content, the license provider will

transmit the license key to the client’s streaming media player.

32 Digital Media Lab - Sharif University of Technology

Page 33: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

DRM Security

Some licenses are valid for a short time period

one method that has been employed to fool such licenses is to change the

computer’s date and time.

A good DRM plug-in should be resistant to such manipulation.

33 Digital Media Lab - Sharif University of Technology

Page 34: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

Live Streaming Watermarking

For a live event, the content can be captured with and without a

watermark. This would require two encoding sessions

making one captured file an original archive without a watermark

A watermarked version for streaming distribution

34 Digital Media Lab - Sharif University of Technology

Page 35: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

References

C.Y. Lin, “Topics in Signal Processing and Multimedia Security System”,

Course Slides, Columbia University, New York,, USA, 2006.

Mark D. Fears, “SECURITY AND STREAMING MEDIA – HOW TO

SECURE YOUR VIDEO AND PROTECT YOUR REVENUE”, ViewCast

Corporation, USA, 2006.

A.M. Eskicioglu et al. ,” Security of digital entertainment content from

creation to consumption”, Signal Processing: Image Communication, vol.

18 ,pp 237–262, 2003

35 Digital Media Lab - Sharif University of Technology

Page 36: Multimedia Network Security (Multimedia Security)ce.sharif.edu/courses/90-91/2/ce873-1/resources/root/Class Notes... · If encoding of watermarks are data value dependent ... Secure

36

Any Question

Thank you!

Digital Media Lab - Sharif University of Technology