Design Principles for Active Audio and Video Fingerprinting

2005 ◽  
pp. 157-172
Author(s):  
Martin Steinbach ◽  
Jana Dittmann

Active fingerprinting combines digital media watermarking and codes for collusion-secure customer identification. This requires specialized strategies for watermark embedding to lessen the thread of attacks like marked media comparison or mixing. We introduce basic technologies for fingerprinting and digital watermarking and possible attacks against active fingerprinting. Based on this, we provide test results, discuss the consequences and suggest an optimized embedding method for audio fingerprinting.

Author(s):  
Martin Steinbach ◽  
Jana Dittmann

Active fingerprinting combines digital media watermarking and codes for collusion-secure customer identification. This requires specialized strategies for watermark embedding to lessen the thread of attacks like marked media comparison or mixing. We introduce basic technologies for fingerprinting and digital watermarking and possible attacks against active fingerprinting. Based on this, we provide test results, discuss the consequences and suggest an optimized embedding method for audio fingerprinting.


2008 ◽  
pp. 547-558
Author(s):  
M. Steinbach ◽  
J. Dittmann

Active fingerprinting combines digital media watermarking and codes for collusion-secure customer identification. This requires specialized strategies for watermark embedding to lessen the thread of attacks like marked media comparison or mixing. We introduce basic technologies for fingerprinting and digital watermarking and possible attacks against active fingerprinting. Based on this, we provide test results, discuss the consequences and suggest an optimized embedding method for audio fingerprinting.


Author(s):  
Khoerul Umam

The spread of digital media on the internet was very broad, fast, and cannot be monitored in a structured manner about what media has been uploaded and distributed on the internet network. The spread of digital media like this was very difficult to detect whether the media that shared was privately owned or that of others that is re-shared by media theft or digital media piracy. One step to overcome the theft of digital works is to give them a watermark, which is an identity that is placed on top of the work. However, this is still considered unsafe because the identity attached can be cut and manipulated again until it is not visible. In addition, the use of Steganography method to hide messages in an image can still be manipulated by adding messages continuously so that it accumulates and damages the original owner of the image. In this article, the author provides a solution called Digital Watermarking, a step of encrypting the data of the original owner of the work and putting it into the image of his work. This watermark cannot be seen clearly, but actually in the media there is encrypted data with a strong Advanced Encryption Standard (AES) method. As a result, a tool that can improve the security of media owner data by combining the AES and Steganogaphy methods in the formation of new media that cannot be changed anymore. So, when the media is stolen and used by others and has been edited, the owner's personal data can never be changed.


Author(s):  
Dan Yu ◽  
Farook Sattar

This chapter focuses on the issue of transaction tracking in multimedia distribution applications through digital watermarking terminology. The existing watermarking schemes are summarized and their assumptions as well as the limitations for tracking are analyzed. In particular, an Independent Component Analysis (ICA)-based watermarking scheme is proposed, which can overcome the problems of the existing watermarking schemes. Multiple watermarking technique is exploited—one watermark to identify the rightful owner of the work and the other one to identify the legal user of a copy of the work. In the absence of original data, watermark, embedding locations and strengths, the ICA-based watermarking scheme is introduced for efficient watermark extraction with some side information. The robustness of the proposed scheme against some common signal-processing attacks as well as the related future work are also presented. Finally, some challenging issues in multimedia transaction tracking through digital watermarking are discussed.


2013 ◽  
pp. 376-399
Author(s):  
Ali Al-Haj ◽  
Ahmad Mohammad ◽  
Samir Abou El-Seoud ◽  
Tuqa Manasrah ◽  
Lama Rajab ◽  
...  

The tremendous advancement of digital technology has increased the ease with which digital multimedia signals (image, video, audio) are stored, transmitted, and reproduced. Consequently, the content providers and owners are faced with problems of protection against copyright violation and other forms of abuse to their digital property. Digital watermarking has been proposed in the last decade as a solution to prevent illegal and malicious copying and distribution of digital media by embedding an unnoticeable information into the media content. This chapter describes three imperceptible and robust watermarking algorithms for different types of multimedia objects (image, video, audio). The three algorithms are based on cascading two powerful mathematical transforms; the Discrete Wavelet Transform (DWT), and the Singular Value Decomposition (SVD). The two transforms are different, and thus provide complementary levels of robustness against the same attack. In the proposed dual-transform algorithms, the watermark bits are not embedded directly on the wavelet coefficients, but rather on the elements of singular values of the DWT sub-bands of the multimedia object. Effectiveness of the proposed algorithms is demonstrated through extensive experimentation.


Author(s):  
Fayez M. Idris

Digital watermarking is a process in which a secondary pattern or signature, called a watermark, is hidden into a digital media (e.g., image and video) such that it can be detected or extracted later for different intentions. Digital watermarking has many applications including copyright protection, authentication, tamper detection, and embedding of electronic patient records in medical images. Various software implementations of digital watermarking algorithms can be built. While software implementations can address digital watermarking in off-line applications, they cannot meet the requirements of many applications. For example, in consumer electronic devices, a software solution would be very expensive. This has motivated the development of hardware implementations of digital watermarking. In this chapter, the authors present a detailed survey of existing hardware implementations of image and video watermarking algorithms. Fundamental design issues are discussed and special techniques exploited to enhance efficiency are identified. Future outlooks are also presented to address the challenges of hardware architecture design for image and video watermarking.


Author(s):  
Hsien-Chu Wu ◽  
Hei-Chuan Lin

In recent years, services on the Internet have greatly improved and are more reliable than before. However, the easy downloads and duplications on the Internet have created a rush of illicit reproductions. Undoubtedly, the rights of ownership are violated and vulnerable to the predators that stalk the Internet. Therefore, protection against these illegal acts has become a mind-boggling issue. Previously, artists and publishers painstakingly signed or marked their products to prevent illegal use. However with the invention of digital products, protecting rightful ownership has become difficult. Currently, there are two schemes to protect data on the Internet. The first scheme is the traditional cryptography where the important data or secret is to be encrypted by a special process before being transmitted on the Internet. This scheme requires much computational process and time to encrypt or decrypt. On the other hand, the second scheme is steganography where the important message or secret is hidden in the digital media. The hidden data is not perceptible by the human visual system (HVS). The digital watermarking technique is an application of steganography (Chang, Huang, & Chen, 2000; Chen, Chang, & Huang 2001). In order to safeguard copyrights and rightful ownerships, a representative logo or watermark could be hidden in the image or media that is to be protected. The hidden data can be recovered and used as proof of rightful ownership. The watermarking schemes can be grouped into three kinds, largely, dependent on its application. They use the fragile watermark, semi-fragile watermark, and robust watermark, respectively (Fabien, Ross, & Markus, 1999). Fragile watermarks are easily corrupted when the watermarked image is compressed or tampered with. Semi-fragile watermarks can sustain attacks from normal image processing, but are not robust against malicious tampering. Fragile and semi-fragile watermarks are restricted in its use for image authentication and integrity attestation (Fridrich,2002; Fridrich, Memon, & Goljan, 2000). For the robust watermarking, it is always applied in ownership verification and copyright protection (Fridrich, Baldoza, & Simard, 1998; Huang, Wang, & Pan, 2002; Lu, Xu, & Sun, 2005; Solanki, Jacobsoen, Madhow, Manjunath, & Chandrasekaran, 2004). Some basic conditions must be followed: (1) Invisibility: the watermarked image must look similar to its original and any difference invisible to the human visual system. (2) Undetectable: the watermark embedded in the image must not be easily detectable by computing processes or statistical methods. (3) Safety: watermark is encrypted and if accessed by a hacker; cannot be removed or tampered with. (4) Robustness: the watermark is able to withstand normal and/or illegal manipulations, such as compression, blurring, sharpening, cropping, rotations and more. The retrieved watermark is perceptible even after these processes. (5) Independence: the watermark can be retrieved without the original image. Last but not the least, (6) Efficiency: the watermarked image should not require large storage and must also allow for a comparable-sized watermark to be hidden in the media. The proposed method is a VQ-based watermark technique that depends on the structure of a tree growth for grouping the codebook. The scheme is robust. That is, the watermark is irremovable and also can withstand normal compression process, tampering by compression or other malicious attacks. After these attacks, the watermark must be recovered with comparable perceptibility and useful in providing proof of rightful ownerships.


Author(s):  
Farook Sattar ◽  
Dan Yu

Today, the Internet is a worldwide broadcasting capability, a mechanism for information dissemination and a medium for collaboration and interaction between individuals and their computers without regard for geographic location. With the rapid evolution of digital networks, digital libraries and World Wide Web (WWW) services, the convenient broadcasting or exposition of digital products on the global network leads easily to illegal copying, modifying and retransmission. The Internet has spawned many copyright issues involving multimedia content distribution. Let’s say an owner would like to sell or distribute a work to legal/registered users only. If the work were subsequently copied/redistributed illegally, how could the owner find who was responsible? Cryptographic techniques provide an effective solution for securing the delivery process and controlling the use of the contents that an user has obtained. However, with flawless transmission through the network, the contents after decryption are exactly the same as the original data. The contents can be copied perfectly infinite times. A user can also manipulate the contents. Digital watermarking (Arnold, Schmucker, & Wolthusen, 2003; Katzenbeisser & Petitcolas, 2000) offers a way to counter copyright piracy on global networks that are not solvable by cryptography. It provides proof and tracking capabilities to illegal copying and distribution of multimedia information. Most existing digital watermarking schemes are based on some assumptions for watermark detection and extraction. Some schemes require the previous knowledge of watermark locations, strengths or some thresholds. In some algorithms, the watermark is estimated with the help of the original watermark information. To ensure the robustness and invisibility of the watermark, the optimum embedding locations are usually different for different images. For a large image database, it could be a disadvantage to require watermark location and strength information for watermark detection and extraction. A large amount of information then needs to be stored. On the Internet, an owner would like to distribute multimedia data by signing different watermarks to different users in order to prevent illegal redistribution of the data by a legal user. In this scenario, watermark detection and extraction algorithms requiring information of either watermark embedding locations and strengths or the original watermark should fail, since one does not know exactly which watermark is embedded in a particular copy of the watermarked image. To this end, we present a new blind watermarking scheme (Yu, Sattar, & Ma, 2002; Yu & Sattar, 2003, 2005) based on Independent Component Analysis (ICA) (Hyvarinen, 1999; Hyvärinen & Oja, 1999; Lee, 1998) for color images, which can overcome existing problems of watermark detection and extraction as described above. The new ICA-based scheme is found to be efficient in the application of data tracking/tracing for multimedia distribution through the Internet against other digital watermarking schemes. By adopting this ICA-based watermarking scheme, an efficient multimedia distribution framework/protocol for copyright protection can be accomplished. This article is organized as follows: The watermark embedding and extraction algorithms for color image watermarking using the new ICA-based scheme are presented next, followed by a discussion and comments on the results, security issues, summary and future works.


2017 ◽  
Vol 9 (2) ◽  
pp. 1-14
Author(s):  
Fang Sun ◽  
Zhenghui Liu ◽  
Chuanda Qi

The existed content authentication schemes based on digital watermark have some shortcomings. In order to solve the problems, a speech content authentication scheme based on high-capacity watermark embedding is proposed, and the high-capacity embedding method is discussed. Firstly, speech signal is framed and segmented, and the samples of each segment are scrambled. Secondly, DCT is performed on the scrambled signal, and low-frequency coefficients are selected as the watermark embedding domain. Lastly, frame number is mapped to a sequence of integers and embedded into the domain based on the embedding method. Theoretical analysis and experimental evaluation results show that the proposed algorithm is inaudible, robust to desynchronous attacks, enhances the embedding capacity, and improves the security of watermark system.


Sign in / Sign up

Export Citation Format

Share Document