Upload
lykhanh
View
217
Download
3
Embed Size (px)
Citation preview
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Encryption, Watermarking and MojetteSecurity & Mojette
Florent Autrusseau
IRCCyN-IVCPolytech’Nantes, University of Nantes
Mojette Day, 4 Feb. 2015
1 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Outline
1 CollaborationsCo-authorsPublicationsProjects
2 Security topicsWatermarking & encryption
3 Works within the IRCCyN lab.Mojette watermarkingMojette EncryptionEncryption+Coding
4 Conclusion
2 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Outline
1 CollaborationsCo-authorsPublicationsProjects
2 Security topicsWatermarking & encryption
3 Works within the IRCCyN lab.Mojette watermarkingMojette EncryptionEncryption+Coding
4 Conclusion
3 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Co-authors.• Jeanpierre Guédon (IRCCyN)• Andrew Kingston (IRCCyN-Univ. Canberra)• Benoit Parrein (IRCCyN)• Myriam Servières (IRCCyN-Cerma)• Junyu Dong (Ocean Univ. China)• Thierry Hamon(IRCCyN-)• Vincent Ricordel (IRCCyN)• Pierre Verbert (IRCCyN)• Pierre Evenou (IRCCyN-Fizians)• Yves Bizais (CHU-Brest-)• Nicolas Normand (IRCCyN)• Patrizio Campisi (Uni Roma 3)• Simone Colosimo (Uni Roma 3-)• Eric Grall (Thales-)
• ...
4 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Outline
1 CollaborationsCo-authorsPublicationsProjects
2 Security topicsWatermarking & encryption
3 Works within the IRCCyN lab.Mojette watermarkingMojette EncryptionEncryption+Coding
4 Conclusion
5 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Publications (Security).• C. Zhang, J. Dong, J. Li, F. Autrusseau, "A New Information Hiding Method for Image
Watermarking Based on Mojette Transform", ISNNS, 2010• A. Kingston, F. Autrusseau, E. Grall, T. Hamon, B. Parrein, "Mojette based security"
(chap 10) The Mojette transform: Theory and Applications,wiley, 2009• A. Kingston, S. Colosimo, P. Campisi, F. Autrusseau, "Lossless Image Compression and
Selective Encryption Using a Discrete Radon Transform", IEEE-ICIP 2007• F. Autrusseau, P. Evenou, T. Hamon, "Secure Distributed Storage based on the
Mojette transform", Notere 2006• F. Autrusseau, JP. Guédon, "Chiffrement Mojette d’images médicales", ISI, Lavoisier,
2003• F. Autrusseau, JP. Guédon, Y. Bizais, "Watermarking and cryptographic schemes for
medical imaging", SPIE Medical Imaging, 2003• F. Autrusseau, JP. Guédon, "A joint multiple description-encryption image algorithm",
ICIP 2003• F. Autrusseau, JP. Guédon, "Perceptual image watermarking using a secure Mojette
transmission scheme", COST 276, 2003• F. Autrusseau, JP. Guédon, "Image Watermarking in the Fourier Domain Using the
Mojette Transform", IEEE-DSP, 2002• F. Autrusseau, JP. Guédon, "Image watermarking for copyright protection and data
hiding via the Mojette transform", SPIE 2002• F. Autrusseau, "Modélisation Psychovisuelle pour le tatouage des images", Signal and
Image processing. Ph. D. Thesis, Université de Nantes, 2002. in French• JP. Guédon, N. Normand, P. Verbert, B. Parrein, F. Autrusseau, "Load-balancing and
scalable multimedia distribution using the Mojette transform", ITCOM, 2001
6 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Outline
1 CollaborationsCo-authorsPublicationsProjects
2 Security topicsWatermarking & encryption
3 Works within the IRCCyN lab.Mojette watermarkingMojette EncryptionEncryption+Coding
4 Conclusion
7 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Funded Projects.
Research Projects
• ANR-ARA/SSIA - “Transfert Sécurisé d’images d’artHaute Résolution” (TSAR) - (2005-2008)
• Funding from Région Pays de la Loire, postdoctoralposition (Andrew Kingston) (2007-2008)
• OSEO/Région Project - Miles (2006-2009)
Partners
• IRCCyN, IETR, LIRMM, GIPSA-Lab, C2RMF, LINA,IREENA, LERIA, LUIM, LISA, IMN-PCM, LGMPA,LAUM, LSO, UCO2M.
8 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Outline
1 CollaborationsCo-authorsPublicationsProjects
2 Security topicsWatermarking & encryption
3 Works within the IRCCyN lab.Mojette watermarkingMojette EncryptionEncryption+Coding
4 Conclusion
9 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Topics.
Mojette-based security
• Watermarking• Encryption• Shared secret
Encryption
• Encryption+watermarking• Encryption+coding
10 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Watermarking - goals.Protection de copyright
• Embed an invisible copyright within images• Robustness against attacks
Steganography
• Transmit secret data• Invisible and statistically not detectable
Fingerprinting
• Embed a fragile watermark• Check Authenticity• Traitor tracing
11 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Watermarking - goals.Protection de copyright
• Embed an invisible copyright within images• Robustness against attacks
Steganography
• Transmit secret data• Invisible and statistically not detectable
Fingerprinting
• Embed a fragile watermark• Check Authenticity• Traitor tracing
11 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Watermarking - goals.Protection de copyright
• Embed an invisible copyright within images• Robustness against attacks
Steganography
• Transmit secret data• Invisible and statistically not detectable
Fingerprinting
• Embed a fragile watermark• Check Authenticity• Traitor tracing
11 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Outline
1 CollaborationsCo-authorsPublicationsProjects
2 Security topicsWatermarking & encryption
3 Works within the IRCCyN lab.Mojette watermarkingMojette EncryptionEncryption+Coding
4 Conclusion
12 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Mojette-based watermarking.
Embed ghosts
• Embed Mojette ghosts onto the image’s LSB planes.• Transmit Mojette projections for which the ghost isinvisible.
• Transmit other projections as a detection key.
• F. Autrusseau, JP. Guedon, “Image watermarking for copyright protection and datahiding via the Mojette transform”, SPIE Electronic Imaging, Security and Watermarkingof Multimedia Contents IV, vol. 4675, pp. 378-386, San Jose, CA, January 2002.
• F. Autrusseau, JP. Guedon, “Image Watermarking in the Fourier Domain Using theMojette Transform”, 14th IEEE International Conference on Digital Signal Processing(DSP2002), vol. II, pp. 725-728, Santorini Greece, July 2002.
13 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Mojette-based watermarking.Embed a Mojette ghost within the Fourier spectrum.
(a) Original Image (b) Marked Image (c) Spatial watermark
(d) Original Spectrum (e) Marked spectrum (f) Watermark inFourier space
Figure : Watermarking
14 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Mojette-based watermarking.The Mojette transform is used for the detection...
(a) Proj. of the Original spectrum (b) Proj. of the ghost
(c) Proj. of the marked spectrum (d) Proj. marked & attackedspectrum
Figure : Watermark Detection 15 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Outline
1 CollaborationsCo-authorsPublicationsProjects
2 Security topicsWatermarking & encryption
3 Works within the IRCCyN lab.Mojette watermarkingMojette EncryptionEncryption+Coding
4 Conclusion
16 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Mojette encryption.We can take benefit from the inverse Mojette
instability... (erroneous projections backprojection)
(a) One singlemodified bin.
(b) One singlemodified bin.
(c) Noise additiononto one proj.
(d) Noise additiononto one proj.(mod256).
Figure : Erroneous back-projection17 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Mojette encryption.
Use a reconstruction path
• We keep track of the 1 to 1 (bin to pixel)correspondences during the direct MT.
• Store a unique path.• Encrypt unused bins.• → The original data is mixed with encrypted data
• F. Autrusseau, JP. Guedon, Y. Bizais, "Watermarking and cryptographic schemes formedical imaging", SPIE Medical Imaging, Image processing, vol. 5032-105, pp.958-965, San Diego CA, USA, 15-20 February 2003.
• F. Autrusseau, JP. Guedon, "A joint multiple description-encryption image algorithm ",IEEE International Conference on Image Processing, ICIP’03, (3), pp. 269-272,Barcelona, Spain, 2003.
18 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Mojette encryption.Backprojection path.
Mojette bins
(p,q)
= (-1,
1)
(p,q) = (0,-1)
(p,q) = (1,1)1
23
45 6
789
10
13 12 11
156
10
1 23
45 6
789
10
13 12 11
1510
12
34
5 67
8910
13 12 11
153
1 23
45 6
789
10
13 12 11
15
12
34
5 67
8910
13 12 11
5813
1 23
45 6
789
10
13 12 11
5827
list of one-to-one pixel-bin
correspondence
Figure : Encryption
19 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Mojette encryption.The number of possible paths significantly increases.
C kn = n!
k!×(n−k)!
#bins 19 20 22 23 24 25 30 34C kn 969 4845 74613 2.45 7.35 2.06 1.48 2.29
Directions (1,5) (1,1) (1,6) (1,2) (1,0) (1,7) (1,1) (1,0)(1,3) (1,3) (1,1) (1,2) (1,1)
(1,3) (1,3) (1,2)(1,3)
Redundancy 0.187 0.250 0.375 0.437 0.500 0.562 0.875 1.125For a 4×4 ! image
20 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Outline
1 CollaborationsCo-authorsPublicationsProjects
2 Security topicsWatermarking & encryption
3 Works within the IRCCyN lab.Mojette watermarkingMojette EncryptionEncryption+Coding
4 Conclusion
21 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Encryption+Coding with the Mojette.Encryption+Coding with the Mojette
• Inter-projections coding• Intra-projections coding
Inter-projections coding
• Basis Projection +• Uncorrelated data
Basis Projection / difference projection.
proj
ect i
mag
e
intra
-pro
ject
ion
Disp
lay
as im
age
inter-proj.
decorrelatedproj(1,102,b)
proj(1,103,b)
proj(1,102,bx,by)
proj(1,103,bx,by)
image256 x 205
codedprojection
basisprojection
coded basisprojection
entro
py c
ode
22 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Encryption+Coding with the Mojette.
A cascade of projections.
entro
py c
ode
and
stor
e
inter-proj.
decorrelated projections
image
coded projections
basis 1
inter-proj.
inter-proj.
basis 2
basis 3
proj
ect i
mag
e
intra
-pro
ject
ion
intra
-pro
ject
ion
proj
ect b
asis
1
intra
-pro
ject
ion
proj
ect b
asis
2
A. Kingston, S. Colosimo, P. Campisi, F. Autrusseau, "Lossless Image Compression andSelective Encryption Using a Discrete Radon Transform", IEEE International Conference onImage Processing, ICIP’07, vol. 4, pp. 465-468, San Antonio, TX, USA, 2007.
23 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
Encryption+Coding with the Mojette.Results
0 1 2 3 4 5 6 7 8 9 10 11 12 130
20
40
60
80
100
Number of loops
image ref 91782, 85 Mpixelsimage ref 91813, 85 Mpixelsimage ref 91847, 86 Mpixelsimage ref 91851, 83 Mpixels
0 1 2 3 4 5 6 7 8 9 10 11 12 13100
150
200
250
300
350
400
450
500
Number of loops
image ref 91782, 85 Mpixelsimage ref 91813, 85 Mpixelsimage ref 91847, 86 Mpixelsimage ref 91851, 83 Mpixels
0 1 2 3 4 5 6 7 8 9 10 11 12 130
10
20
30
40
50
60
Number of loops
image ref 91782, 85 Mpixelsimage ref 91813, 85 Mpixelsimage ref 91847, 86 Mpixelsimage ref 91851, 83 Mpixels
pro Fit TRIAL version
0
100
200
300
400
500Full image AESFull image 3DESCascaded Mojette + AESCascaded Mojette + 3DES
CPU
Tim
e (s
)
Image size (pixels)
256
x 36
9
512
x 73
7
768
x 11
06
1024
x 1
475
2048
x 2
950
3072
x 4
425
6144
x 8
850
4096
x 5
900
1536
x 2
213
7738
x 1
1146
24 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
ConclusionConclusion
• Initially: image watermarking...• Encountered some issues to watermark the bins, obtaina stable reconstruction and offer sufficient robustness.
• → Let’s do some encryption.• Efficient selective encryption methods..• Encryption+coding.• + Some other works on Mojette encryption (E. Grall &B. Parrein)
TODOs
• Use Mojette encryption in a distributed storageframework (Fizians)
• ...25 / 28
Security &Mojette
FlorentAutrusseau
CollaborationsCo-authorsPublicationsProjects
Security topicsWatermarking &encryption
Works within theIRCCyN lab.watermarkingEncryptionptoEncryption+Coding
Conclusion
ConclusionConclusion
• Initially: image watermarking...• Encountered some issues to watermark the bins, obtaina stable reconstruction and offer sufficient robustness.
• → Let’s do some encryption.• Efficient selective encryption methods..• Encryption+coding.• + Some other works on Mojette encryption (E. Grall &B. Parrein)
TODOs
• Use Mojette encryption in a distributed storageframework (Fizians)
• ...25 / 28
Security &Mojette
FlorentAutrusseau
AppendixRéférences
Références IJ. Dong, L. Su, Y. Zhang, F. Autrusseau, Y. Zhanbin, "Estimating IlluminationDirection of 3D Surface Texture Based on Active Basis and Mojette Transform",SPIE-JEI 2013
C. Zhang, J. Dong, J. Li, F. Autrusseau, "A New Information Hiding Method for ImageWatermarking Based on Mojette Transform", ISNNS, 2010
A. Kingston, F. Autrusseau, E. Grall, T. Hamon, B. Parrein, "Mojette based security"(chap 10) The Mojette transform: Theory and Applications,wiley, 2009
A. Kingston, F. Autrusseau, "Lossless compression" (chap 9) The Mojette transform:Theory and Applications, wiley, 2009
A. Kingston, F. Autrusseau, B. Parrein, "Multiresolution Mojette transform" (chap 6),The Mojette transform: Theory and Applications, wiley, 2009
A. Kingston, F. Autrusseau, "Lossless Image Compression via Predictive Coding ofDiscrete Radon Projections", Elsevier SigPro Image, 2008
A. Kingston, B. Parrein, F. Autrusseau, "Redundant Image Representation viaMulti-Scale Digital Radon Projection", IEEE-ICIP 2008
P. Jia, J. Dong, L. Qi, F. Autrusseau, "Directionality Measurement and IlluminationEstimation of 3D Surface Textures by Using Mojette Transform", IEEE-ICPR 2008
A. Kingston, S. Colosimo, P. Campisi, F. Autrusseau, "Lossless Image Compression andSelective Encryption Using a Discrete Radon Transform", IEEE-ICIP 2007
26 / 28
Security &Mojette
FlorentAutrusseau
AppendixRéférences
Références II
F. Autrusseau, P. Evenou, T. Hamon, "Secure Distributed Storage based on theMojette transform", Notere 2006
F. Autrusseau, B. Parrein, M. Servieres, "Lossless Compression Based on a Discrete andExact Radon Transform: A Preliminary Study",IEEE-ICASSP 2006
V. Ricordel, F. Autrusseau, W. Dupuy, D. Barba, "1D-mosaics grouping using latticevector quantization for a video browsing application", CBMI 2005
F. Autrusseau, JP. Guédon, "Chiffrement Mojette d’images médicales", ISI, Lavoisier,2003
F. Autrusseau, JP. Guédon, Y. Bizais, "Watermarking and cryptographic schemes formedical imaging", SPIE Medical Imaging, 2003
F. Autrusseau, JP. Guédon, "A joint multiple description-encryption image algorithm",ICIP 2003
F. Autrusseau, JP. Guédon, "Perceptual image watermarking using a secure Mojettetransmission scheme", COST 276, 2003
F. Autrusseau, JP. Guédon, "Image Watermarking in the Fourier Domain Using theMojette Transform", IEEE-DSP, 2002
F. Autrusseau, JP. Guédon, "Image watermarking for copyright protection and datahiding via the Mojette transform", SPIE 2002
27 / 28
Security &Mojette
FlorentAutrusseau
AppendixRéférences
Références III
F. Autrusseau, "Modélisation Psychovisuelle pour le tatouage des images", Ph. D.Thesis, U. Nantes, 2002.
JP. Guédon, N. Normand, P. Verbert, B. Parrein, F. Autrusseau, "Load-balancing and
scalable multimedia distribution using the Mojette transform", ITCOM, 2001
28 / 28