Issues for Multimedia Privacy & Security ---- Video Content Privacy Protection, Copyright Protection & Database Access Control Jianping Fan Dept of Computer Science UNC-Charlotte
Dec 20, 2015
Issues for Multimedia Privacy & Security
---- Video Content Privacy Protection, Copyright Protection & Database Access Control
Jianping FanDept of Computer Science UNC-Charlotte
Visual Database: Efficiency & Accuracy
a. Multimedia Content Analysis -- Feature Extraction
b. Multimedia Clustering & Classification -- Indexing
c. Database Indexing --- Fast Search & Access
d. Query Processing --- Query Represent. & Feedback
e. Multimedia Coding & Transmission-- Data Streaming
1. Why we need security & privacy for multimedia?
a. Multimedia data has copy right issue! It is easy for us to copy a digital image without losing! ------- data level
b. Different user class should have permission to access different data in database! Even the same data with different quality! -------- Access Control at database and data levels
c. Multimedia data has privacy issue! ------ why you show my appearance in your pictures?!
Traditional techniques, such as encryption, are not good enough!
• Encryption is not for multimedia content protection
Alice Encrypt Decrypt Bob
plaintext
plaintext
cyber text
source destination
key key
encrypt
What you want to show us? We cannot pay for nothing!
When I see it, then I can decide whether I can buy it!
John Smith, Attacker
Show me what you have, not just claim what you have!
I want to make a schedule to visit Arizona this summer!! It is so beautiful!!
I have no interesting on this!!
Arizona state government will have different opinion for these two photos!!
If you are good photographer, you want to show your pictures to attract people, but you do not want other people to make an illegal copies of your pictures!
Your children may get benefit from this photo!!!!!!!!
Original Picture Encrypted Picture
Jianping Fan 11/12/2002
Signature Original Picture
Picture with Hidden Signature!
Watermarking
• Why watermarking is more attractive than encryption
You can still see the picture with big quality lost!
• Advantages of Watermarking:
a. It is able to display the pictures to attract customers! This property is very important for multimedia content protection!
b. The watermarked pictures are able to keep ``same” vision quality of the original pictures! Customers will be happy for this!
c. It is easy for detecting the watermarking signal!
d. It is hard to remove the watermarking signal from pictures!
2. What’s Watermarking?
• Most Images are compressed in JPEG
Coding will make watermarked image more secure!
2. What’s Watermarking?• Why watermarking is more attractive than encryption
John Smith 6/30/2004
Original Image Watermarking Signal
JPEG Encoded Image With Watermarking Signatures!
2. What’s Watermarking?
Original Image Watermarked Image
• Can you find any difference?
2. What’s Watermarking?
Original Image Watermarked Image
• Can you find any difference?
2. What’s Watermarking?
Original Image Watermarked Image
• Can you find any difference?
2. What’s Watermarking?
From these examples, what we can learn?
a. The watermarked image should have ``same” vision quality as the original image has, or at least the human perception system cannot find their differences!
b. We should know where to add watermarking signal, how strong it should be!
c. We should be able to detect the watermarking signal effectively when we need.
2. What’s Watermarking?
• Why we cannot damage the image quality?
• How we can do this?
• How to measure image perceptional quality?
• How to quantify the threshold for human perceptional system?
• How to use this to watermark images?
Questions to be answered:
2. What’s Watermarking?
Applications for watermarking are very popular & market is also big!
Original Image Watermarking Signal
Jianping Fan 6/30/2005
2. What’s Watermarking?
Applications for watermarking are very popular & market is also big!
Original Image Secure Signal
terrorist attack plan
Picture shown in public web page!
Secure Information Transmission!
2. What’s Watermarking?
• When the watermarking signal damages images?
a. How can we obtain the threshold for human perception system?
b. How can we use this threshold to control the value of watermarking?
2. What’s Watermarking?
a. How can we generate the suitable watermarking signal?
b. Where should we add the watermarking signal in?
• Where to add watermarking signal?
2. What’s Watermarking?
• Why we should add maximum watermarking?
I can also add my watermarking signal in your picture!
2. What’s Watermarking?• Why we should add maximum watermarking?
a. Original Image Signal: I(x, y)
b. Your Watermarking Signal: w(x, y)
c. Human Perception Threshold: T(x, y)
If I(x, y) + w(x, y) << T(x, y), there exists another signal q(x, y):
I(x, y) + w(x, y) + q(x, y) T(x, y)q(x, y) can be used by attackers!
Jianping Fan 11/12/2002
• Why we should add maximum watermarking?
Weakly Watermarked Image
John Smith 5/12/2005
• Why we should add maximum watermarking?
Weakly Watermarked Image Another Watermarking SignalFrom Attackers!
Strongly Watermarked Image
John Smith 5/12/2005
Strongly Watermarked image Weakly Watermarked image
• How can you claim this is your picture?
Jianping Fan 11/12/2002
Watermarked Image Original Image
• How can you claim this is your picture?
Manually adjust is the major solution now!
2. What’s Watermarking?
• Different Watermarking Signals
2. What’s Watermarking?• Different Watermarking Signals
2. What’s Watermarking?• Different Watermarking Signals
2. What’s Watermarking?
• Most Images are compressed in JPEG
2. What’s Watermarking?
16
)12(cos
16
)12(cos),(
2
)(
2
)(),(
7
0
7
0
vyuxyxI
vCuCvuF
x y
DCT
121
Each DCT coefficient consists of information from all the pixels!!!!!!
• Watermarking Image at Compressed Domain
2. What’s Watermarking?
16
)12(cos
16
)12(cos),(
2
)(
2
)(),(
7
0
7
0
vyuxyxI
vCuCvuF
x y
• Watermarking Image at Compressed Domain
8
8
low
high
a. Low frequency coefficients represent average information or homogeneity of image blocks
b. High frequency coefficients represent difference information or texture of image blocks
Watermarking signal should be added in Texture areas!
2. What’s Watermarking?
• Watermarking Image at Compressed Domain
Wavelet Transformation
JPEG 2000
2. What’s Watermarking?
• How to watermark MPEG videos?
DCT Q VLC Buffer 01001….
ME
IQ
IDCT
01001….
IDCT IQ VLC Buffer
ME
Q: quantization
IQ: reverse quantizationME: motion estimation
2. What’s Watermarking?
• How to watermark MPEG videos?
2. What’s Watermarking?
Is it too expensive for a 2 hours video?
• How to water MPEG videos?
2. What’s Watermarking?
a. Can we only watermark I frames?
b. Can we only watermark I and P frames?
• How to watermark MPEG videos?
I B P
2. What’s Watermarking?
I P P
I PB
3. What’s Database Access Control?
Data in Disk
read
write
Access Control
client
client
client
a. Pay more then get more! b. User classes
3. What’s Database Access Control?Objects in database
Users of database
Rule 1
Video in Database
Cluster 1 Cluster i Cluster n
Subcluster 11 Subcluster 1j Subcluster n1 Subcluster nl
Subregion 11k Subregion nl1 Subregion nlm
object1111 object nlm1
Disk for Cluster 1 Disk for Cluster i Disk for Cluster n
ii DN log
3. What’s Database Access Control?Integrating access control with database indexing structure!!!
query object
feature extraction
Cluster 1 Cluster i Cluster n
Subcluster i1 Subcluster ij Subcluster im
Subregion ij1 Subregion ijl Subregion ijr
Object ijrm
Disk for cluster 1 Disk for cluster i
3. What’s Database Access Control?Integrating access control with video transmission and packaging!!!
Video in Database
Cluster 1 Cluster i Cluster n
Subcluster 11 Subcluster 1j Subcluster n1 Subcluster nl
Subregion 111 Subregion 11k Subregion nl1 Subregion nlm
object1111 object nlm1
Disk for Cluster 1 Disk for Cluster i Disk for Cluster n
ii DN log
3. What’s Database Access Control?
Video in Database
Cluster 1 Cluster i Cluster n
Subcluster 11 Subcluster 1j Subcluster n1 Subcluster nl
Subregion 111 Subregion 11k Subregion nl1 Subregion nlm
object1111 object nlm1
Disk for Cluster 1 Disk for Cluster i Disk for Cluster n
ii DN log
3. What’s Database Access Control?
Video in Database
Cluster 1 Cluster i Cluster n
Subcluster 11 Subcluster 1j Subcluster n1 Subcluster nl
Subregion 111 Subregion 11k Subregion nl1 Subregion nlm
object1111 object nlm1
Disk for Cluster 1 Disk for Cluster i Disk for Cluster n
ii DN log
3. What’s Database Access Control?
a. Frame level
4. Video Content Protection?
b. Region level
4. Video Content Protection?
c. Video Content Privacy Protection
4. Video Content Protection?
c. Video Content Privacy Protection
4. Video Content Protection?
c. Video Content Privacy Protection
4. Video Content Protection?
Why image privacy is so important?!
Access control & rights management
Query & Delivery
Delivery
Query Presentation
Query Processing
Visual Summarization
Indexing
Video Collections
MPEG Encoder
5. Video Database with Privacy Protection and Access Control
Integrating with encryption and networks!!!
Video Shot nUnsuitable for people under 18!!!
Repackaged MPEG Video Bit Stream!!!
5. Video Database with Privacy Protection and Access Control
Who work on this area?