Escolar Documentos
Profissional Documentos
Cultura Documentos
Digital information can be copied any number of times from one medium to another; they
can be transmitted through networks, etc., all without compromising the quality of the data.
There is no way to distinguish between an original electronic documents and its copy. It is
easy to change any part of an un protected electronic document. One possibility here is to
replace original signatures with cryptographic methods .Digital signature is data items
formed by the signatory and created from the document that is to be signed.
It relates the documents to the signatory in a secure and reliable way. The signature of one
document cannot be used to sign another, even if the two documents in question differ by
just a single character. Digital watermarking has been proposed as one way to accomplish
this.
Also advanced Internet services enabled the users to create copy and distribute multimedia
products such as audio, video, and still images with much ease and less effort, minimum or
no cost, and in less time.
Though it encouraged trading on the Internet, but on the other hand it has created the
problem of illegal copying or copyright infringement. E-commerce has become a
significant business with well-established online shopping services, and online delivery of
digital media such as audio and video. Thus, protection of digit alrights assumed a primary
importance in the digital age.
Although paper was invented in China over a thousand years ago, the Europeans only
began to manufacture it in the 11th and 12th centuries, after Muslims had established the
first paper mills in Spain. Soon after its invention, Chinese merchants and missionaries
transmitted paper, and knowledge of papermaking, to neighboring lands such as Japan,
Korea, and Central Asia. It was there that Muslims first encountered it in the 8th century.
Islamic civilization spread knowledge of paper and papermaking to Iraq, Syria, Egypt,
North Africa and
Page | 1
finally, Spain .Most accounts of the history of paper focus either on its Origins in China or
its development in Europe, and simply disregard the centuries when knowledge of paper
and papermaking spread throughout the Islamic lands. Some of this neglect is due to the
difficulty of studying Islamic paper, since Islamic papers, unlike later European papers, do
not have watermarks and are consequently very difficult to localize and date .This explains
why the oldest watermarked paper found in archives dates back to 1292, in Fabriano, Italy.
The marks were made by adding thin wire patterns to the paper molds. The paper would be
slightly thinner where the wire was and hence more transparent. At the end of 13th century
about 40 paper mills were sharing the paper market in Fabriano and producing paper with
different format, quality and price. Competition was very high and it was difficult for any
party to keep track of paper provenance and thus format and quality identification. The
introduction of watermarks was the best method to eliminate any possibility of confusion.
The digitization of today’s world has expanded the watermarking concept to include digital
approaches for use in authenticating
ownership claims and protecting proprietary interests .
Information hiding (or data hiding) is a general term encircling a wide range of problems
beyond the embedding messages in content. The term hiding can refer to either for
information imperceptibility (watermarking) or information secrecy (steganography).
Watermarking and steganography are two important sub disciplines of information hiding
that are closely related to each other and may be coincide but with different underlying
properties, requirements and designs, thus result in different technical solutions
.Steganography is a term derived from the Greek words steganos, which means “covered,”
and graphia, which means “writing.” It is the art of concealed communication. The
existence of a message is secret.
Examples include invisible ink which would glow over a flame used by both the British and
Americans to communicate secretly during the American Revolution and hidden text using
invisible ink to print small dots above or below letters and by changing the heights of letter-
strokes in texts used by German spies in World Wars. Watermarking which a term used
back from paper watermarking, on the other hand has the additional concept of resilience
against attempts to remove the hidden data. This is because the information hidden by
watermarking systems is
always associated to the digital object to be protected or its owner while stenographic
systems just hide any information. Robustness criteria are also different since
steganography mainly concerns with detection of hidden message while watermarking
concerns potential removal by a pirate. Besides, steganography typically relates to covert
point-to-point communication while watermarking is usually one-to-many
Page | 2
Digital watermarking can be defined as the process of embedding embedding a certain
piece of information (technically known as watermark) into multimedia content including
text documents, images, audio or video streams, such that the watermark can be detected or
extracted later to make an assertion about the data. A generalized watermark model consists
of watermark encoding and detection processes as shown in Fig. 1 and Fig. 2 .The inputs to
the embedding process are the watermark, the cover object and a secret key. The key is
used to enforce security and to protect the watermark. The output of the watermarking
scheme is the watermarked data. The channel for the watermarked data could be a lossy,
noisy, unreliable channel. Thus the received data may be different from the original
watermarked data. The inputs for extraction are the received watermarked data and the key
corresponding to the embedding key. The output of the watermark recovery process is the
recovered watermark
Page | 3
Fig. 2. Watermark detection
Page | 4
Page | 5
Page | 6
Page | 7
2. Purpose of Digital Watermarking
Watermarks added to digital content serve a variety of purposes. The following list details
six purposes of digital watermarking.
Page | 8
2.1 Examples of watermarking
EXAMPLE: Web crawlers or media player devices could look for watermarks in content
they crawl or play, and then record information about where and when specific marked
files are found or played
EXAMPLE: A media player device, upon reading a watermark in a file the user is
accessing, could display additional information that might interest the user, such as
metadata (information about the content), a special commercial offer, or confirmation that
the content is genuine and has not been altered. Enabling or disabling access to particular
capabilities or content.
Page | 9
3. Requirements of watermarks
To be effective in the protection of the ownership of intellectual property, the invisibly
watermarked image should satisfy several criteria:
One can understand the challenge of researchers in this field since the above requirements
compete, each with the others. The litmus test of a watermarking method would be that it is
accepted and used on a large, commercial scale, and that it stands up in a court of law.
None of the digital techniques have yet to meet these tests.
Page | 10
4. Properties of digital watermarking techniques
Robustness - Describes whether the watermark can be reliably detected after media
operations. It is important to note that robustness does not include attacks on the
embedding scheme that are based on the knowledge of the embedding algorithm or
on the availability of the detector function. Robustness means resistance to “blind”,
non-targeted modifications, or common media operations. For example the Stirmark
or 2Mosaik tools attack the robustness of watermarking algorithms with geometrical
distortions. For manipulation recognition the watermark has to be fragile to detect
altered media.
Invertibility - Describes the possibility to produce the original data during the
watermark retrieval.
Page | 11
Complexity - Describes the effort and time we need to embed and retrieve a
watermark. This parameter is essential if we have real time applications. Another
aspect addresses whether the original data in the retrieval process or not. We need to
distinguish between non-blind and blind watermarking schemes.
Watermarking techniques can be divided into two categories according to the type of
working domain:-
Page | 12
Spatial watermarking can also be applied using color separation. In this way, the watermark
appears in only one of the color bands. This renders the watermark visibly subtle such that
it is difficult to detect under regular viewing. However, the mark appears immediately
when the colors are separated for printing. This renders the document useless for the printer
unless the watermark can be removed from the color band. This approach is used
commercially for journalists to inspect digital pictures from a photo-stock house before
buying unmarked versions.
Frequency domain (and other transform domains) by first applying a transform like the
Fast Fourier Transform (FFT). In a similar manner to spatial domain watermarking, the
values of chosen frequencies can be altered from the original. Since high frequencies will
be lost by compression or scaling, the watermark signal is applied to lower frequencies, or
better yet, applied adaptively to frequencies that contain important information of the
original picture. Since watermarks applied to the frequency domain will be dispersed over
the entirety of the spatial image upon inverse transformation, this method is not as
susceptible to defeat by cropping as the spatial technique. However, there is more a tradeoff
here between invisibility and decodability, since the watermark is in effect applied
indiscriminately across the spatial image
Watermarking techniques can be divided into four categories according to the type
of document to be watermarked as follows:
According to the human perception, the digital watermarks can be divided into three
different types as follows:
5.7 Visible watermark
Visible watermarks are especially useful for conveying an immediate claim of ownership.
The main advantage is that they virtually eliminate the commercial value of the document
to a would-be thief without lessening the document's utility for legitimate, authorized
purposes. A familiar example is in the video domain where a logo is placed in a corner of
the screen image.
Dual watermark is a combination of a visible and an invisible watermark .In this type of
water mark an invisible watermark is used as a backup for the visible watermark as clear
from the following diagram.
The watermark could also be destination based where each distributed copy gets a unique
watermark identifying the particular buyer. The destination based watermark could be used
to trace the buyer in the case of illegal reselling
This is a technique which makes the text as a binary image, it obtains watermark through
fine-tuning the display style, and it is imperceptibly by human visual. The most classic
algorithm is proposed by Brassil and Maxemchuk , it gives many different ways to insert
watermark in the PostScript document as follows:
a) Line-shift encoding: for the line space of a text file is uniform, the coding method
embeds a watermark by vertical shifting an entire line. when the movement away from no
more than 1 / 300 inches ,the human eye cannot easily perceive, by analyzing the line
spacing can determine whether it contains text watermark, the process does not require the
participation of the original text.
b) word-shift encoding: this coding method embeds watermark by level shifting some
special words in a line. When a word is shifted to right or left, it’s adjacent words are not
moving, not moving words are as references location for the process of decoding.
Experience found that the human eye cannot identify the 1 / 150 inches below the level of
displacement. As the document is not a fixed word spacing, so to determine whether it
contains watermark needs the text of the original documents.
Page | 15
c) Characteristics coding: the coding method inserts a marker by changing the particular
characteristics of a letter, such as changing the height of a individual letter, fonts, etc. The
above-mentioned three kinds of coding methods are to use the spatial characteristics of text
to embed the watermark. These algorithm entirely depend on the text format (line-shift,
word-shift, characteristics coding, etc.), there are many shortcomings, such as not enough
antiaggressive, less robust, not well hidden.
For a text, when some of the expressions of the text occur Some minor changes, there is no
impact for understanding the document, for this point, the text watermark can be embedded.
Typical methods include inserting punctuation in sentences, or inserting space at the end of
a line. For example, we can store binary information by setting or not setting the comma in
the two side-by-side words with "and" or "or" to connect.
Specifically, if the "guns, butter and flowers" expresses the logic 1, then the "guns, butter,
and flower" is logic0.Weakness of such method, that is, the watermark information may be
missing in the transmission process of application. In addition, the source text can not be
arbitrary. This method is not currently the main method of text watermarking.
The method is derived from information hiding technology. It looks source text as the
significance sequence instead of text images, embedded in the course of the text is
converted to vector with the same or similar meaning of the text of the secret process. So
watermark can be embedded by converting the source text into the same or similar meaning
of hidden text.
Usually in the English text many words have synonyms, such as "big" and "1arge", "smart"
and "clever" and so on, so we can elect these specific words of the text constitute a
synonym replacement tables. The word needs to be replaced, said logic "0", the words that
do not need to replace the logic "1."So the secret data can be hidden in the text, the number
of hidden data relates to the synonym appear frequency in the text, the method also applies
Page | 16
to Chinese text. The method of synonym replacement hide information by modifying the
contents of the text, it not only has better robustness, but also do not need to rely on a
specific document format. However, this approach requires source text cannot be arbitrary,
that is, should contain a certain number of synonyms have been defined, and in the process
of extracting information needs the synonyms replace table.
Challenges
Uses
The first one is robust against compression, filtering and cropping. Like all published crop-
proof algorithms, the one proposed here requires the original image for mark recovery.
Robustness against compression and filtering is obtained by using the JPEG algorithm to
Page | 17
decide on mark location and magnitude; robustness against cropping is achieved through a
repetition code.
The second watermarking algorithm uses visual components and is robust against
compression, filtering, scaling and moderate rotations.
Image Histogram:
LSB watermarking - Least Significant Bit algorithm that embedding watermark into
the least important part of the primary image, and the watermark can be extracted
from the primary image.
The idea behind this watermarking technique is the following: if you see you image as a
matrix NxM (where N and M are the dimension of the image) you can represent the value
of the pixel in the position (i,j) as a binary number; this binary can be then divided in all of
its bit, so that you will have a most significant bit (the one that contains quite a lot of
information, and a least significant bit that contains few information).
Page | 18
Quantisation watermarking -A new method for watermarking based on vector
quantisation is proposed. It is efficient for implementation with conventional
techniques, and simulation results show its robustness under a variety of attacks. It
also represents superiority over existing algorithms
Page | 20
9. Proposed Work
In traditional symmetric watermarking schemes, the key used for watermark embedding
must be available at the watermark detector. This leads to a security problem if the
detectors are implemented in consumer devices that are spread all over the world. So
asymmetric watermarking schemes, also named public key digital watermarking schemes
attract more and more attentions. In such a public key watermarking system, the private key
is used for watermarking embedding and the public key is used only for watermarking
detection. The private key is kept for secret, and the watermarks cannot easily be removed
with public key.
Page | 21
10. RESEARCH DIRECTIONS
10.1 Study on Watermarking Algorithm
Although there are many published articles on watermarking, the current watermarking
technology can’t yet fill the actual requirements of most users. The lack of standards,
interoperability problems, as well as a suit of accurate and realistic requirements to
watermarking system, is still hinder the development of digital watermarking technology.
There are still many problems to be resolved. In order to be more widely used, digital
watermarking should establish a series of standards or agreements, such as the standards of
Page | 22
watermark embedding, detection and certification. Different watermarking algorithm has
different compatibility, and that is obviously not conducive to promoting the application of
digital watermarking.
The relationship between watermark attack and watermarking algorithm is the same as
spear and shield, they restrict each other and promote each other as well; To develop the
technologies combined with cryptography, authentication and digital signature is probably
the direction of resistance development to various attacks.
Page | 23
Fig 11: attacks on digital water marking
Page | 24
10.4 Study on Evaluation System of Watermarking Technology
Most of the watermarking system evaluation are empirical, so it is necessary to improve the
theoretical evaluation system of watermarking technology, establish the watermark testing
and evaluation standards, and design an evaluation system for fair comparison and
evaluation of various watermarking algorithms.
Page | 25
11. Conclusion
Digital watermarking have been used in last few year to protect the ownership of digital
data. Various technique develop make use of human audio visual system. Information
security and copyright protection are more important today than before. Digital
watermarking is one of the widely used techniques used in the world in the area of
information security.
However, the excitement about the promise of watermarking should not mask the state of
its ful fillment. In spite of the exaggerated claims often made about digital watermarking, it
is a new field. Many applications have been proposed for watermarking; most of them
remain unproven. Few careful examinations of the technical requirements of the proposed
applications have been undertaken. A common application requirement is that the
watermark resist attacks that would remove it (or insert a false watermark).
Page | 26
12. References:
[2] G.Voyatzis, I.Pitas. The use of watermarks in the protection of digital multimedia
products [J]. Proceeding of IEEE, 1999,87(7): 1197-1207.
[3] Ding Huang and Hong Yan, “Interword Distance Changes Represented by Sine Waves
for Watermarking Text Images”, IEEE TRANSACTIONS ON CIRCUITS AND
SYSTEMS FOR
VIDEOTECHNOLOGY, VOL. 11, NO. 12, DECEMBER 2001.1237
.
[4] G. S. Peake and T. N. Tan, “A general algorithm for document skew angle estimation,”
in Proc. of lCIP’97, IEEE lnt. Con$ Image Proc., S.Barbara, CA, October, 26-29 1997, vol.
11, pp. 230-233.
[4] Y. M. Y. Hasan and L. J. Karam, “Morphological text extraction from images,” IEEE
Trans. lmage Proc., vol.9, no. 11, pp. 1978-1983, November 2000.
Page | 27