1. 1 DIGITAL WATERMARKING
VISVESVARAYA TECHNOLOGICAL UNIVERSITY
JnanaSangama, Machche, Belgaum – 590 014
A seminar report on
DIGITAL WATERMARKING
Submitted by
MOHAMMED JASHIM
1NH08EC034
VIII SEMESTER, Section ”A”
Department of Electronics & Communication Engineering
NEW HORIZON
COLLEGE OF ENGINEERING
(Accredited by NBA, Permanently affiliated to VTU)
Outer Ring Road, Bellandur Post, Near Marathalli,
Bengaluru – 560 103
2011 – 12
Department of Electronics & Communication, NHCE 2011-12
2. 2 DIGITAL WATERMARKING
NEW HORIZON COLLEGE OF ENGINEERING
Outer Ring Road, Bellandur Post, Near Marathalli,
Bengaluru – 560 103
DEPARTMENT OF ELECTRONICS AND COMMUNICATION
Certificate
This is to certify that the seminar entitled “DIGITAL WATERMARKING”is a bonafide
work carried out by Mr.MOHAMMED JASHIMbearing the USN1NH08EC034, in partial
fulfillment for the award of the degree of Bachelor of Engineering in Electronics &
Communicationof the Visvesvaraya Technological University, Belgaum during the
academic year 2011 - 12. This seminar report has been approved as it satisfies the academic
requirements in respect of the Seminar Work (bearing the subject code 06EC86, for the VIII
semester during February-June 2012) prescribed for the Bachelor of Engineering Degree.
…………………………….. ……………………………..
Signature of the Coordinator Signature of the HOD
Mr. Aravinda K. Dr. T.N. Basavaraj
Assistant Professor, Professor,
Dept. of E&C, NHCE, Dept. of E&C, NHCE,
Bengaluru – 560 103 Bengaluru – 560 103
Department of Electronics & Communication, NHCE 2011-12
3. 3 DIGITAL WATERMARKING
ABSTRACT
As more and more analogue systems are replaced by digital ones, the question of how
to deal with piracy of copyrighted digital content is turning into a serious problem. For
example, the speed with which the “Content Scrambling System” – the encryption standard
used for DVD video – was broken, clearly shows, that encryption on its own is insufficient
for many systems in protecting copyrighted material from misuse. Digital Watermarking, on
the other hand, relies on the shortcomings of the “human visual system” (HVS) and is about
embedding copyright information in a way that it is imperceivable by humans, while still
being resistant to modifications of the cover media. Thus, digital watermarking can be
considered to be a supplementary technique to well established encryption schemes.
(i)
Department of Electronics & Communication, NHCE 2011-12
4. 4 DIGITAL WATERMARKING
ACKNOWLEDGMENT
I express my sincere thanks to Prof.Dr. T.N. Basavaraj(HOD E&C, NHCE).
Mr. AravindaK(Assistant Professor,E&C,NHCE) for their kind co-operation for presenting
the seminar.
I also extend my sincere thanks to all other members of the faculty of Electronics
and Communication Department and my friends for their co-operation and
encouragement.
(ii)
Department of Electronics & Communication, NHCE 2011-12
5. 5 DIGITAL WATERMARKING
TABLE OF CONTENTS
SI no DESCRIPTION PAGE NO :
1 INTRODUCTION 6
2 DIGITAL WATERMARKING TECHNOLOGY 10
OVERVIEW
3 CLASSIFICATION 11
4 DIGITAL WATERMARKING TECHNICAL 14
DETAILS
5 WATERMARKING AS COMMUNICATION 17
6 DIGITAL WATERMARKING METHODS 19
7 DISTORTION AND ATTACKS 23
8 APPLICATION OF DIGITAL WATERMARKING 25
9 CONCLUSION 29
10 REFERENCES 30
Department of Electronics & Communication, NHCE 2011-12
6. 6 DIGITAL WATERMARKING
CHAPTER 1
INTRODUCTION
Along with the explosive growth of the Internet not only desirable new possibilities -
like publicly available access to information databases around the world, distributed
project work across different countries, or fast and reliable means of electronic
communication - emerged, but the ease with which digital media can be duplicated and
modified, or the fact that legislation is seemingly unable to cope with its rapid rate of
change makes it also very attractive to people with dishonourable motives. The advent
of the Internet has resulted in many new opportunities for the creation and delivery of
content in digital form. Applications include electronic advertising, realtime video and
audio delivery, digital repositories and libraries, and Web publishing. An important
issue that arises in these applications is the protection of the rights of all participants. It
has been recognized for quite some time that current copyright laws are inadequate for
dealing with digital data. This has led to an interest towards developing new copy
deterrence and protection mechanisms. One such effort that has been attracting
increasing interest is based on digital watermarking techniques. Digital watermarking is
the process of embedding information into digital multimedia content such that the
information (which we call the watermark) can later be extracted or detected for a
variety of purposes including copy prevention and control. Digital watermarking has
become an active and important area of research, and development and
commercialization of watermarking techniques is being deemed essential to help
address some of the challenges faced by the rapid proliferation of digital content.
With these drawbacks of the “digital age” in mind, creators of multimedia content may wish
for a digital analogy to the watermarks that have been used in bookmaking since the 13th
Century .This need for methods and tools to protect ones intellectual property rights initiated
the relatively new research field of “digital watermarks”. Someone familiar with encryption
techniques might be tempted to ask why there is such an amount of interest in the research
community to develop robust watermarking techniques, if numerous secure encryption
algorithms are readily available. There are several reasons for this:
1. Encryption alone often is insufficient to protect digital content, since
unconsidered and erroneoususage by human operators often renders it useless.
2. If somebody breaks the encryption (e.g. breaking the “content scrambling system”
used on DVDswith tools like “DeCSS”, “VobDec” or “SmartRipper”), copyright
infringements can still be provenusing the embedded watermark.
Department of Electronics & Communication, NHCE 2011-12
7. 7 DIGITAL WATERMARKING
3. The decryption process usually depends on the data being unmodified.
4. Since rightful owners are to be allowed to access the data they paid for, the
encryption needs tobe undone at some point. As the unencrypted data is normally
being held in the main memory ofcomputers, it’s not too difficult to devise tools for
storing it onto a local hard disk (e.g. many DVDplayers for the Windows OS use
DirectShow for video output. This proves to be useful for multiangleDVDs, where
applications like “DeCSS” fail. By using tools that implement appropriate
DirectShowfilters to write the decoded images to a user-specified file instead of
displaying them onthe screen (e.g. “DVDRip”), the raw video data is still
accessible.
Because of these shortcomings, digital watermarking is sometimes referred to as
being “the last lineof defence”. Consequently, an effective watermark should
normally have several properties, whoseimportance will vary depending upon the
application.
Robustness
o Fragile Watermarks are highly sensitive to any modifications, their
sole purpose beingto prove the authenticity of a document.
o Robust Watermarks should be embedded in a way, that they cannot
be removedfrom the data without introducing noticeable defects.
Perceptibility
oVisible Watermarks are added as a perceivable additional layer to the
original data
oInvisible Watermarks should not be perceivable by human senses.
·
Security Unauthorized parties should not be able to read or alter the watermark, even
if theyhave detailed knowledge about the used algorithms (Kerckhoffs‟s maxim).
Multiple Watermarks Does the watermarking algorithm allow for multiple
watermarks to be detectedindependently of each other?
Speed In video distribution systems it may be necessary to use asymmetric
algorithms, which
offer very fast embedding methods, whereas watermark detection can take arbitrarily
longer.
Digital watermarking is still a very young research area, with its first academic conference
held in 1996 [Ande99]. Numerous algorithms have been proposed and dismissed since then.
Therefore, this paper aims at describing one popular watermarking technique in detail
(“Spread Spectrum Watermarking”), rather than providing a short and unsatisfactory
explanation of a larger number of different methods.
Department of Electronics & Communication, NHCE 2011-12
8. 8 DIGITAL WATERMARKING
INFORMATION HIDING: Steganography & Digital
Watermarking
In addition to digital watermarking, the general idea of hiding some information in digital
content has a wider class of applications that go beyond mere copyright protection and
authentication.
The techniques involved in such applications are collectively referred to as information
hiding. It contains a large range of problem beyond that of embedding message in
content,keeping the existence of information secret and imperceptible.
For example, an image printed on a document could be annotated by information that could
lead an user to its high resolution version
STEGANOGRAPHY:
Another topic that is related to watermarking is steganography. Steganography applications
conceal information in other, seemingly innocent media. Steganographic results may
masquerade as other file for data types, be concealed within various media, or even hidden in
network traffic or disk space. We are only limited by our imagination in the many ways
information and data can be exploited to conceal additional information. Although
steganography has been studied as part of cryptography for many decades, the focus of
steganography is secret communication. In fact, the modern formulation of the problem goes
by the name of the prisoner’s problem.Here Alice and Bob are trying to hatch an escape plan
while in prison. The problem is that all communication between them is examined by a
warden, Wendy, who will place both of them in solitary confinement at the first hint of any
suspicious communication. Hence, Alice and Bob must trade seemingly inconspicuous
messages that actually contain hidden messages involving the escape plan. There are two
versions of the problem that are usually discussed – one where the warden is passive, and
only observes messages and the other where the warden is active and modifies messages in a
limited manner to guard against hidden messages. Clearly the most important issue here is
that the very presence of a hidden message must be concealed. Whereas in digital
watermarking it is not clear that a good watermarking technique should also be
steganographic.
Digital Watermarking
Digital information embedded within any digital media that can later be detected and
extracted.Simply watermarking, a pattern of bits inserted into a digital image, audio or video
file that identifies the file's copyright information (author, rights, etc.). The name comes from
the faintly visible watermarks imprinted on stationery that identify the manufacturer of the
stationery. The purpose of digital watermarks is to provide copyright protection for
intellectual property that's in digital format.
Unlike printed watermarks, which are intended to be somewhat visible, digital watermarks
are designed to be completely invisible, or in the case of audio clips, inaudible. Moreover, the
actual bits representing the watermark must be scattered throughout the file in such a way
that they cannot be identified and manipulated. And finally, the digital watermark must be
robust enough so that it can withstand normal changes to the file, such as reductions
from lossy compression algorithms.
Department of Electronics & Communication, NHCE 2011-12
9. 9 DIGITAL WATERMARKING
Satisfying all these requirements is no easy feat, but there are a number of companies offering
competing technologies. All of them work by making the watermark appear as noise - that is,
random data that exists in most digital files anyway. To view a watermark, you need a special
program that knows how to extract the watermark data.
Watermarking is also called data embedding and information hiding.
Digital Watermarking describes methods and technologies that hide information, for
example a number or text, in digital media, such as images, video or audio. The embedding
takes place by manipulating the content of the digital data, which means the information is
not embedded in the frame around the data. The hiding process has to be such that the
modifications of the media are imperceptible. For images this means that the modifications
of the pixel values have to be invisible. Furthermore, the watermark must be either robust or
fragile, depending on the application. By "robust" we mean the capability of the watermark
to resist manipulations of the media, such as lossy compression (where compressing data
and then decompressing it retrieves data that may well be different from the original, but is
close enough to be useful in some way), scaling, and cropping, just to enumerate some. In
some cases the watermark may need to be fragile. "Fragile" means that the watermark
should not resist tampering, or would resist only up to a certain, predetermined extent.
CHAPTER 2
Department of Electronics & Communication, NHCE 2011-12
10. 10 DIGITAL WATERMARKING
DIGITAL WATERMARKING TECHNOLOGY
OVERVIEW
A watermark is a pattern of bitsinserted into a digitalimage, audio or video file that identifies
the file's copyright information (author, rights, etc.). The name “watermark” is derived from
the faintly visible marks imprinted on organisational stationery.
There are many types of digital information and data. The types concentrated on in this report
are:
• Digital Images
• Digital Audio, and
• Digital Videos
Unlike printed watermarks, which are intended to be somewhat visible (like the very light
compass stamp watermarking this report), digital watermarks are designed to be completely
invisible, or in the case of audio clips, inaudible.In addition, the bits representing the
watermark must be scattered throughout the file in such a way that they cannot be identified
and manipulated. And finally, a digital watermark must be robust enough to survive changes
to the file its embedded in, such as being saved using a lossy compression algorithm eg:
JPEG.
Satisfying all these requirements is no easy feat, but there are a number of companies offering
competing technologies. All of them work by making the watermark appear as noise- that is,
random data that exists in most digital files anyway. Digital Watermarking works by
concealing information within digital data, such that it cannot be detected without special
software with the purpose of making sure the concealed data is present in all copies of the
data that are made whether legally or otherwise, regardless of attempts to damage/remove it.
The purpose of digital watermarks is to provide copyright
protection for intellectual property that is in digital format.
CHAPTER 3
CLASSIFICATION
Department of Electronics & Communication, NHCE 2011-12
11. 11 DIGITAL WATERMARKING
Classification according to visibility:
Visible digital watermarking
Invisible digital watermarking
VISIBLE DIGITAL WATERMARKING
In visible digital watermarking, the information is visible in the picture or video. Typically,
the information is text or a logo, which identifies the owner of the media. The image on the
right has a visible watermark. When a television broadcaster adds its logo to the corner of
transmitted video, this also is a visible watermark.
INVISIBLE DIGITAL WATERMARKING
In invisible digital watermarking, information is added as digital data to audio, picture, or
video, but it cannot be perceived as such (although it may be possible to detect that some
amount of information is hidden in the signal). The watermark may be intended for
widespread use and thus, is made easy to retrieve or, it may be a form of steganography,
where a party communicates a secret message embedded in the digital signal. In either case,
as in visible watermarking, the objective is to attach ownership or other descriptive
information to the signal in a way that is difficult to remove. It also is possible to use hidden
embedded information as a means of covert communication between individuals.
PURPOSE VISIBLE INVISIBLE
Validation of intended recipient - Primary
Non-repudiable transmission - Primary
Deterrence against theft Primary Secondary
Diminish commercial value without utility Primary Primary
Discourage unauthorized duplication Primary Secondary
Digital notarization and authentication Secondary Primary
Identify source Primary Secondary
Department of Electronics & Communication, NHCE 2011-12
12. 12 DIGITAL WATERMARKING
Classification Based On Digital Watermarking techniques
used :
Robustness
Perceptibility
Capacity
Embedded method
ROBUSTNESS
A digital watermark is called fragile if it fails to be detectable after the slightest modification.
Fragile watermarks are commonly used for tamper detection (integrity proof). Modifications
to an original work that clearly are noticeable, commonly are not referred to as watermarks,
but as generalized barcodes.
A digital watermark is called semi-fragile if it resists benign transformations, but fails
detection after malignant transformations. Semi-fragile watermarks commonly are used to
detect malignant transformations.
A digital watermark is called robust if it resists a designated class of transformations. Robust
watermarks may be used in copy protection applications to carry copy and no access control
information to form correct order and get the digital water marking
PERCEPTIBILITY
A digital watermark is called imperceptible if the original cover signal and the marked signal
are perceptually indistinguishable.
A digital watermark is called perceptible if its presence in the marked signal is noticeable.
CAPACITY
The length of the embedded message determines two different main classes of digital
watermarking schemes:
Department of Electronics & Communication, NHCE 2011-12
13. 13 DIGITAL WATERMARKING
The message is conceptually zero-bit long and the system is designed in order to detect
the presence or the absence of the watermark in the marked object. This kind of
watermarking scheme is usually referred to as zero-bit or presence watermarking
schemes. Sometimes, this type of watermarking scheme is called 1-bit watermark,
because a 1 denotes the presence (and a 0 the absence) of a watermark.
The message is a n-bit-long stream ( , with )
or and is modulated in the watermark. These kinds of schemes usually
are referred to as multiple-bit watermarking or non-zero-bit watermarking schemes.
EMBEDDING METHOD
A digital watermarking method is referred to as spread-spectrum if the marked signal is
obtained by an additive modification. Spread-spectrum watermarks are known to be modestly
robust, but also to have a low information capacity due to host interference.
A digital watermarking method is said to be of quantization type if the marked signal is
obtained by quantization. Quantization watermarks suffer from low robustness, but have a
high information capacity due to rejection of host interference.
A digital watermarking method is referred to as amplitude modulation if the marked signal is
embedded by additive modification which is similar to spread spectrum method, but is
particularly embedded in the spatial domain.
CHAPTER 4
DIGITAL WATERMARKING TECHNICAL
DETAILS
Department of Electronics & Communication, NHCE 2011-12
14. 14 DIGITAL WATERMARKING
The above block diagram show the digital watermarking of a signal.Digital watermarking
technology makes use of the fact that the human eye has only a limited ability to observe
differences. Minor modifications in the colour values of an image are subconsciously corrected
by the eye, so that the observer does not notice any difference.
While vendors of digital watermarking schemes do not publicly release
the exact methods used to create their watermarks, they do admit to using the following basic
procedure
A secret key (string or integer) produces a random number which
determines the particular pixels, which will be protected by the watermarking. The watermark is
embedded redundantly over the whole image, so that every part of the image is protected.
One way of doing this is by “Patchwork”. This technique uses a random number generator to
select n pairs of pixels and slightly increases or decrease their luminosity (brightness level).
Thus the contrast of this set is increased without any change in the average luminosity of the
image. With suitable parameters, Patchwork even survives compression using JPEG.
Although the amount of secret information has no direct impact on the visual fidelity of the
image or the robustness of the watermark, it plays an important role in the security of the
system. The key space, that is the range of all possible values of the secret information, x
must be large enough to make exhaustive search attacks impossible.
In the process of extracting the watermark, the secret key is used to identify the manipulated
pixels and finally to decode the watermark.
The quality of digital watermarks can be judged in two ways; firstly it must be able to resist
intentional and unintentional attacks and secondly the embedded watermark must not detract
from the quality of the image.
Department of Electronics & Communication, NHCE 2011-12
15. 15 DIGITAL WATERMARKING
The higher the resistance of a watermark against attacks, the higher the risk of the quality of
the image being reduced, and the greater the chance of obvious visual artefacts being created.
Every watermarking system consists at least of two different parts: watermark embedding
unit and watermark detection and extraction unit.The above figure shows an example of
embedding unit for still images. The unmarked image is passed through a perceptual analysis
block that determines how much a certain pixel can be altered so that the resulting
watermarked image is indistinguishable from the original. This takes into account the human
eye sensitivity to changes in flat areas and its relatively high tolerance to small changes in
edges. After this so-called perceptual-mask has been computed, the information to be hidden
isshaped by this mask and spread all over the original image. This spreading technique is
similar to the interleaving used in other applications involving coding, such as compact disc
storage, to prevent damage of the information caused by scratches or dust. In our case, the
main reason for this spreading is to ensure that the hidden information survives
croppingof the image. Moreover, the way this spreading is performed depends on the secret
key, so it is difficult to recover the hidden information if one is not in possession of this key. In fact,
a similar technique is used in spread spectrum systems (more precisely, in Code-Division Multiple
Access) to extract the desired information from noise or other users. Additional key-dependent
uncertainty can be introduced in pixel amplitudes (recall that the perceptual mask imposes only an
upper limit). Finally, watermark is added to the original image.
Department of Electronics & Communication, NHCE 2011-12
16. 16 DIGITAL WATERMARKING
The above figure shows the typical configuration of a watermark detection and extraction
unit. Watermarkdetection involves deciding whether a certainimage has been watermarked
with a given key.Note then that a watermark detector produces abinary output. Important
considerations here arethe probability of correct detection PD (i.e., theprobability of correctly
deciding that a watermarkis present) and the probability of false alarm PF(i.e., the probability
of incorrectly deciding that animage has been watermarked with a certain key).
These two measures allow us to compare different watermarking schemes: One method will
be superior if achieves a higher PD for a fixed PF .Note also that for a watermarking
algorithm to be useful it must work with extremely low probabilities of false alarm.
Watermark detection is usually done by correlating the watermarked image with a locally
generated version of the watermark at the receiver side. This correlation yields a high value
when the watermark has been obtained with the proper key. As we have shown, it is possible
to improve the performance of the detector by eliminating original image-induced noise
with signal processing. It is worthy of remark that some authors propose using the original
image in the detection process. Although this simplifies further treatment of the watermark in
the reeiverend, it is quite unrealistic for most applications,particularly those related to E-
commerce.
Once the presence of the watermark has been correctly detected, it is possible to extract the
hidden information. The procedure is also generally done by means of a cross-correlation but
in this case, an independent decision has to be taken for
every information bit with a sign slicer. In fact, wehave also shown that this correlation
structure has not been well-founded and significant improvements are achievable when image
statistics are available. For instance, the widely-used DCT coefficients used in the JPEG and
MPEG-2 standards are well approximated by generalized gaussian probabilitydensity
functions that yield a considerably different extraction scheme. Obviously, when extracting
the information the most adequate parameter for comparison purposes is the probability of
bit error Pb, identical to that used in digital communications. This is not surprising because
watermarking creates a hidden (sometimes called steganographic)
channel on which information is conveyed.
Department of Electronics & Communication, NHCE 2011-12
17. 17 DIGITAL WATERMARKING
CHAPTER 5
WATERMARKING AS COMMUNICATION
It is quite common and popular to adapt techniques from standard
communication theory to study and improve watermarking algorithms using models similar
to the ones shown in Figure,below.And it shows how the information bits are first encoded
(to suit the modulation type, error control etc.) followed by modulating a carrier signal that
carries this information across a noisy channel. At the decoder side, this carrier is
demodulated and then the information (possibly corrupted due to channel noise) is decoded.
In a digital watermarking system the modulator is replaced by the watermark embedder that
places the watermark in the media content. Distortions to the watermarked media is induced
by known or unknown attacks or signal processing operations such as compression,
decompression, cropping, scaling etc. The embedded watermark is finally retrieved by the
watermarked decoder or detector. One major difference between the two models can be seen
in the encoder side. While, in communication systems, the encoding is done in order to
protect the information bits from channel distortion, in watermarking, emphasis is usually
placed on techniques that minimize perceptual distortions to the watermarked content. Some
analogies between the traditional communication system and the watermarking system are
summarized.
COMMUNICATION SYSTEM WATERMARKING SYSTEM
Information Watermark
Communication channel Host signal(such as image,video etc.)
Power constraint on transmitted signal due to Power constraint on watermark due to
physical limitations audio/visual quality limitations
Interference Host signal and watermark attacks
Department of Electronics & Communication, NHCE 2011-12
18. 18 DIGITAL WATERMARKING
Side information at transmitter and/or receiver Knowledge of host signal,watermarking
parameters such as key etc.at the encoder
and/or decoder.
Channel capacity Watermarking capacity
Department of Electronics & Communication, NHCE 2011-12
19. 19 DIGITAL WATERMARKING
CHAPTER 6
DIGITAL WATERMARKING METHODS
IMAGE
These are some of the methods that can be used to test whether a watermark can survive
different changes to the image it is embedded in.
Compare this Original Image with the attacked images below, and see if you can spot any
changes in quality.
HORIZONTAL FLIPPING
Many images can be flipped horizontally without losing quality. Few watermarks survive
flipping, although resilience to flipping is easy to implement.
ROTATION AND CROPPING
A small rotation with cropping doesn‟t reduce image quality, but can make watermarks
undetectable as rotation realigns horizontal features of an image used to check for the
presence of a watermark. The example at left has been rotated 3 degrees to the right, and then
had its edges cropped to make the sides straight again.
JPEG COMPRESSION/RE-COMPRESSION
Department of Electronics & Communication, NHCE 2011-12
20. 20 DIGITAL WATERMARKING
JPEG is a widely used compression algorithms for images and any
watermarking system should be resilient to some degree to compression or change of
compression level e.g. from 71% to 70% in quality like the example at down.
SCALING
Uniform scaling increases/decreases an image by the same % rate in the horizontal and
vertical directions. Non-uniform scaling like the example at left increases/decreases the
image horizontally and vertically at different % rates. Digital watermarking methods are
often resilient only to uniform scaling.
DITHERING
Dithering approximates colours not in the current palette by alternating two available similar
colours from pixel to pixel. If done correctly this method can completely obliterate a
watermark, however it can make an image appear to be “patchy” when the image is over-
dithered (as in the elbow area of the image at left).
MOSAIC
A mosaic attack doesn‟t damage the watermarked image or
make it lose quality in any way, but still enables the image to be viewed in eg: a web browser
by chopping the image into subsections of equal size and putting it back together again.
To the viewer a “mosaic” image appears to look the same as the original but a web crawler
like DigiMarc‟sMarcSpidersees many separate images and doesn‟t detect that these separate
images are parts of a watermarked image.
Department of Electronics & Communication, NHCE 2011-12
21. 21 DIGITAL WATERMARKING
This means that the watermark cannot be detected, as a problem common to all
image watermarking schemes is that they have trouble embedding watermarks into small
images, (less than 256 pixels in height or width).
STIRMARK
StirMarkis the industry standard software used by researchers to automatically attempt to
remove watermarks created by Digimarc, SysCoP, JK_PGS,Signum Technologies and
EIKONAmark.
Stirmark attacks a given watermarked image using all the techniques mentioned in this report
as well as more esoteric techniques such as low pass filtering, gamma correction,
sharpening/unsharpening etc.
AUDIO
th
The most common method of watermarking audio is to mark every x bit in an audio file
depending on the random generator seed calculated from the watermarking key applied to the
audio.
These are some of the ways watermarks can be removed from audio files.
MPEG1 LAYER III (MP3) AUDIO COMPRESSION
A digital audio compression algorithm that achieves a compression factor of about twelve
while preserving sound quality. What this lossy compression does is remove the frequencies
not heard by the human ear from the audio. If a raw audio file is converted to MP3 at a bit-
rate of 128kbps than roughly 90% of the frequencies are removed. This means that a search
for the watermark needs to find an unaltered length of samples that contains at least 2
watermarked bits to prove the watermarks existence.
AUDIO RESTORATION PROGRAMS
Audio restoration programs are designed to remove hisses, crackles and pops from audio
recordings. They do this by searching through the wavelength, removing samples that don‟t
“fit in” amongst neighbouring samples, and replacing them with an average of the two
neighbour samples. Although the removal of digital watermarks is obviously not a purpose of
these programs, they work remarkably well at doing so as the sample bits inserted to
watermark the audio don‟t fit in with their surrounding pixels, and are therefore removed.
Department of Electronics & Communication, NHCE 2011-12
22. 22 DIGITAL WATERMARKING
ECHO HIDING REMOVAL
Echo hiding relies on the fact that we cannot perceive short echoes,
eg: 1 millisecond(ms) and embeds data into a cover audio signal by introducing an echo
characterised by its delay and its relative amplitude compared to surrounding samples. The
echo delays are chosen between 0.5 ms and 2 ms and the best relative amplitude of the echo
is around 0.8 ms.
However specialised software which looks for echoes with a length between 0.5 ms and 2 ms
(as seen below), can be used to detect and remove these echoes without effecting sound
quality.
JITTER
The simplest and most effective attack on any audio watermarking scheme is to add jitter to
the signal. In our first implementation, we split the signal into chunks of 500 samples, either
duplicated or deleted a sample at random in each chunk (resulting in chunks of 499 or 501
samples long) and stuck the chunks back together. This turned out to be almost imperceptible
after altering, even in classical music; but the jitter prevents the marked bits from being
located”, and therefore the watermark is obliterated.
In his paper titled “Audio watermarking: Features, Applications and Algorithms“, Michael
Arnold agrees with the Cambridge team stating that
“one of the greatest challenges [of watermarking] is the robustness against the so-called jitter
attack”.
VIDEO
At present there is no known method to remove a digital watermark from a stream of video.
This is probably because those who trade in pirated video, (especially in DivX format), store
their pirated movies locally on their hard disk drives or on CD-R disks where they cannot be
checked for watermarks by anyone.
CHAPTER 7
Department of Electronics & Communication, NHCE 2011-12
23. 23 DIGITAL WATERMARKING
DISTORTION AND ATTACKS
In practice, a watermarked object may be altered either on purpose or accidentally, so the
watermarking system should still be able to detect and extract the watermark. Obviously, the
distorsions are limited to those that do not produce excessive degradations, since otherwise
the transformed object would be unusable. These distorsions also introduce a degradation on
the performance of the system as measured by the probabilities defined in the previous
section (i.e., PD and Pbwould decrease for a fixed PF). For intentional attacks, the goal of the
attacker is to maximize the reduction in these probabilities while minimizing the impact
that his/her transformation produces on the object; this has to be done without knowing the
value of the secret key used in the watermarking insertion process, which is where all the
security of the algorithm lies.
Next, we introduce some of the best known attacks. Some of them may be intentional or
unintentional, depending on the application:
Additive Noise. This may stem in certain applications from the use of D/A and A/D
converters or from transmission errors. However, an attacker may introduce perceptually
shaped noise (thus, imperceptible) with the maximum unnoticeable power. This will typically
force to increase the threshold at which the correlation detector works.
Filtering. Low-pass filtering, for instance, does not introduce considerable degradation in
watermarked images or audio, but can dramatically affect the performance, since spread-
spectrum-likewatermarks have a non negligible high-frequencyspectral contents.
Cropping. This is a very common attack since in many cases the attacker is interested in a small
portion of the watermarked object, such as parts of a certain picture or frames of a video sequence.
With this in mind, in order to survive, the watermark needs to be spread over the dimensions
where this attack takes place.
Compression. This is generally an unintentional attack which appears very often in multimedia
applications. Practically all the audio, video and images that are currently being distributed via
Internet have been compressed. If the watermark is required to resist different levels of compression,
it is usually advisable to perform the watermark insertion task in the same domain where
the compression takes place. For instance, DCT domain image watermarking is more robust to JPEG
compression than spatial-domain watermarking.
Rotation and Scaling. This has been the true battle horse of digital watermarking, especially because
of its success with still images. Correlation based detection and extraction fail when rotation or
scaling are performed on the watermarked image because the embedded watermark and the locally
generated version do not share the same spatial pattern anymore. Obviously, it would be possible to
do exhaustive search on different rotation angles and scaling factors until a correlation peak
is found, but this is prohibitively complex. Note that estimating the two parameters becomes simple
when the original image is present, but we have argumented against this possibility in previous
sections. The authors have shown that although the problem resembles synchronization for
digital communications, the techniques applied there fail loudly. Some authors have recently proposed
the use of rotation and scaling-invariant transforms (such as the Fourier-Mellin ) but this dramatically
reduces the capacity for message hiding. In any case, publicly available programs like Strirmark
break the uniform axes transformation by creating an imperceptible non-linear resampling of the
image that renders invariant transforms unusable. In audio watermarking it is also quite simple to
perform a non-linear transformation of the time axis that considerably difficults watermark detection.
Statistical Averaging. An attacker may try to estimate the watermark and then „unwatermark‟
Department of Electronics & Communication, NHCE 2011-12
24. 24 DIGITAL WATERMARKING
the object by substracting the estimate. This is dangerous if the watermark does not depend
substantially on the data. Note that with different watermarked objects it would be possible to
improve the estimate by simple averaging. This is a good reason for using perceptual masks to create
the watermark.
Multiple Watermarking. An attacker may watermark an already watermarked object and later
make claims of ownership. The easiest solution is to timestamp the hidden information by a
certification authority.
Attacks at Other Levels. There are a number of attacks that are directed to the way the watermark
is manipulated. For instance, it is possible to circumvent copy control mechanisms discussed
below by super scrambling data so that the watermark is lost or to deceive web crawlers searching
for certain watermarks by creating a presentation layer that alters they way data are ordered.
The latter is sometimes called „mosaic attack‟ .
CHAPTER 8
Department of Electronics & Communication, NHCE 2011-12
25. 25 DIGITAL WATERMARKING
APPLICATION OF DIGITAL WATERMARKING
VideoWatermarking. In this case, most considerations made in previous sections hold.
However,now the temporal axis can be exploited to increase the redundancy of the
watermark. As in the still images case, watermarks can be created either in the spatial or in
the DCT domains. In the latter, the results can be directly extrapolated to MPEG-2 sequences,
although different actions must be taken for I, P and B frames. Note that perhaps the set of
attacks that can be performed intentionally is not smaller but definitely more expensive than
for still images.
Audio Watermarking. Again, previous considerations are valid. In this case, time and
frequencymasking properties of the human ear are used to conceal the watermark and make it
inaudible. The greatest difficulty lies in synchronizing the watermark and the watermarked
audio file, buttechniques that overcome this problem have been proposed.
Hardware/Software Watermarking. This is a good paradigm that allows us to understand
how almost every kind of data can be copyright protected. If one is able to find two different
waysof expressing the same information, then one bit of information can be concealed,
something thatcan be easily generalized to any number of bits. This is why it is generally said
that a perfect compression scheme does not leave room for watermarking. In the hardware
context, Boolean equivalences can be exploited to yield instances that use different types of
gates and that can be addressed by the hidden information bits. Software can be also protected
not only by finding equivalences between instructions, variable names, or memory addresses,
but also by altering the order of non-critical instructions. All this can be accomplished at
compiler level.
Text Watermarking. This problem, which in fact was one of the first that was studied within
the information hiding area can be solved at two levels. At the printout level, information can
be encodedin the way the textlines or words are separated (this facilitates the survival of the
watermarkeven to photocopying). At the semantic level (necessary when raw text files are
provided), equivalences between words or expressions can be used, although special care has
to be taken not to destruct the possible intention of the author.
Executable Watermarks. Once the hidden channel has been created it is possible to include
even executable contents, provided that the corresponding applet is running on the end user
side.
Labeling. The hidden message could also contain labels that allow for example to annotate
imagesor audio. Of course, the annotation may also been included in a separate file, but with
watermarkingit results more difficult to destroy or loosethis label, since it becomes closely
tied to the objectthat annotates. This is especially useful inmedical applications since it
prevents dangerous errors.
Fingerprinting. This is similar to the previous application and allows acquisition
devices(such as video cameras, audio recorders, etc) to insert information about the specific
device (e.g., an ID number) and date of creation. This can also be done with conventional
Department of Electronics & Communication, NHCE 2011-12
26. 26 DIGITAL WATERMARKING
digital signature techniquesbut with watermarking it becomes considerably more difficult to
excise or alter the signature.Some digital cameras already include this feature.
Authentication. This is a variant of the previous application, in an area where
cryptographictechniques have already made their way. However, there are two significant
benefits that arisefrom using watermarking: first, as in the previous case, the signature
becomes embedded in the message, second, it is possible to create „soft authentication‟
algorithms that offer a multivalued „perceptual closeness‟ measure that accounts for different
unintentional transformations that the datamay have suffered (an example is image
compression with different levels), instead of the classicalyes/no answer given by
cryptography-based authentication.Unfortunately, the major drawbackof watermarking-based
authentication is the lack of public key algorithms that force either to putsecret keys in risk or
to resort to trusted parties.
Copy and Playback Control. The message carried by the watermark may also contain
informationregarding copy and display permissions.Then, a secure module can be added in
copy or playback equipment to automatically extract this permission information and block
further processing if required. In order to be effective, this protection approach requires
agreements between contentproviders and consumer electronics manufacturers to introduce
compliant watermark detectorsin their video players and recorders. This approach is being
taken in Digital Video Disc (DVD).
Signalling. The imperceptibility constraint is helpful when transmitting signalling
informationin the hidden channel. The advantage of using this channel is that no bandwidth
increase is required.An interesting application in broadcasting
copyright protection of digital media. In the past duplicating art work was quite
complicated and required a high level of expertise for the counterfeit to look like the
original. However, in the digital world this is not true. Now it is possible for almost
anyone to duplicate or manipulate digital data and not lose data quality. Similar to the
process when artists creatively signed their paintings with a brush to claim copyrights,
artists of today can watermark their work by hiding their name within the image.
Hence, the embedded watermark permits identification of the owner of the work. It is
clear that this concept is also applicable to other media such as digital video and
audio. Currently the unauthorized distribution of digital audio over the Internet in the
MP3 format is a big problem. In this scenario digital watermarking may be useful to
set up controlled audio distribution and to provide efficient means for copyright
protection, usually in collaboration with international registration bodies.
Are there any other applications where digital watermarking may
be used?
There are a number of possible applications for digital watermarking technologies and this
number is increasing rapidly.
In the field of data security, watermarks may be used for certification, authentication,
and conditional access. Certification is an important issue for official documents, such
as identity cards or passports.
Department of Electronics & Communication, NHCE 2011-12
27. 27 DIGITAL WATERMARKING
Example on the left of a protected identity card. The identity number "123456789" is written
in clear text on the card and hidden as a digital watermark in the identity photo. Therefore
switching or manipulating the identity photo will be detected
Digital watermarking permits linking information on documents.
That means that key information is written twice on the document. For instance, the name of
a passport owner is normally printed in clear text. But it would also be hidden as an invisible
watermark in the passport photo. If anyone tries to tamper with the passport by replacing the
photo it would be possible to detect the change by scanning the passport and verifying the
name hidden in the photo.
The picture shows a printing machine from Intercard for various types of plastic cards
(Courtesy of Intercard, Switzerland).
TAMPERING WITH IMAGES:
Another application is the authentication of image content. The goal of this application is to
detect any alterations and modifications in an image.
The three pictures below illustrate this application. The picture on the left shows an original
photo of a car that has been protected with a watermarking technology. In the center, the
same picture is shown but with a small modification: the numbers on the license plate have
been changed. The picture on the right shows the photo after running the digital watermark
detection program on the tampered photo. The tampered areas are indicated in white. We
can clearly see that the detected area corresponds to the modifications applied to the
original photo.
Using digital watermarks for integrity verification: the protected image is the image (a)
above; a modified image is obtained by swapping the numbers 9 and 4 of the number plate
(b); digital watermarking technology allows detecting and highlights the modified areas, as
shown on (c).
Department of Electronics & Communication, NHCE 2011-12
28. 28 DIGITAL WATERMARKING
Invisible marking on blank paper:Digital watermarks can also be adapted to mark white
paper with the goal of authenticating the originator, verify the authenticity of the
document content, or to date the document. Such applications are especially of interest
for official documents, such as contracts. For example, the digital watermark can be
used to embed the name of the lawyer or important information such as key monetary
amounts. In the event of a dispute, the digital watermark is then read allowing
authentication of key information in the contract. AlpVision developed genuine process
to invisibly mark white blank paper with normal and visible ink. This patented
technology is now known as Cryptoglyph.The image on the down shows blank paper
marked by the invisible digital watermark using standard visible ink, with the
Cryptoglyph technology.
Digital Media Management: Beside applications in the fields of copyright protection,
authentication and security, digital watermarks can also serve as invisible labels and
content links. For example, photo development laboratories may insert a watermark
into the picture to link the print to its negative. This way is very simple to find the
negative for a given print. All one has to do is scan the print and extracted the
information about the negative. In a completely different scenario digital watermarks
may be used as a geometrical reference which may be useful for programs such as
optical character recognition (OCR) software. The embedded calibration watermark
may improve the detection reliability of the OCR software since it allows the
determination of translation, rotation, and scaling.
CONCLUSION
Department of Electronics & Communication, NHCE 2011-12
29. 29 DIGITAL WATERMARKING
Digital watermarking is a rapidly evolving area of research and development.An exhaustive
list of digital watermarking applications is of course impossible. However, it is interesting to
note the increasing interest in fragile watermarking technologies. Especially promising are
applications related to copy protection of printed media. Examples here include the protection
of bills with digital watermarks. Various companies have projects in this direction and it is
very likely that fully functioning solutions will soon be available.One key problem that we
still face today is the development of truly robust, transparent and secure
watermarking technique for different digital media including images, video and audio.
Another key problem is the development of semi-fragile authentication techniques. The
solution to these problem will require application of known results and development of new
results in the fields of information and coding theory, adaptive signal processing, game
theory, statistical decision theory, and cryptography.
REFERENCES
Department of Electronics & Communication, NHCE 2011-12
30. 30 DIGITAL WATERMARKING
http://www.10gea.org
http://standards.ieee.org/resources/glance.html
IEEE
Digital watermarking,Rchandramauli,NasirMemon
Wikipedia
Department of Electronics & Communication, NHCE 2011-12