Knowledge

Digital watermarking

Source đź“ť

46:, digital watermarks are often only perceptible under certain conditions, e.g. after using some algorithm. If a digital watermark distorts the carrier signal in a way that it becomes easily perceivable, it may be considered less effective depending on its purpose. Traditional watermarks may be applied to visible media (like images or video), whereas in digital watermarking, the signal may be audio, pictures, video, texts or 3D models. A signal may carry several different watermarks at the same time. Unlike 155: 175:. While the modification may not be malicious, the term attack arises from copyright protection application, where third parties may attempt to remove the digital watermark through modification. There are many possible modifications, for example, lossy compression of the data (in which resolution is diminished), cropping an image or video, or intentionally adding noise. 76:. A watermark is embedded into a digital signal at each point of distribution. If a copy of the work is found later, then the watermark may be retrieved from the copy and the source of the distribution is known. This technique reportedly has been used to detect the source of illegally copied movies. 95:
Watermarks are identification marks produced during the paper-making process. The first watermarks appeared in Italy during the 13th century, but their use rapidly spread across Europe. They were used as a means to identify the paper maker or the trade guild that manufactured the paper. The marks
531:
in court. According to Blythe and Fridrich, "either camera can provide an undisputable proof of the image origin or its author". A secure digital camera (SDC) was proposed by Saraju Mohanty, et al. in 2003 and published in January 2004. This was not the first time this was proposed. Blythe and
275:
if its presence in the marked signal is noticeable (e.g. digital on-screen graphics like a network logo, content bug, codes, opaque images). On videos and images, some are made transparent/translucent for convenience for consumers due to the fact that they block portion of the view; therefore
510:
The evaluation of digital watermarking schemes may provide detailed information for a watermark designer or for end-users, therefore, different evaluation strategies exist. Often used by a watermark designer is the evaluation of single properties to show, for example, an improvement. Mostly,
567:
has emerged as a candidate solution to provide copyright protection, tamper detection, traitor tracing, and maintaining integrity of relational data. Many watermarking techniques have been proposed in the literature to address these purposes. A survey of the current state-of-the-art and a
237:
if it fails to be detectable after the slightest modification. Fragile watermarks are commonly used for tamper detection (integrity proof). Modifications to an original work that clearly are noticeable, commonly are not referred to as watermarks, but as generalized
162:
The information to be embedded in a signal is called a digital watermark, although in some contexts the phrase digital watermark means the difference between the watermarked signal and the cover signal. The signal where the watermark is to be embedded is called the
57:
in which it is applied. For marking media files with copyright information, a digital watermark has to be rather robust against modifications that can be applied to the carrier signal. Instead, if integrity has to be ensured, a fragile watermark would be applied.
31:; the hidden information should, but does not need to, contain a relation to the carrier signal. Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners. It is prominently used for tracing 201:
with respect to transformations if the embedded information may be detected reliably from the marked signal, even if degraded by any number of transformations. Typical image degradations are JPEG compression, rotation, cropping, additive noise, and
526:
have produced cameras with security features such as the Epson PhotoPC 3000Z and the Kodak DC-290. Both cameras added irremovable features to the pictures which distorted the original image, making them unacceptable for some applications such as
181:(often called extraction) is an algorithm that is applied to the attacked signal to attempt to extract the watermark from it. If the signal was unmodified during transmission, then the watermark still is present and it may be extracted. In 65:
and digital watermarking employ steganographic techniques to embed data covertly in noisy signals. While steganography aims for imperceptibility to human senses, digital watermarking tries to control the robustness as top priority.
167:
signal. A watermarking system is usually divided into three distinct steps, embedding, attack, and detection. In embedding, an algorithm accepts the host and the data to be embedded, and produces a watermarked signal.
295:
The message is conceptually zero-bit long and the system is designed in order to detect the presence or the absence of the watermark in the marked object. This kind of watermarking scheme is usually referred to as
511:
end-users are not interested in detailed information. They want to know if a given digital watermarking algorithm may be used for their application scenario, and if so, which parameter sets seems to be the best.
375: 568:
classification of the different techniques according to their intent, the way they express the watermark, the cover type, granularity level, and verifiability was published in 2010 by Halder et al. in the
1102:
Patrick Bas, Teddy Furon, François Cayre, Gwenaël Doërr, Benjamin Mathon, "Watermarking Security, Fundamentals, Secure Designs and Attacks", Springer Briefs in Electrical and Computer Engineering, 2016,
218:
imperceptible watermarks has proven to be quite challenging. Robust imperceptible watermarks have been proposed as a tool for the protection of digital content, for example as an embedded
555:
is a technique which enables images to be authenticated and then restored to their original form by removing the digital watermark and replacing the image data that had been overwritten.
1060: 27:
such as audio, video or image data. It is typically used to identify ownership of the copyright of such a signal. Digital watermarking is the process of hiding digital information in a
69:
Since a digital copy of data is the same as the original, digital watermarking is a passive protection tool. It just marks data, but does not degrade it or control access to the data.
493:
if the marked signal is obtained by quantization. Quantization watermarks suffer from low robustness, but have a high information capacity due to rejection of host interference.
482:
if the marked signal is obtained by an additive modification. Spread-spectrum watermarks are known to be modestly robust, but also to have a low information capacity due to host
420: 465: 249:
if it resists benign transformations, but fails detection after malignant transformations. Semi-fragile watermarks commonly are used to detect malignant transformations.
893: 782:
Khan, Asifullah; Mirza, Anwar M. (October 2007). "Genetic perceptual shaping: Utilizing cover image and conceivable attack information during watermark embedding".
256:
if it resists a designated class of transformations. Robust watermarks may be used in copy protection applications to carry copy and no access control information.
171:
Then the watermarked digital signal is transmitted or stored, usually transmitted to another person. If this person makes a modification, this is called an
502:
if the marked signal is embedded by additive modification which is similar to spread spectrum method, but is particularly embedded in the spatial domain.
185:
digital watermarking applications, the extraction algorithm should be able to produce the watermark correctly, even if the modifications were strong. In
210:
if the watermarked content is perceptually equivalent to the original, unwatermarked content. In general, it is easy to create either robust watermarks
1049:
Theoretical framework for a practical evaluation and comparison of audio watermarking schemes in the triangle of robustness, transparency and capacity
467:
and is modulated in the watermark. These kinds of schemes usually are referred to as multiple-bit watermarking or non-zero-bit watermarking schemes.
1005:
Halder, Raju; Pal, Shantanu; Cortesi, Agostino (2010). "Watermarking Techniques for Relational Databases: Survey, Classification and Comparison".
690:
A.Z.Tirkel, G.A. Rankin, R.M. Van Schyndel, W.J.Ho, N.R.A.Mee, C.F.Osborne. “Electronic Water Mark”. DICTA 93, Macquarie University. p.666-673
96:
often were created by a wire sewn onto the paper mold. Watermarks continue to be used today as manufacturer's marks and to prevent forgery.
864: 700:
Zigomitros, Athanasios; Papageorgiou, Achilleas; Patsakis, Constantinos (2012). "Social network content management through watermarking".
310: 92:
spread spectrum watermark was demonstrated in 1993 by Andrew Tirkel, Gerard Rankin, Ron Van Schyndel, Charles Osborne, and others.
1056: 974: 758: 717: 569: 206:. For video content, temporal modifications and MPEG compression often are added to this list. A digital watermark is called 930: 1108: 1120: 989: 916: 88:
was coined by Andrew Tirkel and Charles Osborne in December 1992. The first successful embedding and extraction of a
203: 1051:; In: Transaction on Data Hiding and Multimedia Security I; Springer LNCS 4300; Editor Yun Q. Shi; pp. 1–40; 1144: 24: 158:
General digital watermark life-cycle phases with embedding-, attacking-, and detection and retrieval functions
1139: 1066:
Smirnov, M. V. (1 June 2005). "Holographic approach to embedding hidden watermarks in a photographic image".
626: 1154: 483: 291:
The length of the embedded message determines two different main classes of digital watermarking schemes:
596: 50:
that is added to the carrier signal, a digital watermark does not change the size of the carrier signal.
380: 1042: 1037: 702:
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
621: 1019: 796: 835: 425: 116:
Broadcast monitoring (television news often contains watermarked video from international agencies)
743:
2008 International Conference on Computational Intelligence for Modelling Control & Automation
853: 189:
digital watermarking, the extraction algorithm should fail if any change is made to the signal.
1014: 791: 130: 32: 948: 1149: 611: 283:, that is, watermarking which uses the limitations of human perception to be imperceptible. 1075: 954: 591: 498: 8: 741:
Rowayda, A. Sadek (2008). "Blind Synthesis Attack on SVD Based Watermarking Techniques".
564: 1079: 958: 922: 764: 723: 541: 268:
if the original cover signal and the marked signal are perceptually indistinguishable.
1104: 1091: 1052: 970: 912: 809: 754: 713: 581: 528: 47: 894:"VLSI implementation of visible watermarking for secure digital still camera design" 727: 1083: 962: 926: 904: 801: 768: 746: 705: 805: 647:
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
616: 606: 478: 108: 889: 533: 143: 28: 966: 908: 709: 1133: 1095: 813: 601: 126: 89: 62: 104:
Digital watermarking may be used for a wide range of applications, such as:
1087: 750: 113:
Source tracking (different recipients get differently watermarked content)
586: 122: 953:, Lecture Notes in Computer Science, vol. 5414, pp. 340–341, 154: 133:
programs, to encourage users to purchase the full version to remove it.
1047:
Jana Dittmann, David Megias, Andreas Lang, Jordi Herrera-Joancomarti;
537: 43: 370:{\displaystyle \left(m=m_{1}\ldots m_{n},\;n\in \mathbb {N} \right.} 679:
Digital watermarking and steganography: fundamentals and techniques
225:
Digital watermarking techniques may be classified in several ways.
54: 36: 239: 1124: 699: 523: 519: 385: 364: 53:
The needed properties of a digital watermark depend on the
888: 214:
imperceptible watermarks, but the creation of both robust
23:
is a kind of marker covertly embedded in a noise-tolerant
901:
17th International Conference on VLSI Design. Proceedings
693: 149: 1038:
ECRYPT report: Audio Benchmarking Tools and Steganalysis
558: 946: 827: 882: 428: 383: 313: 892:; Ranganathan, Nagarajan; Namballa, Ravi K. (2004). 639: 681:. Taylor & Francis, Boca Raton, FL, USA, 2008 459: 414: 369: 1131: 1004: 536:that would use lossless watermarking to embed a 532:Fridrich also have worked on SDC in 2004 for a 496:A digital watermarking method is referred to as 476:A digital watermarking method is referred to as 852:BLYTHE, Paul; FRIDRICH, Jessica (August 2004). 489:A digital watermarking method is said to be of 851: 505: 775: 665:. Morgan Kaufmann, Burlington, MA, USA, 2008 448: 435: 649:. Academic Press, San Diego, CA, USA, 2004. 72:One application of digital watermarking is 645:H.T. Sencar, M. Ramkumar and A.N. Akansu: 351: 1018: 795: 781: 547: 359: 1043:ECRYPT report: Watermarking Benchmarking 153: 1065: 740: 1132: 998: 950:Advances in Image and Video Technology 673: 671: 663:Digital watermarking and steganography 150:Digital watermarking life-cycle phases 1007:Journal of Universal Computer Science 847: 845: 657: 655: 570:Journal of Universal Computer Science 559:Watermarking for relational databases 940: 307:The message is an n-bit-long stream 222:flag in professional video content. 16:Marker covertly embedded in a signal 982: 668: 471: 13: 1031: 994:, The Economist, December 12, 2002 947:Toshikazu Wada; Fay Huang (2009), 861:Digital Forensic Research Workshop 842: 652: 415:{\displaystyle \left.n=|m|\right)} 14: 1166: 1114: 279:This should not be confused with 259: 192: 838:from the original on 2008-02-23. 870:from the original on 2010-06-10 99: 820: 734: 684: 403: 395: 271:A digital watermark is called 264:A digital watermark is called 252:A digital watermark is called 245:A digital watermark is called 233:A digital watermark is called 197:A digital watermark is called 1: 1068:Journal of Optical Technology 632: 627:Automatic content recognition 460:{\displaystyle M=\{0,1\}^{n}} 302:presence watermarking schemes 228: 903:. IEEE. pp. 1063–1068. 806:10.1016/j.inffus.2005.09.007 704:. IEEE. pp. 1381–1386. 7: 597:Pattern Recognition (novel) 575: 540:identifier together with a 506:Evaluation and benchmarking 286: 139:Fraud and Tamper detection. 10: 1171: 514: 79: 991:Unretouched by human hand 967:10.1007/978-3-540-92957-4 909:10.1109/ICVD.2004.1261070 710:10.1109/TrustCom.2012.264 622:Digital on-screen graphic 563:Digital watermarking for 854:"Secure digital camera" 33:copyright infringements 1145:Authentication methods 553:Reversible data hiding 548:Reversible data hiding 461: 416: 371: 159: 142:Content management on 131:video editing software 1088:10.1364/JOT.72.000464 751:10.1109/CIMCA.2008.53 612:Watermark (data file) 462: 417: 372: 157: 1140:Digital watermarking 745:. pp. 140–145. 592:EURion constellation 565:relational databases 499:amplitude modulation 426: 381: 311: 119:Video authentication 109:Copyright protection 1155:Digital photography 1080:2005JOptT..72..464S 959:2008LNCS.5414.....W 44:physical watermarks 890:Mohanty, Saraju P. 784:Information Fusion 542:cryptographic hash 457: 412: 367: 160: 123:Software crippling 1057:978-3-540-49071-5 1013:(21): 3164–3190. 976:978-3-540-92956-7 828:"CPTWG Home Page" 760:978-0-7695-3514-2 719:978-1-4673-2172-3 582:Coded Anti-Piracy 529:forensic evidence 491:quantization type 86:digital watermark 42:Like traditional 21:digital watermark 1162: 1099: 1025: 1024: 1022: 1002: 996: 995: 986: 980: 979: 944: 938: 937: 936:on 4 March 2016. 935: 929:. Archived from 898: 886: 880: 879: 877: 875: 869: 858: 849: 840: 839: 824: 818: 817: 799: 779: 773: 772: 738: 732: 731: 697: 691: 688: 682: 675: 666: 661:Ingemar J. Cox: 659: 650: 643: 472:Embedding method 466: 464: 463: 458: 456: 455: 421: 419: 418: 413: 411: 407: 406: 398: 376: 374: 373: 368: 366: 363: 362: 347: 346: 334: 333: 136:ID card security 39:authentication. 1170: 1169: 1165: 1164: 1163: 1161: 1160: 1159: 1130: 1129: 1117: 1034: 1032:Further reading 1029: 1028: 1020:10.1.1.368.1075 1003: 999: 988: 987: 983: 977: 945: 941: 933: 919: 896: 887: 883: 873: 871: 867: 856: 850: 843: 826: 825: 821: 797:10.1.1.708.9509 780: 776: 761: 739: 735: 720: 698: 694: 689: 685: 677:Frank Y. Shih: 676: 669: 660: 653: 644: 640: 635: 617:Audio watermark 607:Traitor tracing 578: 561: 550: 517: 508: 479:spread-spectrum 474: 451: 447: 427: 424: 423: 402: 394: 387: 384: 382: 379: 378: 358: 342: 338: 329: 325: 318: 314: 312: 309: 308: 289: 262: 231: 220:no-copy-allowed 195: 152: 144:social networks 102: 82: 74:source tracking 17: 12: 11: 5: 1168: 1158: 1157: 1152: 1147: 1142: 1128: 1127: 1116: 1115:External links 1113: 1112: 1111: 1109:978-9811005053 1100: 1074:(6): 464–484. 1063: 1045: 1040: 1033: 1030: 1027: 1026: 997: 981: 975: 939: 917: 881: 841: 819: 790:(4): 354–365. 774: 759: 733: 718: 692: 683: 667: 651: 637: 636: 634: 631: 630: 629: 624: 619: 614: 609: 604: 599: 594: 589: 584: 577: 574: 560: 557: 549: 546: 534:digital camera 516: 513: 507: 504: 473: 470: 469: 468: 454: 450: 446: 443: 440: 437: 434: 431: 410: 405: 401: 397: 393: 390: 386: 365: 361: 357: 354: 350: 345: 341: 337: 332: 328: 324: 321: 317: 305: 288: 285: 276:degrading it. 261: 260:Perceptibility 258: 230: 227: 217: 213: 194: 193:Classification 191: 151: 148: 147: 146: 140: 137: 134: 120: 117: 114: 111: 101: 98: 90:steganographic 81: 78: 29:carrier signal 15: 9: 6: 4: 3: 2: 1167: 1156: 1153: 1151: 1148: 1146: 1143: 1141: 1138: 1137: 1135: 1126: 1122: 1119: 1118: 1110: 1106: 1101: 1097: 1093: 1089: 1085: 1081: 1077: 1073: 1069: 1064: 1062: 1058: 1054: 1050: 1046: 1044: 1041: 1039: 1036: 1035: 1021: 1016: 1012: 1008: 1001: 993: 992: 985: 978: 972: 968: 964: 960: 956: 952: 951: 943: 932: 928: 924: 920: 918:0-7695-2072-3 914: 910: 906: 902: 895: 891: 885: 866: 862: 855: 848: 846: 837: 833: 829: 823: 815: 811: 807: 803: 798: 793: 789: 785: 778: 770: 766: 762: 756: 752: 748: 744: 737: 729: 725: 721: 715: 711: 707: 703: 696: 687: 680: 674: 672: 664: 658: 656: 648: 642: 638: 628: 625: 623: 620: 618: 615: 613: 610: 608: 605: 603: 602:Steganography 600: 598: 595: 593: 590: 588: 585: 583: 580: 579: 573: 571: 566: 556: 554: 545: 543: 539: 535: 530: 525: 521: 512: 503: 501: 500: 494: 492: 487: 485: 481: 480: 452: 444: 441: 438: 432: 429: 408: 399: 391: 388: 355: 352: 348: 343: 339: 335: 330: 326: 322: 319: 315: 306: 303: 299: 294: 293: 292: 284: 282: 277: 274: 269: 267: 266:imperceptible 257: 255: 250: 248: 243: 241: 236: 226: 223: 221: 215: 211: 209: 208:imperceptible 205: 200: 190: 188: 184: 180: 176: 174: 169: 166: 156: 145: 141: 138: 135: 132: 128: 127:screencasting 124: 121: 118: 115: 112: 110: 107: 106: 105: 97: 93: 91: 87: 77: 75: 70: 67: 64: 63:steganography 59: 56: 51: 49: 45: 40: 38: 34: 30: 26: 22: 1150:Watermarking 1071: 1067: 1048: 1010: 1006: 1000: 990: 984: 949: 942: 931:the original 900: 884: 872:. Retrieved 860: 831: 822: 787: 783: 777: 742: 736: 701: 695: 686: 678: 662: 646: 641: 562: 552: 551: 518: 509: 497: 495: 490: 488: 484:interference 477: 475: 301: 297: 290: 280: 278: 272: 270: 265: 263: 253: 251: 247:semi-fragile 246: 244: 234: 232: 224: 219: 207: 204:quantization 198: 196: 186: 182: 178: 177: 172: 170: 164: 161: 103: 100:Applications 94: 85: 83: 73: 71: 68: 60: 52: 41: 20: 18: 587:Copy attack 273:perceptible 1134:Categories 1121:Watermarks 633:References 281:perceptual 229:Robustness 1096:1070-9762 1015:CiteSeerX 863:: 11–13. 832:cptwg.org 814:1566-2535 792:CiteSeerX 538:biometric 356:∈ 336:… 179:Detection 84:The term 865:Archived 836:Archived 728:17845019 576:See also 298:zero-bit 287:Capacity 240:barcodes 55:use case 48:metadata 37:banknote 35:and for 1076:Bibcode 1059:, 2006 955:Bibcode 927:1821349 874:23 July 769:8927498 515:Cameras 377:, with 235:fragile 187:fragile 80:History 1125:Curlie 1107:  1094:  1055:  1017:  973:  925:  915:  812:  794:  767:  757:  726:  716:  254:robust 199:robust 183:robust 173:attack 25:signal 934:(PDF) 923:S2CID 897:(PDF) 868:(PDF) 857:(PDF) 765:S2CID 724:S2CID 524:Kodak 520:Epson 61:Both 1105:ISBN 1092:ISSN 1053:ISBN 971:ISBN 913:ISBN 876:2018 810:ISSN 755:ISBN 714:ISBN 522:and 165:host 129:and 1123:at 1084:doi 1061:PDF 963:doi 905:doi 802:doi 747:doi 706:doi 422:or 300:or 216:and 125:on 1136:: 1090:. 1082:. 1072:72 1070:. 1011:16 1009:. 969:, 961:, 921:. 911:. 899:. 859:. 844:^ 834:. 830:. 808:. 800:. 786:. 763:. 753:. 722:. 712:. 670:^ 654:^ 572:. 544:. 486:. 242:. 212:or 19:A 1098:. 1086:: 1078:: 1023:. 965:: 957:: 907:: 878:. 816:. 804:: 788:8 771:. 749:: 730:. 708:: 453:n 449:} 445:1 442:, 439:0 436:{ 433:= 430:M 409:) 404:| 400:m 396:| 392:= 389:n 360:N 353:n 349:, 344:n 340:m 331:1 327:m 323:= 320:m 316:( 304:.

Index

signal
carrier signal
copyright infringements
banknote
physical watermarks
metadata
use case
steganography
steganographic
Copyright protection
Software crippling
screencasting
video editing software
social networks

quantization
barcodes
spread-spectrum
interference
amplitude modulation
Epson
Kodak
forensic evidence
digital camera
biometric
cryptographic hash
relational databases
Journal of Universal Computer Science
Coded Anti-Piracy
Copy attack

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑