13
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security

Introduction to Multimedia Security Topics Covered in this Course Multimedia Security

Embed Size (px)

Citation preview

Page 1: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security

Introduction to Multimedia Security Topics Covered in this Course

Multimedia Security

Page 2: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security

2

Digital Rights Management

Course Coverage

Digital Watermarking

MultimediaCryptography

DRM Standards

DRM Laws

Rights Languages

Steganography/ Steganalysis

Digital Forensics

Biometrics

Multimedia Security

Privacy-Preserving

Data Mining

Page 3: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security

3

Steganography

• Steganography=“Cover” + “Writing”– The art of hiding information in ways that prevent the detection of hidden

messages– Transmitting secret messages through innocuous cover carriers in such a

manner that the existence of the embedded message is undetectable• Examples

– Invisible inks, character arrangement, covert channels…

Examination

..oxx..

Cover Message

Heating

!!!

Genuine Message + Cover Message

Examination

..oxx..

Paper

..o xx..

Paper withMessages

Genuine Message

..o xx..

Normal Ink

!!!

Cover Message

Invisible Ink

Sender Supervised Channel

Receiver

Page 4: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security

4

Digital Steganography Schemes

• Various message carriers– Digital contents

• Texts, images, audio, video

– Storage devices• Unused space or hidden p

artition

– TCP/IP packets• Unused or reserved bits in

the headee

Page 5: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security

5

Steganalysis

• Hiding information within electronic media requires alternations of the media properties that may introduce some form of degradation or unusual characteristics

• Forms of attacks and analysis on hidden information– Detecting – Extracting– Disabling/destroying

• The attacking approaches vary depending upon the methods used to embed the information into the cover media– An arms race?

Alice Bob

Eve

Page 6: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security

6

Biometric Recognition

• Biometrics = “life”+”measure”• Automatic recognition of individuals based on

their physiological and/or behavior characteristics

face fingerprint iris

user input

Page 7: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security

7

Requirements of Biometrics

• A biological measurement qualifies to be a biometric if it satisfies– Universality– Distinctiveness– Permanence – Collectability

• A practical biometric system must satisfy– Performance– Acceptability– Circumvention

Page 8: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security

8

A Biometric System

Page 9: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security

9

Applications of Biometrics

• Secure access to– Buildings– Computer systems– Laptops– Cell phones– ATMs

• “who he is” instead if “what he possesses” and “what he remembers”

ID Card

Password

Page 10: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security

10

Content Tampering

• Image tampering– Object removing– Composition– Morphing– Re-touching– Enhancing– Computer graphics– Painting

Page 11: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security

11

Watermarking-Based Forensics

• Watermarking-based schemes– Fragile watermarking

• Watermarks will be undetectable when the content is changed in any way

– Semi-fragile watermarking• Watermark will survive only

legitimate distortion

– Watermarks enabling distortion localization or restoration

• A major drawback– Watermarks must be embedded

either at the time of recording or afterwards by a person authorized to do so Example: A Secure Digital Camera

Page 12: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security

12

Statistical Techniques for Detecting Traces

• Assumption – Digital forgeries, though visually imperceptible,

alter some underlying statistical properties of natural images

• Techniques– Re-sampled images

• Correlations between neighboring pixels

– Color Filter Array (CFA) interpolated images• Correlations are destroyed when the image is tampered

– Double compressions– Duplicated regions– Inconsistent noise patterns

Page 13: Introduction to Multimedia Security Topics Covered in this Course Multimedia Security

13

References

• Neil F. Johnson and Sushil Jajodia , “Steganalysis: The Investigation of Hidden Information,” IEEE Information Technology Conference, New York, USA, September 1998

• Anil K. Jain, Arun Ross and Salil Prabhakar, “An Introduction to Biometric Recognition”, IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, January 2004

• Paul Blythe and Jessica Fridrich, “Secure Digital Camera,” Digital Forensic Research Workshop, 2004

• Alin C. Popescu, Statistic Tools for Digital Image Forensics, PhD Dissertation, December 2004