CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 ·...
Transcript of CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 ·...
![Page 1: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/1.jpg)
CSE 127CSE 127Computer SecurityComputer Security
Spring 2007Spring 2007Covert channels & WatermarkingCovert channels & Watermarking
Stefan Stefan SavageSavage
![Page 2: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/2.jpg)
Covert channelsCovert channelsCovert channelsCovert channelsSimilar problem, but here its not by accidentp , yThe adversary is trying to “create” a hidden side channel by embedding secrets in
l i tinormal communicationsThought experiment
You are Martha Stewart’s stockbroker and youYou are Martha Stewart’s stockbroker and you want to send her a message:
» 0 = “Sell Google now!”» 1 = “Buy Google now!”
But the SEC is watching you… how might you do it?
May 5, 2007 CSE 227 – Lecture10 – Malware I2
![Page 3: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/3.jpg)
Kinds of covert channelsKinds of covert channelsKinds of covert channelsKinds of covert channelsSteganographySteganographyProtocol encodingTiming encodingTiming encoding
General issues:General issues: How hard to discover embedded message?How much “bandwidth” in the embedded channel?How much bandwidth in the embedded channel?
May 5, 2007 3
![Page 4: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/4.jpg)
Steganography: OverviewSteganography: OverviewSteganography: OverviewSteganography: OverviewInformation Hidingg
Intent to promote confidentiality and integrity of information by hiding it
General ProcessHide sensitive information
» in cover medium (frequently images or sometimes audio)» in cover medium (frequently images, or sometimes audio)Combine with stego-systemResult is stego-medium
May 5, 2007 4
![Page 5: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/5.jpg)
General FrameworkGeneral FrameworkGeneral FrameworkGeneral Framework
May 5, 2007 5
![Page 6: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/6.jpg)
Cryptography Cryptography vsvsSteganographySteganographySteganographySteganography
Steganography != cryptographyCryptography
Make message unreadable» Anyone can look at it, but they can’t decipher it
SteganographyMake message hidden
» Hidden in plain sight, no one knows it existsW ki T thWorking Together
Encrypt message and hide it » using crypto and stego respectively
May 5, 2007 6
![Page 7: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/7.jpg)
Steganographic Techniques in Steganographic Techniques in Digital ImagesDigital ImagesDigital ImagesDigital Images
Stego with lossless compression imagesBinary ImagesLeast Significant Bit Insertion Kurak-McHugh Method
Lossy compression image stego-systemsLossy compression image stego systems
May 5, 2007 7
![Page 8: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/8.jpg)
Binary ImagesBinary ImagesBinary ImagesBinary ImagesTwo color images
only two color options (black = 1 & white = 0)Process
Divide the image into a set of n x m matrices» i.e. if image is 10 by 20 pixels, then make ten 4 by 5 matrices
Each matrix represents a bit» The sum of the indices mod 2
Add/remove pixels in each n x m matrix as necessary to form secret» Add/remove pixels in each n x m matrix as necessary to form secret message
Example, digitally transmitted fax Highly prone to transmission errorsHighly prone to transmission errors
May 5, 2007 8
![Page 9: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/9.jpg)
Example (2 15x15 matrices)Example (2 15x15 matrices)Example (2 15x15 matrices)Example (2 15x15 matrices)
Image on left: 61/225 black pixels = 1 bit
May 5, 2007 9
Image on left: 61/225 black pixels 1 bitImage on right: 60/225 black pixels = 0 bit
![Page 10: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/10.jpg)
Red Green Blue (RGB) ModelRed Green Blue (RGB) ModelRed Green Blue (RGB) ModelRed Green Blue (RGB) Model24-bit color representationp
16,777,216 unique colorsUses a 3-tuple
Components are 8 bitsRepresent amount of red, green, & blue
Useful since to the human eye true red (255Useful since to the human eye true red (255, 0, 0) and 1-bit away from true red (254, 0, 0) look virtually identical. y
May 5, 2007 10
![Page 11: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/11.jpg)
Least Significant Bit InsertionLeast Significant Bit InsertionLeast Significant Bit InsertionLeast Significant Bit InsertionExample formats,
G hi I h F (GIF)Graphic Interchange Format (GIF) Bitmap (BMP)
Each pixel can store 3 bitsEach pixel can store 3 bitsA pixel is RGB (8 bits, 8 bits, 8 bits)Hidden messages are fraction of the size of cover image, restricted by number of LSBs in imagey g
ProcessModify last bit of each component (the least significant bit) to d i d bitdesired bitResult is nearly identical image to original, human eye cannot detect
May 5, 2007 11
![Page 12: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/12.jpg)
ExampleExampleExampleExampleGiven 3 pixels
(113 040 210) (1110001 0101000 11010010)(113, 040, 210)10 => (1110001, 0101000, 11010010)2(113, 041, 209)10 => (1110001, 0101001, 11010001)2(113, 040, 205)10 => (1110001, 0101000, 11001101)2
Insert the letter A by modifying LSBASCII representation of A is
» Decimal: 97» Binary: 01100001
ResultResult(1110000, 0101001, 11010011)2 => (112, 041, 211)10(1110000, 0101000, 11010000)2 => (112, 040, 208)10(1110000, 0101001, 11001101)2 => (112, 041, 205)10
May 5, 2007 12
![Page 13: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/13.jpg)
ExampleExampleExampleExample
May 5, 2007 13
![Page 14: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/14.jpg)
Color DifferenceColor DifferenceColor DifferenceColor Difference
May 5, 2007 14
![Page 15: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/15.jpg)
KurakKurak--McHugh MethodMcHugh MethodKurakKurak--McHugh MethodMcHugh MethodAdaptation of LSB insertion
Hide images of same size
ProcessStore most significant bits of hidden image in least significant bits of cover image
Loss of QualityStego-image not as good as cover image
» sometimes you can tell they are differentExtracted image is not as good
May 5, 2007 15
![Page 16: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/16.jpg)
ExampleExampleExampleExampleIdea
11100010 (cover, LSB in bold)10101011 (hidden, MSB in bold)11100101 (stego)( g )
Loss of quality
May 5, 2007 16
![Page 17: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/17.jpg)
ExampleExampleExampleExample
May 5, 2007
![Page 18: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/18.jpg)
ExampleExampleExampleExample
May 5, 2007
![Page 19: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/19.jpg)
Stego for compressed imagesStego for compressed imagesStego for compressed imagesStego for compressed imagesJPEGJPEG
Different color space» YCbCr, not RGB
Discrete cosine transformationHide info in LSB of DCT coefficients matrixO l h l f t fOnly changes low frequency components of image… human visual system largely insensitive
May 5, 2007 19
![Page 20: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/20.jpg)
Surviving image transformationSurviving image transformationSurviving image transformationSurviving image transformation
RotationRotationTranslationScalingScalingCroppingCompressingCompressingNoise additionEtcEtc…
May 5, 2007 20
![Page 21: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/21.jpg)
Beyond Digital ImagesBeyond Digital ImagesBeyond Digital ImagesBeyond Digital ImagesIn addition to digital images, steganography can be g g g g p yused in
Text» Distortion technique
Audio» Discrete Fourier Transformation
VideoHide data in “noise” from compression, redundant data, or patterns in format
May 5, 2007 21
![Page 22: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/22.jpg)
Other covert Other covert channelschannelsOther covert Other covert channelschannelsProtocol headers (lots of options)( p )Order of accessesTiming between accessesg
In general, non-deterministic communicationsOptions due to randomness or user choiceTradeoffs: how hard to detect vs bandwidth of channelchannelDefenses: detection of signal vs adding noise to covert channel
May 5, 2007 22
![Page 23: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/23.jpg)
JitterbugsJitterbugsJitterbugsJitterbugsContextContext
Timing-based covert channels for interactive applications (e.g. telnet/ssh) identified for some timeBut require compromising systemCan be detected by comparing time of input viaCan be detected by comparing time of input via keyboard vs time of output at network
Alternatively: embed covert channel intoAlternatively: embed covert channel into keyboard itself
May 5, 2007 23
![Page 24: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/24.jpg)
Hiding data in keyHiding data in key--stroke stroke interinter--arrival timesarrival timesinterinter--arrival timesarrival times
AlgorithmAlgorithmIf want to send 0 then add no delayIf want to send 1 then add w/2 delayy
May 5, 2007 24
![Page 25: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/25.jpg)
Model of useModel of useModel of useModel of use
May 5, 2007 25
![Page 26: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/26.jpg)
Lots of detailsLots of detailsLots of detailsLots of detailsFramingFramingError correction, etc
Bottom line: < 1% error across the world for low bandwidth (typing speed)low bandwidth (typing speed)
May 5, 2007 26
![Page 27: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/27.jpg)
Aside: WatermarkingAside: WatermarkingAside: WatermarkingAside: WatermarkingSimilar idea to steganography but…Similar idea to steganography but…
Message isn’t hidden but is well-knownMessage isn t hidden, but is well-knownAttaches meta-data to object that is hard to removeremove
May 5, 2007 27
![Page 28: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/28.jpg)
Steganography vs WatermarkingSteganography vs WatermarkingSteganography vs. WatermarkingSteganography vs. WatermarkingSteganography
Trying to send secret message encoded in cover medium
WatermarkinggTrying to maintain secret encoded in cover mediumAdversary can transform the medium
» Possible attacksR t ti t l ti li t f (RST)Rotation, translation, scaling transforms (RST)CompressionColor/frequency requantizationNon-linear transformation (play and record)
Challenge: maintain perceptual transparency while making the watermark difficult to removeAlternatively: make it difficult to remove watermark without violating perceptual transparency
May 5, 2007 28
o at g pe ceptua t a spa e cy
![Page 29: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/29.jpg)
What’s a physical watermark?What’s a physical watermark?What s a physical watermark?What s a physical watermark?Innovation of the 13th century (Italy)Innovation of the 13 century (Italy)
Process to reduce pulp thickness in paper makingUsed to identify different paper producers/lines y p p p
Today used against forgery & for branding
May 5, 2007 29
$100 billSecurity stationary
![Page 30: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/30.jpg)
Digital watermarksDigital watermarksDigital watermarksDigital watermarksSimilar ideaSimilar idea
Embed some digital label into a digital object to identify it
Why do we care about this?
May 5, 2007 CSE 227 – Lecture13 – Watermarking30
![Page 31: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/31.jpg)
Copying is the problemCopying is the problemCopying is the problemCopying is the problemBinary data is trivial to copyBinary data is trivial to copyBut it can also be valuable
Pictures, video, songs, programs,Pictures, video, songs, programs, secret nuclear weapon documents, etc
How do you make digital objects available and manage the copying problem?
May 5, 2007 31
![Page 32: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/32.jpg)
Why watermarks?Why watermarks?Why watermarks?Why watermarks?Other solutions
Labeled content» Append a label (keyed one-way hash) to the front of the
object identifying it?object identifying it?» Problems?
Content identification» Maintain database of copyrighted objects (via content
hash function perhaps) and recognize them?If h(x) is in database, then it is copyrightedE.g. Digimarc Marcspider
» Problems?
May 5, 2007
![Page 33: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/33.jpg)
Digital watermarks for Digital watermarks for copyright identificationcopyright identificationcopyright identificationcopyright identification
OperationpEmbed (O, I): outputs watermarked version of object O, with information I contained in itRetrieve (O’): examines a watermarked object O’ and outputsRetrieve (O ): examines a watermarked object O and outputs the embedded information I
Simply check if file has I and that I is validProof that you have a file that I ownGo crawl Web and find your filesGo crawl Web and find your files
Problems?
May 5, 2007 33
![Page 34: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/34.jpg)
Other applicationsOther applicationsOther applicationsOther applicationsFingerprinting
Embed unique identifier into each copy of object (identifies source). » Hugely successful in dealing with Academy-associated piracy
C i t i t it ifi tiCopy-resistance or integrity verificationFragile watermark that doesn’t withstand copying/transformation
Ri ht tRights managementLimit acceptable uses (where, when, how, by whom)
A th ti tiAuthenticationWatermark is used to detect modification applied to cover work
» Example : Checking for fraud passport photographs
May 5, 2007 34
![Page 35: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/35.jpg)
AuthenticationAuthenticationAuthenticationAuthenticationWatermark is used to detect modification applied to cover work
May 5, 2007 35
![Page 36: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/36.jpg)
Different kinds of watermarksDifferent kinds of watermarksDifferent kinds of watermarksDifferent kinds of watermarksVisible vs invisibleVisible vs invisible
Is the watermark clearly evident?
Fragile vs robustHow well does the watermark survive transformation
Public vs private (blind vs non-blind)Do you need the original to implement retrieve?
May 5, 2007 36
![Page 37: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/37.jpg)
Visible watermarksVisible watermarksVisible watermarksVisible watermarksUseful in special situationsUseful in special situations
E.g. samplesDegrades objectDegrades objectObvious what needs to be removedEasily detected bypeople, but harder forcomputersGenerally, more interest in invisible
May 5, 2007 37
watermarks (transparently embedded)
![Page 38: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/38.jpg)
Inherent tradeoffs for Inherent tradeoffs for invisible watermarksinvisible watermarksinvisible watermarksinvisible watermarks
Generally, robustness increases if the energyGenerally, robustness increases if the energy in the watermark is larger
Perceptual quality generally decreases as energy in watermark is largergy g
Greater robustness and perceptual quality G eate obust ess a d pe ceptua qua tytend to involve greater overhead
May 5, 2007 38
![Page 39: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/39.jpg)
Early work: JordanEarly work: Jordan--KutterKutterEarly work: JordanEarly work: Jordan--KutterKutterImage watermarkingImage watermarking
Embed watermark in LSB of blue plane in the spatial domainSearch different rotations, scales, translations for watermark (RST)
Problems?
May 5, 2007 39
![Page 40: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/40.jpg)
Least Significant Bit Least Significant Bit ModulationModulationModulationModulation
Imperceptible: modify only LSBsp p y ySecureNot Robust: random change of LSBs
May 5, 2007 40
![Page 41: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/41.jpg)
TransformTransform--domain watermarksdomain watermarksTransformTransform--domain watermarksdomain watermarks
Watermark added to frequency coefficients ofWatermark added to frequency coefficients of image (e.g. for JPEG)Place mark in perceptually important regionsp p y p g
Lower-frequency DCT areasSpreads encoding across objectp g jStrong error correction in encoding
May 5, 2007 41
![Page 42: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/42.jpg)
Kinds of watermark attacksKinds of watermark attacksKinds of watermark attacksKinds of watermark attacksRemoval: remove watermark from object
If scheme is known, then filter out watermarkAveraging N versions of same object with different watermarksLossy compressionW it t k (li it d b d idth f t k h l)Write new watermark (limited bandwidth of watermark channel)
Desynchronization: prevent watermark from being recognizedGlobal geometric transformsGlobal geometric transforms
» Translation, rotation, mirroring, scaling, shearing, croppingLocal geometric transforms
» Random bending: local shifting, rotation, scalingg g gMosaic attack
» Cutting the image into pieces
May 5, 2007 42
![Page 43: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/43.jpg)
Physical Digital WatermarkingPhysical Digital WatermarkingPhysical Digital WatermarkingPhysical Digital Watermarking
Embedding digital watermark into physicalEmbedding digital watermark into physical objects
Example: Xerox machine fingerprinting
May 5, 2007
![Page 44: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/44.jpg)
Xerox DocuColor 12 PrinterXerox DocuColor 12 PrinterXerox DocuColor 12 PrinterXerox DocuColor 12 PrinterSection of paper at 60x magnification
May 5, 2007 44
![Page 45: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/45.jpg)
Xerox DocuColor 12 PrinterXerox DocuColor 12 PrinterXerox DocuColor 12 PrinterXerox DocuColor 12 PrinterSection of paper at 10x magnification
(under blue light)
May 5, 2007 45
![Page 46: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/46.jpg)
What it meansWhat it meansWhat it meansWhat it means
May 5, 2007 46
![Page 47: CSE 127 Computer Securitycseweb.ucsd.edu/classes/sp07/cse127/127sp07Lec7.pdf · 2007-05-05 · Binary Images z Two color images only two color options (black = 1 & white = 0) z Process](https://reader034.fdocuments.in/reader034/viewer/2022042107/5e86b1a0213c8a6cc352a4c7/html5/thumbnails/47.jpg)
Next timeNext timeNext timeNext timeSoftware securitySoftware security
May 5, 2007 47