visual data security by data hiding and or encryption
play

Visual data security by data hiding and/or encryption William PUECH - PowerPoint PPT Presentation

Visual data security by data hiding and/or encryption William PUECH ICAR (Image & Interaction) LIRMM, UMR 5506, CNRS - University of Montpellier October 14, 2016 W. Puech (ICAR) Visual data security October 14, 2016 1 / 27 Visual data


  1. Visual data security by data hiding and/or encryption William PUECH ICAR (Image & Interaction) LIRMM, UMR 5506, CNRS - University of Montpellier October 14, 2016 W. Puech (ICAR) Visual data security October 14, 2016 1 / 27

  2. Visual data security Visual data security: problem Safe transfer and visualization on line in real time for low powered systems (wireless devices). W. Puech (ICAR) Visual data security October 14, 2016 2 / 27

  3. Visual data security Visual data security: problem Hybrid coding for safe transmission Encryption, data hiding and compression Images, image sequences, videos and 3D objects W. Puech (ICAR) Visual data security October 14, 2016 3 / 27

  4. Visual data security Visual data security: problem Hybrid coding for safe transmission Encryption, data hiding and compression Images, image sequences, videos and 3D objects Image compression W. Puech (ICAR) Visual data security October 14, 2016 3 / 27

  5. Visual data security Visual data security: problem Hybrid coding for safe transmission Encryption, data hiding and compression Images, image sequences, videos and 3D objects Image encryption W. Puech (ICAR) Visual data security October 14, 2016 3 / 27

  6. Visual data security Visual data security: applications W. Puech (ICAR) Visual data security October 14, 2016 4 / 27

  7. Visual data security Visual data security: solution Hybrid coding for safe transmission Robust to noise Compatible with compression Fast: access in real time The secret is based on a key (secrete or private key) The Algorithm is known Principle of Kerckhoffs [KER 83] Norms and standards A. Kerckhoffs. La cryptographie militaire. Journal des sciences militaires , vol. 9, pp. 5–38, 1883. W. Puech (ICAR) Visual data security October 14, 2016 5 / 27

  8. Visual data security Visual data security: solution Image data hiding The art to embed a message in a image [COX 08] : invisibility: statistically invisible no removable: robust to transformations payload: size of the hidden message security: robust to attacks complexity: real time application Data hiding: large payload Steganography: invisibility Watermarking: robust to attacks I. Cox. Digital Watermarking and Steganography. The Morgan Kaufmann Series in Multimedia Information and Systems, M. Kaufmann , Ed. Morgan Kaufmann Publishers, 2008. W. Puech (ICAR) Visual data security October 14, 2016 6 / 27

  9. Visual data security Visual data security: solution Image encryption The art to mask the data: confidentiality: data protection authentication: emitter and receiver integrity: ensure the totality and the content of the data non repudiation: ACK For visual data: Image encryption example Perceptual signature example I. Cox. Digital Watermarking and Steganography. The Morgan Kaufmann Series in Multimedia Information and Systems, M. Kaufmann , Ed. Morgan Kaufmann Publishers, 2008. W. Puech (ICAR) Visual data security October 14, 2016 6 / 27

  10. Visual data security Visual data security: some results Color protection by watermarking. M. Chaumont and W. Puech. A 8-Bit-Grey-Level Image Embedding its 512 Color Palette. 16th European Signal Processing Conference, EUSIPCO’08 aug. 25-29, Lausanne, Switzerland. M. Chaumont, W. Puech and C. Lahanier. Securing Color Information of an Image by Concealing the Color Palette . Journal of Systems and Software, Elsevier , 2012. W. Puech (ICAR) Visual data security October 14, 2016 7 / 27

  11. Visual data security Visual data security: some results Selective encryption of H264 videos (a) QP = 18, (b) QP = 24, (c) QP = 30 et (d) QP = 36. J.M. Rodrigues, W. Puech and A. Bors. Selective Encryption of Human Skin in JPEG Images. Proc. International Conference on Image Processing IEEE ICIP-2006 , pp. 1981-1984, Atlanta, US, october 2006. Z. Shahid, M. Chaumont and W. Puech. Fast Protection of H.264/AVC by Selective Encryption of CAVLC and CABAC for I & P frames. IEEE Transactions on Circuits and Systems for Video Technology , 21(5) :565-576, May 2011. W. Puech (ICAR) Visual data security October 14, 2016 8 / 27

  12. Visual data security Visual data security: some results Blink measure n − 1 m n − 1 m � � � � ( I oi , k − I oi + 1 , k ) 2 − � � � � � ( I ei , k − I ei + 1 , k ) 2 � � � � � � � i = 1 k = 1 i = 1 k = 1 � � BM = ( n − 1 ) m L. Dubois, W. Puech and J. Blanc-Talon. Reduced Selective Encryption of Intra and Inter Frames of H.264/AVC Using Psychovisual Metrics. Proc. International Conference on Image Processing IEEE ICIP-2012 , Orlando, US, october 2012. W. Puech (ICAR) Visual data security October 14, 2016 9 / 27

  13. Visual data security Visual data security: some results Scalable 3D visualization by watermarking. K. Hayat, W. Puech and G. Gesquière. Scalable 3D Terrain Visualization through Reversible JPEG2000 Based Blind Data Hiding . IEEE Transactions on Multimedia, IEEE , vol. 10, n 7, pp. 1261-1276, Nov. 2008. K. Hayat, W. Puech, N. Islam and G. Gesquiere. Seamless Heterogeneous Tessellation via DWT Domain Smoothing and Mosaicking. EURASIP Journal of Advances in Signal Processing Volume 2010, 15-pages. W. Puech (ICAR) Visual data security October 14, 2016 10 / 27

  14. Visual data security Visual data security: some results 3D watermarking a) Original 3D object “Smilodon” 508796 vertices, b) 3D Object watermarked with 314071 bits (= 38.3 kbytes) P . Amat, W. Puech, S. Druon and J.P . Pedeboy. Lossless 3D Steganography Based on MST and Connectivity Modification. Signal Processing: Image Communication, Elsevier , vol. 25, n ◦ 6, pp. 400-412, July 2010. N. Tournier, W. Puech, G. Subsol and J.P . Pedeboy. Sensitivity Analysis of Euclidean Minimum Spanning Tree for 3D Watermaking . Proc. SPIE, Electronic Imaging, 3D Image Processing , San-Francisco, CA, USA: SPIE, IS&T, January , 2012. W. Puech (ICAR) Visual data security October 14, 2016 11 / 27

  15. Visual data security Visual data security: some results M. Pinto, W. Puech and G. Subsol. Protection of JPEG compressed e-comics by selective encryption. Proc. International Conference on Image Processing IEEE ICIP-2013 , Melbourne, Australia, september 2013. W. Puech (ICAR) Visual data security October 14, 2016 12 / 27

  16. Visual data security Visual data security: steganalysis L. Pibre, J. Pasquet, D. Ienco, and Marc Chaumont. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch Proc. Electronic Imaging, Media Watermarking, Security, and Forensics , San-Francisco, CA, USA: IS&T, 2016. H. Abdulrahman, M. Chaumont, P . Montesinos, and B. Magnier. Color Image Steganalysis Based on Steerable Gaussian Filters Bank Proc. ACM IH&MMSec’2016 , Vigo, Galicia, Spain, June 20-22, 2016. W. Puech (ICAR) Visual data security October 14, 2016 13 / 27

  17. Visual data security Data hiding in encrypted images Coding step First step: encryption Second step: data hiding W. Puech (ICAR) Visual data security October 14, 2016 14 / 27

  18. Visual data security Data hiding in encrypted images Decoding step 3 possible scenarios Message extraction then decryption W. Puech (ICAR) Visual data security October 14, 2016 15 / 27

  19. Visual data security Data hiding in encrypted images Decoding step 3 possible scenarios Message extraction and decryption in parallel W. Puech (ICAR) Visual data security October 14, 2016 15 / 27

  20. Visual data security Data hiding in encrypted images Decoding step 3 possible scenarios Decryption then message extraction W. Puech (ICAR) Visual data security October 14, 2016 15 / 27

  21. Visual data security Data hiding in encrypted images: previous work message Marked Decryption Original encrypted and image Marked Message removing image Original Encrypted encrypted Encryption Data−hiding Extraction of image image image message hidden message Secret key k Secret key k (a) (b) Noise removing in the encrypted domain. a) Coding, b) Decoding. W. Puech, M. Chaumont, and O. Strauss. A Reversible Data Hiding Method for Encrypted Images. Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X , volume 6819, pages 68191E-1-68191E-9, San Jose, CA, USA, January 2008. N. Islam and W. Puech. Noise Removing in Encrypted Color Image by Statistical Analysis. Proc. SPIE, Electronic Imaging, MediaWatermarking, Security and Forensics , San-Francisco, CA, USA: SPIE, IS&T, January , 2012. W. Puech (ICAR) Visual data security October 14, 2016 16 / 27

  22. Visual data security Data hiding in encrypted images: previous work W. Puech, M. Chaumont, and O. Strauss. A Reversible Data Hiding Method for Encrypted Images. Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X , volume 6819, pages 68191E-1-68191E-9, San Jose, CA, USA, January 2008. W. Puech (ICAR) Visual data security October 14, 2016 17 / 27

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend