Compressed encrypted domain watermarking and forensics for media security
Digital media content creation/capturing, processing and distribution have witnessed a phenomenal growth over the past decade. The ease with which this digital media can be edited has also led to the tremendous growth in illegitimate usage and distribution. Digital Watermarking and Forensic...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Theses and Dissertations |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/52175 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-52175 |
---|---|
record_format |
dspace |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering |
spellingShingle |
DRNTU::Engineering::Computer science and engineering Venkata, Subramanyam Compressed encrypted domain watermarking and forensics for media security |
description |
Digital media content creation/capturing, processing and distribution have witnessed a
phenomenal growth over the past decade. The ease with which this digital media can
be edited has also led to the tremendous growth in illegitimate usage and distribution.
Digital Watermarking and Forensic techniques emerged as possible solutions to track
and minimize such illegitimate activities. The focus of this research study is to design
the compressed-encrypted domain robust image and audio watermarking techniques for
purposes such as proof of ownership, copyright violation detection and fingerprinting. In
addition, we focus on forensic algorithms for establishing video authenticity.
The digital media is often managed in compressed-encrypted format, for example in
Digital Rights Management (DRM) systems, and sometimes it is necessary to watermark
in this compressed-encrypted domain itself. The compressed-encrypted domain
media refers to the content which is compressed first and then encrypted using a secure
cryptosystem. Different compression techniques like JPEG2000, JPEG-LS or JPEG
for image and MP3 for audio, are generally used. It is a challenge to watermark the
compressed stream as a small modification in the compressed data may lead to a considerable
deterioration in the quality of decoded image. Further in an encrypted piece of
content, changing even a single bit may lead to random decrypted values. It should also
be possible to detect the watermark correctly even after the content is decrypted. And
the compression gain should not be significantly compromised as encryption may lead to
cipher text expansion.
The first part of our research is in compressed-encrypted domain robust image and
audio watermarking. Towards this, we proposed a watermarking algorithm for JPEG2000
compressed images based on Spread Spectrum (SS) watermarking technique and homomorphic
RC4 stream cipher for the purpose. In this proposed scheme, embedding is done in compressed-encrypted byte stream while detection can be performed in compressedencrypted,
decrypted or decompressed domains. The benefit of using the RC4 cryptosystem
is that it is secure, does not lead to cipher text expansion and allows watermarking
in a predictable manner. Further, to enhance the embedding capacity, we investigate
different watermarking techniques such as Scalar Costa Scheme Quantization Index
Modulation (SCS-QIM) and Rational Dither Modulation (RDM). We perform elaborate
theoretical and experimental evaluation to demonstrate the effectiveness of the proposed
algorithm.
Different compression schemes differ in their nature of pipelines. Therefore, a unique
algorithm is not applicable for all the compression schemes. Towards this, we proposed
a watermarking scheme for compressed-encrypted JPEG-LS images. In this scheme the
encoded bit stream is encrypted using a secure stream cipher while context is used for
embedding watermark. Detection is performed in decrypted domain. Watermarking
using context does not degrade the image quality which is often desired in biomedical
images. We study in detail the embedding capacity, robustness, perceptual quality and
security of the proposed scheme.
In the next part of our research, we proposed a robust JPEG image watermarking
scheme in partially compressed-encrypted domain based on SS watermarking technique.
While the proposed technique embeds watermark in the partially compressed-encrypted
domain, the extraction of watermark can be done in the encrypted or decrypted domains.
The advantage of the proposed scheme is that, it not only facilitates partial compressedencrypted
domain watermarking but also minimizes the reduction in compression efficiency.
In addition, we propose a technique to improve the embedding capacity by using
coefficient-pair difference. The embedding capacity increases due to the fact that the proposed
technique removes the host signal interference. Further, we present an application
of the proposed watermarking technique to watermark partially compressed-encrypted
MP3 audio. We discuss the effectiveness of the proposed algorithm using analytical and
experimental results, and compare against the existing encrypted domain algorithms.
Media authenticity is another crucial aspect of media security. As a second part of our
research work, we designed a forensic technique for verification of the integrity of the video
for copy-paste forgery. However, the nature of encoding - intra and inter modes as well as the complexity of tampering, makes it very challenging to identify a video forgery.
The proposed scheme is based on Histogram of Oriented Gradients (HOG) and video
compression properties. The proposed algorithm can detect the forged regions under
wide variety of signal processing manipulations such as compression, filtering, or scaling.
Further, to detect general forms of tampering such as frame - editing, addition, deletion,
reordering, duplication, we proposed a holistic video tamper detection technique based
on estimation principles and double compression. The advantage of this algorithm is that
it can detect tampering of I, P or B frames in a GOP with high accuracy. Experimental
results establish the effectiveness of the proposed algorithm. |
author2 |
Sabu Emmanuel |
author_facet |
Sabu Emmanuel Venkata, Subramanyam |
format |
Theses and Dissertations |
author |
Venkata, Subramanyam |
author_sort |
Venkata, Subramanyam |
title |
Compressed encrypted domain watermarking and forensics for media security |
title_short |
Compressed encrypted domain watermarking and forensics for media security |
title_full |
Compressed encrypted domain watermarking and forensics for media security |
title_fullStr |
Compressed encrypted domain watermarking and forensics for media security |
title_full_unstemmed |
Compressed encrypted domain watermarking and forensics for media security |
title_sort |
compressed encrypted domain watermarking and forensics for media security |
publishDate |
2013 |
url |
http://hdl.handle.net/10356/52175 |
_version_ |
1759856566156132352 |
spelling |
sg-ntu-dr.10356-521752023-03-04T00:34:20Z Compressed encrypted domain watermarking and forensics for media security Venkata, Subramanyam Sabu Emmanuel School of Computer Engineering IIITD Centre for Multimedia and Network Technology DRNTU::Engineering::Computer science and engineering Digital media content creation/capturing, processing and distribution have witnessed a phenomenal growth over the past decade. The ease with which this digital media can be edited has also led to the tremendous growth in illegitimate usage and distribution. Digital Watermarking and Forensic techniques emerged as possible solutions to track and minimize such illegitimate activities. The focus of this research study is to design the compressed-encrypted domain robust image and audio watermarking techniques for purposes such as proof of ownership, copyright violation detection and fingerprinting. In addition, we focus on forensic algorithms for establishing video authenticity. The digital media is often managed in compressed-encrypted format, for example in Digital Rights Management (DRM) systems, and sometimes it is necessary to watermark in this compressed-encrypted domain itself. The compressed-encrypted domain media refers to the content which is compressed first and then encrypted using a secure cryptosystem. Different compression techniques like JPEG2000, JPEG-LS or JPEG for image and MP3 for audio, are generally used. It is a challenge to watermark the compressed stream as a small modification in the compressed data may lead to a considerable deterioration in the quality of decoded image. Further in an encrypted piece of content, changing even a single bit may lead to random decrypted values. It should also be possible to detect the watermark correctly even after the content is decrypted. And the compression gain should not be significantly compromised as encryption may lead to cipher text expansion. The first part of our research is in compressed-encrypted domain robust image and audio watermarking. Towards this, we proposed a watermarking algorithm for JPEG2000 compressed images based on Spread Spectrum (SS) watermarking technique and homomorphic RC4 stream cipher for the purpose. In this proposed scheme, embedding is done in compressed-encrypted byte stream while detection can be performed in compressedencrypted, decrypted or decompressed domains. The benefit of using the RC4 cryptosystem is that it is secure, does not lead to cipher text expansion and allows watermarking in a predictable manner. Further, to enhance the embedding capacity, we investigate different watermarking techniques such as Scalar Costa Scheme Quantization Index Modulation (SCS-QIM) and Rational Dither Modulation (RDM). We perform elaborate theoretical and experimental evaluation to demonstrate the effectiveness of the proposed algorithm. Different compression schemes differ in their nature of pipelines. Therefore, a unique algorithm is not applicable for all the compression schemes. Towards this, we proposed a watermarking scheme for compressed-encrypted JPEG-LS images. In this scheme the encoded bit stream is encrypted using a secure stream cipher while context is used for embedding watermark. Detection is performed in decrypted domain. Watermarking using context does not degrade the image quality which is often desired in biomedical images. We study in detail the embedding capacity, robustness, perceptual quality and security of the proposed scheme. In the next part of our research, we proposed a robust JPEG image watermarking scheme in partially compressed-encrypted domain based on SS watermarking technique. While the proposed technique embeds watermark in the partially compressed-encrypted domain, the extraction of watermark can be done in the encrypted or decrypted domains. The advantage of the proposed scheme is that, it not only facilitates partial compressedencrypted domain watermarking but also minimizes the reduction in compression efficiency. In addition, we propose a technique to improve the embedding capacity by using coefficient-pair difference. The embedding capacity increases due to the fact that the proposed technique removes the host signal interference. Further, we present an application of the proposed watermarking technique to watermark partially compressed-encrypted MP3 audio. We discuss the effectiveness of the proposed algorithm using analytical and experimental results, and compare against the existing encrypted domain algorithms. Media authenticity is another crucial aspect of media security. As a second part of our research work, we designed a forensic technique for verification of the integrity of the video for copy-paste forgery. However, the nature of encoding - intra and inter modes as well as the complexity of tampering, makes it very challenging to identify a video forgery. The proposed scheme is based on Histogram of Oriented Gradients (HOG) and video compression properties. The proposed algorithm can detect the forged regions under wide variety of signal processing manipulations such as compression, filtering, or scaling. Further, to detect general forms of tampering such as frame - editing, addition, deletion, reordering, duplication, we proposed a holistic video tamper detection technique based on estimation principles and double compression. The advantage of this algorithm is that it can detect tampering of I, P or B frames in a GOP with high accuracy. Experimental results establish the effectiveness of the proposed algorithm. Doctor of Philosophy (SCE) 2013-04-24T07:39:17Z 2013-04-24T07:39:17Z 2013 2013 Thesis http://hdl.handle.net/10356/52175 en 226 p. application/pdf |