icmns 2006 itb bandung

17
IMAGE COPYRIGHT IMAGE COPYRIGHT PROTECTION USING PROTECTION USING WATERMARKING IN WEB WATERMARKING IN WEB APPLICATION WITH APPLICATION WITH GDI+ GDI+ Soetam Rizky Wicaksono, S.Kom, MCP Information System Faculty Information System Faculty STIKOM Surabaya STIKOM Surabaya Raya Kedung Baruk 98 Raya Kedung Baruk 98 Surabaya Surabaya

Upload: soetam-rizky

Post on 16-Apr-2017

691 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: ICMNS 2006 ITB Bandung

IMAGE COPYRIGHT IMAGE COPYRIGHT PROTECTION USING PROTECTION USING WATERMARKING IN WATERMARKING IN WEB APPLICATION WEB APPLICATION WITH GDI+WITH GDI+

Soetam Rizky Wicaksono, S.Kom, MCP

Information System Faculty Information System Faculty STIKOM Surabaya STIKOM Surabaya Raya Kedung Baruk 98Raya Kedung Baruk 98SurabayaSurabaya

Page 2: ICMNS 2006 ITB Bandung

Why Need Protection ?

• Too many images in web• Duplication, copyright fraud,

retouching / manipulation• Protection via login process or

subscription is not the best way anymore, too many ways to crack them, event with kiddies script

Page 3: ICMNS 2006 ITB Bandung

Solution Options For Web

• Image serialization( already done at SITIA 2006 )

• Convert into machine unreadable format although human readable such as : base-64, HTML etc.( Will be done at SNIKTI 2007 )

• Steganography( Will be done at KNSI 2007 )

• Watermarking

Page 4: ICMNS 2006 ITB Bandung

Chosen Option

On-the-fly watermarking :• Can be used not only in web

application, however, more appropriate applied in web application

• Using GDI+ in .NET Framework, thus it won’t charge additional time for webmaster in creating watermarking in upload process

Page 5: ICMNS 2006 ITB Bandung

Why Watermarking ?

• The amount of embedded information has a direct influence on watermark robustness.

• Embedding strength – there is trade-off between watermark embedding robustness and quality.

Sagarmay, Deb (ed), “Multimedia System and Content-Based Image Retrieval”, Idea Group, London, 2004.

Page 6: ICMNS 2006 ITB Bandung

Watermarking Weaknesses

• Selecting layers with the same pattern or same color

• Eliminate using imaging tools • Cropping technique

Page 7: ICMNS 2006 ITB Bandung

Avoid Watermarking Attacks

• Avoid placing watermark layer only in the corner of original image to eliminate cropping attack

• Placing more than one watermark layer

• Make gradient in watermark layer to avoid same-pattern attack

Page 8: ICMNS 2006 ITB Bandung

GDI+• An all-purpose drawing model for .NET

applications. • GDI+ has a number of uses in .NET, including

writing documents to the printer, displaying graphics in a Windows application, and rendering graphics in a web page.

• Using GDI+ code to draw a graphic is slower than using a static image file.

• However, it gives much more freedom and enables several possibilities that weren’t possible (or were prohibitively difficult) in earlier web development platforms

Page 9: ICMNS 2006 ITB Bandung

GDI+ Basics

• Create the in-memory bitmap where to perform all drawing.

• Create a GDI+ graphics context for the image. This gives the System.Drawing.Graphics object

• Perform the drawing using the methods of the Graphics object. Draw and fill lines and shapes, and can even copy bitmap content from existing files.

• Write the binary data for the image to the browser by using the Response.OutputStream property.

Page 10: ICMNS 2006 ITB Bandung

Watermarking Implementation

• Assuming that image file which will be protected already located at web server, GDI+ will read the original image as new layer

• Generate a new layer for watermark, which consist of copyright text

• Merge both layers

Page 11: ICMNS 2006 ITB Bandung

Detail Implementation• Take place at zero pixel for x

coordinate from the original image and started from 40 pixel for y coordinate from the original image.

• Assuming that image file which will be protected from internet infringement copyright has size more than 100x100 pixels.

• Only aim to be example, in further development, it should be adjusted within the image size.

Page 12: ICMNS 2006 ITB Bandung

Detail Implementation

Original image

Watermark layer

40

Page 13: ICMNS 2006 ITB Bandung

ASP .NET 2.0 Implementation

• Create original image as the container for watermarking layer

• Create a new layer which will going to be a watermark layer, contains text with gradient brush in order to restraint layer-removing technique

Page 14: ICMNS 2006 ITB Bandung

ASP .NET 2.0 Implementation

• Merging both layer into one layer and save it into a memory stream, and then display it into JPEG format.

• Assuming that the original file is also in JPEG format.

• For real application, result format should be the same with the original format of image file.

Page 15: ICMNS 2006 ITB Bandung

Future Development

• Watermark layer should contain many constraint to restrict it from advanced layer removing tehcniques, and as well printing infringement abuse.

• Reserve another method to combine, in order to increase security in image layering

Page 16: ICMNS 2006 ITB Bandung

Future Development ( II )

• Text variable in watermarking layer should be in better format, such as copyright author, date and also can include EXIF information.

• Integrate it into an XML Web Service

• Watermark layer can be encrypted using ligthweight algorithm such as TEA or XTEA

Page 17: ICMNS 2006 ITB Bandung

[email protected]

Soetam Rizky WicaksonoSoetam Rizky Wicaksono

Information System Faculty Information System Faculty STIKOM Surabaya STIKOM Surabaya Raya Kedung Baruk 98Raya Kedung Baruk 98SurabayaSurabaya