introduction to multimedia security topics covered in this course

13
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security

Upload: bobby

Post on 22-Feb-2016

42 views

Category:

Documents


0 download

DESCRIPTION

Introduction to Multimedia Security Topics Covered in this Course . Multimedia Security. Course Coverage. Multimedia Security. Steganography/ Steganalysis. Digital Rights Management. DRM Standards. Rights Languages. Digital Forensics. Digital Watermarking. Biometrics. DRM Laws. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Introduction to Multimedia Security Topics Covered in this Course

Introduction to Multimedia Security Topics Covered in this Course

Multimedia Security

Page 2: Introduction to Multimedia Security Topics Covered in this Course

2

Digital Rights Management

Course Coverage

Digital Watermarking

MultimediaCryptography

DRM Standards

DRM Laws

Rights Languages

Steganography/ Steganalysis

Digital Forensics

Biometrics

Multimedia Security

Privacy-Preserving

Data Mining

Page 3: Introduction to Multimedia Security Topics Covered in this Course

3

Steganography• Steganography=“Cover” + “Writing”

– The art of hiding information in ways that prevent the detection of hidden messages

– Transmitting secret messages through innocuous cover carriers in such a manner that the existence of the embedded message is undetectable

• Examples – Invisible inks, character arrangement, covert channels…

Examination

..oxx..

Cover Message

Heating

!!!

Genuine Message + Cover Message

Examination

..oxx..

Paper

..o xx..

Paper withMessages

Genuine Message

..o xx..

Normal Ink

!!!

Cover Message

Invisible Ink

Sender Supervised Channel

Receiver

Page 4: Introduction to Multimedia Security Topics Covered in this Course

4

Digital Steganography Schemes

• Various message carriers– Digital contents

• Texts, images, audio, video

– Storage devices• Unused space or hidden p

artition– TCP/IP packets

• Unused or reserved bits in the headee

Page 5: Introduction to Multimedia Security Topics Covered in this Course

5

Steganalysis• Hiding information within electronic media requires alternations of the

media properties that may introduce some form of degradation or unusual characteristics

• Forms of attacks and analysis on hidden information– Detecting – Extracting– Disabling/destroying

• The attacking approaches vary depending upon the methods used to embed the information into the cover media– An arms race?

Alice Bob

Eve

Page 6: Introduction to Multimedia Security Topics Covered in this Course

6

Biometric Recognition

• Biometrics = “life”+”measure”• Automatic recognition of individuals based on

their physiological and/or behavior characteristics

face fingerprint iris

user input

Page 7: Introduction to Multimedia Security Topics Covered in this Course

7

Requirements of Biometrics

• A biological measurement qualifies to be a biometric if it satisfies– Universality– Distinctiveness– Permanence – Collectability

• A practical biometric system must satisfy– Performance– Acceptability– Circumvention

Page 8: Introduction to Multimedia Security Topics Covered in this Course

8

A Biometric System

Page 9: Introduction to Multimedia Security Topics Covered in this Course

9

Applications of Biometrics

• Secure access to– Buildings– Computer systems– Laptops– Cell phones– ATMs

• “who he is” instead if “what he possesses” and “what he remembers”

ID Card

Password

Page 10: Introduction to Multimedia Security Topics Covered in this Course

10

Content Tampering

• Image tampering– Object removing– Composition– Morphing– Re-touching– Enhancing– Computer graphics– Painting

Page 11: Introduction to Multimedia Security Topics Covered in this Course

11

Watermarking-Based Forensics

• Watermarking-based schemes– Fragile watermarking

• Watermarks will be undetectable when the content is changed in any way

– Semi-fragile watermarking• Watermark will survive only

legitimate distortion– Watermarks enabling distortion

localization or restoration • A major drawback

– Watermarks must be embedded either at the time of recording or afterwards by a person authorized to do so Example: A Secure Digital Camera

Page 12: Introduction to Multimedia Security Topics Covered in this Course

12

Statistical Techniques for Detecting Traces

• Assumption – Digital forgeries, though visually imperceptible,

alter some underlying statistical properties of natural images

• Techniques– Re-sampled images

• Correlations between neighboring pixels– Color Filter Array (CFA) interpolated images

• Correlations are destroyed when the image is tampered– Double compressions– Duplicated regions– Inconsistent noise patterns

Page 13: Introduction to Multimedia Security Topics Covered in this Course

13

References

• Neil F. Johnson and Sushil Jajodia , “Steganalysis: The Investigation of Hidden Information,” IEEE Information Technology Conference, New York, USA, September 1998

• Anil K. Jain, Arun Ross and Salil Prabhakar, “An Introduction to Biometric Recognition”, IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, January 2004

• Paul Blythe and Jessica Fridrich, “Secure Digital Camera,” Digital Forensic Research Workshop, 2004

• Alin C. Popescu, Statistic Tools for Digital Image Forensics, PhD Dissertation, December 2004