scholarly journals Performance Evaluation of watermarking Schemes to Decide Meaningful Number of Shares

Author(s):  
Jitendra Saturwar ◽  
D.N. Chaudhari

<p>With the growth in digital world, it is becoming more important to find a method to<br />protect the security of digital media. An image watermarking model based on visual secret<br />sharing (VSS) is proposed for protection of ownership. In the embedding phase, the<br />watermark is first divided by VSS into two parts, a hiding watermark and a secret watermark.<br />Then only the hiding watermark is embedded into the original image and the secret<br />watermark is reserved for watermark extracting by the owner. In the extracting phase, the<br />hiding watermark is extracted from the watermarked image first and then directly<br />superimposed on the secret watermark to recover the watermark information. Digital<br />watermarking has been proposed as a possible brick of such protection systems. However,<br />application of watermarking for multimedia content protection in realistic scenarios poses<br />several security issues.<br />A digital watermarking technique is used to generate meaningful shares. The secret image<br />shares are watermarked with different cover images and are transmitted. At the receiving side,<br />the cover images are extracted from the shares and stacked one by one which reveals the secret<br />image progressively. Digital watermarking using visual cryptography provides improved security<br />for encrypting secret images.</p>

Author(s):  
B. Aparna ◽  
S. Madhavi ◽  
G. Mounika ◽  
P. Avinash ◽  
S. Chakravarthi

We propose a new design for large-scale multimedia content protection systems. Our design leverages cloud infrastructures to provide cost efficiency, rapid deployment, scalability, and elasticity to accommodate varying workloads. The proposed system can be used to protect different multimedia content types, including videos, images, audio clips, songs, and music clips. The system can be deployed on private and/or public clouds. Our system has two novel components: (i) method to create signatures of videos, and (ii) distributed matching engine for multimedia objects. The signature method creates robust and representative signatures of videos that capture the depth signals in these videos and it is computationally efficient to compute and compare as well as it requires small storage. The distributed matching engine achieves high scalability and it is designed to support different multimedia objects. We implemented the proposed system and deployed it on two clouds: Amazon cloud and our private cloud. Our experiments with more than 11,000 videos and 1 million images show the high accuracy and scalability of the proposed system. In addition, we compared our system to the protection system used by YouTube and our results show that the YouTube protection system fails to detect most copies of videos, while our system detects more than 98% of them.


2020 ◽  
Vol 11 (1) ◽  
pp. 1
Author(s):  
Amna Qureshi ◽  
David Megías Jiménez

In this paper, we provide a holistic survey of multimedia content protection applications in which blockchain technology is being used. A taxonomy is developed to classify these applications with reference to the technical aspects of blockchain technology, content protection techniques, namely, encryption, digital rights management, digital watermarking and fingerprinting (or transaction tracking), and performance criteria. The study of the literature reveals that there is currently no complete and systematic taxonomy dedicated to blockchain-based copyright protection applications. Moreover, the number of successfully developed blockchain-based content protection systems is very low. This points towards a research gap. To fill this gap, we propose a taxonomy that integrates technical aspects and application knowledge and can guide the researchers towards the development of blockchain-based multimedia copyright protection systems. Furthermore, the paper discusses some technical challenges and outlines future research directions.


Author(s):  
Shiguo Lian

Since the beginning of 1990s, some multimedia standards (Joan, Didier, & Chad, 2003) related to image compression, video compression, or audio compression have been published and widely used. These compression methods reduce media data’s volumes, and save the storage space or transmission bandwidth. After the middle of 1990s, network technology has been rapidly developed and widely spread, which increases the network bandwidth. With the development of network technology and multimedia (image, audio, video, etc.) technology, multimedia data are used more and more widely. In some applications related to politics, economics, militaries, entertainment, or education, multimedia content security becomes important and urgent. Some sensitive data need to be protected against unauthorized users. For example, only the customers paying for a TV program can watch the program online, while other customers cannot watch the content, only the administrator can update (delete, insert, copy, etc.) the TV program in the database, while others cannot modify the content, the TV program released over Internet can be traced, and so forth. Multimedia content protection technology protects multimedia data against the threats coming from unauthorized users, especially in network environment. Generally, protected properties include the confidentiality, integrity, ownership, and so forth. The confidentiality defines that only the authorized users can access the multimedia content, while others cannot know multimedia content. The integrity tells whether media data are modified or not. The ownership shows media data’s owner information that is used to authenticate or trace the distributor. During the past decade, various technologies have been proposed to protect media data, which are introduced in this chapter. Additionally, the threats to multimedia data are presented, the existing protection methods are compared, and some future trends are proposed.


Author(s):  
Alessandro Piva ◽  
Roberto Caldelli ◽  
Alessia De Rosa ◽  
Mauro Barni ◽  
Vito Cappellini

The need to safeguard the property rights of multimedia content from unauthorized copying and the possibility to determine the true owners of the asset can be faced by resorting to efficient digital watermarking systems. This chapter presents a mathematical formulation to define a digital watermarking system and describes the general requirements to be satisfied, with more emphasis given to the aspects of security, robustness, and imperceptibility. After this general discussion, the two main classes of digital watermarking schemes, namely the spread-spectrum watermarking and the side-informed watermarking are explained by highlighting their main advantages and drawbacks. This analysis is completed by the description of a practical implementation of a digital image watermarking scheme. Finally, the use of watermarking systems in the framework of a DRM is deeply analyzed.


2015 ◽  
Vol 17 (3) ◽  
pp. 420-433 ◽  
Author(s):  
Mohamed Hefeeda ◽  
Tarek ElGamal ◽  
Kiana Calagari ◽  
Ahmed Abdelsadek

In today’s world, the enhancement in internet technologies, digital data are mostly used to share the information in public networks. There are many traditional security techniques used to provide security to the digital information. But the existing methods don’t provide much of the security to digital media like image, video, audio, etc. The digital watermarking is employed in the protection of digital information. This paper gives a review on digital image watermarking based on the visual cryptography to reach secure protection for the images. The secret information can be inserted in the original images. The secret key is generated from the watermark image with the help of visual cryptography to claim the ownership of images. Various types of Visual Cryptography and Digital Image Watermarking techniques are explained in real time application.


Author(s):  
Ekta Walia ◽  
Shailja Sharma ◽  
Anu Suneja

Digital Watermarking allows an individual to add some hidden copyright notices or other verification messages to digital media, where message is a group of bits describing the information pertaining to the signal or its author. For this purpose, two techniques viz. global watermarking and local watermarking can be used. In this paper, the performance of two feature based global and local watermarking techniques using Zernike Moments(ZMs) have been analyzed by evaluating their robustness against geometric, photometric and other signal processing attacks including rotation, cropping and noise. Experimental results have been provided in order to compare ZMs based global and local watermarking techniques for different types of attacks. Recommendations have been made based on the comparison of these techniques with other existing works.


Sign in / Sign up

Export Citation Format

Share Document