You are on page 1of 20

www.site.uottawa.

ca/~elsaddik
www.el-saddik.com

Multimedia Communications
Multimedia Technologies & Applications

Prof. Dr. Abdulmotaleb El Saddik


Multimedia Communications Research Laboratory
School of Information Technology and Engineering
University of Ottawa
Ottawa, Ontario, Canada

elsaddik @ site.uottawa.ca
1
Beyond the E
abed @ mcrlab.uottawa.ca
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Multimedia Security

2
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Multimedia and Security


Security
means to avoid attacks to computers, stored
and transmitted data, and communication
links
Safety
attempt to decrease effects which can cause
unavailability or damage of computers, stored
or transmitted data, and communication links
Multimedia
combination of discrete and continuous
media (narrow and broader sense),
independence, computer-supported
integration, communication-aware systems
3
Beyond the E
© elsaddik

1
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Security Hole Manipulation of Media Data


Digital media can be faked

Authenticity of (digital)
pictures ???

4
Beyond the E
© elsaddik
Same picture used 5 years later
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Multimedia Security

Security using multimedia:

•Privacy
•Surveillance

Security of multimedia:

•Watermarking

5
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Privacy Concerns

In the U.K.:
4.2 million closed circuit
cameras — one for every
14 people.
Average person is viewed
by 300 cameras a day.
facial and licence plate
recognition technology
to track anyone who
6
looks suspicious.
Beyond the E
© elsaddik
Is this the the kind of
future we want?

2
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Tele-Surveillance
Shift in the security paradigm from "investigation"
to "preemption"
Current systems can:
Capture video
Store video
Distribute video
New systems will:
Provide some level of detection
Need a human to further research
unusual/rare events highlighted by the system
In practice, Surveillance systems may be used for
purposes other than security
7
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Enabling technologies
Smart Sensors Environment Sensing
Integrates Multiple types of
Sensing hardware media streams
Processing unit Video, Audio
Communication Seismic sensor
interfaces Thermal detection
Advantages Multi-spectral camera
systems
Unload networks
Biometric systems
More compact • Fingerprint reader
Low cost • Retinal sensor
Simpler user interface RFID badge reader
Multiscale capture
Heterogeneous video
8
capture
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Enabling Technologies
Embedded processing
Integration of more functionalities in smaller
components
Advantages:
Sophisticated video encoding in Real-time
• H.264 (MPEG-4 Part 10) Video encoding
• Better video quality in lower levels
• Limited bandwidth requirements for
transmission
• decreased storage requirements
Lower total cost of ownership
Higher reliability
9
Beyond the E
© elsaddik
Greater flexibility and Scalability

3
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Enabling Technologies
Digital Signal Processor (DSP)
Specialized microprocessor designed
specifically for digital signal processing,
generally in real-time.
Separate program and data memories
Special Instructions for SIMD (Single
Instruction, Multiple Data) operations
Only parallel processing, no multitasking
The ability to act as a direct
memory access device if in
a host environment
Can take digital data from ADC
10 (Analog-Digital Converter)
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Embedded processing enables


Detection algorithms
to achieve enhanced
level of awareness
Video Analytics
Semantic Video
Data Classification
Pattern Analysis
Semantic analysis
Semantic
description of
content (MPEG-7)

11
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Enabling Technologies
Communication
Network topology of multiple smart sensors
I/O lines for data transmission
Communication interface for control
Massive distributed video surveillance
systems
Protocols:
Ethernet
Serial
WLAN
GPRs

12
Beyond the E
© elsaddik

4
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Self-Organizing Wireless Sensor Networks


Enables or Enhances Four phase in WSN
Basic Sensing deployment
Resource and Energy Self-awareness
Management Self-reconfiguration
• Network lifetime Self-repositioning
Cooperative signal Self-adaptation
processing
Redundancy and
recovery
Communications
Advantages
Low cost
Scalable

13
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Smart cameras - Examples

14
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Digital Watermarks for Multimedia

15
Beyond the E
© elsaddik

5
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Digital Watermarking
Watermarking is a method to hide secret
information in a multimedia content

Roots in Steganography
Stegano for “covered” and
graphos “to write”

16
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Steganography - Hiding Information


Goal
hide secret communication
hide secret messages in regular messages
attacker should not see second secret
message
secret messages are “invisible”
“invisible writing”

17
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Simple Example 1

Taking the first letter in each word

News Eight Weather: Tonight increasing snow.


Unexpected precipitation smothers eastern towns. Be
extremely cautious and use snowtires especially heading
east. The highways are knowingly slippery. Highway
evacuation is suspected. Police report emergency
situations in downtown ending near Tuesday.

Newt is upset because he thinks he is President.

18
Beyond the E
© elsaddik

6
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Simple Example 2

Taking the second letter in each word


(actually sent by a German Spy in WWII)

Apparently neutral's protest is thoroughly discounted


and ignored. Isman hard hit. Blockade issue affects
pretext for embargo on by products, ejecting suets and
vegetable oils.

Pershing sails from NY June 1.

19
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Information Hiding
Distinguished but imperceptible marks
 Contain a hidden copyright notice or serial
number
 Help to prevent unauthorized copying directly
Example
 Military Communications System
Conceal its sender, its receiver or its very
existence
 Mobile Phone System, DVD Player, Digital
Election, Cash

? ?
20
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Definition of Digital Watermarking


Digital Watermarking technology
 allows users to embed some data into digital
contents such as
• still image,
• movie and
• audio data.
When data is embedded,
it is not written at header part but embedded
directly into digital media itself by changing
media contents data.

21
Beyond the E
© elsaddik

7
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Multimedia and security


Video Conferencing:
Only allowed participants in a video
conferencing session
Pay-TV (Pay per View)
Only allowing paying customers to listen to a
live broadcast
Video on Demand
Only allowing paying customers to listen to a
recording or file
Restricting where, when or how a recording is
accessed

22
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

How It Works?

23
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Overall Model

Original Watermark
Data Data Watermark
Watermark
Attack

Watermark Watermark Extraction/Verification


Extraction/Verification
with Attack Watermark Watermark
Present absent
Resistance No Resistance
24
Beyond the E
© elsaddik

8
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Crypto & Digital Watermarking

Decryption
D’=F(D) D
Encryption

Signing Verification Authentic?


D D S Yes/No

Watermark Watermark
Casting Detection W exists?
D+W Yes/No

25
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Applications of Watermarks

Rights management
Copyrights protection
Content distribution, tracking and monitoring
Contents management
Captioning
Annotation
Access/copy control
Prevent unauthorized copy, playback of
multimedia contents
Authentication
Assure contents integrity
Prevent unauthorized alternation of contents
26
Beyond the E Detect alternation location in the contents
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Why? - Copyrighting
Watermarking preserves intellectual property
unlike encryption
Permanent proof of originality for paper
media.
• Verifies ownership of media suspected of
misappropriation
Usage Control:
• Permanent proof of ownership for digital
media.
• Preventing people making illegal copies
Content protection for preview
• Digital detection of the watermark would
27
Beyond the E
indicate the source of the image
© elsaddik

9
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Why? - Authentication
Authentication
Keeping things secret
Making sure only the right people get access
to things
(Making sure the applications don't have
security flaws)
A watermark will be destroyed when the
image is manipulated digitally in any way.
Proves authenticity of media.
• If the watermark is still intact, then the
image has not been "doctored."
• If the watermark has been destroyed, then
28
Beyond the E
the image has been tampered with.
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Types of Watermarks (I)


Visible
A visible translucent image which is overlaid
on the primary image
• Example: Visible corporate logo to protect
copyrights
Invisible
An overlaid image which cannot be seen, but
which can be detected algorithmically
Embedding level is too small to notice
Can be retrieved by extraction software
Applications:
• Authentication
29
Beyond the E • Copyrighting
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Visible Watermark
 Logo or seal of the organization which holds the rights to
the primary image, it allows the primary image to be
viewed, but still marks it clearly as the property of the
owning organization.
 Overlay the watermark in a way which makes it difficult to
remove, if the goal of indicating property rights is to be
achieved.

30
Beyond the E
© elsaddik

10
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Invisible Watermark

31
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Types of Watermarks (II)


Robust watermarks:
There should be no way of removing the
embedded information without rendering the
cover object unusable
Visible watermarks
Unperceivable watermarks
Fingerprinting:
a unique watermark in each object

Applications:
To resolve original owner/creator disputes
Detect copies copyrighted material
Fingerprinting
32
Beyond the E • Traitor tracing – detect who leaked a copy
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Types of Watermarks (II)


Fragile watermarks
Any manipulation of the cover object removes
the watermark
Can detect changed objects, compressed copies,
etc.
Also useful with fingerprinting

Applications:
Only allow devices to play watermarked
objects
• No copies
Fingerprinting
• Only allow objects to be played on one,
33
Beyond the E
© elsaddik unique device

11
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Properties/Features of Digital Watermarks

Invisible/Inaudible
Information is embedded without digital
content degradation, because of the level of
embedding operation is too small for human
to notice the change.
Inseparable
The embedded information can survive after
some processing, compression and format
transformation.
Unchanging data file size
Data size of the media is not changed before
and after embedding operation because
information is embedded directly into the
34
Beyond the E media.
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Image watermark
Spatial Watermarks
 Watermark is inserted in the spatial domain
 Has low bit capacity
 Not robust to geometric distortions
Spectral Watermarks
 Watermark is inserted in the frequency
domain
 Watermark is generated using the principle
of Direct-Sequence Spread Spectrum (DS-SS)
• Image Adaptive DCT Watermarking
• Image Adaptive DWT Watermarking

35
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Invisible Watermarking for Multimedia


 E.g. Secure Spread Spectrum
 Non-visible watermarking using random vector
 Computation of spectral components using
DCT
Discrete cosinus transformation
 Computation of various frequency bands
according to luminance and chroma values

DCT

36
Beyond the E
© elsaddik

12
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Secure Spread Spectrum

Selection of n significant points


Change values of these points by adding
watermark
E.g. v‘i = vi + α xi

37
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Secure Spread Spectrum


Identification of watermark:
Computing the difference between original
picture and test picture
Comparing difference with embedded
watermark
Robust against JPEG and MPEG compression
Robust against skaling
Robust against changing luminance and contrast

38
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Adaptive & Non-Adaptive Watermarking

Watermarked Images

Watermarks

1. Non-adaptive DCT watermarking


2. Image-adaptive watermarking using DCT
3. Image-adaptive watermarking using WT (Wavelet Transform)
39
Beyond the E
© elsaddik

13
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Video Watermarking

Watermark is added to I frames only


Drift compensation signal is needed to
compensate for watermark signals from previous
frames
Scene adaptive watermarking can prevent
removal of watermark by inter-frame collusion
There are mainly 3 copy protection states:
“one-copy”
“no-more-copy”
“never-copy”

40
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Broadcasting of Video with Watermarking

MPEG-2 Sealed Set-top Box at Receiver


TV
coded
Broadcaster
video
Conditional
sequence
Video on Access MPEG-2
Demand Server Encryption (Decryption) Decoder
and
Watermarking

Digital Watermark 1 Digital Watermark 2


(Copyright Label) (Individual Receiver ID)

Unauthorized Copy

41
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Video Watermarking Example

Original Watermarked
42
Beyond the E
© elsaddik

14
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Audio Watermarking

Watermarking in audio signal is a challenge due


to Human Auditory System (HAS)
Two main areas considered for modification,
Digital representation
• WAV, AIFF or low quality -law format, etc
Signal’s transmission pathway
• Digital, resampled, analog and over the air
Watermarking
Low bit coding
Phase coding
Spread spectrum, etc

43
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Audio - Watermarking - Integrity

Spread spectrum: Direct Sequence Spread Spectrum encoding (DS-


SS)

44
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Audio Watermarking Example

Original Watermarked

Original Watermarked

Echo Coding
Phase Coding
DSSS
Frequency Hopped Spread Spectrum
45
Beyond the E
© elsaddik Frequency Masking

15
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Watermarking 3D Objects
 Research on digital watermarking of 3D objects is
becoming important as more and more 3D data is entering
the World Wide Web.
 Problems:
One must deal with low volume of data.
Handling and editing may involve a variety of complex
geometrical or topological operations.
No unique representation of model data exists.
 The embedded watermark should be robust and resist
all/most of the following modifications:
Rotation
Translation
Uniform Scaling
Polygon simplification
Randomization of points
Re-meshing
46
Beyond the E
Mesh smoothing operation
© elsaddik
Shearing
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Requirements for 3D Object Watermarking


Geometry is the best candidate for
watermarking, being the least likely to be
removed
List of embedding primitives invariant to
different geometrical transformations:

Altered by all transformations coordinates of a point

Invariant to translation & rotation length of line, area of polygon, volume of


polyhedron
Invariant to rotation, uniform-scaling angles, ratio of areas of two polygons
& translation
Invariant to affine transformation ratio of lengths of 2 segments of a line, ratio of
volumes of 2 polyhedrons

Triangle Similarity Quadruple (TSQ) Embedding


47 Tetrahedral Volume Ratio (TVR) Embedding
Beyond the E
© elsaddik
Mesh Density Pattern Embedding
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

TSQ Algorithm

TSQ (Triangle Similarity Quadruple)Watermark


v
Embedding 0
e01 e02
h0 S
v1 e1 v2
2
e14 M h4 e24 h5 e25
e13 h3
D1 D2
e45 v5
v3 e34 v4

1. Find a set of triangles to be used as a Macro-Embedding Primitive (MEP)


2. Embed Marker value pair in the center triangle by changing {e14/e24, h4/e12}
3. Embed Subscript in the pair{e02/e01, h0/e12} by displacing vertex v0
4. Embed the two Data symbols similarly, displacing v3 and v5
5. Repeat steps 1-4 until all data symbols of the message are embedded
48
Beyond the E
© elsaddik

16
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Watermarking Standards

Being a new field no standards so far


Application environment is just like
Compression where there are too many
compression algorithms
Users prefer to use a single best-of breed
technique for each application
Standard benchmark tests are necessary to test
robustness, unintentional/intentional attacks, etc
Standard watermark application and extraction
interface would allow users to create a plug and
play environment that could select a
watermarking scheme out of many

49
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Attacks: unintentional
There are a number of unintentional and intentional
attacks:

Unintentional attacks:
Image: compression, transcoding,
printing/scanning, filtering, noise, geometric
transforms, cropping, compositing/mosaicing,...
Video: AD/DA conversion, compression,
transcoding, text/logo insertion, geometric
transformations, jitter, cropping,...
3. Attacks

50
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Attacks: intentional
Intentional attacks:
watermark removal/interference:
denoising, compression, quantization,
remodulation, blurring, averaging,...
Desynchronization (detector disabling):
cropping, affine and projective transforms,
jittering, mosaicing, collage,...
Cryptographic:
key determination (brute force), Oracle attack
(i.e., generate unmarked data by trial and
error)
Protocol:
copy attack, printing/rescanning,...
3. Attacks

51
Beyond the E
© elsaddik → Watermark research must include work on
attacks!

17
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

LAW
DMCA - Digital Millennium Copyright Act
EU copyright directive
... "Member States shall provide adequate
legal protection against the circumvention of
any effective technological measures, which
the person concerned carries out in the
knowledge, or with reasonable grounds to
know, that he or she is pursuing that
objective." ..
"..."technological measures" means any
technology, device or component that, in the
normal course of its operation, is designed to
prevent or restrict acts, in respect of works or
52
Beyond the E
other subject-matter..."
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Summary
Watermarking
Image, Video, 3-D models, Audio and Text
No watermarking technique is proven robust so
far
Study of attacks leads to intensive evaluations of
different watermarking techniques
Need for a standard to make watermarking
systems interoperable
Who is Interested:
Military and intelligence agencies
Criminals
Law enforcement and counter intelligence
Secret communication without encryption
53
Beyond the E
Media companies
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Case studies

54
Beyond the E
© elsaddik

18
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Case Study - Example (I)


Digital Commerce
 Publications
 Digital TV, DVD Digital Cash
 Digital E-Learning Digital Library
Information(Digital
Library)
 Game
 Music/Image/Movie
 E-Book(Digital Book)
 Cyber Education(E- Database
Learning) Information
 Digital Cash(Electronic
Payment Protocol)
Core
 Digital Contents
(eContents) E-book
55 Publications DVD/Game
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Case Study - Example (I)


Nevertheless, the evolution from traditional publishing towards
multimedia rich web-based publishing is underway

1st-Generation 2nd-Generation 3rd-Generation


e-publishing: e-publishing: e-publishing:
B2B services e-commerce B2C web-based services
Total volume of Internet mediated
publishing services & products

Persomalised newspapers,
magazines, e-
e-learning etc.

Web-based peer
Web-
eBooks & direct publishing
Online catalogues reviewed scientific
journals
Printing--on-
Printing on-Demand
Buying books online
Professional media services (amazon.com)
& web-
web-based databases

56
Beyond the E
© elsaddik Mid 1990s Turn of Millennium 2003+

Source: Arthur D. Little, GigaPort time


www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Case Study - Example (I)

Writer Publisher Printer Distributor Retailer


(incl. storage)

Re
Re--use

emphasis on
$
direct-to-
direct- to-plate
printing

optimisation of the
value chain

Tailoring

emphasis on
development of new
services

57
Beyond the E
© elsaddik

19
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Case Study - Example (II)

original wavelet compr.94% crumple & scan


3. Attacks

58
Beyond the E
© elsaddik
original warp mosaic
www.site.uottawa.ca/~elsaddik
www.el-saddik.com

Case Study - Example (II)


3. Attacks

composition of wavelet compressed house and warped bear

59
Beyond the E
© elsaddik

20

You might also like