Edward J. Delp Panasonic January 13, 2000 Slide 1 Watermarking: What is the Future? Edward J. Delp...

55
Edward J. Delp Panasonic January 13, 2000 Slide 1 Watermarking: What is the Future? Edward J. Delp Purdue University School of Electrical and Computer Engineering Purdue Multimedia Testbed Video and Image Processing Laboratory (VIPER) West Lafayette, IN 47907-1285 +1 765 494 1740 +1 765 494 0880 (fax) email: [email protected] http://www.ece.purdue.edu/~ace

Transcript of Edward J. Delp Panasonic January 13, 2000 Slide 1 Watermarking: What is the Future? Edward J. Delp...

Edward J. Delp Panasonic January 13, 2000 Slide 1

Watermarking: What is the Future?

Edward J. Delp

Purdue University School of Electrical and Computer Engineering

Purdue Multimedia TestbedVideo and Image Processing Laboratory (VIPER)

West Lafayette, IN 47907-1285 +1 765 494 1740

+1 765 494 0880 (fax) email: [email protected]

http://www.ece.purdue.edu/~ace

Edward J. Delp Panasonic January 13, 2000 Slide 2

Acknowledgements• Students -

– Eduardo Asbun

– Dan Hintz

– Paul Salama

– Ke Shen

– Martha Saenz

– Eugene Lin

– Ray Wolfgang

– Greg Cook

– Sheng Liu

Edward J. Delp Panasonic January 13, 2000 Slide 3

VIPER Research Projects

• Scalable Video and Color Image Compression

– still image compression (CEZW)

– high and low bit rate video compression (SAMCoW)

– wireless video

• Error Concealment

• Content Addressable Video Databases (ViBE)

– Scene Change Detection and Identification

– Pseudo-Semantic Scene Labeling

• Multimedia Security: Digital Watermarking

Edward J. Delp Panasonic January 13, 2000 Slide 4

VIPER Research Projects

• Multicast Video

• Analysis of Mammograms

• Embedded Image and Video Processing

Edward J. Delp Panasonic January 13, 2000 Slide 5

Multimedia Security

• “Everything” is digital these days - a copy of a digital media element is identical to the original

• How can an owner protect their content?

• Are images still “fossilized light”?

• What does all of this mean in terms of law?

• Does any security system really work or does it just make us feel good!

Edward J. Delp Panasonic January 13, 2000 Slide 6

What Do We Want From a Security System?

• Access Control

• Copy Control

• Auditing (fingerprinting)

– Who did what and when?

Playback Control

Record Control

Generation Control

Edward J. Delp Panasonic January 13, 2000 Slide 7

Digital Communication System

Edward J. Delp Panasonic January 13, 2000 Slide 8

Typical Cryptography System:Trusted Users

Source UserInsecure Channel

Attacker Is this a pirate

device?

Edward J. Delp Panasonic January 13, 2000 Slide 9

Cryptography System:User Not Trusted

Source UserInsecure Channel

Authentication

Edward J. Delp Panasonic January 13, 2000 Slide 10

What is Watermarking?

• The use of perceptually invisible authentication techniques

– “controlled” distortion is introduced in a multimedia element

• Visible watermarks also exists

Is our community mesmerized by watermarking technology?

Edward J. Delp Panasonic January 13, 2000 Slide 11

Media Elements

• Audio

• Video

• Documents (including HTML documents)

• Images

• Graphics

• Graphic or Scene Models

• Programs (executable code)

Edward J. Delp Panasonic January 13, 2000 Slide 12

• Scenario

– an owner places digital images on a network server and wants to “protect” the images

• Goals

– verify the owner of a digital image

– detect forgeries of an original image

– identify illegal copies of the image

– prevent unauthorized distribution

Watermarking Scenario

Edward J. Delp Panasonic January 13, 2000 Slide 13

Where are Watermarks Used?• Watermarks have been used or proposed in:

– digital cameras

– DVD video

– audio (SDMI)

– broadcast video (in US - ATSC)

• visible watermarks now used

– “binding” mechanism in image and video databases

– key distribution systems

– preventing forgery of bank notes

Usually as secondary security conversion to “analog”

Edward J. Delp Panasonic January 13, 2000 Slide 14

Steganography

Steganography - (covered writing) techniques used to hide information within other information to conceal the very existence of the message

Used much longer than cryptography

Different than crytography in that an illegal user may intercept the message

Edward J. Delp Panasonic January 13, 2000 Slide 15

Multimedia Security Applications

• Privacy

• Forgery Detection watermarking

• Copyright Protection watermarking

• Proof of Purchase (non-deniable)

• Proof of Delivery (non-deniable)

• Intruder Detection

Edward J. Delp Panasonic January 13, 2000 Slide 16

Multimedia Security - Tools Set

• Encryption

• Authentication

• Hashing

• Time-stamping

• Watermarking

Edward J. Delp Panasonic January 13, 2000 Slide 17

Cryptographic Issues for Images

• Encryption protects image until decryption

• Authentication protects image ownership and content but does not conceal the image

• Time stamping verifies an image’s creation date, ownership and content

Copy Detection vs. Authentication

– copy detection identifies copies of an original image (possibly altered)

– authentication determines who owns an image

– an altered copy of an image would fail an authentication test

Edward J. Delp Panasonic January 13, 2000 Slide 18

Time Stamps• Time stamps use hash functions to verify a digital work’s

time of creation, ownership and content:

– When was this data created or last modified?

• Two procedures:

– certification - the author of the data can "sign" the record, or a user can fix data in time. The result is a certificate

– verification - any user can check data and its certificate to make sure it is correct

• Time stamping is a form of authentication and requires a “trusted” third party escrow agent

• http://www.surety.com/

Edward J. Delp Panasonic January 13, 2000 Slide 19

Why is Watermarking Important?

Edward J. Delp Panasonic January 13, 2000 Slide 20

Why is Watermarking Important?

Edward J. Delp Panasonic January 13, 2000 Slide 21

Why Watermarking is Important?

Edward J. Delp Panasonic January 13, 2000 Slide 22

Why is Watermarking Important?

Edward J. Delp Panasonic January 13, 2000 Slide 23

Why is Watermarking Important?

Edward J. Delp Panasonic January 13, 2000 Slide 24

Why is Watermarking Important?

Edward J. Delp Panasonic January 13, 2000 Slide 25

Why is Watermarking Important?

Edward J. Delp Panasonic January 13, 2000 Slide 26

Why is Watermarking Important?

Edward J. Delp Panasonic January 13, 2000 Slide 27

A Overview of Watermarking Techniques

• Spatial watermarking

• Spatial Frequency (DCT or wavelet) watermarking

• Visible watermarks

W a term a rk in g A lg orith m

W a term a rk

W a term a rk edIm a g e

O rig in a lIm a g e

Edward J. Delp Panasonic January 13, 2000 Slide 28

Components of aWatermarking Technique

• The watermark, W

– each owner has a unique watermark

• The marking algorithm

– incorporates the watermark into the image

• Verification algorithm

– an authentication procedure (determines the integrity / ownership of the image)

Edward J. Delp Panasonic January 13, 2000 Slide 29

Main Principles

• Transparency - the watermark is not visible in the image under typical viewing conditions

• Robustness to attacks - the watermark can still be detected after the image has undergone linear and/or nonlinear operations (this may not be a good property - fragile watermarks)

• Capacity - the technique is capable of allowing multiple watermarks to be inserted into the image with each watermark being independently verifiable

Edward J. Delp Panasonic January 13, 2000 Slide 30

Attacks

• Compression

• Filtering

• Printing and rescanning

• Geometric attacks - cropping, resampling, rotation

• Collusion - spatial and temporal

• Conversion to analog

Edward J. Delp Panasonic January 13, 2000 Slide 31

DCT Coefficient Modulation

• Fixed-length DCT watermark

• Variable-length DCT watermark

• Scaling of spatial watermark in DCT domain

Edward J. Delp Panasonic January 13, 2000 Slide 32

Fixed-length DCT Watermark

• W is a sequence of random numbers

– bipolar binary sequence, or N(0,1)

• XD and YD are DCT of X and Y

• a = scaling factor:

Y i X i aWD D( ) ( )( ) 1

Edward J. Delp Panasonic January 13, 2000 Slide 33

DCT Watermark

• W* is the extracted version of the watermark

• Verification:

• T = user-defined threshold

• If S > T, image is authentic

S W WW W

W W( , )*

*

* *

Edward J. Delp Panasonic January 13, 2000 Slide 34

Original Image

Edward J. Delp Panasonic January 13, 2000 Slide 35

Fixed-length DCT Watermark a = 0.1

Edward J. Delp Panasonic January 13, 2000 Slide 36

Fixed-length DCT Watermark a = 0.5

Edward J. Delp Panasonic January 13, 2000 Slide 37

Fixed-length DCT Watermark a = 1.0

Edward J. Delp Panasonic January 13, 2000 Slide 38

Fixed-length DCT Watermark a = 5.0

Edward J. Delp Panasonic January 13, 2000 Slide 39

Current Research Issues

• Theoretical Issues

– capacity and performance bounds

– models of the watermarking/detection process

• Robust Watermarks

– linear vs. nonlinear

– scaling and other geometric attacks

– watermarking analog representations of content

– new detection schemes

– what should be embedded (watermark structure)

Edward J. Delp Panasonic January 13, 2000 Slide 40

Fragile Watermarks

• Are we asking too much from a robust watermark?

– it is a very interesting signal processing/signal detection problem but will lead to a solution or an arms race

• Fragile watermarks do not have to worry about this!

Edward J. Delp Panasonic January 13, 2000 Slide 41

Legal Issues

• When one says: “My watermarking withstands the X attack!”

– What does it mean? (Has the watermark been damaged?)

– It is legally defensible?

– Nearly all watermarks require statistical tests for verification

Edward J. Delp Panasonic January 13, 2000 Slide 42

Research at Purdue

• Fragile and semi-fragile watermarks for forensic imaging

– are fragile watermarks better than hashing?

• Extending concept of robust image adaptive watermarks to video (with Chris Podilchuk)

– is there a temporal masking model that works?

Edward J. Delp Panasonic January 13, 2000 Slide 43

VW2D Watermarked Image

Edward J. Delp Panasonic January 13, 2000 Slide 44

Image Adaptive Watermarks (DCT)

Edward J. Delp Panasonic January 13, 2000 Slide 45

Image Adaptive Watermarks (DCT)

Edward J. Delp Panasonic January 13, 2000 Slide 46

“Watermarking” Standards

• Data Hiding Subgroup (DHSG) of the Copy Protection Technical Working Group (CPTWG)

– two groups have proposed systems for watermarking video used in DVD

– watermark will be second level of security after encryption

– the watermarks are relatively easy to defeat by difficult to remove

Edward J. Delp Panasonic January 13, 2000 Slide 47

Watermarking: Legal/Political Issues

• Watermarking technologies have not been tested in court

– is watermarking the “feel good” technology of multimedia?

• Might one be better off just doing timestamping and/or other forms of authentication?

• What does it mean when a watermarking technique survives an attack (verification based on statistical tests)

• Watermarking may always be the secondary security method

Edward J. Delp Panasonic January 13, 2000 Slide 48

Ownership

• Copyright Ownership - Who did it first? timestamp (prevents re-watermarking attacks)

Edward J. Delp Panasonic January 13, 2000 Slide 49

Unauthorized Distribution and Illegal Copies

• Unauthorized Distribution

– You took my image from my web site!

– You are selling my image from the CD-ROM you bought from me!

• Who owns it? hash and timestamp

• Is your image the same as mine? (derived work)

Edward J. Delp Panasonic January 13, 2000 Slide 50

Digital Millennium Copyright Act

It will be illegal to remove a watermark for a multimedia element

http://lcweb.loc.gov/copyright/

http://www.dfc.org/

Edward J. Delp Panasonic January 13, 2000 Slide 51

Conclusions

• Watermarking is still an interesting research area with many interesting problems

– will it be useful? (does it work?)

– will watermarking only be used a second-tier security system?

– will there be significant theoretical developments?

• Is watermarking the “feel good” technology of multimedia?

Edward J. Delp Panasonic January 13, 2000 Slide 52

Web Resources

http://www-nt.e-technik.uni-erlangen.de/~hartung/watermarkinglinks.html

Edward J. Delp Panasonic January 13, 2000 Slide 53

Watermarking Conference

Conference on Security and Watermarking of Multimedia Contents II (January 23-28, 2000) in San Jose

http://www.spie.org/web/meetings/calls/pw00/confs/

ei23.html

Edward J. Delp Panasonic January 13, 2000 Slide 54

Reference

R. B. Wolfgang, C. I. Podilchuk, and E. J. Delp, “Perceptual watermarks for digital images and video,” Proceedings of the IEEE, July 1999.

Available at:

ftp://skynet.ecn.purdue.edu/pub/dist/delp/watermark-proceedings/

Edward J. Delp Panasonic January 13, 2000 Slide 55

How I Spent My Summer