visual data security by data hiding and or encryption
play

Visual data security by data hiding and/or encryption William PUECH - PowerPoint PPT Presentation

Visual data security by data hiding and/or encryption William PUECH ICAR (Image & Interaction) LIRMM, UMR 5506, CNRS - University of Montpellier October 14, 2016 W. Puech (ICAR) Visual data security October 14, 2016 1 / 27 Visual data


  1. Visual data security by data hiding and/or encryption William PUECH ICAR (Image & Interaction) LIRMM, UMR 5506, CNRS - University of Montpellier October 14, 2016 W. Puech (ICAR) Visual data security October 14, 2016 1 / 27

  2. Visual data security Visual data security: problem Safe transfer and visualization on line in real time for low powered systems (wireless devices). W. Puech (ICAR) Visual data security October 14, 2016 2 / 27

  3. Visual data security Visual data security: problem Hybrid coding for safe transmission Encryption, data hiding and compression Images, image sequences, videos and 3D objects W. Puech (ICAR) Visual data security October 14, 2016 3 / 27

  4. Visual data security Visual data security: problem Hybrid coding for safe transmission Encryption, data hiding and compression Images, image sequences, videos and 3D objects Image compression W. Puech (ICAR) Visual data security October 14, 2016 3 / 27

  5. Visual data security Visual data security: problem Hybrid coding for safe transmission Encryption, data hiding and compression Images, image sequences, videos and 3D objects Image encryption W. Puech (ICAR) Visual data security October 14, 2016 3 / 27

  6. Visual data security Visual data security: applications W. Puech (ICAR) Visual data security October 14, 2016 4 / 27

  7. Visual data security Visual data security: solution Hybrid coding for safe transmission Robust to noise Compatible with compression Fast: access in real time The secret is based on a key (secrete or private key) The Algorithm is known Principle of Kerckhoffs [KER 83] Norms and standards A. Kerckhoffs. La cryptographie militaire. Journal des sciences militaires , vol. 9, pp. 5–38, 1883. W. Puech (ICAR) Visual data security October 14, 2016 5 / 27

  8. Visual data security Visual data security: solution Image data hiding The art to embed a message in a image [COX 08] : invisibility: statistically invisible no removable: robust to transformations payload: size of the hidden message security: robust to attacks complexity: real time application Data hiding: large payload Steganography: invisibility Watermarking: robust to attacks I. Cox. Digital Watermarking and Steganography. The Morgan Kaufmann Series in Multimedia Information and Systems, M. Kaufmann , Ed. Morgan Kaufmann Publishers, 2008. W. Puech (ICAR) Visual data security October 14, 2016 6 / 27

  9. Visual data security Visual data security: solution Image encryption The art to mask the data: confidentiality: data protection authentication: emitter and receiver integrity: ensure the totality and the content of the data non repudiation: ACK For visual data: Image encryption example Perceptual signature example I. Cox. Digital Watermarking and Steganography. The Morgan Kaufmann Series in Multimedia Information and Systems, M. Kaufmann , Ed. Morgan Kaufmann Publishers, 2008. W. Puech (ICAR) Visual data security October 14, 2016 6 / 27

  10. Visual data security Visual data security: some results Color protection by watermarking. M. Chaumont and W. Puech. A 8-Bit-Grey-Level Image Embedding its 512 Color Palette. 16th European Signal Processing Conference, EUSIPCO’08 aug. 25-29, Lausanne, Switzerland. M. Chaumont, W. Puech and C. Lahanier. Securing Color Information of an Image by Concealing the Color Palette . Journal of Systems and Software, Elsevier , 2012. W. Puech (ICAR) Visual data security October 14, 2016 7 / 27

  11. Visual data security Visual data security: some results Selective encryption of H264 videos (a) QP = 18, (b) QP = 24, (c) QP = 30 et (d) QP = 36. J.M. Rodrigues, W. Puech and A. Bors. Selective Encryption of Human Skin in JPEG Images. Proc. International Conference on Image Processing IEEE ICIP-2006 , pp. 1981-1984, Atlanta, US, october 2006. Z. Shahid, M. Chaumont and W. Puech. Fast Protection of H.264/AVC by Selective Encryption of CAVLC and CABAC for I & P frames. IEEE Transactions on Circuits and Systems for Video Technology , 21(5) :565-576, May 2011. W. Puech (ICAR) Visual data security October 14, 2016 8 / 27

  12. Visual data security Visual data security: some results Blink measure n − 1 m n − 1 m � � � � ( I oi , k − I oi + 1 , k ) 2 − � � � � � ( I ei , k − I ei + 1 , k ) 2 � � � � � � � i = 1 k = 1 i = 1 k = 1 � � BM = ( n − 1 ) m L. Dubois, W. Puech and J. Blanc-Talon. Reduced Selective Encryption of Intra and Inter Frames of H.264/AVC Using Psychovisual Metrics. Proc. International Conference on Image Processing IEEE ICIP-2012 , Orlando, US, october 2012. W. Puech (ICAR) Visual data security October 14, 2016 9 / 27

  13. Visual data security Visual data security: some results Scalable 3D visualization by watermarking. K. Hayat, W. Puech and G. Gesquière. Scalable 3D Terrain Visualization through Reversible JPEG2000 Based Blind Data Hiding . IEEE Transactions on Multimedia, IEEE , vol. 10, n 7, pp. 1261-1276, Nov. 2008. K. Hayat, W. Puech, N. Islam and G. Gesquiere. Seamless Heterogeneous Tessellation via DWT Domain Smoothing and Mosaicking. EURASIP Journal of Advances in Signal Processing Volume 2010, 15-pages. W. Puech (ICAR) Visual data security October 14, 2016 10 / 27

  14. Visual data security Visual data security: some results 3D watermarking a) Original 3D object “Smilodon” 508796 vertices, b) 3D Object watermarked with 314071 bits (= 38.3 kbytes) P . Amat, W. Puech, S. Druon and J.P . Pedeboy. Lossless 3D Steganography Based on MST and Connectivity Modification. Signal Processing: Image Communication, Elsevier , vol. 25, n ◦ 6, pp. 400-412, July 2010. N. Tournier, W. Puech, G. Subsol and J.P . Pedeboy. Sensitivity Analysis of Euclidean Minimum Spanning Tree for 3D Watermaking . Proc. SPIE, Electronic Imaging, 3D Image Processing , San-Francisco, CA, USA: SPIE, IS&T, January , 2012. W. Puech (ICAR) Visual data security October 14, 2016 11 / 27

  15. Visual data security Visual data security: some results M. Pinto, W. Puech and G. Subsol. Protection of JPEG compressed e-comics by selective encryption. Proc. International Conference on Image Processing IEEE ICIP-2013 , Melbourne, Australia, september 2013. W. Puech (ICAR) Visual data security October 14, 2016 12 / 27

  16. Visual data security Visual data security: steganalysis L. Pibre, J. Pasquet, D. Ienco, and Marc Chaumont. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch Proc. Electronic Imaging, Media Watermarking, Security, and Forensics , San-Francisco, CA, USA: IS&T, 2016. H. Abdulrahman, M. Chaumont, P . Montesinos, and B. Magnier. Color Image Steganalysis Based on Steerable Gaussian Filters Bank Proc. ACM IH&MMSec’2016 , Vigo, Galicia, Spain, June 20-22, 2016. W. Puech (ICAR) Visual data security October 14, 2016 13 / 27

  17. Visual data security Data hiding in encrypted images Coding step First step: encryption Second step: data hiding W. Puech (ICAR) Visual data security October 14, 2016 14 / 27

  18. Visual data security Data hiding in encrypted images Decoding step 3 possible scenarios Message extraction then decryption W. Puech (ICAR) Visual data security October 14, 2016 15 / 27

  19. Visual data security Data hiding in encrypted images Decoding step 3 possible scenarios Message extraction and decryption in parallel W. Puech (ICAR) Visual data security October 14, 2016 15 / 27

  20. Visual data security Data hiding in encrypted images Decoding step 3 possible scenarios Decryption then message extraction W. Puech (ICAR) Visual data security October 14, 2016 15 / 27

  21. Visual data security Data hiding in encrypted images: previous work message Marked Decryption Original encrypted and image Marked Message removing image Original Encrypted encrypted Encryption Data−hiding Extraction of image image image message hidden message Secret key k Secret key k (a) (b) Noise removing in the encrypted domain. a) Coding, b) Decoding. W. Puech, M. Chaumont, and O. Strauss. A Reversible Data Hiding Method for Encrypted Images. Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X , volume 6819, pages 68191E-1-68191E-9, San Jose, CA, USA, January 2008. N. Islam and W. Puech. Noise Removing in Encrypted Color Image by Statistical Analysis. Proc. SPIE, Electronic Imaging, MediaWatermarking, Security and Forensics , San-Francisco, CA, USA: SPIE, IS&T, January , 2012. W. Puech (ICAR) Visual data security October 14, 2016 16 / 27

  22. Visual data security Data hiding in encrypted images: previous work W. Puech, M. Chaumont, and O. Strauss. A Reversible Data Hiding Method for Encrypted Images. Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X , volume 6819, pages 68191E-1-68191E-9, San Jose, CA, USA, January 2008. W. Puech (ICAR) Visual data security October 14, 2016 17 / 27

Recommend


More recommend