SlideShare a Scribd company logo
1 of 24
Download to read offline
Fundamentals of Watermarking and Data Hiding
Pierre Moulin
University of Illinois at Urbana–Champaign
Dept of Electrical and Computer Engineering
moulin@ifp.uiuc.edu
July 9, 2006 ISIT Tutorial, Seattle
c 2006 by Pierre Moulin. All rights reserved.
1
Outline
1. Overview
2. Basic Techniques
3. Binning Schemes and QIM Codes
4. Performance Analysis: Error Probabilities
5. Performance Analysis: Capacity
6. Applications to Images & Advanced Topics
2
SESSION 1: OVERVIEW
• Data hiding, watermarking, steganography
• Basic properties: fidelity, payload, robustness, security
3
Some Reading
• Books:
Digital Watermarking, by I. Cox, M. Miller, J. Bloom,
Morgan-Kaufmann, 2002
Information Hiding Techniques for Steganography and Digital
Watermarking, by S. Katzenbeisser and F. Petitcolas, Eds.,
Artech House, 2000
Information Hiding: Steganography and Watermarking,
by N. Johnson, Z. Duric and S. Jajodia, Kluwer, 2000
4
• New IEEE Transactions on Information Forensics and Security
(quarterly, inaugural issue in March 2006)
• Special issues of various IEEE journals, 1999 – 2005
• Annual Information Hiding Workshops
• Watermarking newsletter: www.watermarkingworld.org
• www.ifp.uiuc.edu/˜moulin
• Tutorial paper “Data Hiding Codes” by P. Moulin and
R. Koetter, Proceedings IEEE, December 2005.
5
Multimedia Security
• Dissemination of digital documents
• Owner identification
• Forgery detection
• Identification of illegal copies
• Intellectual protection
6
Authentication
7
8
Media Elements
• Audio
• Images
• Video
• Graphics
• Documents
• Computer programs
9
Nonadversarial Applications
• Database annotation
• Information embedding, e.g., audio in images, text in host
signals (movie subtitles, financial data, synchronization signals)
10
Data Hiding
• Embed data in covertext (high payload)
• Perceptual similarity requirement
• Multimedia database management
• Covert communications (military, spies, etc.)
• Steganography (στ γανω γραφω, covert writing):
conceal existence of hidden message
11
Watermarking
• Hide a few bits of information
• Original and modified signals should be perceptually similar
• Application to digital cameras, TV, DVD video, audio
• Authentication
• Transaction tracking
• Broadcast monitoring
12
Fingerprinting
• Fingerprinter marks several copies of original and distributes
copies to users 1, 2, · · · , L
• Each mark is different
• Users may collude to “remove” watermarks
• Applications: copy control, traitor tracing
13
Summary of Applications
Applications
Watermarking authentication, copyright protection
Data hiding covert communications, database annotation,
information embedding
Steganography covert communications
Fingerprinting copy control, traitor tracing
14
A Brief History
• Tattoo hidden message on head of slave (ancient Greeks)
• Invisible ink
• Secret point patterns
• Watermarks in paper (Italy, 13th century)
• Digital watermarking: early 1990’s
• Standardization attempts:
SDMI (music), ISO (MPEG video)
15
Hiding Data in Images
secret
key k
Encoder
original image S watermarked image X
Picture taken by Alice on
January 1, 2000. This message
is going to be embedded forever
in this picture. I challenge you
to remove the message without
substantially altering the picture.
1001001101001110100...............101
binary representation
Decoder
Picture taken by Alice on
January 1, 2000. This message
is going to be embedded forever
in this picture. I challenge you
to remove the message without
substantially altering the picture.
Decoded message
1001001101001110100...............101
Decoded binary
message
secret key k
Attack
Pirate
11011000...01
16
Decoder’s Task
17
Attacks on Images
Original JPEG, QF=10 4 × 4 median filtering
Gaussian filter (σ = 3) Rotated by 10 degrees Random bend
18
Basic Properties
• Fidelity (in terms of signal distortion metric)
• Payload (number of transmitted bits)
• Robustness (against adversary)
• Security (cryptanalysis of randomized code)
• Detectability (by steganalyzers/eavesdroppers)
19
System Issues
• System complexity
• Does decoder know host signal?
(public vs private watermarking)
• Security level?
• Reliance on private or public cryptographic system?
20
Attack Models
• No attack
• Deterministic attacks (reversible & irreversible)
• Stochastic attacks (memoryless & stationary)
• Code breaking
• System attacks (e.g., ambiguity, sensitivity & scrambling)
• Benchmarking (e.g., Stirmark)
21
Attacks
Attack Type Examples
Memoryless independent noise,
random pixel replacement
Blockwise memoryless JPEG compression
Attacks with stationary noise,
”statistical regularity” spatially invariant filtering,
some estimation attacks
Deterministic compression, format changes
Arbitrary attacks cropping, permutations,
desynchronization,
nonstationary noise
22
Basic Theoretical Concepts
• Information theory
• Game theory
• Detection and estimation theory
• Coding theory
• Cryptography
23
Purposes of an Information-Theoretic Approach
• make appropriate simplifying assumptions to understand
fundamental limits of IH and optimally design algorithms
• provide new insights into IH
• provide a precise framework for evaluating any IH algorithm
• develop approach that generalizes easily to related problems
Caution: cost of mismodeling may be severe in game with
opponent!
24

More Related Content

Viewers also liked

Phytonutrients and Cardiovascular Disease webinar slides
Phytonutrients and Cardiovascular Disease webinar slidesPhytonutrients and Cardiovascular Disease webinar slides
Phytonutrients and Cardiovascular Disease webinar slidesmilfamln
 
Análisis morfológico
Análisis morfológicoAnálisis morfológico
Análisis morfológicoTesi Romero
 
TCN seed and venture financing-play in three acts - 3.7.17
TCN seed and venture financing-play in three acts - 3.7.17TCN seed and venture financing-play in three acts - 3.7.17
TCN seed and venture financing-play in three acts - 3.7.17The Capital Network
 
Smart Grid Overvoltage Protection
Smart Grid Overvoltage ProtectionSmart Grid Overvoltage Protection
Smart Grid Overvoltage ProtectionMike Nager
 
спортивный праздник. рублева и.а.
спортивный праздник. рублева и.а.спортивный праздник. рублева и.а.
спортивный праздник. рублева и.а.virtualtaganrog
 
интегрированное занятие музыка зимы
интегрированное занятие музыка зимы интегрированное занятие музыка зимы
интегрированное занятие музыка зимы virtualtaganrog
 
Personalization on Higher Education Websites – The New Competitive Advantage
Personalization on Higher Education Websites – The New Competitive AdvantagePersonalization on Higher Education Websites – The New Competitive Advantage
Personalization on Higher Education Websites – The New Competitive AdvantagemStoner, Inc.
 

Viewers also liked (12)

Food Sustainability in China
Food Sustainability in ChinaFood Sustainability in China
Food Sustainability in China
 
Practical Experiences from Vietnam
Practical Experiences from VietnamPractical Experiences from Vietnam
Practical Experiences from Vietnam
 
Font options
Font optionsFont options
Font options
 
Phytonutrients and Cardiovascular Disease webinar slides
Phytonutrients and Cardiovascular Disease webinar slidesPhytonutrients and Cardiovascular Disease webinar slides
Phytonutrients and Cardiovascular Disease webinar slides
 
Análisis morfológico
Análisis morfológicoAnálisis morfológico
Análisis morfológico
 
TCN seed and venture financing-play in three acts - 3.7.17
TCN seed and venture financing-play in three acts - 3.7.17TCN seed and venture financing-play in three acts - 3.7.17
TCN seed and venture financing-play in three acts - 3.7.17
 
Smart Grid Overvoltage Protection
Smart Grid Overvoltage ProtectionSmart Grid Overvoltage Protection
Smart Grid Overvoltage Protection
 
SMART GRID
SMART GRIDSMART GRID
SMART GRID
 
спортивный праздник. рублева и.а.
спортивный праздник. рублева и.а.спортивный праздник. рублева и.а.
спортивный праздник. рублева и.а.
 
интегрированное занятие музыка зимы
интегрированное занятие музыка зимы интегрированное занятие музыка зимы
интегрированное занятие музыка зимы
 
Tic (1)
Tic (1)Tic (1)
Tic (1)
 
Personalization on Higher Education Websites – The New Competitive Advantage
Personalization on Higher Education Websites – The New Competitive AdvantagePersonalization on Higher Education Websites – The New Competitive Advantage
Personalization on Higher Education Websites – The New Competitive Advantage
 

Similar to Fundamentals of Watermarking and Data Hiding

Information and network security 17 steganography
Information and network security 17 steganographyInformation and network security 17 steganography
Information and network security 17 steganographyVaibhav Khanna
 
Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganographyXavier Prathap
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?hackdemocracy
 
Chapter 1- Fundamentals of Cryptography.pdf
Chapter 1- Fundamentals of Cryptography.pdfChapter 1- Fundamentals of Cryptography.pdf
Chapter 1- Fundamentals of Cryptography.pdfkiyya3
 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...Ulf Mattsson
 
Quantum computer in cryptography
Quantum computer in cryptographyQuantum computer in cryptography
Quantum computer in cryptographyAkshay Shelake
 
SteganographyonImage.ppt
SteganographyonImage.pptSteganographyonImage.ppt
SteganographyonImage.pptSantu Chall
 
Coco co-desing and co-verification of masked software implementations on cp us
Coco   co-desing and co-verification of masked software implementations on cp usCoco   co-desing and co-verification of masked software implementations on cp us
Coco co-desing and co-verification of masked software implementations on cp usRISC-V International
 
Deep learning Data Analysis.pptx
Deep learning Data Analysis.pptxDeep learning Data Analysis.pptx
Deep learning Data Analysis.pptxSamScott64
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYijcisjournal
 
Number Theory 5 Sem.pptx
Number Theory 5 Sem.pptxNumber Theory 5 Sem.pptx
Number Theory 5 Sem.pptxssuser0cd7c9
 
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWIMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWijcsit
 
Image Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A ReviewImage Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A ReviewAIRCC Publishing Corporation
 

Similar to Fundamentals of Watermarking and Data Hiding (20)

Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Information and network security 17 steganography
Information and network security 17 steganographyInformation and network security 17 steganography
Information and network security 17 steganography
 
digital stega slides
digital stega slidesdigital stega slides
digital stega slides
 
Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganography
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?
 
seminar presentation
seminar presentationseminar presentation
seminar presentation
 
Chapter 1- Fundamentals of Cryptography.pdf
Chapter 1- Fundamentals of Cryptography.pdfChapter 1- Fundamentals of Cryptography.pdf
Chapter 1- Fundamentals of Cryptography.pdf
 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...
 
Quantum computer in cryptography
Quantum computer in cryptographyQuantum computer in cryptography
Quantum computer in cryptography
 
SteganographyonImage.ppt
SteganographyonImage.pptSteganographyonImage.ppt
SteganographyonImage.ppt
 
Coco co-desing and co-verification of masked software implementations on cp us
Coco   co-desing and co-verification of masked software implementations on cp usCoco   co-desing and co-verification of masked software implementations on cp us
Coco co-desing and co-verification of masked software implementations on cp us
 
Deep learning Data Analysis.pptx
Deep learning Data Analysis.pptxDeep learning Data Analysis.pptx
Deep learning Data Analysis.pptx
 
Ppt nc
Ppt ncPpt nc
Ppt nc
 
Why Risk Management Fails
Why Risk Management FailsWhy Risk Management Fails
Why Risk Management Fails
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
 
Number Theory 5 Sem.pptx
Number Theory 5 Sem.pptxNumber Theory 5 Sem.pptx
Number Theory 5 Sem.pptx
 
Steganography
SteganographySteganography
Steganography
 
Ccc brochure
Ccc brochureCcc brochure
Ccc brochure
 
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWIMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
 
Image Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A ReviewImage Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A Review
 

Fundamentals of Watermarking and Data Hiding

  • 1. Fundamentals of Watermarking and Data Hiding Pierre Moulin University of Illinois at Urbana–Champaign Dept of Electrical and Computer Engineering moulin@ifp.uiuc.edu July 9, 2006 ISIT Tutorial, Seattle c 2006 by Pierre Moulin. All rights reserved. 1
  • 2. Outline 1. Overview 2. Basic Techniques 3. Binning Schemes and QIM Codes 4. Performance Analysis: Error Probabilities 5. Performance Analysis: Capacity 6. Applications to Images & Advanced Topics 2
  • 3. SESSION 1: OVERVIEW • Data hiding, watermarking, steganography • Basic properties: fidelity, payload, robustness, security 3
  • 4. Some Reading • Books: Digital Watermarking, by I. Cox, M. Miller, J. Bloom, Morgan-Kaufmann, 2002 Information Hiding Techniques for Steganography and Digital Watermarking, by S. Katzenbeisser and F. Petitcolas, Eds., Artech House, 2000 Information Hiding: Steganography and Watermarking, by N. Johnson, Z. Duric and S. Jajodia, Kluwer, 2000 4
  • 5. • New IEEE Transactions on Information Forensics and Security (quarterly, inaugural issue in March 2006) • Special issues of various IEEE journals, 1999 – 2005 • Annual Information Hiding Workshops • Watermarking newsletter: www.watermarkingworld.org • www.ifp.uiuc.edu/˜moulin • Tutorial paper “Data Hiding Codes” by P. Moulin and R. Koetter, Proceedings IEEE, December 2005. 5
  • 6. Multimedia Security • Dissemination of digital documents • Owner identification • Forgery detection • Identification of illegal copies • Intellectual protection 6
  • 8. 8
  • 9. Media Elements • Audio • Images • Video • Graphics • Documents • Computer programs 9
  • 10. Nonadversarial Applications • Database annotation • Information embedding, e.g., audio in images, text in host signals (movie subtitles, financial data, synchronization signals) 10
  • 11. Data Hiding • Embed data in covertext (high payload) • Perceptual similarity requirement • Multimedia database management • Covert communications (military, spies, etc.) • Steganography (στ γανω γραφω, covert writing): conceal existence of hidden message 11
  • 12. Watermarking • Hide a few bits of information • Original and modified signals should be perceptually similar • Application to digital cameras, TV, DVD video, audio • Authentication • Transaction tracking • Broadcast monitoring 12
  • 13. Fingerprinting • Fingerprinter marks several copies of original and distributes copies to users 1, 2, · · · , L • Each mark is different • Users may collude to “remove” watermarks • Applications: copy control, traitor tracing 13
  • 14. Summary of Applications Applications Watermarking authentication, copyright protection Data hiding covert communications, database annotation, information embedding Steganography covert communications Fingerprinting copy control, traitor tracing 14
  • 15. A Brief History • Tattoo hidden message on head of slave (ancient Greeks) • Invisible ink • Secret point patterns • Watermarks in paper (Italy, 13th century) • Digital watermarking: early 1990’s • Standardization attempts: SDMI (music), ISO (MPEG video) 15
  • 16. Hiding Data in Images secret key k Encoder original image S watermarked image X Picture taken by Alice on January 1, 2000. This message is going to be embedded forever in this picture. I challenge you to remove the message without substantially altering the picture. 1001001101001110100...............101 binary representation Decoder Picture taken by Alice on January 1, 2000. This message is going to be embedded forever in this picture. I challenge you to remove the message without substantially altering the picture. Decoded message 1001001101001110100...............101 Decoded binary message secret key k Attack Pirate 11011000...01 16
  • 18. Attacks on Images Original JPEG, QF=10 4 × 4 median filtering Gaussian filter (σ = 3) Rotated by 10 degrees Random bend 18
  • 19. Basic Properties • Fidelity (in terms of signal distortion metric) • Payload (number of transmitted bits) • Robustness (against adversary) • Security (cryptanalysis of randomized code) • Detectability (by steganalyzers/eavesdroppers) 19
  • 20. System Issues • System complexity • Does decoder know host signal? (public vs private watermarking) • Security level? • Reliance on private or public cryptographic system? 20
  • 21. Attack Models • No attack • Deterministic attacks (reversible & irreversible) • Stochastic attacks (memoryless & stationary) • Code breaking • System attacks (e.g., ambiguity, sensitivity & scrambling) • Benchmarking (e.g., Stirmark) 21
  • 22. Attacks Attack Type Examples Memoryless independent noise, random pixel replacement Blockwise memoryless JPEG compression Attacks with stationary noise, ”statistical regularity” spatially invariant filtering, some estimation attacks Deterministic compression, format changes Arbitrary attacks cropping, permutations, desynchronization, nonstationary noise 22
  • 23. Basic Theoretical Concepts • Information theory • Game theory • Detection and estimation theory • Coding theory • Cryptography 23
  • 24. Purposes of an Information-Theoretic Approach • make appropriate simplifying assumptions to understand fundamental limits of IH and optimally design algorithms • provide new insights into IH • provide a precise framework for evaluating any IH algorithm • develop approach that generalizes easily to related problems Caution: cost of mismodeling may be severe in game with opponent! 24