Digital Watermarking
Digital Watermarking
Unit-3
What is a watermark ?
What is a watermark ? A distinguishing mark impressed on
paper during manufacture; visible when paper is held up to
the light (e.g. INR Bill)
◼ According to Robustness
◼ Fragile
◼ Semi fragile
◼ Robust
Unit-3
Public Key Authentication
Public Key Requirements
1. computationally easy to create key pairs
2. computationally easy for sender knowing public key to
encrypt messages
3. computationally easy for receiver knowing private key to
decrypt ciphertext
4. computationally infeasible for opponent to determine private
key from public key
5. computationally infeasible for opponent to otherwise
recover original message
6. useful if either key can be used for each role
Public Key Algorithms
RSA (Rivest, Shamir, Adleman)
developed in 1977
only widely accepted public-key encryption algorithm
given tech advances need 1024+ bit keys
RSA
➢ to encrypt a message M the sender:
⚫ obtains public key of recipient PU={e,n}
⚫ computes: C = Me mod n, where 0≤M<n
➢ to decrypt the ciphertext C the owner:
⚫ uses their private key PR={d,n}
⚫ computes: M = Cd mod n
➢ note that the message M must be smaller than
the modulus n (block if needed)
RSA Key Setup
➢ each user generates a public/private key pair by:
➢ selecting two large primes at random: p, q
➢ computing their system modulus n=p.q
⚫ note ø(n)=(p-1)(q-1)
➢ selecting at random the encryption key e
⚫ where 1<e<ø(n), gcd(e,ø(n))=1
Cryptographic Protocols
• Arbitrated Protocols
• In a computer protocol arbiter is a trustworthy third party who
ensures fairness. The arbiter might be a person , a program, or a
machine. For example, in a network an arbiter might be a
program running on one machine of the network. The program
receives and forwards messages between users. The user trust
that when the arbiter forwards a message saying it comes from
A, the message really did come from user A.the notion of an
arbiter is the basis for type of secure protocol called an
arbitrated protocol.
Arbitrated Protocols disadvantages
• The two sides may not be able to find a neutral third party that
both sides trust. Suspicious users are rightfully suspicious of
unknown arbiter in a network.
• Maintaining the availability of an arbiter represents a cost to the
users or the network ; that cost may be high.
• Arbitration causes a time delay in communication because a third
party must receive, act on, and then forward every transaction.
• If the arbitration service is heavily used, it may become a
bottleneck in the network as many users try to access a single
arbiter.
• Secrecy becomes weak, because the arbiter has access to much
sensitive information.
• Adjudicated Protocols
Its able to see all sides third party to judge fairness based on
evidences.
Not only can a third party determine whether two parties
acted fairly, that is, within the rules of the protocol, but
third party can also determine who cheated.
Adjudicated protocols involve the services of a third party
only in case of a dispute. Therefore, they are usually less
costly, in terms of machine time or access to a trusted third
party software judge, than arbitrated protocols. However,
adjudicated protocols detect a failure to cooperate only
after the failure has occurred
Hash Function Requirements
A hash function H must have the following properties:
• H can be applied to a block of data of any size
• H produces a fixed-length output
• H(x) is relatively easy to compute for any given x,
making both hardware and software implementations
practical
• For any given code h, it is computationally infeasible
to find x such that h(x)=h
• For any given block x, it is computationally infeasible
to find yx with h(y)=h(x)
• It is computationally infeasible to find any pair (x, y)
such that h(x)=h(y)
Message Authentication Using a One-
Message
Way Hash Function
Message
Message
H
Compare
K
H
K
D
E
Message
Message
H
Compare
Kpublic
H
Kprivate
D
E
Types of IT security
•Network security. Network security is used to
prevent unauthorized or malicious users from
getting inside your network. ...
•Internet security. ...
•Endpoint security. ...
•Cloud security. ...
•Application security.
Cryptography
Terminology of Cryptography
Types of Security Protocols
• Arbitrated protocols
– Involving a trusted third party
• Adjudicated protocols
– Trusted third party, after the fact
• Self-enforcing protocols
– No trusted third party
Key Exchange With Symmetric
Encryption and an Arbitrator
KA KB
Alice Bob
Alice
Who knows
Requests
what at this
Session
point?
Key for
Bob KA Trent KB
Step Two
KA KB
Alice Bob
EKA(KS),
EKB(KS) Who knows
what at this
EKA(KS), point?
EKB(KS)
KA Trent KB
KS
Step Three
KS KS
KA EKB(KS) KB
Alice Bob
EKA(KS),
EKB(KS) Who knows
what at this
point?
KA Trent KB
KS
What Has the Protocol Achieved?
• Alice and Bob both have a new session key
• The session key was transmitted using keys
known only to Alice and Bob
• Both Alice and Bob know that Trent
participated
• But there are vulnerabilities
Problems With the Protocol
• What if the initial request was grabbed by
Mallory?
• Could he do something bad that ends up
causing us problems?
• Yes!
The Man-in-the-Middle Attack
• A class of attacks where an active attacker
interposes himself secretly in a protocol
• Allowing alteration of the effects of the
protocol
• Without necessarily attacking the encryption
Applying the Man-in-the-Middle
Attack
KA KB
Alice KM
Bob
Mallory
Alice
Alice Who knows what at
this point?
Requests
Requests More precisely, what do
they think they know?
Session
Session
Key for
Key for
Mallory
Bob KA Trent KB
KM
Trent Does His Job
KA KB
Alice KM
Bob
EKA(KS), Mallory
EKM(KS)
KA Trent KB
KM
Alice Gets Ready to Talk to Bob
EKM(KS)
KS
KA KB
Alice KM
Bob
Mallory
KS EKM(KS) EKM(KS) Mallory can now
masquerade as
Bob
KA Trent KB
KM
Really Getting in the Middle
KA KB
Alice KM
Bob KS1
EKM(KS1), Mallory KS
KS EKB(KS1) KS1 EKB(KS1)