from digital watermarking to multimedia forensics: how can they help to detect lost identities in...

29
From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work? Shujun LI ( 树树 ) Senior Lecturer Department of Computing University of Surrey http://www.hooklee.com

Upload: shujun-li

Post on 19-Feb-2017

199 views

Category:

Science


0 download

TRANSCRIPT

Page 1: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

From Digital Watermarking to Multimedia Forensics:

How can they help to detect lost identities in multimedia work?

Shujun LI (李树钧 )Senior Lecturer

Department of ComputingUniversity of Surrey

http://www.hooklee.com

Page 2: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

2

Outline

- Where is University of Surrey?

- “Current” “Solution”: Identities as Metadata- “New” Solutions?

- Active Solution: Digital Watermarking- Passive Solution: Multimedia Forensics- Active Solution: Registering Your Work?

- Expertise of Researchers at Surrey Computing

- Questions and Answers

Page 3: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

3

Central London Guildford, Surrey

Highway A3: 33 milesFastest train: 33 mins

Page 4: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

4

Guildford Station Surrey Computing

Guildford Railway Station Surrey Computing (by walk):17 mins

Page 5: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

5

Dept. Computing @ University of Surrey

Page 6: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

Detecting Lost Identities:From Digital Watermarking to Multimedia Forensics

Identities in Multimedia Work

Page 7: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

7

Current Solution: Identities as Metadata

- Many media formats support metadata (e.g. Exif, IPTC IIM and XMP) as part of their file headers.

Page 8: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

8

Identities as Metadata: Problems

- Location is public Unauthorised removal- Content is public Unauthorised modification

Page 9: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

9

Solutions?

- Active Solution: Digital Watermarking- Making metadata dependent on the content itself and

secret Change the metadata = Change the content!- Active = Some information (watermark) needs

embedding into the protected work when/after the multimedia work is created in an additional process.

- Passive Solution: Multimedia Forensics- Discovering information which was NOT actively

embedded into the multimedia work.- Where is the information from? – Left by the capturing

device/creator as part of the natural process.- Multimedia work Device Owner (Author?)

Page 10: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

10

Solutions? (continued)

- Active Solution: Register Your Work?- Register your multimedia work at a trusted center (e.g.

one maintained by the IPO) actively.- It does not need to be done by the author, but can be

done by the capturing device (when it connects to the Internet) or some software (when a piece of multimedia work is uploaded to the Web).

- One does not have to register the whole work, but only its (cryptographic and/or perceptual) hash value plus some identification information (e.g. device ID, username).

- This can supplement the other two solutions.

Page 11: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

Detecting Lost Identities:From Digital Watermarking to Multimedia Forensics

Active Solution:Digital Watermarking

Page 12: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

12

What is a digital watermark?

- A digital watermark is a digital artefact embedded into a cover work which is also a digital artefact.

- It can be a textual message, an image or just a random number (like an ID) represented as a number of bits.

- The process of embedding a digital watermark is called digital watermarking.

- It may be visible or invisible. When it is visible, it mimics watermarks printed on the paper.

Page 13: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

13

Identities as watermark

- A typical application of digital watermarking is copyright protection.- The watermark is a copyright claim: “All rights reserved

Shujun Li, University of Surrey 2012”.- The watermark needs to be secured! – Only the owner

knows the embedding/extraction key.- The key can be disclosed to settle an ownership dispute.

Page 14: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

14

Conflicting objectives

- Fidelity/Imperceptibility = The watermark should not degrade the perceptual quality to compromise the value of the protected work.

- Security = Surviving malicious attacks- Capacity = More information embedded- Robustness/Fragility = Surviving benign processing

- It is impossible to have an ideal system!

Robustness / Fragility

Fidelity / Imperceptibility

S e c u r i t y

Capacity

Page 15: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

15

Security is complicated!

- Watermarked-only attack- The attacker has a number of watermarked works only.

- Known-watermark/message attack- The attacker has access to a number of watermarked works and

the watermark(s) embedded in them.- Known-cover/original attack

- The attacker has access to a number of watermarked works and the original cover work(s).

- Chosen-cover/original attack- The attacker can choose the original cover work(s) in which the

watermark(s) is/are embedded.- Known-detector attack

- The attacker has access to the detector.

Page 16: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

16

Security is complicated!

- Unauthorized watermark embedding- The attacker wants to forge a watermark or modify a watermark

already embedded.- Example: to claim the ownership over a work of others.

- Unauthorized watermark removal- The attacker wants to remove the watermark embedded in a

watermarked work.- Example: to remove the watermark/fingerprint in a watermarked

(copyrighted) work.- Unauthorized watermark detection

- The attacker wants to detect the watermark embedded in a watermarked work.

- Example: to disclose the author of a watermarked work.

Page 17: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

17

Watermarking by cameras

- Digital cameras capable of embedding digital watermarks do (or did?) exist.- Epson PhotoPC 3000Z/700/750Z/800/800Z- Kodak DC200/DC260/DC290

Page 18: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

18

Watermarking by cameras

- Paul Blythe and Jessica Fridrich, “Secure Digital Camera,” in Proceedings of 4th Annual Digital Forensic Research Workshop (DFRWS 2004), Baltimore, August 11-13, 2004- Watermark = Biometric (iris) patterns of the

photographer + Cryptographic hash of the image + Time, Date + …

- The watermarking process is LOSSLESS. The distortion caused by the watermark can be restored without any error.

Page 19: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

19

Digital watermarking: problems

- Impossible to have an ideal watermarking scheme.- If the accuracy is not too high, can the results be still used?- Can some (advanced) attacks be ignored?

- Configuring a watermarking scheme is very complicated.- How to balance different objectives?

- Require actions from both vendors and users.- Vendors provide the feature.- Users learn and use it properly.

- Somebody needs to keep the secret key and disclose it when needed.

- …

Page 20: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

Detecting Lost Identities:From Digital Watermarking to Multimedia Forensics

Passive Solution:Multimedia Forensics

Page 21: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

21

What is multimedia forensics?

- A new research topic developed since late 1990s.- Multimedia forensics = Forensic analysis of

multimedia data and devices.- Source identification = What produced this work?

Was this work computer generated or captured by a device? Who produced this work?

- Forgery detection = Is this work genuine? Which part of this work is genuine?

- Processing history recovery = What has happened on this work? What is the parameter of a step of the processing history?

- …

Page 22: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

22

Better than digital watermarking?

- Yes- No need to design an (ideal) algorithm.- No need to configure an algorithm.- No action required for vendors or users.

- No- Only limited information can be extracted.- Accuracy of extracted information could be even lower.- Often require training = No a prior information about

something, nothing can be extracted about it.- Anti-forensics can defeat forensics!

Page 23: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

23

Identifying authors

- Forensic (behavioural) biometrics- Like handwritten signatures, intrinsic

features in multimedia work may be linked to its authors’ identities.

- BBC News, New Vincent van Gogh painting identified, 9 November 2013- “The museum said the painting was

authenticated by letters, style and the physical materials used.”

- All could be identified via some multimedia forensic techniques.

Page 24: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

24

Identifying devices

- Source identification- Identifying the source device producing a digital

audio/image/video file.- How can this be done without a watermark?

- Different hardware and software components in different models

- Different intrinsic features of individual devices (noise patterns, manufacturing deviations, dust spots and dead points on camera sensor array, …)

Page 25: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

25

Linking devices with authors

- When the device of the author can be obtained.- Sometimes only the model matters.

- When some other pieces of multimedia work produced by the same device have their author(s) identified.- So “Register Your Sample Work” is important?

- When the device’s intrinsic features are registered at a trusted party.- So “Register Your Device” is important?

Page 26: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

Detecting Lost Identities:From Digital Watermarking to Multimedia Forensics

Expertise of Researchers @Surrey Computing

Page 27: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

27

MSF Group @ Surrey Computing

- MSF = Multimedia, Security and Forensics- 6 academics

- Prof Anthony TS Ho (Group Head / HoD)- Prof Jianmin Jiang- Dr Johann A Briffa (Lecturer)- Dr Shujun Li (Senior Lecturer)- Dr Norman Poh (Lecturer)- Dr Stephan Wesemeyer (Tutor)

- 1 postdoctoral fellow- 13 PhD students (including 4 jointly with other

research groups)

Page 28: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

28

MSF Group @ Surrey Computing

- Multimedia Security- Digital and Multimedia Forensics- Cyber Security and Privacy- Biometrics and Health Informatics- Multimedia Coding & Visual Quality

Assessment- Digital Media Content Analysis- Big Data Analytics

Page 29: From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

Detecting Lost Identities:From Digital Watermarking to Multimedia Forensics

Thanks for your attention!

Questions + Answers