0% found this document useful (0 votes)
23 views

Image Security

This document discusses digital image security and watermarking. It begins by defining a digital image and digital image processing. It then discusses different types of image watermarking including robust, fragile, and semi-fragile watermarking. The key aspects of watermarking systems are invisibility, robustness, and data hiding capacity. Watermarking can be used to establish ownership and prevent unauthorized use of digital images and multimedia content.

Uploaded by

selvaraj
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Image Security

This document discusses digital image security and watermarking. It begins by defining a digital image and digital image processing. It then discusses different types of image watermarking including robust, fragile, and semi-fragile watermarking. The key aspects of watermarking systems are invisibility, robustness, and data hiding capacity. Watermarking can be used to establish ownership and prevent unauthorized use of digital images and multimedia content.

Uploaded by

selvaraj
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

Image Security

For
"Artificial Intelligence and its impact on present day Communication
Networks"

By-
Dr. I. A. Ansari
PDPM Indian Institute of Information Technology Design and Manufacturing,
Jabalpur
Email: [email protected]

1
Digital Image
A digital image is a representation of a two-dimensional image as a finite set of
digital values, called picture elements or pixels
What is a Digital Image? (cont..)

Pixel values typically represent gray levels, colors, heights, opacities etc.
Remember digitization implies that a digital image is an approximation of a real scene

1 pixel
What is a Digital Image? (cont..)

Common image formats include:


1 sample per point (B&W or Gray scale)
3 samples per point (Red, Green, and Blue)
What is Digital Image Processing?

Digital image processing focuses on two major tasks:

- Improvement of pictorial information for human interpretation


- Processing of image data for storage, transmission and representation for
autonomous machine perception
What is DIP? (cont..)

An image processing operation typically defines a new image g in terms of an


existing image f.
We can transform either the range of f.

Or the domain of f:

What kinds of operations?


What is DIP? (cont..)

- Noise Removal
- Image Sharpening
- Image Segmentation
- Image Watermarking
- Object Recognition
- Scene Understanding
- Autonomous Navigation
Multimedia Data
What separates multimedia data from traditional alpha numeric data?

• Large in file size

• May require real-time processing (especially for continuous


media)

• Versatile and mobile applications


Images and Videos are Efficient and Effective

Source: https://www.washingtonpost.com/politics/2020/01/06/gop-congressman-tweeted-fake-image-obama-with-iranian-president-they-never-met/
• Visual representations are often the most efficient way to represent info.

• Images are used in many scenarios:


• Politics, advertisements, scientific research, military, etc…

• Video signals can effectively tell a temporally evolving story


• Arise in cinema (motion pictures)
• Arise in surveillance
• Arise in medical applications
Why Do We Process Image/Video?
Enhancement and restoration
• Remove artifacts and scratches from an old photo/movie
• Improve contrast and correct blurred images/video

Transmission and storage


• Images and Video can be more effectively transmitted and
stored

Information analysis and automated recognition


• Recognizing threats (arms etc.)
Why Do We Process Image/Video?...
Evidence
• Careful image/video manipulation can reveal information not
detected otherwise
• Detect image tampering

Security and rights protection


• Encryption and watermarking: To prevent illegal content
manipulation/ copyright violation
Security issues
• Person authentication
• Assurance that the communicating entity is the one claimed
• Access control
• Prevention of unauthorized use of a resource
• Data confidentiality
• Protection of data from unauthorized disclosure
• Data integrity
• Assurance that data received is as sent
• Non-repudiation
• Protection against denial by the parties in a communication
Ever Wonder ?

Copyright: Star Plus


Post Covid-19 word: Social Distancing

Note: The copyright belongs to respective owners of the Logo/ Trademarks


Challenges
• Real time constraint
• Potential cost constraint
• Potential bit rate increase (data)
• Platform Variation
• Rate challenge (User forced)
• Dynamic network conditions
• Transcoding challenge
Deep Fake Video

Source: https://www.youtube.com/watch?v=gLoI9hAX9dw
Information Hiding Main Disciplines

Steganography- (covered writing) the process of secretly


embedding information into a data source in such a way its very
existence is concealed.

 Watermarking:- the process of embedding data (information)


into the source or cover data to protect it from unauthorized use

21
Steganography vs. Cryptography vs.
Watermarking
Steganography & Cryptography
• Steganography and Cryptography are closely related

• The difference is in their goals...


• Cryptography: although encypted and unreadable, the existence of data is not
hidden
• Steganography: no knowledge of the existence of the data

• Steganography and Cryptography can be used together to produce


better protection
Steganography vs. Watermarking
 Steganography is about concealing the existence of messages
• The key concept behind steganography is that the message to be transmitted is not
detectable to the casual eye.
• In fact, people who the are not intended to be the recipients of the message should
not even suspect that a hidden message exists.

 Watermarking is about establishing identity of information to


prevent unauthorized use
• They are imperceptible
• They are inseparable from the works they are embedded in
• They remain embedded in the work even during transformation
How It Works
 Digital Information Embedding Model
• Main idea is to use carrier data (image, video, audio) to insert “extra”
information
Encryption key

Cover Embedding Marked


media algorithm media

Images.
Audio files,
Video files
Information to Hide
(watermark information)
 Digital Information Extraction Model

• Must know key information and extraction algorithm to extract


hidden message

Encryption key

Marked Extraction Extracted


media algorithm message
Visible Watermark
• Logo or seal of the organization which holds the rights to the primary
image, it allows the primary image to be viewed, but still marks it
clearly as the property of the owning organization.

• Overlay the watermark in a way which makes it difficult to remove,


if the goal of indicating property rights is to be achieved.
Source: YouTube , Copyright: SET India
Different methods of Image Watermarking
 Image watermarking can be categorized into three types based on
the robustness
Robust Watermarking
Fragile Watermarking
Semi- fragile Watermarking
Robust Watermark

 A watermark must be difficult or impossible to remove, at least


without visibly degrading the original image. A watermark must
survive image modifications such as:

• Geometric distortions: rotation, scaling, translation,


• Compression, Gaussian noise and other stronger signal
processing attacks etc.
Fragile Watermark
• Fragile watermarks are designed to detect every possible change in pixel
values.

• Variety of Techniques but in most cases, the watermark is embedded in


the least significant bit (LSB) of the image.

• Advantages: Pick up all image manipulations – malicious and non-


malicious

• Disadvantages: Too sensitive


Semi-Fragile Watermarks
They are robust, to a certain extent, and are less sensitive to pixel
modifications.

Why needed ?

Advantage: less sensitive than fragile watermarks

Disadvantage: ?
Another classification
• Non-Blind Watermarking –
• In Non-Blind Watermarking, one always needs the host and watermark signal along
with secret key.

• Semi-Blind Watermarking –
• Semi-Blind Watermarking does not need host signal but requires Watermark and
secret key.

• Blind Watermarking –
• Blind Watermarking only requires secret key and there is no requirement of host
signal as well as watermark signal. It is also Public Watermarking and it is the most
challenging one among all three.
Technical Requirements for Watermarking

Invisibility

Robustness Capacity

You might also like