Copyright protection of cultural heritage multimedia data through digital watermarking techniques

Author(s):  
V. Cappellini ◽  
F. Bartolini ◽  
R. Caldelli ◽  
A. De Rosa ◽  
A. Piva ◽  
...  
2013 ◽  
Vol 321-324 ◽  
pp. 2609-2612
Author(s):  
Yan Liang ◽  
Gao Yan ◽  
Chun Xia Qi

Digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia data in a networked environment. It makes possible to tightly associated to a digital document a code allowing the identification of the data creator, owner, authorized consumer, and so on. In this paper a new DCT-domain system for digital watermarking algorithm for digital images is presented: the method, which operates in the frequency domain, embeds a pseudo-random sequence of scrambled image in a selected set of DCT coefficients. After embedding, the watermark is adapted to the image by exploiting the masking characteristics of the human visual system, thus ensuring the watermark invisibility. By exploiting the statistical properties of the embedded sequence, the mark can be reliably extracted without resorting to the original uncorrupted image. Experimental results demonstrate that the watermark is robust to several signal processing techniques, including JPEG compression, cut, fuzzy, addition of noise, and sharpen.


Author(s):  
V. Santhi ◽  
D. P. Acharjya

Advances in technologies facilitate the end users to carry out unauthorized manipulation and duplication of multimedia data with less effort. Because of these advancements, the two most commonly encountered problems are (1) copyright protection and (2) unauthorized manipulation of multimedia data. Thus a scheme is required to protect multimedia data from those two above said problems. Digital Watermarking is considered as one of the security mechanisms to protect copyrights of multimedia data. The literature review reveals that the calculation of scaling and embedding parameters are not completely automated. In order to automate the procedure of calculating scaling and embedding parameters the computational intelligence need to be incorporated in the watermarking algorithm. Moreover the quality of the watermarked images could also be preserved by combining computational intelligence concepts. Thus watermarking schemes utilizing computational intelligence concepts could be called as intelligence based watermarking schemes and it is presented in this chapter in detail.


2013 ◽  
pp. 691-712
Author(s):  
Dumitru Dan Burdescu ◽  
Liana Stanescu ◽  
Marian Cristian Mihaescu

The rapid growth of digital multimedia technologies brings tremendous attention to the field of digital authentication. Digital watermarking has become widely recognized as an effective measure for copyright protection of multimedia data. The owner or the distributor of the digital images can insert a unique watermark into copies for different customers or receivers, which will be helpful to identify the source of illegal copies. In this chapter the authors present two original spatial authentication techniques for digital images. These new algorithms yield an invisible watermark that is robust to various kinds of attacks. The main principle is the utilization of a virtual (2D or 3D) graph embedded into the digital images. Then, the colors of some vertices of the virtual graph are slightly modified for obtaining the watermark. The proposed techniques modify pixels or voxels of the object by a spatial watermark insertion scheme. These techniques can be used for all kinds of digital images, color or black and white, and the new algorithms produce an invisible robust watermark. The techniques lower the computational complexity that normally rises with the traditional watermarking algorithms. This approach reduces computation and implementation complexity of the algorithms. These techniques seem to replace advantages of the transform domain techniques with those of the spatial domain techniques.


Author(s):  
Farook Sattar ◽  
Dan Yu

Today, the Internet is a worldwide broadcasting capability, a mechanism for information dissemination and a medium for collaboration and interaction between individuals and their computers without regard for geographic location. With the rapid evolution of digital networks, digital libraries and World Wide Web (WWW) services, the convenient broadcasting or exposition of digital products on the global network leads easily to illegal copying, modifying and retransmission. The Internet has spawned many copyright issues involving multimedia content distribution. Let’s say an owner would like to sell or distribute a work to legal/registered users only. If the work were subsequently copied/redistributed illegally, how could the owner find who was responsible? Cryptographic techniques provide an effective solution for securing the delivery process and controlling the use of the contents that an user has obtained. However, with flawless transmission through the network, the contents after decryption are exactly the same as the original data. The contents can be copied perfectly infinite times. A user can also manipulate the contents. Digital watermarking (Arnold, Schmucker, & Wolthusen, 2003; Katzenbeisser & Petitcolas, 2000) offers a way to counter copyright piracy on global networks that are not solvable by cryptography. It provides proof and tracking capabilities to illegal copying and distribution of multimedia information. Most existing digital watermarking schemes are based on some assumptions for watermark detection and extraction. Some schemes require the previous knowledge of watermark locations, strengths or some thresholds. In some algorithms, the watermark is estimated with the help of the original watermark information. To ensure the robustness and invisibility of the watermark, the optimum embedding locations are usually different for different images. For a large image database, it could be a disadvantage to require watermark location and strength information for watermark detection and extraction. A large amount of information then needs to be stored. On the Internet, an owner would like to distribute multimedia data by signing different watermarks to different users in order to prevent illegal redistribution of the data by a legal user. In this scenario, watermark detection and extraction algorithms requiring information of either watermark embedding locations and strengths or the original watermark should fail, since one does not know exactly which watermark is embedded in a particular copy of the watermarked image. To this end, we present a new blind watermarking scheme (Yu, Sattar, & Ma, 2002; Yu & Sattar, 2003, 2005) based on Independent Component Analysis (ICA) (Hyvarinen, 1999; Hyvärinen & Oja, 1999; Lee, 1998) for color images, which can overcome existing problems of watermark detection and extraction as described above. The new ICA-based scheme is found to be efficient in the application of data tracking/tracing for multimedia distribution through the Internet against other digital watermarking schemes. By adopting this ICA-based watermarking scheme, an efficient multimedia distribution framework/protocol for copyright protection can be accomplished. This article is organized as follows: The watermark embedding and extraction algorithms for color image watermarking using the new ICA-based scheme are presented next, followed by a discussion and comments on the results, security issues, summary and future works.


Author(s):  
Georgios Stilios ◽  
Dimitrios K. Tsolis

The issue addressed in this chapter is the design, implementation, and evaluation of a watermarking application, especially focused on the protection of cultural heritage. The application described here is focusing on protecting digital surrogates of high-quality photographs of artifacts, monuments and sites, and on countering copyright infringement of online digital images. This is achieved by the integration of an innovative watermarking method to a specialized and usable user–interface. The system is specifically applied to “Ulysses,” the Official Cultural Portal of the Hellenic Ministry of Culture (HMC). The chapter is structured in 7 main sections where an overview of the issue is presented, the watermarking method is analyzed, and the user-interface is described in detail. Finally, an evaluation of the overall watermarking application is presented and specific on-site implementation issues are analyzed.


2020 ◽  
Vol 11 (4) ◽  
pp. 920
Author(s):  
Ni Luh Made MAHENDRAWATI

Tourism has become a prevalent discourse in Indonesia, considering that in the last few years, Tourism has become the highest contributor to the commodity revenue line. Paying close attention to the integration of tourism certainly involves multidiscipline in it so that efforts to develop tourism require integrated efforts from various parties as well as multidiscipline. It is essential to realize that the attractions of tourism in Indonesia can consist of everything that has a uniqueness, beauty, and value in the form of the diversity of natural, cultural, and human-made diversity. In real terms, it can be observed that cultural heritage is one of the valuable assets owned by a country (Indonesia) in supporting the development of tourism. Culture is a way of life that develops, is shared by a group of people, and is passed down from generation to generation. The culture referred to is the result of reason and reason, so that philosophy can be understood as originating from nothing, then thought by reason and ideas, then becoming. The process of creating a culture can logically be protected by Intellectual Property Rights (Copyright). During this time, the copyright-protected in Indonesia based on Law Number 28 of 2014 concerning Copyright is an Individual Right. It is understood that the copyright needed to protect cultural heritage is communal rights. How to regulate and apply copyright protection Communal communities will be studied more deeply so that there is a comprehensive and integrated model for protecting cultural heritage in Indonesia.


Author(s):  
Sridevi Tumula

In this paper a new novel color video watermarking algorithm has been proposed using Dual Tree Complex Wavelet Transform (DTCWT). Digital watermarking is an emerging technology for copyright protection for digital multimedia data. Now-a-days a lot of digital data are exchanged in the internet, so to protect the digital multimedia data, digital watermarking is used, the data may be an image or video or an audio data. The main objective of this paper is to maintain perceptivity of digital video and design a robust watermarking algorithm and maintaining the tradeoff between robustness and perceptivity.


Author(s):  
Dumitru Dan Burdescu ◽  
Liana Stanescu ◽  
Marian Cristian Mihaescu

The rapid growth of digital multimedia technologies brings tremendous attention to the field of digital authentication. Digital watermarking has become widely recognized as an effective measure for copyright protection of multimedia data. The owner or the distributor of the digital images can insert a unique watermark into copies for different customers or receivers, which will be helpful to identify the source of illegal copies. In this chapter the authors present two original spatial authentication techniques for digital images. These new algorithms yield an invisible watermark that is robust to various kinds of attacks. The main principle is the utilization of a virtual (2D or 3D) graph embedded into the digital images. Then, the colors of some vertices of the virtual graph are slightly modified for obtaining the watermark. The proposed techniques modify pixels or voxels of the object by a spatial watermark insertion scheme. These techniques can be used for all kinds of digital images, color or black and white, and the new algorithms produce an invisible robust watermark. The techniques lower the computational complexity that normally rises with the traditional watermarking algorithms. This approach reduces computation and implementation complexity of the algorithms. These techniques seem to replace advantages of the transform domain techniques with those of the spatial domain techniques.


Biometrics ◽  
2017 ◽  
pp. 1483-1505
Author(s):  
V. Santhi ◽  
D. P. Acharjya

Advances in technologies facilitate the end users to carry out unauthorized manipulation and duplication of multimedia data with less effort. Because of these advancements, the two most commonly encountered problems are (1) copyright protection and (2) unauthorized manipulation of multimedia data. Thus a scheme is required to protect multimedia data from those two above said problems. Digital Watermarking is considered as one of the security mechanisms to protect copyrights of multimedia data. The literature review reveals that the calculation of scaling and embedding parameters are not completely automated. In order to automate the procedure of calculating scaling and embedding parameters the computational intelligence need to be incorporated in the watermarking algorithm. Moreover the quality of the watermarked images could also be preserved by combining computational intelligence concepts. Thus watermarking schemes utilizing computational intelligence concepts could be called as intelligence based watermarking schemes and it is presented in this chapter in detail.


1970 ◽  
Vol 3 ◽  
Author(s):  
Pranab Kumar Dhar ◽  
Mohammad Ibrahim Khan ◽  
Sujan Chowdhury

Digital watermarking has drawn extensive attention for copyright protection of multimedia data. This paper proposes a new watermarking system for digital images using efficient systematic linear block codes (SLBC) in discrete cosine transform (DCT) domain. The proposed watermarking system using SLBC generates a code sequence of {0, 1} that provides error correction capabilities and then replaces it with a binary watermark sequence of {-1, 1}. This achieves more robust invisible image watermarks and requires a small storage unit for binary sequence numbers. The generated watermark sequence is then used as an input for our proposed watermarking system which consists of watermark embedding process and watermark detection process. Experimental results indicate that the invisible watermark embedded with the proposed system are very robust against various kinds of attacks such as white Gaussian noise, JPEG compression, median, and mean filtering, by showing similarity values ranging from 0.7 to 0.8. KEY WORDS: Digital Watermarking; Linear Block Code; Copyright Protection. DOI: http://dx.doi.org/10.3329/mist.v3i0.8056


Sign in / Sign up

Export Citation Format

Share Document