Escolar Documentos
Profissional Documentos
Cultura Documentos
1.Introduction
Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or
to show the identity of its owners. A digital watermark is a kind of marker covertly embedded in a
noise-tolerant signal such as audio or image data. It is typically used to identify ownership of the
copyright of such signal. It is prominently used for tracing copyright infringements and
for banknote authentication. Like traditional watermarks, digital watermarks are only perceptible
under certain conditions, i.e. after using some algorithm, and imperceptible anytime else. If a digital
watermark distorts the carrier signal in a way that it becomes perceivable, it is of no use.
Since a digital copy of data is the same as the original, digital watermarking is a passive
protection tool. It just marks data, but does not degrade it or control access to the data. One
application of digital watermarking is source tracking. A watermark is embedded into a digital
signal at each point of distribution. If a copy of the work is found later, then the watermark may be
retrieved from the copy and the source of the distribution is known. This technique reportedly has
been used to detect the source of illegally copied movies.
1.1.
2.
Watermarking
A distinguishing mark impressed on paper during manufacture; visible when paper is held up
to the light (e.g. $ Bill)
3.
Physical objects can be watermarked using specialdyes and inks or during paper
manufacturing.
(a) Images
(b) Video
(c) Audio
Fig 2.1
A digital watermark is a pattern of bits inserted into a digital image, audio or video file that
identifies the file's copyright information (author, rights, etc.). The name watermark is derived
from the faintly visible marks imprinted on organizational stationery.
In addition, the bits representing the watermark must be scattered throughout the file in such
a way that they cannot be identified and manipulated. And finally, a digital watermark must be
robust enough to survive changes to the file its embedded in, such as being saved using a lossy
compression algorithm eg: JPEG.
Satisfying all these requirements is no easy feat, but there are a number of companies
offering competing technologies. All of them work by making the watermark appear as noise that is,
random data that exists in most digital files anyway.
Digital Watermarking works by concealing information within digital data, such that it
cannot be detected without special software with the purpose of making sure the concealed data is
present in all copies of the data that are made whether legally or otherwise, regardless of attempts to
damage/remove it.
The purpose of digital watermarks is to provide copyright protection for intellectual property
that is in digital format.
Fig 2.2
As seen above in Fig 3.2,Alice creates an original image and watermarks it before passing it
to Bob. If Bob claims the image and sells copies to other people Alice can extract her watermark
from the image proving her copyright to it.
The caveat there is that Alice will only be able to prove her copyright of the image if Bob
hasnt managed to modify the image such that the watermark is damaged enough to be undetectable
or added his own watermark such that it is impossible to discover which watermark was embedded
first.
Information
Hiding
Steganography
Cryptography
Watermarking
that no one apart from the intended recipient knows of the existence of the message. The existence of
information is secret.
2. Cryptography
The conversion of data into a secret code for transmission over a public network. Today, most
cryptography is digital, and the original text ("plaintext") is turned into a coded equivalent called
"cipher text" via an encryption algorithm. The cipher text is decrypted at the receiving end and
turned back into plaintext.
EncryptionDecryption
Plaintext
cipher text
Plaintext
3. Watermarking
A distinguishing mark impressed on paper during manufacture; visible when paper is held
up to the light (e.g. $ Bill)
Physical objects can be watermarked using special dyes and inks or during paper
manufacturing.
2.1
How
Watermarking
is
Different
from
Steganography
and
Cryptography.
2.1.1 Steganography vs. Watermarking
The main goal of steganography is to hide a message m in some audio or video (cover) data
d, to obtain new data d', practically indistinguishable from d, by people, in such a way that an
eavesdropper cannot detect the presence of m in d'.
The main goal of watermarking is to hide a message m in some audio or video (cover) data d,
to obtain new data d', practically indistinguishable from d, by people, in such a way that an
eavesdropper cannot remove or replacement in d'.
It is also often said that the goal of steganography is to hide a message in one-to-one
communications and the goal of watermarking is to hide message in one-to-many communications.
Shortly, one can say that cryptography is about protecting the content of messages,
steganography is about concealing its very existence.
Steganography methods usually do not need to provide strong security against removing or
modification of the hidden message. Watermarking methods need to be very robust to attempts to
remove or modify a hidden message.
2.1.2 Cryptography vs. Watermarking
Watermarking is a totally different technique from cryptography. Cryptography only provides
security by encryption and decryption. However, encryption cannot help the seller monitor how a
legitimate customer handles the content after decryption. So there is no protection after decryption.
Unlike cryptography, watermarks can protect content even after they are decoded.
Other difference is cryptography is only about protecting the content of the messages.
Because watermarks are inseparable from the cover in which they are embedded, so in addition to
protecting content they provide many other applications also, like copyright protection, copy
protection, ID card security etc.
Robustness: piracy attack or image processing should not affect the embedded watermark.
The first watermarking example similar to the digital methods nowadays appeared in
1954.The Muzak Corporation filed a patent for watermarking musical Work. An
identification Work was inserted in music by intermittently applying a narrow notch filter
centred at 1KHz.
3. WATERMARKING CLASSIFICATION
Digital Watermarking techniques can be classified in a number of ways depending on different
parameters. Various types of watermarking techniques are enlisted below.
Robust & Fragile Watermarking
Robust watermarking is a technique in which modification to the watermarked content will
not affect the watermark. As opposed to this, fragile watermarking is a technique in which
watermark gets destroyed when watermarked content is modified or tampered with.
Visible & Transparent Watermarking
Visible watermarks are ones, which are embedded in visual content in such a way that they
are visible when the content is viewed. Transparent watermarks are imperceptible and they cannot be
detected by just viewing the digital content.
Public & Private Watermarking
In public watermarking, users of the content are authorized to detect the watermark while in
private watermarking the users are not authorized to detect the watermark.
Asymmetric & Symmetric Watermarking
Asymmetric watermarking (also called asymmetric key watermarking) is a technique where
different keys are used for embedding and detecting the watermark. In symmetric watermarking (or
symmetric key watermarking) the same keys are used for embedding and detecting watermarks.
Steganographic &Non-Steganographic watermarking
Steganographic watermarking is the technique where content users are unaware of the
presence of a watermark. In nonsteganographic watermarking, the users are aware of the presence of
a watermark. Steganographic watermarking is used in fingerprinting applications while
nonsteganographic watermarking techniques can be used to deter piracy.
7
4.1 Embedding
In embedding, an algorithm accepts the host and the data to be embedded, and produces a
watermarked signal.
Inputs to the scheme are the watermark, the cover data and an optional public or secret key.
The outputs are watermarked data. The key is used to enforce security.
4.2 Attacks
The watermarked digital signal is transmitted or stored, usually transmitted to another person.
If this person makes a modification, this is called an attack. While the modification may not be
malicious, the term attack arises from copyright protection application, where pirates attempt to
remove the digital watermark through modification. There are many possible modifications, for
8
example, lossy compression of the data (in which resolution is diminished), cropping an image or
video, or intentionally adding noise.
4.3 Extraction
Extraction is an algorithm which is applied to the attacked signal to attempt to extract the watermark
from it. If the signal was unmodified during transmission, then the watermark still is present and it
may be extracted.
Inputs to the scheme are the watermarked data, the secret or public key and, depending on the
method, the original dataand/or the original watermark. The output is the recoveredwatermarked W
or some kind of confidence measure indicatinghow likely it is for the given watermark at the input to
be present in the data under inspection.
Watermarking
Frequency
Domain
Watermarking
Spatial Domain
Watermarking
Least
Significant Bit
Discrete Cosine
Transformation
Patch Work
Discrete
Wavelet
Transformation
Advantages
Disadvantages
Watermarking doesnt prevent image copying but we can track down and detect ownership
of copied images.
Watermarks vanishes if someone manipulates the image.
Resizing, compressing images from one file type to another may diminish the watermark and
it becomes unreadable.
6. APPLICATIONS OF WATERMARKING
6.1 Security
In the field of data security, watermarks may be used for certification, authentication, and
conditional access.
6.1.1 Certification
It is an important issue for official documents, such as identity cards or passports. Digital
watermarking allows to mutually link information on the documents. That means some information
is written twice on the document, for instance, the name of a passport owner is normally printed in
clear text and is also hidden as an invisible watermark in the photo of the owner. If anyone would
intend to duplicate the passport by replacing the photo, it would be possible to detect the change by
scanning the passport and verifying the name hidden in the photo does not match any more the name
printed on the passport.
6.1.2 Authentication
The goal of this application is to detect alterations and modifications in an image. Suppose
we have picture of a car that has been protected with a watermarking technology. And if, the same
picture is shown but with a small modification, say, the numbers on the license plate has been
changed. Then after running the watermark detection program on the tampered photo, the tampered
areas will be indicated in different color and we can clearly say that the detected area corresponds to
the modifications applied to the original photo.
10
11
CONCLUSION
Digital watermarking has rapidly advanced from theory to practice. This report focuses on
how watermarking techniques are advantageous over stegnography, cryptography and also focuses
on different types and domains of digital watermarking techniques.
A common application requirement for the watermarks is that they resist attacks that would
remove it. Some of the watermarks being attack-resistant may be accidentally removed by
unintended attacks such as cropping, reduction, or compression. There are also other techniques like
blind watermarking (which uses multiple watermarks and also no need of original image at the of
watermark recovery), which uses watermark nesting and encryption. Nesting means it embeds an
extra watermark into the main watermark and then embeds the main watermark into the cover image.
REFERENCES
[1]
L. Boney, A. Tewfik, and K. Hamdy, Digital watermarks for audio signals, in IEEE Proc.
Multimedia, 1996, pp. 473-480.
[2]
[3]
SIGNAL
PROCESSING
MAGAZINE,
1053-
5888/01/$10.002001IEEE
[4]
12