Introduction to Multimedia Security Topics Covered in this Course - PowerPoint PPT Presentation

1 / 13
About This Presentation
Title:

Introduction to Multimedia Security Topics Covered in this Course

Description:

Title: Introduction to Multimedia Security Author: Last modified by: Created Date: 9/17/2006 12:55:41 PM Document presentation format – PowerPoint PPT presentation

Number of Views:285
Avg rating:3.0/5.0
Slides: 14
Provided by: 6649913
Category:

less

Transcript and Presenter's Notes

Title: Introduction to Multimedia Security Topics Covered in this Course


1
Introduction to Multimedia Security Topics
Covered in this Course
  • Multimedia Security

2
Course Coverage
Multimedia Security
Steganography/ Steganalysis
Digital Rights Management
DRM Standards
Rights Languages
Digital Forensics
Digital Watermarking
Biometrics
DRM Laws
Multimedia Cryptography
Privacy-PreservingData Mining
3
Steganography
  • SteganographyCover Writing
  • The art of hiding information in ways that
    prevent the detection of hidden messages
  • Transmitting secret messages through innocuous
    cover carriers in such a manner that the
    existence of the embedded message is undetectable
  • Examples
  • Invisible inks, character arrangement, covert
    channels

Supervised Channel
Receiver
Sender
!!!
!!!
..o xx..
..o xx..
..o xx..
Genuine Message Cover Message
Cover Message
Genuine Message
Cover Message
..o xx..
Normal Ink
Invisible Ink
Heating
Paper with Messages
Examination
Examination
Paper
4
Digital Steganography Schemes
  • Various message carriers
  • Digital contents
  • Texts, images, audio, video
  • Storage devices
  • Unused space or hidden partition
  • TCP/IP packets
  • Unused or reserved bits in the headee

5
Steganalysis
  • Hiding information within electronic media
    requires alternations of the media properties
    that may introduce some form of degradation or
    unusual characteristics
  • Forms of attacks and analysis on hidden
    information
  • Detecting
  • Extracting
  • Disabling/destroying
  • The attacking approaches vary depending upon the
    methods used to embed the information into the
    cover media
  • An arms race?

Alice
Bob
Eve
6
Biometric Recognition
  • Biometrics lifemeasure
  • Automatic recognition of individuals based on
    their physiological and/or behavior
    characteristics


fingerprint
face
iris
user input
7
Requirements of Biometrics
  • A biological measurement qualifies to be a
    biometric if it satisfies
  • Universality
  • Distinctiveness
  • Permanence
  • Collectability
  • A practical biometric system must satisfy
  • Performance
  • Acceptability
  • Circumvention

8
A Biometric System
9
Applications of Biometrics
  • Secure access to
  • Buildings
  • Computer systems
  • Laptops
  • Cell phones
  • ATMs
  • who he is instead if what he possesses and
    what he remembers

ID Card
Password
10
Content Tampering
  • Image tampering
  • Object removing
  • Composition
  • Morphing
  • Re-touching
  • Enhancing
  • Computer graphics
  • Painting

11
Watermarking-Based Forensics
  • Watermarking-based schemes
  • Fragile watermarking
  • Watermarks will be undetectable when the content
    is changed in any way
  • Semi-fragile watermarking
  • Watermark will survive only legitimate distortion
  • Watermarks enabling distortion localization or
    restoration
  • A major drawback
  • Watermarks must be embedded either at the time of
    recording or afterwards by a person authorized to
    do so

Example A Secure Digital Camera
12
Statistical Techniques for Detecting Traces
  • Assumption
  • Digital forgeries, though visually imperceptible,
    alter some underlying statistical properties of
    natural images
  • Techniques
  • Re-sampled images
  • Correlations between neighboring pixels
  • Color Filter Array (CFA) interpolated images
  • Correlations are destroyed when the image is
    tampered
  • Double compressions
  • Duplicated regions
  • Inconsistent noise patterns

13
References
  • Neil F. Johnson and Sushil Jajodia ,
    Steganalysis The Investigation of Hidden
    Information, IEEE Information Technology
    Conference, New York, USA, September 1998
  • Anil K. Jain, Arun Ross and Salil Prabhakar, An
    Introduction to Biometric Recognition, IEEE
    Transactions on Circuits and Systems for Video
    Technology, Special Issue on Image- and
    Video-Based Biometrics, Vol. 14, No. 1, January
    2004
  • Paul Blythe and Jessica Fridrich, Secure Digital
    Camera, Digital Forensic Research Workshop, 2004
  • Alin C. Popescu, Statistic Tools for Digital
    Image Forensics, PhD Dissertation, December 2004
Write a Comment
User Comments (0)
About PowerShow.com