1 / 13

Introduction to Multimedia Security Topics Covered in this Course

Introduction to Multimedia Security Topics Covered in this Course . Multimedia Security. Course Coverage. Multimedia Security. Steganography/ Steganalysis. Digital Rights Management. DRM Standards. Rights Languages. Digital Forensics. Digital Watermarking. Biometrics. DRM Laws.

bobby
Download Presentation

Introduction to Multimedia Security Topics Covered in this Course

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction to Multimedia Security Topics Covered in this Course Multimedia Security

  2. Course Coverage Multimedia Security Steganography/ Steganalysis Digital Rights Management DRM Standards Rights Languages Digital Forensics Digital Watermarking Biometrics DRM Laws Multimedia Cryptography Privacy-PreservingData Mining

  3. Steganography • Steganography=“Cover” + “Writing” • The art of hiding information in ways that prevent the detection of hidden messages • Transmitting secret messages through innocuous cover carriers in such a manner that the existence of the embedded message is undetectable • Examples • Invisible inks, character arrangement, covert channels… Supervised Channel Receiver Sender !!! ..o xx.. !!! ..o xx.. ..o xx.. Genuine Message + Cover Message Genuine Message Cover Message Cover Message ..o xx.. Normal Ink Invisible Ink Paper with Messages Heating Examination Examination Paper

  4. Digital Steganography Schemes • Various message carriers • Digital contents • Texts, images, audio, video • Storage devices • Unused space or hidden partition • TCP/IP packets • Unused or reserved bits in the headee

  5. Steganalysis • Hiding information within electronic media requires alternations of the media properties that may introduce some form of degradation or unusual characteristics • Forms of attacks and analysis on hidden information • Detecting • Extracting • Disabling/destroying • The attacking approaches vary depending upon the methods used to embed the information into the cover media • An arms race? Alice Bob Eve

  6. Biometric Recognition • Biometrics = “life”+”measure” • Automatic recognition of individuals based on their physiological and/or behavior characteristics … fingerprint face iris user input

  7. Requirements of Biometrics • A biological measurement qualifies to be a biometric if it satisfies • Universality • Distinctiveness • Permanence • Collectability • A practical biometric system must satisfy • Performance • Acceptability • Circumvention

  8. A Biometric System

  9. Applications of Biometrics • Secure access to • Buildings • Computer systems • Laptops • Cell phones • ATMs • “who he is” instead if “what he possesses” and “what he remembers” ID Card Password

  10. Content Tampering • Image tampering • Object removing • Composition • Morphing • Re-touching • Enhancing • Computer graphics • Painting

  11. Watermarking-Based Forensics • Watermarking-based schemes • Fragile watermarking • Watermarks will be undetectable when the content is changed in any way • Semi-fragile watermarking • Watermark will survive only legitimate distortion • Watermarks enabling distortion localization or restoration • A major drawback • Watermarks must be embedded either at the time of recording or afterwards by a person authorized to do so Example: A Secure Digital Camera

  12. Statistical Techniques for Detecting Traces • Assumption • Digital forgeries, though visually imperceptible, alter some underlying statistical properties of natural images • Techniques • Re-sampled images • Correlations between neighboring pixels • Color Filter Array (CFA) interpolated images • Correlations are destroyed when the image is tampered • Double compressions • Duplicated regions • Inconsistent noise patterns

  13. References • Neil F. Johnson and Sushil Jajodia , “Steganalysis: The Investigation of Hidden Information,” IEEE Information Technology Conference, New York, USA, September 1998 • Anil K. Jain, Arun Ross and Salil Prabhakar, “An Introduction to Biometric Recognition”, IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, January 2004 • Paul Blythe and Jessica Fridrich, “Secure Digital Camera,” Digital Forensic Research Workshop, 2004 • Alin C. Popescu, Statistic Tools for Digital Image Forensics, PhD Dissertation, December 2004

More Related