12
Information Hiding Applications Nasir Memon Polytechnic University, Brooklyn

Nasir Memon Polytechnic University Brooklyn - Institute for · PDF file · 2017-10-25Polytechnic University, Brooklyn. Information Hiding ... Digital Certificate Judge Watermark Alice

  • Upload
    ngodiep

  • View
    219

  • Download
    5

Embed Size (px)

Citation preview

Page 1: Nasir Memon Polytechnic University Brooklyn - Institute for · PDF file · 2017-10-25Polytechnic University, Brooklyn. Information Hiding ... Digital Certificate Judge Watermark Alice

Information HidingApplications

Nasir MemonPolytechnic University, Brooklyn

Page 2: Nasir Memon Polytechnic University Brooklyn - Institute for · PDF file · 2017-10-25Polytechnic University, Brooklyn. Information Hiding ... Digital Certificate Judge Watermark Alice

Information Hiding

Information Hiding: Communication of information by embedding it in and retrieving it from other digital data. Depending on application we may need process to be imperceptible, robust, secure. Etc.

encoderinformationto embed

original data

retrievedinformation

markeddata

decoderchannel(processing)

receiveddata

processed data

Page 3: Nasir Memon Polytechnic University Brooklyn - Institute for · PDF file · 2017-10-25Polytechnic University, Brooklyn. Information Hiding ... Digital Certificate Judge Watermark Alice

Information HidingA Communications Framework

+

Media Carrier

HVS

Coding and Modulation

Decoding and Demodulation

Media Carrier

Message Message

Noise

More about this tomorrow!!

Page 4: Nasir Memon Polytechnic University Brooklyn - Institute for · PDF file · 2017-10-25Polytechnic University, Brooklyn. Information Hiding ... Digital Certificate Judge Watermark Alice

Where can we hide?

Media» Video» Audio» Still Images» Documents

SoftwareHardware designsEtc.We focus on data hiding in media. We mainly use images but techniques and concepts can be suitably generalized to other media.

Page 5: Nasir Memon Polytechnic University Brooklyn - Institute for · PDF file · 2017-10-25Polytechnic University, Brooklyn. Information Hiding ... Digital Certificate Judge Watermark Alice

Why Hide?

Because you do not want someone to find it» Copy protection and deterrence - Digital

WatermarksBecause you do not want any one to even know about its existence» Covert communication – Steganography

Because it is ugly» Media bridging,» Meta Data embedding

Page 6: Nasir Memon Polytechnic University Brooklyn - Institute for · PDF file · 2017-10-25Polytechnic University, Brooklyn. Information Hiding ... Digital Certificate Judge Watermark Alice

Applications of Information Hiding

Ownership assertion.Fingerprinting.Copy prevention or control.Authentication.Broadcast MonitoringMedia BridgingMeta data HidingCovert communicationEtc.

Page 7: Nasir Memon Polytechnic University Brooklyn - Institute for · PDF file · 2017-10-25Polytechnic University, Brooklyn. Information Hiding ... Digital Certificate Judge Watermark Alice

Ownership AssertionPublic-Private Key Pair, Digital Certificate

Judge

WatermarkAlice

Private Key

Original Content

Watermarked contentIllegal copy

Bob

Page 8: Nasir Memon Polytechnic University Brooklyn - Institute for · PDF file · 2017-10-25Polytechnic University, Brooklyn. Information Hiding ... Digital Certificate Judge Watermark Alice

FingerprintingOriginal

Content

Judge

Illegal copies reveal Bob’s ID

Fingerprint 1 Fingerprint nFingerprint 2

…Copy 1 Copy 2 Copy n

Bob

…Illegal copies

Page 9: Nasir Memon Polytechnic University Brooklyn - Institute for · PDF file · 2017-10-25Polytechnic University, Brooklyn. Information Hiding ... Digital Certificate Judge Watermark Alice

Copy Prevention and ControlOriginal Content

Compliant Recorder

Bob

Content withcopy preventionwatermark

Recorder disallows more than n copies

Compliant Player

Page 10: Nasir Memon Polytechnic University Brooklyn - Institute for · PDF file · 2017-10-25Polytechnic University, Brooklyn. Information Hiding ... Digital Certificate Judge Watermark Alice

Requirements

Requirements vary with application.» Perceptually transparent - should not

perceptually degrade original content.» Robust - survive accidental or malicious attempts

at removal.» Oblivious or Non-oblivious - Recoverable with or

without access to original.» Capacity – Number of bits hidden» Efficient encoding and/or decoding.

Requirements are inter-related.

Page 11: Nasir Memon Polytechnic University Brooklyn - Institute for · PDF file · 2017-10-25Polytechnic University, Brooklyn. Information Hiding ... Digital Certificate Judge Watermark Alice

Security

One requirement often ignored or at least shabbily treated – Security.What does security mean?This has been generally interpreted as “embedded information cannot be detected, read (interpreted), and/or modified, or deleted by unauthorized parties”But there is more to security …

Page 12: Nasir Memon Polytechnic University Brooklyn - Institute for · PDF file · 2017-10-25Polytechnic University, Brooklyn. Information Hiding ... Digital Certificate Judge Watermark Alice

There is More to Security

Depends on application –» Ownership Assertion» Authentication» Steganography

Rest of the day we review above applications and proposed solutions and examine security aspects a bit more carefully.We shall assume that we know how to meet other requirements like robustness etc. efficiently and effectively.