Professional Documents
Culture Documents
Anil Kumar M
12 November 2007
1
Contents:
1. Abstract
2. Introduction
3. Watermarking System
4. Types of Digital Watermarking
5. Image Watermarking
6. Applications
7. EC Watermarking Software Example
8. Conclusion
9. References
2
ABSTRACT
With the growing popularity of digital Medias through the World Wide Web,
intellectual property needs copyright protection, prevention of illegal copying and
verification of content integrity. The new data hiding techniques need to be developed that
satisfy the requirements of imperceptibility, robustness, capacity, or data hiding rate and
security of the hidden data etc. At this stage, water marking plays the role of an efficient
tool. The objective of this project is to explore the basic concepts of digital water marking
and various types and techniques involved in the water marking.
1. INTRODUCTION
3
Historically, copyright laws have protected authored content by restricting
distribution and modification of the content. The effectiveness of these laws, however,
depends on three important requirements:
The creator of original content must be able to refute anybody else’s claim to
having created that content. Creators and owners must be able to track the distribution of
their content, so that they can detect attempts to distribute it illegally. Illegal attempts to
alter the content and distribute it as if it were genuine must be detectable.
Today, creators and owners of digital video, audio, and images want assurance that their
content will not be illegally redistributed. Unless content owners are confident that their
works will be properly compensated and acknowledged, few would willingly make their
content publicly available. Also, consumers want assurance that the content they buy is
legitimate. Without mechanisms to support the above requirements, copyright owners
cannot generate proof that somebody else violated copyright law.
The techniques that have been proposed for solving this problem are collectively called
digital watermarking. Digital watermarking refers to the embedding of unobtrusive marks
or labels that can be represented as bits in digital content.
2. WATERMARKING SYSTEMS
2.1 Introduction
Powerful signal processing techniques and ease of modification have made the world shift
towards digital representation of multimedia signals such as image, audio and video. The
rapid growth of Internet is also fuelling this process. The vendors however, fear to put
their multimedia data over the Internet, because there is no way to track the illegal
distribution and violation of copyright protection. Watermarking comes into the scenario
as a powerful solution to this problem. The important feature of watermarking is that the
ordinary users may not detect its presence in the product.
2.2.1 Imperceptibility
The watermark should not be noticeable to the viewer, nor should then watermark
degrade the quality of the original image. However, if a signal is truly imperceptible, then
perceptually based lossy compression algorithms probably, still leave room for an
imperceptible signal to be inserted.
4
2.2.2 Robustness
Watermarks in image and video data should also be immune from geometric image
operations such as rotation, translation, cropping and scaling.
2.2.5 Universal
The same digital watermarking algorithm should apply to all the three media under
considerations. This is potentially helpful in the watermarking of multimedia products.
Also, this feature is conductive to the implementation of audio and image/video
watermarking algorithms on common hardware.
2.2.6 Unambiguous
5
Each owner has a unique watermark or an owner can also put different
watermarks in different objects the marking algorithm incorporates the watermark into
the object. The verification algorithm authenticates the object determining both the
owner and the integrity of the object.
6
Following figure illustrates the Decoding process
7
Fig 3.Types of Watermarking.
Watermarking techniques can be divided into four categories according to the type of
document to be watermarked as follows.
• Image Watermarking
• Video Watermarking
• Audio Watermarking
• Text Watermarking
According to the human perception, the digital watermarks can be divide into three
different types as follows.
• Visible watermark
• Invisible-Robust watermark
• Invisible-Fragile watermark
• Dual watermark
4. IMAGE WATERMARKING
8
Fig 4.Visible watermarking algorithm
Different α and β values. The host image blocks are then modified as follow:
Where xij is the i,j DCT co-efficient of the watermarked image, xij is the
corresponding DCT co-efficient of the original image and wij is the DCT co-
efficient of the watermark image. Fig. 4 gives the schematic representation of
the technique and Fig. 5 show various results.
9
Fig. 5 various results.
5. APPLICATIONS
Digital Watermarks are potentially useful in many applications, including:
5.1 Ownership assertion:
10
Watermarks can be used for ownership assertion. To assert
ownership of an image, Alice can generate a watermarking signal using a secret private
key, and then embed it into the original image. She can then make the watermarked image
publicly available. Later, when Bob contends the ownership of an image derived from this
public image, Alice can produce the unmarked original image and also demonstrate the
presence of her watermark in Bob’s image. Since Alice’s original image is unavailable to
Bob, he cannot do the same. For such a scheme to work, the watermark has to survive
image processing operations aimed at malicious removal. In addition, the watermark
should be inserted in such a manner that it cannot be forged as Alice would not want to be
held accountable for an image that she does not own.
11
5.3 ID card security:
Information in a passport or ID (e.g., passport number, person’s name,
etc.) can also be included in the person’s photo that appears on the ID. By extracting the
embedded information and comparing it to the written text, the ID card can be verified.
The inclusion of the watermark provides an additional level of security in this application.
For example, if the ID card is stolen and the picture is replaced by a forged copy, the
failure in extracting the watermark will invalidate the ID card.
12
6.2 Watermark Setting Screen
CONCLUSION
13
Digital watermarking holds significant promise as one of the keys to protecting
proprietary digital content in the coming years. It focuses on embedding information
inside a digital object such that the embedded information is in separable bound to the
object. Tampering with the watermark or otherwise altering a watermarked object
should always be detectable, and attempting to remove a watermark from its object
should cause to be that object useless. Currently, watermarking suffers from several
drawbacks that prevent it from providing the creators of digital content with a solid
guarantee of copyright protection.
The watermarking research is progressing very fast and numerous researchers from
various fields are focusing to develop some workable scheme. Different companies also
working to get commercial products. We hope some commercial and effective schemes
will be available in future.
References:
Digital Watermarking, by Minerva Yeung, Communications of the ACM.
14
Technical Trials and Legal Tribulations, by Craver, Yeo, and Yeung, Communications of
the ACM,
A Survey of Digital Watermarking, by Elizabeth Ferrill and Matthew Moyer,
http://www.cc.gatech.edu/~mjm/dw/watermarking.html
Digital Watermarking, by James Greenfield,
http://www.cs.uct.ac.za/courses/CS400W/NIS/papers99/jgreenfi/
15