Digital Watermarking Techniques

Author(s):  
Hsien-Chu Wu ◽  
Hei-Chuan Lin

In recent years, services on the Internet have greatly improved and are more reliable than before. However, the easy downloads and duplications on the Internet have created a rush of illicit reproductions. Undoubtedly, the rights of ownership are violated and vulnerable to the predators that stalk the Internet. Therefore, protection against these illegal acts has become a mind-boggling issue. Previously, artists and publishers painstakingly signed or marked their products to prevent illegal use. However with the invention of digital products, protecting rightful ownership has become difficult. Currently, there are two schemes to protect data on the Internet. The first scheme is the traditional cryptography where the important data or secret is to be encrypted by a special process before being transmitted on the Internet. This scheme requires much computational process and time to encrypt or decrypt. On the other hand, the second scheme is steganography where the important message or secret is hidden in the digital media. The hidden data is not perceptible by the human visual system (HVS). The digital watermarking technique is an application of steganography (Chang, Huang, & Chen, 2000; Chen, Chang, & Huang 2001). In order to safeguard copyrights and rightful ownerships, a representative logo or watermark could be hidden in the image or media that is to be protected. The hidden data can be recovered and used as proof of rightful ownership. The watermarking schemes can be grouped into three kinds, largely, dependent on its application. They use the fragile watermark, semi-fragile watermark, and robust watermark, respectively (Fabien, Ross, & Markus, 1999). Fragile watermarks are easily corrupted when the watermarked image is compressed or tampered with. Semi-fragile watermarks can sustain attacks from normal image processing, but are not robust against malicious tampering. Fragile and semi-fragile watermarks are restricted in its use for image authentication and integrity attestation (Fridrich,2002; Fridrich, Memon, & Goljan, 2000). For the robust watermarking, it is always applied in ownership verification and copyright protection (Fridrich, Baldoza, & Simard, 1998; Huang, Wang, & Pan, 2002; Lu, Xu, & Sun, 2005; Solanki, Jacobsoen, Madhow, Manjunath, & Chandrasekaran, 2004). Some basic conditions must be followed: (1) Invisibility: the watermarked image must look similar to its original and any difference invisible to the human visual system. (2) Undetectable: the watermark embedded in the image must not be easily detectable by computing processes or statistical methods. (3) Safety: watermark is encrypted and if accessed by a hacker; cannot be removed or tampered with. (4) Robustness: the watermark is able to withstand normal and/or illegal manipulations, such as compression, blurring, sharpening, cropping, rotations and more. The retrieved watermark is perceptible even after these processes. (5) Independence: the watermark can be retrieved without the original image. Last but not the least, (6) Efficiency: the watermarked image should not require large storage and must also allow for a comparable-sized watermark to be hidden in the media. The proposed method is a VQ-based watermark technique that depends on the structure of a tree growth for grouping the codebook. The scheme is robust. That is, the watermark is irremovable and also can withstand normal compression process, tampering by compression or other malicious attacks. After these attacks, the watermark must be recovered with comparable perceptibility and useful in providing proof of rightful ownerships.

Author(s):  
Khoerul Umam

The spread of digital media on the internet was very broad, fast, and cannot be monitored in a structured manner about what media has been uploaded and distributed on the internet network. The spread of digital media like this was very difficult to detect whether the media that shared was privately owned or that of others that is re-shared by media theft or digital media piracy. One step to overcome the theft of digital works is to give them a watermark, which is an identity that is placed on top of the work. However, this is still considered unsafe because the identity attached can be cut and manipulated again until it is not visible. In addition, the use of Steganography method to hide messages in an image can still be manipulated by adding messages continuously so that it accumulates and damages the original owner of the image. In this article, the author provides a solution called Digital Watermarking, a step of encrypting the data of the original owner of the work and putting it into the image of his work. This watermark cannot be seen clearly, but actually in the media there is encrypted data with a strong Advanced Encryption Standard (AES) method. As a result, a tool that can improve the security of media owner data by combining the AES and Steganogaphy methods in the formation of new media that cannot be changed anymore. So, when the media is stolen and used by others and has been edited, the owner's personal data can never be changed.


2013 ◽  
Vol 798-799 ◽  
pp. 785-789
Author(s):  
Na Na Zhang ◽  
Jia Fa Mao ◽  
Jing Yin ◽  
Xiao Fang Yang

This paper proposes the estimation method for the maximum payload on spatial domain, concentrates on digital watermarking payload in the spatial domain image, on the constraint of perceptual invisibility research, the influence under the factors in Human Visual System. The maximum payload is influenced by the factors which include the size of image, the brightness masking, contrast masking and texture masking of the image. with such as noise visibility function visual model, gets the just noticeable different value to calculate the payload of the image, finally we get the watermarking payload, test and verify it with Matlab simulation experiments.


2014 ◽  
Vol 687-691 ◽  
pp. 3992-3995
Author(s):  
Xiao Qiang Yang

Digital watermarking is a new information security technology, and it uses the information to protect the security of multimedia data hiding technique. Digital watermarking in wavelet domain can make effective use of the human visual system characteristics, and can be compatible with the international compression standard, and the embedding watermark signal energy can be distributed to all of the pixel space. Based on the characteristic of multi-resolution wavelet decomposition and human visual system model matching, digital watermarking algorithm based on wavelet transform is proposed in this paper. The algorithm for tamper proof is designed by quantifying the significant wavelet coefficients to embed watermark sequence. Preprocessing and quantifying the image of this algorithm are studied, which resolves the rounding error and overflow problem brought by the watermarked image pixel values of wavelet transform. Through various attack test and analysis, the experimentation shows that it has strong robustness, can resist many common image attacks, and has strong practicability.


Author(s):  
Juergen Seitz ◽  
Tino Jahnke

In order to solve intellectual property problems of the digital age, two basic procedures are used: “buy and drop,” linked to the destruction of various peer-to-peer solutions and “subpoena and fear,” as the creation of nonnatural social fear by specific legislations. Although customers around the world are willing to buy digital products over networks, the industry is still using conventional procedures to push such a decisive customer impulse back into existing and conventional markets. But digital media, like audio, video, images, and other multimedia documents, can be protected against copyright infringements with invisible, integrated patterns based on steganography and digital watermarking techniques. Digital watermarking is described as a possibility to interface and close the gap between copyright and digital distribution. It is based on steganographic techniques and enables useful rights protection mechanisms. Digital watermarks are mostly inserted as a plain-bit sample or a transformed digital signal into the source data using a key-based embedding algorithm and a pseudo noise pattern. The embedded information is hidden in low-value bits or least significant bits of picture pixels, frequency, or other value domains, and linked inseparably with the source of the data structure. For the optimal application of watermarking technology, a trade-off has to be made between competing criteria such as robustness, nonperceptibility, nondetectability, and security. Most watermarking algorithms are resistant to selected and application-specific attacks. Therefore, even friendly attacks in the form of usual file and data modifications can easily destroy the watermark or falsify it. This paper gives an overview of watermarking technologies, classification, methodology, application, and problems.


2011 ◽  
Vol 271-273 ◽  
pp. 1339-1342
Author(s):  
Yu Hua Zhu

A chaotic digital watermarking scheme based on logistic mapping is tested by experiments. Being of human visual system(HVS) masking properties, the watermarking adapt itself into the image, which ensure the watermark is invisible. Experimental results show that the proposed algorithm has good robustness for the common signal distortion (adding salt & pepper noise, median filtering, etc.) and geometric distortion (lossy compression, shear, etc).


Author(s):  
Hirak Mazumdar ◽  
Piyush Anand ◽  
Saraswati Jee Soni ◽  
Mridul Joshi ◽  
Kumar Rajeev ◽  
...  

Author(s):  
Juergen Seitz ◽  
Tino Jahnke

In order to solve intellectual property problems of the digital age, two basic procedures are used: “buy and drop,” linked to the destruction of various peer-to-peer solutions and “subpoena and fear,” as the creation of nonnatural social fear by specific legislations. Although customers around the world are willing to buy digital products over networks, the industry is still using conventional procedures to push such a decisive customer impulse back into existing and conventional markets. But digital media, like audio, video, images, and other multimedia documents, can be protected against copyright infringements with invisible, integrated patterns based on steganography and digital watermarking techniques. Digital watermarking is described as a possibility to interface and close the gap between copyright and digital distribution. It is based on steganographic techniques and enables useful rights protection mechanisms. Digital watermarks are mostly inserted as a plain-bit sample or a transformed digital signal into the source data using a key-based embedding algorithm and a pseudo noise pattern. The embedded information is hidden in low-value bits or least significant bits of picture pixels, frequency, or other value domains, and linked inseparably with the source of the data structure. For the optimal application of watermarking technology, a trade-off has to be made between competing criteria such as robustness, nonperceptibility, nondetectability, and security. Most watermarking algorithms are resistant to selected and application-specific attacks. Therefore, even friendly attacks in the form of usual file and data modifications can easily destroy the watermark or falsify it. This paper gives an overview of watermarking technologies, classification, methodology, application, and problems.


2018 ◽  
Vol 2018 ◽  
pp. 1-22 ◽  
Author(s):  
Milad Taleby Ahvanooey ◽  
Qianmu Li ◽  
Hiuk Jae Shim ◽  
Yanyan Huang

With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple. Since the text is one of the main available data sources and most widely used digital media on the Internet, the significant part of websites, books, articles, daily papers, and so on is just the plain text. Therefore, copyrights protection of plain texts is still a remaining issue that must be improved in order to provide proof of ownership and obtain the desired accuracy. During the last decade, digital watermarking and steganography techniques have been used as alternatives to prevent tampering, distortion, and media forgery and also to protect both copyright and authentication. This paper presents a comparative analysis of information hiding techniques, especially on those ones which are focused on modifying the structure and content of digital texts. Herein, various text watermarking and text steganography techniques characteristics are highlighted along with their applications. In addition, various types of attacks are described and their effects are analyzed in order to highlight the advantages and weaknesses of current techniques. Finally, some guidelines and directions are suggested for future works.


2001 ◽  
Author(s):  
Brett T. Hannigan ◽  
Alastair M. Reed ◽  
Brett A. Bradley

Sign in / Sign up

Export Citation Format

Share Document