thái chí minh trần lương khiêm 1. content introduction history applications requirements ...
TRANSCRIPT
![Page 1: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/1.jpg)
Thái Chí MinhTrần Lương Khiêm
1
![Page 2: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/2.jpg)
Content
Introduction History Applications Requirements Techniques Attacks
2
![Page 3: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/3.jpg)
Content
Introduction History Applications Requirements Techniques Attacks
3
![Page 4: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/4.jpg)
Introduction
4
![Page 5: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/5.jpg)
Introduction
5
![Page 6: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/6.jpg)
Introduction
6
![Page 7: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/7.jpg)
Introduction
Relation between embedded message and cover work
Goal and assumption
7
![Page 8: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/8.jpg)
Content
Introduction History Applications Requirements Techniques Attacks
8
![Page 9: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/9.jpg)
History
Histiæus & the slave
Paper watermark, 1282
Banknote. 18th century
9
![Page 10: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/10.jpg)
History In 1954, Emil Hembrooke of the Muzak Corporation filed a patent for
watermarking” musical Works The first Information Hiding Workshop (IHW) ,which included digital
watermarking as one of its primary topics, was held in 1996
10
![Page 11: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/11.jpg)
Content
Introduction History Applications Requirements Techniques Attacks
11
![Page 12: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/12.jpg)
Applications
Broadcast monitoring Owner identification Proof of ownership Transaction tracking Content authentication Copy control
12
![Page 13: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/13.jpg)
Broadcast monitoring
13
![Page 14: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/14.jpg)
Owner identification
14
![Page 15: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/15.jpg)
Proof of ownership
15
![Page 16: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/16.jpg)
Transaction tracking
16
![Page 17: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/17.jpg)
Transaction tracking
17
![Page 18: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/18.jpg)
Content authentication
Digital signature is NOT enough
18
![Page 19: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/19.jpg)
Content authentication
19
![Page 20: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/20.jpg)
Copy control
Cryptography is NOT enough
20
![Page 21: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/21.jpg)
Copy control
21
![Page 22: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/22.jpg)
Content
Introduction History Applications Requirements Techniques Attacks
22
![Page 23: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/23.jpg)
Requirements
Perceptual Transparency Robustness Data payload With / Without originals Security
23
![Page 24: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/24.jpg)
Perceptual Transparency
24
![Page 25: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/25.jpg)
Robustness
Fragile Semi-fragile Robust
25
![Page 26: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/26.jpg)
Data payload
Data payload refers to the number of bits a watermark encodes within a unit of time or within a Work
Different applications may require very different data payloads
26
![Page 27: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/27.jpg)
With / Without originals
Non-blind watermarkingType I
Type II
Semi-blind watermarking
Blind watermarking
27
![Page 28: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/28.jpg)
Security
28
![Page 29: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/29.jpg)
The mutual dependencies among the elements
29
![Page 30: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/30.jpg)
Content
Introduction History Applications Requirements Techniques Attacks
30
![Page 31: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/31.jpg)
Techniques
LSB Spread spectrum Applying on Vietnamese documents
31
![Page 32: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/32.jpg)
Techniques
32
![Page 33: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/33.jpg)
Techniques
There are many techniques to do watermarking in digital things:Spatial domain watermarking: LSB, in text
data, …Transform domain watermarking: frequency-
based watermarking, wavelet based watermarking○ Embedding the watermark in the transform
domain from carrier object (using DCT, DFT, DWT, …)
33
![Page 34: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/34.jpg)
Techniques
LSB:Embedding:
○ Choosing some representation values (e.g pixels) of carrier object.
○ Embed the bits of message (watermark) to LSBs of representation valueMessage ‘A’: 100 0001Carrier object: RGB (2 bits)
100000 010101 101100
010001 100001 000100
101110 011010 111000
34
![Page 35: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/35.jpg)
Techniques
LSB:Embedding:
○ Choosing some representation values (e.g pixels) of carrier object.
○ Embed the bits of message (watermark) to LSBs of representation valueMessage ‘A’: 100 0001Carrier object: RGB (2 bits)
100001 010100 101100
010000 100001 000100
101111 011010 111000
35
![Page 36: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/36.jpg)
Techniques
LSB:Detector:
○ Retrieve the watermark by having the knowledge of the representation values (e.g pixels) used for embedding individuals bits
36
![Page 37: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/37.jpg)
Techniques
Spread spectrumUsing frequency domain transform to
convert the input image into another domain and embedding the watermark to this domain.
37
![Page 38: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/38.jpg)
Techniques
• Apply on Vietnamese documents
38
![Page 39: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/39.jpg)
Techniques
• Apply on Vietnamese documents
39
![Page 40: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/40.jpg)
Techniques
• Apply on Vietnamese documents○ Besides, we can use some methods:
Vertically shifting text lines Horrizontally shifting words
40
![Page 41: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/41.jpg)
Content
Introduction History Applications Requirements Techniques Attacks
41
![Page 42: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/42.jpg)
Attacks
From processing From attackers
42
![Page 43: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/43.jpg)
Attacks
The actions take effect on the watermark embedded in carrier objects.Affects:
○ Destroying the watermark or modifying the watermark with new wrong information.
○ Removing the watermark entirely.But: not degrading the quality of carrier
objects (image, audio, video)Relating to a requirements of watermarking:
Robustness
43
![Page 44: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/44.jpg)
Attacks Classification:
From proscessing carrier objects○ Common signal processing: digital-to-analog and
analog-to-digital conversion, or change image contrast, color, JPEG compression, …
○ Common geometric distortions: scaling, rotating, cropping, dithering …
From attacker○ Mosaic○ Collusion attacks: get the watermark or remove
watermarks entirely to get the original work.○ …
44
![Page 45: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/45.jpg)
Attacks
45
![Page 46: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/46.jpg)
AttacksMosaic attack
46
![Page 47: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/47.jpg)
Attacks How to protect watermarks from attacks
Understanding and applying new researchs in watermarking
Using StirMark Benchmark evaluation engine to evaluate your watermarking scheme○ “All vendors of digital watermarks have their
products benchmarked by Stirmark and as of August 2001, no watermark from any vendor survives the test, ie: the watermarks are all removed without degradation to image quality occurring. “
47
![Page 48: Thái Chí Minh Trần Lương Khiêm 1. Content Introduction History Applications Requirements Techniques Attacks 2](https://reader035.vdocuments.site/reader035/viewer/2022062804/56649e9d5503460f94b9d735/html5/thumbnails/48.jpg)
48