Forensic Watermarking for Secure Multimedia Distribution

Author(s):  
Farook Sattar ◽  
Dan Yu

This chapter discusses on forensic tracking through digital watermarking for secure multimedia distribution. The existing watermarking schemes are elaborated and their assumptions as well as limitations for tracking are discussed. Especially, an Independent Component Analysis (ICA) based watermarking scheme is presented, which overcomes the problems of the existing watermarking schemes. Multiple watermarking techniques are used where one watermark is used for ownership verification and the other one is used to identify the legal user of the distributed content. In the absence of a priori information, i.e. the original data, original watermark, embedding locations as well as the strength, our ICA technique provides efficient watermark extraction scheme with the help of side information. The robustness against common signal processing attacks is presented. Lastly, the challenges in the forensic tracking through digital watermarking techniques are discussed.

Author(s):  
Dan Yu ◽  
Farook Sattar

This chapter focuses on the issue of transaction tracking in multimedia distribution applications through digital watermarking terminology. The existing watermarking schemes are summarized and their assumptions as well as the limitations for tracking are analyzed. In particular, an Independent Component Analysis (ICA)-based watermarking scheme is proposed, which can overcome the problems of the existing watermarking schemes. Multiple watermarking technique is exploited—one watermark to identify the rightful owner of the work and the other one to identify the legal user of a copy of the work. In the absence of original data, watermark, embedding locations and strengths, the ICA-based watermarking scheme is introduced for efficient watermark extraction with some side information. The robustness of the proposed scheme against some common signal-processing attacks as well as the related future work are also presented. Finally, some challenging issues in multimedia transaction tracking through digital watermarking are discussed.


2008 ◽  
pp. 770-792
Author(s):  
D. Yu ◽  
Farook Sattar

This chapter focuses on the issue of transaction tracking in multimedia distribution applications through digital watermarking terminology. The existing watermarking schemes are summarized and their assumptions as well as the limitations for tracking are analyzed. In particular, an Independent Component Analysis (ICA)-based watermarking scheme is proposed, which can overcome the problems of the existing watermarking schemes. Multiple watermarking technique is exploited—one watermark to identify the rightful owner of the work and the other one to identify the legal user of a copy of the work. In the absence of original data, watermark, embedding locations and strengths, the ICA-based watermarking scheme is introduced for efficient watermark extraction with some side information. The robustness of the proposed scheme against some common signal-processing attacks as well as the related future work are also presented. Finally, some challenging issues in multimedia transaction tracking through digital watermarking are discussed.


Author(s):  
Dan Yu ◽  
Farook Sattar

This chapter focuses on the issue of transaction tracking in multimedia distribution applications through digital watermarking terminology. The existing watermarking schemes are summarized and their assumptions as well as the limitations for tracking are analyzed. In particular, an Independent Component Analysis (ICA)-based watermarking scheme is proposed, which can overcome the problems of the existing watermarking schemes. Multiple watermarking technique is exploited—one watermark to identify the rightful owner of the work and the other one to identify the legal user of a copy of the work. In the absence of original data, watermark, embedding locations and strengths, the ICA-based watermarking scheme is introduced for efficient watermark extraction with some side information. The robustness of the proposed scheme against some common signal-processing attacks as well as the related future work are also presented. Finally, some challenging issues in multimedia transaction tracking through digital watermarking are discussed.


Author(s):  
Farook Sattar ◽  
Dan Yu

Today, the Internet is a worldwide broadcasting capability, a mechanism for information dissemination and a medium for collaboration and interaction between individuals and their computers without regard for geographic location. With the rapid evolution of digital networks, digital libraries and World Wide Web (WWW) services, the convenient broadcasting or exposition of digital products on the global network leads easily to illegal copying, modifying and retransmission. The Internet has spawned many copyright issues involving multimedia content distribution. Let’s say an owner would like to sell or distribute a work to legal/registered users only. If the work were subsequently copied/redistributed illegally, how could the owner find who was responsible? Cryptographic techniques provide an effective solution for securing the delivery process and controlling the use of the contents that an user has obtained. However, with flawless transmission through the network, the contents after decryption are exactly the same as the original data. The contents can be copied perfectly infinite times. A user can also manipulate the contents. Digital watermarking (Arnold, Schmucker, & Wolthusen, 2003; Katzenbeisser & Petitcolas, 2000) offers a way to counter copyright piracy on global networks that are not solvable by cryptography. It provides proof and tracking capabilities to illegal copying and distribution of multimedia information. Most existing digital watermarking schemes are based on some assumptions for watermark detection and extraction. Some schemes require the previous knowledge of watermark locations, strengths or some thresholds. In some algorithms, the watermark is estimated with the help of the original watermark information. To ensure the robustness and invisibility of the watermark, the optimum embedding locations are usually different for different images. For a large image database, it could be a disadvantage to require watermark location and strength information for watermark detection and extraction. A large amount of information then needs to be stored. On the Internet, an owner would like to distribute multimedia data by signing different watermarks to different users in order to prevent illegal redistribution of the data by a legal user. In this scenario, watermark detection and extraction algorithms requiring information of either watermark embedding locations and strengths or the original watermark should fail, since one does not know exactly which watermark is embedded in a particular copy of the watermarked image. To this end, we present a new blind watermarking scheme (Yu, Sattar, & Ma, 2002; Yu & Sattar, 2003, 2005) based on Independent Component Analysis (ICA) (Hyvarinen, 1999; Hyvärinen & Oja, 1999; Lee, 1998) for color images, which can overcome existing problems of watermark detection and extraction as described above. The new ICA-based scheme is found to be efficient in the application of data tracking/tracing for multimedia distribution through the Internet against other digital watermarking schemes. By adopting this ICA-based watermarking scheme, an efficient multimedia distribution framework/protocol for copyright protection can be accomplished. This article is organized as follows: The watermark embedding and extraction algorithms for color image watermarking using the new ICA-based scheme are presented next, followed by a discussion and comments on the results, security issues, summary and future works.


2019 ◽  
Vol 9 (21) ◽  
pp. 4596 ◽  
Author(s):  
Tongjing Sun ◽  
Ji Li ◽  
Philippe Blondel

Compressive sensing can guarantee the recovery accuracy of suitably constrained signals by using sampling rates much lower than the Nyquist limit. This is a leap from signal sampling to information sampling. The measurement matrix is key to implementation but limited in the acquisition systems. This article presents the critical elements of the direct under-sampling—compressive sensing (DUS–CS) method, constructing the under-sampling measurement matrix, combined with a priori information sparse representation and reconstruction, and we show how it can be physically implemented using dedicated hardware. To go beyond the Nyquist constraints, we show how to design and adjust the sampling time of the A/D circuit and how to achieve low-speed random non-uniform direct under-sampling. We applied our method to data measured with different compression ratios (volume ratios of collected data to original data). It is shown that DUS-CS works well when the SNR is 3 dB, 0 dB, −3 dB, and −5 dB and the compression ratio is 50%, 20%, and 10%, and this is validated with both simulation and actual measurements. The method we propose provides an effective way for compressed sensing theory to move toward practical field applications that use underwater echo signals.


Author(s):  
A. E. Bondarev

The article is devoted to problems of visual analysis of clusters structures for a multidimensional datasets. For visual analyzing an approach of elastic maps design [1,2] is applied. This approach is quite suitable for processing and visualizing of multidimensional datasets. To analyze clusters in original data volume the elastic maps are used as the methods of original data points mapping to enclosed manifolds having less dimensionality. Diminishing the elasticity parameters one can design map surface which approximates the multidimensional dataset in question much better. Then the points of dataset in question are projected to the map. The extension of designed map to a flat plane allows one to get an insight about the cluster structure of multidimensional dataset. The approach of elastic maps does not require any a priori information about data in question and does not depend on data nature, data origin, etc. Elastic maps are usually combined with PCA approach. Being presented in the space based on three first principal components the elastic maps provide quite good results. The article describes the results of elastic maps approach application to visual analysis of clusters for different multidimensional datasets including medical data.


2012 ◽  
Vol 60 (2) ◽  
pp. 317-321 ◽  
Author(s):  
P. Lipiński

Abstract. Recently, a variety of digital watermarking schemes have been developed for copyright protection of digital images. In robust watermarking, which is used in copyright protection, transform-based algorithms are used to ensure resilience of the watermark to common signal processing attacks. The most frequently used watermarking algorithms for additive watermark embedding involve DCT, DFT, SVD and DWT domains. In this article we verify which domain is optimal for robust, the additive watermark embedding scheme. We demonstrate that in additive watermark embedding the embedding domain plays more important role than the embedding formula.


Author(s):  
Maria A. Milkova

Nowadays the process of information accumulation is so rapid that the concept of the usual iterative search requires revision. Being in the world of oversaturated information in order to comprehensively cover and analyze the problem under study, it is necessary to make high demands on the search methods. An innovative approach to search should flexibly take into account the large amount of already accumulated knowledge and a priori requirements for results. The results, in turn, should immediately provide a roadmap of the direction being studied with the possibility of as much detail as possible. The approach to search based on topic modeling, the so-called topic search, allows you to take into account all these requirements and thereby streamline the nature of working with information, increase the efficiency of knowledge production, avoid cognitive biases in the perception of information, which is important both on micro and macro level. In order to demonstrate an example of applying topic search, the article considers the task of analyzing an import substitution program based on patent data. The program includes plans for 22 industries and contains more than 1,500 products and technologies for the proposed import substitution. The use of patent search based on topic modeling allows to search immediately by the blocks of a priori information – terms of industrial plans for import substitution and at the output get a selection of relevant documents for each of the industries. This approach allows not only to provide a comprehensive picture of the effectiveness of the program as a whole, but also to visually obtain more detailed information about which groups of products and technologies have been patented.


Sign in / Sign up

Export Citation Format

Share Document