November 20, 2003Digital WatermarkingWatermarkingSlide 4Visible vs Invisible WatermarksRequirements of WatermarksWatermarking techniques For imageWatermarking for TextSteganographyExample of Steganography (Text – page 48)Slide 11What is Computer Forensics?Slide 13What is the Challenge?FBI List of Computer Forensic ServicesThe Coroner’s Toolkit (TCT) OverviewmactimeilsUnix fileIcat, fileunrmpcatgrave-robberLaw Enforcement ChallengesBroader Picture: What to DoSlide 26Risk ManagementRiskRisk Assessment/AnalysisBenefits of Risk AssessmentRisk Assessment stepsRisk Assessment steps (2)Example 1Example 2Example 2 (2)Some Arguments against Risk AnalysisRisk MitigationExamples of documented risk assessment systemsNSA ISSO Risk Assessment MethodologyThe NSA ISSO Risk Assessment ProcessThe Risk PlaneRisk IndexSlide 43Laws and SecurityCopyrightsCopyright infringementPatentSlide 48Trade SecretComparisonEmployee and Employer RightsSlide 52Slide 53Computer crimeComputer Crime related lawsEthicsLaw vs EthicsEthical reasoningEthics ExampleCodes of ethicsCourtesy of Professors Chris Clifton & Matt BishopINFSCI 2935: Introduction of Computer Security1November 20, 2003November 20, 2003WatermarkingWatermarkingComputer ForensicsComputer ForensicsRisk ManagementRisk ManagementLegal and Ethical IssuesLegal and Ethical IssuesLecture 12Lecture 12INFSCI 2935: Introduction to Computer Security 2Digital WatermarkingDigital WatermarkingA digital pattern or signal is inserted into A digital pattern or signal is inserted into an imagean imageCan serve as a digital signatureCan identify the intended recipient (unique to each copy)Can identify document source (common to multiple copies)INFSCI 2935: Introduction to Computer Security 3WatermarkingWatermarkingWatermarked image is transformed imageWatermarked image is transformed imageOriginal image remains intact, recognizablePersistent in viewing, printing and re-transmission and disseminationContrast to Contrast to fingerprintingfingerprinting and and encryptionencryptionIn digital fingerprinting, original file remains but a new file is created that describes the original file (e.g., checksum in Tripwire)Encryption transforms an image to an unrecognizable imageINFSCI 2935: Introduction to Computer Security 4WatermarkingWatermarkingVisible watermarksVisible watermarksSimilar to physical counterpart (digitally stamped!)Invisible watermarksInvisible watermarksUseful as for identifying the source, author, owner, distributor or authorized consumerPermanently, unalterably mark the imageAlso used for tracing images in the Also used for tracing images in the event of their illicit distributionevent of their illicit distributionUnique watermark for each buyerINFSCI 2935: Introduction to Computer Security 5Visible vs Invisible WatermarksVisible vs Invisible WatermarksPurpose visible invisiblevalidation of intended recipient - Primarynon-repudiable transmission - Primarydeterrence against theft PrimarySecondarydiminish commercial value without utilityPrimary Primarydiscourage unauthorized duplication Primary Secondarydigital notarization and authentication Secondary Primaryidentify source Primary SecondaryINFSCI 2935: Introduction to Computer Security 6Requirements of WatermarksRequirements of WatermarksTo protect intellectual propertyTo protect intellectual propertyWatermark must be difficult or impossible to remove, at least without visibly degrading the original imageWatermark must survive image modificationsAn invisible watermark should be imperceptible so as not to affect the experience of viewing Watermarks should be easily detectable by the proper authorityINFSCI 2935: Introduction to Computer Security 7Watermarking techniques For imageWatermarking techniques For imageSpatial domain watermarkingSpatial domain watermarkingSimplest: flip the lowest order bit of chosen pixelsSuperimpose a watermarkColor separation – watermark in only one color band-Picture cropping can be used to eliminate some spatial watermarkFrequency domain watermarkingFrequency domain watermarkingUse Fast Fourier Transform – alter the values of chose frequenciesWatermarks will be dispersed spatially (cropping or spatial technique will not defeat it)INFSCI 2935: Introduction to Computer Security 8Watermarking for TextWatermarking for TextText-line codingText-line codingText lines of a document page are shifted imperceptibly up or downWord-shift codingWord-shift codingSpacing between words in a line text is alteredCharacter codingCharacter codingE.g., endline at the top of a letter, say “t” is extendedINFSCI 2935: Introduction to Computer Security 9SteganographySteganographyArt of hiding information in the midst of Art of hiding information in the midst of irrelevant datairrelevant dataThis is NOT cryptographyThis is NOT cryptographyUseful to hide the existence of secret Useful to hide the existence of secret communicationcommunicationINFSCI 2935: Introduction to Computer Security 10Example of Steganography (Text – page Example of Steganography (Text – page 48)48)Dear George,Dear George,Greetings to all at Oxford. Many thanks for yourGreetings to all at Oxford. Many thanks for yourletter and for the summer examination package.letter and for the summer examination package.All entry forms and fees forms should be readyAll entry forms and fees forms should be readyfor final dispatch to the syndicate by Fridayfor final dispatch to the syndicate by Friday2020thth or at the latest I am told by the 21 or at the latest I am told by the 21stst..Admin has improved here though there is roomAdmin has improved here though there is roomfor improvement still; just give us all two or threefor improvement still; just give us all two or threemore years and we will really show you! Pleasemore years and we will really show you! Pleasedon’t let these wretched 16+ proposals destroydon’t let these wretched 16+ proposals destroyyour basic O and A pattern. Certainly thisyour basic O and A pattern. Certainly thissort of change, if implemented immediately, sort of change, if implemented immediately, would bring chaos.would bring chaos.Sincerely yours,Sincerely yours, yoyourur packagepackage readyready FridayFriday 2121stst.. roomroom threethree PleasePlease destroydestroy thisthisimmediatelyimmediatelyCourtesy of Professors Chris Clifton & Matt BishopINFSCI 2935:
View Full Document