SlideShare uma empresa Scribd logo
1 de 57
DR. TAMARA CHER R. MERCADO University of Southeastern Philippines Institute of Computing  《 Lesson 1 and 2 》
2 Outline Chapter I: Introduction to digital watermarking History and interesting facts Definitions, models, and importance Applications of digital watermarking Properties of digital watermarking Chapter 2: Applications and Properties Digital Wartermarking
3 What is a Watermark? Watermarking is an important mechanism applied to physical objects like bills, papers, garment labels, product packing… Physical objects can be watermarked using special dyes and inks or during paper manufacturing.   Digital Wartermarking
Paper Watermark the technique of impressing into the paper a form, image, or text to make forgery more difficult to record the manufacturer’s trademark What is a Watermark?
5 Characteristics of Watermarks  The watermark is hidden from view during normal use, only become visible by adopting a special viewing process. E.g. hold the bill up to light The watermark carries information about the object in which it is hidden. E.g. the authenticity of the bill E.g. the trademark of the paper manufacturer Digital Wartermarking
Digital Wartermarking 6 History of watermarking (I) The term “watermark” was probably originated from the German term “wassermarke”. Since watermark is of no importance in the creation of the mark, the name is probably given because the marks resemble the effects of water on paper. Papers are invented in China over a thousand years ago. However, the first paper watermark did not appear until 1282, in Italy.
Digital Wartermarking 7 History of watermarking (II) By the 18th century, watermarks on paper in Europe and America had been used as trademarks, to record the manufactured date, or to indicate the size of original sheets. Watermarks are commonly used on bills nowadays to avoid counterfeiting
Digital Wartermarking 8 What is digital watermarking? Watermarking can also be applied to digital signals! Video Images Audio
Digital Wartermarking 9 What is digital watermarking? Digital watermarking: The practice of imperceptually alternating a Work to embed a message about the Work. Related terms Work: a specific copy of some electronic signal, such as a song, a video sequence, or a picture Cover Work: the original un-watermarked work, since it covers (hides) the watermark Watermark: the messages being embedded, indicating some information about the work
Digital Wartermarking 10 A Digital Watermarking System Recording, transmissions,  or processing Cover Work Watermark Embedder Watermark Detector Detected Watermark Message Watermarked Work Watermark Message
Example Digital Wartermarking 11
Types of Watermark Visible A visible translucent image which is overlaid on the primary image  Invisible or Imperceptible An overlaid image which cannot be seen, but which can be detected algorithmically  Digital Wartermarking 12
Visible Watermark (I) Logo or seal of the organization which holds the rights to the primary image, it allows the primary image to be viewed, but still marks it clearly as the property of the owning organization.  Overlay the watermark in a way which makes it difficult to remove, if the goal of indicating property rights is to be achieved.  Digital Wartermarking 13
Visible Watermark (II) Digital Wartermarking 14
Invisible Watermark (I) Embedding level is too small to notice Can be retrieved by extraction software Applications: Authentication Copyrighting … Digital Wartermarking 15
Invisible Watermark (II) Digital Wartermarking 16
Example Original Watermarked Digital Wartermarking 17
Digital Wartermarking 18 IPR-related Information Technologies
Digital Wartermarking 19 Information Hiding Data hiding Containing a large range of problem beyond that of embedding message in content Making the information imperceptible  E.g. watermarking  Keeping the existence of information secret E.g. anonymous usage of network E.g. hiding portions of database for non-privileged users
Digital Wartermarking 20 Steganography A term derived from the Greek words “steganos” and “graphia” (The two words mean “covered” and “writing”, respectively) The art of concealed communication. The very existence of a message is kept secret. E.g. a story from Herodotus Military Messages tatooed on the scalp of a slave
Digital Wartermarking 21 Watermarking v.s. Steganography Watermark messages contain information related  the cover work In steganographic systems,  the very existence of the message is kept secret. If the message tatooed on the slave is “the slave belongs to somebody”, then we can regard it as an example of watermarking
Digital Wartermarking 22   Cover Work Dependent Message Cover Work Independent Message Existence Hidden Steganographic Watermarking Covert Communication Existence Known Non-Steganographic Watermarking Overt Embedded Communication Classification of Information Hiding Systems
Digital Wartermarking 23 Importance of Digital Watermarking The sudden increase in watermarking interest is most likely due to the increase in concern over copyright protection of content copyright-protected digital contents are easily recorded and distributed due to:  the explosive growth in using Internet prevalence of high-capacity digital recording devices
Digital Wartermarking 24 Watermarking v.s. Cryptography Cryptography is the most common method of protecting digital content and is one of the best developed science. However, encryption cannot help the seller monitor how a legitimate customer handles the content after decryption.  Digital watermarking can protect content even after it is decrypted. ? Encryption Decryption Under Protection
Digital Wartermarking 25 History of digital watermarking  The first watermarking example similar to the digital methods nowadays appeared in 1954. The Muzak Corporation filed a patent for “watermarking” musical Work. An identification Work was inserted in music by intermittently applying a narrow notch filter centered at 1KHz. About 1995, interest in digital watermarking began to mushroom.
Digital Wartermarking 26 Watermarking and Other IPR Techniques Watermarks are imperceptible Watermarks are inseparable from the works in which they are embedded  Watermarks undergo the same transformations as the work
Digital Wartermarking 27 Applications of Digital Watermarking Owner identification Proof of ownership Broadcast monitoring Transaction tracking Content authentication Copy control Device control
Digital Wartermarking 28 1. Owner Identification (I) Under the U.S. law, although the copyright notice is not required in every distributed copy to protect the rights of copyright holders, the award to the copyright holders whose work is misused will be significantly limited without a copyright notice found on the distributed materials. Traditional textual copyright notices “Copyright date owner”  “© date owner” “Copr. date owner” Note that using “(C)” instead of “©” does not serve the same legal purpose.  For sound recordings “℗ date owner”  Must be placed on the surface of the physical media, the label, or on the packaging so as to “give reasonable notice of the claim of copyright”
Digital Wartermarking 29 1. Owner Identification (II) Disadvantages fortextual copyright notices Easily removed from a document when it is copied E.g. the Lena Sjooblom picture (see the next slide) Copyright notices printed on the physical medium are not copied along with the digital content  E.g. the Music CD Occupying a portion of the image and aesthetically reducing the value of artworks  Since watermarks are imperceptible and inseparable from the work, they are obviously superior to textual copyright notices.
Digital Wartermarking 30 The Lena Phenomenon Lena is the most common test image in image processing research! The copyright notice of this picture was cropped and ignored.
Digital Wartermarking 31 2. Proof of Ownership Textual copyright notices cannot be used to solve the copyright dispute since they can be easily forged Registering every work to a central repository is too costly! http://www.loc.gov/copyright $30 per document Watermarking can be of use!
Digital Wartermarking 32 3. Broadcast monitoring (I) TV or radio advertisements should be monitored to prevent airtime overbooking! In 1997, a scandal broke out in Japan. Advertisers are paying for thousands of commercials that were never aired! Broadcast monitoring By human watchers  Passive monitoring Active monitoring
Digital Wartermarking 33 3. Broadcast monitoring (II) Passive monitoring Use computers to monitor received signal and compares with a database of known contents Disadvantages Comparing is not trivial Signal degraded due to broadcasting   Management and maintenance of the database is quite expensive
Digital Wartermarking 34 3. Broadcast monitoring (III) Active monitoring Simpler to implement Identification information can be directly decoded reliably  Watermarking is an obvious alternative method of hiding identification information  Existing within the content Completely compatible with the equipments
Digital Wartermarking 35 4. Transaction tracking Watermarks recording the recipient in each legal sale or distribution of the work. If the work is misused (leaked to the press or illegally distributed), the owner could find out who is the traitor. Visible watermarking is often adopted in this application, but Invisible watermark is even better
Digital Wartermarking 36 The defunct DiVX DVD Player The DIVX Corporation sold a enhanced DVD player that implements a pay-per-view model. Each player will place a unique watermark in the video disk it played. Once the video disk is recorded and sold, the adversary can be tracked!
5. Content Authentication (I) ,[object Object],Original Image Tampered Image Digital Wartermarking 37
5. Content Authentication (II) One solution is the creation of a digital signature i.e. store metadata in a JPEG header field. If someone subsequently compares the modified image against the original signature and will find that the signatures do not match then he will know that the image has been modified. However, signature is lost when image is converted to a different format. Use watermark to embed signatures directly into the Work Used by Epson. Authentication marks are embedded in the image and becomes invalid after even the slightest modification of aWork are called fragile watermarks.
Digital Wartermarking 39 6. Copy control (I) Encryption is the first and strongest line of defense against illegal copying Overcome an encryption mechanism Decrypt a copy without a valid key Theoretically infeasible for a well designed system Obtain a valid key Reverse-engineering hardware or software  Legally obtain a key and pirate the decrypted content The central weakness of cryptographic protection! The content must be decrypted before it is used, but  all protection is lost once decrypted!
Digital Wartermarking 40 6. Copy control (II) Watermarking in copy control  Combining every content recorder with a watermark detector When a copy-prohibit watermark is detected, the recording device  will refuse to copy   The system has been envisioned by CPTWG and SDMI to protect DVD and audio
Digital Wartermarking 41 6. Copy control (III) Problems of adopting watermarking module in recording devices Increasing cost  Reducing the value of devices Solution Include the requirement for a watermark detector  in the patent license instead of enforcing by law.
Digital Wartermarking 42 Keep Honest People Honest  Playback control by encryption Copy control  by watermarking Legal, encrypted copy Compliant player Compliant recorder Non-Compliant recorder Non-Compliant player Illegal, decrypted copy
Digital Wartermarking 43 7. Device Control Copy control belongs to a broader category - device control Example Automatically turning on/off functions related to special contents E.g Including watermark to skip advertisements
Digital Wartermarking 44 Properties of Digital Watermarking Properties typically associated with a watermark embedding process: Embedding effectiveness Fidelity (perceptual similarity) Data payload (capacity) Properties associated with detection Blind and informed detection, False positive behavior Robustness Security
Digital Wartermarking 45 Embedding Effectiveness Effectiveness of a watermarking system The probability of detection after embedding  A 100% effectiveness is desirable, but it is often not the case due to other conflict requirements, such as perceptual similarity
Digital Wartermarking 46 Fidelity (Perceptual Similarity) The fidelity of the watermarking system The perceptual similarity between the original and the watermarked version of the cover work It is the similarity at the point at which the watermarked content is provided to  the customer that counts
Digital Wartermarking 47 Data Payload The number of bits a watermarking scheme encodes within a unit of time or  within a work. Different applications require different data capacities, e.g.   4-8 bits for a 5-minutes video of copy control  Longer messages for broadcast monitoring
Digital Wartermarking 48 Blind/Informed Detection Informed watermarking schemes  The detector requires access to the un-watermarked original E.g. transaction tracking,  Blind watermarking schemes Detectors do not require any information related to the original E.g.DVD copy control module
Digital Wartermarking 49 False Positive Behavior Detection of watermark in  a work that do not actually contain one The number of false positives occur in a given number of runs of watermark detector The false alarm rate of the watermarking system used in DVD recorder should be lower than 1/1012
Digital Wartermarking 50 Robustness (I) The ability to detect the watermark after common signal processing operations Common images distortions spatial filtering, lossy compression, printing/scanning, geometric distortions Common video distortions Changes in frame rate, recording to tape… Common audio distortions  temporal filtering, recording on audio tape…
Digital Wartermarking 51 Robustness (II) Not all watermarking applications require robustness to all possible signal processing operations. There is a  special class of watermarking techniques where robustness is undesirable  The fragile watermarking
Digital Wartermarking 52 Security The ability to resist hostile attacks Unauthorized removal Eliminating attacks Masking attacks Collusion attacks Unauthorized embedding Embed forgery watermarks into works that should not contain watermarks  E.g. fragile watermarks for Authentication  Unauthorized detection
Digital Wartermarking 53 Multiple Watermarks In certain cases, more than one watermarks are needed. E.g. American copyright grants the right of TV viewers to make a single copy of broadcast programs for time-shift watch. But further copies is not allowed . Adding two watermarks instead of alternating the original watermark to avoid the risk caused by easily changing watermarks
Digital Wartermarking 54 Cost The costs in deploying watermark embedders and detectors depends on the scenario and the business model. Real-time constraint Broadcast monitoring v.s. proof of copyright Embedder/detector constraint Copy protection v.s. transaction tracking (DIV-X)
Digital Wartermarking 55 Watermarking Techniques in Current Standards The CPTWG (Copy Protection Technical Working Group) tested watermarking systems for protection of video on DVD disks. The SDMI (Secure Digital Music Initiative) made watermarking a core component in their system for music protection. Two projects sponsored by the European Union, VIVA and Talisman, tested watermarking for broadcast monitoring. The ISO (International Organization for Standardization) took an interest in the context of designing advanced MPEG standards. (MPEG-21)
Digital Wartermarking 56 Companies with Watermarking Products Digimarc bundled its watermarking system with Adobe’s Photoshop Technology from the Verance Corporation was adopted into the first phase of SDMI and used by some Internet music distributors
Digital Wartermarking 57 Assignment #1 Due November 22, 2010 Short report on Guide to the SDMI Portable Device Specification Part 1, Version 1.0 Provides an overview of the contents and benefits of the SDMI Portable Device Specification Part 1, Version 1.0

Mais conteúdo relacionado

Mais procurados

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingGovind Raj
 
Watermark
WatermarkWatermark
Watermarkravi33s
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detectionncct
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology vijay rastogi
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesPrashant Singh
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 
Steganography
SteganographySteganography
Steganographysandeipz
 

Mais procurados (20)

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Watermark
WatermarkWatermark
Watermark
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital water marking
Digital water markingDigital water marking
Digital water marking
 
Steganography
SteganographySteganography
Steganography
 
Watermarking lecture #4
Watermarking lecture #4Watermarking lecture #4
Watermarking lecture #4
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Chapter3
Chapter3Chapter3
Chapter3
 
Steganography
SteganographySteganography
Steganography
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 

Destaque

Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingParag Agarwal
 
Image Based Relational Database Watermarking: A Survey
Image Based Relational Database Watermarking: A SurveyImage Based Relational Database Watermarking: A Survey
Image Based Relational Database Watermarking: A Surveyiosrjce
 
Data Security In Relational Database Management System
Data Security In Relational Database Management SystemData Security In Relational Database Management System
Data Security In Relational Database Management SystemCSCJournals
 
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...CSCJournals
 
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...anjuvipin
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Samarth Godara
 

Destaque (10)

Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Image Based Relational Database Watermarking: A Survey
Image Based Relational Database Watermarking: A SurveyImage Based Relational Database Watermarking: A Survey
Image Based Relational Database Watermarking: A Survey
 
Data Security In Relational Database Management System
Data Security In Relational Database Management SystemData Security In Relational Database Management System
Data Security In Relational Database Management System
 
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...A New Watermarking Approach Based on Combination of Reversible Watermarking a...
A New Watermarking Approach Based on Combination of Reversible Watermarking a...
 
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
ROBUST LOSSLESS WATERMARKING OF RELATIONAL DATABASES USING MULTIMEDIA DATA_An...
 
Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
 
Ppt
PptPpt
Ppt
 
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
Paper Explaination : A Survey of Digital Watermarking Techniques, Application...
 
Robust watermarking technique sppt
Robust watermarking technique spptRobust watermarking technique sppt
Robust watermarking technique sppt
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Semelhante a Chapter1 2

A108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxA108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxVaibhavKale80
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewEditor IJCATR
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar10e11a0545
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyAlexander Decker
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsYogeshIJTSRD
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000authority12
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYIRJET Journal
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingCSCJournals
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueIRJET Journal
 
Different kinds of watermarks
Different kinds of watermarksDifferent kinds of watermarks
Different kinds of watermarksDeftPDF
 

Semelhante a Chapter1 2 (20)

Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
A108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptxA108 vaishnavi jumde.pptx
A108 vaishnavi jumde.pptx
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and Applications
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITYDIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
DIGITAL WATERMARKING TECHNOLOGY IN INFORMATION SECURITY
 
50120130406038
5012013040603850120130406038
50120130406038
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
 
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT TechniqueA Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
A Robust and Secured Digital Watermarking Approach Based on SVD, DWT Technique
 
Different kinds of watermarks
Different kinds of watermarksDifferent kinds of watermarks
Different kinds of watermarks
 
Digital Watermarking Report
Digital Watermarking ReportDigital Watermarking Report
Digital Watermarking Report
 

Chapter1 2

  • 1. DR. TAMARA CHER R. MERCADO University of Southeastern Philippines Institute of Computing 《 Lesson 1 and 2 》
  • 2. 2 Outline Chapter I: Introduction to digital watermarking History and interesting facts Definitions, models, and importance Applications of digital watermarking Properties of digital watermarking Chapter 2: Applications and Properties Digital Wartermarking
  • 3. 3 What is a Watermark? Watermarking is an important mechanism applied to physical objects like bills, papers, garment labels, product packing… Physical objects can be watermarked using special dyes and inks or during paper manufacturing. Digital Wartermarking
  • 4. Paper Watermark the technique of impressing into the paper a form, image, or text to make forgery more difficult to record the manufacturer’s trademark What is a Watermark?
  • 5. 5 Characteristics of Watermarks The watermark is hidden from view during normal use, only become visible by adopting a special viewing process. E.g. hold the bill up to light The watermark carries information about the object in which it is hidden. E.g. the authenticity of the bill E.g. the trademark of the paper manufacturer Digital Wartermarking
  • 6. Digital Wartermarking 6 History of watermarking (I) The term “watermark” was probably originated from the German term “wassermarke”. Since watermark is of no importance in the creation of the mark, the name is probably given because the marks resemble the effects of water on paper. Papers are invented in China over a thousand years ago. However, the first paper watermark did not appear until 1282, in Italy.
  • 7. Digital Wartermarking 7 History of watermarking (II) By the 18th century, watermarks on paper in Europe and America had been used as trademarks, to record the manufactured date, or to indicate the size of original sheets. Watermarks are commonly used on bills nowadays to avoid counterfeiting
  • 8. Digital Wartermarking 8 What is digital watermarking? Watermarking can also be applied to digital signals! Video Images Audio
  • 9. Digital Wartermarking 9 What is digital watermarking? Digital watermarking: The practice of imperceptually alternating a Work to embed a message about the Work. Related terms Work: a specific copy of some electronic signal, such as a song, a video sequence, or a picture Cover Work: the original un-watermarked work, since it covers (hides) the watermark Watermark: the messages being embedded, indicating some information about the work
  • 10. Digital Wartermarking 10 A Digital Watermarking System Recording, transmissions, or processing Cover Work Watermark Embedder Watermark Detector Detected Watermark Message Watermarked Work Watermark Message
  • 12. Types of Watermark Visible A visible translucent image which is overlaid on the primary image Invisible or Imperceptible An overlaid image which cannot be seen, but which can be detected algorithmically Digital Wartermarking 12
  • 13. Visible Watermark (I) Logo or seal of the organization which holds the rights to the primary image, it allows the primary image to be viewed, but still marks it clearly as the property of the owning organization. Overlay the watermark in a way which makes it difficult to remove, if the goal of indicating property rights is to be achieved. Digital Wartermarking 13
  • 14. Visible Watermark (II) Digital Wartermarking 14
  • 15. Invisible Watermark (I) Embedding level is too small to notice Can be retrieved by extraction software Applications: Authentication Copyrighting … Digital Wartermarking 15
  • 16. Invisible Watermark (II) Digital Wartermarking 16
  • 17. Example Original Watermarked Digital Wartermarking 17
  • 18. Digital Wartermarking 18 IPR-related Information Technologies
  • 19. Digital Wartermarking 19 Information Hiding Data hiding Containing a large range of problem beyond that of embedding message in content Making the information imperceptible E.g. watermarking Keeping the existence of information secret E.g. anonymous usage of network E.g. hiding portions of database for non-privileged users
  • 20. Digital Wartermarking 20 Steganography A term derived from the Greek words “steganos” and “graphia” (The two words mean “covered” and “writing”, respectively) The art of concealed communication. The very existence of a message is kept secret. E.g. a story from Herodotus Military Messages tatooed on the scalp of a slave
  • 21. Digital Wartermarking 21 Watermarking v.s. Steganography Watermark messages contain information related the cover work In steganographic systems, the very existence of the message is kept secret. If the message tatooed on the slave is “the slave belongs to somebody”, then we can regard it as an example of watermarking
  • 22. Digital Wartermarking 22   Cover Work Dependent Message Cover Work Independent Message Existence Hidden Steganographic Watermarking Covert Communication Existence Known Non-Steganographic Watermarking Overt Embedded Communication Classification of Information Hiding Systems
  • 23. Digital Wartermarking 23 Importance of Digital Watermarking The sudden increase in watermarking interest is most likely due to the increase in concern over copyright protection of content copyright-protected digital contents are easily recorded and distributed due to: the explosive growth in using Internet prevalence of high-capacity digital recording devices
  • 24. Digital Wartermarking 24 Watermarking v.s. Cryptography Cryptography is the most common method of protecting digital content and is one of the best developed science. However, encryption cannot help the seller monitor how a legitimate customer handles the content after decryption. Digital watermarking can protect content even after it is decrypted. ? Encryption Decryption Under Protection
  • 25. Digital Wartermarking 25 History of digital watermarking The first watermarking example similar to the digital methods nowadays appeared in 1954. The Muzak Corporation filed a patent for “watermarking” musical Work. An identification Work was inserted in music by intermittently applying a narrow notch filter centered at 1KHz. About 1995, interest in digital watermarking began to mushroom.
  • 26. Digital Wartermarking 26 Watermarking and Other IPR Techniques Watermarks are imperceptible Watermarks are inseparable from the works in which they are embedded Watermarks undergo the same transformations as the work
  • 27. Digital Wartermarking 27 Applications of Digital Watermarking Owner identification Proof of ownership Broadcast monitoring Transaction tracking Content authentication Copy control Device control
  • 28. Digital Wartermarking 28 1. Owner Identification (I) Under the U.S. law, although the copyright notice is not required in every distributed copy to protect the rights of copyright holders, the award to the copyright holders whose work is misused will be significantly limited without a copyright notice found on the distributed materials. Traditional textual copyright notices “Copyright date owner” “© date owner” “Copr. date owner” Note that using “(C)” instead of “©” does not serve the same legal purpose. For sound recordings “℗ date owner” Must be placed on the surface of the physical media, the label, or on the packaging so as to “give reasonable notice of the claim of copyright”
  • 29. Digital Wartermarking 29 1. Owner Identification (II) Disadvantages fortextual copyright notices Easily removed from a document when it is copied E.g. the Lena Sjooblom picture (see the next slide) Copyright notices printed on the physical medium are not copied along with the digital content E.g. the Music CD Occupying a portion of the image and aesthetically reducing the value of artworks Since watermarks are imperceptible and inseparable from the work, they are obviously superior to textual copyright notices.
  • 30. Digital Wartermarking 30 The Lena Phenomenon Lena is the most common test image in image processing research! The copyright notice of this picture was cropped and ignored.
  • 31. Digital Wartermarking 31 2. Proof of Ownership Textual copyright notices cannot be used to solve the copyright dispute since they can be easily forged Registering every work to a central repository is too costly! http://www.loc.gov/copyright $30 per document Watermarking can be of use!
  • 32. Digital Wartermarking 32 3. Broadcast monitoring (I) TV or radio advertisements should be monitored to prevent airtime overbooking! In 1997, a scandal broke out in Japan. Advertisers are paying for thousands of commercials that were never aired! Broadcast monitoring By human watchers Passive monitoring Active monitoring
  • 33. Digital Wartermarking 33 3. Broadcast monitoring (II) Passive monitoring Use computers to monitor received signal and compares with a database of known contents Disadvantages Comparing is not trivial Signal degraded due to broadcasting Management and maintenance of the database is quite expensive
  • 34. Digital Wartermarking 34 3. Broadcast monitoring (III) Active monitoring Simpler to implement Identification information can be directly decoded reliably Watermarking is an obvious alternative method of hiding identification information Existing within the content Completely compatible with the equipments
  • 35. Digital Wartermarking 35 4. Transaction tracking Watermarks recording the recipient in each legal sale or distribution of the work. If the work is misused (leaked to the press or illegally distributed), the owner could find out who is the traitor. Visible watermarking is often adopted in this application, but Invisible watermark is even better
  • 36. Digital Wartermarking 36 The defunct DiVX DVD Player The DIVX Corporation sold a enhanced DVD player that implements a pay-per-view model. Each player will place a unique watermark in the video disk it played. Once the video disk is recorded and sold, the adversary can be tracked!
  • 37.
  • 38. 5. Content Authentication (II) One solution is the creation of a digital signature i.e. store metadata in a JPEG header field. If someone subsequently compares the modified image against the original signature and will find that the signatures do not match then he will know that the image has been modified. However, signature is lost when image is converted to a different format. Use watermark to embed signatures directly into the Work Used by Epson. Authentication marks are embedded in the image and becomes invalid after even the slightest modification of aWork are called fragile watermarks.
  • 39. Digital Wartermarking 39 6. Copy control (I) Encryption is the first and strongest line of defense against illegal copying Overcome an encryption mechanism Decrypt a copy without a valid key Theoretically infeasible for a well designed system Obtain a valid key Reverse-engineering hardware or software Legally obtain a key and pirate the decrypted content The central weakness of cryptographic protection! The content must be decrypted before it is used, but all protection is lost once decrypted!
  • 40. Digital Wartermarking 40 6. Copy control (II) Watermarking in copy control Combining every content recorder with a watermark detector When a copy-prohibit watermark is detected, the recording device will refuse to copy The system has been envisioned by CPTWG and SDMI to protect DVD and audio
  • 41. Digital Wartermarking 41 6. Copy control (III) Problems of adopting watermarking module in recording devices Increasing cost Reducing the value of devices Solution Include the requirement for a watermark detector in the patent license instead of enforcing by law.
  • 42. Digital Wartermarking 42 Keep Honest People Honest Playback control by encryption Copy control by watermarking Legal, encrypted copy Compliant player Compliant recorder Non-Compliant recorder Non-Compliant player Illegal, decrypted copy
  • 43. Digital Wartermarking 43 7. Device Control Copy control belongs to a broader category - device control Example Automatically turning on/off functions related to special contents E.g Including watermark to skip advertisements
  • 44. Digital Wartermarking 44 Properties of Digital Watermarking Properties typically associated with a watermark embedding process: Embedding effectiveness Fidelity (perceptual similarity) Data payload (capacity) Properties associated with detection Blind and informed detection, False positive behavior Robustness Security
  • 45. Digital Wartermarking 45 Embedding Effectiveness Effectiveness of a watermarking system The probability of detection after embedding A 100% effectiveness is desirable, but it is often not the case due to other conflict requirements, such as perceptual similarity
  • 46. Digital Wartermarking 46 Fidelity (Perceptual Similarity) The fidelity of the watermarking system The perceptual similarity between the original and the watermarked version of the cover work It is the similarity at the point at which the watermarked content is provided to the customer that counts
  • 47. Digital Wartermarking 47 Data Payload The number of bits a watermarking scheme encodes within a unit of time or within a work. Different applications require different data capacities, e.g. 4-8 bits for a 5-minutes video of copy control Longer messages for broadcast monitoring
  • 48. Digital Wartermarking 48 Blind/Informed Detection Informed watermarking schemes The detector requires access to the un-watermarked original E.g. transaction tracking, Blind watermarking schemes Detectors do not require any information related to the original E.g.DVD copy control module
  • 49. Digital Wartermarking 49 False Positive Behavior Detection of watermark in a work that do not actually contain one The number of false positives occur in a given number of runs of watermark detector The false alarm rate of the watermarking system used in DVD recorder should be lower than 1/1012
  • 50. Digital Wartermarking 50 Robustness (I) The ability to detect the watermark after common signal processing operations Common images distortions spatial filtering, lossy compression, printing/scanning, geometric distortions Common video distortions Changes in frame rate, recording to tape… Common audio distortions temporal filtering, recording on audio tape…
  • 51. Digital Wartermarking 51 Robustness (II) Not all watermarking applications require robustness to all possible signal processing operations. There is a special class of watermarking techniques where robustness is undesirable The fragile watermarking
  • 52. Digital Wartermarking 52 Security The ability to resist hostile attacks Unauthorized removal Eliminating attacks Masking attacks Collusion attacks Unauthorized embedding Embed forgery watermarks into works that should not contain watermarks E.g. fragile watermarks for Authentication Unauthorized detection
  • 53. Digital Wartermarking 53 Multiple Watermarks In certain cases, more than one watermarks are needed. E.g. American copyright grants the right of TV viewers to make a single copy of broadcast programs for time-shift watch. But further copies is not allowed . Adding two watermarks instead of alternating the original watermark to avoid the risk caused by easily changing watermarks
  • 54. Digital Wartermarking 54 Cost The costs in deploying watermark embedders and detectors depends on the scenario and the business model. Real-time constraint Broadcast monitoring v.s. proof of copyright Embedder/detector constraint Copy protection v.s. transaction tracking (DIV-X)
  • 55. Digital Wartermarking 55 Watermarking Techniques in Current Standards The CPTWG (Copy Protection Technical Working Group) tested watermarking systems for protection of video on DVD disks. The SDMI (Secure Digital Music Initiative) made watermarking a core component in their system for music protection. Two projects sponsored by the European Union, VIVA and Talisman, tested watermarking for broadcast monitoring. The ISO (International Organization for Standardization) took an interest in the context of designing advanced MPEG standards. (MPEG-21)
  • 56. Digital Wartermarking 56 Companies with Watermarking Products Digimarc bundled its watermarking system with Adobe’s Photoshop Technology from the Verance Corporation was adopted into the first phase of SDMI and used by some Internet music distributors
  • 57. Digital Wartermarking 57 Assignment #1 Due November 22, 2010 Short report on Guide to the SDMI Portable Device Specification Part 1, Version 1.0 Provides an overview of the contents and benefits of the SDMI Portable Device Specification Part 1, Version 1.0