On the Necessity of Finding Content Before Watermark Retrieval

Author(s):  
Martin Steinebach ◽  
Patrick Wolf

Digital watermarking promises to be a mechanism for copyright protection without being a technology for copy prevention. This sometimes makes it hard to convince content owners to use digital watermarking for protecting their content. It is only a passive technology adding information into the content to be protected. Therefore some active mechanism is required that completes the protection. This needs to be a search mechanism that localises potentially watermarked media on the Internet. Only then the passive information embedded in the content can help to fight illegal copies. We discuss strategies and approaches for retrieving watermarks from the Internet with the help of a media search framework. While various Internet domains like HTML pages (the Web), eBay, or FTP are discussed, the focus of this work is on content shared within peer-to-peer (P2P) networks.

Author(s):  
Brij B. Gupta ◽  
Somya Rajan Sahoo ◽  
Prashant Chugh ◽  
Vijay Iota ◽  
Anupam Shukla

In global internet usage, increasing multimedia message, which includes video, audio, images, and text documents, on the web raised a lot of consequences related to copyright. For copyright protection, authentication purpose and forgery detection digital watermarking is the robust way in social network content protection. In this technique, the privacy information is embedded inside the multimedia content like image and video. The protected content embedded inside multimedia content is called watermark-enabled information. To make more effective the process of watermarking, the content encrypted before embedding to the image. Basically, the digital watermarking embedded process implemented in two different domains called spatial and frequency domain. In spatial domain digital watermarking, the watermark information is embedded in the least significant bit of the original image on the basis of bit plane selected and on the basis of the pixels of image, embedding, and detection is performed.


Author(s):  
Kuanchin Chen

Sharing, disseminating, and presenting data in digital format is not just a fad, but it is becoming part of our life. Without careful planning, digitized resources could easily be misused, especially those that are shared across the Internet. Examples of such misuse include use without the owner’s permission, and modification of a digitized resource to fake ownership. One way to prevent such behaviors is to employ some form of copyright protection technique, such as digital watermarks. Digital watermarks refer to the data embedded into a digital source (e.g., images, text, audio, or video recording). They are similar to watermarks in printed materials as a message inserted into the host media typically becomes an integral part of the media. Apart from traditional watermarks in printed forms, digital watermarks may also be invisible, may be in the forms other than graphics, and may be digitally removed.


Author(s):  
Farook Sattar ◽  
Dan Yu

Today, the Internet is a worldwide broadcasting capability, a mechanism for information dissemination and a medium for collaboration and interaction between individuals and their computers without regard for geographic location. With the rapid evolution of digital networks, digital libraries and World Wide Web (WWW) services, the convenient broadcasting or exposition of digital products on the global network leads easily to illegal copying, modifying and retransmission. The Internet has spawned many copyright issues involving multimedia content distribution. Let’s say an owner would like to sell or distribute a work to legal/registered users only. If the work were subsequently copied/redistributed illegally, how could the owner find who was responsible? Cryptographic techniques provide an effective solution for securing the delivery process and controlling the use of the contents that an user has obtained. However, with flawless transmission through the network, the contents after decryption are exactly the same as the original data. The contents can be copied perfectly infinite times. A user can also manipulate the contents. Digital watermarking (Arnold, Schmucker, & Wolthusen, 2003; Katzenbeisser & Petitcolas, 2000) offers a way to counter copyright piracy on global networks that are not solvable by cryptography. It provides proof and tracking capabilities to illegal copying and distribution of multimedia information. Most existing digital watermarking schemes are based on some assumptions for watermark detection and extraction. Some schemes require the previous knowledge of watermark locations, strengths or some thresholds. In some algorithms, the watermark is estimated with the help of the original watermark information. To ensure the robustness and invisibility of the watermark, the optimum embedding locations are usually different for different images. For a large image database, it could be a disadvantage to require watermark location and strength information for watermark detection and extraction. A large amount of information then needs to be stored. On the Internet, an owner would like to distribute multimedia data by signing different watermarks to different users in order to prevent illegal redistribution of the data by a legal user. In this scenario, watermark detection and extraction algorithms requiring information of either watermark embedding locations and strengths or the original watermark should fail, since one does not know exactly which watermark is embedded in a particular copy of the watermarked image. To this end, we present a new blind watermarking scheme (Yu, Sattar, & Ma, 2002; Yu & Sattar, 2003, 2005) based on Independent Component Analysis (ICA) (Hyvarinen, 1999; Hyvärinen & Oja, 1999; Lee, 1998) for color images, which can overcome existing problems of watermark detection and extraction as described above. The new ICA-based scheme is found to be efficient in the application of data tracking/tracing for multimedia distribution through the Internet against other digital watermarking schemes. By adopting this ICA-based watermarking scheme, an efficient multimedia distribution framework/protocol for copyright protection can be accomplished. This article is organized as follows: The watermark embedding and extraction algorithms for color image watermarking using the new ICA-based scheme are presented next, followed by a discussion and comments on the results, security issues, summary and future works.


Author(s):  
Maria Manuela Cunha ◽  
Goran D. Putnik ◽  
Joaquim Pereira da Silva ◽  
José Paulo Oliveira Santos

The Agile/Virtual Enterprise (A/V E) model is considered a highly dynamic version of the Virtual Enterprise (VE) model, and its implementation presents several requirements in order to keep the VE partnership aligned with the market, i.e., with business. Such requirements include (1) the reduction of reconfiguration costs and effort, and (2) the capability to preserve the firms’ private knowledge on products or processes. These must be assured by a specific environment, or, in other words, by organizational infrastructures as a meta-organizational structure for VE design (or integration) and operation, such as the Market of Resources – an environment developed by the authors to cope with the highlighted requirements, and assuring a better performance than the traditional environments such as the Internet search engines or the electronic marketplaces. The Chapter describes the functionalities of the Market of Resources and explains how does it supports A/V E integration, and addresses some technologies that could support A/V E integration within the Market of Resources, namely XML/ebXML and Webservices. The Chapter proposes an architecture to support the operation of the Market of Resources, representing a fusion of the peer-to-peer (P2P) architecture with the client-server architecture, as a variant of P2P architecture. Also, a laboratory implementation of the web services for manufacturing is presented too.


2013 ◽  
Vol 310 ◽  
pp. 650-655
Author(s):  
Yun Fei Jiang ◽  
Yong Gang Fu

Copyright protection has drawn much attentions especially in the advent of computer and the internet. Illagal copying of digital multimedia has been much easier because of widely using of the modern technologies.This paper proposes a novel digital watermarking algorithm based on the numbers of the blocked middle DCT positive and negative coefficients. Embedding watermark into the middle frequency of DCT is a perfect idea and it can receive a trade-off between robustness and imperceptibility.We utilized the embedding strength to get a balance between their robustness and imperceptibility. The results show that the algorithm is robust to print and scan process.


2014 ◽  
Vol 2014 ◽  
pp. 1-20 ◽  
Author(s):  
Hongyan Mei ◽  
Yujie Zhang ◽  
Xiangwu Meng

Efficient searching for resources has become a challenging task with less network bandwidth consumption in unstructured peer-to-peer (P2P) networks. Heuristic search mechanism is an effective method which depends on the previous searches to guide future ones. In the proposed methods, searching for high-repetition resources is more effective. However, the performances of the searches for nonrepetition or low-repetition or rare resources need to be improved. As for this problem, considering the similarity between social networks and unstructured P2P networks, we present a credibility search algorithm based on different queries according to the trust production principle in sociology and psychology. In this method, queries are divided into familiar queries and unfamiliar queries. For different queries, we adopt different ways to get the credibility of node to its each neighbor. And then queries should be forwarded by the neighbor nodes with higher credibility. Experimental results show that our method can improve query hit rate and reduce search delay with low bandwidth consumption in three different network topologies under static and dynamic network environments.


Author(s):  
Maria Manuela Cruz-Cunha ◽  
Goran D. Putnik ◽  
Joaquim Pereira da Silva ◽  
José Paulo Oliveira Santos

The agile/virtual enterprise (A/V E) model is considered a highly dynamic version of the virtual enterprise (VE) model, and its implementation presents several requirements in order to keep the VE partnership aligned with the market, that is, with business. Such requirements include (1) the reduction of reconfiguration costs and effort, and (2) the capability to preserve the firms’ private knowledge on products or processes. These must be assured by a specific environment, or, in other words, by organizational infrastructures as a meta-organizational structure for VE design (or integration) and operation, such as the Market of Resources—an environment developed by the authors to cope with the highlighted requirements, and assuring a better performance than the traditional environments such as the Internet search engines or the electronic marketplaces. The chapter describes the functionalities of the Market of Resources and explains how does it supports A/V E integration, and addresses some technologies that could support A/V E integration within the Market of Resources, namely XML/ebXML and Webservices. The chapter proposes an architecture to support the operation of the Market of Resources, representing a fusion of the peer-to-peer (P2P) architecture with the client-server architecture, as a variant of P2P architecture. Also, a laboratory implementation of the Web services for manufacturing is presented too.


2018 ◽  
Vol 2018 ◽  
pp. 1-22 ◽  
Author(s):  
Milad Taleby Ahvanooey ◽  
Qianmu Li ◽  
Hiuk Jae Shim ◽  
Yanyan Huang

With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple. Since the text is one of the main available data sources and most widely used digital media on the Internet, the significant part of websites, books, articles, daily papers, and so on is just the plain text. Therefore, copyrights protection of plain texts is still a remaining issue that must be improved in order to provide proof of ownership and obtain the desired accuracy. During the last decade, digital watermarking and steganography techniques have been used as alternatives to prevent tampering, distortion, and media forgery and also to protect both copyright and authentication. This paper presents a comparative analysis of information hiding techniques, especially on those ones which are focused on modifying the structure and content of digital texts. Herein, various text watermarking and text steganography techniques characteristics are highlighted along with their applications. In addition, various types of attacks are described and their effects are analyzed in order to highlight the advantages and weaknesses of current techniques. Finally, some guidelines and directions are suggested for future works.


Sign in / Sign up

Export Citation Format

Share Document