Professional Documents
Culture Documents
ca/~elsaddik
www.el-saddik.com
Multimedia Communications
Multimedia Technologies & Applications
elsaddik @ site.uottawa.ca
1
Beyond the E
abed @ mcrlab.uottawa.ca
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Multimedia Security
2
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
1
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Authenticity of (digital)
pictures ???
4
Beyond the E
© elsaddik
Same picture used 5 years later
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Multimedia Security
•Privacy
•Surveillance
Security of multimedia:
•Watermarking
5
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Privacy Concerns
In the U.K.:
4.2 million closed circuit
cameras — one for every
14 people.
Average person is viewed
by 300 cameras a day.
facial and licence plate
recognition technology
to track anyone who
6
looks suspicious.
Beyond the E
© elsaddik
Is this the the kind of
future we want?
2
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Tele-Surveillance
Shift in the security paradigm from "investigation"
to "preemption"
Current systems can:
Capture video
Store video
Distribute video
New systems will:
Provide some level of detection
Need a human to further research
unusual/rare events highlighted by the system
In practice, Surveillance systems may be used for
purposes other than security
7
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Enabling technologies
Smart Sensors Environment Sensing
Integrates Multiple types of
Sensing hardware media streams
Processing unit Video, Audio
Communication Seismic sensor
interfaces Thermal detection
Advantages Multi-spectral camera
systems
Unload networks
Biometric systems
More compact • Fingerprint reader
Low cost • Retinal sensor
Simpler user interface RFID badge reader
Multiscale capture
Heterogeneous video
8
capture
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Enabling Technologies
Embedded processing
Integration of more functionalities in smaller
components
Advantages:
Sophisticated video encoding in Real-time
• H.264 (MPEG-4 Part 10) Video encoding
• Better video quality in lower levels
• Limited bandwidth requirements for
transmission
• decreased storage requirements
Lower total cost of ownership
Higher reliability
9
Beyond the E
© elsaddik
Greater flexibility and Scalability
3
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Enabling Technologies
Digital Signal Processor (DSP)
Specialized microprocessor designed
specifically for digital signal processing,
generally in real-time.
Separate program and data memories
Special Instructions for SIMD (Single
Instruction, Multiple Data) operations
Only parallel processing, no multitasking
The ability to act as a direct
memory access device if in
a host environment
Can take digital data from ADC
10 (Analog-Digital Converter)
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
11
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Enabling Technologies
Communication
Network topology of multiple smart sensors
I/O lines for data transmission
Communication interface for control
Massive distributed video surveillance
systems
Protocols:
Ethernet
Serial
WLAN
GPRs
12
Beyond the E
© elsaddik
4
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
13
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
14
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
15
Beyond the E
© elsaddik
5
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Digital Watermarking
Watermarking is a method to hide secret
information in a multimedia content
Roots in Steganography
Stegano for “covered” and
graphos “to write”
16
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
17
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Simple Example 1
18
Beyond the E
© elsaddik
6
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Simple Example 2
19
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Information Hiding
Distinguished but imperceptible marks
Contain a hidden copyright notice or serial
number
Help to prevent unauthorized copying directly
Example
Military Communications System
Conceal its sender, its receiver or its very
existence
Mobile Phone System, DVD Player, Digital
Election, Cash
? ?
20
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
21
Beyond the E
© elsaddik
7
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
22
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
How It Works?
23
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Overall Model
Original Watermark
Data Data Watermark
Watermark
Attack
8
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Decryption
D’=F(D) D
Encryption
Watermark Watermark
Casting Detection W exists?
D+W Yes/No
25
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Applications of Watermarks
Rights management
Copyrights protection
Content distribution, tracking and monitoring
Contents management
Captioning
Annotation
Access/copy control
Prevent unauthorized copy, playback of
multimedia contents
Authentication
Assure contents integrity
Prevent unauthorized alternation of contents
26
Beyond the E Detect alternation location in the contents
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Why? - Copyrighting
Watermarking preserves intellectual property
unlike encryption
Permanent proof of originality for paper
media.
• Verifies ownership of media suspected of
misappropriation
Usage Control:
• Permanent proof of ownership for digital
media.
• Preventing people making illegal copies
Content protection for preview
• Digital detection of the watermark would
27
Beyond the E
indicate the source of the image
© elsaddik
9
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Why? - Authentication
Authentication
Keeping things secret
Making sure only the right people get access
to things
(Making sure the applications don't have
security flaws)
A watermark will be destroyed when the
image is manipulated digitally in any way.
Proves authenticity of media.
• If the watermark is still intact, then the
image has not been "doctored."
• If the watermark has been destroyed, then
28
Beyond the E
the image has been tampered with.
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Visible Watermark
Logo or seal of the organization which holds the rights to
the primary image, it allows the primary image to be
viewed, but still marks it clearly as the property of the
owning organization.
Overlay the watermark in a way which makes it difficult to
remove, if the goal of indicating property rights is to be
achieved.
30
Beyond the E
© elsaddik
10
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Invisible Watermark
31
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Applications:
To resolve original owner/creator disputes
Detect copies copyrighted material
Fingerprinting
32
Beyond the E • Traitor tracing – detect who leaked a copy
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Applications:
Only allow devices to play watermarked
objects
• No copies
Fingerprinting
• Only allow objects to be played on one,
33
Beyond the E
© elsaddik unique device
11
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Invisible/Inaudible
Information is embedded without digital
content degradation, because of the level of
embedding operation is too small for human
to notice the change.
Inseparable
The embedded information can survive after
some processing, compression and format
transformation.
Unchanging data file size
Data size of the media is not changed before
and after embedding operation because
information is embedded directly into the
34
Beyond the E media.
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Image watermark
Spatial Watermarks
Watermark is inserted in the spatial domain
Has low bit capacity
Not robust to geometric distortions
Spectral Watermarks
Watermark is inserted in the frequency
domain
Watermark is generated using the principle
of Direct-Sequence Spread Spectrum (DS-SS)
• Image Adaptive DCT Watermarking
• Image Adaptive DWT Watermarking
35
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
DCT
36
Beyond the E
© elsaddik
12
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
37
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
38
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Watermarked Images
Watermarks
13
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Video Watermarking
40
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Unauthorized Copy
41
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Original Watermarked
42
Beyond the E
© elsaddik
14
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Audio Watermarking
43
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
44
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Original Watermarked
Original Watermarked
Echo Coding
Phase Coding
DSSS
Frequency Hopped Spread Spectrum
45
Beyond the E
© elsaddik Frequency Masking
15
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Watermarking 3D Objects
Research on digital watermarking of 3D objects is
becoming important as more and more 3D data is entering
the World Wide Web.
Problems:
One must deal with low volume of data.
Handling and editing may involve a variety of complex
geometrical or topological operations.
No unique representation of model data exists.
The embedded watermark should be robust and resist
all/most of the following modifications:
Rotation
Translation
Uniform Scaling
Polygon simplification
Randomization of points
Re-meshing
46
Beyond the E
Mesh smoothing operation
© elsaddik
Shearing
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
TSQ Algorithm
16
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Watermarking Standards
49
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Attacks: unintentional
There are a number of unintentional and intentional
attacks:
Unintentional attacks:
Image: compression, transcoding,
printing/scanning, filtering, noise, geometric
transforms, cropping, compositing/mosaicing,...
Video: AD/DA conversion, compression,
transcoding, text/logo insertion, geometric
transformations, jitter, cropping,...
3. Attacks
50
Beyond the E
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Attacks: intentional
Intentional attacks:
watermark removal/interference:
denoising, compression, quantization,
remodulation, blurring, averaging,...
Desynchronization (detector disabling):
cropping, affine and projective transforms,
jittering, mosaicing, collage,...
Cryptographic:
key determination (brute force), Oracle attack
(i.e., generate unmarked data by trial and
error)
Protocol:
copy attack, printing/rescanning,...
3. Attacks
51
Beyond the E
© elsaddik → Watermark research must include work on
attacks!
17
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
LAW
DMCA - Digital Millennium Copyright Act
EU copyright directive
... "Member States shall provide adequate
legal protection against the circumvention of
any effective technological measures, which
the person concerned carries out in the
knowledge, or with reasonable grounds to
know, that he or she is pursuing that
objective." ..
"..."technological measures" means any
technology, device or component that, in the
normal course of its operation, is designed to
prevent or restrict acts, in respect of works or
52
Beyond the E
other subject-matter..."
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Summary
Watermarking
Image, Video, 3-D models, Audio and Text
No watermarking technique is proven robust so
far
Study of attacks leads to intensive evaluations of
different watermarking techniques
Need for a standard to make watermarking
systems interoperable
Who is Interested:
Military and intelligence agencies
Criminals
Law enforcement and counter intelligence
Secret communication without encryption
53
Beyond the E
Media companies
© elsaddik
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Case studies
54
Beyond the E
© elsaddik
18
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
Persomalised newspapers,
magazines, e-
e-learning etc.
Web-based peer
Web-
eBooks & direct publishing
Online catalogues reviewed scientific
journals
Printing--on-
Printing on-Demand
Buying books online
Professional media services (amazon.com)
& web-
web-based databases
56
Beyond the E
© elsaddik Mid 1990s Turn of Millennium 2003+
Re
Re--use
emphasis on
$
direct-to-
direct- to-plate
printing
optimisation of the
value chain
Tailoring
emphasis on
development of new
services
57
Beyond the E
© elsaddik
19
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
58
Beyond the E
© elsaddik
original warp mosaic
www.site.uottawa.ca/~elsaddik
www.el-saddik.com
59
Beyond the E
© elsaddik
20