SlideShare a Scribd company logo
1 of 29
From Digital Watermarking to
Multimedia Forensics:
How can they help to detect lost
identities in multimedia work?
Shujun LI (李树钧)
Senior Lecturer
Department of Computing
University of Surrey
http://www.hooklee.com
2
Outline
- Where is University of Surrey? 
- “Current” “Solution”: Identities as Metadata
- “New” Solutions?
- Active Solution: Digital Watermarking
- Passive Solution: Multimedia Forensics
- Active Solution: Registering Your Work?
- Expertise of Researchers at Surrey Computing
- Questions and Answers
3
Central London  Guildford, Surrey
Highway A3: 33 miles
Fastest train: 33 mins
4
Guildford Station  Surrey Computing
Guildford Railway
Station  Surrey
Computing (by
walk):
17 mins
5
Dept. Computing @ University of Surrey
Detecting Lost Identities:
From Digital Watermarking to Multimedia Forensics
Identities in Multimedia Work
7
Current Solution: Identities as Metadata
- Many media formats support metadata (e.g. Exif,
IPTC IIM and XMP) as part of their file headers.
8
Identities as Metadata: Problems
- Location is public  Unauthorised removal
- Content is public  Unauthorised modification
9
Solutions?
- Active Solution: Digital Watermarking
- Making metadata dependent on the content itself and
secret  Change the metadata = Change the content!
- Active = Some information (watermark) needs
embedding into the protected work when/after the
multimedia work is created in an additional process.
- Passive Solution: Multimedia Forensics
- Discovering information which was NOT actively
embedded into the multimedia work.
- Where is the information from? – Left by the capturing
device/creator as part of the natural process.
- Multimedia work  Device  Owner (Author?)
10
Solutions? (continued)
- Active Solution: Register Your Work?
- Register your multimedia work at a trusted center (e.g.
one maintained by the IPO) actively.
- It does not need to be done by the author, but can be
done by the capturing device (when it connects to the
Internet) or some software (when a piece of multimedia
work is uploaded to the Web).
- One does not have to register the whole work, but only
its (cryptographic and/or perceptual) hash value plus
some identification information (e.g. device ID,
username).
- This can supplement the other two solutions.
Detecting Lost Identities:
From Digital Watermarking to Multimedia Forensics
Active Solution:
Digital Watermarking
12
What is a digital watermark?
- A digital watermark is a digital artefact embedded into a
cover work which is also a digital artefact.
- It can be a textual message, an image or just a random
number (like an ID) represented as a number of bits.
- The process of embedding a digital watermark is called
digital watermarking.
- It may be visible or invisible. When it is visible, it mimics
watermarks printed on the paper.
13
Identities as watermark
- A typical application of digital watermarking is
copyright protection.
- The watermark is a copyright claim: “All rights reserved
 Shujun Li, University of Surrey 2012”.
- The watermark needs to be secured! – Only the owner
knows the embedding/extraction key.
- The key can be disclosed to settle an ownership dispute.
14
Conflicting objectives
- Fidelity/Imperceptibility = The watermark should not
degrade the perceptual quality to compromise the value of
the protected work.
- Security = Surviving malicious attacks
- Capacity = More information embedded
- Robustness/Fragility = Surviving benign processing
-  It is impossible to have an ideal system!
Robustness /
Fragility
Fidelity /
Imperceptibility
S e c u r i t y
Capacity
15
Security is complicated!
- Watermarked-only attack
- The attacker has a number of watermarked works only.
- Known-watermark/message attack
- The attacker has access to a number of watermarked works and the
watermark(s) embedded in them.
- Known-cover/original attack
- The attacker has access to a number of watermarked works and the
original cover work(s).
- Chosen-cover/original attack
- The attacker can choose the original cover work(s) in which the
watermark(s) is/are embedded.
- Known-detector attack
- The attacker has access to the detector.
16
Security is complicated!
- Unauthorized watermark embedding
- The attacker wants to forge a watermark or modify a watermark
already embedded.
- Example: to claim the ownership over a work of others.
- Unauthorized watermark removal
- The attacker wants to remove the watermark embedded in a
watermarked work.
- Example: to remove the watermark/fingerprint in a watermarked
(copyrighted) work.
- Unauthorized watermark detection
- The attacker wants to detect the watermark embedded in a
watermarked work.
- Example: to disclose the author of a watermarked work.
17
Watermarking by cameras
- Digital cameras capable of embedding digital
watermarks do (or did?) exist.
- Epson PhotoPC 3000Z/700/750Z/800/800Z
- Kodak DC200/DC260/DC290
18
Watermarking by cameras
- Paul Blythe and Jessica Fridrich, “Secure Digital
Camera,” in Proceedings of 4th Annual Digital
Forensic Research Workshop (DFRWS 2004),
Baltimore, August 11-13, 2004
- Watermark = Biometric (iris) patterns of the
photographer + Cryptographic hash of the image +
Time, Date + …
- The watermarking process is LOSSLESS.  The
distortion caused by the watermark can be restored
without any error.
19
Digital watermarking: problems
- Impossible to have an ideal watermarking scheme.
- If the accuracy is not too high, can the results be still used?
- Can some (advanced) attacks be ignored?
- Configuring a watermarking scheme is very complicated.
- How to balance different objectives?
- Require actions from both vendors and users.
- Vendors provide the feature.
- Users learn and use it properly.
- Somebody needs to keep the secret key and disclose it
when needed.
- …
Detecting Lost Identities:
From Digital Watermarking to Multimedia Forensics
Passive Solution:
Multimedia Forensics
21
What is multimedia forensics?
- A new research topic developed since late 1990s.
- Multimedia forensics = Forensic analysis of
multimedia data and devices.
- Source identification = What produced this work?
Was this work computer generated or captured by a
device? Who produced this work?
- Forgery detection = Is this work genuine? Which part of
this work is genuine?
- Processing history recovery = What has happened on
this work? What is the parameter of a step of the
processing history?
- …
22
Better than digital watermarking?
- Yes
- No need to design an (ideal) algorithm.
- No need to configure an algorithm.
- No action required for vendors or users.
- No
- Only limited information can be extracted.
- Accuracy of extracted information could be even lower.
- Often require training = No a prior information about
something, nothing can be extracted about it.
- Anti-forensics can defeat forensics!
23
Identifying authors
- Forensic (behavioural) biometrics
- Like handwritten signatures, intrinsic
features in multimedia work may be
linked to its authors’ identities.
- BBC News, New Vincent van
Gogh painting identified, 9
November 2013
- “The museum said the painting was
authenticated by letters, style and
the physical materials used.”
- All could be identified via some
multimedia forensic techniques.
24
Identifying devices
- Source identification
- Identifying the source device producing a digital
audio/image/video file.
- How can this be done without a watermark?
- Different hardware and software components in different
models
- Different intrinsic features of individual devices (noise
patterns, manufacturing deviations, dust spots and dead
points on camera sensor array, …)
25
Linking devices with authors
- When the device of the author can be obtained.
- Sometimes only the model matters.
- When some other pieces of multimedia work
produced by the same device have their author(s)
identified.
- So “Register Your Sample Work” is important?
- When the device’s intrinsic features are registered
at a trusted party.
- So “Register Your Device” is important?
Detecting Lost Identities:
From Digital Watermarking to Multimedia Forensics
Expertise of Researchers @
Surrey Computing
27
MSF Group @ Surrey Computing
- MSF = Multimedia, Security and Forensics
- 6 academics
- Prof Anthony TS Ho (Group Head / HoD)
- Prof Jianmin Jiang
- Dr Johann A Briffa (Lecturer)
- Dr Shujun Li (Senior Lecturer)
- Dr Norman Poh (Lecturer)
- Dr Stephan Wesemeyer (Tutor)
- 1 postdoctoral fellow
- 13 PhD students (including 4 jointly with other
research groups)
28
MSF Group @ Surrey Computing
- Multimedia Security
- Digital and Multimedia Forensics
- Cyber Security and Privacy
- Biometrics and Health Informatics
- Multimedia Coding & Visual Quality
Assessment
- Digital Media Content Analysis
- Big Data Analytics
Detecting Lost Identities:
From Digital Watermarking to Multimedia Forensics
Thanks for your attention!
Questions + Answers

More Related Content

Similar to From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...Cyber Security Alliance
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsSecureDocs
 
Open Design: Business + Money @ FabLab Cali
Open Design: Business + Money @ FabLab CaliOpen Design: Business + Money @ FabLab Cali
Open Design: Business + Money @ FabLab CaliMassimo Menichinelli
 
Real world e-science use-cases
Real world e-science use-casesReal world e-science use-cases
Real world e-science use-casesAnnette Strauch
 
Privacy by Design workshop for Developers - School for Computer Science (HBO-...
Privacy by Design workshop for Developers - School for Computer Science (HBO-...Privacy by Design workshop for Developers - School for Computer Science (HBO-...
Privacy by Design workshop for Developers - School for Computer Science (HBO-...Anne Marleen
 
Isoc2011 new release
Isoc2011 new releaseIsoc2011 new release
Isoc2011 new releaseElena Zvarici
 
Human/User-Centric Security
Human/User-Centric SecurityHuman/User-Centric Security
Human/User-Centric SecurityShujun Li
 
A management introduction to IoT - Myths - Pitfalls - Challenges
A management introduction to IoT - Myths - Pitfalls - ChallengesA management introduction to IoT - Myths - Pitfalls - Challenges
A management introduction to IoT - Myths - Pitfalls - ChallengesSven Beauprez
 
AMS & Anarkik3D Ltd.pptx
AMS & Anarkik3D Ltd.pptxAMS & Anarkik3D Ltd.pptx
AMS & Anarkik3D Ltd.pptxAnarkik3D Ltd
 
михаил дударев
михаил дударевмихаил дударев
михаил дударевapps4allru
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsYogeshIJTSRD
 
Ambient Intelligence: Definitions and Application Areas
Ambient Intelligence: Definitions and Application AreasAmbient Intelligence: Definitions and Application Areas
Ambient Intelligence: Definitions and Application AreasFulvio Corno
 
Intelligent Data Processing for the Internet of Things
Intelligent Data Processing for the Internet of Things Intelligent Data Processing for the Internet of Things
Intelligent Data Processing for the Internet of Things PayamBarnaghi
 
From reactive toproactive mobile security
From reactive toproactive mobile securityFrom reactive toproactive mobile security
From reactive toproactive mobile securityMobileSoft
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYIRJET Journal
 
Intelligent Data Processing for the Internet of Things
Intelligent Data Processing for the Internet of Things Intelligent Data Processing for the Internet of Things
Intelligent Data Processing for the Internet of Things PayamBarnaghi
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsinLabFIB
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingGovind Raj
 
Internet of Things & Open Hardware (LeanCamp Madrid 2012)
Internet of Things & Open Hardware (LeanCamp Madrid 2012)Internet of Things & Open Hardware (LeanCamp Madrid 2012)
Internet of Things & Open Hardware (LeanCamp Madrid 2012)iotmadrid
 

Similar to From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work? (20)

ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
 
Open Design: Business + Money @ FabLab Cali
Open Design: Business + Money @ FabLab CaliOpen Design: Business + Money @ FabLab Cali
Open Design: Business + Money @ FabLab Cali
 
Real world e-science use-cases
Real world e-science use-casesReal world e-science use-cases
Real world e-science use-cases
 
Privacy by Design workshop for Developers - School for Computer Science (HBO-...
Privacy by Design workshop for Developers - School for Computer Science (HBO-...Privacy by Design workshop for Developers - School for Computer Science (HBO-...
Privacy by Design workshop for Developers - School for Computer Science (HBO-...
 
Isoc2011 new release
Isoc2011 new releaseIsoc2011 new release
Isoc2011 new release
 
Human/User-Centric Security
Human/User-Centric SecurityHuman/User-Centric Security
Human/User-Centric Security
 
A management introduction to IoT - Myths - Pitfalls - Challenges
A management introduction to IoT - Myths - Pitfalls - ChallengesA management introduction to IoT - Myths - Pitfalls - Challenges
A management introduction to IoT - Myths - Pitfalls - Challenges
 
AMS & Anarkik3D Ltd.pptx
AMS & Anarkik3D Ltd.pptxAMS & Anarkik3D Ltd.pptx
AMS & Anarkik3D Ltd.pptx
 
михаил дударев
михаил дударевмихаил дударев
михаил дударев
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and Applications
 
Ambient Intelligence: Definitions and Application Areas
Ambient Intelligence: Definitions and Application AreasAmbient Intelligence: Definitions and Application Areas
Ambient Intelligence: Definitions and Application Areas
 
Intelligent Data Processing for the Internet of Things
Intelligent Data Processing for the Internet of Things Intelligent Data Processing for the Internet of Things
Intelligent Data Processing for the Internet of Things
 
From reactive toproactive mobile security
From reactive toproactive mobile securityFrom reactive toproactive mobile security
From reactive toproactive mobile security
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
 
Intelligent Data Processing for the Internet of Things
Intelligent Data Processing for the Internet of Things Intelligent Data Processing for the Internet of Things
Intelligent Data Processing for the Internet of Things
 
OWF2013 INTERNET OF THINGS
OWF2013 INTERNET OF THINGSOWF2013 INTERNET OF THINGS
OWF2013 INTERNET OF THINGS
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Internet of Things & Open Hardware (LeanCamp Madrid 2012)
Internet of Things & Open Hardware (LeanCamp Madrid 2012)Internet of Things & Open Hardware (LeanCamp Madrid 2012)
Internet of Things & Open Hardware (LeanCamp Madrid 2012)
 

Recently uploaded

Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
Luciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxLuciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxAleenaTreesaSaji
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfnehabiju2046
 
The Black hole shadow in Modified Gravity
The Black hole shadow in Modified GravityThe Black hole shadow in Modified Gravity
The Black hole shadow in Modified GravitySubhadipsau21168
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )aarthirajkumar25
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...RohitNehra6
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡anilsa9823
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfSwapnil Therkar
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...anilsa9823
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...jana861314
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Module 4: Mendelian Genetics and Punnett Square
Module 4:  Mendelian Genetics and Punnett SquareModule 4:  Mendelian Genetics and Punnett Square
Module 4: Mendelian Genetics and Punnett SquareIsiahStephanRadaza
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physicsvishikhakeshava1
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trssuser06f238
 

Recently uploaded (20)

Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
Luciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxLuciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptx
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdf
 
The Black hole shadow in Modified Gravity
The Black hole shadow in Modified GravityThe Black hole shadow in Modified Gravity
The Black hole shadow in Modified Gravity
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Module 4: Mendelian Genetics and Punnett Square
Module 4:  Mendelian Genetics and Punnett SquareModule 4:  Mendelian Genetics and Punnett Square
Module 4: Mendelian Genetics and Punnett Square
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physics
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 tr
 

From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?

  • 1. From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work? Shujun LI (李树钧) Senior Lecturer Department of Computing University of Surrey http://www.hooklee.com
  • 2. 2 Outline - Where is University of Surrey?  - “Current” “Solution”: Identities as Metadata - “New” Solutions? - Active Solution: Digital Watermarking - Passive Solution: Multimedia Forensics - Active Solution: Registering Your Work? - Expertise of Researchers at Surrey Computing - Questions and Answers
  • 3. 3 Central London  Guildford, Surrey Highway A3: 33 miles Fastest train: 33 mins
  • 4. 4 Guildford Station  Surrey Computing Guildford Railway Station  Surrey Computing (by walk): 17 mins
  • 5. 5 Dept. Computing @ University of Surrey
  • 6. Detecting Lost Identities: From Digital Watermarking to Multimedia Forensics Identities in Multimedia Work
  • 7. 7 Current Solution: Identities as Metadata - Many media formats support metadata (e.g. Exif, IPTC IIM and XMP) as part of their file headers.
  • 8. 8 Identities as Metadata: Problems - Location is public  Unauthorised removal - Content is public  Unauthorised modification
  • 9. 9 Solutions? - Active Solution: Digital Watermarking - Making metadata dependent on the content itself and secret  Change the metadata = Change the content! - Active = Some information (watermark) needs embedding into the protected work when/after the multimedia work is created in an additional process. - Passive Solution: Multimedia Forensics - Discovering information which was NOT actively embedded into the multimedia work. - Where is the information from? – Left by the capturing device/creator as part of the natural process. - Multimedia work  Device  Owner (Author?)
  • 10. 10 Solutions? (continued) - Active Solution: Register Your Work? - Register your multimedia work at a trusted center (e.g. one maintained by the IPO) actively. - It does not need to be done by the author, but can be done by the capturing device (when it connects to the Internet) or some software (when a piece of multimedia work is uploaded to the Web). - One does not have to register the whole work, but only its (cryptographic and/or perceptual) hash value plus some identification information (e.g. device ID, username). - This can supplement the other two solutions.
  • 11. Detecting Lost Identities: From Digital Watermarking to Multimedia Forensics Active Solution: Digital Watermarking
  • 12. 12 What is a digital watermark? - A digital watermark is a digital artefact embedded into a cover work which is also a digital artefact. - It can be a textual message, an image or just a random number (like an ID) represented as a number of bits. - The process of embedding a digital watermark is called digital watermarking. - It may be visible or invisible. When it is visible, it mimics watermarks printed on the paper.
  • 13. 13 Identities as watermark - A typical application of digital watermarking is copyright protection. - The watermark is a copyright claim: “All rights reserved  Shujun Li, University of Surrey 2012”. - The watermark needs to be secured! – Only the owner knows the embedding/extraction key. - The key can be disclosed to settle an ownership dispute.
  • 14. 14 Conflicting objectives - Fidelity/Imperceptibility = The watermark should not degrade the perceptual quality to compromise the value of the protected work. - Security = Surviving malicious attacks - Capacity = More information embedded - Robustness/Fragility = Surviving benign processing -  It is impossible to have an ideal system! Robustness / Fragility Fidelity / Imperceptibility S e c u r i t y Capacity
  • 15. 15 Security is complicated! - Watermarked-only attack - The attacker has a number of watermarked works only. - Known-watermark/message attack - The attacker has access to a number of watermarked works and the watermark(s) embedded in them. - Known-cover/original attack - The attacker has access to a number of watermarked works and the original cover work(s). - Chosen-cover/original attack - The attacker can choose the original cover work(s) in which the watermark(s) is/are embedded. - Known-detector attack - The attacker has access to the detector.
  • 16. 16 Security is complicated! - Unauthorized watermark embedding - The attacker wants to forge a watermark or modify a watermark already embedded. - Example: to claim the ownership over a work of others. - Unauthorized watermark removal - The attacker wants to remove the watermark embedded in a watermarked work. - Example: to remove the watermark/fingerprint in a watermarked (copyrighted) work. - Unauthorized watermark detection - The attacker wants to detect the watermark embedded in a watermarked work. - Example: to disclose the author of a watermarked work.
  • 17. 17 Watermarking by cameras - Digital cameras capable of embedding digital watermarks do (or did?) exist. - Epson PhotoPC 3000Z/700/750Z/800/800Z - Kodak DC200/DC260/DC290
  • 18. 18 Watermarking by cameras - Paul Blythe and Jessica Fridrich, “Secure Digital Camera,” in Proceedings of 4th Annual Digital Forensic Research Workshop (DFRWS 2004), Baltimore, August 11-13, 2004 - Watermark = Biometric (iris) patterns of the photographer + Cryptographic hash of the image + Time, Date + … - The watermarking process is LOSSLESS.  The distortion caused by the watermark can be restored without any error.
  • 19. 19 Digital watermarking: problems - Impossible to have an ideal watermarking scheme. - If the accuracy is not too high, can the results be still used? - Can some (advanced) attacks be ignored? - Configuring a watermarking scheme is very complicated. - How to balance different objectives? - Require actions from both vendors and users. - Vendors provide the feature. - Users learn and use it properly. - Somebody needs to keep the secret key and disclose it when needed. - …
  • 20. Detecting Lost Identities: From Digital Watermarking to Multimedia Forensics Passive Solution: Multimedia Forensics
  • 21. 21 What is multimedia forensics? - A new research topic developed since late 1990s. - Multimedia forensics = Forensic analysis of multimedia data and devices. - Source identification = What produced this work? Was this work computer generated or captured by a device? Who produced this work? - Forgery detection = Is this work genuine? Which part of this work is genuine? - Processing history recovery = What has happened on this work? What is the parameter of a step of the processing history? - …
  • 22. 22 Better than digital watermarking? - Yes - No need to design an (ideal) algorithm. - No need to configure an algorithm. - No action required for vendors or users. - No - Only limited information can be extracted. - Accuracy of extracted information could be even lower. - Often require training = No a prior information about something, nothing can be extracted about it. - Anti-forensics can defeat forensics!
  • 23. 23 Identifying authors - Forensic (behavioural) biometrics - Like handwritten signatures, intrinsic features in multimedia work may be linked to its authors’ identities. - BBC News, New Vincent van Gogh painting identified, 9 November 2013 - “The museum said the painting was authenticated by letters, style and the physical materials used.” - All could be identified via some multimedia forensic techniques.
  • 24. 24 Identifying devices - Source identification - Identifying the source device producing a digital audio/image/video file. - How can this be done without a watermark? - Different hardware and software components in different models - Different intrinsic features of individual devices (noise patterns, manufacturing deviations, dust spots and dead points on camera sensor array, …)
  • 25. 25 Linking devices with authors - When the device of the author can be obtained. - Sometimes only the model matters. - When some other pieces of multimedia work produced by the same device have their author(s) identified. - So “Register Your Sample Work” is important? - When the device’s intrinsic features are registered at a trusted party. - So “Register Your Device” is important?
  • 26. Detecting Lost Identities: From Digital Watermarking to Multimedia Forensics Expertise of Researchers @ Surrey Computing
  • 27. 27 MSF Group @ Surrey Computing - MSF = Multimedia, Security and Forensics - 6 academics - Prof Anthony TS Ho (Group Head / HoD) - Prof Jianmin Jiang - Dr Johann A Briffa (Lecturer) - Dr Shujun Li (Senior Lecturer) - Dr Norman Poh (Lecturer) - Dr Stephan Wesemeyer (Tutor) - 1 postdoctoral fellow - 13 PhD students (including 4 jointly with other research groups)
  • 28. 28 MSF Group @ Surrey Computing - Multimedia Security - Digital and Multimedia Forensics - Cyber Security and Privacy - Biometrics and Health Informatics - Multimedia Coding & Visual Quality Assessment - Digital Media Content Analysis - Big Data Analytics
  • 29. Detecting Lost Identities: From Digital Watermarking to Multimedia Forensics Thanks for your attention! Questions + Answers

Editor's Notes

  1. So from the center of London, you need just an hour to the Department of Computing, University of Surrey!
  2. Exif = Exchangeable image file format, created by Japan Electronic Industry Development Association (JEIDA) but not currently maintained by any body IPTC = International Press Telecommunications Council IIM = Information Interchange Model XMP = Extensible Metadata Platform, an ISO standard (ISO 16684-1:2012) originally created by Adobe Systems Inc.
  3. The solutions are not really new…. Why is information about capturing device helpful? – It can link a piece of multimedia work to a device. If the device can be further linked to a person (either by showing the device or other works created by the device which can be proven as this person’s works) then the authorship claim is endorsed strongly (although it still does not exclude the possibility that somebody else borrowed the device and created the work under argument).
  4. Why it supplements the other two solutions? – The registered information tells integrity of the protected work and then the information extracted by the other two solutions. I will leave this for open discussion and focus on the other two solutions.
  5. It is hard to design an ideal system.