Synopsis of Digital Watermarking
Synopsis of Digital Watermarking
Synopsis of Digital Watermarking
Abstract
The growth of networked multimedia systems has created the need for the
copyright protection of various digital medium, e.g., images, audio clips,
video, etc. Copyright protection involves the authentication of ownership
and the identication of illegal copies of a (possibly forged) image. One
approach used to address this problem is to add a visible or invisible
structure to an image that can be used to seal or mark it. These structures
are known as digital watermarks. The watermark is capable of carrying such
information as authentication or authorization codes, or a legend essential
for image interpretation. This capability is envisaged to find application in
image tagging, copyright enforcement, counterfeit protection, and
controlled access. In this paper, we rest outline the desirable characteristics
of digital watermarks. Previous work in digital watermarking is then
summarized. Several recent approaches that address these issues are also
discussed.
Introduction
Digital media facilitate efficient distribution, reproduction, and
manipulation over networked information systems for image, audio clips,
and videos. However, the fact that an unlimited number of perfect copies
can be illegally produced is a serious threat to the rights of content
owners.
However, these efficiencies also increase the problems associated with
copyright enforcement. A number of technologies are being developed
to provide protection from illegal copying. They include:
(1) Encryption Methods {the use of public and private keys to encode the
data so that the image can only be decoded with the required key,
(2) Site Security Methods {the use of firewalls to restrict access,
(3) Using Publicly Accessible Low Quality Thumbnail images, and
(4) Digital Watermarking , this includes the robust unobtrusive labeling
of an image with information pertaining to copyright, and the use of
image checksums or other techniques to detect the manipulation of
image data.
To address the non-obtrusive copyright enforcement issue, digital
watermarks (i.e., author signatures) are under investigation.
Watermarking is the process of encoding hidden copyright information
in an image by making small medications to its pixel content. Unlike
encryption which protects content during the transmission of the data
from the sender to receiver, digital watermarking does not restrict access
to the image information. Watermarking compliments encryption by
embedding a signal directly into the data. Thus, the goal of a watermark
is to always
Remain present in the data to provide solid proof of ownership. It should
be noted that embedded signaling or watermarking can be used for a
variety of other purposes other than copyright control. For example, it
can be used for owner identication, to identify the content owner,
fingerprinting, to identify the buyer of the content, for broadcast
monitoring to determine royalty payments, and authentication, to
determine whether the data has been altered in any manner from its
original form. However, here we restrict our discussion here to issues that
are related to copyright control. Although there are two main divisions of
watermarks, e.g., visible and invisible, this paper focuses on algorithms
and techniques for invisible watermarks. In general, there are two basic
requirements of invisible watermarks. The watermarks should be (1)
perceptually invisible and (2) Robust to common signal processing and
intentional attacks. Early research on digital watermarking concentrates
on the rest objective without considering the second one. Recently much
work has been devoted to designing robust watermarking schemes.
Perceptual models have also been incorporated to make the best trade
between perceptual invisibility and robustness to signal processing .
The goal of this paper is to give a brief summary of various digital
watermarking techniques available for the purpose of authentication,
forgery detection, and copyright enforcement. The paper is organized as
follows. In the next section, we outline desirable properties of a
watermark for copyright control, which can be quite different from
watermarks for authentication purposes.
Statistical Techniques
Bender describes two watermarking schemes. The first is a statistical method
called”Patchwork" that somewhat resembles the statistical component of Cox's
proposal. Patchwork randomly chooses n pairs of image points, (ai; bi), and
increases the brightness at ai by one unit while correspondingly decreasing the
brightness of bi. The expected value of the sum of the differences of the n pairs
of points is then claimed to be 2n, provided certain statistical properties of the
image are true. In particular, it is assumed that all brightness levels are equally
likely, that is, intensities are uniformly distributed. However, in practice, this is
very uncommon. Moreover, the scheme may (1) not be robust to randomly
jittering the intensity levels by a single unit, and (2) be extremely sensitive to
geometric affine transformations. The second method is called “texture block
coding", wherein a region of random texture pattern found in the image is
copied to an area of the image with similar texture. Autocorrelation is then used
to recover each texture region. The most significant problem with this
technique is that it is only appropriate for images that possess large areas of
random texture. The technique could not be used on images of text, for
example. Nor is there a direct analogy for audio.
Checksum Technique
This watermark is formed from the checksum value of the seven most significant
bits of all pixels. A checksum is the modulo-2 addition of a sequence of fixed-
length binary words. It is a special type of hash function. In this technique, one
word is the concatenation of eight 7-bit segments, which come from eight
different pixels. Each pixel is involved in the checksum only once. The final
checksum is fifty-six bits. The technique then randomly chooses the locations of
the pixels that are to contain one bit of the checksum. The pixel locations of the
checksum, together with the checksum itself, form the watermark. The last bit
of each chosen pixel is changed (if necessary) to equal the corresponding
checksum bit. This value must be kept secret. To verify this watermark the
checksum of a test image is obtained, and compared to the ideal version in
watermark. Any discrepancy invalidates the image. The advantages of this
technique are: (1) the embedding watermark only changes (on average) half of
the pixels covered by watermark; (2) an image may hold many watermarks as
long as they do not overlap, and (3) this method is very fast. On the other hand,
the disadvantages of this technique are: (1) this watermarking method is fragile.
Any change to either the image data itself or the embedded checksum can
cause the verification procedure to fail, (2) the checksum method does not
detect pixels swaps or similar attacks. A forger could replace a section with one
of equal size and checksum, and (3) an attacker could remove the entire
watermark by replacing the LSB plane.
Conclusion
The proliferation of network multimedia systems dictates the need for
copyright protection of digital property. To conclude, any successful
watermarking algorithm would have to exploit properties of the human
visual system and combine these with effective modulation and
channel coding. Future work will concentrate on producing watermarks
that are robust to filtering, lossy image compression, noise corruption
and changes in contrast. In addition these algorithms must anticipate
possible attacks on the integrity and security of the watermark and to
devise suitable countermeasures. This paper serves as a brief summary
on several more recent and popular digital watermarking techniques
for multimedia information systems.