watermark.ppt

Download Report

Transcript watermark.ppt

EMTM 553: E-commerce Systems
Lecture 7a: Digital Watermarking
Insup Lee
Department of Computer and Information Science
University of Pennsylvania
[email protected]
www.cis.upenn.edu/~lee
5/4/00
EMTM 553
1
Outline
•
•
•
•
Introduction, Applications
Characteristics and classification
Popular techniques for watermarking
Attacks on watermarks
5/4/00
EMTM 553
2
History
Paper Watermarks: Formed during the
manufacturing process of the paper when the
paper is wet, so that fibers can be disturbed
according to the design of the watermark.
Used mainly for identification and
authentication
5/4/00
EMTM 553
3
Common Examples
• Currency Notes
• Stamps
• Passports
• Legal Documents
• Logos used by cable TV channels
5/4/00
EMTM 553
4
Digital Watermarking
Definition: A digital watermark is a
digital signal or pattern inserted into a
digital document such as text, graphics
or multimedia, and carries information
unique to the copyright owner, the
creator of the document or the
authorized consumer.
5/4/00
EMTM 553
5
Example
5/4/00
EMTM 553
6
Watermarking Vs Encryption
• Encryption involves document transformation so
that the contents of the document are not visible
without a decryption key
• Watermarking leaves the original file/image intact
and recognizable
5/4/00
EMTM 553
7
Watermarking Process
5/4/00
EMTM 553
8
Digital Watermarking Applications
• Ownership Assertion
– ‘A’ uses a private key to generate a watermark and embeds it in
the document
– ‘A’ makes the watermarked image publicly available
– ‘B’ claims that he owns the image derived from the public image
– ‘A’ produces the unmarked original and establishes the presence
of ‘A’s watermark
• Fingerprinting
– Used to avoid unauthorized duplication and distribution.
– A distinct watermark (a fingerprint) is embedded in each copy
of the data.
– If unauthorized copies are found, the origin of the copy can be
determined by retrieving the fingerprint.
5/4/00
EMTM 553
9
Digital Watermarking Applications (2)
• Authentication & integrity verification
– Watermarks should be able to detect even the slightest
change in the document.
– A unique key associated with the source is used the
create the watermark and then embed in the document.
– This key is then used to extract the watermark and the
integrity of the document verified on the basis of the
integrity of the watermark.
5/4/00
EMTM 553
10
Digital Watermarking Applications (3)
• Content labeling
– Bits embedded in the data, comprise an annotation, giving
some more information about the data.
– Digital cameras annotate images with the time and date,
when the photograph was taken.
– Medical imaging machines annotate images (X-Rays) with
patients name, ID.
5/4/00
EMTM 553
11
Digital Watermarking Applications (4)
• Usage control & Copy protection
– Digital watermark inserted to indicate the number of
copies permitted.
– Every time a copy is made the hardware modifies the
watermark and at the same time it would not create any
more copies of the data.
– Commonly used in DVD technology.
• Content Protection
– Content owner might want to publicly and freely provide a
preview of multimedia content being sold.
– To make the preview commercially useless, content is
stamped with visible watermarks.
5/4/00
EMTM 553
12
Characteristics of Digital Watermarks
•
•
•
Unobtrusive: invisible enough not to degrade the data quality and to
prevent an attacker from finding and deleting it.
Readily Detectable: the data owner or an independent control
authority should easily detect it.
Unambiguous: retrieval of it should unambiguously identify the data
owner.
• Innumerable: it should be possible to generate a large
number of watermarks, all distinguishable.
• Robust: difficult to remove for an attacker, who would like
to destroy it in order to counterfeit the copyright of the
data. Moreover, removal of it should cause a considerable
degradation in the quality of the data.
• Visible watermarks should be visible enough to discourage
theft.
5/4/00
EMTM 553
13
Digital Watermark Classification
• Based on visibility of watermarks
- Visible Watermarks
- Invisible Watermarks
• Based on the content to be watermarked
- Text Watermarking
- Image, Audio, Video Watermarking
5/4/00
EMTM 553
14
Techniques for Texts
Text Line Coding: Change the spacing
between lines.
Word-shift Coding: Change the spacing
between words.
Character Encoding: Alter the shapes of
characters.
5/4/00
EMTM 553
15
Text line coding example
5/4/00
EMTM 553
16
Word-shift coding example
5/4/00
EMTM 553
17
Easily defeated…
• Retyping the text destroys the watermark
• Word processors change the spacing between
words and lines
• Character encoding can be defeated by changing
the font
5/4/00
EMTM 553
18
Techniques for Images
• Spatial Watermarking: Just change some of the values of
the pixels in the lower bit plane; e.g., Change some of the
bits from 1 to 0 or 0 to 1.
• Frequency Domain Watermarking: First convert the image to
the frequency domain and then apply the watermark in the
low frequency regions.
5/4/00
EMTM 553
19
Checksum Technique for images
• Watermark is formed from the 7 most significant bits of
each pixel.
• Eight 7-bit segments (from eight different pixels) are
concatenated and the final checksum is thus 56-bit.
• Locations of the pixels that are to contain one bit each of
the checksum are randomly chosen.
• These pixel locations along with the checksum form the
watermark, W.
• Last bit of each pixel is then changed to the corresponding
checksum bit.
5/4/00
EMTM 553
20
Example
5/4/00
EMTM 553
21
Bavarian couple
Original
5/4/00
Watermarked Version
EMTM 553
22
Advantages/Disadvantages
• Embedding the checksum only changes (on average) half the
number of pixel. So less visual distortion.
• Can hold multiple watermarks as long as they don’t overlap.
• Extremely simple and fast.
• Extremely fragile. Any change to the checksum causes the
failure of the verification procedure.
• Forger could replace a section with another one of equal size
and checksum.
• Entire watermark can be removed by removing the LSB
plane. Can’t survive lossy compression.
5/4/00
EMTM 553
23
Attacks on Copyright
Marking Systems
5/4/00
EMTM 553
24
Watermarking Attack
• Iterative progress
– Attacks will lead to more robust systems
• Various attacks on marking systems
– Very simple (manual) - Jitter
– General but still simple (StirMark)
• Idea is to be able to produce images very similar
to the original except that it has the watermark
removed.
• Another way of saying - Hacking!!
5/4/00
EMTM 553
25
Early experiment—‘jitter’ attack
SysCoP
skytale:SysCoP$ imageread_demo syscop_watermarked.ppm
Key:
skytale:SysCoP$ imageread_demo syscop_jitter.ppm
Key:
No certificate file.
------------------------------------------------A valid watermark found - estimated correction
percentage is : 100
Retrieved Secret Label (string) : SysCoP(TM)
No certificate file.
------------------------------------------------Cannon find valid watermark - failed.
Image syscop_jitter.ppm has been tampered or has
not been watermarked.
5/4/00
EMTM 553
26
Jitter Attack
•
•
•
•
•
Tweak the lower order bits and add jitter
Split signal into number of chunks
Duplicate or Delete at random
Imperceptible even in classical music!
Jitter prevents marked bits from being
located
5/4/00
EMTM 553
27
Jitter attack example
Watermarked
Jitter added
SysCoP
5/4/00
EMTM 553
28
StirMark
• Most watermarking schemes are robust to simple
manipulations:
• Rotation, cropping, rescaling,etc. …separately
• By using these transforms in tandem it’s possible
to distort the watermark
5/4/00
EMTM 553
29
StirMark
– Apply minor geometric distortion:
o Stretching, shearing, shifting and rotation
o Simulate printing/scanning process
o Defeats most commercial image marking systems
5/4/00
EMTM 553
30
Example
Original
JK_PGS(314,27)
StirMark
PictureMarc 1.51, SysCoP (Demo), JK_PGS, SureSign, EIKONAmark (Pitas), NEC (Cox et al.)
5/4/00
EMTM 553
31
Web crawlers for watermarks
• Interesting application
– Web crawler download images
– Check whether they contain a watermark
– Produce reports for copyright owners
e.g. MarcSpider by Digimarc, Portland, OR
• How do you prevent such crawlers from reporting
your pictures?
5/4/00
EMTM 553
32
Attacks on web-crawlers I
• ‘Mosaic’ attack
– Designed to defeat systems combining watermarks and
web-crawlers
– Split images in small pieces (e.g. 100100)
– Each image is small enough that partial watermark cannot
be detected
– Confuse the mark detector
• Java applets/ActiveX objects
– Image displayed with Java applet automatically or after
certain actions of the user
– Can even be de-scrambled ‘on the fly’
• Refuse connection, login, payment
5/4/00
EMTM 553
33
‘Mosaic’ attack
5/4/00
EMTM 553
34
Conclusion
• First generation of copyright marking schemes is
not strong enough
• Existing schemes provide only limited measures of
marking
• Can only meet few requirements at a time
– Tradeoff - Bandwidth vs. robustness
– No single problem but a constellation!
• Real problem: watermark restoration
5/4/00
EMTM 553
35
Q&A
5/4/00
EMTM 553
36