Digital Watermarking for Multimedia Transaction Tracking

Author(s):  
Dan Yu ◽  
Farook Sattar

This chapter focuses on the issue of transaction tracking in multimedia distribution applications through digital watermarking terminology. The existing watermarking schemes are summarized and their assumptions as well as the limitations for tracking are analyzed. In particular, an Independent Component Analysis (ICA)-based watermarking scheme is proposed, which can overcome the problems of the existing watermarking schemes. Multiple watermarking technique is exploited—one watermark to identify the rightful owner of the work and the other one to identify the legal user of a copy of the work. In the absence of original data, watermark, embedding locations and strengths, the ICA-based watermarking scheme is introduced for efficient watermark extraction with some side information. The robustness of the proposed scheme against some common signal-processing attacks as well as the related future work are also presented. Finally, some challenging issues in multimedia transaction tracking through digital watermarking are discussed.

2008 ◽  
pp. 770-792
Author(s):  
D. Yu ◽  
Farook Sattar

This chapter focuses on the issue of transaction tracking in multimedia distribution applications through digital watermarking terminology. The existing watermarking schemes are summarized and their assumptions as well as the limitations for tracking are analyzed. In particular, an Independent Component Analysis (ICA)-based watermarking scheme is proposed, which can overcome the problems of the existing watermarking schemes. Multiple watermarking technique is exploited—one watermark to identify the rightful owner of the work and the other one to identify the legal user of a copy of the work. In the absence of original data, watermark, embedding locations and strengths, the ICA-based watermarking scheme is introduced for efficient watermark extraction with some side information. The robustness of the proposed scheme against some common signal-processing attacks as well as the related future work are also presented. Finally, some challenging issues in multimedia transaction tracking through digital watermarking are discussed.


Author(s):  
Dan Yu ◽  
Farook Sattar

This chapter focuses on the issue of transaction tracking in multimedia distribution applications through digital watermarking terminology. The existing watermarking schemes are summarized and their assumptions as well as the limitations for tracking are analyzed. In particular, an Independent Component Analysis (ICA)-based watermarking scheme is proposed, which can overcome the problems of the existing watermarking schemes. Multiple watermarking technique is exploited—one watermark to identify the rightful owner of the work and the other one to identify the legal user of a copy of the work. In the absence of original data, watermark, embedding locations and strengths, the ICA-based watermarking scheme is introduced for efficient watermark extraction with some side information. The robustness of the proposed scheme against some common signal-processing attacks as well as the related future work are also presented. Finally, some challenging issues in multimedia transaction tracking through digital watermarking are discussed.


Author(s):  
Farook Sattar ◽  
Dan Yu

This chapter discusses on forensic tracking through digital watermarking for secure multimedia distribution. The existing watermarking schemes are elaborated and their assumptions as well as limitations for tracking are discussed. Especially, an Independent Component Analysis (ICA) based watermarking scheme is presented, which overcomes the problems of the existing watermarking schemes. Multiple watermarking techniques are used where one watermark is used for ownership verification and the other one is used to identify the legal user of the distributed content. In the absence of a priori information, i.e. the original data, original watermark, embedding locations as well as the strength, our ICA technique provides efficient watermark extraction scheme with the help of side information. The robustness against common signal processing attacks is presented. Lastly, the challenges in the forensic tracking through digital watermarking techniques are discussed.


2012 ◽  
Vol 60 (2) ◽  
pp. 317-321 ◽  
Author(s):  
P. Lipiński

Abstract. Recently, a variety of digital watermarking schemes have been developed for copyright protection of digital images. In robust watermarking, which is used in copyright protection, transform-based algorithms are used to ensure resilience of the watermark to common signal processing attacks. The most frequently used watermarking algorithms for additive watermark embedding involve DCT, DFT, SVD and DWT domains. In this article we verify which domain is optimal for robust, the additive watermark embedding scheme. We demonstrate that in additive watermark embedding the embedding domain plays more important role than the embedding formula.


Author(s):  
Farook Sattar ◽  
Dan Yu

Today, the Internet is a worldwide broadcasting capability, a mechanism for information dissemination and a medium for collaboration and interaction between individuals and their computers without regard for geographic location. With the rapid evolution of digital networks, digital libraries and World Wide Web (WWW) services, the convenient broadcasting or exposition of digital products on the global network leads easily to illegal copying, modifying and retransmission. The Internet has spawned many copyright issues involving multimedia content distribution. Let’s say an owner would like to sell or distribute a work to legal/registered users only. If the work were subsequently copied/redistributed illegally, how could the owner find who was responsible? Cryptographic techniques provide an effective solution for securing the delivery process and controlling the use of the contents that an user has obtained. However, with flawless transmission through the network, the contents after decryption are exactly the same as the original data. The contents can be copied perfectly infinite times. A user can also manipulate the contents. Digital watermarking (Arnold, Schmucker, & Wolthusen, 2003; Katzenbeisser & Petitcolas, 2000) offers a way to counter copyright piracy on global networks that are not solvable by cryptography. It provides proof and tracking capabilities to illegal copying and distribution of multimedia information. Most existing digital watermarking schemes are based on some assumptions for watermark detection and extraction. Some schemes require the previous knowledge of watermark locations, strengths or some thresholds. In some algorithms, the watermark is estimated with the help of the original watermark information. To ensure the robustness and invisibility of the watermark, the optimum embedding locations are usually different for different images. For a large image database, it could be a disadvantage to require watermark location and strength information for watermark detection and extraction. A large amount of information then needs to be stored. On the Internet, an owner would like to distribute multimedia data by signing different watermarks to different users in order to prevent illegal redistribution of the data by a legal user. In this scenario, watermark detection and extraction algorithms requiring information of either watermark embedding locations and strengths or the original watermark should fail, since one does not know exactly which watermark is embedded in a particular copy of the watermarked image. To this end, we present a new blind watermarking scheme (Yu, Sattar, & Ma, 2002; Yu & Sattar, 2003, 2005) based on Independent Component Analysis (ICA) (Hyvarinen, 1999; Hyvärinen & Oja, 1999; Lee, 1998) for color images, which can overcome existing problems of watermark detection and extraction as described above. The new ICA-based scheme is found to be efficient in the application of data tracking/tracing for multimedia distribution through the Internet against other digital watermarking schemes. By adopting this ICA-based watermarking scheme, an efficient multimedia distribution framework/protocol for copyright protection can be accomplished. This article is organized as follows: The watermark embedding and extraction algorithms for color image watermarking using the new ICA-based scheme are presented next, followed by a discussion and comments on the results, security issues, summary and future works.


2019 ◽  
Vol 11 (1) ◽  
pp. 100-113
Author(s):  
Jian Li ◽  
Jinwei Wang ◽  
Shuang Yu ◽  
Xiangyang Luo

This article proposes a novel robust reversible watermarking algorithm. The proposed watermarking scheme is reversible because the original image can be recovered after extracting watermarks from the watermarked image, as long as it is not processed by an attacker. The scheme is robust because watermarks can still be extracted from watermarked images, even if it is undergone some malicious or normal operations like rotation and JPEG compression. It first selects two circles, which are centred at the centroid and the centre of image. Then, statistic quantities of these two circles are employed for robust watermark embedding by altering the pixels' value. The side information generated by above embedding process will be embedded as fragile watermarks at another stage to ensure the recovery of original image. Experimental results verify the high performance of the proposed algorithm in resisting various attacks, including JPEG compression and geometric transformation.


2018 ◽  
Vol 7 (4.6) ◽  
pp. 39 ◽  
Author(s):  
Ashwani Kumar ◽  
Paras Jain ◽  
Jabir Ali ◽  
Shrawan Kumar ◽  
John Samuel Babu

The protocol allows a content provider to detect duplicate copy of a digital content and restrict the content provider who blames the innocent customer. This paper, proposed a lightweight protocol, which uses composite signal representation and time-stamping for watermark embedding and extraction. We have used timestamp, which tells at what time the digital content was created, signed or verified to digital watermarking algorithms and uses the composite signal representation for minimizing the overhead and bandwidth due to the use of composite signals. The suggested protocol uses composite signal representations and timestamp based methods with digital watermarking scheme for content authentication. Our watermark embedding and detection   algorithm achieves a balance between robustness and image visual quality.     Simulation results demonstrate that the algorithm used by proposed protocol has an increase robustness and good quality of watermark images as well and withstand against various image-processing attacks. 


2020 ◽  
Vol 20 (01) ◽  
pp. 2050002
Author(s):  
Navneet Yadav ◽  
Navdeep Goel

Robust and invisible watermarking provides a feasible solution to prove the ownership of the genuine content owner. Different watermarking algorithms have been presented by the researchers in the past but no algorithm could be termed as perfect. Proposed work puts forward a novel image-adaptive method of embedding a binary watermark in the image in a transparent manner. Discrete wavelet transform (DWT), singular value decomposition (SVD) and discrete cosine transform (DCT) are used together in the proposed hybrid watermarking scheme. Image-adaptive nature of the scheme is reflected in the usage of only high entropy [Formula: see text] blocks for the watermark embedding. Binary watermark is embedded in the DCT coefficients using a flexible strength derived from the means of the DCT coefficients. This flexible strength factor (SF) has different value for the DCT coefficients originated from different [Formula: see text] blocks. Any desired level of visual quality could be obtained by varying the adjusting parameter of the flexible SF. Side information generated in the watermark embedding is used in the detection of watermark. The presented watermarking technique shows better robustness in comparison to the three contemporary watermarking techniques.


Author(s):  
Nedeljko Cvejic ◽  
Tapio Seppänen

This chapter gives a general overview of the audio watermarking fundamental definitions. Audio watermarking algorithms are characterized by five essential properties, namely: perceptual transparency, watermark bit rate, robustness, blind/informed watermark detection and security. Chapter also reviews the most common signal processing manipulations that are frequently applied to the watermarked audio in order to prevent detection of the embedded watermark. Finally, several application areas for digital audio watermarking are presented and advantages of digital watermarking over standard technologies examined.


Author(s):  
Chun-Shien Lu ◽  
Hong-Yuan Mark Liao ◽  
Jan-Ru Chen ◽  
Kuo-Chin Fan

Digital watermarking has been proposed as very useful technology in the protection of digital data such as image, audio, video, formatted documents (PDF or PS), and 3D objects. In the literature, most of the existing watermarking approaches are conducted on images. However, video is even more useful and should be protected with higher priority. In particular, video sequences usually contain rich properties that images do not have. On the other hand, the types of attacks applied on a video are much different from those applied on an image. In this chapter, we will focus ourselves specifically on video watermarking. The content of this chapter is divided into two parts. In the first part, the existing video watermarking techniques are briefly reviewed. We have pointed out their advantages and disadvantages to realize what can be done about video watermarking. In the second part, we propose a compressed domain video watermarking scheme for copyright protection. For the sake of real-time video watermark detection, our method is directly conducted in the MPEG-2 bitstream. More specifically, watermarks are inserted into the VLC domain. We shall discuss how to select proper data in a video bitstream to embed watermarks while preserving perceptual fidelity. In addition, video watermarks are embedded by a new proposed watermarking technique, which is based on the concept of communications with side information. The power of our method is reflected by its robust capability against attacks. Future work will also be pointed out to further improve the current scheme


Sign in / Sign up

Export Citation Format

Share Document